CN110517032A - Resource transfers method, system, device, server and storage medium - Google Patents
Resource transfers method, system, device, server and storage medium Download PDFInfo
- Publication number
- CN110517032A CN110517032A CN201910810691.4A CN201910810691A CN110517032A CN 110517032 A CN110517032 A CN 110517032A CN 201910810691 A CN201910810691 A CN 201910810691A CN 110517032 A CN110517032 A CN 110517032A
- Authority
- CN
- China
- Prior art keywords
- resource transfers
- token
- server
- resource
- signatory mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/105—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
Abstract
The invention discloses a kind of resource transfers method, system, device, server and storage mediums, belong to technical field of electronic commerce, comprising: terminal sends the first transfer request to first server, and the user identifier of user is carried in the first transfer request;First server receives the first transfer request, according to user identifier, the signatory mark of user, the selection target resource transfers token from the resource transfers token in resource transfers token pool are obtained, the resource transfers token in resource transfers token pool is the resource transfers token that second server is sent;Token is shifted according to signatory mark and target resource, generates resource transfers label;The second transfer request for carrying resource transfers and marking is sent to second server;Second server receives the second transfer request, carries out resource transfers according to the second transfer request.Token being shifted by target resource, dynamic authentication being carried out to resource transfers process, after avoiding the second shifting request from being trapped, sensitive information leakage improves resource transfers safety.
Description
Technical field
The present invention relates to technical field of electronic commerce, in particular to a kind of resource transfers method, system, device, server
And storage medium.
Background technique
With the development of e-commerce technology, gradually shifted by e-sourcing in such a way that entity card carries out resource transfers
Or the mode without card resource transfers replaces.User carry out e-sourcing transfer or without card resource transfers before, user need at end
Resource transfers card is bound in the third-party application installed on end;When user carries out resource transfers, pass through third-party application pair
The corresponding second server of the first server and resource transfers card answered realizes resource transfers.
Summary of the invention
The embodiment of the invention provides a kind of resource transfers method, system, device, server and storage mediums, can solve
Certainly due to carrying the sensitive information of the user in the second transfer request, after the second transfer request is trapped, other users
The sensitive information for obtaining the user, the problem for causing the safety of resource transfers lower.The technical solution is as follows:
On the one hand, a kind of resource transfers method is provided, which comprises
Terminal sends the first transfer request to first server, and user's mark of user is carried in first transfer request
Know;
The first server receives first transfer request and obtains the label of the user according to the user identifier
It about identifies, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource turns
The resource transfers token moved in token pool is the resource transfers token that second server is sent;According to the signatory mark and described
Target resource shifts token, generates resource transfers label;The second transfer request is sent to second server, second transfer is asked
It asks middle and carries the resource transfers label;
The second server receives second transfer request, carries out resource transfers according to second transfer request.
In one possible implementation, the method also includes:
The first server sends acquisition request to the second server, and the acquisition request is for requesting described the
Two servers generate new resource transfers token;
The second server receives the acquisition request, generates new resource transfers token, Xiang Suoshu first server
Send the new resource transfers token;
The first server receives the new resource transfers token, and the new resource transfers token is added to institute
It states in resource transfers token pool.
In alternatively possible implementation, before the terminal sends the first transfer request to first server, institute
State method further include:
The terminal sends bind request to the first server, carries the to be tested of the user in the bind request
Demonstrate,prove information;
The first server receives the bind request that the terminal is sent, and verifies to the information to be verified;
In response to being verified, the first server generates the signing mark of the user according to the information to be verified
Know, user identifier and the signatory mark described in associated storage.
In alternatively possible implementation, the first server generates the user according to the information to be verified
Signatory mark after, the method also includes:
The first server sends the signatory mark to the second server;
The second server receives the signatory mark, and the signatory mark is added in signatory mark library.
On the other hand, a kind of resource transfers method is provided, the method is applied to first server, the method packet
It includes:
The first transfer request is received, the user identifier of user is carried in first transfer request;
According to the user identifier, the signatory mark of the user is obtained, and from the resource in resource transfers token pool
Selection target resource transfers token in token is shifted, the resource transfers token in the resource transfers token pool is second server
The resource transfers token of transmission;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label;
The second transfer request is sent to second server, the resource transfers label is carried in second transfer request,
For requesting the second server to carry out resource transfers.
In one possible implementation, selection target in the resource transfers token from resource transfers token pool
Resource transfers token, comprising:
Determine the state of multiple resource transfers tokens in the resource transfers token pool;
According to the state of the multiple resource transfers token, from the resource transfers token in the resource transfers token pool
The target resource that state is selected to be not used by shifts token.
In alternatively possible implementation, mesh is selected in the resource transfers token from resource transfers token pool
Mark resource transfers token, comprising:
From the resource transfers token pool, a resource transfers token is selected;
Determine the state of the resource transfers token;
State in response to the resource transfers token is to be not used by, using the resource transfers token as target resource
Shift token.
In alternatively possible implementation, mesh is selected in the resource transfers token from resource transfers token pool
Mark resource transfers token, comprising:
Determine the term of validity of each resource transfers token in the resource transfers token pool;
According to the term of validity of each resource transfers token, enabled from the resource transfers in the resource transfers token pool
It includes the target resource transfer token of current time that term of validity is selected in board.
In alternatively possible implementation, the term of validity according to each resource transfers token, from institute
The target resource transfer token for selecting current time within term of validity in the resource transfers token in resource transfers token pool is stated,
Include:
According to current time and preset duration, determines and stab at the first time;
According to the term of validity of each resource transfers token, enabled from the resource transfers in the resource transfers token pool
It includes the target resource transfer token of the first time stamp that term of validity is selected in board.
In alternatively possible implementation, the term of validity according to each resource transfers token, from institute
The target resource transfer token for selecting current time within term of validity in the resource transfers token in resource transfers token pool is stated,
Include:
According to current time, preset duration and time coefficient, the second timestamp is determined;
According to the term of validity of each resource transfers token, enabled from the resource transfers in the resource transfers token pool
It includes the target resource transfer token of second timestamp that term of validity is selected in board.
In alternatively possible implementation, the method also includes:
Acquisition request is sent to the second server, the acquisition request is new for requesting the second server to generate
Resource transfers token;
The new resource transfers token is received, the new resource transfers token is added to the resource transfers token
In library.
In alternatively possible implementation, before the first transfer request of the reception, the method also includes:
The bind request that the terminal is sent is received, the information to be verified of the user is carried in the bind request;
The information to be verified is verified;
In response to being verified, the signatory mark of the user is generated according to the information to be verified;
User identifier described in associated storage and the signatory mark.
In alternatively possible implementation, the signatory mark that the user is generated according to the information to be verified
Later, the method also includes:
The signatory mark is sent to the second server, so that the second server adds the signatory mark
Into signatory mark library.
In alternatively possible implementation, the method also includes:
When sending the second transfer request to the second server, by the state of target resource transfer token by not
Using being revised as in;
When receiving the transfer completion instruction that the second server returns, by the shape of target resource transfer token
State is had been used by being revised as in using;
It is to have been used or validity period by state in the resource transfers token pool in response to clearing up resource transfers token
Limit does not include that the resource transfers token of current time is deleted.
It is described that token is shifted according to the signatory mark and the target resource in alternatively possible implementation,
Generate resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and by the target resource
Transfer token is added in the second field in the resource transfers label message, obtains the resource transfers label.
It is described that token is shifted according to the signatory mark and the target resource in alternatively possible implementation,
Before generating resource transfers label, the method also includes:
Obtain resource transfers information;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and by the target resource
Transfer token is added in the second field in the resource transfers label message, and the resource transfers information is added to
In information resources in the resource transfers label message, the resource transfers label is obtained.
On the other hand, a kind of resource transfers method is provided, the method is applied in second server, the method packet
It includes:
The second transfer request that first server is sent is received, resource transfers label is carried in second transfer request;
The resource transfers label is parsed, signatory mark and target resource transfer token are obtained;
Token is shifted according to the signatory mark and the target resource, second transfer request is verified;
In response to being verified, resource transfers are carried out according to second transfer request.
In one possible implementation, described that token is shifted according to the signatory mark and the target resource, it is right
Second transfer request is verified, comprising:
Verify whether the target resource transfer token is effective resource transfers token, and in verifying signatory mark library
With the presence or absence of the signatory mark;
It is effective resource transfers token in response to target resource transfer token, and exists in the signatory mark library
The signatory mark, determination are verified.
In alternatively possible implementation, before second transfer request for receiving first server transmission, institute
State method further include:
Resource transfers token is generated, Xiang Suoshu first server sends the resource transfers token, so that first clothes
The resource transfers token is added in resource transfers token pool by business device.
In alternatively possible implementation, the method also includes:
Receive the acquisition request that the first server is sent;
According to the acquisition request, new resource transfers token is generated;
The new resource transfers token is sent to the first server, so that the first server will be described new
Resource transfers token is added in the resource transfers token pool.
It is described that token is shifted according to the signatory mark and the target resource in alternatively possible implementation,
Before being verified to second transfer request, the method also includes:
Receive the signatory mark that the first server is sent;
The signatory mark is added in signatory mark library.
In alternatively possible implementation, the generation resource transfers token, comprising:
Determine current time, third timestamp, the third timestamp is the expired time point of current slot, and obtains
Take preset duration and time coefficient;
According to the current time, the preset duration and the time coefficient, determines and generate the resource transfers token
The 4th timestamp;
In response to the 4th timestamp in the third timestamp, according to the third timestamp, validity period is generated
It is limited to the resource transfers token of the third timestamp;
In response to the 4th timestamp not in the third timestamp, according to the third timestamp, the 5th is determined
Timestamp generates the resource transfers token that term of validity is the 5th timestamp.
On the other hand, a kind of resource transfers system is provided, the system comprises: terminal, first server and the second clothes
Business device;
The terminal carries user in first transfer request for sending the first transfer request to first server
User identifier;
The first server, according to the user identifier, obtains the user for receiving first transfer request
Signatory mark, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the money
It is the resource transfers token that second server is sent that the resource transfers token in token pool is shifted in source;According to the signatory mark and
The target resource shifts token, generates resource transfers label;To second server send the second transfer request, described second turn
It moves in request and carries the resource transfers label;
The second server carries out resource according to second transfer request for receiving second transfer request
Transfer.
In one possible implementation, the first server is also used to send acquisition to the second server
Request, the acquisition request is for requesting the second server to generate new resource transfers token;
The second server is also used to receive the acquisition request, generates new resource transfers token, Xiang Suoshu first
Server sends the new resource transfers token;
The first server is also used to receive the new resource transfers token, by the new resource transfers token
It is added in the resource transfers token pool.
In alternatively possible implementation, the terminal is also used to send bind request to the first server,
The information to be verified of the user is carried in the bind request;
The first server is also used to receive the bind request that the terminal is sent, and carries out to the information to be verified
Verifying;
The first server, is also used in response to being verified, and generates the user's according to the information to be verified
Signatory mark, user identifier and the signatory mark described in associated storage.
In alternatively possible implementation, the first server is also used to send institute to the second server
State signatory mark;
The second server is also used to receive the signatory mark, and the signatory mark is added to signatory mark library
In.
