[go: up one dir, main page]

CN112527218A - Unlocking method and system and electronic equipment - Google Patents

Unlocking method and system and electronic equipment Download PDF

Info

Publication number
CN112527218A
CN112527218A CN202011499659.8A CN202011499659A CN112527218A CN 112527218 A CN112527218 A CN 112527218A CN 202011499659 A CN202011499659 A CN 202011499659A CN 112527218 A CN112527218 A CN 112527218A
Authority
CN
China
Prior art keywords
user
information
target terminal
terminal device
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011499659.8A
Other languages
Chinese (zh)
Inventor
陈楚平
宋美虹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zitiao Network Technology Co Ltd
Original Assignee
Beijing Zitiao Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zitiao Network Technology Co Ltd filed Critical Beijing Zitiao Network Technology Co Ltd
Priority to CN202011499659.8A priority Critical patent/CN112527218A/en
Publication of CN112527218A publication Critical patent/CN112527218A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1203Improving or facilitating administration, e.g. print management
    • G06F3/1204Improving or facilitating administration, e.g. print management resulting in reduced user or operator actions, e.g. presetting, automatic actions, using hardware token storing data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the disclosure discloses an unlocking method, an unlocking system and electronic equipment. One embodiment of the method comprises: displaying coding information for unlocking target terminal equipment in a screen locking state, wherein the coding information is used for a user to scan by using a user terminal, and the user terminal sends the coding information and user information to a server so that the server verifies the user information based on the coding information; responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in; and unlocking the target terminal equipment in response to receiving the preset operation executed by the user based on the login information. On one hand, the cost of using the common target terminal equipment can be saved, and on the other hand, convenience is provided for users to use the common target terminal equipment.

Description

Unlocking method and system and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an unlocking method and system, and an electronic device.
Background
A common terminal device, such as a printer, which provides services to a plurality of users usually requires a use authority for using the common terminal device before the common terminal device can be used.
When the common terminal device is in an idle state, the common terminal device is normally locked. When the user uses the public terminal equipment, the public terminal equipment needs to be unlocked.
The related unlocking scheme achieves the effect of unlocking the public terminal equipment mainly through card swiping hardware and unlocking application installed on an operating system of the public terminal equipment. And controlling the screen locking of the screen of the public terminal equipment by the unlocking application. When a user wants to use the public terminal equipment, the identity data can be input in a card swiping mode, and whether the identity data of the card swiping mode is legal or not is confirmed, so that the requirement of an enterprise on the permission use of the public terminal equipment is met.
Disclosure of Invention
This disclosure is provided to introduce concepts in a simplified form that are further described below in the detailed description. This disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The embodiment of the disclosure provides an unlocking method, an unlocking system and electronic equipment.
In a first aspect, an embodiment of the present disclosure provides an unlocking method, including: displaying coding information for unlocking target terminal equipment in a screen locking state, wherein the coding information is used for a user to scan by using a user terminal, and the user terminal sends the coding information and user information to a server so that the server verifies the user information based on the coding information; responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in; unlocking the target terminal equipment in response to receiving preset operation executed by a user based on the login information
In a second aspect, an embodiment of the present disclosure provides an unlocking method, including: when a preset application is operated, scanning coded information which is displayed on a display screen of target terminal equipment and used for unlocking the target terminal equipment by using a scanning function of the application according to a scanning instruction of a user; and sending the coded information and the acquired user information to a server so that the server verifies the user identity information indicated by the user information according to the coded information to verify whether the user is authorized to use the target terminal equipment.
In a third aspect, an embodiment of the present disclosure provides an unlocking method, including: receiving coding information and user information which are sent by a user terminal and used for unlocking target terminal equipment, wherein the coding information is sent to the target terminal equipment by the server side in advance and is displayed by the target terminal equipment in a screen locking state, and the coding information is obtained by scanning the coding information by the user terminal; determining whether the user identity information indicated by the user information has the authority to use the target terminal equipment or not based on the coding information; and in response to the fact that the user identity information indicated by the user information has the authority of using the target terminal equipment, sending the user information and the indication information that the user identity passes the verification to the target terminal equipment, so that the target terminal equipment displays information for prompting the user to log in according to the indication information.
In a fourth aspect, an embodiment of the present disclosure provides an unlocking system, including: the system comprises target terminal equipment, a user terminal and a server, wherein the target terminal equipment is used for: displaying coding information for unlocking the target terminal equipment in a screen locking state, wherein the coding information is used for a user to scan by using a user terminal, and the user terminal sends the coding information and user information to a server so that the server verifies the user information based on the coding information; responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in; responding to the received preset operation executed by the user based on the login information, and unlocking the target terminal equipment; the user terminal is configured to: when a preset application is operated, scanning coded information which is displayed on a display screen of target terminal equipment and used for unlocking the target terminal equipment by using a scanning function of the application according to a scanning instruction of a user; sending the coding information and the acquired user information to a server, so that the server verifies the user identity information indicated by the user information according to the coding information to verify whether the user is authorized to use the target terminal equipment; the server is used for: receiving coding information and user information which are sent by a user terminal and used for unlocking target terminal equipment, wherein the coding information is sent to the target terminal equipment by the server side in advance and is displayed by the target terminal equipment in a screen locking state; determining whether the user identity information indicated by the user information has the authority to use the target terminal equipment or not based on the coding information; and in response to the fact that the user identity information indicated by the user information has the authority of using the target terminal equipment, sending the user information and the indication information that the user identity passes the verification to the target terminal equipment, so that the target terminal equipment displays information for prompting the user to log in according to the indication information.
