WO2020052371A1 - 一种扫码控制方法、装置及*** - Google Patents

一种扫码控制方法、装置及*** Download PDF

Info

Publication number
WO2020052371A1
WO2020052371A1 PCT/CN2019/098999 CN2019098999W WO2020052371A1 WO 2020052371 A1 WO2020052371 A1 WO 2020052371A1 CN 2019098999 W CN2019098999 W CN 2019098999W WO 2020052371 A1 WO2020052371 A1 WO 2020052371A1
Authority
WO
WIPO (PCT)
Prior art keywords
dynamic password
target
client
control
background server
Prior art date
Application number
PCT/CN2019/098999
Other languages
English (en)
French (fr)
Inventor
齐元子
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2020052371A1 publication Critical patent/WO2020052371A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment

Definitions

  • One or more of this specification relate to the field of Internet technologies, and in particular, to a method, device, and system for scanning code control.
  • the application of smart device terminals is becoming more and more widespread, such as self-collecting merchandise sales counters.
  • Users can use mobile terminals (such as smartphones) to scan the graphic code on merchandise sales counters, which can provide services to the background
  • the device sends a device control request to realize the intelligent control of the merchandise sales cabinet.
  • the background server automatically controls the merchandise sales cabinet to perform a door opening operation, so that the user can take out the goods they need to buy from the merchandise sales cabinet.
  • the merchandise sales cabinet Send the purchased product information to the background server to enable the background server to perform payment settlement.
  • the graphic codes provided on the existing smart device terminals for providing user scanning are static graphic codes, as long as a malicious user obtains the URL address and device identification corresponding to the static graphic code at one time, the malicious user can pass Illegal means trigger the client used by a normal user to send a device control request carrying the URL address and device identification to the background server.
  • the background server directly controls the smart device terminal corresponding to the device identification to perform the target operation based on the control request. For example, Control the merchandise sales cabinet to perform the door opening operation, and charge the normal user who issued the control request to make a payment deduction, so that a malicious user can take out the required merchandise from the merchandise sales cabinet without paying a fee, but directly Deduct money from normal user's funds account.
  • the purpose of one or more embodiments of this specification is to provide a code scanning control method, device and system. Since the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain timeliness. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked, and timely and effective control can be performed against the situation where the client is illegally attacked by a malicious user to avoid unnecessary losses to normal users.
  • One or more embodiments of the present specification provide a code scanning control method, including:
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • One or more embodiments of the present specification provide a code scanning control method, including:
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • One or more embodiments of the present specification provide a code scanning control device, including:
  • a request receiving module configured to receive a device control request sent by a client, wherein the device control request carries a target dynamic password
  • a password identification module configured to determine whether the target dynamic password satisfies a preset timeliness condition, wherein the target dynamic password corresponds to a dynamically updated graphic code displayed on the target device terminal;
  • a control module configured to execute a corresponding control operation according to a timeliness determination result for the target dynamic password.
  • One or more embodiments of the present specification provide a code scanning control device, including:
  • a request receiving module configured to receive a device control request for a code scanning and selling device sent by a client, wherein the device control request carries a target dynamic password
  • a password identification module configured to determine whether the target dynamic password satisfies a preset timeliness condition, wherein the target dynamic password corresponds to a dynamically updated graphic code displayed on the target scan code selling device;
  • a control module configured to execute a corresponding control operation according to a timeliness determination result for the target dynamic password.
  • One or more embodiments of the present specification provide a code scanning control device, including: a processor; and
  • a memory arranged to store computer-executable instructions which, when executed, cause the processor to:
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • One or more embodiments of the present specification provide a code scanning control device, including: a processor; and
  • a memory arranged to store computer-executable instructions which, when executed, cause the processor to:
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • One or more embodiments of the present specification provide a storage medium for storing computer-executable instructions that, when executed, implement the following processes:
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • One or more embodiments of the present specification provide a storage medium for storing computer-executable instructions that, when executed, implement the following processes:
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • the code scanning control method, device and system in one or more embodiments of the present specification receive a device control request sent by a client; determine whether a target dynamic password carried in the device control request meets a preset timeliness condition, wherein, the The target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal; a corresponding control operation is performed according to the timeliness judgment result.
  • the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client should have a certain timeliness, so that whether the client is Attacks are aimed at identifying cases where a client is illegally attacked by a malicious user, and effectively controlling them in a timely manner to avoid unnecessary losses to normal users.
  • FIG. 1 is a schematic diagram of an application scenario of a code scanning control system provided by one or more embodiments of the present specification
  • FIG. 2 is a first schematic flowchart of a code scanning control method applied to a background server provided by one or more embodiments of the present specification
  • FIG. 3 is a schematic flowchart of a second method of a code scanning control method applied to a background server provided by one or more embodiments of the present specification;
  • FIG. 4 is a third schematic flowchart of a code scanning control method applied to a background server provided by one or more embodiments of the present specification
  • FIG. 5 is a schematic flowchart of a fourth method of a code scanning control method applied to a background server provided by one or more embodiments of the present specification;
  • FIG. 6 is a fifth schematic flowchart of a code scanning control method applied to a background server provided by one or more embodiments of the present specification
  • 7a is a schematic diagram of a first type of information interaction of a code scanning control method provided by one or more embodiments of the present specification
  • 7b is a schematic diagram of a second type of information interaction of a code scanning control method provided by one or more embodiments of the present specification.
  • FIG. 8 is a schematic flowchart of a code scanning control method applied to a client provided by one or more embodiments of the present specification
  • FIG. 9 is a schematic flowchart of a code scanning control method applied to a device terminal according to one or more embodiments of the present specification.
  • FIG. 10 is a schematic flowchart of a code scanning control method for a code scanning sales device provided by one or more embodiments of the present specification.
  • FIG. 11 is a schematic diagram of a module composition of a code scanning control device provided in a background server according to one or more embodiments of the present specification;
  • FIG. 12 is a schematic diagram of a module composition of a device terminal provided by one or more embodiments of the present specification.
  • FIG. 13 is a schematic structural composition diagram of a code scanning control system provided by one or more embodiments of the present specification.
  • FIG. 14 is a schematic structural diagram of a code scanning control device provided by one or more embodiments of the present specification.
  • One or more embodiments of the present specification provide a code scanning control method, device, and system.
  • the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client should have a certain timeliness, so that it can Relying on the timeliness of the dynamic password to identify whether the client has been attacked, and in order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • FIG. 1 is a schematic diagram of an application scenario of a code scanning control system provided by one or more embodiments of the present specification.
  • the control system includes a background server, a client, and a device terminal.
  • the client may be For mobile terminals such as smartphones and tablets, the background server may be a background server for managing and controlling device terminals and having a saas service.
  • the device terminals may be scanning and selling equipment, scanning and leasing products, etc., among which,
  • the specific process of code scanning control is:
  • the client sends a device control request to the background server, where the device control request carries the target dynamic password;
  • the client may be a device control request issued based on an active code scanning operation on the graphic code on the device terminal, which is a normal active request to control the device terminal; the client may also be triggered by a malicious user through illegal means.
  • a device control request issued that is, a passive request to control a device terminal after being attacked;
  • the background server determines whether the target dynamic password carried in the device control request meets a preset timeliness condition
  • the target dynamic password carried in the device control request is valid; because the graphic code displayed on the device terminal corresponds to Dynamic passwords are dynamically updated. It takes a certain time for a malicious user to obtain a dynamic password and then trigger a normal user to send a device control request with the dynamic password to the background server. Therefore, the client is triggered by a malicious user through illegal means.
  • the target dynamic password carried in the device control request is invalid;
  • the background server executes the corresponding control operation according to the timeliness judgment result of the target dynamic password
  • the target dynamic password when it is determined that the target dynamic password is valid, it means that the client normally requests to control the device terminal from the background server normally. At this time, the background server needs to respond to the device control request normally and control the device terminal to perform corresponding control actions.
  • the target dynamic password when it is determined that the target dynamic password is invalid, it means that the client belongs to the attack and asks the background server to control the device terminal. At this time, the background server needs to return a prompt message to the client, so as to effectively implement the illegal attack behavior of the malicious user. Control to avoid unnecessary losses to normal users.
  • FIG. 2 is a schematic flowchart of a first code scanning control method provided by one or more embodiments of the present specification.
  • the method in FIG. 2 can be executed by a background server in FIG. 1. As shown in FIG. 2, the method includes at least The following steps:
  • S201 Receive a device control request sent by a client, where the device control request carries a target dynamic password
  • the device control request received by the background server may be sent by the client based on an active scanning operation of the graphic code on the device terminal, that is, the client normally actively requests to control the device terminal; it may also be the client on the Triggered by a malicious user through illegal means, it belongs to the client passively requesting control of the device terminal after being attacked;
  • S202 Determine whether the target dynamic password carried in the device control request satisfies a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal, that is, during the scanning graphic code verification phase, Determine the timeliness of the target dynamic password to identify whether the user has been attacked.
  • the scanning graphic code verification phase is the process of the user scanning the graphic code using the client to request the opening of the door. ;
  • the target dynamic password carried in the device control request satisfies a preset timeliness condition, that is, the target dynamic password corresponds to The graphic code of has not expired.
  • the dynamic password corresponding to the graphic code displayed on the device terminal is the target dynamic password.
  • the target dynamic password carried in the device control request does not meet the preset timeliness condition, that is, the graphic code corresponding to the target dynamic password has expired.
  • the dynamic password corresponding to the graphic code displayed on the device terminal is not the target dynamic password;
  • S203 Perform a corresponding control operation according to the time-sensitive judgment result of the target dynamic password, where the judgment result may be that the target dynamic password meets the preset time-lapse condition, or that the target dynamic password does not meet the predetermined time-lapse condition;
  • the target dynamic password satisfies the preset timeliness condition, it means that the client normally requests to control the device terminal from the background server normally. At this time, the background server needs to respond to the device control request normally, and the control device terminal performs the corresponding control. Action; if the target dynamic password does not meet the preset timeliness conditions, it means that the client belongs to the attack and asked the background server to control the device terminal. At this time, the background server needs to return a prompt message to the client, for example, trigger the client to display Error page.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • the above S203 executes a corresponding control operation according to the timeliness judgment result of the target dynamic password, which specifically includes:
  • the client normally requests to control the device terminal from the background server normally.
  • the background server needs to respond to the device control request normally. That is, the background server can directly send control instructions to the device terminal, for example, issuing a door opening instruction; in order to further improve the accuracy of the device control, it can also first return the business data used to render the business page to the client, so that the user can The business page displayed by the client sends confirmation control information to the client.
  • the control device terminal performs corresponding control actions;
  • the judgment result is no, that is, the target dynamic password does not meet the preset timeliness condition
  • the background server needs to return to the client
  • the first prompt message to remind the user that there is currently a possibility of being attacked.
  • an option for confirming the submission of a device control request may be provided, for example, a manual submission of a door opening request is provided.
  • Option to prevent uploading of the target dynamic password due to the delay of the client ’s code scanning delay, which will lead to the problem of being unable to trade.
  • the business data used to render the business page may be returned to the client first, so that the user sends confirmation control information to the client based on the business page displayed by the client. Based on this, such as As shown in FIG. 4, after the above S2031 returns the service page to the client, it further includes:
  • S2033 Receive control confirmation information sent by the client for the displayed service page, where the service page may be a door opening confirmation page for the case where the device terminal is a code scanning and selling device, when the client detects that the user clicks on the door opening confirmation page After the door open option is sent, confirm the door open information to the background server.