On the other hand, a kind of resource transfers device is provided, described device is applied to first server, described device packet
It includes:
First receiving module carries user's mark of user for receiving the first transfer request in first transfer request
Know;
First obtains module, is used to obtain the signatory mark of the user, and turn from resource according to the user identifier
Move selection target resource transfers token in the resource transfers token in token pool, the resource transfers in the resource transfers token pool
Token is the resource transfers token that second server is sent;
First generation module generates resource transfers for shifting token according to the signatory mark and the target resource
Label;
First sending module carries in second transfer request for sending the second transfer request to second server
The resource transfers label, for requesting the second server to carry out resource transfers.
In one possible implementation, described first module is obtained, is also used to determine the resource transfers token pool
In multiple resource transfers tokens state;According to the state of the multiple resource transfers token, from the resource transfers token pool
In resource transfers token in select state and shift token for the target resource that is not used by.
In alternatively possible implementation, described first obtains module, is also used to from the resource transfers token pool
In, select a resource transfers token;
Determine the state of the resource transfers token;State in response to the resource transfers token is to be not used by, will
The resource transfers token shifts token as target resource.
In alternatively possible implementation, described first obtains module, is also used to determine the resource transfers token
The term of validity of each resource transfers token in library;According to the term of validity of each resource transfers token, from the resource
Selection term of validity includes the target resource transfer token of current time in resource transfers token in transfer token pool.
In alternatively possible implementation, it is described first obtain module, be also used to according to current time and it is default when
It is long, it determines and stabs at the first time;According to the term of validity of each resource transfers token, from the resource transfers token pool
It includes the target resource transfer token of the first time stamp that term of validity is selected in resource transfers token.
In alternatively possible implementation, described first obtains module, is also used to according to current time, preset duration
And time coefficient, determine the second timestamp;According to the term of validity of each resource transfers token, enabled from the resource transfers
It includes the target resource transfer token of second timestamp that term of validity is selected in resource transfers token in board library.
In alternatively possible implementation, described device further include:
Second sending module, for sending acquisition request to the second server, the acquisition request is for requesting institute
It states second server and generates new resource transfers token;
Second receiving module adds the new resource transfers token for receiving the new resource transfers token
Into the resource transfers token pool.
In alternatively possible implementation, described device further include:
Third receiving module carries the use in the bind request for receiving the bind request of the terminal transmission
The information to be verified at family;
First authentication module, for being verified to the information to be verified;
Second generation module, for generating the signing of the user according to the information to be verified in response to being verified
Mark;
Memory module, for user identifier and the signatory mark described in associated storage.
In alternatively possible implementation, described device further include:
Third sending module, for sending the signatory mark to the second server, so that the second server
The signatory mark is added in signatory mark library.
In alternatively possible implementation, described device further include:
First modified module is used for when sending the second transfer request to the second server, by the target resource
The state for shifting token is revised as in by being not used;
Second modified module, when for completing instruction in the transfer for receiving the second server return, by the mesh
The state of mark resource transfers token is had been used by being revised as in using;
Removing module, in response to clear up resource transfers token, by state in the resource transfers token pool be by
Using or term of validity do not include current time resource transfers token delete.
In alternatively possible implementation, first generation module, for the signatory mark to be added to money
In the first field in the metastatic marker message of source, and target resource transfer token is added to the resource transfers and is marked
In the second field in message, the resource transfers label is obtained.
In alternatively possible implementation, described device further include:
Second obtains module, for obtaining resource transfers information;
First generation module is also used to for the signatory mark being added to the first word in resource transfers label message
Duan Zhong, and target resource transfer token is added in the second field in the resource transfers label message, and
The resource transfers information is added in the information resources in the resource transfers label message, the resource transfers mark is obtained
Note.
On the other hand, a kind of resource transfers device is provided, described device is applied in second server, described device packet
It includes:
4th receiving module, for receiving the second transfer request of first server transmission, in second transfer request
Carry resource transfers label;
Parsing module obtains signatory mark and target resource transfer token for parsing the resource transfers label;
Second authentication module, for shifting token according to the signatory mark and the target resource, to described second turn
Request is moved to be verified;
Resource transfers module, for carrying out resource transfers according to second transfer request in response to being verified.
In one possible implementation, second authentication module is also used to verify the target resource transfer and enables
Whether board is effective resource transfers token, and whether there is the signatory mark in verifying signatory mark library;In response to institute
Stating target resource transfer token is effective resource transfers token, and there are the signatory marks in the signatory mark library, really
Surely it is verified.
In alternatively possible implementation, described device further include:
Third generation module, for generating resource transfers token, Xiang Suoshu first server sends the resource transfers and enables
Board, so that the resource transfers token is added in resource transfers token pool by the first server.
In alternatively possible implementation, described device further include:
5th receiving module, the acquisition request sent for receiving the first server;
The third generation module is also used to generate new resource transfers token according to the acquisition request;
4th sending module, for sending the new resource transfers token to the first server, so that described
The new resource transfers token is added in the resource transfers token pool by one server.
In alternatively possible implementation, described device further include:
6th receiving module, the signatory mark sent for receiving the first server;
Adding module, for the signatory mark to be added in signatory mark library.
In alternatively possible implementation, the third generation module is also used to determine current time, third time
Stamp, the third timestamp is the expired time point of current slot, and obtains preset duration and time coefficient;According to described
Current time, the preset duration and the time coefficient determine the 4th timestamp for generating the resource transfers token;Response
In the 4th timestamp in the third timestamp, according to the third timestamp, generation term of validity is the third
The resource transfers token of timestamp;In response to the 4th timestamp not in the third timestamp, when according to the third
Between stab, determine the 5th timestamp, generate the resource transfers token that term of validity is the 5th timestamp.
On the other hand, a kind of first server is provided, the first server includes one or more processors and one
A or multiple memories are stored at least one instruction in one or more of memories, and at least one instruction is by institute
One or more processors are stated to load and execute to realize the resource transfers as described in above-mentioned any possible implementation
Operation performed by method.
On the other hand, a kind of second server is provided, the second server includes one or more processors and one
A or multiple memories are stored at least one instruction in one or more of memories, and at least one instruction is by institute
One or more processors are stated to load and execute to realize the resource transfers as described in above-mentioned any possible implementation
Operation performed by method.
On the other hand, provide a kind of non-transitorycomputer readable storage medium, be stored in the storage medium to
A few instruction, at least one instruction are loaded by processor and are executed to realize such as above-mentioned any possible implementation
Described in resource transfers method performed by operation.
On the other hand, provide a kind of non-transitorycomputer readable storage medium, be stored in the storage medium to
A few instruction, at least one instruction are loaded by processor and are executed to realize such as above-mentioned any possible implementation
Described in resource transfers method performed by operation.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
It can the limitation present invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is that exemplary partial implements system architecture involved in a kind of resource transfers method exemplified according to the present invention
Figure;
Fig. 2 is that exemplary partial implements a kind of system architecture that resource transfers method is related to exemplified according to the present invention
Figure;
Fig. 3 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 4 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 5 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 6 is a kind of schematic diagram of resource transfers label provided according to an exemplary embodiment;
Fig. 7 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment;
Fig. 9 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment;
Figure 10 is the structural schematic diagram that exemplary partial implements a kind of terminal exemplified according to the present invention;
Figure 11 is the structural schematic diagram that exemplary partial implements a kind of server exemplified according to the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is that exemplary partial implements a kind of system architecture that resource transfers method is related to exemplified according to the present invention
Figure, which includes: terminal 101, first server 102 and second server 103.The terminal 101 is that the present invention is implemented
In example, the terminal 101 of resource transfers request is initiated.Third-party application can be installed, first server 102 is in the terminal 101
The corresponding server of the third-party application, second server 103 is the server for carrying out resource transfers, for example, the second service
Device 103 can be the corresponding server of banking system.When terminal 101 initiates resource transfers request, pass through the third in terminal 101
Fang Yingyong sends the first transfer request to first server 102.First server 102 receives first transfer request, according to this
First transfer request determines the signatory mark of user, and according to first transfer request from the resource in resource transfers token pool
One target resource transfer transfer token of selection in token is shifted, token is shifted to second according to the signatory mark and target resource
Server 103 sends the second transfer request, and second server 103 receives second transfer request, according to second transfer request
Carry out resource transfers.
Wherein, first server 102 passes through network link or data between terminal 101 and second server 103 respectively
Interface carries out data interaction.The terminal 101 can be mobile phone, computer or wearable device etc..Third-party application is with certain
Strength and the corresponding application of the independent agency of prestige guarantee, the third-party application can be payment application, social application or bank
Client etc..Terminal 101, using docking with first server 102, is facilitated resource transfers both sides to complete resource and turned by the third
It moves.Correspondingly, the resource transfers process can be payment process, shopping online is carried out, take-away is ordered, pays stop on the net for example, working as
Fare or on the net when paying the cost of living, can carry out delivery operation by third-party application.Correspondingly, working as the resource transfers process
When for payment process, which can be payment token, which can be the mark of bank's card number of user
Know, transfer request can be payment request.The payment process can be with are as follows: when terminal 101 receive shopping online, it is fixed take out, net
On when paying parking fee or paying cost-of-living order on the net, terminal 101 initiates payment request according to the order;Correspondingly, eventually
Third-party application in end 101 sends the first payment request, first server 102 to first server 102 according to the order
According to first payment request, the selection target payment token in payment token library is taken according to the target payment token to second
Business device 103 sends the second payment request, and second server 103 receives second payment request, in second payment instruction
Signatory mark and target payment token are verified, and in response to being verified, complete delivery operation according to second payment request.
Fig. 2 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in Fig. 2, the resource
Transfer method the following steps are included:
Step 201: terminal sends the first transfer request to first server, and the use of user is carried in first transfer request
Family mark.
Step 202: the first server receives first transfer request, according to the user identifier, obtains the label of the user
It about identifies, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource transfers
Resource transfers token in token pool is the resource transfers token that second server is sent;It is provided according to the signatory mark and the target
Token is shifted in source, generates resource transfers label;The second transfer request is sent to second server, is carried in second transfer request
Resource transfers label.
Step 203: the second server receives second transfer request, carries out resource according to second transfer request and turns
It moves.
In one possible implementation, this method further include:
The first server sends acquisition request to the second server, and the acquisition request is for requesting the second server
Generate new resource transfers token;
The second server receives the acquisition request, generates new resource transfers token, and sending to the first server should
New resource transfers token;
The first server receives the new resource transfers token, which is added to the resource and is turned
It moves in token pool.
In alternatively possible implementation, before which sends the first transfer request to first server, the party
Method further include:
The terminal sends bind request to the first server, and the information to be verified of the user is carried in the bind request;
The first server receives the bind request of terminal transmission, verifies to the information to be verified;
In response to being verified, which generates the signatory mark of the user according to the information to be verified, association
Store the user identifier and the signatory mark.
In alternatively possible implementation, which generates the signing of the user according to the information to be verified
After mark, this method further include:
The first server sends the signatory mark to the second server;
The second server receives the signatory mark, which is added in signatory mark library.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
Fig. 3 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in figure 3, this method
Applied to first server, the resource transfers method the following steps are included:
Step 301: receiving the first transfer request, the user identifier of user is carried in first transfer request.
Step 302: according to the user identifier, obtaining the signatory mark of the user, and from resource transfers token pool
Selection target resource transfers token in resource transfers token, the resource transfers token in the resource transfers token pool are second service
The resource transfers token that device is sent.
