CN110738491A - Numerical value transferring method, system, device, terminal and storage medium - Google Patents

Numerical value transferring method, system, device, terminal and storage medium Download PDF

Info

Publication number
CN110738491A
CN110738491A CN201910983834.1A CN201910983834A CN110738491A CN 110738491 A CN110738491 A CN 110738491A CN 201910983834 A CN201910983834 A CN 201910983834A CN 110738491 A CN110738491 A CN 110738491A
Authority
CN
China
Prior art keywords
user
terminal
value transfer
value
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910983834.1A
Other languages
Chinese (zh)
Inventor
罗京
唐宇晨
张明星
张扬
赵志宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201910983834.1A priority Critical patent/CN110738491A/en
Publication of CN110738491A publication Critical patent/CN110738491A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses numerical value transfer methods, systems, devices, terminals and storage media, and belongs to the technical field of networks, the application enables the terminal to perform identity verification on the user by responding to touch operation of the user on a numerical value transfer option, if the network signal strength of the terminal is lower than a signal threshold, the identity verification information of the user is obtained based on a local verification interface, and if the verification is passed, a numerical value transfer certificate is generated, and if the network signal strength of the terminal is higher than the signal threshold, a settlement request is sent to a server, so that the server responds to the settlement request to perform the numerical value transfer operation.

Description

Numerical value transferring method, system, device, terminal and storage medium
Technical Field
The present application relates to the field of network technologies, and in particular, to methods, systems, apparatuses, terminals, and storage media for transferring numerical values.
Background
With the development of network technology, users can perform value transfer operations (such as online payment) anytime and anywhere based on terminals, and generally the value transfer operations require that terminals of both parties of the value transfer have a good network environment.
At present, in a wireless or weak network environment, terminals of both parties of value transfer may transmit order information of a value transfer process based on a near field communication connection after establishing the near field communication connection (e.g., bluetooth, radio frequency connection, etc.), thereby implementing a value transfer operation in the wireless or weak network environment.
Disclosure of Invention
The embodiment of the application provides numerical value transfer methods, systems, devices, terminals and storage media, which can solve the problem of poor security of the numerical value transfer process in the environment without network or weak network.
, there are numerical value transfer methods, which include:
responding to touch operation of an th user on a value transfer option in a target page, if the network signal strength of a th terminal is lower than a signal threshold, acquiring identity verification information of the th user based on a local verification interface, wherein the value transfer option is used for triggering value transfer to a second user, and the th terminal corresponds to the th user;
if the identity verification information passes verification, generating a value transfer certificate, wherein the value transfer certificate carries th user information, second user information and a target value;
displaying an identification code of the value transfer certificate in a value transfer interface, wherein the identification code is used for providing a scanning object for a second terminal, and the second terminal corresponds to the second user;
and if the network signal strength of the th terminal is higher than the signal threshold, sending a settlement request carrying the value transfer certificate to a server, wherein the settlement request is used for requesting the server to respond to the settlement request and execute a value transfer operation of transferring the target value to the second user.
In possible embodiments, after sending the settlement request carrying the value transfer certificate to the server, the method further includes:
and receiving a settlement result returned by the server based on the settlement request, and updating the account balance of the th user according to the settlement result, wherein the account balance is a value obtained by subtracting the target value from an original value.
In possible embodiments, the obtaining identity verification information of the user by the local-based verification interface includes:
invoking a local password verification interface to obtain the password entered by the user, or,
a local biometric interface is invoked to obtain the biometric information of the user.
In possible implementations, the generating the value transfer certificate includes:
acquiring second user information, target object price and target object quantity of a page where the numerical value transfer option is located;
determining the target value according to the price of the target object and the quantity of the target object, wherein the target value is obtained by multiplying the price of the target object and the quantity of the target object;
generating the value transfer certificate according to st user information of the th user, the second user information and the target value.
In possible embodiments, the acquiring, by the local verification interface, the identity verification information of the th user based on the local verification interface in response to the touch operation of the th user on the value shifting option in the target page if the network signal strength of the th terminal is lower than the signal threshold includes:
responding to the touch operation of the th user on the value transfer option in the target page, acquiring the wireless network signal strength and the mobile communication signal strength at the current moment, and if the wireless network signal strength is lower than the th signal threshold and the mobile communication signal strength is lower than the second signal threshold, executing the step of acquiring identity verification information.
, there are numerical value transfer methods, which include:
if the network signal strength of the second terminal is lower than the signal threshold, scanning an identification code of a numerical transfer certificate displayed by an th terminal, analyzing the identification code of the numerical transfer certificate, and obtaining th user information, second user information and a target numerical value carried in the numerical transfer certificate, wherein the th terminal corresponds to a th user, and the second terminal corresponds to the second user;
if the second user information passes the verification, storing the value transfer certificate;
if the network signal intensity of the second terminal is higher than the signal threshold, sending a settlement request carrying the numerical value transfer certificate to a server, wherein the settlement request is used for requesting the server to respond to the settlement request and execute a numerical value transfer operation of transferring the target numerical value to the second user;
the terminal responds to touch operation of a user on a value transfer option in a target page, if the network signal strength of the terminal is lower than a signal threshold, identity verification information of the user is acquired based on a local verification interface, and if the identity verification information passes verification, the value transfer credential is generated and used for triggering value transfer to the second user.
, providing numerical value transfer systems, the systems including a th terminal and a second terminal, the th terminal corresponding to a th user, the second terminal corresponding to a second user;
the terminal is used for responding to touch operation of a user on a value transfer option in a target page, acquiring identity verification information of the user based on a local verification interface if the network signal strength of the terminal is lower than a signal threshold value, and triggering value transfer to a second user, generating a value transfer certificate if the terminal verifies the identity verification information, wherein the value transfer certificate carries user information, second user information and a target value, displaying an identification code of the value transfer certificate in a value transfer interface, and the identification code is used for providing a scanning object to the second terminal;
the second terminal is used for scanning an identification code of the numerical transfer certificate displayed by the th terminal and analyzing the identification code of the numerical transfer certificate to obtain th user information, second user information and a target numerical value carried in the numerical transfer certificate if the network signal strength of the second terminal is lower than the signal threshold value;
if the network signal strength of any device of the th terminal or the second terminal is higher than the signal threshold, the any device sends a settlement request carrying the value transfer certificate to a server, and the settlement request is used for requesting the server to respond to the settlement request and execute the value transfer operation of transferring the target value to the second user.
, there is provided a numerical value transfer apparatus comprising:
an obtaining module, configured to respond to a touch operation of an th user on a value transfer option in a target page, and if a network signal strength of a th terminal is lower than a signal threshold, obtain, based on a local verification interface, identity verification information of the th user, where the value transfer option is used to trigger a value transfer to a second user, and the th terminal corresponds to the th user;
the generating module is used for generating a numerical value transfer certificate if the identity verification information passes verification, wherein the numerical value transfer certificate carries th user information, second user information and a target numerical value;
the display module is used for displaying an identification code of the value transfer certificate in a value transfer interface, wherein the identification code is used for providing a scanning object for a second terminal, and the second terminal corresponds to the second user;
a sending module, configured to send, to a server, a settlement request carrying the value transfer certificate if the network signal strength of the th terminal is higher than the signal threshold, where the settlement request is used to request the server to respond to the settlement request and execute a value transfer operation of transferring the target value to the second user.