In a fifth aspect, an embodiment of the present disclosure provides an electronic device, including: one or more processors; storage means for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to implement the unlocking method of the first aspect, or the unlocking method of the second aspect, or the unlocking method of the third aspect.
In a sixth aspect, the disclosed embodiments provide a computer readable medium, on which a computer program is stored, which when executed by a processor implements the unlocking method according to the first aspect, or the unlocking method according to the second aspect, or the unlocking method according to the third aspect.
According to the unlocking method, the unlocking system and the electronic equipment, the coded information for unlocking the target terminal equipment is displayed in the screen locking state, wherein the coded information is used for a user to scan by using a user terminal, and the coded information and the user information are sent to the server by the user terminal, so that the server verifies the user information based on the coded information; responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in; and responding to the received preset operation executed by the user based on the login information, and unlocking the target terminal equipment. The application and the server are used for communicating with the target terminal device, and the requirement for the permission of the target terminal device in a public environment is met. According to the scheme, a card used for confirming the identity of the user and held by the user is not needed, on one hand, the cost of using the target public target terminal equipment can be saved, and on the other hand, convenience is provided for the user to use the target public terminal equipment.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
FIG. 1 is a flow diagram of one embodiment of an unlocking method according to the present disclosure;
FIG. 2 is a flow diagram of another embodiment of an unlocking method according to the present disclosure;
FIG. 3 is a flow diagram of yet another embodiment of an unlocking method according to the present disclosure;
FIG. 4 is a schematic illustration of an unlocking method according to the present disclosure;
FIG. 5 is a schematic view of an unlocking system of one embodiment of the present disclosure;
fig. 6 is a schematic diagram of a basic structure of an electronic device provided according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Referring to fig. 1, a flow of one embodiment of an unlocking method according to the present disclosure is shown. The unlocking method as shown in fig. 1 includes the following steps:
and step 101, displaying coding information for unlocking the target terminal equipment in a screen locking state.
In this embodiment, the target terminal device may establish a communication connection with the server through the communication network in advance. The target terminal device can receive the coding information sent by the server side.
The target terminal device may be a terminal device in a public environment, such as a public printer provided inside a company for use by employees of the company.
The target terminal device may be a terminal device having a display screen.
And when the target terminal equipment is in a standby state, the screen can be locked. And under the screen locking state, the user cannot operate the task page of the target terminal equipment. Taking a printer as an example, in a state where the printer is locked, a user cannot use the printer to perform services such as printing or scanning.
The encoded information may comprise information characterizing the identity of the target terminal device. The encoded information may be a bar code, a two-dimensional code, or other encoded information that has been developed or is yet to be developed.
The coding information can be used for a user to scan by using a user terminal, and the terminal sends the coding information and the user information to the server so that the server verifies the user information based on the coding information.
The user terminal here may be any mobile terminal used by the user. Mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), and the like.
The mobile terminal may have a scanning function. By scanning the coded information, the user can acquire the identity information of the target terminal device.
The user terminal can establish communication connection with the server terminal through the network in advance.
The user terminal can send the scanned coding information and the user identity information to the server side.
And 102, responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in.
And 103, responding to the received preset operation executed by the user based on the login information, and unlocking the target terminal equipment.
The server receives the coding information and the user information sent by the user terminal. The user identity information indicated by the user information may be verified. To determine whether the user identity information has the authority to use the target terminal device indicated by the encoded information.
Specifically, the server may store a user list having a right to use the target terminal device in advance. Or the server can access the electronic equipment which stores the user list with the authority of using the target terminal equipment through the network. The user list may include user identity information corresponding to each of the plurality of users. The user identity information may include, for example, a user name, a user contact address, and the like.
And when the server determines that the user identity information indicated by the user information has the authority of using the target terminal equipment, determining that the user information passes verification. The verified user information may be sent to the target terminal device over a network.
After receiving the verified user information sent by the server, the target terminal device may display information for prompting the user to log in a screen-locked state.
In some application scenarios, the information for prompting the user to log in may include information for prompting the user to perform a preset operation. The preset operation here may be, for example, a pressing operation or the like performed on a certain operation button provided on the body of the target terminal device.
In some optional implementations of this embodiment, the step 102 may include: and displaying a display window for prompting the user to unlock the information of the target terminal equipment in response to the received user information.
In these alternative implementations, the target terminal device may have a larger display screen. In the display screen, a display window for prompting a user to unlock information of the target terminal device may be displayed. The presentation window may be displayed over the lock screen window.
The display window may display information for prompting a user to perform a preset operation to unlock the target terminal device.
In addition, the display window can also comprise identity information of the user.
Accordingly, the step 103 may include unlocking the target terminal device in response to receiving a preset operation performed by a user based on the information for unlocking the target terminal device displayed in the display window.
That is, after the user performs the preset operation indicated by the information for prompting the user to unlock the target terminal device, the target terminal device may be unlocked. Taking the printer as an example, after the printer is unlocked, the screen locking state can enter a state in which services such as printing or scanning can be provided.
In these alternative implementations, the user may perform the preset operation for unlocking the target terminal device through the prompt message, which provides convenience for the user to unlock the target terminal device compared to a way in which the user needs to memorize or look up information for the preset operation for unlocking the target terminal device at another place in the front.
Further optionally, an unlock selection control for unlocking the target terminal device may be included in the display window, and the step 103 may include unlocking the target terminal device in response to receiving a preset operation performed on the unlock selection control by a user.