Step 303: token being shifted according to the signatory mark and the target resource, generates resource transfers label.
Step 304: sending the second transfer request to second server, carry the resource transfers mark in second transfer request
Note, for requesting the second server to carry out resource transfers.
In one possible implementation, it selection target should be provided from the resource transfers token in resource transfers token pool
Shift token in source, comprising:
Determine the state of multiple resource transfers tokens in the resource transfers token pool;
According to the state of multiple resource transfers token, selected from the resource transfers token in the resource transfers token pool
State is the target resource transfer token being not used by.
In alternatively possible implementation, it is somebody's turn to do the selection target from the resource transfers token in resource transfers token pool
Resource transfers token, comprising:
From the resource transfers token pool, a resource transfers token is selected;
Determine the state of the resource transfers token;
State in response to the resource transfers token is to be not used by, and is shifted the resource transfers token as target resource
Token.
In alternatively possible implementation, it is somebody's turn to do the selection target from the resource transfers token in resource transfers token pool
Resource transfers token, comprising:
Determine the term of validity of each resource transfers token in the resource transfers token pool;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool
Selection term of validity includes the target resource transfer token of current time.
In alternatively possible implementation, term of validity according to each resource transfers token, from the resource
It shifts target resource of the selection current time within term of validity in the resource transfers token in token pool and shifts token, comprising:
According to current time and preset duration, determines and stab at the first time;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool
Selection term of validity includes the target resource transfer token of first time stamp.
In alternatively possible implementation, term of validity according to each resource transfers token, from the resource
It shifts target resource of the selection current time within term of validity in the resource transfers token in token pool and shifts token, comprising:
According to current time, preset duration and time coefficient, the second timestamp is determined;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool
Selection term of validity includes the target resource transfer token of second timestamp.
In alternatively possible implementation, this method further include:
Acquisition request is sent to the second server, the acquisition request is for requesting the second server to generate new resource
Shift token;
The new resource transfers token is received, which is added in the resource transfers token pool.
In alternatively possible implementation, before first transfer request of reception, this method further include:
The bind request of terminal transmission is received, the information to be verified of the user is carried in the bind request;
The information to be verified is verified;
In response to being verified, the signatory mark of the user is generated according to the information to be verified;
The associated storage user identifier and the signatory mark.
In alternatively possible implementation, after this generates the signatory mark of the user according to the information to be verified,
This method further include:
The signatory mark is sent to the second server, so that the signatory mark is added to signing mark by the second server
Know in library.
In alternatively possible implementation, this method further include:
When sending the second transfer request to the second server, by the state of target resource transfer token by being not used
It is revised as in;
Receive the second server return transfer complete instruction when, by the target resource transfer token state by
It is revised as having been used in use;
It is to have been used or term of validity by state in the resource transfers token pool in response to clearing up resource transfers token
It does not include the resource transfers token deletion of current time.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, generates money
Source metastatic marker, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted
Token is added in the second field in resource transfers label message, obtains resource transfers label.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, generates money
Before the metastatic marker of source, this method further include:
Obtain resource transfers information;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted
Token is added in the second field in resource transfers label message, and the resource transfers information is added to the resource and is turned
It moves in the information resources in label message, obtains resource transfers label.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
Fig. 4 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in figure 4, this method
Applied to second server, the resource transfers method the following steps are included:
Step 401: receiving the second transfer request that first server is sent, carry resource transfers in second transfer request
Label.
Step 402: parsing resource transfers label, obtain signatory mark and target resource transfer token.
Step 403: token being shifted according to the signatory mark and the target resource, which is verified.
Step 404: in response to being verified, resource transfers being carried out according to second transfer request.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, to this
Two transfer requests are verified, comprising:
It verifies whether target resource transfer token is effective resource transfers token, and is in verifying signatory mark library
It is no that there are the signatory marks;
It is effective resource transfers token in response to target resource transfer token, and there are the label in the signatory mark library
It about identifies, determination is verified.
In alternatively possible implementation, before the second transfer request which sends, the party
Method further include:
Resource transfers token is generated, sends the resource transfers token to the first server, so that the first server will
The resource transfers token is added in resource transfers token pool.
In alternatively possible implementation, this method further include:
Receive the acquisition request of first server transmission;
According to the acquisition request, new resource transfers token is generated;
The new resource transfers token is sent to the first server, so that the first server is by the new resource transfers
Token is added in the resource transfers token pool.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, to this
Before two transfer requests are verified, this method further include:
Receive the signatory mark of first server transmission;
The signatory mark is added in signatory mark library.
In alternatively possible implementation, the generation resource transfers token, comprising:
Determine current time, third timestamp, which is the expired time point of current slot, and is obtained
Preset duration and time coefficient;
According to the current time, the preset duration and the time coefficient, when determining the generate the resource transfers token the 4th
Between stab;
In response to the 4th timestamp in the third timestamp, according to the third timestamp, generating term of validity is to be somebody's turn to do
The resource transfers token of third timestamp;
In response to the 4th timestamp not in the third timestamp, according to the third timestamp, the 5th timestamp is determined,
Generate the resource transfers token that term of validity is the 5th timestamp.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
Fig. 5 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in figure 5, the resource
Transfer method the following steps are included:
Step 501: terminal sends the first transfer request to first server, and the use of user is carried in first transfer request
Family mark.
Needing to carry out resource transfers in response to terminal, terminal sends the first transfer request to first server, and this first turn
It moves in request and carries the user identifier of user, which can be the user currently logged in terminal, which is used for table
Show the object of this resource transfers operation.
Step 502: first server receives first transfer request, according to the user identifier, obtains the signing of the user
Mark.
In this step, after terminal receives first transfer request, according to the user identifier in first transfer request,
From in the corresponding relationship of user identifier and signatory mark, the signatory mark of the user is determined.
The first server can be directly from the corresponding relationship of the user identifier and signatory mark that are locally stored, and determining should
The corresponding signatory mark of user identifier.The user identifier can also be sent to second server by first server, correspondingly, the
The corresponding relationship that user identifier and signatory mark are stored in two servers, by second server according to the user identifier, from user
In the corresponding relationship of mark and signatory mark, the corresponding signatory mark of the user identifier is determined.
Wherein, which can be the unique corresponding signatory mark of resource transfers card of user.The resource transfers
Card is the resource transfers card bound in user account.
Correspondingly, terminal by the resource transfers card of the user and can be used by first server before this step
Family account is bound, and is generated and the unique corresponding signatory mark of the card number of resource transfers card.The generation signatory mark process
It can be realized by following steps (1)-(3), comprising:
(1) terminal sends bind request to the first server, and the letter to be verified of the user is carried in the bind request
Breath.
The verification information may include user identifier, the card number of resource transfers card of user, the name of user, user
At least one of identification card number and the phone number of user.The verification information carries out identity to the user for first server
Verifying.
The trigger action of bind request is detected in response to terminal, can by the third-party application in the terminal to this
One server sends bind request.For example, can show binding button in the interface of third-party application, detected in response to terminal
The binding button is triggered, and confirmly detects the trigger action of bind request, and terminal sends bind request to first server.Its
In the user can be the third-party application new user, or the historical user of the third-party application.In response to the use
Family is the new user of the third-party application, which also sends registration request to first server, can take in the registration request
With the bind request;It is the historical user of the third-party application in response to the user, which can be used for user's addition
New resource transfers card.In embodiments of the present invention, this is not especially limited.
(2) first server receives the bind request of terminal transmission, verifies to the information to be verified.
In the first server, the corresponding relationship of the user information of multiple users can be stored in advance, correspondingly, in response to
The first server receives the information to be verified of terminal transmission, waits checking and accepting card user information of the information from multiple users according to this
One user information of middle selection, which is compared with the user information, in response to the information to be verified and is somebody's turn to do
User information is identical, determines that the Information Authentication to be verified passes through, and executes step (3);In response to the information to be verified and the user
There is difference in information, determine that the verification information is unverified, the first prompt information of authentication failed be sent to terminal, accordingly
, when terminal receives first prompt information, according to first prompt information, show the second prompt information, second prompt
Whether information can also prompt user to detect information solicitation to be verified correct, for example, being somebody's turn to do for prompting user's current authentication to fail
Second prompt information can be " Bind Failed please determine whether information solicitation is wrong " etc..
It should be noted is that the terminal can also be verified by third server to the information to be verified.Phase
It answers, which is sent to third server for the information to be verified, and third server receives the information to be verified, right
The information to be verified is verified, and the verification result of the information to be verified is obtained, which is sent to first server,
First server receives verification result.Wherein, the process that third server verifies the information to be verified takes with first
The process that business device verifies the information to be verified is similar, and details are not described herein.In addition, the third server and second service
Device can be identical server, or different servers is in embodiments of the present invention not especially limited this.
(3) in response to being verified, which generates the signatory mark of the user according to the information to be verified, closes
Connection stores the user identifier and the signatory mark.
In this step, in response to the information to be verified by verifying, first server generates signatory mark at random, by this
The user information correlation of signatory mark and user, first server can also be according to the card numbers of resource transfers card in user information
Signatory mark is generated in embodiments of the present invention to be not especially limited the generating mode of the signatory mark.First server will
The signatory mark and user identifier associated storage are in designated memory space.
It should be noted is that being carried out by the third server to the information to be verified in response to the first server
Verifying, third server can directly generate signatory mark after being verified, which are sent to first service
Device, after first server receives the signatory mark, by the signatory mark and user identifier associated storage.
In addition, signatory mark can also be sent to by first server after first server generates signatory mark
The signatory mark is stored in signatory mark library by two servers, second server, correspondingly, the process can pass through following step
Rapid to realize: the first server sends the signatory mark to the second server;The second server receives the signatory mark;The
The signatory mark is added in signatory mark library by two servers.It should be noted is that this step can step (3) it
Preceding execution can also be executed after step (3), can also be performed simultaneously with step (3), in embodiments of the present invention, to this
The execution sequence with step (3) of step is not especially limited.
In this implementation, terminal sends bind request to first server, and first server is according to the bind request
The information to be verified sent to the terminal is verified, and in response to being verified, generates the signatory mark of the information to be verified, and
The first identifier is sent to second server, so that second server can carry out resource transfers according to the signatory mark, is kept away
The sensitive information leakage for having exempted from user improves the safety of resource transfers.
Step 503: first server selection target resource transfers from the resource transfers token in resource transfers token pool
Token, the resource transfers token in the resource transfers token pool are the resource transfers token that second server is sent.
Storage resource shifts token pool in first server, and multiple resource transfers are stored in the resource transfers token pool and are enabled
Board, terminal can select a resource transfers token to shift token as target resource from multiple resource transfers token.
In one possible implementation, the resource transfers that first server can at random in resource transfers token pool
A resource transfers token is selected to shift token as target resource in token.In alternatively possible implementation, first
Server can also select the resource transfers token for being not used by state from the resource transfers token in resource transfers token pool,
Token is shifted as target resource.In alternatively possible implementation, first server can also be enabled according to resource transfers
In board library, the generation selection of time of resource transfers token generates resource transfers token of the time within term of validity and provides as target
Shift token in source.