  • the business page can also be the lock confirmation page.
  • the client detects that the user clicks the unlock option on the lock confirmation page Send confirmation unlock information to the background server;
  • the control instruction may be a door opening instruction or an unlocking instruction.
  • the target The control action performed by the device terminal may be a door opening operation, an unlocking operation, or the like.
  • the background server needs to generate graphic code information including dynamic passwords according to preset rules, and send the graphic code information to the corresponding device terminal, so that the device terminal displays the graphic code corresponding to the graphic code information.
  • the graphic code displayed on the device terminal to provide client scanning is dynamically updated, so as to ensure that the target dynamic password carried in the device control request uploaded by the client is dynamically changed, so as to subsequently be based on the timeliness of the target dynamic password Judging to determine what kind of control operation to perform.
  • the method before receiving the device control request sent by the client in S201, the method further includes:
  • S204 Determine a dynamic password according to at least two of a device identifier of the target device terminal, an identification key corresponding to the device identifier, and time stamp information, where the device identifier may be a uniqueness assigned to each device terminal in advance Identification, the identification key may be determined based on the device identification in a preset manner, and the timestamp information may be the current timestamp when the dynamic password is determined.
  • the dynamic password may be stored in a key-value database (that is, redis). )in;
  • S205 Generate graphic code information according to the determined dynamic password, where the graphic code information can be obtained by concatenating a preset URL address with a dynamic password, that is, a dynamic password can be added to the end of the URL address, for example, the URL The address can be https://alipay.com/detail.htm;
  • S206 Send the generated graphic code information to the target device terminal, so that the target device terminal displays a corresponding graphic code based on the graphic code information, where the dynamic code generated each time is different, so the graphic code information They are different so that the graphic code displayed on the device terminal is dynamically updated.
  • the graphic code can be a two-dimensional code or a bar code;
  • the electronic ink label screen can be used as the graphic code display screen.
  • the display screen provided on the device terminal for displaying the graphic code can be reused.
  • the client When the client scans the graphic code displayed on the target device terminal, it can analyze the target dynamic password corresponding to the graphic code, generate a device control request based on the target dynamic password, and send the device control request to the background server. So that the background server controls the target device terminal based on the device control request.
  • the invalid dynamic password can be automatically deleted, and after receiving the device control request, it is determined whether the target dynamic password carried in the device control request exists. Therefore, it is determined whether the target dynamic password meets the preset timeliness condition. Based on this, as shown in FIG. 6, after the generated graphic code information is sent to the target device terminal in the above S206, the method further includes:
  • the password reaches the preset survival time and / or the dynamic password is used. Specifically, when the dynamic password reaches the preset survival time, it means that the inventory time of the dynamic password is greater than the preset aging threshold, that is, the dynamic password expires and the dynamic password is used.
  • Device terminal control is performed for the dynamic password, that is, the dynamic password has been destroyed.
  • the dynamic password set includes at least one valid dynamic password, and the dynamic password set is set in a key-value database (that is, redis);
  • the above S202 determines whether the target dynamic password carried in the device control request meets a preset timeliness condition, and specifically includes:
  • S2021 Determine whether there is a target dynamic password carried in the device control request in the dynamic password set;
  • S2032 is executed to return the first prompt information to the client, so that the client prompts based on the first prompt information.
  • the above S207 changes the dynamic password After the password is removed from the dynamic password collection, it also includes:
  • step S204 After generating the new dynamic password, generate graphic code information according to the dynamic password, and send the graphic code information to the corresponding target device terminal. Update the graphic code displayed on the target device terminal.
  • the above S204 determines the dynamic password based on at least two of the device identification of the target device terminal, an identification key corresponding to the device identification, and time stamp information, which specifically include:
  • a message digest algorithm is used to determine a dynamic password based on at least two of the device identifier of the target device terminal, an identification key corresponding to the device identifier, and time stamp information, where the message digest algorithm may be an md5 encryption algorithm. Specifically, using The md5 encryption algorithm performs md5 encryption on at least two of a device id, a unique key corresponding to the device id, and time stamp information to generate a sign field.
  • the above S2034 sends a control instruction to the target device terminal based on the received control confirmation information, which specifically includes:
  • the dynamic password set find whether there is a dynamic password corresponding to the received control confirmation information. Specifically, after receiving the control confirmation information sent by the client for the service page, it is determined again whether there is a corresponding dynamic password in the dynamic set. ;
  • the dynamic password satisfies preset destruction conditions. After the dynamic password is destroyed, Generate a new dynamic password for the target device terminal displaying the graphic code containing the dynamic password, and update the graphic code displayed on the target device terminal based on the new dynamic password;
  • the target dynamic password carried in the device control request meets the preset timeliness condition
  • the client sends a control confirmation to the background server for the business page within the preset time Information
  • the target dynamic password corresponding to this device control request should be valid, that is, there is a target dynamic password in the dynamic password set. If the target dynamic password does not exist in the dynamic password set, it means that the client is not within the preset time. Control confirmation information sent to the background server for the business page.
  • the foregoing code scanning control method mainly includes: a process of sending graphic code information and a process of controlling equipment based on the timeliness of the graphic code.
  • the graphic code information in the code scanning control method is given.
  • the schematic diagram of the information interaction in the delivery process is as follows:
  • the background server obtains the device identification of the target device terminal.
  • the background server generates a dynamic password according to the device identifier of the target device terminal, an identification key corresponding to the device identifier, and timestamp information.
  • the dynamic password may be generated after determining that the graphic code displayed on the target device terminal has expired.
  • a new dynamic password is generated to update the displayed on the target device terminal.
  • the background server generates graphic code information according to the generated dynamic password and a preset URL address
  • the background server sends graphic code information to the target device terminal.
  • the target device terminal After receiving the graphic code information, the target device terminal displays the graphic code based on the graphic code information on the display screen;
  • the background server stores the generated dynamic password in a key-value database, where. For the dynamic password stored in the key-value database, if the dynamic password meets the preset destruction conditions, the dynamic password is deleted;
  • FIG. 7b a schematic diagram of the information interaction of the device control process based on the timeliness of the graphic code in the code scanning control method is provided.
  • the device terminal is a device for scanning and selling equipment, specifically:
  • the client sends a device control request with the target dynamic password to the background server.
  • the device control request may be sent by the client based on the scanning operation of the graphic code on the target device terminal. It may also be The client sends out when triggered by a malicious user through illegal means;
  • the background server After receiving the device control request, the background server triggers the key-value database to query whether there is a target dynamic password carried in the device control request;
  • the key-value database returns the query result of the dynamic password to the background server, wherein the query result may be the presence of the target dynamic password, or the target dynamic password does not exist;
  • S710 The background server sends an error prompt page to the client when the received query result does not exist;
  • the background server receives the determined query result as being present, it sends the business data used to render the door opening page to the client;
  • the client renders and displays the door opening page, where the door opening page is used to trigger the user to confirm the door opening request;
  • the background server After receiving the confirmation door opening request, the background server triggers the key-value database to query whether there is a target dynamic password corresponding to the confirmation door opening request;
  • the key-value database returns the query result of the existence of the dynamic password to the background server
  • the background server re-executes the step of issuing the graphic code information to update the graphic code displayed on the device terminal, thereby implementing the dynamic update of the graphic code displayed on the control device terminal.
  • the code scanning control method in one or more embodiments of the present specification receives a device control request sent by a client; determines whether a target dynamic password carried in the device control request meets a preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the target device terminal correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result.
  • the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client should have a certain timeliness, so that whether the client is Attacks are aimed at identifying cases where a client is illegally attacked by a malicious user, and effectively controlling them in a timely manner to avoid unnecessary losses to normal users.
  • FIG. 8 provides one or more embodiments of the present specification.
  • the flowchart of the code scanning control method is shown in FIG. 8.
  • the method in FIG. 8 can be executed by the client in FIG. 1. As shown in FIG. 8, the method includes at least the following steps:
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • the S802 receiving the feedback information sent by the background server specifically includes:
  • the code scanning control method in one or more embodiments of the present specification sends a device control request carrying a target dynamic password to a background server, so that the background server determines whether the target dynamic password meets a preset timeliness condition; and receives The feedback information sent by the background server, wherein the feedback information is generated by the background server for the timeliness judgment result of the target dynamic password.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • FIG. 9 provides one or more embodiments of the present specification.
  • the method in FIG. 9 can be executed by the device terminal in FIG. 1. As shown in FIG. 9, the method includes at least the following steps:
  • S902 Receive a control instruction sent by the background server, where the control instruction is generated by the background server with respect to the timeliness judgment result of the target dynamic password carried in the received device control request.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • the above S902 receives the control instruction sent by the background server, which specifically includes:
  • control instruction is a door opening instruction. After receiving the door opening instruction, the code selling device executes the door opening operation.
  • the code scanning control method in one or more embodiments of the present specification displays the corresponding graphic code based on the graphic code information issued by the background server, wherein the graphic code is dynamically updated under the control of the background server, and each graphic The code corresponds to a unique dynamic password; and receives a control instruction sent by the background server, wherein the control instruction is generated by the background server based on the timeliness judgment result of the target dynamic password carried in the received device control request.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • FIG. 10 provides one or more embodiments of this specification.
  • the flowchart of the method for scanning code control method is shown in FIG. 10.
  • the method in FIG. 10 can be executed by the background server in FIG. 1. As shown in FIG.
  • step S1001 Receive a device control request for a code scanning and selling device sent by a client.
  • the device control request carries a target dynamic password.
  • the code scanning and selling device may be a smart code scanning door-opening self-retrieving container.
  • step S1001 For a specific implementation manner, refer to step S201, and details are not described herein again.
  • step S1002 Determine whether the target dynamic password carried in the device control request satisfies a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target scan-sale device; one of the specific steps in step S1002 For implementation, refer to step S202, and details are not described herein again.
  • step S1003 Perform a corresponding control operation according to the timeliness determination result of the target dynamic password.
  • the specific implementation of step S1003 is referred to step S203, and details are not described herein again.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • the method further includes:
  • Step 1 determine a dynamic password according to at least two of a device identification of the target scan-selling device, an identification key corresponding to the device identification, and time stamp information;
  • Step 2 Generate graphic code information according to the determined dynamic password
  • step three the generated graphic code information is sent to the target scan code selling device, so that the target scan code selling device displays a graphic code based on the graphic code information.
  • the method further includes:
  • Adding the determined dynamic password to the dynamic password set, and removing the dynamic password from the dynamic password set when any dynamic password meets a preset destruction condition wherein the preset destruction condition includes: It is assumed that the time to live and / or dynamic password is used;
  • the above S1002 determines whether the target dynamic password carried in the device control request meets a preset timeliness condition, and specifically includes:
  • the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not meet the preset timeliness condition.
  • the method further includes:
  • the code scanning control method in one or more embodiments of the present specification receives a device control request sent by a client; determines whether a target dynamic password carried in the device control request meets a preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the target scan code selling device correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • FIG. 11 provides one or more embodiments of the present specification. Schematic diagram of the module composition of the code scanning control device. The device is used to perform the code scanning control method described in FIG. 2 to FIG. 6. As shown in FIG. 11, the device includes:
  • the request receiving module 1101 is configured to receive a device control request sent by a client, where the device control request carries a target dynamic password;
