CN108446903B - Data sending method and device and data receiving method and device for network payment - Google Patents

Data sending method and device and data receiving method and device for network payment Download PDF

Info

Publication number
CN108446903B
CN108446903B CN201710084714.9A CN201710084714A CN108446903B CN 108446903 B CN108446903 B CN 108446903B CN 201710084714 A CN201710084714 A CN 201710084714A CN 108446903 B CN108446903 B CN 108446903B
Authority
CN
China
Prior art keywords
terminal
application
message packet
field information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710084714.9A
Other languages
Chinese (zh)
Other versions
CN108446903A (en
Inventor
苗邦
李晓佑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710084714.9A priority Critical patent/CN108446903B/en
Publication of CN108446903A publication Critical patent/CN108446903A/en
Application granted granted Critical
Publication of CN108446903B publication Critical patent/CN108446903B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The invention relates to a data sending method and device, a data receiving method and device, a data sending method and device, a data receiving method and device for network payment. The data transmission method comprises the following steps: a first terminal receives a sending instruction of target data through an application, wherein the data sending instruction comprises a user identifier of a sending target; acquiring first field information in the target data; binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the application identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the consistency is ensured; and sending the message packet to a second terminal associated with the user identification. The data sending method and device and the data receiving method and device can give consideration to both safety and convenience in the data sending and receiving processes.