In response to first server according to the token status selection target resource transfers token of resource transfers token, the first clothes
Being engaged in device can be by following two implementation, and selection target resource turns from the resource transfers token in resource transfers token pool
Move token.
The first implementation, terminal determines the state of multiple resource transfers tokens in resource transfers token pool, more from this
Selection target resource transfers token in a resource transfers token.The process can be realized by following steps (A1)-(A2), be wrapped
It includes:
(A1) first server determines the state of multiple resource transfers tokens in the resource transfers token pool.
Wherein, multiple resource transfers token can be all resource transfers tokens in the resource transfers token pool,
This can be not especially limited in embodiments of the present invention for the resource transfers token of preset quantity.Also, the specified number
Amount, which can according to need, to be configured and changes, and in embodiments of the present invention, is not especially limited to the preset quantity.For example,
The preset quantity can be 20,25 or 30 etc..
Wherein, the state of the resource transfers token can be to be not used by, had been used using neutralization.Correspondingly, the
One server can be according to the service condition of resource transfers token, for the resource transfers token flag in the resource transfers token pool
State.
In embodiments of the present invention, first server receives the newly-generated resource transfers token that second server is sent,
The resource transfers token flag received can be to be not used by state by first server.First server confirmed to contract
After mark and target resource transfer token, first server can send the second transfer request, first service to second server
Device is corresponding by target resource transfer token in resource transfers token pool when sending the second transfer request to the second server
Resource transfers token state by be not used be revised as in.Second server carries out resource according to the second transfer request and turns
After shifting, transfer can be sent to first server and complete instruction, correspondingly, first server is returned receiving the second server
When instruction is completed in the transfer returned, by the shape of the corresponding resource transfers token of target resource transfer token in resource transfers token pool
State is had been used by being revised as in using.Wherein, first server can be by any mark mode to the resource transfers token
State be marked, in embodiments of the present invention, mark the mode of the resource transfers token not make to have the first server
Body limits.For example, the status indication for the resource transfers token being not used by can be 1 by the first server, in using
The status indication of resource transfers token is 0, is -1 by the status indication for the resource transfers token having been used.
(A2) resource of the first server according to the state of multiple resource transfers token, from the resource transfers token pool
The target resource for selecting state in transfer token to be not used by shifts token.
In this step, first server is the money being not used by from state according to the state of each resource transfers token
It shifts one target resource of random selection in token and shifts token in source.
In this implementation, first server determines the state of multiple resource transfers tokens, from multiple resource transfers
The resource transfers token being not used by is selected in token, is avoided multiple resource transfers and is operated with same resource transfers token,
Resource transfers transfer operation is caused to fail.
Second of implementation, first server randomly choose a resource transfers from the resource transfers token pool and enable
Board, then judge the state of the resource transfers token, the state in response to the resource transfers token selected be it is unused, by the choosing
The resource transfers token selected shifts token as target resource, and the state in response to the resource transfers token of selection is not not make
With, the resource transfers token is abandoned, selects resource transfers token from the resource transfers token in resource transfers token pool again,
The process can be realized by following steps (B1)-(B3), comprising:
(B1) first server selects a resource transfers token from the resource transfers token pool.
In this step, first server can be randomly choosed from the resource transfers token in the resource transfers token pool
One resource transfers token.
It should be noted is that after resource transfers token had been selected in the server, if the resource transfers of selection
The state of token be not it is unused, then first server by the resource transfers token abandon, selected from other resource transfers tokens
Select a resource transfers token.
(B2) first server determines the state of the resource transfers token.
In this step, first server can determine money according to the status indication of resource transfers token, first server
The state of source transfer token.For example, first server determines that the resource turns when the status indication of the resource transfers token is 1
The state for moving token is to be not used by.
It (B3) is to be not used by response to the state of the resource transfers token, first server makees the resource transfers token
Token is shifted for target resource.
State in response to the resource transfers token is in use or to have been used, and first server enables the resource transfers
Board abandons, and re-execute the steps (B1)-(B3), randomly chooses one in the resource transfers token in resource transfers token pool again
A resource transfers token, and determine the state of the resource transfers token reselected.
In this implementation, first server selects a resource transfers token from multiple resource transfers tokens, and
The state for determining the resource transfers token selects the resource transfers token being not used by from multiple resource transfers token, keeps away
Multiple resource transfers are exempted from and have operated with same resource transfers token, resource transfers transfer operation is caused to fail.
In response to first server according to resource transfers token pool, the generation selection of time of resource transfers token generates the time
When resource transfers token within term of validity shifts token as target resource, first server can be from resource transfers token
A resource transfers token is selected in resource transfers token in library, determines the resource transfers token whether within term of validity;
If the resource transfers token is within term of validity, using the resource transfers token as goal displacement token, if the resource
When shifting token not within term of validity, a resource transfers token is reselected, judges that the resource transfers reselected enable
Board whether within term of validity, if, using the resource transfers token reselected as target resource shift token, if
Do not exist, reselect again, until selecting the resource transfers token within term of validity.
In response to first server according to resource transfers token pool, the generation selection of time of resource transfers token generates the time
When resource transfers token within term of validity shifts token as target resource, first server can also determine that the resource turns
The resource transfers token within term of validity in token pool is moved, one is selected from the resource transfers token within term of validity
The resource transfers token is shifted token by resource transfers token.
Wherein, first server can also determine that the resource transfers within term of validity in the resource transfers token pool enable
When board, for each resource transfers token in resource transfers token pool, which determines that the resource transfers token is
It is no within term of validity.
Wherein, first server determine the resource transfers token whether the process within term of validity can be with are as follows: in one kind
In possible implementation, when second server sends resource transfers token to first server, directly the resource transfers are enabled
The term of validity of board is sent to first server, correspondingly, first server receives the resource transfers of second server transmission
The term of validity of token;In alternatively possible implementation, second server sends resource transfers to first server and enables
When board, the effective time of the resource transfers token is sent to first server, correspondingly, first server is according to receiving this
The effective time of the time of resource transfers token and the resource transfers token determine the term of validity of target resource transfer token.
For example, the time that first server receives the resource transfers token is 13:00:00, the effective time of the resource transfers token
It is 1 hour, then the term of validity of the resource transfers token is 14:00:00.
It should be noted is that can also subtract when first server determines the term of validity of the resource transfers token
It goes the generation duration of the resource transfers token, using duration and maintenance duration etc., turns for example, first server receives the resource
The time for moving token is 13:00:00, and the effective time of the resource transfers token is 1 hour, which shifts the life of token
At duration, using duration and maintenance the total 5s of duration, then the term of validity of the resource transfers token be 13:59:55.
Whether first server determines current time, and determines preset duration, judge resource transfers token in validity period
Process in limit can be realized by following steps (C1)-(C2), comprising:
(C1) first server is determined and is stabbed at the first time according to current time and preset duration.
Wherein, required duration determines when which can be according to the generation of resource transfers token, in the present invention
In embodiment, which is not especially limited.For example, the preset duration can be 10s, 15s or 20s etc..This first
Timestamp can be time and preset duration time point after being added before deserving, for example, current time is tc=13:00:00
O'clock sharp, the preset duration are ts=10s, then it is t that this is stabbed at the first time1=13:00:10.
(C2) first server is according to term of validity of each resource transfers token, from the resource transfers token pool
It includes the target resource transfer token of first time stamp that term of validity is selected in resource transfers token.
Wherein, the term of validity of the resource transfers token, which can according to need, is configured, in embodiments of the present invention, right
The term of validity of the resource transfers token is not especially limited.For example, the term of validity of the resource transfers token can be small for 1
When, 1.5 hours or 2 hours etc..In one possible implementation, first server can be from the resource transfers token pool
Resource transfers token in randomly choose a resource transfers token, determine the term of validity of the resource transfers token, determining should
Whether stamp is within the term of validity of the resource transfers token at the first time.In alternatively possible implementation, first service
Device can determine the term of validity of multiple resource transfers neck boards, and stamp is having at the first time for selection from multiple resource transfers token
Resource transfers token in the effect phase.
It should be noted is that first server can only determine that the first time stabs whether within term of validity, the
One server can also determine the second time of the use or maintenance time comprising the resource transfers token in first server
Whether stamp is within the term of validity of the resource transfers token.Correspondingly, the first server determine second timestamp whether
Process in the term of validity of the resource transfers token can be realized by following steps (C2-1)-(C2-2), comprising:
(C2-1) first server determines the second timestamp according to current time, preset duration and time coefficient.
Wherein, which can be determined according to first server using the duration of the resource transfers token, the time
Coefficient in embodiments of the present invention can be not especially limited the time coefficient for any number greater than 1.For example, the time
Coefficient can be 1.2,1.5 or 2 etc..Second timestamp can be the product and current time of preset duration and time coefficient
With for example, current time tc=13:00:00 o'clock sharp, the preset duration are ts=10s, the time coefficient are μ=1.2, then this
Two timestamps are t1=13:00:12.
(C2-2) first server is according to term of validity of each resource transfers token, from the resource transfers token pool
Resource transfers token in selection term of validity include second timestamp target resource transfer token.
In this implementation, first server selects the resource within term of validity to turn from multiple resource transfers tokens
Token is moved, resource transfers token is avoided and is not used by for a long time, resource transfers token is caused to reveal, causes resource transfers uneasy
Full problem.
In this implementation, first server selected from multiple resource transfers tokens one within term of validity, and
Not used resource transfers token, it is therefore prevented that repeatedly select the resource transfers token having been used, avoid multiple resource transfers
Same resource transfers token is operated with, resource transfers transfer operation is caused to fail.
It should be noted is that first server can first determine the signatory mark, then determine that the target resource shifts
Token;First server can also first determine that the target resource shifts token, then determine the signatory mark;First server may be used also
To determine that the signatory mark and target resource transfer token determine the label to first server in embodiments of the present invention simultaneously
It about identifies and the sequence of target resource transfer token is not especially limited.Namely first server can first carry out step 502, then
Execute step 503;First server can also first carry out step 503, then execute step 502;First server can also be simultaneously
Execute step 502 and step 503.In embodiments of the present invention, the execution sequence of step 502 and step 503 is not limited specifically
It is fixed.
Step 504: first server shifts token according to the signatory mark and the target resource, generates resource transfers mark
Note.
Resource transfers label can be the resource transfers label for including the signatory mark and resource transfers token.
Resource transfers label can be packet labeling, and resource transfers label can be by the corresponding character of the signatory mark
String character string composition corresponding with target resource transfer token.What the resource transfers marked message can be multidigit resource transfers mark
Remember message, in embodiments of the present invention, the digit of resource transfers label message is not especially limited.For example, the resource turns
Moving label message can be 36 etc..As shown in fig. 6, Fig. 6 is that a kind of resource shown according to an exemplary embodiment is shifting
Mark the schematic diagram of message.
Correspondingly, the process of generation resource transfers label can be realized by following steps, comprising: first server will
The signatory mark is added in the first field in resource transfers label message;Target resource transfer token is added to the money
In the second field in the metastatic marker message of source, resource transfers label is obtained.
Wherein, which can be the character string generated at random, and the digit of the character string can be 8 character strings,
The character string can be for by the digital character string formed, or the character string being made of numeral and letter, of the invention real
It applies in example, the building form of the character string is not especially limited.