  • a password identification module 1102 configured to determine whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to a dynamically updated graphic code displayed on the target device terminal;
  • the control module 1103 is configured to execute a corresponding control operation according to a timeliness determination result for the target dynamic password.
  • control module 1103 is specifically configured to:
  • prompt information is returned to the client, so that the client prompts based on the prompt information.
  • the above device further includes a control instruction issuing module, where the control instruction issuing module is configured to:
  • the above device further includes a graphic code update module, where the graphic code update module is configured to:
  • determining a dynamic password Before receiving a device control request sent by a client, determining a dynamic password according to at least two of a device identification of a target device terminal, an identification key corresponding to the device identification, and time stamp information;
  • the above device further includes a dynamic password addition and deletion module, wherein the dynamic password addition and deletion module is configured to:
  • the dynamic password is added to the dynamic password set, and the dynamic password is removed from the dynamic password set when the dynamic password satisfies a preset destruction condition, wherein the pre- Setting the destruction conditions includes: the dynamic password reaches a preset survival time and / or the dynamic password has been used;
  • the above-mentioned password identification module 1102 is specifically configured to:
  • the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not satisfy a preset timeliness condition.
  • the graphic code update module is further configured to:
  • the graphic code update module is specifically configured to:
  • a message digest algorithm is used to determine a dynamic password according to at least two of the device identification of the target device terminal, an identification key corresponding to the device identification, and time stamp information.
  • control instruction issuing module is specifically configured to:
  • the dynamic password addition and deletion module is triggered to remove the dynamic password from the dynamic password set, and send a control instruction to the target device terminal.
  • the code scanning control device in one or more embodiments of the present specification receives a device control request sent by a client; determines whether a target dynamic password carried in the device control request satisfies a preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the target device terminal correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result.
  • the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client should have a certain timeliness, so that whether the client is Attacks are aimed at identifying cases where a client is illegally attacked by a malicious user, and effectively controlling them in a timely manner to avoid unnecessary losses to normal users.
  • FIG. 12 This is a schematic diagram of the module composition of a device terminal provided by one or more embodiments of this specification.
  • the device is configured to execute the code scanning control method described in FIG. 9.
  • the device terminal includes:
  • the graphic code display module 1201 is used to display the corresponding graphic code based on the graphic code information issued by the background server, wherein the graphic code is dynamically updated under the control of the background server, and each graphic code corresponds to a unique dynamic Password
  • the control instruction receiving module 1202 is configured to receive a control instruction sent by a background server, where the control instruction is generated by the background server based on the timeliness judgment result of the target dynamic password carried in the received device control request.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • the control instruction receiving module 1202 is specifically configured to:
  • control instruction is a door opening instruction. After receiving the door opening instruction, the code selling device executes the door opening operation.
  • the device terminal in one or more embodiments of the present specification displays the corresponding graphic code based on the graphic code information issued by the background server, wherein the graphic code is dynamically updated under the control of the background server, and each graphic code corresponds to A unique dynamic password; and receiving a control instruction sent by the background server, wherein the control instruction is generated by the background server based on the timeliness judgment result of the target dynamic password carried in the received device control request.
  • the background server controls the graphic code displayed on the device terminal to be dynamically updated. Because the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client has been attacked. In order to identify the client being illegally attacked by a malicious user, timely and effective control is performed to avoid unnecessary losses to normal users.
  • FIG. 13 provides one or more embodiments of the present specification.
  • the background server 20 is configured to receive a device control request sent by a client; determine whether a target dynamic password carried in the device control request meets a preset timeliness condition; and judge according to the timeliness of the target dynamic password. As a result, the corresponding control operation is performed;
  • the client 10 is configured to send a device control request to a background server; and receive feedback information sent by the background server to a time validity determination result of the target dynamic password;
  • the device terminal 30 is configured to display a corresponding graphic code based on the graphic code information issued by the background server.
  • the graphic code is dynamically updated, and each of the graphic codes corresponds to a unique dynamic password.
  • the code scanning control method in one or more embodiments of the present specification receives a device control request sent by a client; determines whether a target dynamic password carried in the device control request meets a preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the target device terminal correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result.
  • the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client should have a certain timeliness, so that whether the client is Attacks are aimed at identifying cases where a client is illegally attacked by a malicious user, and effectively controlling them in a timely manner to avoid unnecessary losses to normal users.
  • one or more embodiments of the present specification further provide a code scanning control device, which is configured to execute the above code scanning control method. , As shown in Figure 14.
  • the code scanning control device may have a relatively large difference due to different configurations or performance, and may include one or more processors 1401 and a memory 1402.
  • the memory 1402 may store one or more storage applications or data.
  • the memory 1402 may be a temporary storage or a persistent storage.
  • the application program stored in the memory 1402 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions in the scan control device.
  • the processor 1401 may be configured to communicate with the memory 1402, and execute a series of computer-executable instructions in the memory 1402 on the code scanning control device.
  • the code scanning control device may further include one or more power sources 1403, one or more wired or wireless network interfaces 1404, one or more input / output interfaces 1405, one or more keyboards 1406, and the like.
  • the code scanning control device includes a memory and one or more programs, wherein one or more programs are stored in the memory, and one or more programs may include one or more modules, and Each module may include a series of computer-executable instructions in a code scanning control device, and configured to be executed by one or more processors.
  • the one or more programs include the following computer-executable instructions:
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • performing the corresponding control operation according to the validity determination result for the target dynamic password includes:
  • prompt information is returned to the client, so that the client prompts based on the prompt information.
  • the computer-executable instructions when executed, further include the following computer-executable instructions:
  • the method further includes:
  • the computer-executable instructions when executed, further include the following computer-executable instructions:
  • the client Before receiving the device control request from the client, it also includes:
  • the computer-executable instructions when executed, further include the following computer-executable instructions:
  • Adding the dynamic password to a dynamic password set, and removing the dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition wherein the preset destruction condition includes: dynamic The password has reached the preset lifetime and / or a dynamic password has been used;
  • the determining whether the target dynamic password satisfies a preset timeliness condition includes:
  • the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not satisfy a preset timeliness condition.
  • the computer-executable instructions when executed, further include the following computer-executable instructions:
  • the method further includes:
  • determining the dynamic password according to at least two of a device identification of the target device terminal, an identification key corresponding to the device identification, and time stamp information includes:
  • a message digest algorithm is used to determine a dynamic password according to at least two of the device identification of the target device terminal, an identification key corresponding to the device identification, and time stamp information.
  • the sending a control instruction to the target device terminal based on the control confirmation information includes:
  • the code scanning control device in one or more embodiments of the present specification receives a device control request sent by a client; determines whether a target dynamic password carried in the device control request meets a preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the target device terminal correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result.
  • the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client should have a certain timeliness, so that whether the client is Attacks are aimed at identifying cases where a client is illegally attacked by a malicious user, and effectively controlling them in a timely manner to avoid unnecessary losses to normal users.
  • one or more embodiments of the present specification also provide a storage medium for storing computer-executable instructions, a specific implementation
  • the storage medium may be a U disk, an optical disk, a hard disk, and the like.
  • a corresponding control operation is performed according to the timeliness determination result for the target dynamic password.
  • the performing a corresponding control operation according to a timeliness determination result for the target dynamic password includes:
  • prompt information is returned to the client, so that the client prompts based on the prompt information.
  • the method further includes:
  • the client Before receiving the device control request from the client, it also includes:
  • Adding the dynamic password to a dynamic password set, and removing the dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition wherein the preset destruction condition includes: dynamic The password has reached the preset lifetime and / or a dynamic password has been used;
  • the determining whether the target dynamic password satisfies a preset timeliness condition includes:
  • the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not satisfy a preset timeliness condition.
  • the method further includes:
  • the computer-executable instructions stored in the storage medium are executed by a processor, the computer-executable instructions are based on at least two of a device identifier of a target device terminal, an identification key corresponding to the device identifier, and time stamp information, Identify dynamic passwords, including:
  • a message digest algorithm is used to determine a dynamic password according to at least two of the device identification of the target device terminal, an identification key corresponding to the device identification, and time stamp information.
  • the sending a control instruction to the target device terminal based on the control confirmation information includes:
  • the computer-executable instructions stored in the storage medium in one or more embodiments of the present specification are executed by a processor, they receive a device control request sent by a client; determine whether a target dynamic password carried in the device control request meets a preset time limit Condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal, and a corresponding control operation is performed according to the timeliness judgment result.
  • the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client should have a certain timeliness, so that whether the client is Attacks are aimed at identifying cases where a client is illegally attacked by a malicious user, and effectively controlling them in a timely manner to avoid unnecessary losses to normal users.
  • a programmable logic device Programmable Logic Device (PLD)
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • the controller may be implemented in any suitable manner, for example, the controller may take the form of a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor. , Logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers, and embedded microcontrollers. Examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, With the Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory.
  • the controller may take the form of a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor. , Logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers, and embedded microcontrollers. Examples of controllers include, but are
  • controller logic gates, switches, application-specific integrated circuits, programmable logic controllers, and embedded controllers by logic programming the method steps Microcontrollers, etc. to achieve the same function. Therefore, such a controller can be regarded as a hardware component, and a device included therein for implementing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as a structure that can be both a software module implementing the method and a hardware component.
  • the system, device, module, or unit described in the foregoing embodiments may be specifically implemented by a computer chip or entity, or a product with a certain function.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
  • one or more embodiments of the present specification may be provided as a method, a system, or a computer program product. Therefore, one or more of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, one or more of this specification may employ computer program products implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code. form.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may be provided to a processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to produce a machine, so that the instructions generated by the processor of the computer or other programmable data processing device are used to generate instructions Means for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
  • a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.
  • processors CPUs
  • input / output interfaces output interfaces
  • network interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information can be stored by any method or technology.
  • Information may be computer-readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media may be used to store information that can be accessed by computing devices.
  • computer-readable media does not include temporary computer-readable media, such as modulated data signals and carrier waves.
  • one or more embodiments of the present specification may be provided as a method, a system, or a computer program product. Therefore, one or more of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, one or more of this specification may employ computer program products implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code. form.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • program modules may also be practiced in a distributed computing environment in which tasks are performed by a remote processing device connected through a communication network.
  • program modules may be located in local and remote computer storage media, including storage devices.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

