Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A business processing method, device and intelligent terminal

A business processing and business technology, applied in the field of network communication, can solve the problems of user property loss, illegal transfer or use of funds, easy leakage of user credentials, etc., to achieve the effect of improving security and preventing misoperation of services

Active Publication Date: 2021-04-30
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned user credentials are easy to leak, and if the user credentials are leaked, it will easily cause the loss of the user's property, that is, the existing payment scheme has serious security risks
For example, after the user's login password and payment password are stolen, it will be easy for funds to be illegally transferred or used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A business processing method, device and intelligent terminal
  • A business processing method, device and intelligent terminal
  • A business processing method, device and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0158]Referfigure 1 The step of the step of the embodiment of the present application is shown, and the specifically can include the following steps:

[0159]Step 101: Receive the service request of the first user;

[0160]Step 102: Send the verification request corresponding to the service request to the second client of the second user; wherein the second user can have a preset user relationship with the first user;

[0161]Step 103 receives the verification result of the second client to the verification request;

[0162]Step 104, when the verification result is in line with the preset rule, the processing of the service request is terminated.

[0163]The service processing method provided herein can be applied to the application environment corresponding to the client and server. Among them, the client and the server can be in a wired or wireless network, and the client is interacting with the server through this wired or wireless network.

[0164]Among them, the client can operate on the intelli...

Embodiment 2

[0238]ReferFigure 4 The step flow chart of the second example 2 of the operation method of the present application is shown, and the specifically can include the following steps:

[0239]Step 401: The server receives the service request of the first user;

[0240]Step 402, the server transmits a verification request corresponding to the service request to the second client of the second user; wherein the second user can have a preset user relationship with the first user;

[0241]Step 403: The server receives the verification result of the second client to the verification request;

[0242]Step 404, the server terminates the processing of the service request when the verification result conforms to the preset rule;

[0243]Step 405, the server sends a termination message to the first client of the first user; the termination message is used to indicate the termination of the service request.

[0244]Relative tofigure 1 Method Example 1,Figure 4 The process can be applied to the server, and the server...

Embodiment 3

[0247]ReferFigure 5 The steps flow diagram of an embodiment three of the third embodiment of the present application are shown, and the specifically can include the following steps:

[0248]Step 501, the first client sends a service request for the first user to the server;

[0249]Step 502, the server transmits a verification request corresponding to the service request to the second client of the second user; wherein the second user can have a preset user relationship with the first user;

[0250]Step 503, the second client receives the verification request corresponding to the service request of the first user;

[0251]Step 504, the second client verifies the verification request by the second user to obtain the corresponding verification result;

[0252]Step 505, the second client sends the verification result to the server;

[0253]Step 506, the server receives the verification result of the second client to the verification request, and terminates the processing of the service request when the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide a service processing method, device, and smart terminal, wherein the method specifically includes: receiving a service request from a first user; sending a verification request corresponding to the service request to a second client of a second user; Wherein, the second user has a preset user relationship with the first user; receiving the verification result of the verification request from the second client; Processing of business requests. The embodiments of the present application can effectively prevent the execution of abnormal services, thereby improving the security of service processing.

Description

Technical field[0001]The present application relates to the field of network communication, and in particular, to a business processing method, a business processing apparatus, and a smart terminal.Background technique[0002]With the development of communication technology, people have changed the habit of cash payment, and they will be paid by using electronic forms such as Internet and mobile phones. For example, in the process of purchasing items in a network shopping platform, the amount of the item can be paid by electronic form. Another example, one user can pay the payment to other users through electronic forms.[0003]In the existing payment plan, the user mainly pays the payment primarily by entering user credentials. The above user credentials may include: login password, payment password, certificate, USB Key, and the like to indicate information or apparatus for user identity.[0004]However, the user's credentials have the characteristics that are easily leaked, and in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/382G06Q20/401
Inventor 裘绍翔
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products