CN114816689A - Background quick code scanning method and system, storage medium and computer equipment - Google Patents
Background quick code scanning method and system, storage medium and computer equipment Download PDFInfo
- Publication number
- CN114816689A CN114816689A CN202110122317.2A CN202110122317A CN114816689A CN 114816689 A CN114816689 A CN 114816689A CN 202110122317 A CN202110122317 A CN 202110122317A CN 114816689 A CN114816689 A CN 114816689A
- Authority
- CN
- China
- Prior art keywords
- application
- code scanning
- background
- code
- target application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 67
- 238000013475 authorization Methods 0.000 claims abstract description 97
- 238000004590 computer program Methods 0.000 claims abstract description 22
- 230000006870 function Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Toxicology (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Stored Programmes (AREA)
Abstract
The invention is suitable for the technical field of code scanning, and provides a background quick code scanning method, which comprises the following steps: calling a system code scanning application at the background according to the received code scanning instruction so as to scan and acquire a link address of the two-dimensional code; analyzing the target application of the link address and judging whether the target application is in a prefabricated application authorization list or not; and if the target application is in the application authorization list, starting the target application by a background to scan the code and identify the two-dimensional code. A background fast code scanning system, a storage medium for storing a computer program for executing the method, and a computer for implementing the method are also provided. Therefore, when the two-dimensional code is scanned, the code scanning action can be completed without manually opening the corresponding application or interrupting the current application interface operation, and the user experience is greatly improved.
Description
Technical Field
The invention relates to the technical field of code scanning, in particular to a background quick code scanning method, a background quick code scanning system, a storage medium and computer equipment.
Background
At present, a plurality of scenes needing code scanning often exist in life, a code scanning application is required to be opened and a code scanning interface is entered when code scanning is generally carried out, if other applications are used at the current terminal, the current program is required to be quitted for code scanning, the current operation of a user is interrupted, and the operation is very inconvenient.
However, after a plurality of existing two-dimensional codes are scanned, user operation is not needed, for example, after a single vehicle is shared, automatic unlocking is achieved, or after a user scans and adds a contact person, the user can click and add the contact person after the codes are scanned; obviously, most two-dimensional codes in life do not need the user to perform the next operation after scanning the codes, so that the user experience is easily influenced by the prior art that the user needs to quit the current program of the terminal and then scan the codes when scanning the codes, and the operation is not convenient enough.
In view of the above, the conventional method has many problems, and therefore, it is necessary to improve the method.
Disclosure of Invention
In view of the foregoing defects, an object of the present invention is to provide a background quick code scanning method, system, storage medium and computer device thereof, which can scan a two-dimensional code without manually opening a corresponding application or interrupting the operation of a current application interface, thereby greatly improving user experience.
In order to achieve the above object, the present invention provides a background fast code scanning method, which comprises the following steps:
calling a system code scanning application at the background according to the received code scanning instruction so as to scan and acquire a link address of the two-dimensional code;
analyzing the target application of the link address and judging whether the target application is in a prefabricated application authorization list or not;
and if the target application is in the application authorization list, starting the target application by a background to scan the code and identify the two-dimensional code.
Optionally, after the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list, the method further includes:
and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code.
Optionally, after the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list, the method further includes:
and if the target application is not in the application authorization list, generating a prompt message for binding the target application to the application authorization list.
Optionally, before the step of calling a system code scanning application in the background to scan and acquire the link address of the two-dimensional code according to the received code scanning instruction, the method further includes:
and triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy.
Still provide a backstage and sweep a yard system fast, include:
the code pre-scanning unit is used for calling a system code scanning application at the background according to the received code scanning instruction so as to scan and acquire a link address of the two-dimensional code;
the analysis and judgment unit is used for analyzing the target application of the link address and judging whether the target application is in a prefabricated application authorization list or not;
and the background code scanning unit is used for starting the target application in a background to scan the two-dimensional code and identify the two-dimensional code if the target application is in the application authorization list.
Optionally, the background code scanning unit is further configured to:
and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code.
Optionally, the method further includes:
and the prompting unit is used for generating a prompting message for binding the target application to the application authorization list if the target application is not in the application authorization list.