本说明书一个或多个实施例提供了一种扫码控制方法、装置及***,其中,该方法包括:接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施例中,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。

Description

一种扫码控制方法、装置及*** 技术领域
本说明书一个或多个涉及互联网技术领域,尤其涉及一种扫码控制方法、装置及***。
背景技术
目前,随着互联网技术的快速发展,智能设备终端的应用越来越广泛,例如自取式商品售卖柜,用户通过使用移动终端(如智能手机)扫描商品售卖柜上的图形码,能够向后台服务端发送设备控制请求,以实现对商品售卖柜的智能控制,具体的,后台服务端自动控制商品售卖柜执行开门操作,这样用户能够从商品售卖柜内取出自身所需购买的商品,商品售卖柜向后台服务端发送用户所购买商品信息,以使后台服务端进行支付结算。
其中,针对智能设备终端的广泛应用,给人们的日常生活带来便利性的同时,在扫码控制的过程中存在一定的安全隐患,给恶意用户提供了攻击正常用户的机会,从而将给正常用户带来一定的经济损失。具体的,针对消费类的智能设备终端,如自取式商品售卖柜、共享租赁商品等。
当前,由于现有的智能设备终端上设置的用于提供用户扫描的图形码均为静态图形码,只要恶意用户一次性获取到该静态图形码对应的URL地址和设备标识后,恶意用户可以通过非法手段触发正常用户所用的客户端向后台服务端发送携带该URL地址和设备标识的设备控制请求,后台服务端直接基于该控制请求控制与该设备标识对应的智能设备终端执行目标操作,例如,控制商品售卖柜执行开门操作,并对发出该控制请求的正常用户进行支付扣款,使得恶意用户能够实现在不需要支付费用的情况下,从商品售卖柜中取出所需的商品,而是直接从正常用户的资金账号上扣款。
由此可知,需要提供一种防攻击且安全性高的扫码控制设备终端的方法。
发明内容
本说明书一个或多个实施例的目的是提供一种扫码控制方法、装置及***,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性, 这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
为解决上述技术问题,本说明书一个或多个实施例是这样实现的:
本说明书一个或多个实施例提供了一种扫码控制方法,包括:
接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例提供了一种扫码控制方法,包括:
接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例提供了一种扫码控制装置,包括:
请求接收模块,用于接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
口令识别模块,用于判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
控制模块,用于根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例提供了一种扫码控制装置,包括:
请求接收模块,用于接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
口令识别模块,用于判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
控制模块,用于根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例提供了一种扫码控制设备,包括:处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例提供了一种扫码控制设备,包括:处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例提供了一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:
接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例提供了一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:
接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
本说明书一个或多个实施例中的扫码控制方法、装置及***,接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施例中,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
附图说明
为了更清楚地说明本说明书一个或多个实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书一个或多个中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本说明书一个或多个实施例提供的扫码控制***的应用场景示意图;
图2为本说明书一个或多个实施例提供的应用于后台服务端的扫码控制方法的第一种流程示意图;
图3为本说明书一个或多个实施例提供的应用于后台服务端的扫码控制方法的第二种流程示意图;
图4为本说明书一个或多个实施例提供的应用于后台服务端的扫码控制方法的第三种流程示意图;
图5为本说明书一个或多个实施例提供的应用于后台服务端的扫码控制方法的第四种流程示意图;
图6为本说明书一个或多个实施例提供的应用于后台服务端的扫码控制方法的第五种流程示意图;
图7a为本说明书一个或多个实施例提供的扫码控制方法的第一种信息交互示意图;
图7b为本说明书一个或多个实施例提供的扫码控制方法的第二种信息交互示意图;
图8为本说明书一个或多个实施例提供的应用于客户端的扫码控制方法的流程示意 图;
图9为本说明书一个或多个实施例提供的应用于设备终端的扫码控制方法的流程示意图;
图10为本说明书一个或多个实施例提供的针对扫码售卖设备的扫码控制方法的流程示意图;
图11为本说明书一个或多个实施例提供的设置于后台服务端的扫码控制装置的模块组成示意图;
图12为本说明书一个或多个实施例提供的设备终端的模块组成示意图;
图13为本说明书一个或多个实施例提供的扫码控制***的结构组成示意图;
图14为本说明书一个或多个实施例提供的扫码控制设备的结构示意图。
具体实施方式
为了使本技术领域的人员更好地理解本说明书一个或多个中的技术方案,下面将结合本说明书一个或多个实施例中的附图,对本说明书一个或多个实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一个或多个一部分实施例,而不是全部的实施例。基于本说明书一个或多个中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书一个或多个保护的范围。
本说明书一个或多个实施例提供了一种扫码控制方法、装置及***,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
图1为本说明书一个或多个实施例提供的扫码控制***的应用场景示意图,如图1所示,该控制***包括:后台服务端、客户端和设备终端,其中,该客户端可以是智能手机、平板电脑等移动终端,该后台服务端可以是用于对设备终端进行管理控制且具有saas服务的后台服务器,该设备终端可以是扫码售卖设备、扫码租赁产品等等,其中,扫码控制的具体过程为:
首先,客户端向后台服务端发送设备控制请求,其中,该设备控制请求中携带有目 标动态口令;
具体的,客户端可以是基于主动对设备终端上的图形码进行扫码操作而发出的设备控制请求,即属于正常主动请求控制设备终端;客户端还可以是在恶意用户通过非法手段触发下而发出的设备控制请求,即被攻击后被动请求控制设备终端;
然后,后台服务端接收到上述设备控制请求后,判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件;
具体的,针对客户端基于对设备终端上的图形码进行扫码操作而发出的设备控制请求的情况,设备控制请求中携带的目标动态口令是有效的;由于设备终端上显示的图形码对应的动态口令是动态更新的,恶意用户从获取动态口令再到触发正常用户向后台服务端发出携带该动态口令的设备控制请求的过程需要一定时间,因此,针对客户端在恶意用户通过非法手段触发下而发出的设备控制请求的情况,设备控制请求中携带的目标动态口令是无效的;
最后,后台服务端根据针对目标动态口令的时效性判断结果执行相应的控制操作;
具体的,当确定出目标动态口令有效时,说明客户端属于正常主动向后台服务端请求控制设备终端,此时,后台服务端需要正常响应该设备控制请求,控制设备终端执行相应的控制动作;当确定出目标动态口令无效时,说明客户端属于被攻击而向后台服务端请求控制设备终端,此时,后台服务端需要向客户端返回提示信息,从而实现对恶意用户的非法攻击行为进行有效控制,避免给正常用户带来不必要的损失。
图2为本说明书一个或多个实施例提供的扫码控制方法的第一种流程示意图,图2中的方法能够由图1中的后台服务端执行,如图2所示,该方法至少包括以下步骤:
S201,接收客户端发送的设备控制请求,其中,该设备控制请求中携带有目标动态口令;
具体的,后台服务端接收到的设备控制请求可以是客户端基于主动对设备终端上的图形码进行扫码操作而发出的,即属于客户端正常主动请求控制设备终端;还可以是客户端在恶意用户通过非法手段触发下而发出的,即属于客户端被攻击后被动请求控制设备终端;
S202,判断设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应,即在扫描图形码验证阶段,确定目标动态口令的时效性,以识别是否存在用户被攻击的情形,针对设备 终端为扫码售卖设备的情况,该扫描图形码验证阶段即为用户使用客户端扫描图形码请求打开开门页面的过程;
具体的,针对客户端基于对设备终端上的图形码进行扫码操作而发出的设备控制请求的情况,设备控制请求中携带的目标动态口令是满足预设时效性条件的,即目标动态口令对应的图形码未失效,此时设备终端上显示的图形码对应的动态口令即为该目标动态口令;
针对客户端在恶意用户通过非法手段触发下而发出的设备控制请求的情况,设备控制请求中携带的目标动态口令是不满足预设时效性条件的,即目标动态口令对应的图形码已失效,此时设备终端上显示的图形码对应的动态口令不是该目标动态口令;
S203,根据针对目标动态口令的时效性判断结果执行相应的控制操作,其中,该判断结果可以是目标动态口令满足预设时效性条件,还可以是目标动态口令不满足预设时效性条件;
具体的,若目标动态口令满足预设时效性条件,说明客户端属于正常主动向后台服务端请求控制设备终端,此时,后台服务端需要正常响应该设备控制请求,控制设备终端执行相应的控制动作;若目标动态口令不满足预设时效性条件,说明客户端属于被攻击而向后台服务端请求控制设备终端,此时,后台服务端需要向客户端返回提示信息,例如,触发客户端展示报错页面。
本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
其中,如图3所示,上述S203根据针对目标动态口令的时效性判断结果执行相应的控制操作,具体包括:
若判断结果为是,则执行S2031,向客户端返回业务页面,以使该客户端基于该业务页面向后台服务端请求控制目标设备终端;
具体的,针对判断结果为是的情况,即目标动态口令满足预设时效性条件,说明客户端属于正常主动向后台服务端请求控制设备终端,此时,后台服务端需要正常响应该设备控制请求,即后台服务端可以直接向设备终端发送控制指令,例如,下发开门指令;为了进一步提高设备控制的准确度,还可以先向客户端返回用于渲染业务页面的业务数 据,以使用户基于客户端展示的业务页面向客户端发送确认控制信息,对应的,后台服务端接收到该确认控制信息后,控制设备终端执行相应的控制动作;
若判断结果为否,则执行S2032,向客户端返回第一提示信息,以使该客户端基于该第一提示信息进行提示;
具体的,针对判断结果为否的情况,即目标动态口令不满足预设时效性条件,说明客户端属于被攻击而向后台服务端请求控制设备终端,此时,后台服务端需要向客户端返回第一提示信息,以提示用户当前存在被攻击的可能性,另外,还可以在客户端显示的第一提示信息的展示页面上,提供确认提交设备控制请求的选项,例如,提供手动提交开门请求的选项,以防止因客户端扫码延时而出现上传的目标动态口令失效的情况下导致无法交易的问题。
进一步的,为了进一步提高设备控制的准确度,还可以先向客户端返回用于渲染业务页面的业务数据,以使用户基于客户端展示的业务页面向客户端发送确认控制信息,基于此,如图4所示,在上述S2031向客户端返回业务页面之后,还包括:
S2033,接收客户端针对展示的业务页面发送的控制确认信息,其中,针对设备终端为扫码售卖设备的情况,该业务页面可以是开门确认页面,当客户端检测到用户在开门确认页面上点击开门选项后,向后台服务端发送确认开门信息,针对设备终端为扫码租赁产品的情况,该业务页面还可以是开锁确认页面,当客户端检测到用户在开锁确认页面上点击开锁选项后,向后台服务端发送确认开锁信息;
S2034,基于接收到的控制确认信息向目标设备终端发送控制指令,以使该目标设备终端执行相应的控制动作,其中,该控制指令可以是开门指令,还可以是开锁指令,对应的,该目标设备终端执行的控制动作可以是开门操作,还可以是开锁操作等等。
其中,后台服务端需要按照预设规则生成包含动态口令的图形码信息,并将该图形码信息下发给对应的设备终端,以使设备终端显示于该图形码信息对应的图形码,这样能够保证设备终端上显示的用于提供客户端扫描的图形码是动态更新的,从而保证客户端上传的设备控制请求中携带的目标动态口令是动态变化的,以便后续基于对目标动态口令的时效性判断来确定执行何种控制操作,具体的,如图5所示,在上述S201接收客户端发送的设备控制请求之前,还包括:
S204,根据目标设备终端的设备标识、与该设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令,其中,该设备标识可以是预先为每个设备终端分配的 唯一性标识,该标识密钥可以是按照预设方式基于设备标识确定的,该时间戳信息可以是确定动态口令时的当前时间戳,具体的,可以将该动态口令存储于key-value数据库(即redis)中;
S205,根据确定出的动态口令,生成图形码信息,其中,该图形码信息可以是预设URL地址与动态口令拼接得到的,即可以将动态口令添加至URL地址的尾端,例如,该URL地址可以是https://alipay.com/detail.htm;
S206,将生成的图形码信息下发给目标设备终端,以使该目标设备终端基于该图形码信息显示相应的图形码,其中,由于每次生成的动态口令各不相同,因此,图形码信息各不相同,以使设备终端展示的图形码是动态更新的,该图形码可以是二维码,还可以是条形码;
具体的,为了降低设备终端的制造成本,可以以电子墨水标签屏幕作为图形码显示屏,例如,设备终端上设置的用于显示图形码的显示屏可复用。