In this step, the corresponding character string of resource transfers token is determined, which can be thought as the second clothes
The multidigit character string that business device generates at random is in embodiments of the present invention not especially limited the digit of the resource transfers token,
For example, the resource transfers token can be 8 character strings.Also, the character string can be the character string being made of number, may be used also
Think the character string being made of numeral and letter, in embodiments of the present invention, this is not especially limited.
It should be noted is that can also include other resource transfers information in resource transfers label message, accordingly
, first server can also obtain resource transfers information, which is added in resource transfers message, accordingly
Above-mentioned steps could alternatively be: first server by the signatory mark be added to resource transfers label message in the first field
In, and target resource transfer token is added in the second field in resource transfers label message, and by the money
Source transinformation is added in the information resources in resource transfers label message, obtains resource transfers label.
Wherein, which may include the serial number for identifying resource transfers request, indicates resource transfers card
At least one of the label of the type of service of support, the Code Number of the corresponding card sending mechanism of resource transfers card, reserved field.
It may include multiple fields that the resource transfers, which mark in message, and each field corresponds to different resource transfers information.For example, continuing
Referring to Fig. 6, it includes 6 fields which, which marks message, totally 36 resource transfers labels.Wherein, the first field corresponds to mesh
Resource transfers token is marked, takes 8 character strings, which can be made of random string and/or number, also, at this
Additional character can also be added on the basis of random string and/or number, as shown in fig. 6, the character string of first field can
" AsfAd~12 " are thought, in addition, in order to allow second server that can perceive target resource transfer token expired time, target money
Source transfer token can consist of two parts :+six token random codes of two time points.Such as 13j2L23~expression token with
Machine code be j2L23~target resource transfer token expired time be the same day 13 points.Second field corresponds to signatory mark, takes 8
Character string, second field can also be made of random string and/or number, also, in the random string and/or number
On the basis of additional character can also be added, as shown in fig. 6, the character string of second field can be " TAG14214 ".Third
Field corresponding resource transfer request serial number, takes 12 character strings, which can be made of random digit, the random number
Word can have current time+water dispenser code, as shown in fig. 6, the third field can be " 201911442795 ".4th field is corresponding
The label of the type of service of resource transfers card takes 3 character strings, and the 4th field can be made of number, as shown in fig. 6,
4th field can be " 001 ".The Code Number of the card sending mechanism of 5th field corresponding resource transfer card takes 3 character strings,
5th field can be made of number, as shown in fig. 6, the 5th field can be " 101 ".6th field is reserved field,
2 character strings are taken, excess is provided for third field and reserves, as shown in fig. 6, the 6th field can be " 00 ".
In this implementation, first server adds signatory mark, resource transfers token and other resource transfers information
It is added in resource transfers label message, obtains resource transfers label, improve the safety in data transmission procedure.
Step 505: first server sends the second transfer request to second server, and carrying in second transfer request should
Resource transfers label.
After first server generates the corresponding resource transfers label of this resource transfers, resource is completed by second server
Transfer operation, during being somebody's turn to do, first server carries resource transfers label in second transfer request, to second service
Device sends second transfer request.
Step 506: second server receives second transfer request.
Step 507: second server parses resource transfers label, obtains signatory mark and target resource transfer token.
In this step, it after second server receives resource transfers label, is parsed from resource transfers label
Signatory mark and target resource shift token, correspondingly, determining between second server and first server before this step
Specified resolution rules, second server specify resolution rules to parse resource transfers label, obtain the resource according to this
Signatory mark and target resource in metastatic marker shift token.
It should be noted is that further including other resource transfers information, second server solution in the resource transfers token
After analysing resource transfers label, other resource transfers information of this resource transfers can be determined.
Step 508: second server shifts token according to the signatory mark and the target resource, to second transfer request
It is verified.
In this step, second server according to signatory mark and target resource transfer token to second transfer request into
Row verifying.The verification process can be realized by following steps (1)-(3), comprising:
(1) second server verifies whether target resource transfer token is effective resource transfers token.
In this step, whether second server can be by verifying the timeliness of the resource transfers token and/or being made
With etc., determine whether target resource transfer token is to have effective resource transfers token.
(2) it whether there is the signatory mark in second server verifying signatory mark library.
It should be noted is that second server can first carry out step (1), then execute step (2);Second server
Step (2) can also be first carried out, then execute step (1);Second server may also be performed simultaneously step (1) and step (2).In
In the embodiment of the present invention, the execution sequence of the step (1) and step (2) is not especially limited.
(3) it is effective resource transfers token in response to target resource transfer token, and exists in the signatory mark library
The signatory mark, second server determination are verified.
In this implementation, first server ensure that by verifying to resource transfers token and signatory mark
First resource shifts a corresponding resource transfers token, and different resource transfers operations corresponds to different resource transfers tokens, and
Resource transfers token avoids the use for a long time of resource transfers token and is compromised, improve resource transfers in service life
Safety.
Step 509: in response to being verified, second server carries out resource transfers according to second transfer request.
Second server carries out resource transfers by the resource transfers label in second transfer request in this step, the
Two servers determine payer and the side of collecting of this resource transfers from resource transfers label, and determine resource transfers number
Value carries out resource transfers according to the payer, the side of collecting and resource transfers numerical value.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
In embodiments of the present invention, storage resource shifts token pool in first server, wraps in the resource transfers token pool
Multiple resource transfers tokens are included, multiple resource transfers token is generated by second server, is sent to second server.In one kind
In possible implementation, which periodically sends resource transfers token to first server, correspondingly, the second clothes
Business device sends multiple resource transfers tokens to first server every the first preset duration.Wherein, which can be with
It is configured and changes as needed, in embodiments of the present invention, which is not especially limited.For example, should
First preset duration can be 1min, 2min or 2.5min etc..In alternatively possible implementation, first server is to
Two servers send acquisition request, after second server receives the acquisition request of first server transmission, to first server
Send resource transfers token.As shown in fig. 7, Fig. 7 is a kind of resource transfers method flow shown according to an exemplary embodiment
Figure.This method comprises:
Step 701: the first server sends acquisition request to the second server, the acquisition request for request this
Two servers generate new resource transfers token.
In one possible implementation, first server detects the resource transfers token in resource transfers token pool
Quantity when being less than preset quantity, first server sends acquisition request to the second server, wherein the preset quantity can be with
It is configured, in embodiments of the present invention, this is not especially limited as needed.For example, the preset quantity can be 10,15
Or 20 etc..
In alternatively possible implementation, first server is sent every the second preset duration to the second server
Acquisition request.Second preset duration, which can according to need, to be configured, also, the second preset duration can be with first in advance
, can also be identical with the first preset duration if duration is identical, second preset duration is not made specifically in embodiments of the present invention
It limits.For example, second preset duration can be 1min, 2min or 2.5min etc..
In alternatively possible implementation, which can also detect every time resource transfers token pool
In resource transfers tokens by use, sending acquisition request to the second server.
Step 702: the second server receives the acquisition request.
Step 703: second server generates new resource transfers token according to the acquisition request.
In this step, second server can be directly by the resource transfers token new according to generation;The second server
The resource transfers token with term of validity can also be generated according to current time, second server is according to factors such as current times
The process for generating new resource transfers token can be realized by following steps (1)-(4), comprising:
(1) second server determines current time, third timestamp, the third timestamp be current slot it is expired when
Between point, and obtain preset duration and time coefficient.
It should be noted is that the third timestamp can be the expired time point in current slot, for example, this
Three timestamps can be integral point time point.The third timestamp can also be second server according to current time and term of validity
Determining expired time point.For example, current time is 13:00:00 o'clock sharp, term of validity is 2 hours, then the third timestamp
It can be 15:00:00 o'clock sharp
(2) second server determines according to the current time, the preset duration and the time coefficient and generates the resource transfers
4th timestamp of token.
In this step, second server is using the sum of the product and current time of the preset duration and time coefficient as
Four timestamps generate the time of the resource transfers token.
(3) in response to the 4th timestamp in the third timestamp, according to the third timestamp, generation term of validity is
The resource transfers token of the third timestamp.
In response to the 4th timestamp in the third timestamp, illustrating can be default after the resource transfers token generates
Failure in duration, has utility value, the resource transfers token in term of validity can be generated.
(4) in response to the 4th timestamp not in the third timestamp, according to the third timestamp, determined for the 5th time
Stamp generates the resource transfers token that term of validity is the 5th timestamp.
In response to the 4th timestamp not in the third timestamp, the 5th time after the third timestamp is determined
Stamp generates the resource transfers token that term of validity is the 5th timestamp.For example, the time for generating the resource transfers token is
12:59:55, then the resource transfers token correspond to third timestamp 13:00:00 o'clock sharp be term of validity when, the resource transfers enable
Board is nonsensical resource transfers token, then can add the term of validity of the resource transfers token 1 hour, generates validity period
It is limited to the resource transfers token of 14:00:00 o'clock sharp.
Step 704: second server sends the new resource transfers token to the first server.
Step 705: the first server receives the new resource transfers token, which is added to
In the resource transfers token pool.
It should be noted is that memory space in the resource transfers token pool may be limited, first server can be with
Useless resource transfers token in resource transfers token pool is removed, for example, resource transfers token pool can be deleted and be had been used
Resource transfers token or resource transfers token pool can delete expired resource transfers token.Also, in a kind of possible realization
In mode, first server detects the resource transfers token having been used, or detects that the resource for having more than term of validity turns
When moving token, when first server, deletes the resource transfers token having been used and enables more than the resource transfers of term of validity
Board.In alternatively possible implementation, first server deletes first resource every third preset duration and shifts token pool
In all resource transfers tokens, which, which can according to need, is configured, also, the third preset duration and
First preset duration may be the same or different with the second preset duration, in embodiments of the present invention, not limit specifically this
It is fixed.For example, the third preset duration can be 1min, 2min or 2.5min etc..In alternatively possible implementation, this
One server can delete the resource transfers token having been used in first resource transfer token pool every the 4th preset duration
With the resource transfers token for being more than term of validity.4th preset duration, which can according to need, to be configured, also, the 4th is pre-
If duration can be identical or different with the first preset duration, the second preset duration and third preset duration, in the embodiment of the present invention
In, this is not especially limited.For example, the 4th preset duration can be 1min, 2min or 2.5min etc..
Wherein, the resource transfers token in the deletion resource transfers token pool of the use state according to resource transfers token
Method can be realized by following steps (1)-(3), comprising:
(1) when sending the second transfer request to the second server, which is shifted token by first server
State by be not used be revised as in.
In this step and step 502, first server can turn according to the service condition of resource transfers token for the resource
The process for moving the resource transfers token flag state in token pool is similar, and details are not described herein.
(2) when instruction is completed in the transfer for receiving second server return, first server turns the target resource
The state for moving token is had been used by being revised as in using.
In this step and step 502, first server can turn according to the service condition of resource transfers token for the resource
The process for moving the resource transfers token flag state in token pool is similar, and details are not described herein.
(3) in response to clearing up resource transfers token, state in the resource transfers token pool is to have been made by first server
With or term of validity do not include current time resource transfers token delete.