Description

Data sending method and device and data receiving method and device for network payment
Technical Field
The invention relates to the technical field of information security processing, in particular to a data sending method and device, a data receiving method and device, and application thereof: a data sending method and device for network payment and a data receiving method and device for network payment are provided.
Background
The data transmission based on the mobile internet has strong convenience. However, there is always a risk that data is lost or intercepted by a non-target transmission object during network transmission. Especially for some data with very high security requirements, such as electronic red envelope data, transfer payment data or transaction order data, etc., the loss of the data or the interception of the data by a non-target transmission object can cause information loss to a message sender or others. Therefore, while security of transmission is considered, convenience of data processing is also considered.
For order payment, the order information is one type of data. With the application functions of the smart phone becoming more and more powerful and convenient, the smart phone has stronger convenience in order payment. In a traditional method for order payment by using a mobile phone, verification is not usually required for operation with a small payment amount, so that convenience of order payment is realized. For the operation with a large amount (for example, the transaction amount is 50 ten thousand RMB), when the amount involved in the operation exceeds the value allowed by the mobile phone, the large amount value transfer needs to be completed in a special payment APP to ensure the payment security. However, this requires the user to download the corresponding APP and operate according to the flow specified by the APP, which complicates the payment operation. Therefore, it is difficult for the conventional data processing method to achieve both convenience and security of data processing.
Disclosure of Invention
In view of the above, it is necessary to provide a data transmission method and apparatus, a data reception method and apparatus, and applications thereof, which can achieve both convenience and security of data transmission: a data sending method and device and a data receiving method and device for network payment are provided.
A method of data transmission, the method comprising:
a first terminal receives a sending instruction of target data through an application, wherein the data sending instruction comprises a user identifier of a sending target;
the first terminal acquires first field information in the target data through the application;
the first terminal binds the first field information with the user identification through the application and encapsulates the first field information into a message packet, so that when the message packet is received by other terminals through the application, consistency verification of the application identification in the message packet and the user identification of the received application is triggered, and if the message packet is consistent with the user identification, display of the first field information is triggered;
and the first terminal sends the message packet to a second terminal associated with the user identification through the application.
A data transmission apparatus, the apparatus comprising:
the sending instruction receiving module is used for receiving a sending instruction of target data through application, and the data sending instruction comprises a user identifier of a sending target;
the message packet encapsulation module is used for acquiring first field information in the target data through the application; binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the application identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the consistency is ensured;
and the message packet sending module is used for sending the message packet to a second terminal associated with the user identifier through the application.
According to the data sending method and device, when the application receives a sending instruction of the target data, the first field information in the target data is obtained, the user identification of the sending target is bound with the first field information, the first field information is packaged into the message packet, when the second terminal receives and displays the message packet, consistency verification of the application identification in the message packet and the user identification of the received application is triggered, and if the application identification is consistent with the user identification of the received application, display of the first field information is triggered. The safety and the convenience of data transmission can be considered.
A method of data reception, the method comprising:
the second terminal receives the message packet through the application;
the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal through the application;
and if so, the second terminal displays the first field information in the message packet through the application.
A data receiving apparatus, the apparatus comprising:
the message packet receiving module is used for receiving the message packet through the application;
the verification module is used for verifying whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not through the application;
and the display module is used for displaying the first field information in the message packet through the application when the verification is consistent.
According to the data receiving method and device, when the message packet is received by the second terminal through the application, the consistency verification of the user identification is triggered before the first field information in the message packet is displayed, and when the first field information is consistent, the first field information is displayed. Because the verification does not need manual operation of a user, the convenience and the safety of displaying the data in the message packet can be considered.
A data transmission method for network payment, the method comprising:
a first terminal receives a sending instruction of order information through an application, wherein the data sending instruction comprises a user identifier of a sending target;
the first terminal acquires first field information in the order information through the application;
the first terminal binds the first field information with the user identification through the application and encapsulates the first field information into a message packet, so that when the message packet is received by other terminals through the application, consistency verification of the application identification in the message packet and the user identification of the received application is triggered, and if the message packet is consistent with the user identification, display of the first field information is triggered;
the first terminal sends the message packet to a second terminal associated with the user identification through the application;
and the second terminal is a terminal with payment authority for the order information.
A data transmission apparatus for network payment, the apparatus comprising:
the sending instruction receiving module is used for receiving a sending instruction of order information through application, and the data sending instruction comprises a user identifier of a sending target;
the message packet encapsulation module is used for acquiring first field information in the order information through the application; binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the application identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the consistency is ensured;
a message packet sending module, configured to send the message packet to a second terminal associated with the user identifier through the application;
and the second terminal is a terminal with payment authority for the order information.
According to the data transmission method and device for the network payment, when the first terminal receives the transmission instruction of the order information through the application, the first field information in the order information is obtained, the user identification of the transmission target is bound with the first field information, the first field information is packaged into the message packet, when the first terminal receives and displays the message packet, consistency verification of the application identification in the message packet and the user identification of the received application is triggered, and if the consistency is achieved, display of the first field information is triggered. The safety and the convenience of order information sending can be considered.
A data receiving method for network payment, the method comprising:
the second terminal receives the message packet through the application;
the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal through the application;
and if so, the second terminal displays the first field information in the message packet through the application.
A data receiving apparatus for network payment, the apparatus comprising:
the message packet receiving module is used for receiving the message packet through the application;
the verification module is used for verifying whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not through the application;
and the display module is used for displaying the first field information in the message packet through the application when the verification is consistent.
According to the data receiving method and device for network payment, after the second terminal receives the message packet through the application, before information display is carried out, whether the user identification in the message packet is consistent with the user identification applied by the second terminal needs to be verified, and when the user identification in the message packet is consistent with the user identification applied by the second terminal, display of the first field information in the message packet is carried out. Because the verification does not need manual operation of a user, the convenience and the safety of displaying the order information in the message packet can be considered.
A data receiving method for network payment, the method comprising:
the second terminal establishes close range communication connection with the first terminal;
the second terminal receives order information sent by the first terminal through near field communication connection, and the order information is provided with an encryption password by the first terminal;
the second terminal acquires a verification password and detects whether the verification password is consistent with the encryption password;
if so, the second terminal carries out payment processing according to the order information;
and the second terminal is a terminal with payment authority for the order information.
A data receiving apparatus for network payment, the apparatus comprising:
the near field communication module is used for establishing near field communication connection with the first terminal; receiving order information sent by a first terminal through near field communication connection, wherein the order information is provided with an encryption password by the first terminal; acquiring a verification password, and detecting whether the verification password is consistent with the encrypted password;
the payment module is used for carrying out payment processing according to the order information when the verification password is consistent with the encryption password; wherein the payment module order information has payment authority.
According to the data receiving method and the data receiving device for the network payment, the order information is transmitted to the second terminal in a near field communication mode, and the second terminal completes payment of the order information. The method and the device can be applied to the application condition that the first terminal does not have the payment authority or the payment is inconvenient to carry out. The order information is transmitted in a close range communication mode, so that the convenience of payment can be improved. The first terminal encrypts and transmits the order information to the second terminal, the second terminal verifies the acquired verification password, order payment can be carried out only after the verification is consistent, and the second terminal is a target terminal in a certain range where the first terminal generating the order information is located, so that the payment safety can be improved.
Drawings
FIG. 1 is a diagram of an application environment of a data sending method and a receiving party in one embodiment;
FIG. 2 is a diagram of an application environment of a data transmission method and a receiver in another embodiment;
FIG. 3 is an internal block diagram of a first terminal in one embodiment;
FIG. 4 is an internal block diagram of a second terminal in one embodiment;
FIG. 5 is a flow diagram of a method for data transmission in one embodiment;
FIG. 6 is a flow chart of a method for receiving data according to an embodiment;
FIG. 7 is a flow diagram of a data transmission method for network payment in one embodiment;
FIG. 8 is a diagram illustrating an example of an interface for providing a prompt to determine whether to use a second terminal to make a payment;
FIG. 9 is a flow diagram of a data receiving method for network payment in one embodiment;
FIG. 10 is a flow chart of a data receiving method for network payment in another embodiment;
FIG. 11 is a block diagram showing the structure of a data transmission apparatus according to an embodiment;
FIG. 12 is a block diagram showing the structure of a data receiving apparatus according to an embodiment;
FIG. 13 is a flow diagram of a data transmission device for network payment in one embodiment;
fig. 14 is a flowchart of a data transmission apparatus for network payment in another embodiment;
FIG. 15 is a flow diagram of a data receiving device for network payment in one embodiment;
fig. 16 is a flowchart of a data receiving apparatus for network payment in another embodiment;
fig. 17 is a flowchart of a data receiving apparatus for network payment in still another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The data transmission method and the data reception method provided by the embodiment of the invention can be applied to the application environment shown in fig. 1. The application environment includes a first terminal 102, a server 106, and a second terminal 104. The first terminal 102 and the second terminal 104 both run the same application, and the server 106 is a background server of the application. The first terminal 102 and the second terminal 104 may establish a communication connection through the server 106 based on an application running thereon. A first terminal receives a sending instruction of target data through an application, wherein the data sending instruction comprises a user identifier of a sending target; acquiring first field information in target data through the application; binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the application identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the first field information and the user identification are consistent; and sending the message packet to a second terminal associated with the user identification. The second terminal receives the message packet through the application; verifying whether the user identifier in the message packet is consistent with the user identifier associated with the second terminal; if so, the second terminal displays the first field information in the message packet through the application. The data includes data for network payment, and specifically, may be order information. The application environment shown in fig. 1 may be specifically an application environment of a data transmission method and a data reception method for network payment.
In one embodiment, as shown in fig. 2, an application environment diagram of another data receiving method for network payment includes a first terminal 112 and a second terminal 114. The first terminal 112 and the second terminal 114 establish a connection relationship through a short-range communication method. The first terminal 112 generates order information, sets an encryption password for the order information, and transmits the order information to the second terminal 114 by the near field communication method. The second terminal receives order information sent by the first terminal through near field communication connection; acquiring a verification password, and detecting whether the verification password is consistent with the encryption password; if so, the second terminal carries out payment processing according to the order information; and the second terminal is a terminal with payment authority for the order information.