In these alternative implementations, the display screen of the target terminal device may be a display screen with a touch function. The user can execute selection operations such as clicking and touching on the unlocking selection control, so that the target terminal equipment is unlocked.
In these alternative implementations, the hardware button on the target terminal device may be replaced with an unlock selection control displayed on the display screen row. On one hand, the structure of the target terminal device can be simplified, and on the other hand, the problem of inconvenience caused by the fact that a user searches a key for unlocking the target terminal device on a target terminal device body is solved.
In the unlocking method provided by this embodiment, the coded information for unlocking the target terminal device is displayed in the screen locking state, wherein the coded information is used for a user to scan by using a user terminal, and the user terminal sends the coded information and user information to the server, so that the server verifies the user information based on the coded information; responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in; and responding to the received preset operation executed by the user based on the login information, and unlocking the target terminal equipment. The application program and the server arranged on the user terminal are used for communicating with the target terminal equipment, so that the requirement on the permission use of the common target terminal equipment in a public environment is met. Compared with the mode of verifying the user identity and unlocking the target terminal equipment by using the user card held by the user, the scheme does not need the user card held by the user for confirming the user identity, so that the cost for using the common target terminal equipment can be saved on one hand, and convenience is provided for the user to use the common target terminal equipment on the other hand.
In some optional implementations of this embodiment, the method further includes the steps of:
firstly, at least one service option provided by the target terminal equipment is displayed in a display window of the unlocked target terminal equipment.
Secondly, in response to receiving the selection operation of the user on the service item, the operation matched with the service item selected by the user is executed.
Taking the target terminal device as a printer as an example, the service options may be: printing, scanning, copying.
Further, the above-mentioned performing, in response to receiving a selection operation of the service item by the user, an operation matching the service item selected by the user includes: in response to receiving a selection operation of a service selection item by a user, displaying a receiver option, wherein the receiver option comprises at least one of the following items: the system comprises an address list of a plurality of receivers, a new option for a user to edit the receivers, a mobile terminal matched with the user, a user terminal matched with the user and a mailbox of the user; the user terminal matched with the user, the personal folder matched with the user and the mailbox of the user are obtained from the user information of the user.
In these optional implementation manners, the mobile terminal, the personal folder matched with the user, and the mailbox of the user may all be obtained from the user information sent by the server.
Referring to fig. 2, a flow of another embodiment of an unlocking method according to the present disclosure is shown. As shown in fig. 2, the unlocking method is applied to a user terminal, and includes the following steps:
step 201, when a preset application is running, according to a scanning instruction of a user, scanning coding information for unlocking a target terminal device, which is displayed on a display screen of the target terminal device, by using a scanning function of the application.
In this embodiment, the user terminal may be any mobile terminal, for example:
the user terminal may communicate with the server over a network.
The user terminal may install various applications. The user terminal may run a preset application according to an instruction of a user. The preset application may include, for example, an office application and an instant messaging application.
When the user terminal runs the preset application, the coded information which is displayed on the display screen of the target terminal equipment and used for unlocking the target terminal equipment is scanned by using the scanning function of the application according to the scanning instruction of the user.
The preset application can embed the scanning function.
In addition, the coded information for unlocking the target terminal device may be a barcode, a two-dimensional code, or other coded information that has been developed or is to be developed in the future. The encoded information may be sent by the server to the target terminal device through the network. And the target terminal equipment displays the target terminal equipment in the screen locking state. The encoded information may include identity information of the target terminal device, password information for unlocking the target terminal device, and the like.
The identity information of the destination terminal device may include, for example, a serial number of the destination terminal device, an ip address used by the destination terminal device, and the like.
In some application scenarios, after the user terminal scans the encoded information, the identity information of the target terminal device and the password information for unlocking the target terminal device in the encoded information may be identified.
Step 202, sending the encoded information and the acquired user information to the server, so that the server verifies the user identity information indicated by the user information according to the encoded information, so as to verify whether the user is authorized to use the target terminal device.
The user terminal can obtain the user information and send the user information and the coding information to the server side.
After receiving the coding information and the coding information, the server first determines whether the coding information is currently valid coding information. If the coded information is judged to be the currently effective coded information, the server can continuously verify whether the user identity information of the user has the authority of using the target terminal equipment.
Specifically, the server may access a preset user list provided locally or in the electronic device with which the communication connection is established. The preset user list stores the identity information of the target terminal device and the user identity information of a plurality of users using the target terminal device in a related manner. The user identity information may include, but is not limited to, a user name and a user contact address of the user.
The server side can match the user identity information indicated by the user information sent by the user terminal with the preset user list, if the matching is successful, the verification of the user identity information is determined to be passed, otherwise, the verification is not passed.
According to the unlocking method provided by the embodiment, when a preset application is operated, according to a scanning instruction of a user, the coding information for unlocking the target terminal equipment, which is displayed on a display screen of the target terminal equipment, is scanned by using the scanning function of the application; and sending the coded information and the acquired user information to a server so that the server verifies the user identity information indicated by the user information according to the coded information to verify whether the user is authorized to use the target terminal equipment. The application program and the server arranged on the user terminal are used for communicating with the target terminal equipment, so that the requirement on the permission use of the common target terminal equipment in a public environment is met. Compared with the mode of verifying the user identity by using the user card held by the user and unlocking the target terminal equipment, the scheme does not need the user card held by the user for confirming the user identity, so that the cost for using the target terminal equipment in a public environment can be saved, and convenience is provided for the user to use the target terminal equipment.
