Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe transferring method, device and system of virtual resources

A technology of virtual resources and transfer methods, applied in the field of electronic payment, can solve problems such as low security, achieve the effect of improving security and solving low security

Active Publication Date: 2016-12-07
ADVANCED NEW TECH CO LTD
View PDF19 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a method, device and system for safe transfer of virtual resources, so as to at least solve the technical problem of low security in the existing mobile payment method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe transferring method, device and system of virtual resources
  • Safe transferring method, device and system of virtual resources
  • Safe transferring method, device and system of virtual resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] According to an embodiment of the present invention, an embodiment of a method for safe transfer of virtual resources is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0031] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a mobile terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a block diagram of the hardware structure of a mobile terminal according to a method for safe transfer of virtual resources in an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include one or more (only one is s...

Embodiment 2

[0137] In another optional embodiment provided by the present invention, a method for safe transfer of virtual resources is also provided, and this method embodiment can also be used in figure 1 Execute in the shown mobile terminal, mobile terminal or similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a block diagram of the hardware structure of a mobile terminal according to a method for safe transfer of virtual resources in an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 104 for storing data, and a transmission module 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, ...

Embodiment 3

[0150] According to an embodiment of the present invention, an embodiment of an apparatus for implementing the method in Embodiment 1 above is also provided, and the apparatus provided in the above embodiment of the present application can run on a computer terminal.

[0151] Figure 5 It is a schematic structural diagram of a device for securely transferring virtual resources according to Embodiment 3 of this law. Such as Figure 5 As shown, the device includes: a first request unit 52 , a first acquisition unit 54 , and a first determination unit 56 .

[0152] Among them, the first requesting unit 52 is used for initiating a request for transferring virtual resources after the account logs into the first terminal; the first obtaining unit 54 is used for obtaining the network environment information currently corresponding to the account according to the request, wherein the account currently corresponds to The network environment information includes: device inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe transferring method, device and system of virtual resources. The method comprises the following steps: after an account logs in a first terminal, initiating a request used for transferring the virtual resources; according to the request, obtaining network environment information corresponding to the account at present, wherein the network environment information corresponding to the account at present comprises the equipment information of the first terminal and / or the equipment information of first network equipment where the first terminal is accessed into, and the first network equipment is any one piece of network equipment in a network equipment group; and detecting whether the network environment information corresponding to the account at present is matched with network environment information bound with an account in advance or not to determine whether a function of transferring the virtual resources permits to be executed or not. By use of the method, the technical problem of low safety of an existing mobile payment way is solved.

Description

technical field [0001] The present invention relates to the field of electronic payment, in particular to a method, device and system for safe transfer of virtual resources. Background technique [0002] At present, various mobile payment application software can be seen everywhere in people's life, such as various payment software running on mobile terminals. When users use mobile terminals to make payments, they will set payment passwords for their payment accounts. When making mobile payment, log in to the account and enter the payment password to make the payment. [0003] What needs to be explained here is that in order to prevent the payment password from being stolen by criminals, users often set the payment password very complicated, such as setting some special characters that are difficult to enter on mobile devices, such as @, $, ^, _, &, * etc. to improve the security level of the payment password, but when the user enters the payment password by himself, the nu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/16G06Q20/40H04L29/06
Inventor 叶达
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products