Fig. 3 is a schematic diagram of an internal structure of the first terminal in one embodiment. The first terminal is a sending end of target data and comprises a processor, a nonvolatile storage medium, an internal memory and a network interface which are connected through a system bus. The nonvolatile storage medium stores an operating system and a data transmission device. The processor is used for providing calculation and control capability and supporting the operation of the whole first terminal. The internal memory of the second terminal provides an environment for operating the data transmission apparatus in the non-volatile storage medium, and the internal memory may store computer readable instructions, and when the computer readable instructions are executed by the processor, the processor may be caused to execute a data transmission method. The network interface is used for carrying out network communication with the server and/or the second terminal, and the display screen is used for displaying an application interface and the like. In one embodiment, the data sending device in the first terminal may be specifically a data sending device for network payment, and the computer readable instructions stored in the internal memory may cause the processor to execute a data sending method for network payment when executed by the processor.
Fig. 4 is a schematic diagram of an internal structure of the second terminal in one embodiment. The second terminal is a receiving end of the target data, and comprises a processor, a nonvolatile storage medium, an internal memory and a network interface which are connected through a system bus. The nonvolatile storage medium stores an operating system and a data receiving device. The processor is used for providing calculation and control capability and supporting the operation of the whole second terminal. The internal memory of the second terminal provides an environment for the operation of the data receiving apparatus in the non-volatile storage medium, and the internal memory may store computer readable instructions, and when the computer readable instructions are executed by the processor, the processor may be caused to execute a data receiving method. The network interface is used for carrying out network communication with the server and/or the first terminal, and the display screen is used for displaying an application interface and the like. In one embodiment, the data receiving device in the second terminal may be specifically a data receiving device for network payment, and the computer readable instructions stored in the internal memory may be executed by the processor, so as to cause the processor to execute a data receiving method for network payment.
Those skilled in the art will appreciate that the configurations shown in fig. 3 and/or fig. 4 are merely block diagrams of some configurations relevant to the present disclosure, and do not constitute a limitation on the first terminal and/or the second terminal to which the present disclosure applies, and that a particular first terminal and/or second terminal may include more or fewer components than shown in the figures, or may combine certain components, or have a different arrangement of components. The first terminal and the second terminal can be desktop computers, and can also be mobile terminals such as mobile phones and tablet computers.
In one embodiment, a data processing method is provided. The system can be applied in the application environment as shown in fig. 1, and comprises a first terminal 102 and a second terminal 104, wherein:
the first terminal 702 receives a sending instruction of target data through an application, wherein the data sending instruction comprises a user identifier of a sending target; acquiring first field information in target data; binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the application identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the application identification in the message packet is consistent with the user identification of the received application; and sending the message packet to a second terminal associated with the user identification.
The second terminal 704 receives the message packet through the application; verifying whether the user identifier in the message packet is consistent with the user identifier associated with the second terminal; and if so, displaying the first field information in the message packet.
The target data may be data for network payment, such as order information to be paid. And after the second terminal displays the first field information, the second terminal can execute corresponding payment operation so as to complete the payment of the order information.
In one embodiment, as shown in fig. 5, a data transmission method is provided. The embodiment is mainly illustrated by applying the method to the first terminal as shown in fig. 1, and specifically includes the following steps:
step S502, the first terminal receives a sending instruction of target data through an application, wherein the data sending instruction comprises a user identification of a sending target.
In this embodiment, the application is an application having a communication function, and includes a social application, a payment application, a mail application, a game application, or the like. The Social application includes an Instant Messaging (IM) application, an SNS (Social Network Service) application, or a live broadcast application. An instant messaging application is an application tool that can send and receive internet messages and the like instantly.
The application may exist and run in the form of a client on the first terminal, may also exist and run in the form of a web page, and so on. The target data may be data in a preset area in the display interface of the application, and the data in the selected preset interface may also be used as target data to be sent. The target data may include sensitive data such as electronic red envelope data, transfer payment data, or transaction order data, etc. of information that is lost or intercepted by non-target transmission objects during network transmission and may cause loss to the sender of the information or to others.
The first terminal may generate a transmission instruction by detecting an operation of a data transmission virtual key, a preset data transmission voice, a preset data transmission gesture, and the like acting on the application. The data sending instruction comprises a user identification of a sending target, wherein the user identification is the identification of a user logging in the application and is used for uniquely identifying the user identity of the application.
In one embodiment, the user identifier of the sending target is a user identifier having a friend relationship with the user identifier of the application logged in on the first terminal, or may also be a user identifier associated with the first terminal. The user identifier associated with the first terminal is a user identity used for uniquely identifying the application logged in on the first terminal, and may be the user identifier of the application logged in on the first terminal.
Further, the application is an application that can allow the same user to log in at the same time on multiple types of terminals. And when the user identifier contained in the sending instruction is the user identifier associated with the first terminal, correspondingly determining the type of the terminal of the receiving target. Specifically, the application may be determined by information such as a version number for the application. For example, the same application installed on different types of terminals, such as a mobile phone terminal and a computer terminal, has different information, such as version numbers of the applications installed therein.
For example, the same user may log in the application at the mobile phone side and the computer side at the same time, and select the target user to send as the user. If the application is sent to the computer end from the mobile phone end, the user identifier contained in the sending instruction is the user identifier of the user of the application logged in the first terminal, and the sent second terminal is designated as the computer end.
Step S504, the first terminal obtains the first field information in the target data through the application.
The first field is a field included in the target data. Specifically, the first field may be one or more preset types of fields, or may be all fields included in the target data. The preset types of the fields can correspond to the types of the target data, and different types of the target data correspond to different types of the first fields.
For example, if the target data is a piece of text data or picture data, the first field information may be all the field information included in the corresponding target data. If the target data is a kind of web page data, the first field information may be one or more types of field information in the web page data, for example, information of several keywords included in the web page data.
Step S506, the first terminal binds the first field information with the user identification through the application and encapsulates the first field information into a message packet, so that when the message packet is received by other terminals through the application, consistency verification of the application identification in the message packet and the user identification of the received application is triggered, and if the message packet is consistent with the user identification of the received application, display of the first field information is triggered.
In this embodiment, the application may extract the user identifier of the sending destination, use the user identifier as a newly added field information, combine and bind the newly added field information with the first field information, and encapsulate a message packet that can be recognized by the application. The message packet can be a structure information, so that the binding of the target data and the user identification of the sending target is realized. Further, the application further sets a display triggering mechanism for the message packet, so that when other terminals acquire and display the message packet, the display triggering mechanism is triggered, the user identifier of the currently logged-in application on the received terminal is acquired, whether the user identifier is consistent with the user identifier encapsulated in the message packet is verified, and if so, the display of the first field information is triggered.
Step S508, the first terminal sends the message packet to the second terminal associated with the user identifier through the application.
In this embodiment, the second terminal associated with the user identifier refers to a terminal that logs in the application of the corresponding user identifier. Specifically, the application identifier may be sent to a background server corresponding to the application, and when detecting that the application identifier corresponding to the application registered by the second terminal is the application identifier sent by the message packet, the background server forwards the message packet to the second terminal.
According to the data transmission method, when the first terminal receives a transmission instruction of target data through the application, the first field information in the target data is obtained, the user identification of the transmission target and the first field information are bound and packaged into the message packet, so that when the first terminal receives and displays the message packet, consistency verification of the application identification in the message packet and the user identification of the received application is triggered, and if the application identification is consistent with the user identification of the received application, display of the first field information is triggered. The safety and the convenience of data transmission can be considered.
In an embodiment, before step S508, the data transmission method further includes: encrypting the message packet according to a preset encryption mode; step S508 includes: and sending the encrypted message packet to a second terminal associated with the user identification.
In this embodiment, the first field information, the user identifier, and other information may be converted according to a preset encryption manner, that is, the information, such as the converted first field information and the user identifier, included in the message packet is set with a corresponding encryption identifier, where the encryption identifier is used to identify a corresponding encryption manner. And when the second terminal receives the message packet through the application, determining a corresponding encryption mode according to the encryption identifier, and acquiring corresponding information such as the first field information, the user identifier and the like according to a corresponding decryption mode.
In an embodiment, before step S508, the data transmission method further includes: the method comprises the steps that a first terminal encapsulates preset second field information into a message packet through application, so that when the message packet is received by other terminals through the application and is verified to be inconsistent, display of the second field information is triggered; step S508 includes: and the first terminal sends the message packet which encapsulates the second field information to the second terminal which is associated with the user identification through the application.
In this embodiment, the first terminal further presets second field information through the application, where the second field information may be blank information or information for prompting that the target data is displayed incorrectly or is not allowed to be displayed. Second field information is also encapsulated into the message packet. The display triggering mechanism set for the message packet by the application further comprises: and when the message packet is received and displayed by the second terminal through the application, if the message packet is not verified to be consistent, displaying the corresponding second field information. Therefore, the receiving user can not see the transmitted target user, and the safety of target data transmission is improved.
In an embodiment, the first terminal further sets a deletion mechanism for the message packet through the application, so that when the verification inconsistency is detected, the deletion mechanism is triggered, and the first field information in the message packet is deleted, thereby further improving the security of target data transmission.
In one embodiment, the first terminal further sets a validity duration for the message packet through the application, where the validity duration starts to take effect since the message packet is sent. The effective time period can be any custom-defined or preset suitable time period, such as 1 minute or 3 minutes. When receiving the display of the application message, detecting whether the display time is within the effective duration, if so, triggering corresponding consistency verification, otherwise, directly displaying the corresponding second field information, and/or deleting the corresponding first field information, so as to improve the security of the corresponding target data.
In an embodiment, as shown in fig. 6, a data receiving method is provided, and this embodiment is mainly illustrated by applying the method to a second terminal shown in fig. 1, and specifically includes the following steps:
step S602, the second terminal receives the message packet through the application.
In this embodiment, when the server detects that the target object to be sent is effectively logged on the second terminal through the application in the message packet to be sent, the server sends the message packet to be sent to the second terminal. The message packet contains first field information and user identification, is provided with a display triggering mechanism, and can also comprise second field information. When the message packet is received by the application, the display of the message packet can be automatically triggered, or a display instruction is generated by detecting the operation of a data display virtual key acting on the application, presetting data display voice, presetting data display gestures and the like, and the message packet is displayed.