It should be noted is that first server can also mark the resource transfers token of speculation in stocks service life, accordingly
First server can be periodically detected the resource transfers token in resource transfers token pool, in response to detecting resource transfers
Token is the resource transfers token more than service life, is the resource transfers token to exceed the time limit by the resource transfers token flag.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
Also, in embodiments of the present invention, first server deletes in resource transfers token pool in time and has been used and surpass
The resource transfers token for crossing service life, has saved the memory space in resource transfers token pool, ensure that resource transfers token
The workability of resource transfers token in library, improves the safety of resource transfers token.
Fig. 8 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment, as shown in figure 8, the device
Applied to first server, which includes:
First receiving module 81 carries user's mark of user for receiving the first transfer request in first transfer request
Know;
First obtains module 82, for according to the user identifier, obtaining the signatory mark of the user, and from resource transfers
Selection target resource transfers token in resource transfers token in token pool, the resource transfers token in the resource transfers token pool
The resource transfers token sent for second server;
First generation module 83 generates resource transfers mark for shifting token according to the signatory mark and the target resource
Note;
First sending module 84 carries in second transfer request for sending the second transfer request to second server
Resource transfers label, for requesting the second server to carry out resource transfers.
In one possible implementation, the first acquisition module 82, is also used to determine in the resource transfers token pool
The state of multiple resource transfers tokens;Money according to the state of multiple resource transfers token, from the resource transfers token pool
The target resource for selecting state in source transfer token to be not used by shifts token.
In alternatively possible implementation, which is also used to from the resource transfers token pool,
Select a resource transfers token;
Determine the state of the resource transfers token;State in response to the resource transfers token is to be not used by, by the money
Token is shifted as target resource and shifts token in source.
In alternatively possible implementation, which is also used to determine the resource transfers token pool
In each resource transfers token term of validity;According to the term of validity of each resource transfers token, enabled from the resource transfers
It includes the target resource transfer token of current time that term of validity is selected in resource transfers token in board library.
In alternatively possible implementation, this first obtain module 82, be also used to according to current time and it is default when
It is long, it determines and stabs at the first time;Resource according to the term of validity of each resource transfers token, from the resource transfers token pool
Selection term of validity includes the target resource transfer token of first time stamp in transfer token.
In alternatively possible implementation, which is also used to according to current time, preset duration
And time coefficient, determine the second timestamp;According to the term of validity of each resource transfers token, from the resource transfers token pool
In resource transfers token in selection term of validity include second timestamp target resource transfer token.
In alternatively possible implementation, the device further include:
Second sending module, for the second server send acquisition request, the acquisition request for request this second
Server generates new resource transfers token;
The new resource transfers token is added to this for receiving the new resource transfers token by the second receiving module
In resource transfers token pool.
In alternatively possible implementation, the device further include:
Third receiving module, carried for receiving the bind request of terminal transmission, in the bind request user to
Verification information;
First authentication module, for being verified to the information to be verified;
Second generation module, for generating the signatory mark of the user according to the information to be verified in response to being verified;
Memory module, for the associated storage user identifier and the signatory mark.
In alternatively possible implementation, the device further include:
Third sending module, for sending the signatory mark to the second server, so that the second server is by the label
About mark is added in signatory mark library.
In alternatively possible implementation, the device further include:
First modified module, for when sending the second transfer request to the second server, which to be shifted
The state of token is revised as in by being not used;
Second modified module provides the target when for completing instruction in the transfer for receiving second server return
The state of source transfer token is had been used by being revised as in using;
Removing module, for being to have been made by state in the resource transfers token pool in response to clearing up resource transfers token
With or term of validity do not include current time resource transfers token delete.
In alternatively possible implementation, first generation module 83, for the signatory mark to be added to resource
In the first field in metastatic marker message, and target resource transfer token is added to the resource transfers and is marked in message
The second field in, obtain the resource transfers label.
In alternatively possible implementation, the device further include:
Second obtains module, for obtaining resource transfers information;
First generation module 83 is also used to for the signatory mark being added to the first field in resource transfers label message
In, and target resource transfer token is added in the second field in resource transfers label message, and by the money
Source transinformation is added in the information resources in resource transfers label message, obtains resource transfers label.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
Fig. 9 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment, as shown in figure 9, the device
Applied to second server, which includes:
4th receiving module 91, for receiving the second transfer request of first server transmission, in second transfer request
Carry resource transfers label;
Parsing module 92 obtains signatory mark and target resource transfer token for parsing resource transfers label;
Second authentication module 93 asks second transfer for shifting token according to the signatory mark and the target resource
It asks and is verified;
Resource transfers module 94, for carrying out resource transfers according to second transfer request in response to being verified.
In one possible implementation, second authentication module 93 is also used to verify target resource transfer token
Whether it is effective resource transfers token, and whether there is the signatory mark in verifying signatory mark library;In response to the target
Resource transfers token is effective resource transfers token, and there are the signatory mark in the signatory mark library, determination is verified.
In alternatively possible implementation, the device further include:
Third generation module sends the resource transfers token to the first server for generating resource transfers token, with
Be added to the first server resource transfers token in resource transfers token pool.
In alternatively possible implementation, the device further include:
5th receiving module, for receiving the acquisition request of first server transmission;
The third generation module is also used to generate new resource transfers token according to the acquisition request;
4th sending module, for sending the new resource transfers token to the first server, so that the first service
The new resource transfers token is added in the resource transfers token pool by device.
In alternatively possible implementation, the device further include:
6th receiving module, for receiving the signatory mark of first server transmission;
Adding module, for the signatory mark to be added in signatory mark library.
In alternatively possible implementation, which is also used to determine current time, third time
Stamp, which is the expired time point of current slot, and obtains preset duration and time coefficient;It is current according to this
Time, the preset duration and the time coefficient determine the 4th timestamp for generating the resource transfers token;When in response to the 4th
Between stamp in the third timestamp, according to the third timestamp, generate the resource transfers that term of validity is the third timestamp and enable
Board;In response to the 4th timestamp not in the third timestamp, according to the third timestamp, the 5th timestamp is determined, generate
Term of validity is the resource transfers token of the 5th timestamp.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission
Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource
About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second
Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token
Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's
Sensitive information leakage improves the safety of resource transfers.
It should be understood that resource transfers device provided by the above embodiment is in resource transfers, only with above-mentioned each function
The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function moulds
Block is completed, i.e., the internal structure of terminal is divided into different functional modules, to complete all or part of function described above
Energy.In addition, resource transfers device provided by the above embodiment and resource transfers embodiment of the method belong to same design, it is specific real
Existing process is detailed in embodiment of the method, and which is not described herein again.
Figure 10 shows the structural block diagram for the terminal 1000 that exemplary partial embodiment of the present invention provides.The terminal 1000 can
To be: smart phone, tablet computer, MP3 player (Moving Picture Experts Group Audio Layer
III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio
Layer IV, dynamic image expert's compression standard audio level 4) player, laptop or desktop computer.Terminal 1000 is also
Other titles such as user equipment, portable terminal, laptop terminal, terminal console may be referred to as.
In general, terminal 1000 includes: processor 1001 and memory 1002.
Processor 1001 may include one or more processing cores, such as 4 core processors, 8 core processors etc..Place
Reason device 1001 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field-
Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed
Logic array) at least one of example, in hardware realize.Processor 1001 also may include primary processor and coprocessor, master
Processor is the processor for being handled data in the awake state, also referred to as CPU (Central Processing
Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.In
In some embodiments, processor 1001 can be integrated with GPU (Graphics Processing Unit, image processor),
GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 1001 can also be wrapped
AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processor is for handling related machine learning
Calculating operation.
Memory 1002 may include one or more computer readable storage mediums, which can
To be non-transient.Memory 1002 may also include high-speed random access memory and nonvolatile memory, such as one
Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 1002 can
Storage medium is read for storing at least one instruction, at least one instruction for performed by processor 1001 to realize this hair
The resource transfers method that bright middle embodiment of the method provides.
In some embodiments, terminal 1000 is also optional includes: peripheral device interface 1003 and at least one periphery are set
It is standby.It can be connected by bus or signal wire between processor 1001, memory 1002 and peripheral device interface 1003.It is each outer
Peripheral equipment can be connected by bus, signal wire or circuit board with peripheral device interface 1003.Specifically, peripheral equipment includes:
In radio circuit 1004, display screen 1005, camera 1006, voicefrequency circuit 1007, positioning component 1008 and power supply 1009 extremely
Few one kind.
Peripheral device interface 1003 can be used for I/O (Input/Output, input/output) is relevant outside at least one
Peripheral equipment is connected to processor 1001 and memory 1002.In some embodiments, processor 1001, memory 1002 and periphery
Equipment interface 1003 is integrated on same chip or circuit board;In some other embodiments, processor 1001, memory
1002 and peripheral device interface 1003 in any one or two can be realized on individual chip or circuit board, this implementation
Example is not limited this.
Radio circuit 1004 is for receiving and emitting RF (Radio Frequency, radio frequency) signal, also referred to as electromagnetic signal.
Radio circuit 1004 is communicated by electromagnetic signal with communication network and other communication equipments.Radio circuit 1004 is by telecommunications
Number being converted to electromagnetic signal is sent, alternatively, the electromagnetic signal received is converted to electric signal.Optionally, radio circuit
1004 include: antenna system, RF transceiver, one or more amplifiers, tuner, oscillator, digital signal processor, volume solution
Code chipset, user identity module card etc..Radio circuit 1004 can by least one wireless communication protocol come with it is other
Terminal is communicated.The wireless communication protocol includes but is not limited to: Metropolitan Area Network (MAN), each third generation mobile communication network (2G, 3G, 4G and
5G), WLAN and/or WiFi (Wireless Fidelity, Wireless Fidelity) network.In some embodiments, radio frequency electrical
Road 1004 can also include NFC (Near Field Communication, wireless near field communication) related circuit, the present invention
This is not limited.
Display screen 1005 is for showing UI (User Interface, user interface).The UI may include figure, text,
Icon, video and its their any combination.When display screen 1005 is touch display screen, display screen 1005 also there is acquisition to exist
The ability of the touch signal on the surface or surface of display screen 1005.The touch signal can be used as control signal and be input to place
Reason device 1001 is handled.At this point, display screen 1005 can be also used for providing virtual push button and/or dummy keyboard, it is also referred to as soft to press
Button and/or soft keyboard.In some embodiments, display screen 1005 can be one, and the front panel of terminal 1000 is arranged;Another
In a little embodiments, display screen 1005 can be at least two, be separately positioned on the different surfaces of terminal 1000 or in foldover design;
In still other embodiments, display screen 1005 can be flexible display screen, is arranged on the curved surface of terminal 1000 or folds
On face.Even, display screen 1005 can also be arranged to non-rectangle irregular figure, namely abnormity screen.Display screen 1005 can be with
Using LCD (Liquid Crystal Display, liquid crystal display), OLED (Organic Light-Emitting Diode,
Organic Light Emitting Diode) etc. materials preparation.
CCD camera assembly 1006 is for acquiring image or video.Optionally, CCD camera assembly 1006 includes front camera
And rear camera.In general, the front panel of terminal is arranged in front camera, the back side of terminal is arranged in rear camera.In
In some embodiments, rear camera at least two is that main camera, depth of field camera, wide-angle camera, focal length are taken the photograph respectively
As any one in head, to realize that main camera and the fusion of depth of field camera realize background blurring function, main camera and wide
Pan-shot and VR (Virtual Reality, virtual reality) shooting function or other fusions are realized in camera fusion in angle
Shooting function.In some embodiments, CCD camera assembly 1006 can also include flash lamp.Flash lamp can be monochromatic temperature flash of light
Lamp is also possible to double-colored temperature flash lamp.Double-colored temperature flash lamp refers to the combination of warm light flash lamp and cold light flash lamp, can be used for
Light compensation under different-colour.
