Movatterモバイル変換


[0]ホーム

URL:


CN113946765B - Two-dimensional code processing method and device, storage medium and electronic equipment - Google Patents

Two-dimensional code processing method and device, storage medium and electronic equipment

Info

Publication number
CN113946765B
CN113946765BCN202010682297.XACN202010682297ACN113946765BCN 113946765 BCN113946765 BCN 113946765BCN 202010682297 ACN202010682297 ACN 202010682297ACN 113946765 BCN113946765 BCN 113946765B
Authority
CN
China
Prior art keywords
application
identifier
dimensional code
service scene
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010682297.XA
Other languages
Chinese (zh)
Other versions
CN113946765A (en
Inventor
黎小为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co LtdfiledCriticalTencent Technology Shenzhen Co Ltd
Priority to CN202010682297.XApriorityCriticalpatent/CN113946765B/en
Publication of CN113946765ApublicationCriticalpatent/CN113946765A/en
Application grantedgrantedCritical
Publication of CN113946765BpublicationCriticalpatent/CN113946765B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention discloses a two-dimensional code processing method and device, a storage medium and electronic equipment. The method comprises the steps of acquiring first two-dimensional code information sent by a first application, wherein the first two-dimensional code information records a first service scene identifier for representing a first service scene corresponding to the first application when scanning a target two-dimensional code, sending the first two-dimensional code information to a second application background device based on a callback address of the second application background device corresponding to the second application identifier, and returning response data sent by the second application background device to the first application, so that data intercommunication among different application programs can be realized, and privacy and safety of data intercommunication are ensured. The invention solves the technical problems of data non-intercommunication and poor user experience among different application programs.

