CN111130765A - Two-dimensional code sharing method and device for intelligent device and storage medium - Google Patents

Two-dimensional code sharing method and device for intelligent device and storage medium Download PDF

Info

Publication number
CN111130765A
CN111130765A CN201911167298.4A CN201911167298A CN111130765A CN 111130765 A CN111130765 A CN 111130765A CN 201911167298 A CN201911167298 A CN 201911167298A CN 111130765 A CN111130765 A CN 111130765A
Authority
CN
China
Prior art keywords
dimensional code
user
information
sharing
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911167298.4A
Other languages
Chinese (zh)
Inventor
沈汉标
王妙玉
童威云
吴宁泉
张少山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Ketyoo Intelligent Technology Co Ltd
Original Assignee
Guangdong Ketyoo Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Ketyoo Intelligent Technology Co Ltd filed Critical Guangdong Ketyoo Intelligent Technology Co Ltd
Priority to CN201911167298.4A priority Critical patent/CN111130765A/en
Publication of CN111130765A publication Critical patent/CN111130765A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a two-dimensional code sharing method, equipment and a storage medium of intelligent equipment, wherein the sharing method comprises the following steps: acquiring user information transmitted by a user terminal and a unique identifier of the intelligent device; receiving a two-dimensional code generation request containing expiration time information generated based on a time stamp transmitted by a user terminal; generating a corresponding two-dimensional code according to the unique identifier, the expiration time information and the user information of the intelligent device; sending the generated two-dimensional code to a terminal of a sharee; receiving identification information fed back by a sharee terminal, wherein the identification information comprises scanning time information when the sharee terminal scans the two-dimensional code, judging whether the two-dimensional code is valid or not by comparing the scanning time information with expiration time information, and if the two-dimensional code is valid, displaying information obtained by scanning the two-dimensional code to the sharee terminal; and if the sharing is invalid, displaying a sharing invalid prompt. The method and the device have the advantages that the two-dimension code sharing of the intelligent device has certain timeliness, and the safety level of the device is improved.