Optionally, the method further includes:
and the instruction triggering unit is used for triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy.
In addition, a storage medium and a computer device are provided, wherein the storage medium is used for storing a computer program for executing the background quick code scanning method.
The computer device comprises a storage medium, a processor and a computer program which is stored on the storage medium and can run on the processor, wherein the processor realizes the background quick code scanning method when executing the computer program.
According to the background quick code scanning method and the background quick code scanning system, a background calls a system code scanning application to scan so as to obtain a link address of a two-dimensional code; and analyzing the target application corresponding to the link address, further judging whether the target application is in a prefabricated application authorization list, and starting the target application in a background to scan the two-dimensional code if the target application is in the prefabricated application authorization list. The problem of sweep that the sign indicating number can break current application operation not convenient is solved for need not to manually to open corresponding application when scanning the two-dimensional code and sweep the sign indicating number, also need not to interrupt current application interface operation and can accomplish and sweep the sign indicating number action, promote user experience greatly.
Drawings
FIG. 1 is a flowchart illustrating steps of a background fast code scanning method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a background fast code scanning method according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps of a background fast code scanning method according to a third embodiment of the present invention;
FIG. 4 is a flowchart illustrating steps of a background fast code scanning method according to a fourth embodiment of the present invention;
FIG. 5 is a flowchart illustrating steps of a background fast code scanning method for analysis and judgment according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating steps for parsing and executing in a background fast code scanning method according to an embodiment of the present invention;
fig. 7 is a block diagram illustrating a background fast code scanning system according to an embodiment of the present invention;
FIG. 8 is a block diagram illustrating a background fast code scanning system according to another embodiment of the present invention;
fig. 9 is a block diagram illustrating a specific structure of the analysis and determination unit of the background fast code scanning system according to an embodiment of the present invention;
fig. 10 is a block diagram illustrating a specific structure of the parsing execution unit of the background fast code scanning system according to an embodiment of the present invention;
fig. 11 is a block diagram illustrating a specific structure of the pre-code-scanning unit of the background fast code-scanning system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that references in the specification to "one embodiment," "an example embodiment," etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not intended to refer to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
Moreover, where certain terms are used throughout the description and following claims to refer to particular components or features, those skilled in the art will understand that manufacturers may refer to a component or feature by different names or terms. This specification and the claims that follow do not intend to distinguish between components or features that differ in name but not function. In the following description and in the claims, the terms "include" and "comprise" are used in an open-ended fashion, and thus should be interpreted to mean "include, but not limited to. In addition, the term "connected" as used herein includes any direct and indirect electrical connection. Indirect electrical connection means include connection by other means.
Fig. 1 shows a background fast code scanning method provided in a first embodiment of the present invention, which is applied to an intelligent terminal, such as a mobile phone, a tablet computer, and the like, and the method includes:
step S101: and calling a system code scanning application in the background according to the received code scanning instruction so as to scan and acquire the link address of the two-dimensional code. The system code scanning application is a system unified code scanning application program, such as a code scanning function of a system camera or code scanning software of the system; in this embodiment, after the code scanning instruction is received, the background calls a code scanning application (that is, a system code scanning application) carried by the system itself to scan the two-dimensional code, and since the existing two-dimensional code is scanned and identified by an application opposite to the existing two-dimensional code, step S101 scans the two-dimensional code in the background by the code scanning application carried by the system itself to be a pre-scanned code, and if the two-dimensional code needs to be scanned and identified by a designated application, a string of link addresses appears when the code is scanned by the code scanning application carried by the system itself. In specific implementation, the link address may be obtained by identifying, copying and pasting the link address through image recognition or through a simulated click technique on an interface identified by a pre-scan code.
Step S102: and analyzing the target application of the link address, and judging whether the target application is in a preset application authorization list. The target application is code scanning identification software corresponding to the two-dimensional code, for example, the two-dimensional code generated by the WeChat application needs to be scanned and identified by the WeChat application, or the two-dimensional code of the shared bicycle application needs to be scanned and identified by the corresponding shared bicycle application. Therefore, after the link address pointed by the two-dimensional code is obtained, the target application corresponding to the link address is obtained through analysis; the application authorization list is specifically a set of at least one application bound to grant a background code scanning function, for example, at least one application such as a WeChat application, a Payment treasure application, and a shared bicycle application is bound to the application authorization list.