Step S604, the second terminal verifies whether the user identifier in the message packet is consistent with the user identifier associated with the second terminal through the application. If so, go to step S606, otherwise, go to step S608.
And when receiving a display instruction of the message packet, triggering a preset display triggering mechanism of the message packet. According to the display triggering mechanism, the application can obtain the user identification of the application, compare the user identification with the user identification in the message packet, verify whether the user identification and the user identification are consistent, and determine whether to display the first field information in the message packet according to the verification result. If so, go to step S606, otherwise, go to step S608.
Step S606, the second terminal displays the first field information in the message packet through the application.
And when the verification is consistent, the first field information can be displayed through the application according to the display mode corresponding to the message packet. The first field information is target data sent by the first terminal to the second terminal.
And step S608, the second terminal displays the second field information in the message packet through the application.
And when the verification is inconsistent, namely the second terminal is judged not to be the receiving terminal of the message packet, and the second field information can be displayed. The second field information may be blank information or information for prompting that the target data is presented with an error or is not allowed to be presented, so that the first field information is not presented.
In this embodiment, when the message packet is received by the second terminal through the application, the consistency verification of the user identifier is triggered before the first field information in the message packet is displayed, and when the first field information is consistent, the first field information is displayed. Because the verification does not need manual operation of a user, the convenience and the safety of displaying the data in the message packet can be considered.
In one embodiment, the message packet is further provided with a deletion mechanism, when the second terminal verifies that the application identifications are inconsistent through the application, the deletion mechanism is triggered, and the first field information in the message packet is deleted, so that the receiving safety of the target data can be further improved.
In one embodiment, the message packet is also set with a validity period, from which the validity time at which the corresponding message packet is received is determined. After step S602, the method further includes: detecting whether the receiving time of the message packet is valid time, if yes, executing step S604, otherwise, directly executing step S608, or prompting information such as receiving timeout of the message packet.
The effective duration is the time when the self-message packet is sent, and the effective duration is started to take effect. When receiving the display of the application message, detecting whether the display time is within the effective duration, if so, triggering corresponding consistency verification, otherwise, directly displaying corresponding second field information, and/or deleting corresponding first field information. By setting the effective time length, the receiving of the message packet by the user within the effective time can be further limited, so that the receiving safety of the message packet is further improved.
In one embodiment, the message packet further carries a corresponding encrypted identifier, and step S604 includes: determining a corresponding decryption mode according to the encrypted identifier, and restoring the application identifier contained in the message packet through the decryption mode; and carrying out consistency verification on the application identification of the application and the restored application identification. Step S606 includes: and restoring the first field information according to a corresponding decryption mode and displaying.
In one embodiment, after step S602, the method further includes: acquiring login frequency of the second terminal to the application; when the login frequency exceeds the preset frequency, step S604 is executed.
In this embodiment, after receiving the message packet through the application, the second terminal further obtains a login frequency of the user identifier corresponding to the application on the second terminal. The login frequency may be determined by parameters such as the login number and/or login duration of the application on the second terminal within the latest period of time corresponding to the application identifier. The larger the login frequency is, the more the login frequency and/or the longer the login time length of the application corresponding to the user identifier on the second terminal are within the latest period of time.
The preset frequency is a frequency preset by the application, and whether the target data in the terminal is displayed or not is determined by comparing the login frequency with the preset frequency. Specifically, when it is determined that the login frequency is greater than the preset frequency, the step S604 is executed. When the login frequency is determined to be less than or equal to the preset frequency, the step S608 is executed. By setting the preset frequency, the first field information in the message packet can be prevented from being displayed by the unusual login terminal, and the security of displaying the first field information is improved.
In one embodiment, step S606 includes: the second terminal acquires display parameter data of the second terminal through application; and generating a display window matched with the display interface of the second terminal according to the display parameter data, and displaying the first field information in the display window.
In this embodiment, the application may read configuration information on the second terminal, and obtain corresponding display parameter data from the configuration information. The display parameter data includes data such as resolution, display size, and the like of the display screen of the second terminal. And generating a display window matched with the first field information to be displayed according to the display parameters, and displaying the corresponding first field information in the window.
Specifically, the corresponding relationship between different display parameter data and the display style data of the display window may be preset. And determining corresponding display style data according to the display parameter data, and generating a corresponding display window according to the display style data, so that the display of the first field information is matched with the second terminal.
In one embodiment, as shown in fig. 7, a data transmission method for network payment is provided. The embodiment is mainly illustrated by applying the method to the first terminal shown in fig. 1, and specifically includes the following steps:
step S702, the first terminal receives a sending instruction of order information through an application, and the data sending instruction comprises a user identifier of a sending target.
In this embodiment, the application is an application having a communication function. The order information is order information to be paid, which is generated by the first terminal according to operations such as transfer initiated by a user or purchase of related products. The order information includes, but is not limited to, product information of the product to be purchased, user information of the purchasing user, purchase time, and field information of the amount and transfer account to be paid. The product information comprises one or more of product name, product identification, product introduction and the like; the user information includes information such as a user name and a payment account of the user.
The first terminal can call the application running on the first terminal to obtain the order information, and generates a sending instruction of the order information by detecting operation of a data sending virtual key acting on the application, preset data sending voice, a preset data sending gesture and the like. The user identifier is an identifier of a user who logs in the application and is used for uniquely identifying the user identity of the application.
In one embodiment, the user identifier of the sending target is a user identifier having a friend relationship with the user identifier of the application logged in on the first terminal, or may also be a user identifier associated with the first terminal. The user identifier associated with the first terminal is a user identity used for uniquely identifying the application logged in on the first terminal, and may be the user identifier of the application logged in on the first terminal. In one embodiment, the first terminal is a mobile terminal, the second terminal is a PC terminal, and the same account of the application is logged in both the first terminal and the second terminal.
Further, the application is an application that can allow the same user to log in at the same time on multiple types of terminals. And when the user identifier contained in the sending instruction is the user identifier associated with the first terminal, correspondingly determining the type of the receiving target terminal. Specifically, the application may be determined by information such as a version number for the application. For example, the same application installed on different types of terminals, such as a mobile phone terminal and a computer terminal, has different information, such as version numbers of the applications installed therein.
For example, when the first terminal detects that the payment authority is not provided when attempting to make order payment, a prompt message whether to send the payment to other terminals through the application can be popped up. After receiving a confirmation instruction of the user, the application can be started, the order information is obtained, a selection instruction of a sending target is received, the user identification of the sending target is determined according to the selection instruction, and the sending instruction of the order information is received.
If the login account of the application in the valid login state does not exist on the first terminal, prompting the user to login the application, and extracting the login account when the valid login account exists on the application. If the fact that the login accounts of the applications in the valid login states exist on the first terminal is detected, a prompt interface for selecting one login account is displayed, the operation of selecting one login account by a user is received, and the user identification corresponding to the selected login account is used as the user identification associated with the first terminal.
Step S704, the first terminal obtains the first field information in the order information through the application.
In this embodiment, the first field information is all or part of the field information included in the order information. Specifically, the payment account information, the payment amount and the transfer account information of the user are included, one or more combinations of purchase time, product information and the like can be further included, and further, a payment password can be further included. Through the payment password, the terminal receiving the order information can complete order payment only by payment confirmation, so that the convenience of order payment is improved.
Step S706, the first terminal binds the first field information with the user identifier through the application, and encapsulates the first field information into a message packet, so that when the message packet is received by other terminals through the application, consistency verification of the application identifier in the message packet and the received user identifier of the application is triggered, and if the message packet is consistent with the received user identifier, display of the first field information is triggered.
The application can extract the user identification of the sending target, uses the user identification as new field information, combines and binds the new field information with the first field information, and encapsulates a message packet which can be identified by the application. The message packet may be a kind of structure information, thereby implementing the binding of the first field information and the user identifier of the sending destination. Further, the application further sets a display triggering mechanism for the message packet, so that when other terminals acquire and display the message packet, the display triggering mechanism is triggered, the user identifier of the currently logged-in application on the received terminal is acquired, whether the user identifier is consistent with the user identifier encapsulated in the message packet or not is verified, and if yes, the display of the first field information is triggered.
In step S708, the first terminal sends the message packet to the second terminal associated with the user identifier through the application.
The terminal associated with the user identifier refers to a terminal that logs in the application of the corresponding user identifier. The message packet can be sent to a background server corresponding to the application, and when the background server detects that the application identifier corresponding to the application logged in by the second terminal is the application identifier sent by the message packet, the message packet is forwarded to the second terminal.
Specifically, the server may obtain the user identifier associated with the first terminal according to the connection relationship, and detect whether a terminal having the same association relationship with the user identifier also exists in the other terminals that maintain connection. And if so, taking the detected terminal as a second terminal. Otherwise, after detecting that a terminal establishing communication connection with the user identification exists, the terminal is used as a second terminal. And after the second terminal is determined, sending the message packet uploaded by the first terminal to the second terminal. The second terminal is a terminal having a payment authority for the order information, and may be a PC terminal, for example. And the second terminal can execute corresponding payment operation after receiving the order information.
According to the data transmission method for the network payment, when the first terminal receives the transmission instruction of the order information through the application, the first field information in the order information is obtained, the user identification of the transmission target is bound with the first field information, and the first field information is packaged into the message packet, so that when the first terminal receives and displays the message packet, consistency verification of the application identification in the message packet and the user identification of the received application is triggered, and if the application identification is consistent with the user identification of the received application, display of the first field information is triggered. The safety and the convenience of order information sending can be considered.
Particularly, for order information of a large amount required to be paid, the order information can be generated on the first terminal which can conveniently generate the order information through the method, and is sent to the second terminal with the payment authority, and the second terminal carries out payment. For example, order information is generated at a mobile phone end of a user, the order information is sent to a computer end of the user through instant messaging application, and the computer end directly carries out payment operation on the order information, so that the safety and the convenience of the order payment operation are guaranteed.
In an embodiment, before step S708, the data transmission method for network payment further includes: encrypting the message packet according to a preset encryption mode; step S708 includes: and sending the encrypted message packet to a second terminal associated with the user identification.