In possible implementations, the apparatus further includes:
and receiving a settlement result returned by the server based on the settlement request, and updating the account balance of the th user according to the settlement result, wherein the account balance is a value obtained by subtracting the target value from an original value.
In possible implementations, the obtaining module is to:
invoking a local password verification interface to obtain the password entered by the user, or,
a local biometric interface is invoked to obtain the biometric information of the user.
In possible implementations, the generating module is to:
acquiring second user information, target object price and target object quantity of a page where the numerical value transfer option is located;
determining the target value according to the price of the target object and the quantity of the target object, wherein the target value is obtained by multiplying the price of the target object and the quantity of the target object;
generating the value transfer certificate according to st user information of the th user, the second user information and the target value.
In possible implementations, the obtaining module is to:
responding to the touch operation of the th user on the value transfer option in the target page, acquiring the wireless network signal strength and the mobile communication signal strength at the current moment, and if the wireless network signal strength is lower than the th signal threshold and the mobile communication signal strength is lower than the second signal threshold, executing the step of acquiring identity verification information.
, there is provided a numerical value transfer apparatus comprising:
the scanning and analyzing module is used for scanning an identification code of a numerical transfer certificate displayed by an th terminal and analyzing the identification code of the numerical transfer certificate to obtain th user information, second user information and a target numerical value carried in the numerical transfer certificate if the network signal strength of a second terminal is lower than a signal threshold, wherein the th terminal corresponds to a th user, and the second terminal corresponds to the second user;
the storage module is used for storing the value transfer certificate if the second user information passes the verification;
a sending module, configured to send, to a server, a settlement request carrying the value transfer credential if the network signal strength of the second terminal is higher than the signal threshold, where the settlement request is used to request the server to respond to the settlement request and execute a value transfer operation of transferring the target value to the second user;
the terminal responds to touch operation of a user on a value transfer option in a target page, if the network signal strength of the terminal is lower than a signal threshold, identity verification information of the user is acquired based on a local verification interface, and if the identity verification information passes verification, the value transfer credential is generated and used for triggering value transfer to the second user.
, there are provided terminals that include or more processors and or more memories, the or more memories storing therein at least program codes, the at least program codes being loaded and executed by the or more processors to perform operations performed by a value transfer method as described in any of the possible implementations.
, there are provided storage media having stored therein at least program codes, the at least program codes being loaded into and executed by a processor to perform operations performed to implement the value transfer method of any of the possible implementations described above.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
by responding to touch operation of user on a value transfer option, if the network signal strength of terminal is lower than a signal threshold, the identity verification information of user is obtained based on a local verification interface, the value transfer option is used for triggering value transfer to a second user, so that the terminal can perform identity verification on user, if the identity verification information passes verification, a value transfer certificate is generated, the value transfer certificate carries user information, second user information and a target value, it can be guaranteed that the value transfer certificate is generated only under the condition that the identity verification passes, and the identification code of the value transfer certificate is displayed, so that if the network signal strength of terminal is higher than the signal threshold, the server responds to the settlement request by sending a settlement request, so that the server performs the value transfer operation of transferring the target value to the second user, namely, because the value transfer operation is performed based on the local verification interface and the value transfer certificate is directly generated locally, the value transfer method is independent of near field communication, both sides of the value transfer operation do not need to establish a near field communication environment, and the security of the network transfer environment can be improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of an implementation environment of an numerical value transfer method provided in an embodiment of the present application;
FIG. 2 is a flow chart of numerical value transfer methods provided by embodiments of the present application;
FIG. 3 is an interactive flow chart of numerical value transfer methods provided by the embodiments of the present application;
FIG. 4 is a schematic structural diagram of an numerical value transfer device according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of an numerical value transfer device according to an embodiment of the present application;
fig. 6 shows a block diagram of a terminal 600 provided in exemplary embodiments of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of an implementation environment of value transferring methods provided in this embodiment, referring to fig. 1, in this implementation environment, a th terminal 101, a second terminal 102 and a server 103 may be included, and details are described below:
in the above implementation environment, the th terminal 101 may correspond to the th user, for example, the th user may be a value transfer party in the times value transfer process, that is, the th user generally refers to a buyer user in the value transfer process.
Optionally, an application client may be installed on the st terminal 101, so that the st terminal 101 may implement the value transfer method in the embodiment of the present application based on the application client, wherein the application client may be used to provide a value transfer service for a target object, which may be any actual goods or services, for example, the target object may be clothing, food, daily necessities, and the like.
In the above embodiment, the second terminal 102 may correspond to a second user, for example, the second user may be a value transfer party in times of value transfer processes, that is, the second user is generally a seller user in the value transfer process.
Optionally, an application client may also be installed on the second terminal 102, and in embodiments, the second terminal 102 may also be generally configured with a scanning device, so that the second terminal 102 can scan the identification code presented by the terminal 101 through the scanning device, thereby completing the value transferring operation conveniently and quickly.
It should be noted that the application clients installed on the th terminal 101 and the second terminal 102 may be of different versions, for example, a buyer version application client is installed on the th terminal 101, a seller version application client is installed on the second terminal 102, and different display interfaces may be provided in the different versions of the application clients.
For example, in the display interface of the buyer version application client, options such as commodity inquiry, commodity recommendation, consumption bill and the like can be placed in the home page for display, and in the display interface of the seller version application client, options such as cash withdrawal, inventory updating, today's income and the like can be placed in the home page for display, so that users with different identities can conveniently perform numerical value transfer operation.
Optionally, the server 103 corresponds to an application client, and the server 103 is configured to provide a background value transfer service for the application client.
Illustratively, in scenarios, the user may register the account with the server 103 based on the application client of the terminal 101, and the second user may register the second account with the server 103 based on the application client of the second terminal 102, so that the user and the second user can transfer values from the account of the user to the second account of the second user via the server 103 based on the respective application clients.
Based on the above implementation environment, fig. 2 is a flowchart of numerical value transferring methods provided in an embodiment of the present application, and referring to fig. 2, the embodiment can be applied to the terminal in the above implementation environment, and the embodiment includes the following steps:
201. the th terminal responds to a touch operation of a th user on a value transfer option in a target page, if the network signal strength of the th terminal is lower than a signal threshold, identity verification information of the th user is acquired based on a local verification interface, the value transfer option is used for triggering value transfer to a second user, and the th terminal corresponds to the th user.
202. If the identity verification information passes the verification, the th terminal generates a value transfer certificate, and the value transfer certificate carries th user information, second user information and a target value.
203. The th terminal displays an identification code of the value transfer voucher in the value transfer interface, the identification code being used for providing a scan object to a second terminal, the second terminal corresponding to the second user.
