CN109086845A - A kind of equipment anti-loss method based on two dimensional code - Google Patents
A kind of equipment anti-loss method based on two dimensional code Download PDFInfo
- Publication number
- CN109086845A CN109086845A CN201810852996.7A CN201810852996A CN109086845A CN 109086845 A CN109086845 A CN 109086845A CN 201810852996 A CN201810852996 A CN 201810852996A CN 109086845 A CN109086845 A CN 109086845A
- Authority
- CN
- China
- Prior art keywords
- equipment
- server
- information
- dimensional code
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of equipment anti-loss method based on two dimensional code, comprising the following steps: S1, the unique identifier by being equipped in the anti-lost application software scanning device of equipment;S2, link is obtained by scanning unique identifier, and judges whether the binding of completion user and equipment by server;S3, when device losses, facility information link, and presentation device attribute information are obtained by scanning device unique identifier.Equipment anti-loss method provided by the invention based on two dimensional code provides a kind of new anti-lost mode of equipment, establish the connection between the equipment owner and lost article found person, the equipment owner passes through the two dimensional code in scanning device, it can be with the information of the typing owner, other people are able to carry out the tool scans two dimensional code of two-dimensional code scanning by any one, the information that can quickly see the equipment owner, is retrieved the article temporarily lost quickly.
Description
Technical field
The invention belongs to the anti-lost technical fields of equipment, and in particular to a kind of equipment anti-loss method based on two dimensional code.
Background technique
Two dimensional code is the technology that a kind of corresponding relationship by binary system and particular geometric figure carrys out recording data information, can
To store such as network address, business card, text information, know that photoelectric scanning device can be read automatically wherein by graphic input device
Information, be equivalent to the key of a reading information, due to two dimensional code have information capacity is big, fault-tolerant ability is strong, confidentiality is high,
The features such as at low cost and easy to manufacture, extensively, be rapidly applied to commodity counterfeit prevention/trace to the source, information transmission, web site url, data
Downloading, commodity transaction, positioning/navigation and electronic certificate etc..
Existing bank card, identity card, bus card, campus card, wallet etc. usually need portable thing to hold very much
It is easy to be lost, it is difficult to give for change again once losing, even if the people found wants to give back the owner of lost property, but due to the letter on article there is no the owner of lost property
Breath, so being difficult to give back the owner of lost property again.How by storing the information of the article owner indirectly on article, user and article are established
Direct connection, it is to be worth the problem of further research discusses that the person that enables lost article found, which is quickly found out the owner of lost property by the information,.
Summary of the invention
For above-mentioned deficiency in the prior art, the device identification method provided by the invention based on two dimensional code solves existing
Have and do not establish contacting between article and its owner in technology, after article is lost, is not easy the problem of being retrieved.
In order to achieve the above object of the invention, the technical solution adopted by the present invention are as follows: a kind of equipment based on two dimensional code is anti-lost
Mistake method, comprising the following steps:
S1, the unique identifier by being equipped in the anti-lost application software scanning device of equipment;
S2, link is obtained by scanning unique identifier, and controls the binding for completing user and equipment by server;
S3, when device losses, facility information link, and presentation device attribute are obtained by scanning device unique identifier
Information.
Further, the unique identifier in the step S1 is two dimensional code;
Scanning the link information that the two dimensional code obtains includes network address and EIC equipment identification code;
The EIC equipment identification code is that equipment ID number is obtained according to using 3DESC or AES encryption.
Further, the ciphering process of the EIC equipment identification code are as follows:
When being encrypted by server to EIC equipment identification code, aes algorithm library in invoking server, and input privately owned secret
Key and device id, then algorithms library exports the corresponding encrypted fields of the device id.
