Supercharge Your Innovation With Domain-Expert AI Agents!

A method for pulling an identification code, a storage medium, a terminal device, and a server

An identification code and equipment technology, applied in the field of communication, can solve problems such as user loss, user information leakage, application platform cannot identify the user identification of the application client, etc., and achieve the effect of increasing security

Active Publication Date: 2021-08-31
TENCENT TECH (SHENZHEN) CO LTD
View PDF20 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the existing method, the application platform cannot identify whether the user ID of the application client is stolen by others. In this way, if the user ID of a certain user is stolen by others, others use the user ID to log in to the application platform on the application client. , the application client pulls the QR code, which will cause the risk of user information leakage, especially in the process of paying with the QR code, which will cause certain losses to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for pulling an identification code, a storage medium, a terminal device, and a server
  • A method for pulling an identification code, a storage medium, a terminal device, and a server
  • A method for pulling an identification code, a storage medium, a terminal device, and a server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0044] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can, for example, be practiced in sequences other than those illu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for extracting an identification code, a storage medium, a terminal device and a server, which are applied in the technical field of communication. The application client obtains the device authorization information of the application client, adds the device authorization information and the user ID and device information of the application client to the pull request, and sends it to the application platform, so that the application platform authorizes the device in the pull request Information of the corresponding identification code is returned to the application client only after the information, device information, and user identification are verified. Since the device authorization information obtained by the application client requires network authorization, only the application client that has authorized the device authorization information initiates a pull request for the identification code, and the device authorization information, device information, and user ID of the application client are verified. Only when passing through, can the information of the corresponding identification code be obtained, which increases the security of the application client actively obtaining the identification code.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method for extracting an identification code, a storage medium, a terminal device and a server. Background technique [0002] With the development of information technology, there are many ways to express information in a simple way, such as using identification codes such as QR codes or barcodes to express information. This method is simple and safe, and it is used in many fields, such as payment fields, etc. . [0003] Many application clients now have the function of pulling identification codes such as QR codes online to display user information to other users. When the application client initiates the process of pulling the two-dimensional code, the application platform will determine whether to return the corresponding two-dimensional code to the application client according to the user identification of the application client. [0004] However, in the ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/0876G06Q20/4016G06Q20/4014G06Q20/3274G06Q20/3276G06Q20/409H04L9/40
Inventor 刘瑞锴
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More