In an embodiment, before step S708, the data transmission method for network payment further includes: the method comprises the steps that a first terminal encapsulates preset second field information into a message packet through application, so that when the message packet is received by other terminals through the application and is verified to be inconsistent, display of the second field information is triggered; step S708 includes: and the first terminal sends the message packet which encapsulates the second field information to the second terminal which is associated with the user identification through the application.
In this embodiment, the first terminal further presets second field information through the application, where the second field information may be blank information or information for prompting that the target data is displayed incorrectly or is not allowed to be displayed. Second field information is also encapsulated into the message packet. When the message packet is displayed by the second terminal through the application, if the message packet is not displayed, the corresponding second field information is displayed, so that the receiving user cannot view the transmitted target user, and the safety of target data transmission is improved.
In an embodiment, the first terminal further sets a deletion mechanism for the message packet through the application, so that when the verification inconsistency is detected, the deletion mechanism is triggered, and the first field information in the message packet is deleted, thereby further improving the security of target data transmission.
In one embodiment, the first terminal further sets a validity duration for the message packet through the application, where the validity duration starts to take effect since the message packet is sent. The effective time period can be any custom-defined or preset suitable time period, such as 1 minute or 3 minutes. When receiving the display of the application message, detecting whether the display time is within the effective duration, if so, triggering corresponding consistency verification, otherwise, directly displaying the corresponding second field information, and/or deleting the corresponding first field information, so as to improve the security of the corresponding target data.
In one embodiment, before step S702, the first terminal may detect whether the first terminal has the right to pay the order information, and if not, step S702 is executed.
Specifically, the first terminal may obtain an amount to be paid in the order information, determine whether the amount exceeds a preset limit, and if so, determine that the payment authority is not provided. At this time, the first terminal may display a prompt message indicating whether to send the order to the second terminal for payment on the interface, and execute step S702 after receiving the confirmation operation of the user. The preset limit can be a transaction limit agreed with the first terminal by a transaction platform related to the order information or a selected payment mode and the like.
When the payment authority is not provided, the first terminal can display the notification information without the payment authority on the interface. And further showing prompt information whether to use the second terminal for payment. As shown in fig. 8, when the payment amount referred to by the order information exceeds the limit, "exceed bank card limit, XX bank savings card single stroke 50000.00, single day 50000.00 is prompted. Is payment made with the second terminal? And when receiving the clicking operation of clicking the transfer guide virtual key by the user, judging that the user agrees to pay by adopting the second terminal. At least one application existing on the first terminal can be acquired, and according to the selection of the user on one application, the display interface of the corresponding application is jumped to, and the order information is displayed.
In one embodiment, as shown in fig. 9, a data receiving method for network payment is provided. The embodiment is mainly illustrated by applying the method to the second terminal shown in fig. 1, and specifically includes the following steps:
step S902, the second terminal receives the message packet through the application.
In this embodiment, the message packet includes the first field information in the order information, and further includes a user identifier of a sending destination. Further, the message packet further includes the second field information. When the application receives the message packet, the application can automatically trigger the display of the message packet, or generate a display instruction by detecting the operation of a data display virtual key acting on the application, presetting data display voice, presetting data display gestures and the like, and display the message packet.
When the application corresponding to the user identifier on the second terminal is in the valid login state, the second terminal can receive the bound message packet sent by the first terminal through the application. Specifically, a message packet forwarded by the first terminal through the server corresponding to the application is received.
Step S904, the second terminal verifies whether the user identifier in the message packet is consistent with the user identifier associated with the second terminal through the application. If so, go to step S906, otherwise, go to step S908.
The message packet is provided with a presentation trigger mechanism. And when receiving a display instruction of the message packet, triggering a preset display triggering mechanism of the message packet. According to the display triggering mechanism, the application can obtain the user identification of the application and compare the user identification with the user identification in the message packet to verify whether the user identification and the user identification are consistent, and determine whether to display the first field information in the message packet according to the verification result. If so, go to step S906, otherwise, go to step S908.
Step S906, the second terminal displays the first field information in the message packet through the application.
And when the verification is consistent, the first field information in the order information can be displayed through the application according to the display mode corresponding to the message packet. The first field information is order information sent by the first terminal to the second terminal.
In one embodiment, after step S906, the method further includes: and the second terminal performs payment processing according to the first field information.
Specifically, the second terminal may provide a virtual key for confirming payment by displaying the first field information through the application. If the first field information contains all necessary data required by payment, the order payment can be directly completed after the operation of the virtual key is received. If partial necessary data is lacked, the necessary data input in the display interface by the user is received, and after the operation of the virtual key is received, order payment can be carried out. The necessary data includes the user's payment account number, the amount of payment and the transfer account, etc. After the operation acting on the virtual key is detected, the corresponding interface can be called, and the payment of the order information is completed by interacting with a corresponding online bank payment server.
Step S908, the second terminal displays the second field information in the message packet through the application.
When the verification shows that the information is inconsistent, namely the second terminal is judged not to be the receiving terminal of the message packet, the second field information can be displayed. The second field information may be blank information or information for prompting the order information to show an error or not allow to show, so that the first field information is not shown. The user can not check the order information, so that the payment operation on the order can not be carried out, and the payment safety and the privacy of the user information are ensured.
In this embodiment, after receiving the message packet through the application, the second terminal needs to verify whether the user identifier in the message packet is consistent with the user identifier of its own application before performing information display, and when the user identifier in the message packet is consistent with the user identifier of its own application, the second terminal performs display of the first field information in the message packet. Because the verification does not need manual operation of a user, the convenience and the safety of displaying the order information in the message packet can be considered.
In one embodiment, the message packet is further provided with a deletion mechanism, when the second terminal verifies that the application identifications are inconsistent through the application, the deletion mechanism is triggered, and the first field information in the message packet is deleted, so that the receiving safety of the target data can be further improved.
In one embodiment, the message packet is also set with a validity duration, from which the validity time for the receipt of the corresponding message packet is determined. After step S902, the method further includes: detecting whether the receiving time of the message packet is valid time, if yes, executing step S904, otherwise, directly executing step S908, or prompting the message packet to receive prompt information such as timeout.
In an embodiment, the message packet further carries a corresponding encrypted identifier, and after step S902, the method further includes: and determining a corresponding decryption mode according to the encryption identifier, and restoring the application identifier contained in the message packet through the decryption mode. Step S904 includes: and carrying out consistency verification on the application identification of the application and the restored application identification. Step S906 includes: and restoring the first field information according to a corresponding decryption mode and displaying.
In one embodiment, after step S902, the method further includes: acquiring login frequency of the second terminal to the application; when the login frequency exceeds the preset frequency, step S904 is performed.
In one embodiment, step S906 includes: the second terminal acquires display parameter data of the second terminal through application; and generating a display window matched with the display interface of the second terminal according to the display parameter data, and displaying the first field information in the display window.
In this embodiment, the application may read configuration information on the second terminal, and obtain corresponding display parameter data from the configuration information. The display parameter data includes data such as resolution, display size, and the like of the display screen of the second terminal. And generating a display window matched with the first field information to be displayed according to the display parameters, and displaying the corresponding first field information in the window.
Specifically, the corresponding relationship between different display parameter data and the display style data of the display window may be preset. And determining corresponding display style data according to the display parameter data, and generating a corresponding display window according to the display style data, so that the display of the first field information is matched with the second terminal.
In one embodiment, as shown in fig. 10, another data receiving method for network payment is provided. The present embodiment is exemplified by the application of the payment method to the second terminal as shown in fig. 2. Referring to fig. 10, the payment method specifically includes the following steps:
step S1002, the second terminal establishes a near field communication connection with the first terminal.
In this embodiment, the short-distance communication mode includes bluetooth communication, WiFi hotspot communication, and the like. The second terminal can receive the near field communication connection request initiated by the first terminal and establish near field communication connection with the first terminal according to the request. Or the second terminal can inquire the identifiable terminal according to a preset near field communication mode, display the identified terminal information on a display interface of the first terminal, initiate a near field communication request to the first terminal according to the selection operation of the user on the displayed first terminal, and establish the near field communication connection with the first terminal after receiving the information which is fed back by the first terminal and agrees to establish the communication connection.
And step S1004, the second terminal receives the order information sent by the first terminal through the near field communication connection, and the order information is set with an encryption password by the first terminal.
In this embodiment, the encryption password may be set by the first terminal according to information actively input by the user, or may be a password automatically set by the first terminal. The automatically set password may be a user identifier associated with the near field communication application in the first terminal. The user identifier is used for uniquely identifying and confirming the identity of the user, and can be a login account of the near field communication application.
The order information provided with the encryption password is combined with each field information in the order to form structure information which can be identified by application, so that the order information is encrypted. So that the correct encryption password needs to be verified before viewing the order information.
Step S1006, the second terminal obtains the verification password and detects whether the verification password is consistent with the encryption password. If so, go to step S1008, otherwise, go to step S1010.
In this embodiment, the second terminal may detect the set encryption mode of the encrypted order information. And if the encryption is automatic encryption, automatically extracting the user identification associated with the near field communication application in the second terminal, and taking the user identification as the verification password. If the password is manually encrypted, the second terminal can provide a password input interface and take the information input by the user at the corresponding interface position as the verification password.
And the second terminal compares the acquired verification password with the encryption password and judges whether the two are consistent. If yes, it means that the second terminal is the target terminal sent by the first terminal, and step S1008 is executed, otherwise, step S1010 is executed.
And step S1008, the second terminal carries out payment processing according to the order information.
In this embodiment, the second terminal is a terminal having a payment authority for the order information. The second terminal can display the order information in an application interface, provide a button for confirming payment, receive click operation of a user on the button to jump to a corresponding payment interface, receive corresponding necessary data input by the user on the payment interface, and interact with a corresponding server for online banking payment to complete payment of the order information.
Step S1010, displaying the received message as a message of failed reception.
And when the verification result is inconsistent, displaying the received message as a message of failed reception, so that specific field information in the order information cannot be displayed. For example, prompt information such as order invalidation or invalidation can be displayed, so that a user cannot view order information, and payment operation is performed on the order, so that the payment security and the privacy of user information are ensured.
In the data receiving method for network payment provided by this embodiment, the order information is transmitted to the second terminal in a near field communication manner, and the second terminal completes payment of the order information. The method and the device can be applied to the application condition that the first terminal does not have the payment authority or the payment is inconvenient to carry out. The convenience of payment can be improved by transmitting the order information in a near field communication mode. The first terminal encrypts and transmits the order information to the second terminal, the second terminal verifies the acquired verification password, order payment can be carried out only after the verification is consistent, and the second terminal is a target terminal in a certain range where the first terminal generating the order information is located, so that the payment safety can be improved.