Description

Two-dimensional code sharing method and device for intelligent device and storage medium
Technical Field
The present invention relates to the field of computer terminal technologies, and in particular, to a method and an apparatus for sharing a two-dimensional code of an intelligent device, and a storage medium.
Background
A two-dimensional Code (QR Code) is a coding method for recording data symbol information, in which a black-and-white pattern is distributed on a two-dimensional plane according to a certain rule by using a specific geometric pattern. The two-dimensional code is widely used by the mobile terminal, and the mobile terminal can directly acquire information in the two-dimensional code by scanning the two-dimensional code, so that great convenience is brought to the use of a user.
Along with the rapid development of intelligent equipment and intelligent application, the popularity of the intelligent equipment is higher and higher; at present, the smart device can be directly bound by the two-dimension code pattern generated by the smart device through scanning the smart application by the user, and the smart device has the right to use the smart device, but the two-dimension code shared in the prior art only contains the unique identifier of the smart device in the computer software application, and the valid period of the two-dimension code cannot be customized, so that the security level is not high.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide a two-dimensional code sharing method for an intelligent device, so that the two-dimensional code sharing of the intelligent device has certain timeliness, and the security level of the device is improved.
Another object of the present invention is to provide an electronic device.
It is a further object of the present invention to provide a storage medium.
One of the purposes of the invention is realized by adopting the following technical scheme:
a two-dimensional code sharing method of intelligent equipment comprises the following steps:
acquiring user information transmitted by a user terminal and a unique identifier of the intelligent device;
receiving a two-dimensional code generation request transmitted by a user terminal, wherein the two-dimensional code generation request comprises expiration time information generated based on a timestamp;
generating a corresponding two-dimensional code according to the unique identifier, the expiration time information and the user information of the intelligent device;
sending the generated two-dimensional code to a terminal of a sharee;
receiving identification information fed back by a sharee terminal, wherein the identification information comprises scanning time information when the sharee terminal scans the two-dimensional code, judging whether the two-dimensional code is valid or not by comparing the scanning time information with expiration time information, and if the two-dimensional code is valid, displaying information obtained by scanning the two-dimensional code to the sharee terminal; and if the sharing is invalid, displaying a sharing invalid prompt.
Further, the user information includes identity information of the login user and configuration information set by the login user.
Further, the configuration information includes a display authority of information obtained by using the operation authority, the valid period and the scanning of the two-dimensional code.
Further, the using operation authority comprises a temporary password authority and a smart device password modification authority.
Further, the valid period is a time period set by a user or a default time period which is not specified by the user.
Further, the method for acquiring the user information comprises the following steps:
judging whether the user is in a logged-on state or not; if so, directly acquiring identity information of the login user and configuration information set by the login user; if not, sending a request to acquire the identity information of the login user and the configuration information set by the login user.
Further, the method for judging whether the two-dimensional code is valid includes:
and judging whether the scanning time of the shared person terminal in scanning the two-dimensional code exceeds the expiration time, if so, judging that the two-dimensional code is invalid, and if not, judging that the two-dimensional code is valid.
Further, after receiving the two-dimension code generation request, judging whether the intelligent equipment is in a bound state, if so, responding to the two-dimension code generation request and acquiring user information bound with the intelligent equipment; and if the intelligent equipment is not bound with any user information, the two-dimension code generation request is not answered and the sharing operation is stopped.
The second purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the two-dimensional code sharing method of the intelligent device.
The third purpose of the invention is realized by adopting the following technical scheme:
a storage medium having stored thereon a computer program which, when executed, implements the two-dimensional code sharing method of the smart device described above.
Compared with the prior art, the invention has the beneficial effects that:
the corresponding two-dimensional code is generated according to the unique identifier of the intelligent device, the expiration time information and the user information, so that the output two-dimensional code comprises the expiration time of the sharing device to which the login user belongs, and the two-dimensional code sharing safety is improved.
Drawings
Fig. 1 is a schematic flow chart of a two-dimensional code sharing method of an intelligent device according to the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
A two-dimensional code sharing method of intelligent equipment enables an output two-dimensional code to have a certain sharing time limit, information contained in the two-dimensional code can be obtained by scanning the two-dimensional code within the time limit, and if the time limit is exceeded, the information in the two-dimensional code cannot be obtained, so that the two-dimensional code sharing safety is improved.
As shown in fig. 1, the two-dimensional code sharing method includes:
step S0: judging whether the intelligent equipment is already in a bound state before sharing, if so, responding to the two-dimensional code generation request, and executing step S1 to acquire user information bound with the intelligent equipment; and if the intelligent equipment is not bound with any user information, the two-dimension code generation request is not answered and all sharing operations are stopped.
Step S1: and acquiring the user information transmitted by the user terminal and the unique identification of the intelligent lock.
Because the intelligent lock is bound with the user terminal in the earlier stage, the user terminal can directly obtain the unique identifier of the intelligent lock, the unique identifier is the unique identity identifier of the intelligent lock, and the sharee can utilize the unique identifier to secondarily bind the intelligent equipment.
The user information at least comprises identity information of a login user and configuration information set by the login user; the method for acquiring the user information such as the configuration information, the user identity information and the like comprises the following steps: judging whether the current user is in a logged-on state; if the user logs in, the user inputs own identity information and configures the configuration information in the user terminal, so that the identity information of the user and the configuration information in the configuration interface after logging in can be directly called; and if not, sending a login request to the user terminal for the user to log in and obtain corresponding identity information and configuration information after the configuration is completed.
The identity information is personal information such as an identity ID, a user name and a mobile phone number of a user, the configuration information comprises setting contents such as an operation authority, a valid period and a display authority of information obtained by scanning the two-dimensional code, and the user can perform custom setting on the configuration information in a configuration interface on a user terminal.
The user can configure the use operation authority in a user-defined way to enable the sharee to have the corresponding use authority; for example, if the user sets the password modification permission of the intelligent device to be closed in the user terminal, when the two-dimensional code is successfully shared with the shared person, the shared person cannot modify the password of the intelligent device, and if the user sets the password modification permission of the intelligent device to be opened in the user terminal, when the two-dimensional code is successfully shared with the shared person, the shared person can also modify the password of the intelligent device.
The valid period in the configuration information is a valid time period of the two-dimensional code set by a user in a self-defining way, and if the user does not set the two-dimensional code in the self-defining way, the valid period of the two-dimensional code is set as a default period of the system; the expiration time information of the two-dimensional code can be changed in a user-defined mode according to the valid period so as to improve the use convenience of the user.
The display authority of the information obtained by scanning the two-dimensional code is that the user can select the sharee to display partial user information or all user information after scanning the two-dimensional code, so that the confidentiality of personal information of the user is ensured.
Step S2: and receiving a two-dimensional code generation request transmitted by the user terminal, wherein the two-dimensional code generation request comprises expiration time information generated based on the time stamp.
After a user logs in the mobile terminal, the user can press a sharing key in the user terminal to trigger and generate a two-dimensional code generation request, at the moment, the user terminal can convert the pre-configured valid period into expiration time information generated based on the timestamp, and the valid sharing period of the two-dimensional code is limited by the expiration time information.
Step S3: and generating a corresponding two-dimensional code according to the unique identifier of the intelligent device, the expiration time information and the user information.
And converting the collected expiration time information, the unique identifier of the intelligent device and the user information into corresponding character strings, assigning the character strings into a two-dimensional code data model, and generating a two-dimensional code image integrating the unique identifier of the intelligent lock, the expiration time information and the user information.
Step S4: sending the generated two-dimensional code to a terminal of a sharee;
the two-dimensional code can be sent to a shared person terminal through WeChat software, screenshot forwarding and other modes according to selection of a user, so that a shared person can directly scan the two-dimensional code to obtain corresponding information in the two-dimensional code.
Step S5: after the two-dimensional code is scanned by the sharee, the sharee terminal can feed back the identification information after the two-dimensional code is scanned to the user terminal, wherein the identification information comprises scanning time information, identity information of the sharee and the like when the two-dimensional code is scanned by the sharee terminal; after receiving the identification information fed back by the shared person terminal, the user terminal judges whether the scanning time of the shared person terminal when scanning the two-dimensional code exceeds the expiration time, if so, the two-dimensional code is judged to be invalid, and a sharing invalid prompt is displayed on the user terminal and the shared person terminal; if the two-dimension code does not exceed the preset value, judging that the two-dimension code is valid, displaying information such as user information obtained by scanning the two-dimension code, a unique identification of the intelligent lock and the like to a shared person terminal, and simultaneously adjusting the displayed information according to the configuration selection of the user in a configuration interface; after the sharee obtains the information, the user right of the intelligent device can be correspondingly obtained, and the intelligent device can be bound or controlled.
Example two
An electronic device comprising a memory, a processor, and a program stored in the memory, the program configured to be executed by the processor, the processor implementing the steps of the two-dimensional code sharing method of the smart device of the first embodiment when executing the program.
In addition, the present invention also provides a storage medium, wherein the storage medium stores a computer program, and the computer program realizes the steps of the two-dimensional code sharing method of the intelligent device when being executed by a processor.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The device and the storage medium in this embodiment are based on two aspects of the same inventive concept, and the method implementation process has been described in detail in the foregoing, so that those skilled in the art can clearly understand the structure and implementation process of the system in this embodiment according to the foregoing description, and for the sake of brevity of the description, details are not repeated here.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (10)

