Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Barcode scanner authentication method, device and equipment and storage medium

An authentication method, the technology of the gun, which is applied in the direction of digital data authentication, electromagnetic radiation induction, digital data protection, etc., can solve the problem of data and privacy information leakage, insufficient attention to the communication security between the gun equipment, and disrupt the express company Operation and other issues, to ensure the transmission of information, ensure reasonable and effective authorized use, and strengthen life cycle management

Pending Publication Date: 2021-04-16
SHANGHAI DONGPU INFORMATION TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the Bargun device is a source of data entry, it becomes a risk of leakage of user data and private information; and the use of counterfeit Bargun devices to upload courier data for illegal profits can disrupt the normal operations of express companies
At present, the security of communication between Pakistani equipment has not been paid enough attention. Therefore, in order to prevent criminals from seeking profits by counterfeiting Pakistani equipment, a method for authenticating Pakistani equipment is urgently needed to strengthen the safety supervision of Pakistani equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Barcode scanner authentication method, device and equipment and storage medium
  • Barcode scanner authentication method, device and equipment and storage medium
  • Barcode scanner authentication method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] This embodiment provides a kind of; bar gun authentication method, please refer to figure 1 , the bar gun authentication method, including:

[0049] A method for authenticating a gun, comprising:

[0050] S1: Read the basic information of the Pakistan gun device in advance, generate the unique identifier of the corresponding Pakistan gun device based on the basic information, and store the unique identifier in the server; the basic information includes the built-in coding information, MAC address information, and CPU sequence of the Pakistan gun device No., authorized batch and affiliated network information;

[0051] S2: Based on the basic information of the Barbarian device, generate a key pair for the Barbarian device; the key pair includes a private key and a public key, the private key is stored in the Barbarian device, and the public key is stored in the server;

[0052] S3: When the Pakistan gun device logs in, the identification information of the Pakistan gun...

Embodiment 2

[0101] This embodiment provides a gun authentication device, please refer to Figure 7 , the bar gun authentication device includes:

[0102] The device identification generation module 1 is used to read the basic information of the Pakistani equipment, generate the unique identification of the corresponding Pakistani equipment based on the basic information, and store the unique identification in the server; the basic information includes the built-in coding information of the Pakistani equipment, MAC Address information, CPU serial number, authorized batch and affiliated network information;

[0103] The device key generation module 2 is used to generate the key pair of the Pakistani device based on the basic information of the Pakistani device; the key pair includes a private key and a public key, the private key is stored in the Pakistani device, and the public key is stored in the server ;

[0104] The equipment authentication module 3 is used to automatically generate ...

Embodiment 3

[0107] The above-mentioned second embodiment describes in detail the gun authentication device of the present invention from the perspective of modular functional entities, and the following describes the gun authentication device of the present invention in detail from the perspective of hardware processing.

[0108] Please see Figure 8 , the gun authentication device 500 may have relatively large differences due to different configurations or performances, and may include one or more processors (central processing units, CPU) 510 (for example, one or more processors) and memory 520, One or more storage media 530 (such as one or more mass storage devices) storing application programs 533 or data 532 . Wherein, the memory 520 and the storage medium 530 may be temporary storage or persistent storage. The program stored in the storage medium 530 may include one or more modules (not shown in the figure), and each module may include a series of instruction operations for the gun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a barcode scanner authentication method and device, equipment and a storage medium, and the method comprises the steps: reading the basic information of barcode scanner equipment in advance, generating a unique identification of the corresponding barcode scanner equipment based on the basic information, and storing the unique identification in a server; when the barcode scanner equipment logs in, identification information of the barcode scanner equipment is automatically generated, the identification information is transmitted to a server, and the server verifies the barcode scanner equipment and the identification information according to the public key and the unique identification of the barcode scanner equipment; if the verification is passed, allowing the barcode scanner equipment to be put into operation; and if the verification is not passed, determining that the equipment is abnormal equipment, and logging in unsuccessfully. Through the authentication method, the authenticity of the barcode scanner equipment is identified, the use of an unauthorized barcode scanner of a non-company is avoided, the behavior that a franchise company uses the unauthorized barcode scanner to seek benefits is avoided, the reasonable and effective authorized use of the authorized barcode scanner is ensured, and the life cycle management of the barcode scanner equipment is enhanced.

Description

technical field [0001] The invention belongs to the technical field of management of logistics express equipment, and in particular relates to a method, device, equipment and storage medium for authenticating a gun. Background technique [0002] In recent years, with the rise of online shopping on websites such as Tmall and JD.com, express mail has become a part of people's lives. At present, some areas have not covered the intelligent express cabinet system, and the express service station system is adopted, that is, all the express mail in the community is collected in the service station first, and then the express mail information is entered into the system, and then the system sends SMS or other methods to notify customers Pick up at the service station. [0003] At present, there are more and more express companies and express mails, and the express mail information is becoming more and more complicated. When it is necessary to enter express mail information, manual p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10G06F21/72G06F21/60G06F21/44
Inventor 张阁李培吉李建泉
Owner SHANGHAI DONGPU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products