In some optional implementations of this embodiment, before the step 202, the unlocking method further includes the following steps:
firstly, after scanning the coded information by using the scanning function of the application, calling a preset embedded application which is embedded in the application in advance and performs information interaction with a server; secondly, acquiring user information through the embedded application.
Further, step 202 may include sending the user information and the encoded information to a server by using the embedded application.
In these optional implementation manners, by embedding the preset embedded application that performs information interaction with the server in the application, information interaction with the server of the target terminal device can be performed with a smaller amount of embedded application, and load of the user terminal can be reduced.
Referring to fig. 3, a flow of yet another embodiment of an unlocking method according to the present disclosure is shown. As shown in fig. 3, the unlocking method is applied to a server, and includes the following steps:
step 301, receiving coding information and user information sent by a user terminal for unlocking a target terminal device, wherein the coding information is obtained by scanning the coding information by the user terminal.
The coded information is sent to the target terminal device by the server side in advance and is displayed by the target terminal device in a screen locking state.
In this embodiment, the server may establish a communication connection with the target terminal device through a network in advance. The server side can send the coded information for unlocking to the target terminal equipment. The codes can be displayed when the target terminal device is in a standby screen locking state.
The encoded information may comprise information characterizing the identity of the target terminal device. The encoded information may be a bar code, a two-dimensional code, or other encoded information that has been developed or is yet to be developed.
Step 302, based on the above-mentioned coded information, determining whether the user identity information indicated by the user information has the authority to use the target terminal device.
After receiving the coding information and the coding information, the server first determines whether the coding information is currently valid coding information. If the coded information is judged to be the currently effective coded information, the server can continuously verify whether the user identity information of the user has the authority of using the target terminal equipment.
Specifically, the server may access a preset user list provided locally or in the electronic device with which the communication connection is established. The preset user list stores the identity information of the target terminal device and the user identity information of a plurality of users using the target terminal device in a related manner. The user identity information may include, but is not limited to, a user name and a user contact address of the user.
The server may match the user identity information indicated by the user information sent by the user terminal with the preset user list, and if the matching is successful, it is determined that the user indicated by the user identity information has the right to use the target terminal device. Otherwise, determining that the user indicated by the user identity information does not have the right to use the target terminal equipment.
Step 303, in response to determining that the user identity information indicated by the user information has the right to use the target terminal device, sending the user information and the indication information that the user identity verification passes to the target terminal device, so that the target terminal device displays information for prompting the user to log in according to the indication information.
After receiving the verified user information sent by the server, the target terminal device may display information for prompting the user to log in a screen-locked state.
In some application scenarios, the information for prompting the user to log in may include information for prompting the user to perform a preset operation. The preset operation here may be, for example, a pressing operation or the like performed on a certain operation button provided on the body of the target terminal device.
In some other application scenarios, the target terminal device may present a presentation window for prompting the user to unlock information of the target terminal device.
In these alternative implementations, the target terminal device may have a larger display screen. In the display screen, a display window for prompting a user to unlock information of the target terminal device may be displayed. The presentation window may be displayed over the lock screen window.
The display window may display information for prompting a user to perform a preset operation to unlock the target terminal device.
In addition, the display window can also comprise identity information of the user.
After the user performs the preset operation indicated by the information for prompting the user to unlock the target terminal device, the target terminal device may be unlocked. Taking the target terminal device as the printer as an example, when the printer is unlocked, that is, the printer may enter a state capable of providing services such as printing or scanning from the screen locking state.
Further, an unlocking selection control for unlocking the target terminal device may be included in the presentation window. And when receiving a preset operation executed by the user on the unlocking selection control, unlocking the target terminal equipment.
In the unlocking method provided by this embodiment, coded information and user information which are sent by a user terminal and used for unlocking a target terminal device are received, the coded information is sent to the target terminal device by the server in advance and is displayed by the target terminal device in a screen locking state, and the coded information is obtained by scanning the coded information by the user terminal; determining whether the user identity information indicated by the user information has the authority to use the target terminal equipment or not based on the coding information; and in response to the fact that the user identity information indicated by the user information has the authority of using the target terminal equipment, sending the user information and the indication information that the user identity passes the verification to the target terminal equipment, so that the target terminal equipment displays information for prompting the user to log in according to the indication information. The application and the server arranged on the user terminal are used for communicating with the target terminal equipment, so that the requirement on the permission use of the common target terminal equipment in a public environment is met. According to the scheme, a card used for confirming the identity of the user and held by the user is not needed, on one hand, the cost of using the target terminal device in a public environment can be saved, and on the other hand, convenience is provided for the user to use the target terminal device.
Referring to fig. 4, fig. 4 shows a schematic diagram of an unlocking method according to the present disclosure.
The following description will be given taking the target terminal device as a printer as an example. As shown in fig. 4, the printer displays the code information 401 for unlocking the printer in the standby screen lock state. And the coded information is sent by the server. The coding information is updated by the server at each preset time interval. The user may use the terminal device to scan the encoded information 402 displayed on the printer display. The encoded information may include identity information of the printer and password information for unlocking the printer. The terminal device can send the scanned coding information and the user information to the server. And the server judges whether the coding information is valid currently. If the encoded information is valid, the server can determine whether the user identity information indicated by the user information has the authority to use the printer. And if the user identity information is determined to have the authority of using the printer, sending the user information to the printer. The printer acquires user information 403 from the server. The printer displays information for prompting a user to perform a preset operation to unlock the printer. The user can execute the preset operation according to the information for prompting the user to execute the preset operation to unlock the printer. The preset operation may be, for example, a touch operation performed by the user on the unlock selection control displayed in the prompt information. After receiving a preset operation 404 performed by the user according to the prompt information displayed on the printer, the printer may be unlocked. After the printer is unlocked, the printer menu home page 405 can be entered. After the printer enters the printer menu home page, the user may select a service option provided by the printer menu home page to cause the printer to provide the corresponding service.