Description

Two-dimensional code processing method and device, storage medium and electronic equipment
Technical Field
The present invention relates to the field of computers, and in particular, to a method and apparatus for processing a two-dimensional code, a storage medium, and an electronic device.
Background
In the prior art, when two-dimensional codes are scanned by application programs in the same scene, if a user is in different areas or scans by using different application programs, analysis of the same two-dimensional code is difficult to complete, the two-dimensional codes generated by different application programs are difficult to identify each other, so that when the user is in different areas or different scenes, different application programs need to be repeatedly registered by using the two-dimensional codes, privacy security of personal information and data of the user is low, and the user is inconvenient to use.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides a two-dimensional code processing method and device, a storage medium and electronic equipment, which are used for at least solving the technical problems of data non-intercommunication among different application programs and poor user experience.
According to one aspect of the embodiment of the invention, a processing method of a two-dimensional code is provided, which comprises the steps of obtaining first two-dimensional code information sent by a first application, wherein the first two-dimensional code information comprises a first user identifier, a second application identifier and a first service scene identifier, the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by the first application, the first service scene identifier is used for representing a first service scene corresponding to the first application when scanning the target two-dimensional code, obtaining a callback address of a second application background device corresponding to the second application identifier, sending the first user identifier and the first service scene identifier to the second application background device according to the callback address, obtaining first response data sent by the second application background device, wherein the first response data are response data of the first user identifier under the first service scene represented by the first service scene identifier, and sending the first response data to the first application.
Optionally, before the first two-dimensional code information sent by the first application is obtained, the method further comprises the steps of obtaining an application registration request sent by an access party, wherein the application registration request carries a callback address of the second application background device, the access party is the second application background device or a second application corresponding to the second application background device, responding to the application registration request, distributing the second application identifier to the access party, recording the callback address of the second application background device carried in the application registration request, and sending the second application identifier to the access party.
Optionally, after the second application identifier is sent to the access party, the method further comprises configuring one or more service scene identifiers on the second application background device in the case that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier, and generating the target two-dimensional code on the second application background device according to the first user identifier and the second application identifier.
Optionally, after the second application identifier is sent to the access party, the method further comprises the steps of configuring one or more service scene identifiers on the second application background device in the case that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier, sending the second application identifier to the second application on the second application background device, and generating the target two-dimensional code according to the first user identifier and the second application identifier on the second application, or sending the second application identifier to the second application on the second application background device in the case that the access party is the second application background device, generating the target two-dimensional code according to the first user identifier and the second application identifier on the second application, and configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers comprise the first service scene identifier.
Optionally, after the second application identifier is sent to the access party, the method further comprises configuring one or more service scene identifiers on the second application in the case that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier, and generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier.
Optionally, after the second application identifier is sent to the access party, the method further comprises the steps of configuring one or more service scene identifiers on the second application in the case that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier, sending the second application identifier to second application background equipment on the second application and generating the target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier, or sending the second application identifier to second application background equipment on the second application in the case that the access party is the second application, generating the target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application background equipment, wherein the one or more service scene identifiers comprise the first service scene identifier.
Optionally, after the application registration request sent by the access party is obtained, the method further comprises the steps of distributing a target encryption key and a target decryption key for the access party, and sending the target encryption key and the target decryption key to the access party.
Optionally, before the first two-dimensional code information sent by the first application is obtained, the method further comprises the steps of scanning the target two-dimensional code on the first application to obtain the first user identifier and the second application identifier, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene, the first service scene identifier of the first service scene is obtained on the first application, and the first two-dimensional code information is determined to comprise the first user identifier, the second application identifier and the first service scene identifier on the first application.
The method comprises the steps of obtaining second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises a first user identifier, a second application identifier and a second service scene identifier, the first user identifier and the second application identifier are identifiers obtained by the third application in a scanning mode of the target two-dimensional code, the second service scene identifier is used for representing a second service scene corresponding to the third application in a scanning mode of the target two-dimensional code, obtaining a callback address of second application background equipment corresponding to the second application identifier, sending the first user identifier and the second service scene identifier to the second application background equipment according to the callback address, obtaining second response data sent by the second application background equipment, wherein the second response data are response data of the first user identifier in the second service scene represented by the second service scene identifier, and sending the second response data to the third application.
According to another aspect of the embodiment of the invention, a processing device of a two-dimensional code is provided, which comprises a first acquisition module, a processing module and a first response module, wherein the first acquisition module is used for acquiring first two-dimensional code information sent by a first application, the first two-dimensional code information comprises a first user identifier, a second application identifier and a first service scene identifier, the first user identifier and the second application identifier are identifiers obtained by the first application for scanning a target two-dimensional code, the first service scene identifier is used for representing a first service scene corresponding to the first application when the first application scans the target two-dimensional code, the processing module is used for acquiring a callback address of a second application background device corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background device according to the callback address, the second acquisition module is used for acquiring first response data sent by the second application background device, wherein the first response data is the first service scene represented by the first service identifier, and the first response data is sent by the first application background device to the first application module.
Optionally, the device is further configured to obtain an application registration request sent by an access party before the first two-dimensional code information sent by the first application is obtained, where the application registration request carries a callback address of the second application background device, the access party is the second application corresponding to the second application background device or the second application background device, allocate the second application identifier to the access party in response to the application registration request, record the callback address of the second application background device carried in the application registration request, and send the second application identifier to the access party.
Optionally, the device is further configured to configure one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier, send the second application identifier to the second application on the second application background device, and generate the target two-dimensional code on the second application according to the first user identifier and the second application identifier.
Optionally, the device is further used for configuring one or more service scene identifications on the second application background device after the second application identification is sent to the access party, or sending the second application identification to the second application on the condition that the access party is the second application background device, wherein the one or more service scene identifications comprise the first service scene identification, generating the target two-dimensional code on the second application background device according to the first user identification and the second application identification, or sending the second application identification to the second application on the condition that the access party is the second application background device, generating the target two-dimensional code on the second application according to the first user identification and the second application identification, and configuring one or more service scene identifications on the second application, wherein the one or more service scene identifications comprise the first service scene identification.
Optionally, the device is further used for configuring one or more service scene identifiers on the second application when the access party is the second application after sending the second application identifier to the access party, wherein the one or more service scene identifiers comprise the first service scene identifier, generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier, or configuring one or more service scene identifiers on the second application when the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier, sending the second application identifier to the second application background device on the second application, and generating the target two-dimensional code on the second application background device according to the first user identifier and the second application identifier, or sending the second application identifier to the second application background device on the second application background device when the access party is the second application, and generating the second service scene identifier on the second application background device according to the second application background device, wherein the second application identifier comprises the second application background device and the second application identifier or the second application background device.
Optionally, the device is further used for distributing a target encryption key and a target decryption key for the access party after the application registration request sent by the access party is acquired, and sending the target encryption key and the target decryption key to the access party.