其中,客户端在扫描目标设备终端上显示的图形码时,能够解析出该图形码对应的目标动态口令,再基于该目标动态口令生成设备控制请求,以及向后台服务端发送该设备控制请求,以使该后台服务端基于该设备控制请求对目标设备终端进行控制。
进一步的,为了提高目标动态口令的时效性的判断效率和判断准确度,可以将失效的动态口令自动删除,进而在接收到设备控制请求后,判断是否存在该设备控制请求中携带的目标动态口令,从而确定该目标动态口令是否满足预设时效性条件,基于此,如图6所示,在上述S206将生成的图形码信息下发给目标设备终端之后,还包括:
S207,将确定出的动态口令添加至动态口令集合中,以及当任一动态口令满足预设销毁条件时,将该动态口令从动态口令集合中移除,其中,该预设销毁条件包括:动态口令达到预设存活时间和/或动态口令已使用,具体的,动态口令达到预设存活时间是指动态口令的存货时间大于预设时效阈值,即动态口令过期销毁,动态口令已使用是指已针对该动态口令进行设备终端控制,即动态口令已使用销毁,其中,该动态口令集合包括至少一个有效的动态口令,该动态口令集合设置于key-value数据库(即redis)中;
对应的,上述S202判断设备控制请求中携带的目标动态口令是否满足预设时效性条件,具体包括:
S2021,判断动态口令集合中是否存在设备控制请求中携带的目标动态口令;
若判断结果为是,则确定目标动态口令满足预设时效性条件,并执行上述S2031向 客户端返回业务页面,以使该客户端基于该业务页面向后台服务端请求控制目标设备终端;
若判断结果为否,则确定目标动态口令不满足预设时效性条件,并执行上述S2032向客户端返回第一提示信息,以使该客户端基于该第一提示信息进行提示。
具体的,当将某一动态口令从动态口令集合中移除后,说明该动态口令对应的图形码变为失效,需要更新对应的设备终端上显示的图像码,基于此,上述S207将该动态口令从动态口令集合中移除之后,还包括:
生成新的动态口令,基于该新的动态口令更新对应的目标设备终端上显示的图形码;
具体的,生成新的动态口令的过程,参见上述步骤S204,其中,生成新的动态口令后,根据该动态口令,生成图形码信息,将该图形码信息下发给对应的目标设备终端,以更新该目标设备终端上显示的图形码。
其中,上述S204根据目标设备终端的设备标识、与该设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令,具体包括:
利用消息摘要算法根据目标设备终端的设备标识、与该设备标识对应的标识密钥以及时间戳信息的至少两个,确定动态口令,其中,该消息摘要算法可以是md5加密算法,具体的,利用md5加密算法对设备id、与该设备id对应的唯一key以及时间戳信息中至少两个进行md5加密,生成sign字段。
其中,上述S2034基于接收到的控制确认信息向目标设备终端发送控制指令,具体包括:
在动态口令集合中,查找是否存在与接收到的控制确认信息对应的动态口令,具体的,在接收到客户端针对业务页面发送的控制确认信息后,再次判断动态集合中是否存在对应的动态口令;
若是,则将该动态口令从上述动态口令集合中移除,以及向目标设备终端发送控制指令;
具体的,在接收到客户端针对业务页面发送的控制确认信息后,说明后台服务端需要对设备终端执行相应的控制操作,对应的,该动态口令满足预设销毁条件,销毁该动态口令后,针对展示包含该动态口令的图形码的目标设备终端,生成新的动态口令,基于该新的动态口令更新该目标设备终端上显示的图形码;
若否,则向目标设备终端发送控制指令,或者向客户端返回第二提示信息,以提示用户是否重新向后台服务端发送设备控制请求;
具体的,由于在扫描图形码验证阶段验证通过后,即设备控制请求中携带的目标动态口令满足预设时效性条件,如果客户端在预设时间内针对业务页面向后台服务端发送的控制确认信息,本次设备控制请求对应的目标动态口令应该是有效的,即在动态口令集合中存在目标动态口令,若在动态口令集合中不存在目标动态口令,则说明客户端未在预设时间内针对业务页面向后台服务端发送的控制确认信息。
在一个具体实施例中,上述扫码控制方法主要包括:图形码信息下发过程和基于图形码时效性进行设备控制的过程,如图7a所示,给出了扫码控制方法中图形码信息下发过程的信息交互示意图,具体为:
S701,后台服务端获取目标设备终端的设备标识;
S702,后台服务端根据目标设备终端的设备标识、与该设备标识对应的标识密钥以及时间戳信息,生成动态口令,其中,可以是在确定目标设备终端上显示的图形码过期后,生成新的动态口令,以更新目标设备终端上显示的图形码,还可以是在确定客户端已基于图形码对于的动态口令发出设备控制请求后,生成新的动态口令,以更新目标设备终端上显示的图形码;
S703,后台服务端根据生成的动态口令和预设URL地址,生成图形码信息;
S704,后台服务端向目标设备终端发送图形码信息;
S705,目标设备终端在接收到图形码信息后,在显示屏上基于该图形码信息展示图形码;
S706,后台服务端在key-value数据库中存储生成的动态口令,其中。针对存储于key-value数据库中的动态口令,若该动态口令满足预设销毁条件,则删除该动态口令;
如图7b所示,给出了扫码控制方法中基于图形码时效性进行设备控制过程的信息交互示意图,针对设备终端为扫码售卖设备的情况,具体为:
S707,客户端向后台服务端发送携带有目标动态口令的设备控制请求,其中,该设备控制请求可以是客户端基于主动对目标设备终端上的图形码进行扫码操作而发出的,还可以是客户端在恶意用户通过非法手段触发下而发出的;
S708,后台服务端在接收到设备控制请求后,触发key-value数据库查询是否存在设备控制请求中携带的目标动态口令;
S709,key-value数据库向后台服务端返回动态口令的查询结果,其中,该查询结果可以是存在目标动态口令,还可以是不存在目标动态口令;
S710,后台服务端在接收到的查询结果为不存在时,向客户端发送报错提示页面;
S711,后台服务端在接收到的确定查询结果为存在时,则向客户端发送用于渲染开门页面的业务数据;
S712,客户端渲染并展示开门页面,其中,该开门页面用于触发用户进行开门请求确认;
S713,客户端若监测到用户点击确认开门选项后,向后台服务端发送确认开门请求;
S714,后台服务端在接收到确认开门请求后,触发key-value数据库查询是否存在与该确认开门请求对应的目标动态口令;
S715,key-value数据库若确定查询结果为存在,则销毁目标动态口令;
S716,key-value数据库向后台服务端返回动态口令存在的查询结果;
S717,后台服务端在接收到动态口令存在的查询结果后,向设备终端下发开门指令;以及,
S718,后台服务端重新执行图形码信息下发步骤,以更新设备终端上显示的图形码,从而实现控制设备终端上显示的图形码动态更新。
本说明书一个或多个实施例中的扫码控制方法,接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施例中,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
对应上述图2至图6描述的扫码控制方法,基于相同的技术构思,本说明书一 个或多个实施例还提供了一种扫码控制方法,图8为本说明书一个或多个实施例提供的扫码控制方法的流程示意图,图8中的方法能够由图1中的客户端执行,如图8所示,该方法至少包括以下步骤:
S801,向后台服务端发送携带有目标动态口令的设备控制请求,以使后台服务端判断该目标动态口令是否满足预设时效性条件;
S802,接收后台服务端发送的反馈信息,其中,该反馈信息是后台服务端针对目标动态口令的时效性判断结果生成的。
本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
其中,上述S802接收后台服务端发送的反馈信息,具体包括:
接收后台服务端确定目标动态口令满足预设时效性条件时所发送的业务页面,并基于该业务页面向后台服务端请求控制目标设备终端;
接收后台服务端确定目标动态口令不满足预设时效性条件时所发送的提示信息,并基于该提示信息进行提示。
本说明书一个或多个实施例中的扫码控制方法,向后台服务端发送携带有目标动态口令的设备控制请求,以使后台服务端判断该目标动态口令是否满足预设时效性条件;以及接收后台服务端发送的反馈信息,其中,该反馈信息是后台服务端针对目标动态口令的时效性判断结果生成的。本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
需要说明的是,本说明书中该实施例与本说明书中上一实施例基于同一发明构思,因此该实施例的具体实施可以参见前述扫码控制方法的实施,重复之处不再赘述。
对应上述图2至图6描述的扫码控制方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种扫码控制方法,图9为本说明书一个或多个实施例提供的 扫码控制方法的流程示意图,图9中的方法能够由图1中的设备终端执行,如图9所示,该方法至少包括以下步骤:
S901,基于后台服务端下发的图形码信息展示相应的图形码,其中,该图形码是在后台服务端控制下动态更新的,每个图形码对应于一个唯一的动态口令;
S902,接收后台服务端发送的控制指令,其中,该控制指令是后台服务端针对接收到的设备控制请求中携带的目标动态口令的时效性判断结果生成的。
本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
其中,上述S902接收后台服务端发送的控制指令,具体包括:
接收后台服务端确定目标动态口令满足预设时效性条件时所发送的控制指令,以及基于该控制指令执行相应的控制动作,其中,针对扫码售卖设备而言,该控制指令为开门指令,扫码售卖设备接收到该开门指令后,执行开门操作。
本说明书一个或多个实施例中的扫码控制方法,基于后台服务端下发的图形码信息展示相应的图形码,其中,该图形码是在后台服务端控制下动态更新的,每个图形码对应于一个唯一的动态口令;以及接收后台服务端发送的控制指令,其中,该控制指令是后台服务端针对接收到的设备控制请求中携带的目标动态口令的时效性判断结果生成的。本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
需要说明的是,本说明书中该实施例与本说明书中上一实施例基于同一发明构思,因此该实施例的具体实施可以参见前述扫码控制方法的实施,重复之处不再赘述。
对应上述图2至图6描述的扫码控制方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种扫码控制方法,图10为本说明书一个或多个实施例提供的扫码控制方法的流程示意图,图10中的方法能够由图1中的后台服务端执行,如图 10所示,针对设备终端为扫码售卖设备的情况,该方法至少包括以下步骤:
S1001,接收客户端发送的针对扫码售卖设备的设备控制请求,其中,该设备控制请求中携带有目标动态口令,该扫码售卖设备可以是智能扫码开门自取式货柜;其中,步骤S1001的具体实施方式参见步骤S201,这里不再赘述。
S1002,判断设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;其中,步骤S1002的具体实施方式参见步骤S202,这里不再赘述。
S1003,根据针对目标动态口令的时效性判断结果执行相应的控制操作;其中,步骤S1003的具体实施方式参见步骤S203,这里不再赘述。
本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
其中,在S1001接收客户端发送的针对扫码售卖设备的设备控制请求之前,还包括:
步骤一,根据目标扫码售卖设备的设备标识、与该设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令;
步骤二,根据确定出的动态口令,生成图形码信息;
步骤三,将生成的图形码信息下发给目标扫码售卖设备,以使该目标扫码售卖设备基于该图形码信息显示图形码。
其中,上述步骤一根据目标扫码售卖设备的设备标识、与该设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令之后,还包括:
将确定出的动态口令添加至动态口令集合,以及当任一动态口令满足预设销毁条件时,将该动态口令从动态口令集合中移除,其中,该预设销毁条件包括:动态口令达到预设存活时间和/或动态口令已使用;
对应的,上述S1002判断设备控制请求中携带的目标动态口令是否满足预设时效性条件,具体包括:
若动态口令集合中存在目标动态口令,则确定该目标动态口令满足预设时效性条件;
若动态口令集合中不存在目标动态口令,则确定该目标动态口令不满足预设时效性条件。
其中,上述将动态口令从动态口令集合中移除之后,还包括:
生成新的动态口令,基于该新的动态口令更新目标扫码售卖设备上显示的图形码。
本说明书一个或多个实施例中的扫码控制方法,接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
需要说明的是,本说明书中该实施例与本说明书中上一实施例基于同一发明构思,因此该实施例的具体实施可以参见前述扫码控制方法的实施,重复之处不再赘述。
对应上述图2至图6描述的扫码控制方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种扫码控制装置,图11为本说明书一个或多个实施例提供的扫码控制装置的模块组成示意图,该装置用于执行图2至图6描述的扫码控制方法,如图11所示,该装置包括:
请求接收模块1101,用于接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
口令识别模块1102,用于判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
控制模块1103,用于根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
可选地,上述控制模块1103,具体用于:
若判断结果为是,则向所述客户端返回业务页面,以使所述客户端基于所述业务页面向后台服务端请求控制所述目标设备终端;
若判断结果为否,则向所述客户端返回提示信息,以使所述客户端基于所述提示信息进行提示。
可选地,上述装置还包括控制指令下发模块,其中,该控制指令下发模块,用于:
在向所述客户端返回业务页面之后,接收所述客户端针对所述业务页面发送的控制确认信息;
基于所述控制确认信息向所述目标设备终端发送控制指令,以使所述目标设备终端执行相应的控制动作。
可选地,上述装置还包括图形码更新模块,其中,该图形码更新模块,用于:
在接收客户端发送的设备控制请求之前,根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令;
根据确定出的所述动态口令,生成图形码信息;
将所述图形码信息下发给所述目标设备终端,以使所述目标设备终端基于所述图形码信息显示图形码。
可选地,上述装置还包括动态口令增删模块,其中,该动态口令增删模块,用于:
在确定动态口令之后,将所述动态口令添加至动态口令集合,以及当所述动态口令满足预设销毁条件时,将所述动态口令从所述动态口令集合中移除,其中,所述预设销毁条件包括:动态口令达到预设存活时间和/或动态口令已使用;