In one embodiment, the order information is further set by the first terminal for a valid time; before the step of detecting whether the verification password is consistent with the encrypted password, the order payment method further includes: the second terminal detects whether the verification password is acquired within the valid time, and if the verification password is acquired within the valid time, the step of detecting whether the verification password is consistent with the encryption password is executed; and if the valid time is exceeded, displaying that the received message is a message with failed reception.
In this embodiment, before the first terminal sends the encrypted order information, an effective duration may be set for the order information, and the effective duration may be the sum of the effective duration and the receiving time of the second terminal. Therefore, the password verification of the order information needs to be completed within the effective time. The valid duration may be set to any suitable duration, which may be a fixed duration automatically generated by the first terminal, for example, 1 minute, or may be any duration customized by the user.
Specifically, after receiving the order information, the second terminal may display a prompt message of receiving the close range communication message on a terminal interface. When the checking operation of the user on the order information is received, the set encryption mode of the encrypted order information can be detected, and the verification password is obtained according to the encryption mode. And comparing whether the obtaining time of the verification password is within the valid time, if so, detecting whether the verification password is consistent with the encryption password, and if not, the order information cannot be checked, and the order payment cannot be carried out on other terminals.
In this embodiment, the order information is set for the valid time, and whether the encrypted password is obtained within the valid time is detected, so that the password verification is time-efficient, and the order payment security can be further improved.
In one embodiment, as shown in fig. 11, there is provided a data transmission apparatus, operating on a first terminal, the apparatus including: a transmission instruction receiving module 1102, a message packet encapsulating module 1104 and a message packet transmitting module 1106. Wherein:
a sending instruction receiving module 1102, configured to receive, through an application, a sending instruction for target data, where the data sending instruction includes a user identifier of a sending target.
A message packet encapsulation module 1104, configured to obtain first field information in the target data through an application; and binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the application identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the application identification in the message packet is consistent with the user identification of the received application.
A message packet sending module 1106, configured to send, by the application, the message packet to the second terminal associated with the user identifier.
In one embodiment, the message packet encapsulating module 1104 is further configured to encapsulate preset second field information into a message packet through an application, so that when the message packet is received by other terminals through the application, the second field information is triggered to be displayed after the inconsistency is verified;
the message packet sending module 1106 is further configured to send, by the application, the message packet encapsulating the second field information to the second terminal associated with the user identifier.
In one embodiment, the user identity is a user identity associated with the first terminal.
In one embodiment, the message packet encapsulating module 1104 is further configured to encrypt the message packet according to a preset encryption manner; the message packet sending module 1106 is further configured to send the encrypted message packet to the second terminal associated with the user identifier.
In one embodiment, the message package encapsulation module 1104 is further configured to set a deletion mechanism for the message package through the application, such that when the verification inconsistency is detected, the deletion mechanism is triggered and the first field information in the message package is deleted.
In one embodiment, the message packet encapsulation module 1104 is further configured to set a validity duration for the message packet by the application, where the validity duration is set to take effect since the message packet was sent.
In one embodiment, as shown in fig. 12, a data receiving device is provided, which operates on a second terminal. The device comprises: a message packet receiving module 1202, a verification module 1204, and a presentation module 1206. Wherein:
a message packet receiving module 1202, configured to receive a message packet through an application.
The verifying module 1204 is configured to verify whether the user identifier in the message packet is consistent with the user identifier associated with the second terminal.
And the showing module 1206 is used for showing the first field information in the message packet through the application when the consistency is verified.
In one embodiment, the presentation module 1206 is further configured to present the second field information in the message packet by the application when the subscriber identity in the message packet is inconsistent with the subscriber identity associated with the second terminal.
In one embodiment, the verification module 1204 is further configured to obtain a login frequency of the second terminal to the application; and when the login frequency exceeds the preset frequency, the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not through the application.
In one embodiment, the presentation module 1206 is further configured to obtain display parameter data of the second terminal through the application; and generating a display window matched with the display interface of the second terminal according to the display parameter data, and displaying the first field information in the display window.
In an embodiment, the message packet is further set with a valid duration, and the verification module 1204 is further configured to determine, according to the valid duration, a valid time for which the corresponding message packet is received, detect whether the receiving time of the message packet is the valid time, and if so, verify whether the user identifier in the message packet is consistent with the user identifier associated with the second terminal by applying the user identifier in the message packet. The presentation module 1206 is further configured to present, by the application, second field information in the message packet when the receiving time is not the valid time.
In one embodiment, the message packet further carries a corresponding encrypted identifier, and the verification module 1204 is further configured to determine a corresponding decryption manner according to the encrypted identifier, and restore the application identifier included in the message packet through the decryption manner; and carrying out consistency verification on the application identification of the application and the restored application identification. The displaying module 1206 is further configured to restore the first field information in the corresponding decryption manner, and perform displaying.
In one embodiment, the verification module 1204 is further configured to obtain a login frequency of the second terminal to the application; and when the login frequency exceeds the preset frequency, whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not is verified through application. The displaying module 1206 is further configured to display, by the application, the second field information in the message packet when the login frequency is less than or equal to the preset frequency.
In one embodiment, as shown in fig. 13, there is provided a data transmission apparatus for network payment, the apparatus is operable on a first terminal, and specifically includes: a transmission instruction receiving module 1302, a message packet encapsulating module 1304, and a message packet transmitting module 1306. Wherein:
a sending instruction receiving module 1302, configured to receive a sending instruction for the order information through an application, where the data sending instruction includes a user identifier of a sending target.
A message packet encapsulation module 1304, configured to obtain first field information in the order information through an application; and binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the application identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the application identification in the message packet is consistent with the user identification of the received application.
A message packet sending module 1306, configured to send, by the application, the message packet to the second terminal associated with the user identifier.
And the second terminal is a terminal with payment authority for the order information.
In one embodiment, the message packet encapsulating module 1304 is further configured to encapsulate, by an application, preset second field information into the message packet, so that when the message packet is received by another terminal through the application, after the inconsistency is verified, presentation of the second field information is triggered.
The message packet sending module 1306 is further configured to send, by the application, the message packet encapsulating the second field information to the second terminal associated with the user identifier.
In one embodiment, the user identity is a user identity associated with the first terminal.
In one embodiment, the message packet encapsulation module 1304 is further configured to encrypt the message packet according to a preset encryption manner; the message packet sending module 1306 is further configured to send the encrypted message packet to a second terminal associated with the user identifier.
In one embodiment, the message package encapsulating module 1304 is further configured to set a deletion mechanism for the message package through the application, so that when the verification inconsistency is detected, the deletion mechanism is triggered, and the first field information in the message package is deleted.
In one embodiment, the message packet encapsulation module 1304 is further configured to set a validity duration for the message packet by the application, where the validity duration is set to take effect since the message packet was sent.
In one embodiment, as shown in fig. 14, another data transmission apparatus for network payment is provided, the apparatus further comprising: a payment module 1308.
The payment module 1308 is used for detecting whether the authority for paying the order information is provided.
The sending instruction receiving module 1302 is configured to receive a sending instruction of order information through an application when the payment authority is not met.
In one embodiment, as shown in fig. 15, there is provided a data receiving apparatus for network payment, the apparatus being operable on a second terminal, and specifically including: a message packet receiving module 1502, a verification module 1504, and a presentation module 1506. Wherein:
a message packet receiving module 1502 is configured to receive a message packet through an application.
The verifying module 1504 is configured to verify whether the user identifier in the message packet is consistent with the user identifier associated with the second terminal by applying the user identifier.
And the showing module 1506 is used for showing the first field information in the message packet through the application when the consistency is verified.
In one embodiment, the presentation module 1506 is further configured to present, by the application, the second field information in the message package when the user identifier in the message package is inconsistent with the user identifier associated with the second terminal.
In one embodiment, the verification module 1504 is further configured to obtain a login frequency of the second terminal to the application; and when the login frequency exceeds the preset frequency, displaying second field information in the message packet through the application.
In one embodiment, the presentation module 1506 is further configured to obtain display parameter data of the second terminal through an application; and generating a payment interface matched with the display interface of the second terminal according to the display parameter data, and displaying the second field information in the payment interface.
In an embodiment, the message packet is further set with a valid duration, and the verifying module 1504 is further configured to determine, according to the valid duration, a valid time for which the corresponding message packet is received, detect whether the receiving time of the message packet is the valid time, and if so, verify, by applying the user identifier in the message packet, whether the user identifier is consistent with the user identifier associated with the second terminal. The presentation module 1506 is further configured to present, by the application, second field information in the message packet when the receiving time is not the valid time.
In one embodiment, the message packet further carries a corresponding encrypted identifier, and the verification module 1504 is further configured to determine a corresponding decryption manner according to the encrypted identifier, and restore the application identifier contained in the message packet through the decryption manner; and carrying out consistency verification on the application identification of the application and the restored application identification. The displaying module 1506 is further configured to restore the first field information in the corresponding decryption manner and perform displaying.
In one embodiment, the verification module 1504 is further configured to obtain a login frequency of the second terminal to the application; and when the login frequency exceeds the preset frequency, whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not is verified through application. The presentation module 1506 is further configured to present, by the application, the second field information in the message packet when the login frequency is less than or equal to the preset frequency.
In one embodiment, as shown in fig. 16, there is provided another data receiving apparatus for network payment, the apparatus further comprising:
a payment module 1508, configured to perform payment processing according to the first field information.
In one embodiment, as shown in fig. 17, there is provided still another data receiving apparatus for network payment, characterized in that the apparatus comprises:
a near field communication module 1702, configured to establish a near field communication connection with a first terminal; receiving order information sent by a first terminal through near field communication connection, wherein the order information is provided with an encryption password by the first terminal; acquiring a verification password, and detecting whether the verification password is consistent with the encryption password;
a payment module 1704, configured to perform payment processing according to the order information when the verification password is consistent with the encrypted password; the payment module order information has payment authority.
In one embodiment, the order information is also set by the first terminal for a validity time.
The short-distance communication module 1702 is further configured to detect whether the verification password is obtained within the valid time, and if the verification password is obtained within the valid time, detect whether the verification password is consistent with the encrypted password; and if the valid time is exceeded, displaying that the received message is a message with failed reception.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware that is instructed by a computer program, and the program may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), or the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only show some embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (28)