Optionally, the device is further used for scanning the target two-dimensional code on the first application to obtain the first user identifier and the second application identifier before the first two-dimensional code information sent by the first application is obtained, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene, the first service scene identifier of the first service scene is obtained on the first application, and the first two-dimensional code information is determined to comprise the first user identifier, the second application identifier and the first service scene identifier on the first application.
The device is also used for acquiring second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises a first user identifier, a second application identifier and a second service scene identifier, the first user identifier and the second application identifier are identifiers obtained by the third application in a scanning mode of the target two-dimensional code, the second service scene identifier is used for representing a second service scene corresponding to the third application in a scanning mode of the target two-dimensional code, the callback address of second application background equipment corresponding to the second application identifier is acquired, the first user identifier and the second service scene identifier are sent to the second application background equipment according to the callback address, second response data sent by the second application background equipment are acquired, the second response data are response data of the first user identifier in the second service scene represented by the second service scene identifier, and the second response data are sent to the third application.
According to still another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium having a computer program stored therein, wherein the computer program is configured to execute the processing method of the two-dimensional code when running.
According to still another aspect of the embodiments of the present invention, there is also provided an electronic device including a memory in which a computer program is stored, and a processor configured to execute the processing method of the two-dimensional code by the computer program.
In the embodiment of the invention, the first two-dimensional code information sent by the first application is acquired, wherein the first two-dimensional code information records the first service scene identifier for representing the first service scene corresponding to the first application when scanning the target two-dimensional code, the first two-dimensional code information is sent to the second application background equipment based on the callback address of the second application background equipment corresponding to the second application identifier, and the response data sent by the second application background equipment is returned to the first application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
Fig. 1 is a schematic view of an application environment of an alternative two-dimensional code processing method according to an embodiment of the present invention;
FIG. 2 is a flow chart of an alternative two-dimensional code processing method according to an embodiment of the invention;
FIG. 3 is a schematic diagram of an alternative two-dimensional code processing method according to an embodiment of the present invention;
FIG. 4 is a flow chart of another alternative two-dimensional code processing method according to an embodiment of the invention;
FIG. 5 is a flow chart of yet another alternative two-dimensional code processing method according to an embodiment of the present invention;
FIG. 6 is a flow chart of yet another alternative two-dimensional code processing method according to an embodiment of the present invention;
FIG. 7 is a flow chart of yet another alternative two-dimensional code processing method according to an embodiment of the present invention;
FIG. 8 is a flow chart of yet another alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of an alternative two-dimensional code processing device according to an embodiment of the present invention;
Fig. 10 is a schematic structural view of an alternative electronic device according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, partial terms or terminology appearing in the course of describing the embodiments of the application are applicable to the following explanation:
Service template IDs (identity) each representing a service scenario and the format of the request and response parameters agreed upon by the service scenario.
The invention is illustrated below with reference to examples:
According to an aspect of the embodiment of the present invention, a method for processing a two-dimensional code is provided, and optionally, in this embodiment, the method for processing a two-dimensional code may be applied to a hardware environment configured by a server 101 and a user terminal 103 as shown in fig. 1. As shown in fig. 1, a server 101 is connected to a terminal 103 through a network, and may be used to provide services to a user terminal or a client installed on the user terminal, which may be a video client, an instant messaging client, a browser client, an educational client, etc. The database 105 may be configured on a server or independent of the server, and the network may include, but is not limited to, a wired network, a wireless network, where the wired network includes a local area network, a metropolitan area network, and a wide area network, the wireless network includes, but is not limited to, a bluetooth, a WIFI, and other networks for implementing wireless communication, the user terminal 103 may be a terminal configured with a target client, and may include, but is not limited to, at least one of a Mobile phone (such as an Android Mobile phone, an iOS Mobile phone, etc.), a notebook computer, a tablet computer, a palm computer, an MID (Mobile INTERNET DEVICES, a Mobile internet device), a PAD, a desktop computer, a smart tv, etc., the server may be a single server, or may be a server cluster including a plurality of servers, or a cloud server, and may include, but is not limited to, a route or gateway, a processing application 107 for two-dimensional code is displayed through the user terminal 103, a second application 109 for two-dimensional code processing is scanned through an entry for the two-dimensional code processing configured on the terminal, and a second application 109 for two-dimensional code processing is generated by the second application 109 for two-dimensional code processing, or the two-dimensional code processing is implemented by the first application, and the two-dimensional code processing is not limited to the first application for the two-dimensional processing by the first application.
Alternatively, as an optional embodiment, taking the application of the processing service of the two-dimensional code to a server as an example, as shown in fig. 2, the processing method of the two-dimensional code includes:
S202, acquiring first two-dimensional code information sent by a first application, wherein the first two-dimensional code information comprises a first user identifier, a second application identifier and a first service scene identifier, the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by the first application, and the first service scene identifier is used for representing a first service scene corresponding to the first application when scanning the target two-dimensional code;
alternatively, in this embodiment, the two-dimensional code may be generated by the first application or the second application, and the two-dimensional code is generated by the second application, which will be further described in this embodiment.
The first two-dimensional code information may include, but is not limited to, first two-dimensional code information generated after the first application 107 scans a two-dimensional code, and when the two-dimensional code scanned by the first application 107 is generated by the second application 109 corresponding to the second application identifier, the first application 107 may determine, after scanning the two-dimensional code generated by the second application 109 in the corresponding first service scenario, the first two-dimensional code information recorded with the first user identifier, the second application identifier, and the first service scenario identifier, where the first user identifier is used to represent a user registered in advance in the first application 107 and the second application 109, may be recorded in the two-dimensional code generated by the second application 109, or may be generated after the first application 107 scans the two-dimensional code, the server 101 may determine, after acquiring the first two-dimensional code information, the second application based on the second application identifier in the first service scenario, the first user identifier determines that the data acquired from the second application scenario needs to be acquired from the second application scenario device, and determines the first user identifier corresponding to the first service scenario, and the first user identifier is acquired from the first service scenario.
Optionally, in this embodiment, the first application may include, but is not limited to, an application program, app (application), an applet, etc., fig. 3 is a schematic diagram of an optional two-dimensional code processing method according to an embodiment of the present invention, and the first two-dimensional code information may include, but is not limited to, as shown in fig. 3, where a second application identifier in the first two-dimensional code information is a preset string "appid" in fig. 3, a first service scene identifier is a preset string corresponding to "code" in fig. 3, a first user identifier is a preset string corresponding to "user ID" in fig. 3, and the first two-dimensional code information may further include, but is not limited to, a timestamp identifier for indicating a validity period of the target two-dimensional code, for example, a preset string corresponding to "expireTime" in fig. 3 is a portion for indicating a validity period of the two-dimensional code.
Optionally, in this embodiment, the first service scenario may include, but is not limited to, a first service scenario in multiple service scenarios that need to call the same type of data, for example, a public transport card is used in a different place, a public transport scenario corresponding to a city where the first application is located is the first service scenario, where the first application and the second application respectively correspond to a public transport taking service using different cities, after the user finishes public transport information registration and recharging in the second application, the user uses a two-dimensional code generated by the second application, and scans through a scanning area of the first application, and then the server obtains, according to first two-dimensional code information generated after the first application scans the two-dimensional code, related data corresponding to the public transport scenario from a database corresponding to the second application, and feeds back the first application, and the first application performs subsequent processing, where the related data may include, but is not limited to, a name, an age, a balance, and the like.
Optionally, in this embodiment, the first service scenario may further include, but is not limited to, a first service scenario among a plurality of service scenarios that need to record the same type of data in advance, for example, bus taking and shopping payment, where both service scenarios need to record financial information of the user.
The first service scenario may further include, but is not limited to, a service scenario among multiple service scenarios with the same or different purposes of service processing, for example, shopping, traffic, entrance guard, medical treatment, virtual account login, dining, ticket purchasing, financial service, social service, and the like, where the service processing can be performed by the same user, which is just an example, and a specific service scenario category may include, but is not limited to, one or more combinations of the foregoing.
S204, obtaining a callback address of second application background equipment corresponding to the second application identifier, and sending a first user identifier and a first service scene identifier to the second application background equipment according to the callback address;
optionally, in this embodiment, the second application may be, but not limited to, consistent with a service scenario of the first application, or may include, but not limited to, associating with the service scenario of the first application or storing, in a background device of the second application, data corresponding to the target two-dimensional code, where the data is required by the first application.
