Object manipulation method and apparatus

A technology of object operation and operation mode, which is applied in the Internet field to achieve the effect of improving the convenience of operation

Active Publication Date: 2017-11-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide an object operation method and device for the problem of security risks in closed implementation of security-related operations in the current application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object manipulation method and apparatus
  • Object manipulation method and apparatus
  • Object manipulation method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] Such as figure 1 As shown, in one embodiment, an object operating system 100 is provided, including a terminal 102 and a server 104 . The terminal 102 and the server 104 are connected via a network. The terminal 102 may be a desktop computer, or a mobile terminal such as a mobile phone or a tablet computer. The server 104 may be implemented as an independent physical server, or may be implemented as a server cluster composed of multiple physical servers.

[0035] In one embodiment, figure 1 The internal structure of the terminal 102 in figure 2 As shown, including the processor, memory...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an object operation method and device. The method includes: creating an object to be operated with an object identifier on a server through a first application; sending a first query request carrying a user identifier to the server; receiving the According to the first query request, the server inquires whether the user ID corresponds to an available operation mode and feeds back the query result; if the query result indicates that an available operation mode is found, the user ID corresponding to the user ID is used through the second application. The object to be operated corresponding to the object identifier is operated in an available operation mode. In the object operation method and device provided by the present invention, the creation of the object to be operated and the operation of the object to be operated are realized by different applications, and the security of the operation intended to be initiated by the first application can be controlled through the second application.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an object operation method and device. Background technique [0002] The terminal can realize various functions by installing various applications. Some applications need to perform security-related operations on the data on the server through the network, such as payment operations, operations of changing permissions, etc. Here, payment operations refer to transferring a certain amount of The operation of transferring funds from one account to another. At present, operations involving security are generally implemented in a closed manner within the application. For example, when purchasing a product, a series of processes from selecting the product, generating an order to paying the order are all implemented in the same application, so the security of the operation is completely Controlled by this application, there is a security risk. Contents of the invention [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 申富强姜楠江剑锋林巧丹曾明福董晓辉何光华毛蔚杨嘉史洪波吴菁杨翊镛陈艳杰韦德志陈觅慧李敏冯豪颜喆明蔡洁鸿甘晖
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products