Referring to fig. 5, fig. 5 illustrates an exemplary system architecture in which the unlocking method of one embodiment of the present disclosure may be applied.
As shown in fig. 5, the system architecture may include user terminals 501, 502, a server 503 and a target terminal device 504. The user terminals 501 and 502 and the target terminal device can establish communication connection with the server through the network respectively. The network herein may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user terminals 501, 502 may interact with a server over a network to receive or send messages or the like. The user terminals 501, 502 may have various client applications installed thereon, such as a multimedia conference application, an instant messaging application, and the like. The client application in the user terminal 501, 502 may receive the instruction of the user and perform a corresponding function according to the instruction of the user, for example, send information (the information may include, for example, encoded information displayed by the scanning target terminal device and user information) to the server 503 according to the instruction of the user.
The user terminals 501 and 502 may be hardware or software. When the user terminals 501, 502 are hardware, they may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, and the like. When the user terminals 501 and 502 are software, they can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., software or software modules used to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The user terminals 501, 502 may be configured to: when a preset application is operated, scanning coded information which is displayed on a display screen of target terminal equipment and used for unlocking the target terminal equipment by using a scanning function of the application according to a scanning instruction of a user; and sending the coded information and the acquired user information to a server so that the server verifies the user identity information indicated by the user information according to the coded information to verify whether the user is authorized to use the target terminal equipment.
The target terminal device 504 may be various types of common terminal devices such as a printer, a copier, a facsimile machine, and the like. The target terminal device may perform information interaction with the server 503 through a network. And presents information from the server 503 (e.g., encoded information for unlocking the target terminal device). The target terminal device is configured to: displaying coding information for unlocking target terminal equipment in a screen locking state, wherein the coding information is used for a user to scan by using a user terminal, and the user terminal sends the coding information and user information to a server so that the server verifies the user information based on the coding information; responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in; and responding to the received preset operation executed by the user based on the login information, and unlocking the target terminal equipment.
The server 503 may be a server that provides various services, such as sending information for unlocking the target terminal device to the target terminal device 504; receiving the information sent by the user terminals 501 and 502, analyzing the received information of the user terminals, and sending the analysis processing result to the target terminal device 504.
The server 503 is configured to: receiving coding information and user information which are sent by a user terminal and used for unlocking target terminal equipment, wherein the coding information is sent to the target terminal equipment by the server side in advance and is displayed by the target terminal equipment in a screen locking state; determining whether the user identity information indicated by the user information has the authority to use the target terminal equipment or not based on the coding information; and in response to the fact that the user identity information indicated by the user information has the authority of using the target terminal equipment, sending the user information and the indication information that the user identity passes the verification to the target terminal equipment, so that the target terminal equipment displays information for prompting the user to log in according to the indication information.
It should be noted that the unlocking method provided by the embodiment of the present disclosure may be executed by the server 503, may also be executed by the user terminal, and may also be executed by the target terminal device.
It should be understood that the number of user terminals, target terminal devices, networks and servers in fig. 5 is merely illustrative. There may be any number of user terminals, target terminal devices, networks, and servers, as desired for implementation.
Referring now to fig. 6, a schematic diagram of an electronic device (e.g., the user terminal, the target terminal device, and the server in fig. 5) suitable for implementing embodiments of the present disclosure is shown. The user terminal in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device to communicate with other devices wirelessly or by wire to exchange data. While fig. 6 illustrates an electronic device having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: displaying coding information for unlocking target terminal equipment in a screen locking state, wherein the coding information is used for a user to scan by using a user terminal, and the user terminal sends the coding information and user information to a server so that the server verifies the user information based on the coding information; responding to the received authenticated user information sent by the server, and displaying information for prompting the user to log in; and responding to the received preset operation executed by the user based on the login information, and unlocking the target terminal equipment. Or
When a preset application is operated, scanning coded information which is displayed on a display screen of target terminal equipment and used for unlocking the target terminal equipment by using a scanning function of the application according to a scanning instruction of a user; and sending the coded information and the acquired user information to a server so that the server verifies the user identity information indicated by the user information according to the coded information to verify whether the user is authorized to use the target terminal equipment. Or