1. A two-dimensional code sharing method of intelligent equipment is characterized by comprising the following steps:
acquiring user information transmitted by a user terminal and a unique identifier of the intelligent device;
receiving a two-dimensional code generation request transmitted by a user terminal, wherein the two-dimensional code generation request comprises expiration time information generated based on a timestamp;
generating a corresponding two-dimensional code according to the unique identifier, the expiration time information and the user information of the intelligent device;
sending the generated two-dimensional code to a terminal of a sharee;
receiving identification information fed back by a sharee terminal, wherein the identification information comprises scanning time information when the sharee terminal scans the two-dimensional code, judging whether the two-dimensional code is valid or not by comparing the scanning time information with expiration time information, and if the two-dimensional code is valid, displaying information obtained by scanning the two-dimensional code to the sharee terminal; and if the sharing is invalid, displaying a sharing invalid prompt.
2. The method for sharing two-dimensional code of smart device of claim 1, wherein the user information includes identity information of a login user and configuration information set by the login user.
3. The method for sharing the two-dimensional code of the smart device according to claim 2, wherein the configuration information includes a use authority, a valid period, and a presentation authority of information obtained by scanning the two-dimensional code.
4. The method for sharing two-dimensional code of smart device as claimed in claim 3, wherein said operation permission comprises a temporary password permission and a smart device password modification permission.
5. The method of sharing a two-dimensional code for a smart device according to claim 3, wherein the valid period is a user-set time period or a non-user-specified default time period.
6. The method for sharing two-dimensional code of smart device of claim 1, wherein the method for obtaining the user information comprises:
judging whether the user is in a logged-on state or not; if so, directly acquiring identity information of the login user and configuration information set by the login user; if not, sending a request to acquire the identity information of the login user and the configuration information set by the login user.
7. The method for sharing the two-dimensional code of the smart device according to claim 1, wherein the method for determining whether the two-dimensional code is valid is as follows:
and judging whether the scanning time of the shared person terminal in scanning the two-dimensional code exceeds the expiration time, if so, judging that the two-dimensional code is invalid, and if not, judging that the two-dimensional code is valid.
8. The method for sharing the two-dimensional code of the intelligent device according to claim 1, wherein after receiving the two-dimensional code generation request, it is determined whether the intelligent device is in a bound state, and if the intelligent device is in the bound state, the method responds to the two-dimensional code generation request to obtain the user information bound to the intelligent device; and if the intelligent equipment is not bound with any user information, the two-dimension code generation request is not answered and the sharing operation is stopped.
9. An electronic device, comprising a processor, a memory, and a computer program stored in the memory and executable on the processor, wherein the processor implements the two-dimensional code sharing method of the smart device according to any one of claims 1 to 8 when executing the computer program.
10. A storage medium having stored thereon a computer program which, when executed, implements a two-dimensional code sharing method of a smart device according to any one of claims 1 to 8.
CN201911167298.4A 2019-11-25 2019-11-25 Two-dimensional code sharing method and device for intelligent device and storage medium Pending CN111130765A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911167298.4A CN111130765A (en) 2019-11-25 2019-11-25 Two-dimensional code sharing method and device for intelligent device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911167298.4A CN111130765A (en) 2019-11-25 2019-11-25 Two-dimensional code sharing method and device for intelligent device and storage medium