1. A method for transmitting data, the method comprising:
a first terminal receives a sending instruction of target data through an application, wherein the sending instruction comprises a user identifier of a sending target, and the user identifier is an identifier of a user which logs in the application and corresponds to the sending target;
the first terminal acquires first field information in the target data through the application;
the first terminal binds the first field information with the user identification through the application and encapsulates the first field information and the user identification into a message packet, so that when the message packet is received by other terminals through the application, consistency verification of the user identification in the message packet and the user identification of the received application is triggered, and if the message packet is consistent with the user identification, display of the first field information is triggered;
and the first terminal sends the message packet to a second terminal associated with the user identification through the application.
2. The method of claim 1, further comprising, before the step of the first terminal sending the message packet to the second terminal associated with the subscriber identity through the application:
the first terminal encapsulates preset second field information into the message packet through the application, so that when the message packet is received by other terminals through the application, the second field information is triggered to be displayed after the inconsistency is verified;
the step of the first terminal sending the message packet to a second terminal associated with the user identifier through the application includes:
and the first terminal sends the message packet which encapsulates the second field information to a second terminal which is associated with the user identification through the application.
3. The method of claim 1, wherein the user identity is a user identity associated with the first terminal.
4. A method for receiving data, the method comprising:
the method comprises the steps that a second terminal receives a message packet through an application, wherein the message packet is obtained by binding and packaging first field information in target data with a user identifier after the first terminal receives a sending instruction which comprises the user identifier of a sending target and aims at the target data through the application; the user identification is the identification of a user which logs in the application and corresponds to the sending target;
the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal through the application;
and if so, the second terminal displays the first field information in the message packet through the application.
5. The method of claim 4, further comprising:
and when the user identification in the message packet is inconsistent with the user identification associated with the second terminal, the second terminal displays second field information in the message packet through the application.
6. The method of claim 4, further comprising, after the step of the second terminal receiving the message packet via the application:
acquiring the login frequency of the second terminal to the application;
and when the login frequency exceeds a preset frequency, the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal through the application.
7. The method according to claim 4, wherein the step of the second terminal presenting the first field information in the message packet through the application comprises:
the second terminal acquires display parameter data of the second terminal through the application;
and generating a display window matched with the display interface of the second terminal according to the display parameter data, and displaying the first field information in the display window.
8. A data transmission method for network payment, the method comprising:
a first terminal receives a sending instruction of order information through an application, wherein the sending instruction comprises a user identifier of a sending target, and the user identifier is an identifier of a user which logs in the application and corresponds to the sending target;
the first terminal acquires first field information in the order information through the application;
the first terminal binds the first field information with the user identification through the application and encapsulates the first field information into a message packet, so that when the message packet is received by other terminals through the application, consistency verification of the user identification in the message packet and the received user identification of the application is triggered, and if the message packet is consistent with the user identification of the application, display of the first field information is triggered;
the first terminal sends the message packet to a second terminal associated with the user identification through the application;
and the second terminal is a terminal with payment authority for the order information.
9. The method of claim 8, further comprising, before the step of the first terminal sending the message packet to the second terminal associated with the subscriber identity through the application:
the first terminal encapsulates preset second field information into the message packet through the application, so that when the message packet is received by other terminals through the application, the second field information is triggered to be displayed after the inconsistency is verified;
the step of the first terminal sending the message packet to a second terminal associated with the user identifier through the application includes:
and the first terminal sends the message packet which encapsulates the second field information to a second terminal which is associated with the user identification through the application.
10. The method of claim 8, wherein the user identity is a user identity associated with the first terminal.
11. A data receiving method for network payment, the method comprising:
the second terminal receives a message packet through application, wherein the message packet is obtained by binding and packaging first field information in order information with a user identifier after the first terminal receives a sending instruction which comprises the user identifier of a sending target and aims at the order information through the application; the user identification is the identification of a user which logs in the application and corresponds to the sending target;
the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal through the application;
if so, the second terminal displays the first field information in the message packet through the application;
and the second terminal is a terminal with payment authority for the order information.
12. The method of claim 11, further comprising:
and when the user identification in the message packet is not consistent with the user identification associated with the second terminal, the second terminal displays second field information in the message packet through the application.
13. The method of claim 11, further comprising, after the step of the second terminal receiving the message packet via the application:
acquiring the login frequency of the second terminal to the application;
and when the login frequency exceeds a preset frequency, the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal through the application.
14. The method according to claim 11, wherein the step of the second terminal presenting the first field information in the message packet through the application comprises:
the second terminal acquires display parameter data of the second terminal through the application;
and generating a payment interface matched with the display interface of the second terminal according to the display parameter data, and displaying the first field information in the payment interface.
15. A data transmission apparatus, characterized in that the apparatus comprises:
a sending instruction receiving module, configured to receive a sending instruction for target data through an application, where the sending instruction includes a user identifier of a sending target, and the user identifier is an identifier of a user that logs in to the application and corresponds to the sending target;
the message packet encapsulation module is used for acquiring first field information in the target data through the application; binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the user identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the consistency is ensured;
and the message packet sending module is used for sending the message packet to a second terminal associated with the user identifier through the application.
16. The apparatus according to claim 15, wherein the message packet encapsulating module is further configured to encapsulate, by the application, preset second field information into the message packet, so that when the message packet is received by other terminals through the application, after the inconsistency is verified, presentation of the second field information is triggered;
the message packet sending module is further configured to send, through the application, the message packet encapsulating the second field information to a second terminal associated with the user identifier.
17. The apparatus of claim 15, wherein the subscriber identity is a subscriber identity associated with the first terminal.
18. A data receiving apparatus, the apparatus comprising:
the message packet receiving module is used for receiving a message packet through an application, wherein the message packet is obtained by binding and packaging first field information in target data with a user identifier after a first terminal receives the user identifier comprising a sending target through the application and a sending instruction aiming at the target data; the user identification is the identification of a user which logs in the application and corresponds to the sending target;
the verification module is used for verifying whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not through the application;
and the display module is used for displaying the first field information in the message packet through the application when the verification is consistent.
19. The apparatus of claim 18,
the display module is further configured to display second field information in the message packet through the application when the user identifier in the message packet is inconsistent with the user identifier associated with the second terminal.
20. The apparatus of claim 18,
the verification module is further used for acquiring the login frequency of the second terminal to the application; and when the login frequency exceeds a preset frequency, the second terminal verifies whether the user identification in the message packet is consistent with the user identification associated with the second terminal through the application.
21. The apparatus of claim 18,
the display module is further used for acquiring display parameter data of the second terminal through the application; and generating a display window matched with the display interface of the second terminal according to the display parameter data, and displaying the first field information in the display window.
22. A data transmission apparatus for network payment, the apparatus comprising:
the sending instruction receiving module is used for receiving a sending instruction of order information through an application, wherein the sending instruction comprises a user identifier of a sending target, and the user identifier is an identifier of a user which logs in the application and corresponds to the sending target;
the message packet encapsulation module is used for acquiring first field information in the order information through the application; binding the first field information with the user identification, packaging the first field information into a message packet, triggering consistency verification of the user identification in the message packet and the user identification of the received application when the message packet is received by other terminals through the application, and triggering display of the first field information if the consistency is ensured;
a message packet sending module, configured to send the message packet to a second terminal associated with the user identifier through the application;
and the second terminal is a terminal with payment authority for the order information.
23. The apparatus of claim 22,
the message packet encapsulation module is also used for encapsulating preset second field information into the message packet through the application, so that when the message packet is received by other terminals through the application and is verified to be inconsistent, the second field information is triggered to be displayed;
and the message packet sending module is further used for sending the message packet which encapsulates the second field information to a second terminal which is associated with the user identification through the application.
24. The apparatus of claim 22, wherein the user identifier is a user identifier associated with the first terminal.
25. A data receiving apparatus for network payment, the apparatus comprising:
the message packet receiving module is used for receiving a message packet through an application, wherein the message packet is obtained by binding and packaging first field information in order information with a user identifier after a first terminal receives a sending instruction which comprises the user identifier of a sending target and aims at the order information through the application; the user identification is the identification of a user which logs in the application and corresponds to the sending target;
the verification module is used for verifying whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not through the application;
the display module is used for displaying the first field information in the message packet through the application when the first field information is verified to be consistent;
and the second terminal is a terminal with payment authority for the order information.
26. The apparatus of claim 25,
the display module is further configured to display second field information in the message packet through the application when the user identifier in the message packet is inconsistent with the user identifier associated with the second terminal.
27. The apparatus of claim 25,
the verification module is further used for acquiring the login frequency of the second terminal to the application; and when the login frequency exceeds a preset frequency, verifying whether the user identification in the message packet is consistent with the user identification associated with the second terminal or not through the application.
28. The apparatus of claim 25,
the display module is further used for acquiring display parameter data of the second terminal through the application; and generating a payment interface matched with the display interface of the second terminal according to the display parameter data, and displaying the first field information in the payment interface.
CN201710084714.9A 2017-02-16 2017-02-16 Data sending method and device and data receiving method and device for network payment Active CN108446903B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710084714.9A CN108446903B (en) 2017-02-16 2017-02-16 Data sending method and device and data receiving method and device for network payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710084714.9A CN108446903B (en) 2017-02-16 2017-02-16 Data sending method and device and data receiving method and device for network payment