Step S103: and if the target application is in the application authorization list, starting the target application by a background to scan the code and identify the two-dimensional code. When the target application is matched with the application authorization list, the target application is automatically started in a background so as to perform code scanning identification on the two-dimensional code again; the user can configure the application authorization list according to specific requirements, and a plurality of applications installed in the terminal are bound in the application authorization list; when the target application pointed by the link address is bound to the application authorization list, the target application can be automatically started in a background and a system camera is called to automatically perform code scanning recognition, so that the operation steps of a user are simplified, the code scanning function can be automatically realized under the condition that the current operation interface of the user is not influenced, and the user experience is improved.
Fig. 2 shows a background fast code scanning method provided in a second embodiment of the present invention, which is applied to an intelligent terminal, such as a mobile phone, a tablet computer, and the like, and the method includes:
step S101: and calling a system code scanning application in the background according to the received code scanning instruction to scan and acquire the link address of the two-dimensional code.
Step S102: and analyzing the target application of the link address, and judging whether the target application is in a preset application authorization list.
Step S103: and if the target application is in the application authorization list, starting the target application by a background to scan the two-dimensional code for identification.
Step S104: and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code. The standby code scanning application can be a unified code scanning application carried by the system, and can also be a code scanning application installed by a third party installed by the terminal; in specific implementation, the standby code scanning application is set as a WeChat application, and if the target application pointed by the acquired link address is not bound to the application authorization list, the standby code scanning application is started to perform code scanning identification.
In other embodiments, if the target application is not bound to the application authorization list, skipping to a code scanning interface corresponding to the target application; or terminate execution and prompt the user directly.
Optionally, in the background fast code scanning method according to the first embodiment or the second embodiment, after the step S102, the method further includes:
and if the target application is not in the application authorization list, generating a prompt message for binding the target application to the application authorization list. In specific implementation, the prompt message is presented in a form of a popup message, and a user can select whether to bind the target application to the application authorization list according to the prompt message. Can indicate the user to add corresponding application name manually, carry out manual binding to this two-dimensional code and application, can automatic call application when the user scans this two-dimensional code again next time and sweep the sign indicating number.
Optionally, in an embodiment, before step S101, the method further includes:
and triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy. The instruction trigger policy is a generation rule of the background code scanning instruction. By defining a global code scanning triggering mode, for example, in any interface situation, no matter whether the screen is bright or dark, double-clicking a power key or other physical keys and/or virtual keys, a system unified code scanning application can be called and the code scanning function can be opened in a background mode. In specific implementation, double-click on a certain entity key on the terminal can be set, such as fast double-click on a volume key and the like; and calling a background code scanning program to execute corresponding operation in a preset triggering mode.
Referring to fig. 5, optionally, step S102 includes:
step S1021: and retrieving keywords in the link address, and analyzing according to the keywords to obtain a corresponding target application. The keywords are English or Chinese and other words; because the results of different two-dimensional code scanning are different, the actual two-dimensional code is only a string of links or numbers, and therefore the current application to which the two-dimensional code belongs can be judged according to the link content after the two-dimensional code scanning. For example, after scanning the two-dimensional code of the code WeChat contact, the returned link is https:// u.wechat.com/. or after scanning the two-dimensional code Paibao, the returned link is https:// qr.alipay.com/. or; therefore, when the link is identified to contain the 'wechat', the current two-dimensional code belongs to the WeChat application, and if the link is identified to contain the 'Alipay', the current two-dimensional code is the Paibao application; and setting corresponding keywords as the identification of the target application according to the actual situation during specific application.
Step S1022: and judging whether the target application is matched with any application in the application authorization list. And at least one authorized application is bound in the application authorization list, the step of searching the target application in the application authorization list is used for judging whether the target application is matched with the bound application, if the target application is matched with the bound application, the target application is judged to be bound in the application authorization list, and the target application can be started in a background to automatically perform code scanning identification.