Optionally, in this embodiment, the callback address is a callback address allocated to the first application and the second application by the gateway or by a route when the gateway registers,
S206, acquiring first response data sent by second application background equipment, wherein the first response data is response data of a first user identifier in a first service scene represented by a first service scene identifier;
Optionally, in this embodiment, the first response data is a data packet generated by the second application background device according to a first service scene identifier and a first user identifier recorded in first two-dimensional code information, where the first service scene identifier corresponds to response data corresponding to the first service scene identifier through a preset rule, the preset rule is preconfigured in a server, and before the first response data sent by the second application background device is obtained, the preset rule is sent to the second application background device, so that the second application background device can generate corresponding response data according to the first service scene identifier.
S208, sending the first response data to the first application.
Optionally, in this embodiment, taking the user ' Zhang Sano ' as an example, the user ' Zhang Sano ' needs to go to the supermarket for shopping, wherein ' Zhang Sano ' needs to take the bus to go to the supermarket, a small program is opened at this time to highlight the two-dimension code (corresponding to the target two-dimension code) of the user, the two-dimension code card is swiped and paid, after the ' Zhang Sano ' arrives at the gate of the supermarket, the body temperature needs to be measured, the health state is checked, the same two-dimension code is highlighted at this time, after the inspector uses own checking equipment to sweep the code, the ' Zhang Sano ' health state can be checked, wherein the inspector can send the two-dimension code information displayed by the ' Zhang Sano ' and the first service scene identifier corresponding to the checking equipment to the server after the code is swept, the server performs subsequent logic processing according to the service code corresponding to the service logic pre-configured and the service scene identifier corresponding to the first service scene identifier and the acquired by the two-dimension code information, the server can specifically include but not limited to acquire the health information corresponding to the ' Zhang Sano ' after the three's checking equipment is swept, the two-dimension code information corresponding to the two-dimension code is swept again, and the service scene information corresponding to the second service identifier corresponding to the second service scene identifier is pre-configured to the service logic and the service identifier corresponding to the second service scene identifier is acquired by the server.
According to the method, the device and the system for processing the application data, the first two-dimensional code information sent by the first application is obtained, the first two-dimensional code information is recorded with the first service scene identification used for representing the first service scene corresponding to the first application when the first application scans the target two-dimensional code, the first two-dimensional code information is sent to the second application background device based on the callback address of the second application background device corresponding to the second application identification, response data sent by the second application background device are returned to the first application, interconnection and intercommunication among different application program data are achieved through configuration of the corresponding service scene identification, the purpose that different application programs can mutually identify two-dimensional codes of each other is achieved, corresponding service is provided, accordingly privacy safety of user personal information and data is improved, the technical effect of user experience is optimized, and the technical problems that data are not communicated among different application programs and user experience is poor are solved.
In an optional embodiment, fig. 4 is a flowchart of an optional two-dimensional code processing method according to an embodiment of the present invention, where before acquiring the first two-dimensional code information sent by the first application, the method further includes:
s402, acquiring an application registration request sent by an access party, wherein the application registration request carries a callback address of second application background equipment, and the access party is the second application background equipment or a second application corresponding to the second application background equipment;
S404, responding to the application registration request, distributing a second application identifier for the access party, and recording a callback address of a second application background device carried in the application registration request;
S406, sending a second application identifier to the access party.
Alternatively, in this embodiment, the access party may include, but is not limited to, a first application and a second application, may include, but is not limited to, the target two-dimensional code generating party, the target two-dimensional code analysis processing party, and an application program or a background device of the application program that generates and analyzes the target two-dimensional code, which is just an example, and the present invention is not limited in any way.
It should be noted that, the first application and the second application both need to complete the registration process at the server, so as to receive the application identifier allocated by the server to the first application and the second application according to the application registration request, so as to facilitate subsequent two-dimensional code processing.
Through the embodiment, the access party is registered to the server, so that the server transmits the application identifier for the access party, and the callback address corresponding to the access party is acquired, so that the interconnection and intercommunication of data of different access parties through the server are realized, the technical effect of optimizing the user use experience is realized, and the technical problems of data non-intercommunication among different application programs and poor user experience are solved.
In an alternative embodiment, fig. 5 is a flowchart of an alternative two-dimensional code processing method according to an embodiment of the present invention, as shown in fig. 5, after sending the second application identifier to the access party, the method further includes:
S502, under the condition that the access party is second application background equipment, one or more service scene identifications are configured on the second application background equipment, wherein the one or more service scene identifications comprise first service scene identifications, a target two-dimensional code is generated on the second application background equipment according to the first user identification and the second application identification, or
S504, under the condition that the access party is second application background equipment, one or more service scene identifications are configured on the second application background equipment, wherein the one or more service scene identifications comprise first service scene identifications, the second application identification is sent to the second application on the second application background equipment, and a target two-dimensional code is generated on the second application according to the first user identification and the second application identification, or
S506, under the condition that the access party is second application background equipment, sending a second application identifier to the second application on the second application background equipment, generating a target two-dimensional code on the second application according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers comprise the first service scene identifier.
Optionally, in this embodiment, the steps S502, S504 and S506 are performed in an alternative order.
Optionally, in this embodiment, the target two-dimensional code may be generated by including, but not limited to, a second application background device or a second application, and may also include, but not limited to, generating, by the second application background device, a service scene identifier, and then sending the service scene identifier to the second application, so as to implement that the target two-dimensional code carries the service scene identifier.
Optionally, in this embodiment, the method may further include, but is not limited to, allocating, by the server, a corresponding service scenario identifier to the second application background device, or allocating, by another application or another application background device, a corresponding service scenario identifier to the second application background device.
By means of the embodiment, when the access party is the second application background equipment, the service scene identifier is configured for the second application background equipment, so that the generated target two-dimension code records service scene information corresponding to the background equipment for generating the two-dimension code, corresponding service execution logic can be obtained according to the preset service scene identifier, corresponding service is executed, data required by executing the service can be obtained through the target two-dimension code between a plurality of applications and the application background equipment, data interconnection and intercommunication among the plurality of applications are completed, and further the technical problems of data non-intercommunication among different application programs and poor user experience are solved.
In an alternative embodiment, fig. 6 is a flowchart of an alternative two-dimensional code processing method according to an embodiment of the present invention, as shown in fig. 6, after sending the second application identifier to the access party, the method further includes:
S602, configuring one or more service scene identifications on a second application under the condition that the access party is the second application, wherein the one or more service scene identifications comprise a first service scene identification, generating a target two-dimensional code on the second application according to the first user identification and the second application identification, or
S604, configuring one or more service scene identifications on a second application under the condition that the access party is the second application, wherein the one or more service scene identifications comprise a first service scene identification, transmitting the second application identification to second application background equipment on the second application, and generating a target two-dimensional code on the second application background equipment according to the first user identification and the second application identification, or
S606, if the access party is a second application, sending a second application identifier to second application background equipment on the second application background equipment, generating a target two-dimensional code according to the first user identifier and the second application identifier on the second application background equipment, and configuring one or more service scene identifiers on the second application background equipment, wherein the one or more service scene identifiers comprise the first service scene identifier.
Optionally, in this embodiment, the target two-dimensional code may be generated by including, but not limited to, a second application background device or a second application, and may also include, but not limited to, generating, by the second application background device, a service scene identifier, and then sending the service scene identifier to the second application, so as to implement that the target two-dimensional code carries the service scene identifier.
Optionally, in this embodiment, the method may further include, but is not limited to, allocating, by the server, a corresponding service scenario identifier for the second application, or allocating, by other applications or other application background devices, a corresponding service scenario identifier for the second application.
By means of the embodiment, when the access party is the second application, the service scene identifier is configured for the second application, so that the generated target two-dimensional code can record service scene information corresponding to the application generating the two-dimensional code, corresponding service execution logic can be obtained according to the preset service scene identifier, corresponding service is further executed, data required by executing the service can be obtained through the target two-dimensional code between the plurality of applications and the application background equipment, data interconnection and intercommunication among the plurality of applications are completed, and further the technical problems of data non-intercommunication among different application programs and poor user experience are solved.