204. If the network signal strength of the th terminal is higher than the signal threshold, the th terminal sends a settlement request carrying the value transfer certificate to a server, and the settlement request is used for requesting the server to respond to the settlement request and execute a value transfer operation of transferring the target value to the second user.
According to the method provided by the embodiment of the application, by responding to touch operation of user on a value transfer option, if the network signal strength of terminal is lower than a signal threshold, the identity verification information of user is obtained based on a local verification interface, the value transfer option is used for triggering value transfer to a second user, so that the terminal can perform identity verification on user, if the identity verification information passes verification, a value transfer certificate is generated, the value transfer certificate carries user information, second user information and a target value, it can be guaranteed that the value transfer certificate is generated only under the condition that the identity verification passes, and the identification code of the value transfer certificate is displayed, so that if the network signal strength of terminal is higher than the signal threshold, a settlement request is sent to a server, so that the server responds to the settlement request, namely, performs a value transfer operation of transferring the target value to the second user, because the identity verification is performed based on the local verification interface and the value transfer certificate is generated locally, therefore, the method does not rely on value transfer, and near field communication environment of value transfer operation can be realized without a weak network communication environment or a near field communication environment.
In possible embodiments, after sending the settlement request carrying the value transfer certificate to the server, the method further includes:
and receiving a settlement result returned by the server based on the settlement request, and updating th user account balance according to the settlement result, wherein the account balance is a value obtained by subtracting the target value from an original value.
In possible embodiments, the obtaining the identity verification information of the user based on the local verification interface comprises:
call a local password verification interface to obtain the password entered by the user, or,
a local biometric interface is invoked to obtain the biometric information of the user.
In possible implementations, generating the value transfer ticket includes:
acquiring second user information, target object price and target object quantity of a page where the numerical value transfer option is located;
determining the target value according to the price of the target object and the quantity of the target object, wherein the target value is obtained by multiplying the price of the target object and the quantity of the target object;
generating the value transfer certificate according to the st user information of the th user, the second user information and the target value.
In possible embodiments, in response to the touch operation of the user on the value shifting option in the target page, if the network signal strength of the th terminal is lower than the signal threshold, the obtaining the identity verification information of the th user based on the local verification interface includes:
responding to the touch operation of the th user on the value transfer option in the target page, acquiring the wireless network signal strength and the mobile communication signal strength at the current moment, and if the wireless network signal strength is lower than the th signal threshold and the mobile communication signal strength is lower than the second signal threshold, executing the step of acquiring the identity verification information.
All the above-mentioned optional technical solutions can be adopted to form any combination of the optional embodiments of the present disclosure, and are not described in detail in herein.
Fig. 3 is an interaction flowchart of numerical value transferring methods provided in an embodiment of the present application, referring to fig. 3, the embodiment is applied to an interaction process between a th terminal and a second terminal, and the embodiment includes:
301. the th terminal displays a destination page including a value transfer option, second user information, a destination price, and a destination quantity.
Where terminal corresponds to user , the user may be the value roll-out party for the value transfer process and correspondingly, the second terminal corresponds to a second user, which may be the value roll-in party for the value transfer process-e.g., user is a buyer user for the value transfer process and the second user is a seller user for the value transfer process.
It should be noted that th user and the second user are only distinguished names for users with different identities in a value transfer process, in value transfer processes, it is possible that th user is both the th user and the second user, that is, the user transfers values from one account to another own accounts, of course, for a certain users, it is also possible to serve as the th user in number of value transfer processes, and serve as the second user in another number of value transfer processes.
Optionally, an application client may be installed on the th terminal, and the application client may be used to provide a value transfer service for a target object.
In the above process, after the th user logs in the application client on the terminal, the application client may browse the detail pages of the respective objects, when the th user wants to purchase a object, the user may click a menu option in the detail pages of the object, the th terminal may display the object page in response to the th user clicking the menu option, the object page includes the value transfer option, the second user information, the price of the object, and the number of the object, and the th user may perform a touch operation on the value transfer option in the object page after checking the second user information, the price of the object, and the number of the object in the object page to be correct, and perform the following step 302.
The target object refers to any actual goods or services, the target object price refers to a selling value marked for the target object by the second user, and the target object quantity refers to a quantity to be purchased by the th user for the target object.
302. The th terminal responds to the touch operation of the th user on a value transfer option in the target page, if the network signal strength of the th terminal is lower than a signal threshold, the identity verification information of the th user is acquired based on a local verification interface, and the value transfer option is used for triggering the value transfer to the second user.
Alternatively, the network signal strength of the th terminal may refer to the strength of the mobile communication signal of the th terminal, such as a 2G (2-Generation wireless telephone technology, second Generation mobile phone communication specification) signal, a 3G (3-Generation wireless telephone technology, third Generation mobile phone communication specification) signal, a 4G (4-Generation wireless telephone technology, fourth Generation mobile phone communication specification) signal, a 5G (5-Generation wireless telephone technology, fifth Generation mobile phone communication specification) signal, and the like, and of course, the network signal strength of the second terminal may also refer to the strength of the wireless network signal, such as a WiFi (wireless fidelity ) signal, and the like, and the embodiment of the present application does not specifically limit what kind of signal strength refers to.
Optionally, when the th user touches the value transition option in the target page, the th terminal may obtain the wireless network signal strength and the mobile communication signal strength at the current time in response to the th user performing a touch operation on the value transition option in the target page, and if the wireless network signal strength is lower than the th signal threshold and the mobile communication signal strength is lower than the second signal threshold, perform the step of obtaining the identity verification information, where the th signal threshold and the second signal threshold are values where is greater than 0.
In the above process, the th terminal may prompt the user to enter identity information in advance when the network signal strength is higher than the signal threshold, and store the identity information entered by the user locally, so that after the th user clicks the value transfer option on the target page, if the network signal strength is lower than the signal threshold, the th terminal is triggered to collect the above identity verification information by calling a local verification interface in response to a touch operation of the th user on the value transfer option, compare whether the collected identity verification information and the locally stored identity information meet the criteria, and if meets the criteria, that is, the identity verification information is verified, execute the following step 303.
In embodiments, the terminal may call a local password verification interface to obtain the password input by the user, or the terminal calls a local biometric interface to obtain the biometric information of the user when performing the authentication.
When the fingerprint identification interface is called, the acquired biological identification information may be a fingerprint, when the voiceprint identification interface is called, the acquired biological identification information may be a voiceprint, and when the face identification interface is called, the acquired biological identification information may be a face image.
It should be noted that, when determining what kind of check interface to call, the th terminal may first determine the type of the locally stored identity information, and determine the check interface to be called this time according to a target priority in the check interface corresponding to the type of the identity information, where the target priority may be set by the th terminal by default, or may be set by the th user by self-definition.
For example, th user enters a password, a fingerprint and a face image in advance on th terminal under a better network environment (the network signal strength is higher than the signal threshold), th terminal determines the type of the locally stored identity information to include a password, a fingerprint and a face image under a no network/weak network environment (the signal strength is lower than the signal threshold), and determines that the callable check interface includes a password check interface, a fingerprint recognition interface and a face recognition interface according to the type of the identity information, assuming that the default target priority of th terminal is voiceprint > fingerprint > face image > password, and since th user does not enter voiceprint, at this time th terminal can determine the currently available fingerprint recognition interface with the highest target priority as the currently called check interface.