Fig. 3 shows a background fast code scanning method provided in a third embodiment of the present invention, which is applied to an intelligent terminal, such as a mobile phone, a tablet computer, and the like, and the method includes:
step S101: and calling a system code scanning application in the background according to the received code scanning instruction so as to scan and acquire the link address of the two-dimensional code.
Step S102: and analyzing the target application of the link address, and judging whether the target application is in a preset application authorization list.
Step S103: and if the target application is in the application authorization list, starting the target application by the background to scan the code and identify the two-dimensional code.
Step S105: and analyzing and executing the operation items corresponding to the two-dimensional codes. The operation items are operation execution contents on the terminal after the two-dimension code is identified, for example, friend two-dimension codes are added in the WeChat application, and friend contacts are added after the two-dimension codes are scanned and identified.
Fig. 4 shows a background fast code scanning method provided in a fourth embodiment of the present invention, which is applied to an intelligent terminal, such as a mobile phone, a tablet computer, and the like, where the method includes:
step S101: and calling a system code scanning application in the background according to the received code scanning instruction so as to scan and acquire the link address of the two-dimensional code.
Step S102: and analyzing the target application of the link address, and judging whether the target application is in a preset application authorization list or not.
Step S103: and if the target application is in the application authorization list, starting the target application by the background to scan the code and identify the two-dimensional code.
Step S104: and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code.
Step S105: and analyzing and executing the operation items corresponding to the two-dimensional code.
Referring to fig. 6, in one embodiment, step S105 includes:
step S1051: and the background analyzes the operation items corresponding to the two-dimensional codes and judges whether the operation items prompt the input of account passwords or not. In specific implementation, whether an account password input field, keywords thereof and other information exist on an interface where the operation item is located can be judged through an image recognition technology, and if the information exists, it is judged that the current operation item needs a user to manually input an account password and the like.
Step S1052: and if the prompt account password is input, skipping the current interface of the terminal to the operation item. And at the moment, the current interface of the user terminal is jumped to the operation item, so that the user can input information such as account number and password by hand.
Step S1053: and if the account password is not prompted to be input, the background automatically executes the operation item. If the user does not need to input any information on the operation items, the corresponding operation items can be automatically executed in the background; such as code scanning unlocking, code scanning plus friend mode and the like.
In specific implementation, after the mobile phone background calls the relevant application to scan the code, the user can automatically confirm, so that user operation steps are reduced (for example, after the contact is scanned, the contact is automatically added, for example, after the public number is scanned, the user can automatically pay attention to the contact), and only when the password input is involved, the interface jumps to the application to prompt the user to confirm the password input.
Optionally, step S101 specifically includes:
judging whether the code scanning instruction is a preset background execution instruction or not; and if the instruction is a background execution instruction, calling a system code scanning application in the background to scan and acquire the link address of the two-dimensional code. If the user does not need to scan the code in the background, executing the code scanning step according to the normal operation logic; otherwise, if the current code scanning operation of the user needs background execution, triggering and generating a corresponding background execution instruction, and further starting a background code scanning program.
Optionally, step S102 further includes: the background startup function is authorized for at least one application program, and an application authorization list is generated according to the authorized application program. The embodiment only binds the application program which is granted to be started in the background into the application authorization list.
Fig. 7 shows a background fast code scanning system 100 according to the present invention, where the system 100 is applied to an intelligent terminal, such as a mobile phone, a tablet computer, and other devices; the system comprises: code scanning unit 10 in advance, analysis and judgment unit 20 and code scanning unit 30 in the background, wherein:
the pre-code scanning unit 10 is configured to call a system code scanning application in the background according to the received code scanning instruction to scan and acquire a link address of the two-dimensional code; the analysis and judgment unit 20 is configured to analyze the target application of the link address and judge whether the target application is in a pre-made application authorization list; the background code scanning unit 30 is configured to, if the target application is in the application authorization list, start the target application in a background to scan the two-dimensional code.