Publications (1)

Publication Number Publication Date
CN111130765A true CN111130765A (en) 2020-05-08

Family

ID=70496584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911167298.4A Pending CN111130765A (en) 2019-11-25 2019-11-25 Two-dimensional code sharing method and device for intelligent device and storage medium

Country Status (1)

Country Link
CN (1) CN111130765A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111710422A (en) * 2020-06-04 2020-09-25 四川虹微技术有限公司 Identification code determination method and device, electronic equipment and readable storage medium
CN111726396A (en) * 2020-06-01 2020-09-29 安徽华米信息科技有限公司 Device binding method and device, cloud and storage medium
CN112052437A (en) * 2020-08-15 2020-12-08 富先智能科技(武汉)有限公司 Railway equipment management method and system based on two-dimensional code label and storage medium thereof
CN112560529A (en) * 2020-11-25 2021-03-26 华帝股份有限公司 Binding method and system based on two-dimensional code
CN112949337A (en) * 2021-03-02 2021-06-11 广东鸿土规划设计有限公司 Method and system for displaying farmland information by scanning two-dimensional code
CN112966195A (en) * 2021-03-24 2021-06-15 北京金风智观科技有限公司 Two-dimensional code identification method and system
CN113283264A (en) * 2021-04-16 2021-08-20 维沃移动通信有限公司 Identification code sharing method and device
CN115376229A (en) * 2022-08-26 2022-11-22 广东好太太智能家居有限公司 Intelligent lock binding method and device, storage medium and computer equipment
CN115511029A (en) * 2022-09-23 2022-12-23 花瓣云科技有限公司 Two-dimensional code update prompting method, electronic device and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
US20160004855A1 (en) * 2014-07-03 2016-01-07 Alibaba Group Holding Limited Login using two-dimensional code
CN106331073A (en) * 2016-08-17 2017-01-11 北京小米移动软件有限公司 Method and apparatus for sharing intelligent device
CN109818922A (en) * 2018-12-14 2019-05-28 深圳壹账通智能科技有限公司 The account number sharing method and computer equipment of application program
CN109917667A (en) * 2019-03-31 2019-06-21 广东美的制冷设备有限公司 Household appliance and its control authority sharing method, controlling terminal and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
US20160004855A1 (en) * 2014-07-03 2016-01-07 Alibaba Group Holding Limited Login using two-dimensional code
CN106331073A (en) * 2016-08-17 2017-01-11 北京小米移动软件有限公司 Method and apparatus for sharing intelligent device
CN109818922A (en) * 2018-12-14 2019-05-28 深圳壹账通智能科技有限公司 The account number sharing method and computer equipment of application program
CN109917667A (en) * 2019-03-31 2019-06-21 广东美的制冷设备有限公司 Household appliance and its control authority sharing method, controlling terminal and storage medium