对应的,上述口令识别模块1102,具体用于:
若所述动态口令集合中存在所述目标动态口令,则确定所述目标动态口令满足预设时效性条件;
若所述动态口令集合中不存在所述目标动态口令,则确定所述目标动态口令不满足预设时效性条件。
可选地,上述图形码更新模块,还用于:
将所述动态口令从所述动态口令集合中移除之后,生成新的动态口令,基于所述新的动态口令更新所述目标设备终端上显示的图形码。
可选地,上述图形码更新模块,具体用于:
利用消息摘要算法根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令。
可选地,上述控制指令下发模块,具体用于:
在动态口令集合中,查找是否存在与所述控制确认信息对应的动态口令;
若是,则触发动态口令增删模块将所述动态口令从所述动态口令集合中移除,以及向目标设备终端发送控制指令。
本说明书一个或多个实施例中的扫码控制装置,接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施例中,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
对应上述图2至图6描述的扫码控制方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种设备终端,其中,该终端设备可以是扫码售卖设备,图12为本说明书一个或多个实施例提供的设备终端的模块组成示意图,该装置用于执行图9描述的扫码控制方法,如图12所示,该设备终端包括:
图形码展示模块1201,用于基于后台服务端下发的图形码信息展示相应的图形码,其中,该图形码是在后台服务端控制下动态更新的,每个图形码对应于一个唯一的动态口令;
控制指令接收模块1202,用于接收后台服务端发送的控制指令,其中,该控制指令是后台服务端针对接收到的设备控制请求中携带的目标动态口令的时效性判断结果生成的。
本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应 具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
其中,上述控制指令接收模块1202,具体用于:
接收后台服务端确定目标动态口令满足预设时效性条件时所发送的控制指令,以及基于该控制指令执行相应的控制动作,其中,针对扫码售卖设备而言,该控制指令为开门指令,扫码售卖设备接收到该开门指令后,执行开门操作。
本说明书一个或多个实施例中的设备终端,基于后台服务端下发的图形码信息展示相应的图形码,其中,该图形码是在后台服务端控制下动态更新的,每个图形码对应于一个唯一的动态口令;以及接收后台服务端发送的控制指令,其中,该控制指令是后台服务端针对接收到的设备控制请求中携带的目标动态口令的时效性判断结果生成的。本说明书一个或多个实施例中,通过后台服务端控制设备终端上显示的图形码动态更新,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
需要说明的是,本说明书中该实施例与本说明书中上一实施例基于同一发明构思,因此该实施例的具体实施可以参见前述扫码控制方法的实施,重复之处不再赘述。
对应上述图2至图6描述的扫码控制方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种扫码控制***,图13为本说明书一个或多个实施例提供的设备终端的模块组成示意图,该装置用于执行图2至图6描述的扫码控制方法,如图13所示,该设备终端包括:后台服务端20、客户端10和设备终端30;
其中,上述后台服务端20,用于接收客户端发送的设备控制请求;判断所述设备控制请求中携带的目标动态口令是否满足预设时效性条件;根据针对所述目标动态口令的时效性判断结果执行相应的控制操作;
上述客户端10,用于向后台服务端发送设备控制请求;以及接收所述后台服务端针对所述目标动态口令的时效性判断结果发送的反馈信息;
上述设备终端30,用于基于后台服务端下发的图形码信息展示相应的图形码,其中,所述图形码是动态更新的,每个所述图形码对应于一个唯一的动态口令;以及接收所述后台服务端针对所述目标动态口令的时效性判断结果发送的控制指令。
本说明书一个或多个实施例中的扫码控制方法,接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施例中,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
进一步地,对应上述图2至图6所示的方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种扫码控制设备,该设备用于执行上述的扫码控制方法,如图14所示。
扫码控制设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器1401和存储器1402,存储器1402中可以存储有一个或一个以上存储应用程序或数据。其中,存储器1402可以是短暂存储或持久存储。存储在存储器1402的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对扫码控制设备中的一系列计算机可执行指令。更进一步地,处理器1401可以设置为与存储器1402通信,在扫码控制设备上执行存储器1402中的一系列计算机可执行指令。扫码控制设备还可以包括一个或一个以上电源1403,一个或一个以上有线或无线网络接口1404,一个或一个以上输入输出接口1405,一个或一个以上键盘1406等。
在一个具体的实施例中,扫码控制设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对扫码控制设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:
接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
可选地,计算机可执行指令在被执行时,所述根据针对所述目标动态口令的时 效性判断结果执行相应的控制操作,包括:
若判断结果为是,则向所述客户端返回业务页面,以使所述客户端基于所述业务页面向后台服务端请求控制所述目标设备终端;
若判断结果为否,则向所述客户端返回提示信息,以使所述客户端基于所述提示信息进行提示。
可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:
在向所述客户端返回业务页面之后,还包括:
接收所述客户端针对所述业务页面发送的控制确认信息;
基于所述控制确认信息向所述目标设备终端发送控制指令,以使所述目标设备终端执行相应的控制动作。
可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:
在接收客户端发送的设备控制请求之前,还包括:
根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令;
根据确定出的所述动态口令,生成图形码信息;
将所述图形码信息下发给所述目标设备终端,以使所述目标设备终端基于所述图形码信息显示图形码。
可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:
在确定动态口令之后,还包括:
将所述动态口令添加至动态口令集合,以及当所述动态口令满足预设销毁条件时,将所述动态口令从所述动态口令集合中移除,其中,所述预设销毁条件包括:动态口令达到预设存活时间和/或动态口令已使用;
所述判断所述目标动态口令是否满足预设时效性条件,包括:
若所述动态口令集合中存在所述目标动态口令,则确定所述目标动态口令满足 预设时效性条件;
若所述动态口令集合中不存在所述目标动态口令,则确定所述目标动态口令不满足预设时效性条件。
可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:
所述将所述动态口令从所述动态口令集合中移除之后,还包括:
生成新的动态口令,基于所述新的动态口令更新所述目标设备终端上显示的图形码。
可选地,计算机可执行指令在被执行时,所述根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令,包括:
利用消息摘要算法根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令。
可选地,计算机可执行指令在被执行时,所述基于所述控制确认信息向所述目标设备终端发送控制指令,包括:
在动态口令集合中,查找是否存在与所述控制确认信息对应的动态口令;
若是,则将所述动态口令从所述动态口令集合中移除,以及向目标设备终端发送控制指令。
本说明书一个或多个实施例中的扫码控制设备,接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施例中,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
进一步地,对应上述图2至图6所示的方法,基于相同的技术构思,本说明书一个或多个实施例还提供了一种存储介质,用于存储计算机可执行指令,一种具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:
接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据针对所述目标动态口令的时效性判断结果执行相应的控制操作,包括:
若判断结果为是,则向所述客户端返回业务页面,以使所述客户端基于所述业务页面向后台服务端请求控制所述目标设备终端;
若判断结果为否,则向所述客户端返回提示信息,以使所述客户端基于所述提示信息进行提示。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:
在向所述客户端返回业务页面之后,还包括:
接收所述客户端针对所述业务页面发送的控制确认信息;
基于所述控制确认信息向所述目标设备终端发送控制指令,以使所述目标设备终端执行相应的控制动作。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:
在接收客户端发送的设备控制请求之前,还包括:
根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令;
根据确定出的所述动态口令,生成图形码信息;
将所述图形码信息下发给所述目标设备终端,以使所述目标设备终端基于所述图形码信息显示图形码。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:
在确定动态口令之后,还包括:
将所述动态口令添加至动态口令集合,以及当所述动态口令满足预设销毁条件时,将所述动态口令从所述动态口令集合中移除,其中,所述预设销毁条件包括:动态口令达到预设存活时间和/或动态口令已使用;
所述判断所述目标动态口令是否满足预设时效性条件,包括:
若所述动态口令集合中存在所述目标动态口令,则确定所述目标动态口令满足预设时效性条件;
若所述动态口令集合中不存在所述目标动态口令,则确定所述目标动态口令不满足预设时效性条件。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:
所述将所述动态口令从所述动态口令集合中移除之后,还包括:
生成新的动态口令,基于所述新的动态口令更新所述目标设备终端上显示的图形码。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令,包括:
利用消息摘要算法根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述基于所述控制确认信息向所述目标设备终端发送控制指令,包括:
在动态口令集合中,查找是否存在与所述控制确认信息对应的动态口令;
若是,则将所述动态口令从所述动态口令集合中移除,以及向目标设备终端发送控制指令。
本说明书一个或多个实施例中的存储介质存储的计算机可执行指令在被处理器执行时,接收客户端发送的设备控制请求;判断该设备控制请求中携带的目标动态口令是否满足预设时效性条件,其中,该目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;根据时效性判断结果执行相应的控制操作。本说明书一个或多个实施 例中,由于设备终端上显示的图形码是动态变化的,以使客户端上传的动态口令应具有一定时效性,这样能够借助动态口令的时效性识别客户端是否被攻击,针对识别出客户端被恶意用户非法攻击的情况,及时进行有效控制,避免给正常用户带来不必要的损失。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字***“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HD Cal、JHDL(Java Hardware Description Language)、Lava、Lola、My HDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而 对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的***、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本说明书一个或多个的实施例可提供为方法、***、或计算机程序产品。因此,本说明书一个或多个可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书一个或多个是参照根据本说明书一个或多个实施例的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或 方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本说明书一个或多个的实施例可提供为方法、***或计算机程序产品。因此,本说明书一个或多个可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书一个或多个可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书一个或多个,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行 任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于***实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本说明书一个或多个的实施例而已,并不用于限制本说明书一个或多个。对于本领域技术人员来说,本说明书一个或多个可以有各种更改和变化。凡在本说明书一个或多个的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书一个或多个的权利要求范围之内。