Publications (2)

Publication Number Publication Date
CN108446903A CN108446903A (en) 2018-08-24
CN108446903B true CN108446903B (en) 2022-08-26

Family

ID=63190813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710084714.9A Active CN108446903B (en) 2017-02-16 2017-02-16 Data sending method and device and data receiving method and device for network payment

Country Status (1)

Country Link
CN (1) CN108446903B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1988693A (en) * 2006-12-14 2007-06-27 华为技术有限公司 Method for realizing user's signature and mobile terminal
CN103491533A (en) * 2013-09-23 2014-01-01 上海翰鑫信息科技有限公司 WAP gateway, user WAP terminal, WAP payment system and WAP payment method
CN106204035A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 Off-line identity identifying method, intelligent terminal and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1988693A (en) * 2006-12-14 2007-06-27 华为技术有限公司 Method for realizing user's signature and mobile terminal
CN103491533A (en) * 2013-09-23 2014-01-01 上海翰鑫信息科技有限公司 WAP gateway, user WAP terminal, WAP payment system and WAP payment method
CN106204035A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 Off-line identity identifying method, intelligent terminal and system

Also Published As

Publication number Publication date
CN108446903A (en) 2018-08-24

Similar Documents

Publication Publication Date Title
US20200090169A1 (en) Method and apparatus for facilitating electronic payments using a wearable device
EP3457344B1 (en) Payment authentication method, apparatus and system for onboard terminal
CN104601327B (en) A kind of safe verification method, relevant device and system
CN111917773B (en) Service data processing method and device and server
US9530126B2 (en) Secure mobile payment processing
US11557164B2 (en) Contactless card personal identification system
CN106034134B (en) Method, auxiliary method and device for carrying out identity authentication request in webpage application program
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN108959990B (en) Two-dimensional code verification method and device
CN106161354A (en) Service authentication method, device, equipment and service server
CN110838010A (en) Service processing method, device, terminal, server and storage medium
US11455606B2 (en) Tap to pay a credit bill via a computing device
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN108390819A (en) IM information protecting methods, device, equipment and computer storage media
US20170230834A1 (en) Information Sending Method and Apparatus, Terminal Device, and System
WO2017044677A1 (en) Method and apparatus for facilitating electronic payments using a wearable device
CN110830479B (en) Multi-card-based one-key login method, device, equipment and storage medium
CN103997730A (en) Method for decrypting, copying and pasting encrypted data
CN108446903B (en) Data sending method and device and data receiving method and device for network payment
JP6307610B2 (en) Data falsification detection device, data falsification detection method, and program
CN111181834B (en) Message processing method, device, server and storage medium
CN108564361B (en) Information processing method, device and equipment
CN105991572B (en) Login authentication method, device and system of wireless network
CN107066874A (en) Method and device for interactively verifying information between container systems
KR101639297B1 (en) Method and message intermediating server for verifying message based on user setting information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant