CN111130765A - Two-dimensional code sharing method and device for intelligent device and storage medium - Google Patents
Two-dimensional code sharing method and device for intelligent device and storage medium Download PDFInfo
- Publication number
- CN111130765A CN111130765A CN201911167298.4A CN201911167298A CN111130765A CN 111130765 A CN111130765 A CN 111130765A CN 201911167298 A CN201911167298 A CN 201911167298A CN 111130765 A CN111130765 A CN 111130765A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- user
- information
- sharing
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000004590 computer program Methods 0.000 claims description 8
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a two-dimensional code sharing method, equipment and a storage medium of intelligent equipment, wherein the sharing method comprises the following steps: acquiring user information transmitted by a user terminal and a unique identifier of the intelligent device; receiving a two-dimensional code generation request containing expiration time information generated based on a time stamp transmitted by a user terminal; generating a corresponding two-dimensional code according to the unique identifier, the expiration time information and the user information of the intelligent device; sending the generated two-dimensional code to a terminal of a sharee; receiving identification information fed back by a sharee terminal, wherein the identification information comprises scanning time information when the sharee terminal scans the two-dimensional code, judging whether the two-dimensional code is valid or not by comparing the scanning time information with expiration time information, and if the two-dimensional code is valid, displaying information obtained by scanning the two-dimensional code to the sharee terminal; and if the sharing is invalid, displaying a sharing invalid prompt. The method and the device have the advantages that the two-dimension code sharing of the intelligent device has certain timeliness, and the safety level of the device is improved.
Description
Technical Field
The present invention relates to the field of computer terminal technologies, and in particular, to a method and an apparatus for sharing a two-dimensional code of an intelligent device, and a storage medium.
Background
A two-dimensional Code (QR Code) is a coding method for recording data symbol information, in which a black-and-white pattern is distributed on a two-dimensional plane according to a certain rule by using a specific geometric pattern. The two-dimensional code is widely used by the mobile terminal, and the mobile terminal can directly acquire information in the two-dimensional code by scanning the two-dimensional code, so that great convenience is brought to the use of a user.
Along with the rapid development of intelligent equipment and intelligent application, the popularity of the intelligent equipment is higher and higher; at present, the smart device can be directly bound by the two-dimension code pattern generated by the smart device through scanning the smart application by the user, and the smart device has the right to use the smart device, but the two-dimension code shared in the prior art only contains the unique identifier of the smart device in the computer software application, and the valid period of the two-dimension code cannot be customized, so that the security level is not high.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide a two-dimensional code sharing method for an intelligent device, so that the two-dimensional code sharing of the intelligent device has certain timeliness, and the security level of the device is improved.
Another object of the present invention is to provide an electronic device.
It is a further object of the present invention to provide a storage medium.
One of the purposes of the invention is realized by adopting the following technical scheme:
a two-dimensional code sharing method of intelligent equipment comprises the following steps:
acquiring user information transmitted by a user terminal and a unique identifier of the intelligent device;
receiving a two-dimensional code generation request transmitted by a user terminal, wherein the two-dimensional code generation request comprises expiration time information generated based on a timestamp;
generating a corresponding two-dimensional code according to the unique identifier, the expiration time information and the user information of the intelligent device;
sending the generated two-dimensional code to a terminal of a sharee;
receiving identification information fed back by a sharee terminal, wherein the identification information comprises scanning time information when the sharee terminal scans the two-dimensional code, judging whether the two-dimensional code is valid or not by comparing the scanning time information with expiration time information, and if the two-dimensional code is valid, displaying information obtained by scanning the two-dimensional code to the sharee terminal; and if the sharing is invalid, displaying a sharing invalid prompt.
Further, the user information includes identity information of the login user and configuration information set by the login user.
Further, the configuration information includes a display authority of information obtained by using the operation authority, the valid period and the scanning of the two-dimensional code.
Further, the using operation authority comprises a temporary password authority and a smart device password modification authority.
Further, the valid period is a time period set by a user or a default time period which is not specified by the user.
Further, the method for acquiring the user information comprises the following steps:
judging whether the user is in a logged-on state or not; if so, directly acquiring identity information of the login user and configuration information set by the login user; if not, sending a request to acquire the identity information of the login user and the configuration information set by the login user.