Further, server judges whether to complete the mode of the binding of user and equipment in the step S2 specifically:
A1, the two dimensional code in anti-lost equipment is scanned by application software, obtain the complete link information of two dimensional code, pass through
Application software sends the solicited message of modification equipment owner information to server;
Wherein, solicited message includes EIC equipment identification code, the ID users for requesting dirty bit and application software;
A2, judged by server ID users whether in User ID list,
If so, entering step A3;
If it is not, then entering step A9;
A3, CUSTOMER ID is decrypted by server, obtains EIC equipment identification code cleartext version;
Wherein, the cleartext version of EIC equipment identification code is equipment ID number;
A4, by server, whether retrieval facility ID number has been bound in user's list of bindings;
If so, entering step A5;
If it is not, then entering step A6;
A5, judge whether equipment has been bound by the user of transmission bind request information by server;
If so, entering step A7;
If it is not, then entering step A8;
A6, new equipment Info Link is generated by server, and returns it to application software, checked for user, and permit
Family fill message allowable terminates apparatus bound;
A7, the original equipment Info Link that the user is inquired by server, and application software is sent it to, and allow
User's modification information terminates apparatus bound;
A8, bound device failure information is back to by application software by server, is checked for user, terminated equipment and tie up
It is fixed;
A9, the open page link of application software is back to by application software by server, is checked for user, terminated
Apparatus bound.
Further, the step S3 specifically:
When device losses, by scanning device unique identifier, facility information link is obtained, is linked by facility information
The page of displaying checks request to server sending device attribute information, and device attribute information is back to page by server
Face, for lost article found, person is checked;
The device attribute information includes the phone information and identity information that the equipment owner fills in.
The invention has the benefit that the equipment anti-loss method provided by the invention based on two dimensional code provides one kind newly
The anti-lost mode of equipment, establish the connection between the equipment owner and lost article found person, the equipment owner passes through in scanning device
Two dimensional code, can be with the information of the typing owner, other people are able to carry out tool scans of two-dimensional code scanning by any one
Two dimensional code can quickly see the information of the equipment owner, be retrieved the article temporarily lost quickly.
Detailed description of the invention
Fig. 1 is the equipment anti-loss method implementation flow chart based on two dimensional code in embodiment provided by the invention.
Fig. 2 is that server judges whether that completing user and the binding method of equipment realizes stream in embodiment provided by the invention
Cheng Tu.
Specific embodiment
A specific embodiment of the invention is described below, in order to facilitate understanding by those skilled in the art this hair
It is bright, it should be apparent that the present invention is not limited to the ranges of specific embodiment, for those skilled in the art,
As long as various change is in the spirit and scope of the present invention that the attached claims limit and determine, these variations are aobvious and easy
See, all are using the innovation and creation of present inventive concept in the column of protection.
As shown in Figure 1, a kind of equipment anti-loss method based on two dimensional code, comprising the following steps:
S1, the unique identifier by being equipped in the anti-lost application software scanning device of equipment;
Unique identifier in above-mentioned steps S1 is two dimensional code;
Scanning the link information that the two dimensional code obtains includes network address and EIC equipment identification code;Different equipment ID numbers is corresponding not
Same CUSTOMER ID;
The EIC equipment identification code is that equipment ID number is obtained according to using 3DESC or AES encryption;
For example, http://m.sandiubao.com/s/4kQoHGgBNurYoQ88RNpmFg ", wherein first half
" http://m.sandiubao.com/s/ " is generic web pages network address, and latter half " 4kQoHGgBNurYoQ88RNpmFg " is
EIC equipment identification code;Network address+EIC equipment identification code constitutes complete facility information link;
When above equipment ID is encrypted, there are a privately owned code key and aes algorithm library in server, when being encrypted to it, adjusts
With aes algorithm library, the privately owned code key of input and device id, then algorithms library exports the corresponding encrypted fields of the device id.
S2, link is obtained by scanning unique identifier, and controls the binding for completing user and equipment by server;
Server judges whether to complete the mode of the binding of user and equipment in above-mentioned steps S2 specifically:
A1 scans the two dimensional code in anti-lost equipment by application software, obtains the complete link information of two dimensional code, pass through
Application software sends the solicited message of modification equipment owner information to server;
Wherein, solicited message includes EIC equipment identification code, the ID users for requesting dirty bit and application software;
A2, by server judge ID users whether in User ID list,
If so, entering step A3;
If it is not, then entering step A9;
A3, CUSTOMER ID is decrypted by server, obtains EIC equipment identification code cleartext version,
Wherein, the cleartext version of EIC equipment identification code is equipment ID number;
A4, by server, whether retrieval facility ID number has been bound in user's list of bindings;
If so, entering step A5;
If it is not, then entering step A6;
A5, judge whether equipment has been bound by the user of transmission bind request information by server;
If so, entering step A7;
If it is not, then entering step A8;
A6, new equipment Info Link is generated by server, and returns it to application software, checked for user, and permit
Family fill message allowable terminates apparatus bound;
A7, the original equipment Info Link that the user is inquired by server, and application software is sent it to, and allow
User's modification information terminates apparatus bound;
A8, bound device failure information is back to by application software by server, is checked for user, terminated equipment and tie up
It is fixed;
A9, the open page link of application software is back to by application software by server, is checked for user, terminated
Apparatus bound.