Voicefrequency circuit 1007 may include microphone and loudspeaker.Microphone is used to acquire the sound wave of user and environment, and
It converts sound waves into electric signal and is input to processor 1001 and handled, or be input to radio circuit 1004 to realize that voice is logical
Letter.For stereo acquisition or the purpose of noise reduction, microphone can be separately positioned on the different parts of terminal 1000 to be multiple.
Microphone can also be array microphone or omnidirectional's acquisition type microphone.Loudspeaker is then used to that processor 1001 or radio frequency will to be come from
The electric signal of circuit 1004 is converted to sound wave.Loudspeaker can be traditional wafer speaker, be also possible to piezoelectric ceramics loudspeaking
Device.When loudspeaker is piezoelectric ceramic loudspeaker, the audible sound wave of the mankind can be not only converted electrical signals to, can also be incited somebody to action
Electric signal is converted to the sound wave that the mankind do not hear to carry out the purposes such as ranging.In some embodiments, voicefrequency circuit 1007 may be used also
To include earphone jack.
Positioning component 1008 is used for the current geographic position of positioning terminal 1000, to realize navigation or LBS (Location
Based Service, location based service).Positioning component 1008 can be the GPS (Global based on the U.S.
Positioning System, global positioning system), the dipper system of China, Russia Gray receive this system or European Union
The positioning component of Galileo system.
Power supply 1009 is used to be powered for the various components in terminal 1000.Power supply 1009 can be alternating current, direct current
Electricity, disposable battery or rechargeable battery.When power supply 1009 includes rechargeable battery, which can support wired
Charging or wireless charging.The rechargeable battery can be also used for supporting fast charge technology.
In some embodiments, terminal 1000 further includes having one or more sensors 1010.One or more sensing
Device 1010 includes but is not limited to: acceleration transducer 1011, gyro sensor 1012, pressure sensor 1013, fingerprint sensing
Device 1014, optical sensor 1015 and proximity sensor 1016.
Acceleration transducer 1011 can detecte the acceleration in three reference axis of the coordinate system established with terminal 1000
Size.For example, acceleration transducer 1011 can be used for detecting component of the acceleration of gravity in three reference axis.Processor
The 1001 acceleration of gravity signals that can be acquired according to acceleration transducer 1011, control display screen 1005 with transverse views or indulge
The display of direction view progress user interface.Acceleration transducer 1011 can be also used for adopting for game or the exercise data of user
Collection.
Gyro sensor 1012 can detecte body direction and the rotational angle of terminal 1000, gyro sensor 1012
Acquisition user can be cooperateed with to act the 3D of terminal 1000 with acceleration transducer 1011.Processor 1001 is according to gyro sensors
The data that device 1012 acquires, following function may be implemented: action induction (for example changing UI according to the tilt operation of user) is clapped
Image stabilization, game control and inertial navigation when taking the photograph.
The lower layer of side frame and/or display screen 1005 in terminal 1000 can be set in pressure sensor 1013.Work as pressure
When the side frame of terminal 1000 is arranged in sensor 1013, user can detecte to the gripping signal of terminal 1000, by processor
1001 carry out right-hand man's identification or prompt operation according to the gripping signal that pressure sensor 1013 acquires.When pressure sensor 1013
When the lower layer of display screen 1005 is set, the pressure operation of display screen 1005 is realized to UI according to user by processor 1001
Operability control on interface is controlled.Operability control includes button control, scroll bar control, icon control, dish
At least one of single control part.
Fingerprint sensor 1014 is used to acquire the fingerprint of user, is collected by processor 1001 according to fingerprint sensor 1014
Fingerprint recognition user identity, alternatively, by fingerprint sensor 1014 according to the identity of collected fingerprint recognition user.Knowing
Not Chu the identity of user when being trusted identity, authorize the user to execute relevant sensitive operation by processor 1001, which grasps
Make to include solving lock screen, checking encryption information, downloading software, payment and change setting etc..Fingerprint sensor 1014 can be set
Set the front, the back side or side of terminal 1000.When being provided with physical button or manufacturer Logo in terminal 1000, fingerprint sensor
1014 can integrate with physical button or manufacturer Logo.
Optical sensor 1015 is for acquiring ambient light intensity.In one embodiment, processor 1001 can be according to light
The ambient light intensity that sensor 1015 acquires is learned, the display brightness of display screen 1005 is controlled.Specifically, when ambient light intensity is higher
When, the display brightness of display screen 1005 is turned up;When ambient light intensity is lower, the display brightness of display screen 1005 is turned down.Another
In one embodiment, the ambient light intensity that processor 1001 can also be acquired according to optical sensor 1015, dynamic adjustment camera shooting
The acquisition parameters of head assembly 1006.
Proximity sensor 1016, also referred to as range sensor are generally arranged at the front panel of terminal 1000.Proximity sensor
1016 for acquiring the distance between the front of user Yu terminal 1000.In one embodiment, when proximity sensor 1016 is examined
When measuring the distance between the front of user and terminal 1000 and gradually becoming smaller, display screen 1005 is controlled from bright screen by processor 1001
State is switched to breath screen state;When proximity sensor 1016 detects that the distance between user and the front of terminal 1000 gradually become
When big, display screen 1005 is controlled by processor 1001 and is switched to bright screen state from breath screen state.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal 1000 of structure shown in Fig. 9, can wrap
It includes than illustrating more or fewer components, perhaps combine certain components or is arranged using different components.
Figure 11 is a kind of structural schematic diagram for server that exemplary partial of the invention real applies example offer, which can be with
For first server or second server, which can generate bigger difference because configuration or performance are different
It is different, it may include one or more processors (central processing units, CPU) 1101 and one or one
Above memory 1102, wherein be stored at least one instruction in the memory 1102, at least one instruction is by the processing
Device 1101 loads and executes the resource transfers method to realize above-mentioned each embodiment of the method offer.Certainly, which may be used also
With the components such as wired or wireless network interface, keyboard and input/output interface, to carry out input and output, the server
It can also include other for realizing the component of functions of the equipments, this will not be repeated here.
In the exemplary embodiment, a kind of computer readable storage medium is additionally provided, the memory for example including instruction,
Above-metioned instruction can be executed by the processor in terminal to complete resource transfers method in above-described embodiment.For example, the computer can
Reading storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, which can store in a kind of computer-readable storage
In medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above is only a preferred embodiment of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (32)
1. a kind of resource transfers method, which is characterized in that the described method includes:
Terminal sends the first transfer request to first server, and the user identifier of user is carried in first transfer request;
The first server receives first transfer request and obtains the signing mark of the user according to the user identifier
Know, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource transfers enable
Resource transfers token in board library is the resource transfers token that second server is sent;According to the signatory mark and the target
Resource transfers token generates resource transfers label;The second transfer request is sent to second server, in second transfer request
Carry the resource transfers label;
The second server receives second transfer request, carries out resource transfers according to second transfer request.
2. the method according to claim 1, wherein the method also includes:
The first server sends acquisition request to the second server, and the acquisition request is for requesting second clothes
Business device generates new resource transfers token;
The second server receives the acquisition request, generates new resource transfers token, and Xiang Suoshu first server is sent
The new resource transfers token;
The first server receives the new resource transfers token, and the new resource transfers token is added to the money
It shifts in token pool in source.
3. the method according to claim 1, wherein the terminal sends the first transfer request to first server
Before, the method also includes:
The terminal sends bind request to the first server, and the letter to be verified of the user is carried in the bind request
Breath;
The first server receives the bind request that the terminal is sent, and verifies to the information to be verified;
In response to being verified, the first server generates the signatory mark of the user according to the information to be verified, closes
Connection stores the user identifier and the signatory mark.
4. according to the method described in claim 3, it is characterized in that, the first server is generated according to the information to be verified
After the signatory mark of the user, the method also includes:
The first server sends the signatory mark to the second server;
The second server receives the signatory mark, and the signatory mark is added in signatory mark library.
5. a kind of resource transfers method, which is characterized in that the method is applied to first server, which comprises
The first transfer request is received, the user identifier of user is carried in first transfer request;
According to the user identifier, the signatory mark of the user is obtained, and from the resource transfers in resource transfers token pool
Selection target resource transfers token in token, the resource transfers token in the resource transfers token pool are that second server is sent
Resource transfers token;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label;
The second transfer request is sent to second server, the resource transfers label is carried in second transfer request, is used for
The second server is requested to carry out resource transfers.
6. according to the method described in claim 5, it is characterized in that, the resource transfers token from resource transfers token pool
Middle selection target resource transfers token, comprising:
Determine the state of multiple resource transfers tokens in the resource transfers token pool;
According to the state of the multiple resource transfers token, selected from the resource transfers token in the resource transfers token pool
State is the target resource transfer token being not used by.
7. according to the method described in claim 5, it is characterized in that, the resource transfers token from resource transfers token pool
Middle selection target resource transfers token, comprising:
From the resource transfers token pool, a resource transfers token is selected;
Determine the state of the resource transfers token;
State in response to the resource transfers token is to be not used by, and is shifted the resource transfers token as target resource
Token.
8. according to the method described in claim 5, it is characterized in that, the resource transfers token from resource transfers token pool
Middle selection target resource transfers token, comprising:
Determine the term of validity of each resource transfers token in the resource transfers token pool;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool
Selection term of validity includes the target resource transfer token of current time.
9. according to the method described in claim 8, it is characterized in that, the validity period according to each resource transfers token
Limit selects target resource of the current time within term of validity to turn from the resource transfers token in the resource transfers token pool
Move token, comprising:
According to current time and preset duration, determines and stab at the first time;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool
Selection term of validity includes the target resource transfer token of the first time stamp.
10. according to the method described in claim 8, it is characterized in that, described according to the effective of each resource transfers token
Time limit selects target resource of the current time within term of validity from the resource transfers token in the resource transfers token pool
Shift token, comprising:
According to current time, preset duration and time coefficient, the second timestamp is determined;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool
Selection term of validity includes the target resource transfer token of second timestamp.
11. according to the described in any item methods of claim 5-10, which is characterized in that the method also includes:
Acquisition request is sent to the second server, the acquisition request is for requesting the second server to generate new money
Shift token in source;
The new resource transfers token is received, the new resource transfers token is added to the resource transfers token pool
In.
12. according to the method described in claim 5, it is characterized in that, the method is also before the first transfer request of the reception
Include:
The bind request that the terminal is sent is received, the information to be verified of the user is carried in the bind request;
The information to be verified is verified;
In response to being verified, the signatory mark of the user is generated according to the information to be verified;
User identifier described in associated storage and the signatory mark.
13. according to the method for claim 12, which is characterized in that described to generate the user according to the information to be verified
Signatory mark after, the method also includes:
The signatory mark is sent to the second server, so that the signatory mark is added to label by the second server
About in home banking.