In specific implementation, the link address may be obtained by identifying, copying and pasting the link address through image recognition or through a simulated click technique on an interface identified by a pre-scan code. After a link address pointed by the two-dimensional code is obtained, a target application corresponding to the link address is obtained through analysis; the application authorization list is specifically a set of at least one application bound to grant a background code scanning function, for example, at least one application such as a WeChat application, a Payment treasure application, and a shared bicycle application is bound to the application authorization list. When the target application is matched with the application authorization list, the target application is automatically started in a background so as to perform code scanning identification on the two-dimensional code again; the user can configure the application authorization list according to specific requirements, and a plurality of applications installed in the terminal are bound in the application authorization list; when the target application pointed by the link address is bound to the application authorization list, the target application can be automatically started in a background and a system camera is called to automatically perform code scanning recognition, so that the operation steps of a user are simplified, the code scanning function can be automatically realized under the condition that the current operation interface of the user is not influenced, and the user experience is improved.
Optionally, the background code scanning unit is further configured to: and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code. The standby code scanning application can be a unified code scanning application carried by the system, and can also be a code scanning application installed by a third party of the terminal; in specific implementation, the standby code scanning application is set as a WeChat application, and if the target application pointed by the acquired link address is not bound to the application authorization list, the standby code scanning application is started to perform code scanning identification.
In one embodiment, the method further comprises: and the prompting unit is used for generating a prompting message for binding the target application to the application authorization list if the target application is not in the application authorization list.
Fig. 8 shows another background fast code scanning system 200 according to the present invention, where the system 200 is applied to an intelligent terminal, such as a mobile phone, a tablet computer, and other devices; the system comprises: a pre-scanning unit 10, an analyzing and determining unit 20, a background scanning unit 30, and an analysis executing unit 40, wherein:
the pre-code scanning unit 10 is configured to call a system code scanning application in the background according to the received code scanning instruction to scan and acquire a link address of the two-dimensional code; the analysis and judgment unit 20 is configured to analyze the target application of the link address and judge whether the target application is in a pre-made application authorization list; the background code scanning unit 30 is configured to, if the target application is in the application authorization list, start the target application in a background to scan the two-dimensional code; the analysis executing unit 40 is configured to analyze and execute the operation item corresponding to the two-dimensional code.
The operation items are operation execution contents on the terminal after the two-dimension code is identified, for example, friend two-dimension codes are added in the WeChat application, and friend contacts are added after the two-dimension codes are scanned and identified.
Optionally, the method further includes: and the instruction triggering unit is used for triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy.
Referring to fig. 9, in one embodiment, the analysis and judgment unit 20 includes an analysis subunit 201 and a judgment subunit 202, wherein:
the analysis subunit 201 is configured to retrieve a keyword in the link address, and analyze a corresponding target application according to the keyword; the determining subunit 202 is configured to determine whether the target application matches any application in the application authorization list.
The keywords are English or Chinese and other words; because the results of different two-dimensional code scanning are different, the actual two-dimensional code is only a string of links or numbers, and therefore the current application of the two-dimensional code can be judged according to the link content of the scanned two-dimensional code. For example, after the two-dimensional code of the code-scanning WeChat contact is scanned, the returned link is https:// u.wechat.com/. or after the two-dimensional code of the code-scanning Paobao contact is scanned, the returned link is https:// qr.alipay.com/. or; therefore, when the link is identified to contain the 'wechat', the current two-dimensional code belongs to the WeChat application, and if the link is identified to contain the 'Alipay', the current two-dimensional code is the Paibao application; and setting corresponding keywords as the identification of the target application according to the actual situation during specific application. And at least one authorized application is bound in the application authorization list, the step of searching the target application in the application authorization list is used for judging whether the target application is matched with the bound application, if the target application is matched with the bound application, the target application is judged to be bound in the application authorization list, and the target application can be started in a background to automatically perform code scanning identification.
Referring to fig. 10, in an embodiment, the parsing execution unit 40 includes a parsing subunit 401, a jumping subunit 402, and an execution subunit 403, where:
the analysis subunit 401 is configured to analyze, in the background, an operation item corresponding to the two-dimensional code, and determine whether the operation item prompts an account number or a password to be input; the skip rotor unit 402 is used for skipping the current interface of the terminal to an operation item if the prompt account password is input; the execution subunit 403 is configured to, if the account password is not prompted to be input, automatically execute the operation item in the background.