In an alternative embodiment, after acquiring the application registration request sent by the access party, the method further comprises the steps of distributing a target encryption key and a target decryption key for the access party, and sending the target encryption key and the target decryption key to the access party.
Optionally, in this embodiment, the target encryption key and the target decryption key may be preconfigured by the server for the access party, or after the registration request message is sent to the server by the access party, the server returns the target encryption key and the target decryption key to the access party, or the server preconfigured an algorithm for generating the target encryption key and the target decryption key according to the application identifier, and then the access party itself generates the target encryption key and the target decryption key according to the algorithm.
Optionally, in this embodiment, in a process of performing data interaction between the first application and the second application and the server, the data packet needs to carry the target encryption key and the target decryption key, where the target encryption key and the target decryption key correspond to the application identifier. For example, the first application corresponds to a first target encryption key and a first target decryption key, and the second application corresponds to a second target encryption key and a second target decryption key.
Through the embodiment, the safety of the first two-dimensional code information and the first response information in the transmission process is effectively ensured, the technical effect of safe and reliable data transmission is achieved when the data interconnection and intercommunication are achieved,
In an optional embodiment, before the first two-dimensional code information sent by the first application is obtained, the method further comprises the steps of scanning a target two-dimensional code on the first application to obtain a first user identifier and a second application identifier, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene, obtaining a first service scene identifier of the first service scene on the first application, and determining the first two-dimensional code information to comprise the first user identifier, the second application identifier and the first service scene identifier on the first application.
Alternatively, in this embodiment, the target two-dimensional code may be generated by, but not limited to, a second application, so that when the target two-dimensional code is scanned, a second application identifier corresponding to the second application can be obtained, the two-dimensional code information obtained after the target two-dimensional code is scanned is repackaged, and the first two-dimensional code information is obtained by adding the first service scene identifier to the two-dimensional code information obtained after the target two-dimensional code is scanned.
According to the embodiment, based on the second application identifier, the server can forward the first two-dimensional code information to the second application corresponding to the second application identifier, the background equipment of the second application obtains data associated with the user and the service scene based on the first user identifier and the first service scene identifier and returns the data to the server, and the server sends the data to the first application to realize interconnection and intercommunication of the first application and the second application, so that the technical effect of optimizing user experience is achieved.
For example, in the case where the first service scenario is a health check, the background device of the second application may obtain data associated with the user and the service scenario based on the first user identifier and the first service scenario identifier, which may include, but is not limited to, "name", "phone", "gender", "birthday", "certificate type", "identity card", "city area", "address", "creation time", "health risk rating", etc., which are just an example, and the data associated with the user and the service scenario may include one or more combinations of the foregoing, which are not particularly limited in the present invention.
In an optional embodiment, the method further comprises the steps of obtaining second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises a first user identifier, a second application identifier and a second service scene identifier, the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by the third application, the second service scene identifier is used for representing a second service scene corresponding to the third application when scanning the target two-dimensional code, a callback address of second application background equipment corresponding to the second application identifier is obtained, the first user identifier and the second service scene identifier are sent to the second application background equipment according to the callback address, second response data sent by the second application background equipment are obtained, the second response data are response data of the first user identifier under the second service scene represented by the second service scene identifier, and the second response data are sent to the third application.
Optionally, in this embodiment, the third application may include, but is not limited to, an application that is different from both the first application and the second application service scenario, or may include, but is not limited to, an application that may be the same as the first application or the second application, and the second user identifier may be the same as or different from the first user identifier, where the second user identifier is different from the first user identifier, the second user identifier corresponds to a different user from the first user identifier, and thus may be implemented as an application scenario of a multi-user service.
Optionally, in this embodiment, before the obtaining the second two-dimensional code information sent by the third application to perform data interworking interconnection, the third application needs to be registered to a server, so that the third application can implement interworking interconnection with the first application and the second application at the same time, and user experience is optimized.
The invention is further illustrated by the following examples:
taking the example that the target two-dimensional code is a health code, fig. 7 is a schematic flow chart of an alternative two-dimensional code processing method according to an embodiment of the invention, as shown in fig. 7, the flow steps are as follows:
S702, applet a (corresponding to a first application) and applet B (corresponding to a second application) register app information in a routing center (corresponding to a server);
S704, the routing center returns appids (corresponding to the first application identifier and the second application identifier) and appsecret (corresponding to the target encryption key and the target decryption key corresponding to the first application and the target encryption key and the target decryption key corresponding to the second application) to applet a and applet B.
S706, the applet B requests the two-dimensional code content 'from the applet B background'
S708, the applet B generates a target two-dimensional code in the background and sends the target two-dimensional code to the applet B;
s710, the applet A scans a target two-dimensional code corresponding to the applet B;
s712, the applet A sends a message requesting the content of the two-dimension code to the background of the applet A;
s714, the background of the applet A sends a request message to the routing center;
s716, the routing center forwards the request message to the background of the applet B through a preconfigured callback interface;
S718, the background of the applet B generates a processing result according to the request message and returns to the routing center;
S720, the routing center sends the processing result to the background of the applet A through a preconfigured callback interface;
S722, the background of the applet A feeds back the processing result to the applet A.
In addition, the routing center can also maintain appsecret keys and corresponding callback interfaces for the applets a or B described above. In order to ensure the interface safety, registered applets cannot arbitrarily intermodulation the applet interfaces, and two applets can be finally used for calling the interfaces to complete the interconnection of data after a party initiates an application before calling.
The service template is a set of service scenes agreed by the intercommunicating applets and the appointments of unified parameters and return values of corresponding scenes.
For example, the service template ID is 10001, which represents the service template for obtaining user identity information, and the request parameters of the service template are
Request:
request parameters pathtoappid = appidB & tplid =00001;
toappid, finally processing an application identification ID, and identifying a target application for forwarding the request by the routing center through the ID;
tplid template ID, the time requests the corresponding business scene.
Access party request header
Request header:
The above is merely an example, and the embodiment is not limited in any way to the specific configuration of the response parameter and the request parameter.
In an alternative embodiment, fig. 8 is a schematic flow chart of an alternative two-dimensional code processing method according to an embodiment of the present invention, as shown in fig. 8, the steps of the flow are as follows:
s802, an administrator creates an application for the access party in the routing center, fills in a callback address of the access party when creating the application, and assigns appid, appsecret to the access party.
S804, after identifying the two-dimension code, the client (terminal, app, or applet) of the access party needs to determine the template ID according to the current service scene (payment, health check, etc.), and when sending the request message to the routing center, needs to carry the two-dimension code parameter and the template ID, signs by appid and appscert according to the requirement of the routing center, and then requests the routing center to process the two-dimension code and returns the result;
S806, the access party needs to provide an interface address for the routing center to call for processing the intercommunication two-dimension code service, the interface needs to use appid and appscert to carry out security signature verification according to the signature requirement of the routing center, and the verification realizes the corresponding service scene through the template ID of the parameters.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
According to another aspect of the embodiment of the invention, a two-dimensional code processing device for implementing the two-dimensional code processing method is also provided. As shown in fig. 9, the apparatus includes:
The first obtaining module 902 is configured to obtain first two-dimensional code information sent by a first application, where the first two-dimensional code information includes a first user identifier, a second application identifier, and a first service scene identifier, the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by the first application, the first service scene identifier is used to represent a first service scene corresponding to the first application when scanning the target two-dimensional code, the processing module 904 is configured to obtain a callback address of a second application background device corresponding to the second application identifier, and send the first user identifier and the first service scene identifier to the second application background device according to the callback address, the second obtaining module 906 is configured to obtain first response data sent by the second application background device, where the first response data is response data of the first user identifier under the first service scene represented by the first service scene identifier, and the sending module 908 is configured to send the first response data to the first application.
