Virtual article processing method, server and terminal
A technology of virtual items and processing methods, applied in the field of network security, can solve problems such as transaction information leakage, transaction fraud, user loss, etc., and achieve the effect of ensuring information security and avoiding leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] In order for those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions in the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present disclosure, and Not all examples. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.
[0057] Those skilled in the art know that the embodiments of the present disclosure may be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.
[0058]The principle and sp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