The above-mentioned two dimensional code for typing user information, after two dimensional code in equipment is scanned, can still read " network address+
The connection of CUSTOMER ID ", application software request this connection to server, and server inquiry is without this link (because thus
Link is logged information not yet, does not generate user information link), other existing pages of website will be jumped to, for
Family is checked.
S3, when device losses, facility information link, and presentation device attribute are obtained by scanning device unique identifier
Information.
Above-mentioned steps S3 specifically:
When device losses, by scanning device unique identifier, facility information link is obtained, is linked by facility information
The page of displaying checks request to server sending device attribute information, and device attribute information is back to page by server
Face, for lost article found, person is checked;
The device attribute information includes the phone information that the equipment owner fills in and identity information etc..
When above-mentioned server generates various links: under default conditions, not comprising equipment EIC equipment identification code in server
Connection, when lost article found person picks up the equipment that do not register, server can not open the link comprising EIC equipment identification code after scanning,
It will jump in the open page, only after binding and inputting information success, server just automatically generates one comprising setting
The link of standby identification code, links the information of the equipment owner of page presentation user's typing of direction.
In one embodiment of the invention, the anti-lost equipment in the present invention is one to be printed with unique two dimensional code anti-lost
Device is lost, the proof of identification which can be used as house pet hangs over the neck of pet, and pet owner passes through corresponding preventing mobile phone
It loses software registration and logs in, scan the two dimensional code on anti-loss device, send bind request to server, and improve personal and pet
Information;When pet surprisingly wanders away outside, passerby can know pet master by the two dimensional code on anti-loss device with scanning pet
The information of people, contacts pet owner in time, so that pet is quickly returning to owner at one's side.Similarly, which is also possible to old man institute
The essential information of oneself and old man are stored therein by the bracelet of band, household, and when old man wanders away, passerby can quickly be related to
Its household.
The invention has the benefit that the equipment anti-lost method provided by the invention based on two dimensional code provide it is a kind of new
The anti-lost mode of equipment, establishes the connection between the equipment owner and lost article found person, and the equipment owner passes through two in scanning device
Code is tieed up, can be with the information of the typing owner, other people are able to carry out the tool scans two dimension of two-dimensional code scanning by any one
Code, can quickly see the information of the equipment owner, be retrieved the article temporarily lost quickly.
Claims (5)
1. a kind of equipment anti-loss method based on two dimensional code, which comprises the following steps:
S1, the unique identifier by being equipped in the anti-lost application software scanning device of equipment;
S2, link is obtained by scanning unique identifier, and controls the binding for completing user and equipment by server;
S3, when device losses, by scanning device unique identifier obtain facility information link, and presentation device attribute believe
Breath.
2. the equipment anti-loss method according to claim 1 based on two dimensional code, which is characterized in that in the step S1
Unique identifier is two dimensional code;
Scanning the link information that the two dimensional code obtains includes network address and EIC equipment identification code;
The EIC equipment identification code is that equipment ID number is obtained according to using 3DESC or AES encryption.
3. the equipment anti-loss method according to claim 2 based on two dimensional code, which is characterized in that the EIC equipment identification code
Ciphering process are as follows:
When being encrypted by server to EIC equipment identification code, aes algorithm library in invoking server, and input privately owned code key and
Device id, then algorithms library exports the corresponding encrypted fields of the device id.