Further, the method for judging whether the two-dimensional code is valid includes:
and judging whether the scanning time of the shared person terminal in scanning the two-dimensional code exceeds the expiration time, if so, judging that the two-dimensional code is invalid, and if not, judging that the two-dimensional code is valid.
Further, after receiving the two-dimension code generation request, judging whether the intelligent equipment is in a bound state, if so, responding to the two-dimension code generation request and acquiring user information bound with the intelligent equipment; and if the intelligent equipment is not bound with any user information, the two-dimension code generation request is not answered and the sharing operation is stopped.
The second purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the two-dimensional code sharing method of the intelligent device.
The third purpose of the invention is realized by adopting the following technical scheme:
a storage medium having stored thereon a computer program which, when executed, implements the two-dimensional code sharing method of the smart device described above.
Compared with the prior art, the invention has the beneficial effects that:
the corresponding two-dimensional code is generated according to the unique identifier of the intelligent device, the expiration time information and the user information, so that the output two-dimensional code comprises the expiration time of the sharing device to which the login user belongs, and the two-dimensional code sharing safety is improved.
Drawings
Fig. 1 is a schematic flow chart of a two-dimensional code sharing method of an intelligent device according to the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
A two-dimensional code sharing method of intelligent equipment enables an output two-dimensional code to have a certain sharing time limit, information contained in the two-dimensional code can be obtained by scanning the two-dimensional code within the time limit, and if the time limit is exceeded, the information in the two-dimensional code cannot be obtained, so that the two-dimensional code sharing safety is improved.
As shown in fig. 1, the two-dimensional code sharing method includes:
step S0: judging whether the intelligent equipment is already in a bound state before sharing, if so, responding to the two-dimensional code generation request, and executing step S1 to acquire user information bound with the intelligent equipment; and if the intelligent equipment is not bound with any user information, the two-dimension code generation request is not answered and all sharing operations are stopped.
Step S1: and acquiring the user information transmitted by the user terminal and the unique identification of the intelligent lock.
Because the intelligent lock is bound with the user terminal in the earlier stage, the user terminal can directly obtain the unique identifier of the intelligent lock, the unique identifier is the unique identity identifier of the intelligent lock, and the sharee can utilize the unique identifier to secondarily bind the intelligent equipment.
The user information at least comprises identity information of a login user and configuration information set by the login user; the method for acquiring the user information such as the configuration information, the user identity information and the like comprises the following steps: judging whether the current user is in a logged-on state; if the user logs in, the user inputs own identity information and configures the configuration information in the user terminal, so that the identity information of the user and the configuration information in the configuration interface after logging in can be directly called; and if not, sending a login request to the user terminal for the user to log in and obtain corresponding identity information and configuration information after the configuration is completed.
The identity information is personal information such as an identity ID, a user name and a mobile phone number of a user, the configuration information comprises setting contents such as an operation authority, a valid period and a display authority of information obtained by scanning the two-dimensional code, and the user can perform custom setting on the configuration information in a configuration interface on a user terminal.
The user can configure the use operation authority in a user-defined way to enable the sharee to have the corresponding use authority; for example, if the user sets the password modification permission of the intelligent device to be closed in the user terminal, when the two-dimensional code is successfully shared with the shared person, the shared person cannot modify the password of the intelligent device, and if the user sets the password modification permission of the intelligent device to be opened in the user terminal, when the two-dimensional code is successfully shared with the shared person, the shared person can also modify the password of the intelligent device.
The valid period in the configuration information is a valid time period of the two-dimensional code set by a user in a self-defining way, and if the user does not set the two-dimensional code in the self-defining way, the valid period of the two-dimensional code is set as a default period of the system; the expiration time information of the two-dimensional code can be changed in a user-defined mode according to the valid period so as to improve the use convenience of the user.
The display authority of the information obtained by scanning the two-dimensional code is that the user can select the sharee to display partial user information or all user information after scanning the two-dimensional code, so that the confidentiality of personal information of the user is ensured.
Step S2: and receiving a two-dimensional code generation request transmitted by the user terminal, wherein the two-dimensional code generation request comprises expiration time information generated based on the time stamp.