Referring to fig. 11, in an embodiment, optionally, the pre-scan code unit 10 includes an instruction determining subunit 101 and an obtaining subunit 102, where:
the instruction judging subunit 101 is configured to judge whether the code scanning instruction is a preset background execution instruction; the obtaining subunit 102 is configured to, if the background execution instruction is received, invoke a system code scanning application in the background to scan and obtain the link address of the two-dimensional code.
Optionally, the method further includes: and the authorization unit is used for authorizing the background starting function for at least one application program and generating the application authorization list according to the authorized application program.
The present invention further provides a storage medium for storing a computer program of the background fast code scanning method as shown in fig. 1 to 6. Such as computer program instructions, which when executed by a computer, may invoke or otherwise provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on fixed or removable storage media and/or transmitted via a data stream over a broadcast or other signal-bearing medium and/or stored on a storage medium of a computer device operating in accordance with the program instructions. Herein, an embodiment according to the present application includes a computer device of the background fast code scanning system as shown in fig. 7, the computer device preferably includes a storage medium for storing a computer program and a processor for executing the computer program, wherein when the computer program is executed by the processor, the computer device is triggered to execute the method and/or the technical solution according to the foregoing embodiments.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, as an Application Specific Integrated Circuit (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software programs of the present application may be executed by a processor to implement the above steps or functions. As such, the software programs (including associated data structures) of the present application can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Further, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
The method according to the invention can be implemented on a computer as a computer-implemented method, or in dedicated hardware, or in a combination of both. Executable code for the method according to the invention or parts thereof may be stored on a computer program product. Examples of computer program products include memory devices, optical storage devices, integrated circuits, servers, online software, and so forth. Preferably, the computer program product comprises non-transitory program code means stored on a computer readable medium for performing the method according to the invention when said program product is executed on a computer.
In a preferred embodiment, the computer program comprises computer program code means adapted to perform all the steps of the method according to the invention when the computer program is run on a computer. Preferably, the computer program is embodied on a computer readable medium.
In summary, according to the background quick code scanning method and the system thereof, the background calls the system code scanning application to scan to obtain the link address of the two-dimensional code according to the code scanning instruction; and analyzing the target application corresponding to the link address, further judging whether the target application is in a prefabricated application authorization list, and starting the target application in a background to scan the two-dimensional code if the target application is in the prefabricated application authorization list. The problem of sweep that the sign indicating number can break current application operation not convenient is solved for need not to manually to open corresponding application when scanning the two-dimensional code and sweep the sign indicating number, also need not to interrupt current application interface operation and can accomplish and sweep the sign indicating number action, promote user experience greatly.
The present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof, and it should be understood that various changes and modifications can be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.
A1, a background fast code scanning method is also provided, which comprises the following steps:
calling a system code scanning application at the background according to the received code scanning instruction so as to scan and acquire a link address of the two-dimensional code;
analyzing the target application of the link address, and judging whether the target application is in a preset application authorization list or not;
and if the target application is in the application authorization list, starting the target application by a background to scan the code and identify the two-dimensional code.
A2, according to the background quick code scanning method of A1, the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list further includes:
and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code.
A3, according to the background quick code scanning method of A1, the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list further includes:
and if the target application is not in the application authorization list, generating a prompt message for binding the target application to the application authorization list.
A4, the background quick code scanning method according to A1, further comprising, before the step of invoking a system code scanning application in a background to scan and acquire a link address of the two-dimensional code according to the received code scanning instruction:
and triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy.
A5, according to the background quick code scanning method described in a1, the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list specifically includes:
retrieving keywords in the link address, and analyzing according to the keywords to obtain the corresponding target application;
and judging whether the target application is matched with any application in the application authorization list.
A6, according to the background fast code scanning method in a1, if the current application is in the application authorization list, the step of starting the target application in the background for code scanning identification further includes:
and analyzing and executing the operation items corresponding to the two-dimensional code.
A7, according to the background quick code scanning method of A6, the step of analyzing and executing the operation items corresponding to the two-dimensional code specifically includes:
the background analyzes the operation items corresponding to the two-dimensional codes and judges whether the operation items prompt the input of account passwords or not;
if the prompt account password is input, skipping the current interface of the terminal to the operation item;
and if the account password is not prompted to be input, the background automatically executes the operation item.
A8, according to the background quick code scanning method of A1, the step of calling a system code scanning application in the background to scan and acquire a link address of a two-dimensional code according to the received code scanning instruction specifically includes:
judging whether the code scanning instruction is a preset background execution instruction or not;
if the instruction is executed in the background, calling system code scanning application in the background to scan and acquire the link address of the two-dimensional code.
A9, according to the background quick code scanning method of A1, the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list further comprises:
authorizing a background startup function for at least one application and generating the application authorization list according to the authorized application.
B10, a background quick code scanning system is also provided, comprising:
the code pre-scanning unit is used for calling a system code scanning application at the background according to the received code scanning instruction so as to scan and acquire a link address of the two-dimensional code;
the analysis and judgment unit is used for analyzing the target application of the link address and judging whether the target application is in a prefabricated application authorization list or not;
and the background code scanning unit is used for starting the target application in a background to scan the two-dimensional code and identify the two-dimensional code if the target application is in the application authorization list.
B11, according to the background fast code scanning system of B10, the background code scanning unit is further configured to:
and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code.
B12, the background fast code scanning system according to B10, further comprising:
and the prompting unit is used for generating a prompting message for binding the target application to the application authorization list if the target application is not in the application authorization list.
B13, the background fast code scanning system according to B10, further comprising:
and the instruction triggering unit is used for triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy.
B14, according to the background quick code scanning system of B10, the analyzing and judging unit specifically includes:
the analysis subunit is used for retrieving the keywords in the link address and obtaining the corresponding target application according to the keyword analysis;
and the judging subunit is used for judging whether the target application is matched with any application in the application authorization list.
B15, the background fast code scanning system according to B10, further comprising:
and the analysis execution unit is used for analyzing and executing the operation items corresponding to the two-dimensional codes.
B16, according to the background fast code scanning system described in B15, the parsing executing unit specifically includes:
the analysis subunit is used for analyzing the operation items corresponding to the two-dimensional codes in a background and judging whether the operation items prompt the input of account passwords or not;
the skip rotor unit is used for skipping the current interface of the terminal to the operation item if the prompt account number and the password are input;
and the execution subunit is used for automatically executing the operation items in the background if the account password is not prompted to be input.
B17, according to the background fast code scanning system of B10, the pre-scanning unit specifically includes:
the instruction judging subunit is used for judging whether the code scanning instruction is a preset background execution instruction or not;
and the obtaining subunit is configured to, if the background execution instruction is received, invoke a system code scanning application in the background to scan and obtain the link address of the two-dimensional code.
B18, the background fast code scanning system according to B10, further comprising:
and the authorization unit is used for authorizing the background starting function for at least one application program and generating the application authorization list according to the authorized application program.
C19, a storage medium for storing a computer program for executing the background fast code scanning method of any one of A1-A9 is also provided.
Also provided are D20, a computer device comprising a storage medium, a processor, and a computer program stored on the storage medium and executable on the processor, the processor implementing the background fast scan method of any one of a 1-a 9 when executing the computer program.
Claims (10)
1. A background quick code scanning method is characterized by comprising the following steps:
calling a system code scanning application at the background according to the received code scanning instruction so as to scan and acquire a link address of the two-dimensional code;
analyzing the target application of the link address and judging whether the target application is in a prefabricated application authorization list or not;
and if the target application is in the application authorization list, starting the target application by a background to scan the code and identify the two-dimensional code.
2. The background fast code scanning method according to claim 1, wherein the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list further comprises:
and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code.
3. The background fast code scanning method according to claim 1, wherein the step of analyzing the target application of the link address and determining whether the target application is in a pre-made application authorization list further comprises:
and if the target application is not in the application authorization list, generating a prompt message for binding the target application to the application authorization list.
4. The background quick code scanning method according to claim 1, further comprising, before the step of invoking a system code scanning application in the background to scan a linked address of a two-dimensional code according to the received code scanning instruction:
and triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy.
5. A background fast code scanning system, comprising:
the code pre-scanning unit is used for calling a system code scanning application at the background according to the received code scanning instruction so as to scan and acquire a link address of the two-dimensional code;
the analysis and judgment unit is used for analyzing the target application of the link address and judging whether the target application is in a prefabricated application authorization list or not;
and the background code scanning unit is used for starting the target application in a background to scan the two-dimensional code and identify the two-dimensional code if the target application is in the application authorization list.
6. The background fast code scanning system of claim 5, wherein the background code scanning unit is further configured to:
and if the target application is not in the application authorization list, the background calls a preset standby code scanning application to scan the code and identify the two-dimensional code.
7. The background fast code scanning system of claim 5, further comprising:
and the prompting unit is used for generating a prompting message for binding the target application to the application authorization list if the target application is not in the application authorization list.
8. The background fast code scanning system of claim 5, further comprising:
and the instruction triggering unit is used for triggering and generating the code scanning instruction through a virtual key and/or an entity key of the terminal according to a preset instruction triggering strategy.
9. A storage medium for storing a computer program for executing the background fast code scanning method of any one of claims 1 to 4.
10. A computer device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, wherein the processor implements the background fast code scanning method according to any one of claims 1 to 4 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122317.2A CN114816689A (en) | 2021-01-28 | 2021-01-28 | Background quick code scanning method and system, storage medium and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122317.2A CN114816689A (en) | 2021-01-28 | 2021-01-28 | Background quick code scanning method and system, storage medium and computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114816689A true CN114816689A (en) | 2022-07-29 |
Family
ID=82526959
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110122317.2A Withdrawn CN114816689A (en) | 2021-01-28 | 2021-01-28 | Background quick code scanning method and system, storage medium and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114816689A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116341581A (en) * | 2023-05-30 | 2023-06-27 | 北京智麟科技有限公司 | Integrated management method and system for Internet of things code scanning equipment |
-
2021
- 2021-01-28 CN CN202110122317.2A patent/CN114816689A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116341581A (en) * | 2023-05-30 | 2023-06-27 | 北京智麟科技有限公司 | Integrated management method and system for Internet of things code scanning equipment |
CN116341581B (en) * | 2023-05-30 | 2023-08-08 | 北京智麟科技有限公司 | Integrated management method and system for Internet of things code scanning equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9313216B2 (en) | Method and system for monitoring application program of mobile device | |
US20070274300A1 (en) | Hover to call | |
US10075430B2 (en) | Method and system for efficient password input | |
CN110417723B (en) | Application login method, device, terminal and storage medium | |
CN107622203A (en) | Guard method, device, storage medium and the electronic equipment of sensitive information | |
CN107944257A (en) | Start control method, device, storage medium and the terminal of application with method of service | |
CN105630551A (en) | Method and device for installing application software and electronic equipment | |
JP2011192296A (en) | Help utility application program | |
CN105653171A (en) | Fingerprint identification based terminal control method, terminal control apparatus and terminal | |
CN112286485A (en) | Method and device for controlling application through voice, electronic equipment and storage medium | |
CN111901695A (en) | Video content interception method, device and equipment and computer storage medium | |
CN114816689A (en) | Background quick code scanning method and system, storage medium and computer equipment | |
US9348999B2 (en) | User terminal, reliability management server, and method and program for preventing unauthorized remote operation | |
RU2006103986A (en) | METHOD FOR ADMINISTRATING SOFTWARE COMPONENTS INTEGRATED INTO MOBILE SYSTEM | |
CN106022110B (en) | The method and device of identification push platform application | |
CN110852259A (en) | Living body identification method, living body identification system, living body identification apparatus, living body identification device, and computer-readable storage medium | |
WO2013107301A1 (en) | Application processing method and mobile terminal | |
CN113326539B (en) | Method, device and system for private data leakage detection aiming at applet | |
CN111601038B (en) | Camera control method and device, electronic terminal and storage medium | |
CN104933050A (en) | Method and system for executing operations to new user of group | |
CN114531340A (en) | Log acquisition method and device, electronic equipment, chip and storage medium | |
CN114968456A (en) | Method and device for controlling terminal | |
CN114125139A (en) | Information processing method and electronic device | |
CN110928754A (en) | Operation and maintenance auditing method, device, equipment and medium | |
CN111428234A (en) | Application program process interception method, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20220729 |