4. the equipment anti-loss method according to claim 1 based on two dimensional code, which is characterized in that taken in the step S2
Business device judges whether to complete the mode of the binding of user and equipment specifically:
A1, the two dimensional code in anti-lost equipment is scanned by application software, obtain the complete link information of two dimensional code, pass through application
Software sends the solicited message of modification equipment owner information to server;
Wherein, solicited message includes EIC equipment identification code, the ID users for requesting dirty bit and application software;
A2, judged by server ID users whether in User ID list,
If so, entering step A3;
If it is not, then entering step A9;
A3, CUSTOMER ID is decrypted by server, obtains EIC equipment identification code cleartext version;
Wherein, the cleartext version of EIC equipment identification code is equipment ID number;
A4, by server, whether retrieval facility ID number has been bound in user's list of bindings;
If so, entering step A5;
If it is not, then entering step A6;
A5, judge whether equipment has been bound by the user of transmission bind request information by server;
If so, entering step A7;
If it is not, then entering step A8;
A6, new equipment Info Link is generated by server, and returns it to application software, checked for user, and allow to use
Family fill message terminates apparatus bound;
A7, the original equipment Info Link that the user is inquired by server, and application software is sent it to, and allow user
Modification information terminates apparatus bound;
A8, bound device failure information is back to by application software by server, is checked for user, terminate apparatus bound;
A9, the open page link of application software is back to by application software by server, is checked for user, terminate equipment
Binding.
5. the equipment anti-loss method according to claim 1 based on two dimensional code, which is characterized in that the step S3 is specific
Are as follows:
When device losses, by scanning device unique identifier, facility information link is obtained, is linked and is shown by facility information
The page check request to server sending device attribute information, and device attribute information is back to the page by server, supplied
Lost article found person checks;
The device attribute information includes the phone information and identity information that the equipment owner fills in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852996.7A CN109086845B (en) | 2018-07-30 | 2018-07-30 | Equipment loss prevention method based on two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852996.7A CN109086845B (en) | 2018-07-30 | 2018-07-30 | Equipment loss prevention method based on two-dimensional code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109086845A true CN109086845A (en) | 2018-12-25 |
CN109086845B CN109086845B (en) | 2021-08-31 |
Family
ID=64833463
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810852996.7A Expired - Fee Related CN109086845B (en) | 2018-07-30 | 2018-07-30 | Equipment loss prevention method based on two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109086845B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110060394A (en) * | 2019-03-30 | 2019-07-26 | 刘强 | A kind of Internet of Things cell wisdom access control system |
CN111125568A (en) * | 2019-12-24 | 2020-05-08 | 重庆大峰科技有限公司 | Lost article searching method based on two-dimensional code scanning |
CN111246015A (en) * | 2020-01-15 | 2020-06-05 | 叶晓阳 | Equipment loss prevention method with alive code system |
CN113784295A (en) * | 2021-11-09 | 2021-12-10 | 深圳市伦茨科技有限公司 | Anti-lost method and system for portable article |
CN114722846A (en) * | 2020-12-22 | 2022-07-08 | 广州探途天下科技有限公司 | Item retrieval method, terminal and data platform based on QR code |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007129581A1 (en) * | 2006-05-02 | 2007-11-15 | Bitwallet, Inc. | Paying system, paying terminal device, and paying method |
CN103839090A (en) * | 2012-11-26 | 2014-06-04 | 张龙斌 | Two-dimensional code label management method and system |
CN105574560A (en) * | 2014-11-04 | 2016-05-11 | 张冠华 | Cloud anti-lost system of two-dimensional code key ring |
CN105721610A (en) * | 2016-04-15 | 2016-06-29 | 立德高科(北京)数码科技有限责任公司 | Method and system for seeking person under guardianship based on two-dimension code |
CN106066880A (en) * | 2016-05-31 | 2016-11-02 | 梁晨 | One is looked for something anti-lost method and system |
CN106355217A (en) * | 2016-08-15 | 2017-01-25 | 立德高科(昆山)数码科技有限责任公司 | Two-dimensional code based guardianship information checking and alarming method |