In an optional embodiment, the device is further used for acquiring an application registration request sent by the access party before acquiring the first two-dimensional code information sent by the first application, wherein the application registration request carries a callback address of the second application background device, the access party is the second application background device or a second application corresponding to the second application background device, responding to the application registration request, distributing a second application identifier for the access party, recording the callback address of the second application background device carried in the application registration request, and sending the second application identifier to the access party.
In an alternative embodiment, the device is further configured to, after sending the second application identifier to the access party, configure one or more service scenario identifiers on the second application background device if the access party is the second application background device, where the one or more service scenario identifiers include a first service scenario identifier, generate a target two-dimensional code on the second application background device according to the first user identifier and the second application identifier, or configure one or more service scenario identifiers on the second application background device if the access party is the second application background device, where the one or more service scenario identifiers include a first service scenario identifier, send the second application identifier to the second application on the second application background device, and generate a target two-dimensional code on the second application according to the first user identifier and the second application identifier, or send the second application identifier to the second application on the second application background device if the access party is the second application background device, generate the second service scenario or multiple service scenario identifiers on the second application background device according to the first user identifier and the first service scenario identifier.
In an alternative embodiment, the device is further configured to configure one or more service scenario identifiers on the second application after the second application identifier is sent to the access party, where the one or more service scenario identifiers include a first service scenario identifier on the second application in case the access party is the second application, generate a target two-dimensional code on the second application according to the first user identifier and the second application identifier, or configure one or more service scenario identifiers on the second application in case the access party is the second application, where the one or more service scenario identifiers include the first service scenario identifier, send the second application identifier to the second application background device on the second application, and generate a target two-dimensional code on the second application background device according to the first user identifier and the second application identifier, or send the second application identifier to the second application background device on the second application in case the access party is the second application, generate a target two-dimensional code on the second application background device according to the first user identifier and the second application identifier, and configure one or more service scenario identifiers on the second application background device, where the one or more service scenario identifiers include the first service scenario identifier.
In an alternative embodiment the device is further adapted to allocate a target encryption key and a target decryption key for the access party after obtaining the application registration request sent by the access party, and to send the target encryption key and the target decryption key to the access party.
In an optional embodiment, the device is further used for scanning a target two-dimensional code on the first application to obtain a first user identifier and a second application identifier before acquiring the first two-dimensional code information sent by the first application, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene, a first service scene identifier of the first service scene is acquired on the first application, and the first two-dimensional code information is determined to comprise the first user identifier, the second application identifier and the first service scene identifier on the first application.
In an optional embodiment, the device is further used for acquiring second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises a first user identifier, a second application identifier and a second service scene identifier, the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by the third application, the second service scene identifier is used for representing a second service scene corresponding to the third application when scanning the target two-dimensional code, a callback address of a second application background device corresponding to the second application identifier is acquired, the first user identifier and the second service scene identifier are sent to the second application background device according to the callback address, second response data sent by the second application background device are acquired, the second response data are response data of the first user identifier under the second service scene represented by the second service scene identifier, and the second response data are sent to the third application.
According to still another aspect of the embodiment of the present invention, there is further provided an electronic device for implementing the processing method of the two-dimensional code, where the electronic device may be a terminal device or a server shown in fig. 1. The present embodiment is described taking the electronic device as a server as an example. As shown in fig. 10, the electronic device comprises a memory 1002 and a processor 1004, the memory 1002 having stored therein a computer program, the processor 1004 being arranged to perform the steps of any of the method embodiments described above by means of the computer program.
Alternatively, in this embodiment, the electronic device may be located in at least one network device of a plurality of network devices of the computer network.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
S1, acquiring first two-dimensional code information sent by a first application, wherein the first two-dimensional code information comprises a first user identifier, a second application identifier and a first service scene identifier, the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by the first application, and the first service scene identifier is used for representing a first service scene corresponding to the first application when scanning the target two-dimensional code;
S2, obtaining a callback address of second application background equipment corresponding to the second application identifier, and sending a first user identifier and a first service scene identifier to the second application background equipment according to the callback address;
s3, acquiring first response data sent by second application background equipment, wherein the first response data is response data of a first user identifier in a first service scene represented by a first service scene identifier;
s4, sending the first response data to the first application.
Alternatively, it will be understood by those skilled in the art that the structure shown in fig. 10 is only schematic, and the electronic device may also be a smart phone (such as an Android Mobile phone, an iOS Mobile phone, etc.), a tablet computer, a palm computer, a Mobile internet device (Mobile INTERNET DEVICES, MID), a PAD, etc. Fig. 10 is not limited to the structure of the electronic device and the electronic apparatus described above. For example, the electronics may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 10, or have a different configuration than shown in FIG. 10.
The memory 1002 may be configured to store software programs and modules, such as program instructions/modules corresponding to the two-dimensional code processing method and apparatus in the embodiment of the present invention, and the processor 1004 executes the software programs and modules stored in the memory 1002 to perform various functional applications and data processing, that is, implement the two-dimensional code processing method. The memory 1002 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory. In some examples, the memory 1002 may further include memory located remotely from the processor 1004, which may be connected to the terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 1002 may be used for storing information such as user data and application program related data, in particular, but not limited to. As an example, as shown in fig. 10, the memory 1002 may include, but is not limited to, a first obtaining module 902, a processing module 904, a second obtaining module 906, and a sending module 908 in a processing device including the two-dimensional code, for sending first response data to a first application.
In addition, other module units in the processing device of the two-dimensional code may be included, but are not limited to, and are not described in detail in this example.
Optionally, the transmission device 1006 is configured to receive or transmit data via a network. Specific examples of the network described above may include wired networks and wireless networks. In one example, the transmission means 1006 includes a network adapter (Network Interface Controller, NIC) that can be connected to other network devices and routers via a network cable to communicate with the internet or a local area network. In one example, the transmission device 1006 is a Radio Frequency (RF) module for communicating with the internet wirelessly.
In other embodiments, the terminal device or the server may be a node in a distributed system, where the distributed system may be a blockchain system, and the blockchain system may be a distributed system formed by connecting the plurality of nodes through a network communication. Among them, the nodes may form a Peer-To-Peer (P2P) network, and any type of computing device, such as a server, a terminal, etc., may become a node in the blockchain system by joining the Peer-To-Peer network.
According to yet another aspect of embodiments of the present invention, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions are read from the computer-readable storage medium by a processor of a computer device, which executes the computer instructions, causing the computer device to perform the methods provided in the various alternative implementations of the processing of two-dimensional codes described above.
Alternatively, in the present embodiment, the above-described computer-readable storage medium may be configured to store a computer program for executing the steps of:
S1, acquiring first two-dimensional code information sent by a first application, wherein the first two-dimensional code information comprises a first user identifier, a second application identifier and a first service scene identifier, the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by the first application, and the first service scene identifier is used for representing a first service scene corresponding to the first application when scanning the target two-dimensional code;
S2, obtaining a callback address of second application background equipment corresponding to the second application identifier, and sending a first user identifier and a first service scene identifier to the second application background equipment according to the callback address;
s3, acquiring first response data sent by second application background equipment, wherein the first response data is response data of a first user identifier in a first service scene represented by a first service scene identifier;
s4, sending the first response data to the first application.
Alternatively, in this embodiment, all or part of the steps in the various methods of the above embodiments may be implemented by a program for instructing the terminal device related hardware, and the program may be stored in a computer readable storage medium, where the storage medium may include a flash disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
The integrated units in the above embodiments may be stored in the above-described computer-readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing one or more computer devices (which may be personal computers, servers or network devices, etc.) to perform all or part of the steps of the method described in the embodiments of the present invention.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In several embodiments provided by the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, such as the division of the units, is merely a logical function division, and may be implemented in another manner, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units or devices may be implemented in hardware or in software functional units.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (15)