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726396A (en) * 2020-06-01 2020-09-29 安徽华米信息科技有限公司 Device binding method and device, cloud and storage medium
CN111726396B (en) * 2020-06-01 2022-07-29 安徽华米信息科技有限公司 Device binding method and device, cloud and storage medium
CN111710422B (en) * 2020-06-04 2024-01-26 四川虹微技术有限公司 Identification code determining method and device, electronic equipment and readable storage medium
CN111710422A (en) * 2020-06-04 2020-09-25 四川虹微技术有限公司 Identification code determination method and device, electronic equipment and readable storage medium
CN112052437A (en) * 2020-08-15 2020-12-08 富先智能科技(武汉)有限公司 Railway equipment management method and system based on two-dimensional code label and storage medium thereof
CN112560529A (en) * 2020-11-25 2021-03-26 华帝股份有限公司 Binding method and system based on two-dimensional code
CN112949337A (en) * 2021-03-02 2021-06-11 广东鸿土规划设计有限公司 Method and system for displaying farmland information by scanning two-dimensional code
CN112966195A (en) * 2021-03-24 2021-06-15 北京金风智观科技有限公司 Two-dimensional code identification method and system
CN113283264A (en) * 2021-04-16 2021-08-20 维沃移动通信有限公司 Identification code sharing method and device
CN113283264B (en) * 2021-04-16 2022-12-27 维沃移动通信有限公司 Identification code sharing method and device
CN115376229B (en) * 2022-08-26 2023-11-07 广东好太太智能家居有限公司 Intelligent lock binding method and device, storage medium and computer equipment
CN115376229A (en) * 2022-08-26 2022-11-22 广东好太太智能家居有限公司 Intelligent lock binding method and device, storage medium and computer equipment
CN115511029A (en) * 2022-09-23 2022-12-23 花瓣云科技有限公司 Two-dimensional code update prompting method, electronic device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN111130765A (en) Two-dimensional code sharing method and device for intelligent device and storage medium
US10623954B2 (en) AP connection method, terminal, and server
EP3484125B1 (en) Method and device for scheduling interface of hybrid cloud
US10839145B2 (en) Form filling method and related terminal
CN111585964A (en) Login information input method, login information storage method and related device
US10997384B2 (en) Service process starting method and apparatus
CN102752295A (en) Method and device for setting keys
CN108418797B (en) Webpage access method and device, computer equipment and storage medium
CN112529586B (en) Transaction information management method, device, equipment and storage medium
CN104978537A (en) Document access authority configuration method and device
CN111769969A (en) Terminal configuration method and device based on two-dimensional code and computer equipment
CN113127844A (en) Variable access method, device, system, equipment and medium
CN112214270A (en) Page redrawing method, device, equipment and storage medium
CN101674327A (en) Heterogeneous system message integration method, framework and system
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN108667647B (en) Method and device for setting device parameters and server
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
KR20130134932A (en) Method for producing an encrypted file and decrypting the encrypted file, computer readable recording medium a program for implementing the methods
CN106453273B (en) A kind of information insurance management system and method based on cloud
CN111614676B (en) Login method, device, equipment and medium
CN114386010A (en) Application login method and device, electronic equipment and storage medium
CN115001833B (en) Login method and device
CN111935816B (en) Application program registration method and device of terminal and electronic equipment
CN114024688A (en) Network request method, network authentication method, terminal equipment and server
CN113704814A (en) Information management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200508

RJ01 Rejection of invention patent application after publication