After a user logs in the mobile terminal, the user can press a sharing key in the user terminal to trigger and generate a two-dimensional code generation request, at the moment, the user terminal can convert the pre-configured valid period into expiration time information generated based on the timestamp, and the valid sharing period of the two-dimensional code is limited by the expiration time information.
Step S3: and generating a corresponding two-dimensional code according to the unique identifier of the intelligent device, the expiration time information and the user information.
And converting the collected expiration time information, the unique identifier of the intelligent device and the user information into corresponding character strings, assigning the character strings into a two-dimensional code data model, and generating a two-dimensional code image integrating the unique identifier of the intelligent lock, the expiration time information and the user information.
Step S4: sending the generated two-dimensional code to a terminal of a sharee;
the two-dimensional code can be sent to a shared person terminal through WeChat software, screenshot forwarding and other modes according to selection of a user, so that a shared person can directly scan the two-dimensional code to obtain corresponding information in the two-dimensional code.
Step S5: after the two-dimensional code is scanned by the sharee, the sharee terminal can feed back the identification information after the two-dimensional code is scanned to the user terminal, wherein the identification information comprises scanning time information, identity information of the sharee and the like when the two-dimensional code is scanned by the sharee terminal; after receiving the identification information fed back by the shared person terminal, the user terminal judges whether the scanning time of the shared person terminal when scanning the two-dimensional code exceeds the expiration time, if so, the two-dimensional code is judged to be invalid, and a sharing invalid prompt is displayed on the user terminal and the shared person terminal; if the two-dimension code does not exceed the preset value, judging that the two-dimension code is valid, displaying information such as user information obtained by scanning the two-dimension code, a unique identification of the intelligent lock and the like to a shared person terminal, and simultaneously adjusting the displayed information according to the configuration selection of the user in a configuration interface; after the sharee obtains the information, the user right of the intelligent device can be correspondingly obtained, and the intelligent device can be bound or controlled.
Example two
An electronic device comprising a memory, a processor, and a program stored in the memory, the program configured to be executed by the processor, the processor implementing the steps of the two-dimensional code sharing method of the smart device of the first embodiment when executing the program.
In addition, the present invention also provides a storage medium, wherein the storage medium stores a computer program, and the computer program realizes the steps of the two-dimensional code sharing method of the intelligent device when being executed by a processor.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The device and the storage medium in this embodiment are based on two aspects of the same inventive concept, and the method implementation process has been described in detail in the foregoing, so that those skilled in the art can clearly understand the structure and implementation process of the system in this embodiment according to the foregoing description, and for the sake of brevity of the description, details are not repeated here.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
Claims (10)
1. A two-dimensional code sharing method of intelligent equipment is characterized by comprising the following steps:
acquiring user information transmitted by a user terminal and a unique identifier of the intelligent device;
receiving a two-dimensional code generation request transmitted by a user terminal, wherein the two-dimensional code generation request comprises expiration time information generated based on a timestamp;
generating a corresponding two-dimensional code according to the unique identifier, the expiration time information and the user information of the intelligent device;
sending the generated two-dimensional code to a terminal of a sharee;
receiving identification information fed back by a sharee terminal, wherein the identification information comprises scanning time information when the sharee terminal scans the two-dimensional code, judging whether the two-dimensional code is valid or not by comparing the scanning time information with expiration time information, and if the two-dimensional code is valid, displaying information obtained by scanning the two-dimensional code to the sharee terminal; and if the sharing is invalid, displaying a sharing invalid prompt.
2. The method for sharing two-dimensional code of smart device of claim 1, wherein the user information includes identity information of a login user and configuration information set by the login user.
3. The method for sharing the two-dimensional code of the smart device according to claim 2, wherein the configuration information includes a use authority, a valid period, and a presentation authority of information obtained by scanning the two-dimensional code.
4. The method for sharing two-dimensional code of smart device as claimed in claim 3, wherein said operation permission comprises a temporary password permission and a smart device password modification permission.
5. The method of sharing a two-dimensional code for a smart device according to claim 3, wherein the valid period is a user-set time period or a non-user-specified default time period.
6. The method for sharing two-dimensional code of smart device of claim 1, wherein the method for obtaining the user information comprises:
judging whether the user is in a logged-on state or not; if so, directly acquiring identity information of the login user and configuration information set by the login user; if not, sending a request to acquire the identity information of the login user and the configuration information set by the login user.