Receiving coding information and user information which are sent by a user terminal and used for unlocking target terminal equipment, wherein the coding information is sent to the target terminal equipment by the server side in advance and is displayed by the target terminal equipment in a screen locking state, and the coding information is obtained by scanning the coding information by the user terminal; determining whether the user identity information indicated by the user information has the authority to use the target terminal equipment or not based on the coding information; and in response to the fact that the user identity information indicated by the user information has the authority of using the target terminal equipment, sending the user information and the indication information that the user identity passes the verification to the target terminal equipment, so that the target terminal equipment displays information for prompting the user to log in according to the indication information.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Here, the name of a unit does not constitute a limitation of the unit itself in some cases, and for example, the acquisition unit may also be described as "a unit for acquiring log information to be analyzed".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (12)

1.一种解锁方法,包括:1. An unlocking method, comprising: 在锁屏状态下显示用于解锁目标终端设备的编码信息,其中,所述编码信息供用户使用用户终端扫描,并由用户终端将所述编码信息与用户信息发送给服务端,以使服务端基于所述编码信息对所述用户信息进行验证;In the locked screen state, the coded information for unlocking the target terminal device is displayed, wherein the coded information is scanned by the user using the user terminal, and the user terminal sends the coded information and the user information to the server, so that the server can verifying the user information based on the encoded information; 响应于接收到服务端发送的通过验证的用户信息,显示用于提示用户登录的信息;In response to receiving the verified user information sent by the server, displaying information for prompting the user to log in; 响应于接收到用户基于所述登录信息执行的预设操作,解锁所述目标终端设备。In response to receiving a preset operation performed by the user based on the login information, the target terminal device is unlocked. 2.根据权利要求1所述的方法,其特征在于,所述响应于接收到服务端发送的通过验证的用户信息,显示用于提示用户登录的信息,包括:2. The method according to claim 1, wherein, in response to receiving the authenticated user information sent by the server, displaying information for prompting the user to log in, comprising: 响应于接收到所述用户信息,展示用于提示用户解锁目标终端设备的信息的展示窗口;以及In response to receiving the user information, presenting a presentation window for prompting the user to unlock the information of the target terminal device; and 所述响应于接收到用户基于所述登录信息执行的预设操作,解锁所述目标终端设备,包括:The unlocking the target terminal device in response to receiving the preset operation performed by the user based on the login information includes: 响应于接收到用户基于所述展示窗口展示的用于解锁所述目标终端设备的信息而执行的预设操作,解锁所述目标终端设备。The target terminal device is unlocked in response to receiving a preset operation performed by the user based on the information displayed by the display window for unlocking the target terminal device. 3.根据权利要求2所述的方法,其特征在于,所述展示窗口包括用于解锁所述目标终端设备的解锁选择控件;以及3. The method of claim 2, wherein the presentation window includes an unlock selection control for unlocking the target terminal device; and 所述响应于接收到用户基于所述展示窗口展示的用于解锁所述目标终端设备的信息而执行的预设操作,解锁所述目标终端设备,包括:The unlocking of the target terminal device in response to receiving the preset operation performed by the user based on the information for unlocking the target terminal device displayed by the display window includes: 响应于接收到用户对所述解锁选择控件执行的预设操作,解锁所述目标终端设备。In response to receiving a preset operation performed by the user on the unlock selection control, the target terminal device is unlocked. 4.根据权利要求1所述的方法,其特征在于,所述方法还包括:4. The method according to claim 1, wherein the method further comprises: 在解锁的所述目标终端设备的显示窗口中展示至少一项目标终端设备提供的服务选择项;Displaying at least one service option provided by the target terminal device in the unlocked display window of the target terminal device; 响应于接收到用户对服务项目的选择操作,执行与用户所选择的服务选择项匹配的操作。In response to receiving a user selection operation for a service item, an operation matching the service selection item selected by the user is performed. 5.根据权利要求4所述的方法,其特征在于,5. The method according to claim 4, characterized in that, 所述响应于接收到用户对服务项目的选择操作,执行与用户所选择的服务选择项匹配的操作,包括:In response to receiving the user's selection operation on the service item, performing an operation matching the service selection item selected by the user includes: 响应于接收到用户对服务选择项的选择操作,显示接收方选项,所述接收方选项包括以下至少一项:In response to receiving a user selection operation for a service selection item, a recipient option is displayed, the recipient option including at least one of the following: 包括多个接收方的地址列表、供用户编辑接收方新的选项、与所述用户匹配的移动端、与所述用户匹配的用户终端、所述用户的邮箱;其中It includes a list of addresses of multiple recipients, a new option for the user to edit recipients, a mobile terminal matched with the user, a user terminal matched with the user, and the user's mailbox; wherein 所述与所述用户匹配的用户终端、与用户匹配的个人文件夹、所述用户的邮箱由所述用户的用户信息中获得。The user terminal matched with the user, the personal folder matched with the user, and the user's mailbox are obtained from the user information of the user. 6.一种解锁方法,包括:6. An unlocking method, comprising: 在运行预设应用时,根据用户的扫描指令,利用所述应用的扫描功能扫描显示在目标终端设备显示屏上的用于解锁目标终端设备的编码信息;When running the preset application, use the scanning function of the application to scan the encoded information displayed on the display screen of the target terminal device for unlocking the target terminal device according to the user's scan instruction; 将所述编码信息以及所获取的用户信息发送给服务端,以使服务端根据所述编码信息对所述用户信息所指示的用户身份信息进行验证,以验证用户是否有权使用所述目标终端设备。Send the encoding information and the acquired user information to the server, so that the server verifies the user identity information indicated by the user information according to the encoding information, to verify whether the user has the right to use the target terminal equipment. 7.根据权利要求6所述的方法,其特征在于,在所述将所述编码信息以及所获取的用户信息发送给服务端之前,所述方法还包括:7. The method according to claim 6, characterized in that, before the encoding information and the acquired user information are sent to the server, the method further comprises: 在利用所述应用的扫描功能扫描所述编码信息之后,调用预先嵌入在所述应用中的与所述服务端进行信息交互的预设嵌入应用;After using the scanning function of the application to scan the encoded information, call a preset embedded application that is pre-embedded in the application for information interaction with the server; 利用所述嵌入应用通过所述应用获取用户信息;以及using the embedded application to obtain user information through the application; and 所述将所述编码信息以及所获取的用户信息发送给服务端,包括:The sending of the encoded information and the acquired user information to the server includes: 利用所述预设嵌入应用将所述用户信息与所述编码信息发送给服务端。The user information and the encoded information are sent to the server by using the preset embedded application. 8.一种解锁方法,包括:8. An unlocking method, comprising: 接收用户终端发送的用于解锁目标终端设备的编码信息和用户信息,所述编码信息由所述服务端预先发送给所述目标终端设备的,并由所述目标终端设备在其锁屏状态下显示,所述编码信息由用户终端扫描编码信息得到;Receive the encoding information and user information sent by the user terminal for unlocking the target terminal device, the encoding information is pre-sent to the target terminal device by the server, and the target terminal device is in its screen-locked state. display, the encoded information is obtained by scanning the encoded information by the user terminal; 基于所述编码信息,确定所述用户信息所指示的用户身份信息是否具有使用所述目标终端设备的权限;Based on the encoded information, determine whether the user identity information indicated by the user information has the right to use the target terminal device; 响应于确定所述用户信息所指示的用户身份信息具有使用所述目标终端设备的权限,将所述用户信息以及用户身份验证通过的指示信息发送给所述目标终端设备,以使所述目标终端设备根据所述指示信息显示用于提示用户登录的信息。In response to determining that the user identity information indicated by the user information has the right to use the target terminal device, send the user information and the indication information indicating that the user identity verification is passed to the target terminal device, so that the target terminal The device displays information for prompting the user to log in according to the indication information. 9.根据权利要求8所述的方法,其特征在于,所述方法还包括:9. The method according to claim 8, wherein the method further comprises: 每隔预设时间间隔更新一次向所述目标终端设备发送的编码信息;以及updating the encoding information sent to the target terminal device every preset time interval; and 所述基于所述编码信息,确定所述用户信息所指示的用户身份信息是否有权使用所述目标终端设备,包括:The determining whether the user identity information indicated by the user information is authorized to use the target terminal device based on the encoded information includes: 确定所述编码信息是否为当前有效的编码信息;determining whether the encoding information is currently valid encoding information; 响应于确定所述编码信息为当前有效的编码信息,从所述用户信息中提取用户身份信息,并确定所述用户身份信息是否有权使用所述目标终端设备。In response to determining that the encoding information is currently valid encoding information, user identity information is extracted from the user information, and it is determined whether the user identity information is authorized to use the target terminal device. 10.一种解锁系统,包括:10. An unlocking system comprising: 目标终端设备,用户终端以及服务端,其中Target terminal equipment, user terminal and server, among which 所述目标终端设备用于:在锁屏状态下显示用于解锁所述目标终端设备的编码信息,其中,所述编码信息供用户使用用户终端扫描,并由用户终端将所述编码信息与用户信息发送给服务端,以使服务端基于所述编码信息对所述用户信息进行验证;响应于接收到服务端发送的通过验证的用户信息,显示用于提示用户登录的信息;响应于接收到用户基于所述登录信息执行的预设操作,解锁所述目标终端设备;The target terminal device is used to: display the coded information for unlocking the target terminal device in a locked screen state, wherein the coded information is for the user to scan by using the user terminal, and the user terminal associates the coded information with the user. The information is sent to the server, so that the server verifies the user information based on the encoded information; in response to receiving the verified user information sent by the server, displaying information for prompting the user to log in; in response to receiving a preset operation performed by the user based on the login information to unlock the target terminal device; 所述用户终端用于:在运行预设应用时,根据用户的扫描指令,利用所述应用的扫描功能扫描显示在目标终端设备显示屏上的用于解锁目标终端设备的编码信息;将所述编码信息以及所获取的用户信息发送给服务端,以使服务端根据所述编码信息对所述用户信息所指示的用户身份信息进行验证,以验证用户是否有权使用所述目标终端设备;The user terminal is used for: when running the preset application, according to the user's scanning instruction, use the scanning function of the application to scan the coded information displayed on the display screen of the target terminal device for unlocking the target terminal device; The encoded information and the acquired user information are sent to the server, so that the server verifies the user identity information indicated by the user information according to the encoded information, to verify whether the user has the right to use the target terminal device; 所述服务端用于:接收用户终端发送的用于解锁目标终端设备的编码信息和用户信息,所述编码信息由所述服务端预先发送给所述目标终端设备的,并由所述目标终端设备在其锁屏状态下显示;基于所述编码信息,确定所述用户信息所指示的用户身份信息是否具有使用所述目标终端设备的权限;响应于确定所述用户信息所指示的用户身份信息具有使用所述目标终端设备的权限,将所述用户信息以及用户身份验证通过的指示信息发送给目标终端设备,以使目标终端设备根据所述指示信息显示用于提示用户登录的信息。The server is used to: receive the encoding information and user information sent by the user terminal for unlocking the target terminal device, the encoding information is pre-sent by the server to the target terminal device, and the target terminal is sent by the target terminal. The device is displayed in its locked screen state; based on the encoded information, determining whether the user identity information indicated by the user information has the right to use the target terminal device; in response to determining the user identity information indicated by the user information Having the right to use the target terminal device, the user information and the indication information indicating that the user identity verification is passed are sent to the target terminal device, so that the target terminal device displays information for prompting the user to log in according to the indication information. 11.一种电子设备,其特征在于,包括:11. An electronic device, characterized in that, comprising: 一个或多个处理器;one or more processors; 存储装置,用于存储一个或多个程序,storage means for storing one or more programs, 当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-5中任一所述的方法,或者实现如权利要求6或7所述的方法,或者实现如权利要求8或9所述的方法。The one or more programs, when executed by the one or more processors, cause the one or more processors to implement a method as claimed in any one of claims 1-5, or to implement a method as claimed in claim 6 or 7, or implement the method of claim 8 or 9. 12.一种计算机可读介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现权利要求1-5中任一所述的方法,或者实现如权利要求6或7所述的方法,或者实现如权利要求8或9所述的方法。12. A computer-readable medium on which a computer program is stored, characterized in that, when the program is executed by a processor, the method of any one of claims 1-5 is implemented, or the method as claimed in claim 6 or 7 is implemented. the method described, or implement the method described in claim 8 or 9.