Claims (23)

  1. 一种扫码控制方法,其特征在于,包括:
    接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
    根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
  2. 根据权利要求1所述的方法,其特征在于,所述根据针对所述目标动态口令的时效性判断结果执行相应的控制操作,包括:
    若判断结果为是,则向所述客户端返回业务页面,以使所述客户端基于所述业务页面向后台服务端请求控制所述目标设备终端;
    若判断结果为否,则向所述客户端返回提示信息,以使所述客户端基于所述提示信息进行提示。
  3. 根据权利要求2所述的方法,其特征在于,在向所述客户端返回业务页面之后,还包括:
    接收所述客户端针对所述业务页面发送的控制确认信息;
    基于所述控制确认信息向所述目标设备终端发送控制指令,以使所述目标设备终端执行相应的控制动作。
  4. 根据权利要求1所述的方法,其特征在于,在接收客户端发送的设备控制请求之前,还包括:
    根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令;
    根据确定出的所述动态口令,生成图形码信息;
    将所述图形码信息下发给所述目标设备终端,以使所述目标设备终端基于所述图形码信息显示图形码。
  5. 根据权利要求4所述的方法,其特征在于,在确定动态口令之后,还包括:
    将所述动态口令添加至动态口令集合,以及当所述动态口令满足预设销毁条件时,将所述动态口令从所述动态口令集合中移除,其中,所述预设销毁条件包括:动态口令达到预设存活时间和/或动态口令已使用;
    所述判断所述目标动态口令是否满足预设时效性条件,包括:
    若所述动态口令集合中存在所述目标动态口令,则确定所述目标动态口令满足预设时效性条件;
    若所述动态口令集合中不存在所述目标动态口令,则确定所述目标动态口令不满足预设时效性条件。
  6. 根据权利要求5所述的方法,其特征在于,所述将所述动态口令从所述动态口令集合中移除之后,还包括:
    生成新的动态口令,基于所述新的动态口令更新所述目标设备终端上显示的图形码。
  7. 根据权利要求4所述的方法,其特征在于,所述根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令,包括:
    利用消息摘要算法根据目标设备终端的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令。
  8. 根据权利要求3所述的方法,其特征在于,所述基于所述控制确认信息向所述目标设备终端发送控制指令,包括:
    在动态口令集合中,查找是否存在与所述控制确认信息对应的动态口令;
    若是,则将所述动态口令从所述动态口令集合中移除,以及向目标设备终端发送控制指令。
  9. 一种扫码控制方法,其特征在于,包括:
    向后台服务端发送携带有目标动态口令的设备控制请求,以使所述后台服务端判断所述目标动态口令是否满足预设时效性条件;
    接收所述后台服务端发送的反馈信息,其中,所述反馈信息是所述后台服务端针对所述目标动态口令的时效性判断结果生成的。
  10. 根据权利要求9所述的方法,其特征在于,所述接收所述后台服务端发送的反馈信息,包括:
    接收所述后台服务端确定所述目标动态口令满足预设时效性条件时所发送的业务页面,并基于所述业务页面向所述后台服务端请求控制目标设备终端;
    接收所述后台服务端确定所述目标动态口令不满足预设时效性条件时所发送的提示信息,并基于所述提示信息进行提示。
  11. 一种扫码控制方法,其特征在于,包括:
    基于后台服务端下发的图形码信息展示相应的图形码,其中,所述图形码是动态更新的,每个所述图形码对应于一个唯一的动态口令;
    接收所述后台服务端发送的控制指令,其中,所述控制指令是所述后台服务端针对接收到的设备控制请求中携带的目标动态口令的时效性判断结果生成的。
  12. 根据权利要求11所述的方法,其特征在于,所述接收所述后台服务端发送的控制指令,包括:
    接收所述后台服务端确定所述目标动态口令满足预设时效性条件时所发送的控制指令,以及基于所述控制指令执行相应的控制动作。
  13. 一种扫码控制方法,其特征在于,包括:
    接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
    根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
  14. 根据权利要求13所述的方法,其特征在于,在接收客户端发送的针对扫码售卖设备的设备控制请求之前,还包括:
    根据目标扫码售卖设备的设备标识、与所述设备标识对应的标识密钥以及时间戳信息中的至少两个,确定动态口令;
    根据确定出的所述动态口令,生成图形码信息;
    将所述图形码信息下发给所述目标扫码售卖设备,以使所述目标扫码售卖设备基于所述图形码信息显示图形码。
  15. 根据权利要求14所述的方法,其特征在于,在确定动态口令之后,还包括:
    将所述动态口令添加至动态口令集合,以及当所述动态口令满足预设销毁条件时,将所述动态口令从所述动态口令集合中移除,其中,所述预设销毁条件包括:动态口令达到预设存活时间和/或动态口令已使用;
    所述判断所述目标动态口令是否满足预设时效性条件,包括:
    若所述动态口令集合中存在所述目标动态口令,则确定所述目标动态口令满足预设时效性条件;
    若所述动态口令集合中不存在所述目标动态口令,则确定所述目标动态口令不满足预设时效性条件。
  16. 根据权利要求15所述的方法,其特征在于,所述将所述动态口令从所述动态口令集合中移除之后,还包括:
    生成新的动态口令,基于所述新的动态口令更新所述目标扫码售卖设备上显示的图形码。
  17. 一种扫码控制装置,其特征在于,包括:
    请求接收模块,用于接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    口令识别模块,用于判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
    控制模块,用于根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
  18. 一种扫码控制装置,其特征在于,包括:
    请求接收模块,用于接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    口令识别模块,用于判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
    控制模块,用于根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
  19. 一种扫码控制***,其特征在于,包括:后台服务端、客户端和设备终端;
    其中,所述后台服务端,用于接收客户端发送的设备控制请求;判断所述设备控制请求中携带的目标动态口令是否满足预设时效性条件;根据针对所述目标动态口令的时效性判断结果执行相应的控制操作;
    所述客户端,用于向后台服务端发送设备控制请求;以及接收所述后台服务端针对所述目标动态口令的时效性判断结果发送的反馈信息;
    所述设备终端,用于基于后台服务端下发的图形码信息展示相应的图形码,其中,所述图形码是动态更新的,每个所述图形码对应于一个唯一的动态口令;以及接收所述后台服务端针对所述目标动态口令的时效性判断结果发送的控制指令。
  20. 一种扫码控制设备,其特征在于,包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
    根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
  21. 一种扫码控制设备,其特征在于,包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理 器:
    接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
    根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
  22. 一种存储介质,用于存储计算机可执行指令,其特征在于,所述可执行指令在被执行时实现以下流程:
    接收客户端发送的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标设备终端上显示的动态更新的图形码一一对应;
    根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
  23. 一种存储介质,用于存储计算机可执行指令,其特征在于,所述可执行指令在被执行时实现以下流程:
    接收客户端发送的针对扫码售卖设备的设备控制请求,其中,所述设备控制请求中携带有目标动态口令;
    判断所述目标动态口令是否满足预设时效性条件,其中,所述目标动态口令与目标扫码售卖设备上显示的动态更新的图形码一一对应;
    根据针对所述目标动态口令的时效性判断结果执行相应的控制操作。
PCT/CN2019/098999 2018-09-13 2019-08-02 一种扫码控制方法、装置及*** WO2020052371A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811066827.7A CN109389386B (zh) 2018-09-13 2018-09-13 一种扫码控制方法、装置及***
CN201811066827.7 2018-09-13