Before the first two-dimensional code information sent by the first application is obtained, the method further comprises the steps of obtaining an application registration request sent by the second application background device, wherein the application registration request carries a callback address of the second application background device, distributing the second application identifier to the second application background device in response to the application registration request, recording the callback address of the second application background device, sending the second application identifier to the second application background device, configuring the first service scene identifier on the second application background device, and generating the target two-dimensional code on the second application background device according to the first user identifier and the second application identifier.
The device is further used for acquiring an application registration request sent by the second application background device before the first two-dimensional code information sent by the first application is acquired, wherein the application registration request carries a callback address of the second application background device, distributing the second application identifier to the second application background device in response to the application registration request, recording the callback address of the second application background device, sending the second application identifier to the second application background device, configuring the first service scene identifier on the second application background device, and generating the target two-dimensional code on the second application background device according to the first user identifier and the second application identifier.
CN202010682297.XA2020-07-152020-07-15Two-dimensional code processing method and device, storage medium and electronic equipmentActiveCN113946765B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010682297.XACN113946765B (en)2020-07-152020-07-15Two-dimensional code processing method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010682297.XACN113946765B (en)2020-07-152020-07-15Two-dimensional code processing method and device, storage medium and electronic equipment

Publications (2)

Publication NumberPublication Date
CN113946765A CN113946765A (en)2022-01-18
CN113946765Btrue CN113946765B (en)2025-08-12

Family

ID=79326773

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010682297.XAActiveCN113946765B (en)2020-07-152020-07-15Two-dimensional code processing method and device, storage medium and electronic equipment

Country Status (1)

CountryLink
CN (1)CN113946765B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN115842653A (en)*2022-11-032023-03-24支付宝(杭州)信息技术有限公司Information exchange method, device, equipment and computer storage medium
CN118627126B (en)*2024-08-132024-10-18山东师范大学 Intelligent hierarchical anonymous protection method, system, device, medium and product

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102542235A (en)*2011-12-092012-07-04河北广联信息技术有限公司One-code multi-recognition method of two-dimensional codes
CN109829122A (en)*2018-12-202019-05-31浙江口碑网络技术有限公司Obtain method and device, the storage medium, electronic device of ingress for service

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9400965B2 (en)*2013-05-212016-07-26Sap SePlatform for modeling and embedding business scenarios in bar codes
US9979725B1 (en)*2014-04-142018-05-22Symantec CorporationTwo-way authentication using two-dimensional codes
IT201600132156A1 (en)*2016-12-292018-06-29Infocert S P A ELECTRONIC SIGNATURE OF TRANSACTIONS BETWEEN USERS AND REMOTE SUPPLIERS THROUGH THE USE OF TWO-DIMENSIONAL CODES
CN109598171B (en)*2017-09-302022-03-22北京国双科技有限公司Data processing method, device and system based on two-dimensional code
CN109583880A (en)*2018-12-052019-04-05深圳市爱贝信息技术有限公司Cross-platform communication means and device and method of payment and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102542235A (en)*2011-12-092012-07-04河北广联信息技术有限公司One-code multi-recognition method of two-dimensional codes
CN109829122A (en)*2018-12-202019-05-31浙江口碑网络技术有限公司Obtain method and device, the storage medium, electronic device of ingress for service

Also Published As

Publication numberPublication date
CN113946765A (en)2022-01-18

Similar Documents

PublicationPublication DateTitle
US20240171974A1 (en)Proximity based user identification and authentication system and method
JP6935406B2 (en) Service implementation method and equipment
CN111447133B (en)Message transmission method and device, storage medium and electronic device
CN111742531B (en) Profile Information Sharing
Tan et al.Secure certificateless authentication and road message dissemination protocol in VANETs
WO2017129083A1 (en)Method, device, and system for message processing and computer storage medium
KR20190039077A (en) Biometric identification and verification between IoT devices and applications
CN105100223A (en)File sharing method, device and system based on cloud storage
WO2016197934A1 (en)Barcode security authentication method
US10257315B2 (en)Secure proxied data retrieval from third-party services
EP3477561A1 (en)System for goods delivery
KR20210134816A (en)Processing electronic tokens
CN105100071B (en)A kind of login method, apparatus and system
CN105763464A (en)Data flow sharing method, device and system
CN113946765B (en)Two-dimensional code processing method and device, storage medium and electronic equipment
CN104660557A (en)Operation processing method and device
CN109558710B (en)User login method, device, system and storage medium
CN110198265A (en)Information processing method, system, device, equipment and medium
CN110599142A (en)Data storage method and device, computer equipment and storage medium
CN114529304A (en)Interaction method and device of session information and storage medium
CN112738019A (en)Method and device for displaying device information, storage medium and electronic device
CN104380653A (en) Privacy Preservation for Participatory Sensing Systems
CN117521154A (en)Digital product processing method, device, equipment, medium and program product
CN109040331B (en)Electronic business card processing method and device, computing equipment and storage medium
CN112560073A (en)Method, device and system for verifying data source reliability

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp