Safe transferring method, device and system of virtual resources
A technology of virtual resources and transfer methods, applied in the field of electronic payment, can solve problems such as low security, achieve the effect of improving security and solving low security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] According to an embodiment of the present invention, an embodiment of a method for safe transfer of virtual resources is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0031] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a mobile terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a block diagram of the hardware structure of a mobile terminal according to a method for safe transfer of virtual resources in an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include one or more (only one is s...
Embodiment 2
[0137] In another optional embodiment provided by the present invention, a method for safe transfer of virtual resources is also provided, and this method embodiment can also be used in figure 1 Execute in the shown mobile terminal, mobile terminal or similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a block diagram of the hardware structure of a mobile terminal according to a method for safe transfer of virtual resources in an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 104 for storing data, and a transmission module 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, ...
Embodiment 3
[0150] According to an embodiment of the present invention, an embodiment of an apparatus for implementing the method in Embodiment 1 above is also provided, and the apparatus provided in the above embodiment of the present application can run on a computer terminal.
[0151] Figure 5 It is a schematic structural diagram of a device for securely transferring virtual resources according to Embodiment 3 of this law. Such as Figure 5 As shown, the device includes: a first request unit 52 , a first acquisition unit 54 , and a first determination unit 56 .
[0152] Among them, the first requesting unit 52 is used for initiating a request for transferring virtual resources after the account logs into the first terminal; the first obtaining unit 54 is used for obtaining the network environment information currently corresponding to the account according to the request, wherein the account currently corresponds to The network environment information includes: device inform...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com