In the above process, when the biometric interfaces such as the fingerprint identification interface, the voiceprint identification interface or the face identification interface and the like are adopted, the biometric information of the th user can be directly verified, and higher safety and reliability are achieved.
303. If the identity verification information passes the verification, the th terminal obtains the second user information, the price of the target object and the quantity of the target object of the page where the value transfer option is located.
The page where the value transfer option is located is also the target page in step 301.
In the above process, the th terminal may compare the acquired identity verification information with locally pre-stored identity information, and when the two result is , the identity verification information is considered to be passed through verification, and when the two result is not , the step 302 may be repeatedly executed to implement the verification process, and when the target number of times is reached and the verification still fails, the prompt information of the identity verification failure may be displayed in the target page, and the value transfer operation of this time is ended.
In the above process, if the verification is passed, the th terminal may capture the second user information, the price of the target object and the quantity of the target object in the target page, and optionally, the capture operation may be implemented based on an API (application programming interface) provided in the application client or the terminal library.
304. And , the terminal determines a target value according to the price of the target object and the quantity of the target object, wherein the target value is obtained by multiplying the price of the target object and the quantity of the target object.
In the above process, the th terminal can directly determine the value obtained by multiplying the price of the object by the quantity of the object as the target value.
In , if the server corresponding to the application client pushes ticket resources such as a red package, a coupon, a voucher, etc. to the th user, if the withholding condition of any ticket resource is satisfied, the terminal may further determine a value obtained by multiplying the price of the target object by the number of the target object as a th value, determine a withholding value of the ticket resource as a second value, and determine a value obtained by subtracting the th value from the second value as the target value.
305. The terminal generates a value transfer certificate according to the th user information of the th user, the second user information and the target value, and stores the value transfer certificate.
The th terminal acquires the second user information in the step 303, the th terminal acquires the target value in the step 304, the th terminal may determine the th account number, which the th user currently logs in the application client, as th user information, so as to encrypt the th user information, the second user information and the target value according to an encryption algorithm, acquire a ciphertext obtained by encryption as a value transfer certificate, and store the value transfer certificate.
In , before the terminal performs encryption, a one-way hash (hash) function may be further used to act on the th user information, the second user information, and the target value to obtain a digital digest, and then the th user information, the second user information, the target value, and the digital digest are encrypted to obtain the value transfer certificate.
In the above process, since the terminal may perform or more value shift operations each time the value shift operation generates a corresponding value shift certificate when the network signal strength of the terminal is lower than the signal threshold, when storing the value shift certificates, each value shift certificate may be stored in the buffer of the terminal according to the generation time of the certificate, and sends or more value shift certificates in the buffer to the server through the following step 310 when the network signal strength of the terminal is higher than the signal threshold.
In the above step 303-305, the terminal captures the second user information, the price of the target object and the number of the target object in the target page, so as to calculate the target value, and based on the user information, the second user information and the target value, may generate a value transfer voucher, where the value transfer voucher carries the th user information, the second user information and the target value.
306. The th terminal displays an identification code of the value transfer voucher in the value transfer interface, the identification code being used for providing a scan object to a second terminal, the second terminal corresponding to the second user.
In the above process, when the th terminal clicks the value transfer option on the target page, if the th terminal passes the identity verification of the th user, the th terminal may jump from the target page to display a value transfer interface in which an identification code of the value transfer voucher is displayed, and optionally, the identification code may be a graphic identification code in the form of a barcode, a two-dimensional code, or the like, or a text identification code in the form of a character string.
In the above process, when the th terminal displays the graphic identification code of the value transfer voucher, the second terminal can directly scan the graphic identification code conveniently, so that the speed of value transfer is increased, optionally, in embodiments, when the th terminal displays the text identification code of the value transfer voucher, the second user can manually input the character string corresponding to the text identification code, so that the problem that the graphic identification code is easily stolen and swiped after being scanned by other devices can be avoided, and the security of value transfer is enhanced.
307. If the network signal strength of the second terminal is lower than the signal threshold, the second terminal scans the identification code of the value transfer certificate displayed by the th terminal, wherein the th terminal corresponds to the th user, and the second terminal corresponds to the second user.
The terminal responds to touch operation of a user on a value transfer option in a target page, if the network signal strength of the terminal is lower than a signal threshold, identity verification information of the user is acquired based on a local verification interface, and if the identity verification information passes verification, the value transfer credential is generated and used for triggering value transfer to the second user.
It should be noted that, when the second terminal determines whether the network signal strength is lower than the signal threshold, the similar operation as that when the th terminal determines whether the network signal strength is lower than the signal threshold in step 302 may be performed, which is not described herein again.
In the above process, an application client may also be installed on the second terminal, optionally, a scanning device may also be configured on the second terminal, and different graphic identification codes may correspond to different scanning devices, for example, the scanning device corresponding to the barcode may be a cash register scanner, and the scanning device corresponding to the two-dimensional code may be a camera.
In the above step 307, the second terminal may scan the graphic identification code displayed by the th terminal through the scanning device, and if the th terminal displays the text identification code, the second user may directly enter the character string corresponding to the text identification code on the second terminal by hand and then jump to step 309.
308. And the second terminal analyzes the identification code of the numerical transfer certificate to obtain th user information, second user information and a target numerical value carried in the numerical transfer certificate.
In the above step 307, the second user may log in the application client on the second terminal, invoke the scanning device to scan the graphic identification code displayed on the th terminal to obtain the optical image corresponding to the graphic identification code, the scanning device converts the scanned optical image into a digital signal through the photoelectric converter, and parses the digital signal into the value transfer certificate, so as to decrypt the value transfer certificate through the decryption algorithm to obtain the th user information, the second user information and the target value, where the decryption algorithm of the second terminal corresponds to the encryption algorithm of the th terminal.
In , if the value transfer certificate also carries a digital digest, the second terminal may obtain th user information, second user information, a target value and the digital digest after performing the decryption step, at this time, the second terminal may use a one-way hash function to act on the th user information, second user information and the target value to obtain another digital digest, perform a regular matching between the another digital digest and the decrypted digital digest, if the two match , perform the following verification process in step 309, otherwise, if the two match result is not , delete the value transfer certificate.
309. And the second terminal verifies the second user information, and stores the value transfer certificate if the second user information passes the verification.
In the above process, the second terminal may perform regular matching on the second user information and the second user information logged in the current application client, when the two matching results are , it is determined that the second user information is verified to be passed, and the value transfer certificate is stored, and if the two matching results are not , that is, when the verification fails, the value transfer certificate is deleted.
310. If the network signal strength of any equipment in the th terminal or the second terminal is higher than the signal threshold, the equipment sends a settlement request carrying the value transfer certificate to a server, and the settlement request is used for requesting the server to respond to the settlement request and execute the value transfer operation of transferring the target value to the second user.