CN202011499659.8A 2020-12-17 2020-12-17 Unlocking method and system and electronic equipment Pending CN112527218A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011499659.8A CN112527218A (en) 2020-12-17 2020-12-17 Unlocking method and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011499659.8A CN112527218A (en) 2020-12-17 2020-12-17 Unlocking method and system and electronic equipment

Publications (1)

Publication Number Publication Date
CN112527218A true CN112527218A (en) 2021-03-19

Family

ID=75001159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011499659.8A Pending CN112527218A (en) 2020-12-17 2020-12-17 Unlocking method and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN112527218A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002063008A (en) * 2000-08-22 2002-02-28 Ricoh Co Ltd Printer user restriction system
JP2004295530A (en) * 2003-03-27 2004-10-21 Dainippon Printing Co Ltd Print delivery system, image printing device, program, recording medium
US20090320127A1 (en) * 2008-06-24 2009-12-24 Ricoh Company, Ltd. Approach for Printing Locked Print Data Using User and Print Data Authentication
CN106708448A (en) * 2016-11-18 2017-05-24 云南青才信息科技有限公司 Two-dimensional code-based cloud printing system
CN107464375A (en) * 2016-06-03 2017-12-12 南京信安宝信息科技有限公司 A kind of scanning Quick Response Code enters the method for printing of racking
CN110187849A (en) * 2019-04-30 2019-08-30 广州迅维信息安全技术有限公司 Method of printing and device based on two dimensional code
CN110196698A (en) * 2019-04-30 2019-09-03 广州迅维信息安全技术有限公司 Method of printing and device based on mobile terminal
US20200073606A1 (en) * 2017-07-14 2020-03-05 Hewlett-Packard Development Company, L.P. Printing method and system using cloud

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002063008A (en) * 2000-08-22 2002-02-28 Ricoh Co Ltd Printer user restriction system
JP2004295530A (en) * 2003-03-27 2004-10-21 Dainippon Printing Co Ltd Print delivery system, image printing device, program, recording medium
US20090320127A1 (en) * 2008-06-24 2009-12-24 Ricoh Company, Ltd. Approach for Printing Locked Print Data Using User and Print Data Authentication
CN107464375A (en) * 2016-06-03 2017-12-12 南京信安宝信息科技有限公司 A kind of scanning Quick Response Code enters the method for printing of racking
CN106708448A (en) * 2016-11-18 2017-05-24 云南青才信息科技有限公司 Two-dimensional code-based cloud printing system
US20200073606A1 (en) * 2017-07-14 2020-03-05 Hewlett-Packard Development Company, L.P. Printing method and system using cloud
CN110187849A (en) * 2019-04-30 2019-08-30 广州迅维信息安全技术有限公司 Method of printing and device based on two dimensional code
CN110196698A (en) * 2019-04-30 2019-09-03 广州迅维信息安全技术有限公司 Method of printing and device based on mobile terminal

Similar Documents

Publication Publication Date Title
RU2580400C2 (en) Method for authentication of peripheral device user, peripheral device and system for authentication of peripheral device user
EP2883340B1 (en) Authorization method, apparatus, and system
CN107249004B (en) Identity authentication method, device and client
CN104320703A (en) Method, device and system for logging in intelligent television terminal
US11082813B2 (en) Message-based management service enrollment
US20210256481A1 (en) Resource reservation system, usage management method, and non-transitory recording medium
US11797947B2 (en) Resource reservation system, method for starting using resource, and non-transitory recording medium
US11429327B2 (en) Computer system, login screen display method, and storage medium for displaying an appropriate login screen
KR102535312B1 (en) Information processing method, information processing device, program and information processing terminal
EP4020157B1 (en) Output system, system, output method, and carrier means
EP3800540A1 (en) Program, information processing system, information processing method, and information processing apparatus
US10742650B2 (en) Communication system and computer readable storage medium
KR20230003228A (en) Document sharing processing methods, devices, devices, media and systems
CN111447191B (en) Information interaction method and device and electronic equipment
CN111241518B (en) User authentication method, device, equipment and medium
US11704079B2 (en) Output system, information processing system, including circuitry to generate a character string to perform authentication for a user, and authentication method
CN112507385B (en) Information display method and device and electronic equipment
JP6172443B2 (en) Information processing system, server device, information processing method, and program
CN112527218A (en) Unlocking method and system and electronic equipment
JP7151013B1 (en) Reception system and program
CN112667367A (en) Multi-tenant application jumping method and device, electronic equipment and storage medium
KR100630072B1 (en) Server-Driven Client Synchronization Method
JP2022064194A (en) Information processing system, output system, output method, program
CN111897620A (en) Interaction method and device and electronic equipment
CN112306597B (en) Interaction method, device and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination