Host resource configuration device and method and computer readable storage medium
A technology of host resources and configuration methods, applied in security devices, access restrictions, electrical components, etc., can solve the problems of a single host, the host cannot perform migration and switching, and does not support the mode of multiple hosts to one slave, etc., to achieve convenient The effect of replacement, promotion of interactive performance, and ease of use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0164] 1. The first / second host creates a queue, adds a sharing function to the function of the generated QR code, and shares this QR code to all slave partyers participating in the party;
[0165] 2. The partyer that already has a shared player directly recognizes the QR code to join, and quickly opens the sharing mode; for the partyer that has not been installed, you can receive a reminder similar to Bluetooth pairing or WiFi joining, choose to accept the prompt, and the background will automatically download the Application, after the download is complete, it will automatically join the first / second host and integrate into the party;
[0166] 3. The slave exits halfway and comes back for the second time. As long as it directly recognizes the previous QR code, it will join the queue immediately. The nearby slaves can also use the opened QR code to scan and join, which reduces the switching back and forth for the first / second host operation.
[0167] Example
[0168] start;...
Embodiment 4
[0176] This embodiment realizes the identification of the slave to the slave or the first / second master.
[0177] Through the above specific embodiments, the present application achieves the following technical effects:
[0178] 1. When the first / second host is determined, the QR code is shared, and the slaves can join at any time, which is convenient and fast, and avoids all slaves from scanning the first / second host one by one;
[0179] 2. Regardless of whether the slave partyer has the same application or not, it will not be affected. The existing partyer can directly identify and join, and can also choose to scan the first / second host to join, which reduces the constraints and restrictions of the partyer;
[0180] 3. The slave machine exits unexpectedly, and the second join does not need to scan the first / second host. The QR code of the first / second host is "permanently valid". Once shared, it can be used multiple times. For example, it can be used in the first / When the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