In the above process, any device of the terminal or the second terminal can perform the above operation of sending the settlement request when the network signal strength is higher than the signal threshold value, and specifically, as long as the wireless network signal strength of the device is higher than the signal threshold value or the mobile communication signal strength is higher than the second signal threshold value, the network signal strength of the device can be determined to be higher than the signal threshold value.
Alternatively, the th terminal or the second terminal may package or more value transfer vouchers stored in the buffer as settlement requests immediately after detects that the network signal strength is higher than the signal threshold, and send the settlement requests to the server, so that settlement can be initiated for the value transfer operation in real time.
In , the or second terminal may further attempt to send settlement requests every th target duration, if the network signal strength is lower than the signal threshold, the settlement requests fail to be sent, wait to send again times every th target duration until the network signal strength is higher than the signal threshold, and execute 311 below, so as to asynchronously initiate settlement for the value transfer operation, wherein the th terminal and the second terminal may have different th target durations, and the th target duration may be any value greater than 0.
311. The server verifies the settlement request in response to the settlement request, and if the verification is passed, performs a value transfer operation for transferring the target value to the second user, and returns the settlement result to the th terminal and the second terminal.
In the above process, when the server receives a settlement request sent by any device of the th terminal or the second terminal, the server parses the settlement request to obtain or more value transfer certificates in the settlement request, for each value transfer certificate, the server may first preliminarily verify whether the th user information and the second user information in the value transfer certificate are legal, and then secondarily verify whether the balance in the th account of the th user is greater than or equal to the target value, when both verifications are passed, wait for the other terminal to send the same value transfer certificate, and if subsequently receive the same value transfer certificate sent by the other terminal, it may be considered that the complete verification of the value transfer certificate is passed, thereby performing a value transfer operation of transferring the target value to the second user.
In the above process, if the second terminal fails to verify the second user information, the scanned value transfer voucher is deleted, so that if the server does not receive two identical value transfer vouchers, it may be considered that the value transfer is failed this time, and a transfer failure response is returned to the th terminal and the second terminal.
In , when the server receives the settlement request, it stores or more value transfer certificates resolved in the settlement request in the cache, and when value transfer certificates are newly arrived, it queries the existing value transfer certificates, if it can hit any existing value transfer certificate, it considers that the value transfer certificate is verified, deducts the target value from the value stored corresponding to the account of the user, and adds the target value to the value stored corresponding to the second account of the second user, and when the deduction and addition are completed, returns a transfer success response to the terminal and the second terminal, and the transfer success response carries the settlement result and deletes the value transfer certificate from the cache.
In possible embodiments, in order to save the storage space of the server, each time the server stores a new value transfer voucher into the cache, an effective duration may be set for the new value transfer voucher, the validation is considered to be passed only when the same value transfer voucher sent by another terminal is received within the effective duration, and when exceeds the effective duration, the value transfer failure is directly determined, and a transfer failure response is sent.
312. The th terminal receives the settlement result returned by the server based on the settlement request, and updates the th user's account balance, which is the value obtained by subtracting the target value from the original value, according to the settlement result.
In the above process, the th terminal may receive the transfer success response of the server, parse the transfer success response to obtain the settlement result, update the balance of the th account of the th user based on the settlement result, and accordingly, the second terminal performs the following step 313.
313. And the second terminal receives a settlement result returned by the server based on the settlement request, and updates the account balance of the second user according to the settlement result, wherein the account balance is a numerical value obtained by adding the target numerical value to the original numerical value.
Step 313 is similar to step 312 and will not be described herein.
All the above-mentioned optional technical solutions can be adopted to form any combination of the optional embodiments of the present disclosure, and are not described in detail in herein.
According to the method provided by the embodiment of the application, by responding to touch operation of user on a value transfer option, if the network signal strength of terminal is lower than a signal threshold, the identity verification information of user is obtained based on a local verification interface, the value transfer option is used for triggering value transfer to a second user, so that the terminal can perform identity verification on user, if the identity verification information passes verification, a value transfer certificate is generated, the value transfer certificate carries user information, second user information and a target value, it can be guaranteed that the value transfer certificate is generated only under the condition that the identity verification passes, and the identification code of the value transfer certificate is displayed, so that if the network signal strength of terminal is higher than the signal threshold, a settlement request is sent to a server, so that the server responds to the settlement request, namely, performs a value transfer operation of transferring the target value to the second user, because the identity verification is performed based on the local verification interface and the value transfer certificate is generated locally, therefore, the method does not rely on value transfer, and near field communication environment of value transfer operation can be realized without a weak network communication environment or a near field communication environment.
Fig. 4 is a schematic structural diagram of an numerical value transfer device provided in an embodiment of the present application, and referring to fig. 4, the device includes:
an obtaining module 401, configured to respond to a touch operation of an th user on a value transfer option in a target page, if a network signal strength of a th terminal is lower than a signal threshold, obtain, based on a local verification interface, identity verification information of the th user, where the value transfer option is used to trigger a value transfer to a second user, and the th terminal corresponds to the th user;
a generating module 402, configured to generate a value transfer certificate if the identity verification information passes verification, where the value transfer certificate carries th user information, second user information, and a target value;
a display module 403, configured to display an identification code of the value transfer certificate in a value transfer interface, where the identification code is used to provide a scanned object to a second terminal, and the second terminal corresponds to the second user;
a sending module 404, configured to send, to a server, a settlement request carrying the value transfer certificate if the network signal strength of the th terminal is higher than the signal threshold, where the settlement request is used to request the server to respond to the settlement request and perform a value transfer operation of transferring the target value to the second user.
According to the device provided by the embodiment of the application, by responding to touch operation of user on the value transfer option, if the network signal strength of the terminal is lower than a signal threshold, the identity verification information of the user is obtained based on the local verification interface, the value transfer option is used for triggering the value transfer to the second user, so that the terminal can perform identity verification on the user, if the identity verification information passes verification, a value transfer certificate is generated, the value transfer certificate carries user information, second user information and a target value, the value transfer certificate can be guaranteed to be generated only under the condition that the identity verification passes, the identification code of the value transfer certificate is displayed, and therefore, if the network signal strength of the terminal is higher than the signal threshold, a settlement request is sent to the server, so that the server responds to the settlement request, namely, performs the value transfer operation of transferring the target value to the second user, the identity verification is performed based on the local verification interface, and the value transfer certificate is generated locally, therefore, the method does not rely on the value transfer, and the near field communication environment is capable of realizing the near field communication and the security of the value transfer operation can be achieved without the near field communication environment.
In possible embodiments, based on the apparatus composition of fig. 4, the apparatus further comprises:
and receiving a settlement result returned by the server based on the settlement request, and updating th user account balance according to the settlement result, wherein the account balance is a value obtained by subtracting the target value from an original value.
In possible implementations, the obtaining module 401 is configured to:
call a local password verification interface to obtain the password entered by the user, or,
a local biometric interface is invoked to obtain the biometric information of the user.
