Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data transfer method, device and system

A data and data interface technology, applied in the network field, can solve the problems of not being able to distinguish whether the payment order is a real payment order, the user account security cannot be guaranteed, and the security of the payment process is low, so as to improve flexibility, Anti-tampering and improved security

Active Publication Date: 2015-07-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing payment process, the URL used for delivery is easy to be tampered with, and because different URLs can use exactly the same product name, it is impossible for the payer to distinguish whether the payment order pointed to by the URL is a real payment order or not. Pay orders, so that the security of the payment process is very low, and the user's account security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transfer method, device and system
  • Data transfer method, device and system
  • Data transfer method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0034] figure 1 It is a flowchart of a data transfer method provided by an embodiment of the present invention. see figure 1 , the method includes:

[0035] 101. Receive a proxy data transfer request from an initiating user client, where the proxy data transfer request at least carries an initiating user identifier and target object information.

[0036] 102. According to the target object information, generate a proxy transfer data interface corresponding to the target object information.

[0037] 103. Publish the proxy transfer data interface on the social information display platform identified by the initiating user.

[0038] By generating a proxy transfer data interface in the scenario of proxy data transfer, and using the soc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a method, device and system for transferring data, a request is received by a server from an initiating user client for transferring data, where the request includes the initiating user identification and information about a target for which the data is transferred. A data transfer interface that corresponds to the target is created by the server and published on a social information display platform that corresponds to the initiating user identification. When a trigger operation is detected in the data transfer interface from one or more user clients, a trigger request is sent to the server to transfer data from the one or more user's accounts to an account associated with the target information. The method, device and system improve the security of the data transfer process.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a data transfer method, device and system. Background technique [0002] With the development of network technology, network transactions are becoming more and more popular, and network transactions inevitably involve payment scenarios for transferring data. For example, a service provider provides certain services or resources, and users pay with real or virtual currency in their personal accounts, or use points for exchange. [0003] With the diversification of payment scenarios, proxy payment has also become an emerging payment method. After the person who applies for payment purchases a product, he will generate a payment order page for the product order, and transmit the payment order page through the URL (Uniform / Universal Resource Locator, Uniform Resource Locator), and the recipient of the payment can directly click URL to enter the payment order page to make payment. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58G06Q20/40G06Q20/42
CPCH04L12/58H04L29/06G06Q20/40G06Q20/42H04L51/046G06Q50/01G06Q20/382G06Q20/384H04L9/40H04L51/52G06Q20/223G06Q20/407H04L67/06
Inventor 杨林
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products