CN207637170U (en) * | 2017-07-24 | 2018-07-20 | 汪文可 | The anti-lost cloud service system of Quick Response Code |
-
2018
- 2018-07-30 CN CN201810852996.7A patent/CN109086845B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007129581A1 (en) * | 2006-05-02 | 2007-11-15 | Bitwallet, Inc. | Paying system, paying terminal device, and paying method |
CN103839090A (en) * | 2012-11-26 | 2014-06-04 | 张龙斌 | Two-dimensional code label management method and system |
CN105574560A (en) * | 2014-11-04 | 2016-05-11 | 张冠华 | Cloud anti-lost system of two-dimensional code key ring |
CN105721610A (en) * | 2016-04-15 | 2016-06-29 | 立德高科(北京)数码科技有限责任公司 | Method and system for seeking person under guardianship based on two-dimension code |
CN106066880A (en) * | 2016-05-31 | 2016-11-02 | 梁晨 | One is looked for something anti-lost method and system |
CN106355217A (en) * | 2016-08-15 | 2017-01-25 | 立德高科(昆山)数码科技有限责任公司 | Two-dimensional code based guardianship information checking and alarming method |
CN207637170U (en) * | 2017-07-24 | 2018-07-20 | 汪文可 | The anti-lost cloud service system of Quick Response Code |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110060394A (en) * | 2019-03-30 | 2019-07-26 | 刘强 | A kind of Internet of Things cell wisdom access control system |
CN111125568A (en) * | 2019-12-24 | 2020-05-08 | 重庆大峰科技有限公司 | Lost article searching method based on two-dimensional code scanning |
CN111246015A (en) * | 2020-01-15 | 2020-06-05 | 叶晓阳 | Equipment loss prevention method with alive code system |
CN111246015B (en) * | 2020-01-15 | 2022-02-22 | 叶晓阳 | Equipment loss prevention method with alive code system |
CN114722846A (en) * | 2020-12-22 | 2022-07-08 | 广州探途天下科技有限公司 | Item retrieval method, terminal and data platform based on QR code |
CN113784295A (en) * | 2021-11-09 | 2021-12-10 | 深圳市伦茨科技有限公司 | Anti-lost method and system for portable article |
Also Published As
Publication number | Publication date |
---|---|
CN109086845B (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3721578B1 (en) | Methods and systems for recovering data using dynamic passwords | |
CN109086845A (en) | A kind of equipment anti-loss method based on two dimensional code | |
US6829711B1 (en) | Personal website for electronic commerce on a smart java card with multiple security check points | |
AU2011313826B2 (en) | System and method of conducting transactions | |
CN102473212B (en) | Generate the method for soft token | |
CN108667789B (en) | Multidimensional barcode mobile identity authentication method, digital certificate device and authentication server | |
CN102831529B (en) | A kind of commodity information identification method based on radio frequency and system | |
CN102855577B (en) | Multiple commodity antifake check method based on cloud computing | |
CN105515783A (en) | Identity authentication method, server and authentication terminal | |
KR20100126291A (en) | How to read an attribute from an identity token | |
JP2009535900A (en) | Privacy-enhanced identifier scheme using non-linkable identifiers | |
JP4682187B2 (en) | Authentication system, information providing method, and information providing system | |
JP6800045B2 (en) | Signature support server, relay server, signature support program, and relay program | |
US20110296191A1 (en) | Method for securely drawing up a virtual multiparty contract capable of being physically represented | |
CN109145641B (en) | Privacy information protection method and system | |
CN102790767A (en) | Information safety control method, information safety display equipment and electronic trading system | |
CN110598433A (en) | Anti-counterfeiting information processing method and device based on block chain | |
CN111259079A (en) | Block chain-based limited personal data sharing and trading method | |
JP2023044766A (en) | Goods registration system | |
US20240062190A1 (en) | Generating and maintaining digital tokens on a blockchain using physical device identifiers | |
CN113792307A (en) | Seal management method and device and electronic equipment | |
EP2674901A1 (en) | Active barcode authentication system and authentication method thereof | |
US20050138429A1 (en) | Data communication intermediation program and apparatus for promoting authentication processing in cooperation with purchaser portable terminal having personal identification information and communication function | |
CN108765615B (en) | Block chain-based card punching information storage method and system | |
JPWO2003105037A1 (en) | Data communication intermediary device that works with the purchaser's mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210831 |
|
CF01 | Termination of patent right due to non-payment of annual fee |