Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Value transfer method and device

A technology of value transfer and predetermined value, which is applied in the field of information security and can solve the problems of user accounts and funds not being secured.

Active Publication Date: 2020-07-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the prior art that using a proxy tool in an actual payment scenario skips a logic verification process similar to identity verification and continues to call the payment CGI to complete the payment, resulting in the user's account and funds not being safe, the embodiment of the present invention A value transfer method and device are provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Value transfer method and device
  • Value transfer method and device
  • Value transfer method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] figure 1 It is a schematic diagram of the implementation environment of the value transfer method involved in an embodiment of the present invention, such as figure 1 As shown, the implementation environment includes: a terminal 110 , a server 120 and a communication network 130 .

[0039] The terminal 110 is capable of browsing web pages. Optionally, the terminal 110 includes: a desktop computer, a laptop computer, a tablet computer, a smart phone, and the like.

[0040]The server 120 is a platform for providing Internet network services. The server 120 has the capabilities of value transfer, data storage, and logic verification. The server 120 may be one server, or a server cluster composed of several servers, and data amo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a numerical transfer method and device, belonging to the field of information security. The method includes: after receiving the order parameters and the signature of the first order sent by the web page, checking whether the signature is correct according to the order parameters and the signature; when the signature is correct, checking whether the order parameter contains the first predetermined field, and the first The value of a predetermined field is a predetermined value; when the order parameter contains the first predetermined field and the value of the first predetermined field is a predetermined value, the first error code is sent to the web page, and the value transfer corresponding to the first order is prohibited from continuing operate. The invention solves the problem that in the actual payment scene, the use of the proxy tool skips part of the logic verification process and continues to call the payment CGI to complete the payment, resulting in the problem that the user's account and funds cannot be guaranteed, and achieves the use of the proxy in the actual payment scene When using tools, payment operations are prohibited to protect the user's account and fund security.

Description

technical field [0001] The embodiments of the present invention relate to the field of information security, and in particular, to a numerical value transfer method and device. Background technique [0002] When performing a payment operation, usually before the payment is completed, the payment system needs to perform some logical verification on the payment operation, such as mobile phone number verification, verification code verification, etc. The purpose of the logical verification is to confirm whether the payment operation is performed by the user himself . [0003] When the payment system executes the payment process, it usually includes multiple interactive operations between the web page on the terminal and various CGIs (Common Gateway Interface, Common Gateway Interface) on the server. Taking CGI including identity verification CGI and payment CGI as an example, the web page sends the parameters related to identity verification entered by the user to the identity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06G06Q20/40
CPCH04L9/3247H04L63/0281H04L63/12H04L63/1441G06Q20/401H04L9/32G06Q20/40H04L9/40
Inventor 周菲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products