Unlock instant, AI-driven research and patent intelligence for your innovation.

Virtual article processing method, server and terminal

A technology of virtual items and processing methods, applied in the field of network security, can solve problems such as transaction information leakage, transaction fraud, user loss, etc., and achieve the effect of ensuring information security and avoiding leakage

Inactive Publication Date: 2019-07-05
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing virtual item transaction process is prone to transaction information leakage or transaction fraud, which will cause user losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual article processing method, server and terminal
  • Virtual article processing method, server and terminal
  • Virtual article processing method, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order for those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions in the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present disclosure, and Not all examples. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0057] Those skilled in the art know that the embodiments of the present disclosure may be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0058]The principle and sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, and provides a virtual article processing method, which comprises the following steps of receiving the virtual article demand information which comprises a terminal identifier and a virtual article identifier of a virtual article demand terminal; generating the verification information and a private key corresponding to the terminalidentifier, and encrypting the private key according to the verification information to generate the first encryption information; sending the first encryption information to the virtual article demand terminal; encrypting the virtual article corresponding to the virtual article identifier according to the private key and generating the second encrypted information; and sending the second encryption information to the virtual article demand terminal. Correspondingly, the invention further provides a server and the terminal.

Description

technical field [0001] The present disclosure relates to the technical field of network security, in particular to a virtual item processing method, server and terminal. Background technique [0002] With the development of the Internet, virtual items began to generate value. For example, in online games, online game users will perform a large number of game virtual item transactions, and game virtual items include online game accounts, online game currency and other virtual items. The existing virtual item transaction process is prone to transaction information leakage or transaction fraud, which in turn causes user losses. [0003] It should be noted that the above introduction of the technical background is only for the convenience of a clear and complete description of the technical solution of the present disclosure, and for the convenience of understanding by those skilled in the art. It cannot be considered that the above technical solutions are known to those skill...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q30/02H04L29/06
CPCG06Q20/3829G06Q30/0209H04L63/0428H04L67/131
Inventor 黄珂
Owner CHINA UNITED NETWORK COMM GRP CO LTD