In possible implementations, the generating module 402 is configured to:
acquiring second user information, target object price and target object quantity of a page where the numerical value transfer option is located;
determining the target value according to the price of the target object and the quantity of the target object, wherein the target value is obtained by multiplying the price of the target object and the quantity of the target object;
generating the value transfer certificate according to the st user information of the th user, the second user information and the target value.
In possible implementations, the obtaining module 401 is configured to:
responding to the touch operation of the th user on the value transfer option in the target page, acquiring the wireless network signal strength and the mobile communication signal strength at the current moment, and if the wireless network signal strength is lower than the th signal threshold and the mobile communication signal strength is lower than the second signal threshold, executing the step of acquiring the identity verification information.
All the above-mentioned optional technical solutions can be adopted to form any combination of the optional embodiments of the present disclosure, and are not described in detail in herein.
It should be noted that, when the value transfer apparatus provided in the foregoing embodiment transfers a value, only the division of each function module is illustrated, and in practical applications, the function distribution may be completed by different function modules according to needs, that is, the internal structure of the terminal is divided into different function modules to complete all or part of the functions described above.
Fig. 5 is a schematic structural diagram of an numerical value transfer device provided in an embodiment of the present application, and referring to fig. 5, the device includes:
a scanning and analyzing module 501, configured to scan an identifier of a numeric transfer certificate displayed at th terminal if the network signal strength of the second terminal is lower than the signal threshold, analyze the identifier of the numeric transfer certificate, and obtain th user information, second user information, and a target numeric value carried in the numeric transfer certificate, where the th terminal corresponds to the th user, and the second terminal corresponds to the second user;
a storage module 502, configured to store the value transfer credential if the second user information passes the verification;
a sending module 503, configured to send, to a server, a settlement request carrying the value transfer certificate if the network signal strength of the second terminal is higher than the signal threshold, where the settlement request is used to request the server to respond to the settlement request and perform a value transfer operation of transferring the target value to the second user;
the terminal responds to touch operation of a user on a value transfer option in a target page, if the network signal strength of the terminal is lower than a signal threshold, identity verification information of the user is acquired based on a local verification interface, and if the identity verification information passes verification, the value transfer credential is generated and used for triggering value transfer to the second user.
The apparatus provided in this embodiment of the present application, if the network signal strength of the second terminal is lower than the signal threshold, scans the identification code of the numeric transfer credential shown by the terminal, may analyze the identification code of the numeric transfer credential, to obtain the th user information, the second user information, and the target numeric value carried in the numeric transfer credential, thereby verifying the second user information, and if the second user information passes the verification, it is verified that the numeric transfer is valid at this time, so that the numeric transfer credential is stored, so that if the network signal strength of the second terminal is higher than the signal threshold, a settlement request carrying the numeric transfer credential is sent to the server, so that the server responds to the settlement request, and performs a numeric transfer operation of the target numeric value to the second user.
It should be noted that, when the value transfer apparatus provided in the foregoing embodiment transfers a value, only the division of each function module is illustrated, and in practical applications, the function distribution may be completed by different function modules according to needs, that is, the internal structure of the terminal is divided into different function modules to complete all or part of the functions described above.
Fig. 6 shows a block diagram of a terminal 600 provided in exemplary embodiments of the present application, where the terminal 600 may be the terminal or the second terminal in the above embodiments, the terminal 600 may be a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer, and the terminal 600 may also be referred to as a user equipment, a portable terminal, a laptop terminal, a desktop terminal, or other names.
In general, the terminal 600 includes: a processor 601 and a memory 602.
Processor 601 may include or more Processing cores, such as a 4-core processor, an 8-core processor, etc. processor 601 may be implemented in at least hardware forms of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), a PLA (Programmable Logic Array), processor 601 may also include a main processor, which is a processor for Processing data in a wake-up state, also referred to as a CPU (Central Processing Unit), and a coprocessor, which is a low power processor for Processing data in a standby state.
The memory 602 may include or more computer-readable storage media that may be non-transitory, the memory 602 may also include high speed random access memory, and non-volatile memory, such as or more disk storage devices, flash memory storage devices in some embodiments the non-transitory computer-readable storage media in the memory 602 is configured to store at least instructions, the at least instructions being configured to be executed by the processor 601 to implement the value transfer methods provided by the various embodiments herein.
In embodiments, terminal 600 may also optionally include a peripheral interface 603 and at least peripherals, processor 601, memory 602, and peripheral interface 603 may be connected by a bus or signal lines, each peripheral may be connected to peripheral interface 603 by a bus, signal line, or circuit board, and in particular, peripherals may include at least of radio frequency circuitry 604, touch screen display 605, camera assembly 606, audio circuitry 607, positioning assembly 608, and power supply 609.
Peripheral interface 603 may be used to connect at least I/O (Input/Output) related peripherals to processor 601 and memory 602. in some embodiments , processor 601, memory 602, and peripheral interface 603 are integrated on the same chip or circuit board, in other embodiments , any or two of processor 601, memory 602, and peripheral interface 603 may be implemented on separate chips or circuit boards, which is not limited by this embodiment.
Radio Frequency circuitry 604 is configured to receive and transmit RF (Radio Frequency) signals, also referred to as electromagnetic signals, Radio Frequency circuitry 604 communicates with Communication networks and other Communication devices via electromagnetic signals Radio Frequency circuitry 604 converts electrical signals to electromagnetic signals for transmission, or alternatively converts received electromagnetic signals to electrical signals Radio Frequency circuitry 604 may optionally include an antenna system, an RF transceiver, or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and the like Radio Frequency circuitry 604 may communicate with other terminals via at least Wireless Communication protocols including, but not limited to, metropolitan area networks, various generations of mobile Communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks in embodiments, Radio Frequency circuitry 604 may also include circuitry related to NFC (Near Field Communication), which is not limited by this application.
The Display 605 is used to Display a UI (User Interface) which may include graphics, text, icons, video and any combination thereof, when the Display 605 is a touch Display, the Display 605 also has the ability to capture touch signals on or over the surface of the Display 605. the touch signals may be input to the processor 601 for processing as control signals, at which time the Display 605 may also be used to provide virtual buttons and/or virtual keyboards, also known as soft buttons and/or soft keyboards, in the embodiments, the Display 605 may be , providing the front panel of the terminal 600, in the embodiments, the Display 605 may be at least two, each disposed on a different surface of the terminal 600 or in a folded design, in the embodiments, the Display 605 may be a flexible Display, disposed on a curved surface or on a folded surface of the terminal 600. even, the Display 605 may be provided with non-rectangular irregular graphics, and the Display may be made of LED (liquid crystal Display, Organic Light Emitting Diode, or the like).
The embodiments include at least two rear cameras, namely any of a main camera, a depth of field camera, a -angle camera and a long-focus camera, so as to realize the fusion of the main camera and the depth of field camera to realize a background blurring function, the fusion of the main camera and the -angle camera to realize a panoramic shooting function and a VR (Virtual Reality) shooting function or other fusion shooting functions.