14. according to the method described in claim 8, it is characterized in that, the method also includes:
When sending the second transfer request to the second server, by the state of target resource transfer token by being not used
It is revised as in;
When receiving the transfer that the second server returns and completing instruction, by the state of target resource transfer token by
It is revised as having been used in use;
In response to clear up resource transfers token, by state in the resource transfers token pool be have been used or term of validity not
Resource transfers token including current time is deleted.
15. according to the method described in claim 5, it is characterized in that, described according to the signatory mark and the target resource
Token is shifted, resource transfers label is generated, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted
Token is added in the second field in the resource transfers label message, obtains the resource transfers label.
16. according to the method described in claim 5, it is characterized in that, described according to the signatory mark and the target resource
Token is shifted, before generating resource transfers label, the method also includes:
Obtain resource transfers information;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted
Token is added in the second field in resource transfers label message, and the resource transfers information is added to described
Resource transfers mark in the information resources in message, obtain the resource transfers label.
17. a kind of resource transfers method, which is characterized in that the method is applied in second server, which comprises
The second transfer request that first server is sent is received, resource transfers label is carried in second transfer request;
The resource transfers label is parsed, signatory mark and target resource transfer token are obtained;
Token is shifted according to the signatory mark and the target resource, second transfer request is verified;
In response to being verified, resource transfers are carried out according to second transfer request.
18. according to the method for claim 17, which is characterized in that described according to the signatory mark and the target resource
Token is shifted, second transfer request is verified, comprising:
Verify whether target resource transfer token is effective resource transfers token, and in verifying signatory mark library whether
There are the signatory marks;
It is effective resource transfers token in response to target resource transfer token, and exists in the signatory mark library described
Signatory mark, determination are verified.
19. method described in 7 or 18 according to claim 1, which is characterized in that second turn for receiving first server and sending
It moves before request, the method also includes:
Resource transfers token is generated, Xiang Suoshu first server sends the resource transfers token, so that the first server
The resource transfers token is added in resource transfers token pool.
20. according to the method for claim 19, which is characterized in that the method also includes:
Receive the acquisition request that the first server is sent;
According to the acquisition request, new resource transfers token is generated;
The new resource transfers token is sent to the first server, so that the first server is by the new resource
Transfer token is added in the resource transfers token pool.
21. according to the method for claim 17, which is characterized in that described according to the signatory mark and the target resource
Token is shifted, before being verified to second transfer request, the method also includes:
Receive the signatory mark that the first server is sent;
The signatory mark is added in signatory mark library.
22. according to the method for claim 19, which is characterized in that the generation resource transfers token, comprising:
Determine current time, third timestamp, the third timestamp is the expired time point of current slot, and is obtained pre-
If duration and time coefficient;
According to the current time, the preset duration and the time coefficient, determines and generate the of the resource transfers token
Four timestamps;
In response to the 4th timestamp in the third timestamp, according to the third timestamp, generation term of validity is
The resource transfers token of the third timestamp;
In response to the 4th timestamp not in the third timestamp, according to the third timestamp, determined for the 5th time
Stamp generates the resource transfers token that term of validity is the 5th timestamp.
23. a kind of resource transfers system, which is characterized in that the system comprises: terminal, first server and second server;
The terminal carries the use of user for sending the first transfer request to first server in first transfer request
Family mark;
The first server, according to the user identifier, obtains the label of the user for receiving first transfer request
It about identifies, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource turns
The resource transfers token moved in token pool is the resource transfers token that second server is sent;According to the signatory mark and described
Target resource shifts token, generates resource transfers label;The second transfer request is sent to second server, second transfer is asked
It asks middle and carries the resource transfers label;
The second server carries out resource transfers according to second transfer request for receiving second transfer request.
24. system according to claim 23, which is characterized in that
The first server is also used to send acquisition request to the second server, and the acquisition request is for requesting institute
It states second server and generates new resource transfers token;
The second server is also used to receive the acquisition request, generates new resource transfers token, Xiang Suoshu first service
Device sends the new resource transfers token;
The first server is also used to receive the new resource transfers token, and the new resource transfers token is added
Into the resource transfers token pool.
25. system according to claim 23, which is characterized in that
The terminal is also used to send bind request to the first server, carries the user's in the bind request
Information to be verified;
The first server is also used to receive the bind request that the terminal is sent, verifies to the information to be verified;
The first server is also used to generate the signing of the user according to the information to be verified in response to being verified
It identifies, user identifier and the signatory mark described in associated storage.
26. system according to claim 25, which is characterized in that
The first server is also used to send the signatory mark to the second server;
The second server is also used to receive the signatory mark, and the signatory mark is added in signatory mark library.
27. a kind of resource transfers device, which is characterized in that described device is applied to first server, and described device includes:
First receiving module carries the user identifier of user for receiving the first transfer request in first transfer request;
First obtains module, is used to obtain the signatory mark of the user, and enable from resource transfers according to the user identifier
Selection target resource transfers token in resource transfers token in board library, the resource transfers token in the resource transfers token pool
The resource transfers token sent for second server;
First generation module generates resource transfers label for shifting token according to the signatory mark and the target resource;
First sending module, for sending the second transfer request to second server, in second transfer request described in carrying
Resource transfers label, for requesting the second server to carry out resource transfers.
28. a kind of resource transfers device, which is characterized in that described device is applied in second server, and described device includes:
4th receiving module carries in second transfer request for receiving the second transfer request of first server transmission
Resource transfers label;
Parsing module obtains signatory mark and target resource transfer token for parsing the resource transfers label;
Second authentication module asks second transfer for shifting token according to the signatory mark and the target resource
It asks and is verified;
Resource transfers module, for carrying out resource transfers according to second transfer request in response to being verified.
29. a kind of first server, which is characterized in that the first server includes one or more processors and one or more
A memory is stored at least one instruction in one or more of memories, and at least one instruction is by one
Or multiple processors are loaded and are executed to realize the behaviour as performed by claim 5 to 16 described in any item resource transfers methods
Make.
30. a kind of second server, which is characterized in that the second server includes one or more processors and one or more
A memory is stored at least one instruction in one or more of memories, and at least one instruction is by one
Or multiple processors are loaded and are executed to realize as performed by the described in any item resource transfers methods of claim 17 to 22
Operation.
31. a kind of non-transitorycomputer readable storage medium, which is characterized in that be stored at least one in the storage medium
Instruction, at least one instruction are loaded by processor and are executed to realize such as the described in any item resources of claim 5 to 16
Operation performed by transfer method.
32. a kind of non-transitorycomputer readable storage medium, which is characterized in that be stored at least one in the storage medium
Instruction, at least one instruction are loaded by processor and are executed to realize such as the described in any item resources of claim 17 to 22
Operation performed by transfer method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910810691.4A CN110517032A (en) | 2019-08-29 | 2019-08-29 | Resource transfers method, system, device, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910810691.4A CN110517032A (en) | 2019-08-29 | 2019-08-29 | Resource transfers method, system, device, server and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110517032A true CN110517032A (en) | 2019-11-29 |
Family
ID=68628277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910810691.4A Pending CN110517032A (en) | 2019-08-29 | 2019-08-29 | Resource transfers method, system, device, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110517032A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131440A (en) * | 2019-12-20 | 2020-05-08 | 腾讯科技(深圳)有限公司 | Resource scheduling method and device and server |
CN111144777A (en) * | 2019-12-30 | 2020-05-12 | 北京三快在线科技有限公司 | Resource transfer method, device, electronic equipment and storage medium |
CN111158878A (en) * | 2019-12-30 | 2020-05-15 | 北京三快在线科技有限公司 | Resource transfer request thread control method, device and storage medium |
CN111242592A (en) * | 2020-01-13 | 2020-06-05 | 北京三快在线科技有限公司 | Resource transfer detection method, device, server and computer readable storage medium |
CN113691379A (en) * | 2021-10-25 | 2021-11-23 | 徐州蜗牛智能科技有限公司 | Authentication method and device for big data |
-
2019
- 2019-08-29 CN CN201910810691.4A patent/CN110517032A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131440A (en) * | 2019-12-20 | 2020-05-08 | 腾讯科技(深圳)有限公司 | Resource scheduling method and device and server |
CN111131440B (en) * | 2019-12-20 | 2021-09-28 | 腾讯科技(深圳)有限公司 | Resource scheduling method and device and server |
CN111144777A (en) * | 2019-12-30 | 2020-05-12 | 北京三快在线科技有限公司 | Resource transfer method, device, electronic equipment and storage medium |
CN111158878A (en) * | 2019-12-30 | 2020-05-15 | 北京三快在线科技有限公司 | Resource transfer request thread control method, device and storage medium |
CN111144777B (en) * | 2019-12-30 | 2022-06-07 | 北京三快在线科技有限公司 | Resource transfer method, device, electronic equipment and storage medium |
CN111158878B (en) * | 2019-12-30 | 2023-08-29 | 北京三快在线科技有限公司 | Resource transfer request thread control method, device and storage medium |
CN111242592A (en) * | 2020-01-13 | 2020-06-05 | 北京三快在线科技有限公司 | Resource transfer detection method, device, server and computer readable storage medium |
CN111242592B (en) * | 2020-01-13 | 2022-06-07 | 北京三快在线科技有限公司 | Resource transfer detection method, device, server and computer readable storage medium |
CN113691379A (en) * | 2021-10-25 | 2021-11-23 | 徐州蜗牛智能科技有限公司 | Authentication method and device for big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102350462B1 (en) | Signature generation method, electronic device and storage medium | |
CN110517032A (en) | Resource transfers method, system, device, server and storage medium | |
CN111339086B (en) | Block processing method, and data query method and device based on block chain | |
CN110288332A (en) | System, method, apparatus, equipment and the storage medium of bank card binding | |
JP7169434B2 (en) | Service processing method and device | |
CN109615515A (en) | Credits voucher transfer method, device, electronic equipment and storage medium | |
CN108830572A (en) | Resource transfers method, apparatus, storage medium and equipment | |
CN109729378A (en) | Information processing method, the method and device that welfare is got in live streaming platform | |
CN110378678A (en) | Numerical value integration method, device, system, node device and storage medium | |
CN110046018A (en) | Show method, apparatus, electronic equipment and the medium of message | |
CN110213153A (en) | Display methods, acquisition methods, device, terminal and the storage medium of unread message | |
CN111340482A (en) | Conflict detection method, device, node equipment and storage medium | |
CN110147380A (en) | Data-updating method, device, server and storage medium | |
CN108897597A (en) | The method and apparatus of guidance configuration live streaming template | |
CN109711832A (en) | The methods, devices and systems paid | |
CN110581831B (en) | Communication method, information acquisition method, electronic device, and storage medium | |
CN110322151A (en) | Platform enters system, method, equipment and storage medium | |
CN108900925A (en) | The method and apparatus of live streaming template are set | |
CN109522146A (en) | The method, apparatus and storage medium of abnormality test are carried out to client | |
CN109413098A (en) | Method, apparatus, terminal and the storage medium that web page element is shown | |
CN110288689A (en) | The method and apparatus that electronic map is rendered | |
CN110007981A (en) | Start method, apparatus, electronic equipment and the medium of application program | |
CN109218751A (en) | The method, apparatus and system of recommendation of audio | |
CN110290191B (en) | Resource transfer result processing method, device, server, terminal and storage medium | |
CN108848492A (en) | Enabling method, apparatus, terminal and the storage medium of subscriber identification card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |