Safety processing method, device and system for virtual resources

A resource processing and virtual resource technology, applied in secure communication devices, transmission systems, digital transmission systems, etc., can solve problems such as poor security in processing virtual resources, and achieve the effect of improving security

Active Publication Date: 2017-07-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method, device, and system for securely processing virtual resources, to at least solve the problem of poor security in the process of processing virtual resources caused by network vulnerabilities and hacker intrusions in the process of processing virtual resources by terminals in the prior art technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety processing method, device and system for virtual resources
  • Safety processing method, device and system for virtual resources
  • Safety processing method, device and system for virtual resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] The method embodiment provided in Embodiment 1 of the present invention may be executed in a mobile terminal, a computer terminal or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a structural block diagram of a computer terminal according to a method for safely processing virtual resources according to an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 of the safe processing method for virtual resources may include one or more (only one is shown in the figure) processors 102 (the processors 102 may include but not limited to microprocessor MCU or programmable logic device FPGA, etc. processing means), memory 104 for storing data, and transmission means 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For exam...

Embodiment 2

[0102] According to an embodiment of the present invention, a method for safely processing virtual resources is also provided, such as Figure 4 , the method may include:

[0103] Step S41, receiving verification data to be verified when the resource processing terminal processes virtual resources.

[0104] Specifically, the above-mentioned resource processing terminal may be an intelligent terminal such as a mobile phone, an iPad, a tablet computer, etc., the above-mentioned virtual resources may be virtual currency, virtual goods, virtual books, etc., and the above-mentioned verification data to be verified may be a verification password to be verified.

[0105] For example, the above embodiments of the present invention will be described by taking virtual resources as virtual currency, resource processing terminals as mobile phones, and verification data to be verified as verification passwords as examples. When the user uses the mobile phone to conduct virtual currency tr...

Embodiment 3

[0120] According to an embodiment of the present invention, a virtual resource security processing device for implementing the above virtual resource security processing method is also provided, such as Figure 5 As shown, the device includes: a receiving module 51 , a matching module 53 and a processing module 55 .

[0121] Wherein, the receiving module 51 is configured to receive verification data to be verified when the resource processing terminal processes virtual resources.

[0122] Specifically, the above-mentioned resource processing terminal can be smart terminals such as mobile phones, iPads, and tablet computers, and the above-mentioned virtual resources can be virtual currency, virtual goods, virtual books, etc., and the above-mentioned verification data to be verified can be the verification code input by the user. Identification (ID).

[0123] For example, the above embodiments of the present invention will be described by taking virtual resources as virtual cur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety processing method, device and system for virtual resources. The method comprises the steps of: when processing the virtual resources at a resource processing terminal, receiving verification data to be verified; carrying out matching on the verification data to be verified and a verification code acquired in advance, wherein the resource processing terminal acquires the verification code from a verification code generation terminal communicated with the resource processing terminal; and if the verification data to be verified is successfully matched with the verification code, by the resource processing terminal, completing a process of processing the virtual resources. The safety processing method, device and system disclosed by the invention solve the technical problem of poor safety of the process of processing the virtual resources, which is caused by network vulnerability, hacker intrusion and the like in the processing process that the terminal processes the virtual resources in the prior art.

Description

technical field [0001] The present invention relates to the field of virtual resource processing, in particular to a method, device and system for safe processing of virtual resources. Background technique [0002] Virtual Resources (Virtual Resources) is another way of expressing material resources or physical resources. With the popularization and use of virtual resources, users use virtual resources more and more frequently. When the terminal processes virtual resources, users only It is necessary to click the corresponding button on the terminal to complete the processing of virtual resources. However, if a network vulnerability or hacker intrusion occurs during the processing, virtual resources will have security risks, resulting in the loss or leakage of virtual resources, affecting The user uses the virtual resource normally. [0003] Aiming at the technical problems in the process of processing virtual resources by the terminal in the prior art, such as network loop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3226H04L9/3234H04L63/0853
Inventor 邬振海
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products