Publications (1)

Publication Number Publication Date
WO2020052371A1 true WO2020052371A1 (zh) 2020-03-19

Family

ID=65418828

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/098999 WO2020052371A1 (zh) 2018-09-13 2019-08-02 一种扫码控制方法、装置及***

Country Status (3)

Country Link
CN (2) CN112488694A (zh)
TW (1) TWI724450B (zh)
WO (1) WO2020052371A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488694A (zh) * 2018-09-13 2021-03-12 创新先进技术有限公司 一种扫码控制方法、装置及***
CN109949521A (zh) * 2019-03-07 2019-06-28 爱布客(武汉)科技有限公司 一种自助还书的方法、***、终端及存储介质
CN110334559B (zh) * 2019-05-31 2024-03-15 努比亚技术有限公司 一种扫码识别方法、终端及计算机可读存储介质
CN112561013A (zh) * 2020-12-15 2021-03-26 维沃移动通信有限公司 处理方法、装置及电子设备
CN113938316A (zh) * 2021-11-26 2022-01-14 中国船舶重工集团公司第七0七研究所 一种基于动态口令的分布式节点控制响应方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100125509A1 (en) * 2008-11-14 2010-05-20 Kranzley Arthur D Methods and systems for secure mobile device initiated payments using generated image data
CN106204864A (zh) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 基于动态二维码的门禁***及开门方法
CN107256584A (zh) * 2017-08-08 2017-10-17 黎志瀛 一种动态码显示的门锁控制***
CN109389386A (zh) * 2018-09-13 2019-02-26 阿里巴巴集团控股有限公司 一种扫码控制方法、装置及***

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2234037B1 (en) * 2007-12-04 2012-02-01 A.T Communications Co., Ltd. Two-dimensional code display system, two-dimensional code display method, and program
CN102460478A (zh) * 2009-04-08 2012-05-16 大陆-特韦斯贸易合伙股份公司及两合公司 二维符号代码和用于读取符号代码的方法
CN104253689B (zh) * 2013-06-28 2018-10-23 中国电信股份有限公司 基于二维码的用户卡动态口令验证方法与***
CN104426659B (zh) * 2013-09-02 2018-05-18 ***通信集团公司 动态口令生成方法、认证方法及***、相应设备
CN103729765B (zh) * 2014-01-15 2016-02-17 腾讯科技(深圳)有限公司 一种验证控制方法、终端、服务器、终端设备及***
CN103944730A (zh) * 2014-04-25 2014-07-23 天地融科技股份有限公司 数据安全交互***
CN103944910A (zh) * 2014-04-25 2014-07-23 天地融科技股份有限公司 数据安全交互方法
KR20160084617A (ko) * 2015-01-06 2016-07-14 에스케이플래닛 주식회사 통합 바코드를 이용한 결제 서비스 시스템, 그 시스템에서의 결제 서비스 장치 및 방법
CN111800276B (zh) * 2016-05-30 2022-12-23 创新先进技术有限公司 业务处理方法及装置
CN111615105B (zh) * 2016-07-18 2023-08-04 创新先进技术有限公司 信息提供、获取方法、装置及终端
CN106651378A (zh) * 2016-10-21 2017-05-10 北京数码视讯支付技术有限公司 支付终端、***及方法
CN106600827A (zh) * 2016-12-14 2017-04-26 上海众人网络安全技术有限公司 一种基于动态口令交易认证的售货方法及***
CN106790138A (zh) * 2016-12-28 2017-05-31 山东浪潮云服务信息科技有限公司 一种政务云应用用户登录双因子验证的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100125509A1 (en) * 2008-11-14 2010-05-20 Kranzley Arthur D Methods and systems for secure mobile device initiated payments using generated image data
CN106204864A (zh) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 基于动态二维码的门禁***及开门方法
CN107256584A (zh) * 2017-08-08 2017-10-17 黎志瀛 一种动态码显示的门锁控制***
CN109389386A (zh) * 2018-09-13 2019-02-26 阿里巴巴集团控股有限公司 一种扫码控制方法、装置及***

Also Published As

Publication number Publication date
CN112488694A (zh) 2021-03-12
TWI724450B (zh) 2021-04-11
CN109389386B (zh) 2020-09-29
CN109389386A (zh) 2019-02-26
TW202011310A (zh) 2020-03-16

Similar Documents

Publication Publication Date Title
WO2020052371A1 (zh) 一种扫码控制方法、装置及***
TWI695290B (zh) 登錄資訊處理方法及設備
AU2019221574B2 (en) Asset management system, method, apparatus, and electronic device
CA3051025C (en) Blockchain system and data storage method and apparatus
EP3937525A1 (en) Methods, apparatuses, devices and systems for backtracking service behavior
WO2021204068A1 (zh) 可验证声明的存储
US11288371B2 (en) Blockchain-based data processing method, apparatus, and device
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
WO2022017185A1 (zh) 支付处理方法、装置、设备及***
US20220108305A1 (en) Systems and methods for consent management by issuers on behalf of cardholders
WO2019029455A1 (zh) 一种支付方法、装置及其设备
US20200202328A1 (en) Writing and payment for nfc portable devices
US11282002B2 (en) Method and apparatus for secure check-in
US9495558B2 (en) Systems, methods, and computer program products for managing access control
WO2022022245A1 (zh) 数字物权凭证的生成方法、装置及设备
US11652879B2 (en) Matching methods, apparatuses, and devices based on trusted asset data
US11907356B2 (en) System, method, and computer-readable recording medium of creating, accessing, and recovering a user account with single sign on password hidden authentication
WO2024046121A1 (zh) 服务处理的方法及装置
US20240062216A1 (en) Systems and methods for dynamic data generation and cryptographic card authentication
US20230153415A1 (en) Alternative identity verification and authorization method
CN114626944A (zh) 一种业务处理方法及装置
CN117974141A (zh) 一种区块链钱包保护的方法、装置、存储介质及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19860939

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19860939

Country of ref document: EP

Kind code of ref document: A1