Audio circuitry 607 may include a microphone for capturing sound waves from the user and the environment and converting the sound waves into electrical signals for processing by processor 601 or for input to RF circuitry 604 for voice communications, a plurality of microphones may be provided at different locations on terminal 600 for stereo capture or noise reduction purposes, a microphone may also be an array microphone or an omni-directional capture type microphone, a speaker for converting electrical signals from processor 601 or RF circuitry 604 into sound waves, a speaker may be a conventional membrane speaker or a piezoelectric ceramic speaker, when a speaker is a piezoelectric ceramic speaker, it may convert electrical signals not only into human-audible sound waves, but also into human-inaudible sound waves for ranging purposes, and in some embodiments , audio circuitry 607 may also include an earphone jack.
The positioning component 608 is used to locate the current geographic location of the terminal 600 to implement navigation or LBS (location based Service). The positioning component 608 can be a positioning component based on the GPS (global positioning System) in the united states, the beidou System in china, the graves System in russia, or the galileo System in the european union.
Power supply 609 is used to provide power to the various components of terminal 600. Power supply 609 may be an AC power, a DC power, rechargeable batteries, or a rechargeable battery.
In embodiments, terminal 600 further includes or more sensors 610. the or more sensors 610 include, but are not limited to, acceleration sensor 611, gyroscope sensor 612, pressure sensor 613, fingerprint sensor 614, optical sensor 615, and proximity sensor 616.
The acceleration sensor 611 may detect the magnitude of acceleration in three coordinate axes of the coordinate system established with the terminal 600. For example, the acceleration sensor 611 may be used to detect components of the gravitational acceleration in three coordinate axes. The processor 601 may control the touch screen display 605 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 611. The acceleration sensor 611 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 612 may detect a body direction and a rotation angle of the terminal 600, and the gyro sensor 612 and the acceleration sensor 611 may cooperate to acquire a 3D motion of the user on the terminal 600. The processor 601 may implement the following functions according to the data collected by the gyro sensor 612: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
The pressure sensor 613 can be arranged at the side frame of the terminal 600 and/or at the lower layer of the touch display screen 605, when the pressure sensor 613 is arranged at the side frame of the terminal 600, a holding signal of the terminal 600 by a user can be detected, and left-right hand recognition or shortcut operation can be performed by the processor 601 according to the holding signal collected by the pressure sensor 613, when the pressure sensor 613 is arranged at the lower layer of the touch display screen 605, the control of an operability control on the UI interface can be realized by the processor 601 according to the pressure operation of the user on the touch display screen 605, and the operability control comprises up to types of button control, scroll bar control, icon control and menu control.
The fingerprint sensor 614 is used for collecting a fingerprint of a user, the identity of the user is identified by the processor 601 according to the fingerprint collected by the fingerprint sensor 614, or the identity of the user is identified by the fingerprint sensor 614 according to the collected fingerprint when the identity of the user is identified to be a credible identity, the user is authorized to execute relevant sensitive operations by the processor 601, the sensitive operations comprise screen unlocking, encrypted information viewing, software downloading, payment, setting change and the like.
The optical sensor 615 is used for acquiring the intensity of the ambient light, in embodiments, the processor 601 can control the display brightness of the touch display screen 605 according to the intensity of the ambient light acquired by the optical sensor 615, specifically, the display brightness of the touch display screen 605 is increased when the intensity of the ambient light is higher, the display brightness of the touch display screen 605 is decreased when the intensity of the ambient light is lower, in another embodiments, the processor 601 can also dynamically adjust the shooting parameters of the camera assembly 606 according to the intensity of the ambient light acquired by the optical sensor 615.
The proximity sensor 616, also called a distance sensor, is typically disposed on the front panel of the terminal 600. the proximity sensor 616 is used to capture the distance between the user and the front face of the terminal 600. in embodiments, the processor 601 controls the touch display 605 to switch from the bright screen state to the dim screen state when the proximity sensor 616 detects that the distance between the user and the front face of the terminal 600 is gradually decreasing, and the processor 601 controls the touch display 605 to switch from the dim screen state to the bright screen state when the proximity sensor 616 detects that the distance between the user and the front face of the terminal 600 is gradually increasing.
Those skilled in the art will appreciate that the configuration shown in fig. 6 is not intended to be limiting of terminal 600 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
For example, the computer readable storage medium may be a ROM (Read-Only Memory), a RAM (Random-Access Memory), a CD-ROM (Compact Disc Read-Only Memory), a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in computer readable storage mediums, which may be read only memory, magnetic or optical disks, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (11)

1, A method for transferring numerical values, the method comprising:
responding to touch operation of an th user on a value transfer option in a target page, if the network signal strength of a th terminal is lower than a signal threshold, acquiring identity verification information of the th user based on a local verification interface, wherein the value transfer option is used for triggering value transfer to a second user, and the th terminal corresponds to the th user;
if the identity verification information passes verification, generating a value transfer certificate, wherein the value transfer certificate carries th user information, second user information and a target value;
displaying an identification code of the value transfer certificate in a value transfer interface, wherein the identification code is used for providing a scanning object for a second terminal, and the second terminal corresponds to the second user;
and if the network signal strength of the th terminal is higher than the signal threshold, sending a settlement request carrying the value transfer certificate to a server, wherein the settlement request is used for requesting the server to respond to the settlement request and execute a value transfer operation of transferring the target value to the second user.
2. The method of claim 1, wherein after sending a settlement request carrying the value transfer voucher to a server, the method further comprises:
and receiving a settlement result returned by the server based on the settlement request, and updating the account balance of the th user according to the settlement result, wherein the account balance is a value obtained by subtracting the target value from an original value.
3. The method of claim 1, wherein the obtaining identity verification information of the th user by the local-based verification interface comprises:
invoking a local password verification interface to obtain the password entered by the user, or,
a local biometric interface is invoked to obtain the biometric information of the user.
4. The method of claim 1, wherein generating a value transfer credential comprises:
acquiring second user information, target object price and target object quantity of a page where the numerical value transfer option is located;
determining the target value according to the price of the target object and the quantity of the target object, wherein the target value is obtained by multiplying the price of the target object and the quantity of the target object;
generating the value transfer certificate according to st user information of the th user, the second user information and the target value.
5. The method of claim 1, wherein the step of obtaining the identity verification information of the th user based on a local verification interface in response to the touch operation of the th user on the value shifting option in the destination page if the network signal strength of the th terminal is lower than the signal threshold comprises:
responding to the touch operation of the th user on the value transfer option in the target page, acquiring the wireless network signal strength and the mobile communication signal strength at the current moment, and if the wireless network signal strength is lower than the th signal threshold and the mobile communication signal strength is lower than the second signal threshold, executing the step of acquiring identity verification information.