7. The method for sharing the two-dimensional code of the smart device according to claim 1, wherein the method for determining whether the two-dimensional code is valid is as follows:
and judging whether the scanning time of the shared person terminal in scanning the two-dimensional code exceeds the expiration time, if so, judging that the two-dimensional code is invalid, and if not, judging that the two-dimensional code is valid.
8. The method for sharing the two-dimensional code of the intelligent device according to claim 1, wherein after receiving the two-dimensional code generation request, it is determined whether the intelligent device is in a bound state, and if the intelligent device is in the bound state, the method responds to the two-dimensional code generation request to obtain the user information bound to the intelligent device; and if the intelligent equipment is not bound with any user information, the two-dimension code generation request is not answered and the sharing operation is stopped.
9. An electronic device, comprising a processor, a memory, and a computer program stored in the memory and executable on the processor, wherein the processor implements the two-dimensional code sharing method of the smart device according to any one of claims 1 to 8 when executing the computer program.
10. A storage medium having stored thereon a computer program which, when executed, implements a two-dimensional code sharing method of a smart device according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911167298.4A CN111130765A (en) | 2019-11-25 | 2019-11-25 | Two-dimensional code sharing method and device for intelligent device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911167298.4A CN111130765A (en) | 2019-11-25 | 2019-11-25 | Two-dimensional code sharing method and device for intelligent device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111130765A true CN111130765A (en) | 2020-05-08 |
Family
ID=70496584
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911167298.4A Pending CN111130765A (en) | 2019-11-25 | 2019-11-25 | Two-dimensional code sharing method and device for intelligent device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111130765A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111710422A (en) * | 2020-06-04 | 2020-09-25 | 四川虹微技术有限公司 | Identification code determination method and device, electronic equipment and readable storage medium |
CN111726396A (en) * | 2020-06-01 | 2020-09-29 | 安徽华米信息科技有限公司 | Device binding method and device, cloud and storage medium |
CN112052437A (en) * | 2020-08-15 | 2020-12-08 | 富先智能科技(武汉)有限公司 | Railway equipment management method and system based on two-dimensional code label and storage medium thereof |
CN112560529A (en) * | 2020-11-25 | 2021-03-26 | 华帝股份有限公司 | Binding method and system based on two-dimensional code |
CN112949337A (en) * | 2021-03-02 | 2021-06-11 | 广东鸿土规划设计有限公司 | Method and system for displaying farmland information by scanning two-dimensional code |
CN112966195A (en) * | 2021-03-24 | 2021-06-15 | 北京金风智观科技有限公司 | Two-dimensional code identification method and system |
CN113283264A (en) * | 2021-04-16 | 2021-08-20 | 维沃移动通信有限公司 | Identification code sharing method and device |
CN115376229A (en) * | 2022-08-26 | 2022-11-22 | 广东好太太智能家居有限公司 | Intelligent lock binding method and device, storage medium and computer equipment |
CN115511029A (en) * | 2022-09-23 | 2022-12-23 | 花瓣云科技有限公司 | Two-dimensional code update prompting method, electronic device and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
US20160004855A1 (en) * | 2014-07-03 | 2016-01-07 | Alibaba Group Holding Limited | Login using two-dimensional code |
CN106331073A (en) * | 2016-08-17 | 2017-01-11 | 北京小米移动软件有限公司 | Method and apparatus for sharing intelligent device |
CN109818922A (en) * | 2018-12-14 | 2019-05-28 | 深圳壹账通智能科技有限公司 | The account number sharing method and computer equipment of application program |
CN109917667A (en) * | 2019-03-31 | 2019-06-21 | 广东美的制冷设备有限公司 | Household appliance and its control authority sharing method, controlling terminal and storage medium |
-
2019
- 2019-11-25 CN CN201911167298.4A patent/CN111130765A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
US20160004855A1 (en) * | 2014-07-03 | 2016-01-07 | Alibaba Group Holding Limited | Login using two-dimensional code |
CN106331073A (en) * | 2016-08-17 | 2017-01-11 | 北京小米移动软件有限公司 | Method and apparatus for sharing intelligent device |
CN109818922A (en) * | 2018-12-14 | 2019-05-28 | 深圳壹账通智能科技有限公司 | The account number sharing method and computer equipment of application program |
CN109917667A (en) * | 2019-03-31 | 2019-06-21 | 广东美的制冷设备有限公司 | Household appliance and its control authority sharing method, controlling terminal and storage medium |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111726396A (en) * | 2020-06-01 | 2020-09-29 | 安徽华米信息科技有限公司 | Device binding method and device, cloud and storage medium |
CN111726396B (en) * | 2020-06-01 | 2022-07-29 | 安徽华米信息科技有限公司 | Device binding method and device, cloud and storage medium |
CN111710422B (en) * | 2020-06-04 | 2024-01-26 | 四川虹微技术有限公司 | Identification code determining method and device, electronic equipment and readable storage medium |
CN111710422A (en) * | 2020-06-04 | 2020-09-25 | 四川虹微技术有限公司 | Identification code determination method and device, electronic equipment and readable storage medium |
CN112052437A (en) * | 2020-08-15 | 2020-12-08 | 富先智能科技(武汉)有限公司 | Railway equipment management method and system based on two-dimensional code label and storage medium thereof |
CN112560529A (en) * | 2020-11-25 | 2021-03-26 | 华帝股份有限公司 | Binding method and system based on two-dimensional code |
CN112949337A (en) * | 2021-03-02 | 2021-06-11 | 广东鸿土规划设计有限公司 | Method and system for displaying farmland information by scanning two-dimensional code |
CN112966195A (en) * | 2021-03-24 | 2021-06-15 | 北京金风智观科技有限公司 | Two-dimensional code identification method and system |
CN113283264A (en) * | 2021-04-16 | 2021-08-20 | 维沃移动通信有限公司 | Identification code sharing method and device |
CN113283264B (en) * | 2021-04-16 | 2022-12-27 | 维沃移动通信有限公司 | Identification code sharing method and device |
CN115376229B (en) * | 2022-08-26 | 2023-11-07 | 广东好太太智能家居有限公司 | Intelligent lock binding method and device, storage medium and computer equipment |
CN115376229A (en) * | 2022-08-26 | 2022-11-22 | 广东好太太智能家居有限公司 | Intelligent lock binding method and device, storage medium and computer equipment |
CN115511029A (en) * | 2022-09-23 | 2022-12-23 | 花瓣云科技有限公司 | Two-dimensional code update prompting method, electronic device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111130765A (en) | Two-dimensional code sharing method and device for intelligent device and storage medium | |
US10623954B2 (en) | AP connection method, terminal, and server | |
EP3484125B1 (en) | Method and device for scheduling interface of hybrid cloud | |
US10839145B2 (en) | Form filling method and related terminal | |
CN111585964A (en) | Login information input method, login information storage method and related device | |
US10997384B2 (en) | Service process starting method and apparatus | |
CN102752295A (en) | Method and device for setting keys | |
CN108418797B (en) | Webpage access method and device, computer equipment and storage medium | |
CN112529586B (en) | Transaction information management method, device, equipment and storage medium | |
CN104978537A (en) | Document access authority configuration method and device | |
CN111769969A (en) | Terminal configuration method and device based on two-dimensional code and computer equipment | |
CN113127844A (en) | Variable access method, device, system, equipment and medium | |
CN112214270A (en) | Page redrawing method, device, equipment and storage medium | |
CN101674327A (en) | Heterogeneous system message integration method, framework and system | |
CN113946739A (en) | Sensitive data query method, device, equipment and storage medium | |
CN108667647B (en) | Method and device for setting device parameters and server | |
CN114448722B (en) | Cross-browser login method and device, computer equipment and storage medium | |
KR20130134932A (en) | Method for producing an encrypted file and decrypting the encrypted file, computer readable recording medium a program for implementing the methods | |
CN106453273B (en) | A kind of information insurance management system and method based on cloud | |
CN111614676B (en) | Login method, device, equipment and medium | |
CN114386010A (en) | Application login method and device, electronic equipment and storage medium | |
CN115001833B (en) | Login method and device | |
CN111935816B (en) | Application program registration method and device of terminal and electronic equipment | |
CN114024688A (en) | Network request method, network authentication method, terminal equipment and server | |
CN113704814A (en) | Information management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200508 |
|
RJ01 | Rejection of invention patent application after publication |