6, A method for transferring numerical values, the method comprising:
if the network signal strength of the second terminal is lower than the signal threshold, scanning an identification code of a numerical transfer certificate displayed by an th terminal, analyzing the identification code of the numerical transfer certificate, and obtaining th user information, second user information and a target numerical value carried in the numerical transfer certificate, wherein the th terminal corresponds to a th user, and the second terminal corresponds to the second user;
if the second user information passes the verification, storing the value transfer certificate;
if the network signal intensity of the second terminal is higher than the signal threshold, sending a settlement request carrying the numerical value transfer certificate to a server, wherein the settlement request is used for requesting the server to respond to the settlement request and execute a numerical value transfer operation of transferring the target numerical value to the second user;
the terminal responds to touch operation of a user on a value transfer option in a target page, if the network signal strength of the terminal is lower than a signal threshold, identity verification information of the user is acquired based on a local verification interface, and if the identity verification information passes verification, the value transfer credential is generated and used for triggering value transfer to the second user.
The value transfer system of , wherein the system comprises a th terminal and a second terminal, the th terminal corresponds to a th user, and the second terminal corresponds to a second user;
the terminal is used for responding to touch operation of a user on a value transfer option in a target page, acquiring identity verification information of the user based on a local verification interface if the network signal strength of the terminal is lower than a signal threshold value, and triggering value transfer to a second user, generating a value transfer certificate if the terminal verifies the identity verification information, wherein the value transfer certificate carries user information, second user information and a target value, displaying an identification code of the value transfer certificate in a value transfer interface, and the identification code is used for providing a scanning object to the second terminal;
the second terminal is used for scanning an identification code of the numerical transfer certificate displayed by the th terminal and analyzing the identification code of the numerical transfer certificate to obtain th user information, second user information and a target numerical value carried in the numerical transfer certificate if the network signal strength of the second terminal is lower than the signal threshold value;
if the network signal strength of any device of the th terminal or the second terminal is higher than the signal threshold, the any device sends a settlement request carrying the value transfer certificate to a server, and the settlement request is used for requesting the server to respond to the settlement request and execute the value transfer operation of transferring the target value to the second user.
8, numerical value transfer device, characterized in that, the device includes:
an obtaining module, configured to respond to a touch operation of an th user on a value transfer option in a target page, and if a network signal strength of a th terminal is lower than a signal threshold, obtain, based on a local verification interface, identity verification information of the th user, where the value transfer option is used to trigger a value transfer to a second user, and the th terminal corresponds to the th user;
the generating module is used for generating a numerical value transfer certificate if the identity verification information passes verification, wherein the numerical value transfer certificate carries th user information, second user information and a target numerical value;
the display module is used for displaying an identification code of the value transfer certificate in a value transfer interface, wherein the identification code is used for providing a scanning object for a second terminal, and the second terminal corresponds to the second user;
a sending module, configured to send, to a server, a settlement request carrying the value transfer certificate if the network signal strength of the th terminal is higher than the signal threshold, where the settlement request is used to request the server to respond to the settlement request and execute a value transfer operation of transferring the target value to the second user.
9, numerical value transfer device, characterized in that, the device includes:
the scanning and analyzing module is used for scanning an identification code of a numerical transfer certificate displayed by an th terminal and analyzing the identification code of the numerical transfer certificate to obtain th user information, second user information and a target numerical value carried in the numerical transfer certificate if the network signal strength of a second terminal is lower than a signal threshold, wherein the th terminal corresponds to a th user, and the second terminal corresponds to the second user;
the storage module is used for storing the value transfer certificate if the second user information passes the verification;
a sending module, configured to send, to a server, a settlement request carrying the value transfer credential if the network signal strength of the second terminal is higher than the signal threshold, where the settlement request is used to request the server to respond to the settlement request and execute a value transfer operation of transferring the target value to the second user;
the terminal responds to touch operation of a user on a value transfer option in a target page, if the network signal strength of the terminal is lower than a signal threshold, identity verification information of the user is acquired based on a local verification interface, and if the identity verification information passes verification, the value transfer credential is generated and used for triggering value transfer to the second user.
10, terminals, characterized in that, the terminals include or more processors and or more memories, the or more memories storing at least program codes, the at least program codes being loaded and executed by the or more processors to implement the operations executed by the value transfer method of any one of claims 1 to or claim 6.
Storage medium according to claim 11, , wherein the storage medium has stored therein at least pieces of program code, said at least pieces of program code being loaded into and executed by a processor to implement the operations performed by the value transfer method according to any one of claims 1 to or claim 6.
CN201910983834.1A 2019-10-16 2019-10-16 Numerical value transferring method, system, device, terminal and storage medium Pending CN110738491A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910983834.1A CN110738491A (en) 2019-10-16 2019-10-16 Numerical value transferring method, system, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910983834.1A CN110738491A (en) 2019-10-16 2019-10-16 Numerical value transferring method, system, device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN110738491A true CN110738491A (en) 2020-01-31

Family

ID=69269187

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910983834.1A Pending CN110738491A (en) 2019-10-16 2019-10-16 Numerical value transferring method, system, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110738491A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113011883A (en) * 2021-01-28 2021-06-22 腾讯科技(深圳)有限公司 Data processing method, device, equipment and storage medium
CN114722365A (en) * 2021-01-06 2022-07-08 腾讯科技(深圳)有限公司 Identity information identification method, related device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114722365A (en) * 2021-01-06 2022-07-08 腾讯科技(深圳)有限公司 Identity information identification method, related device, equipment and storage medium
CN113011883A (en) * 2021-01-28 2021-06-22 腾讯科技(深圳)有限公司 Data processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110705983B (en) Method, device, equipment and storage medium for code scanning payment processing
CN109688147B (en) Application login method, device, terminal, server, system and storage medium
CN110674022B (en) Behavior data acquisition method and device and storage medium
CN108256853B (en) Payment method and mobile terminal
CN111506884A (en) User invitation method, device, computer equipment and computer readable storage medium
CN111177013B (en) Log data acquisition method, device, computer equipment and storage medium
US20220075998A1 (en) Secure face image transmission method, apparatuses, and electronic device
CN110581831B (en) Communication method, information acquisition method, electronic device, and storage medium
CN111404991A (en) Method, device, electronic equipment and medium for acquiring cloud service
CN111125601A (en) File transmission method, device, terminal, server and storage medium
CN111241499A (en) Application program login method, device, terminal and storage medium
CN111866140A (en) Fusion management apparatus, management system, service calling method, and medium
CN110738491A (en) Numerical value transferring method, system, device, terminal and storage medium
CN112036887A (en) Resource transfer method, device, equipment and storage medium
CN111970298B (en) Application access method and device, storage medium and computer equipment
CN112967043A (en) Resource transfer method, device, equipment and storage medium
CN111901283A (en) Resource transfer method, device, terminal and storage medium
CN111047328B (en) Mobile payment method, device, system and storage medium
CN111831385A (en) Business credit information processing method, device, equipment and storage medium
CN111694892B (en) Resource transfer method, device, terminal, server and storage medium
CN110956469A (en) Payment method, device, equipment and storage medium
CN111131619B (en) Account switching processing method, device and system
CN114816600B (en) Session message display method, device, terminal and storage medium
CN112258206B (en) Prop resource obtaining method, prop resource obtaining device, electronic equipment and storage medium
CN112764824B (en) Method, device, equipment and storage medium for triggering identity verification in application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination