CN110517032A - Resource transfers method, system, device, server and storage medium - Google Patents

Resource transfers method, system, device, server and storage medium Download PDF

Info

Publication number
CN110517032A
CN110517032A CN201910810691.4A CN201910810691A CN110517032A CN 110517032 A CN110517032 A CN 110517032A CN 201910810691 A CN201910810691 A CN 201910810691A CN 110517032 A CN110517032 A CN 110517032A
Authority
CN
China
Prior art keywords
resource transfers
token
server
resource
signatory mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910810691.4A
Other languages
Chinese (zh)
Inventor
杨勇
陆斌
晏琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201910810691.4A priority Critical patent/CN110517032A/en
Publication of CN110517032A publication Critical patent/CN110517032A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"

Abstract

The invention discloses a kind of resource transfers method, system, device, server and storage mediums, belong to technical field of electronic commerce, comprising: terminal sends the first transfer request to first server, and the user identifier of user is carried in the first transfer request;First server receives the first transfer request, according to user identifier, the signatory mark of user, the selection target resource transfers token from the resource transfers token in resource transfers token pool are obtained, the resource transfers token in resource transfers token pool is the resource transfers token that second server is sent;Token is shifted according to signatory mark and target resource, generates resource transfers label;The second transfer request for carrying resource transfers and marking is sent to second server;Second server receives the second transfer request, carries out resource transfers according to the second transfer request.Token being shifted by target resource, dynamic authentication being carried out to resource transfers process, after avoiding the second shifting request from being trapped, sensitive information leakage improves resource transfers safety.

Description

Resource transfers method, system, device, server and storage medium
Technical field
The present invention relates to technical field of electronic commerce, in particular to a kind of resource transfers method, system, device, server And storage medium.
Background technique
With the development of e-commerce technology, gradually shifted by e-sourcing in such a way that entity card carries out resource transfers Or the mode without card resource transfers replaces.User carry out e-sourcing transfer or without card resource transfers before, user need at end Resource transfers card is bound in the third-party application installed on end;When user carries out resource transfers, pass through third-party application pair The corresponding second server of the first server and resource transfers card answered realizes resource transfers.
Summary of the invention
The embodiment of the invention provides a kind of resource transfers method, system, device, server and storage mediums, can solve Certainly due to carrying the sensitive information of the user in the second transfer request, after the second transfer request is trapped, other users The sensitive information for obtaining the user, the problem for causing the safety of resource transfers lower.The technical solution is as follows:
On the one hand, a kind of resource transfers method is provided, which comprises
Terminal sends the first transfer request to first server, and user's mark of user is carried in first transfer request Know;
The first server receives first transfer request and obtains the label of the user according to the user identifier It about identifies, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource turns The resource transfers token moved in token pool is the resource transfers token that second server is sent;According to the signatory mark and described Target resource shifts token, generates resource transfers label;The second transfer request is sent to second server, second transfer is asked It asks middle and carries the resource transfers label;
The second server receives second transfer request, carries out resource transfers according to second transfer request.
In one possible implementation, the method also includes:
The first server sends acquisition request to the second server, and the acquisition request is for requesting described the Two servers generate new resource transfers token;
The second server receives the acquisition request, generates new resource transfers token, Xiang Suoshu first server Send the new resource transfers token;
The first server receives the new resource transfers token, and the new resource transfers token is added to institute It states in resource transfers token pool.
In alternatively possible implementation, before the terminal sends the first transfer request to first server, institute State method further include:
The terminal sends bind request to the first server, carries the to be tested of the user in the bind request Demonstrate,prove information;
The first server receives the bind request that the terminal is sent, and verifies to the information to be verified;
In response to being verified, the first server generates the signing mark of the user according to the information to be verified Know, user identifier and the signatory mark described in associated storage.
In alternatively possible implementation, the first server generates the user according to the information to be verified Signatory mark after, the method also includes:
The first server sends the signatory mark to the second server;
The second server receives the signatory mark, and the signatory mark is added in signatory mark library.
On the other hand, a kind of resource transfers method is provided, the method is applied to first server, the method packet It includes:
The first transfer request is received, the user identifier of user is carried in first transfer request;
According to the user identifier, the signatory mark of the user is obtained, and from the resource in resource transfers token pool Selection target resource transfers token in token is shifted, the resource transfers token in the resource transfers token pool is second server The resource transfers token of transmission;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label;
The second transfer request is sent to second server, the resource transfers label is carried in second transfer request, For requesting the second server to carry out resource transfers.
In one possible implementation, selection target in the resource transfers token from resource transfers token pool Resource transfers token, comprising:
Determine the state of multiple resource transfers tokens in the resource transfers token pool;
According to the state of the multiple resource transfers token, from the resource transfers token in the resource transfers token pool The target resource that state is selected to be not used by shifts token.
In alternatively possible implementation, mesh is selected in the resource transfers token from resource transfers token pool Mark resource transfers token, comprising:
From the resource transfers token pool, a resource transfers token is selected;
Determine the state of the resource transfers token;
State in response to the resource transfers token is to be not used by, using the resource transfers token as target resource Shift token.
In alternatively possible implementation, mesh is selected in the resource transfers token from resource transfers token pool Mark resource transfers token, comprising:
Determine the term of validity of each resource transfers token in the resource transfers token pool;
According to the term of validity of each resource transfers token, enabled from the resource transfers in the resource transfers token pool It includes the target resource transfer token of current time that term of validity is selected in board.
In alternatively possible implementation, the term of validity according to each resource transfers token, from institute The target resource transfer token for selecting current time within term of validity in the resource transfers token in resource transfers token pool is stated, Include:
According to current time and preset duration, determines and stab at the first time;
According to the term of validity of each resource transfers token, enabled from the resource transfers in the resource transfers token pool It includes the target resource transfer token of the first time stamp that term of validity is selected in board.
In alternatively possible implementation, the term of validity according to each resource transfers token, from institute The target resource transfer token for selecting current time within term of validity in the resource transfers token in resource transfers token pool is stated, Include:
According to current time, preset duration and time coefficient, the second timestamp is determined;
According to the term of validity of each resource transfers token, enabled from the resource transfers in the resource transfers token pool It includes the target resource transfer token of second timestamp that term of validity is selected in board.
In alternatively possible implementation, the method also includes:
Acquisition request is sent to the second server, the acquisition request is new for requesting the second server to generate Resource transfers token;
The new resource transfers token is received, the new resource transfers token is added to the resource transfers token In library.
In alternatively possible implementation, before the first transfer request of the reception, the method also includes:
The bind request that the terminal is sent is received, the information to be verified of the user is carried in the bind request;
The information to be verified is verified;
In response to being verified, the signatory mark of the user is generated according to the information to be verified;
User identifier described in associated storage and the signatory mark.
In alternatively possible implementation, the signatory mark that the user is generated according to the information to be verified Later, the method also includes:
The signatory mark is sent to the second server, so that the second server adds the signatory mark Into signatory mark library.
In alternatively possible implementation, the method also includes:
When sending the second transfer request to the second server, by the state of target resource transfer token by not Using being revised as in;
When receiving the transfer completion instruction that the second server returns, by the shape of target resource transfer token State is had been used by being revised as in using;
It is to have been used or validity period by state in the resource transfers token pool in response to clearing up resource transfers token Limit does not include that the resource transfers token of current time is deleted.
It is described that token is shifted according to the signatory mark and the target resource in alternatively possible implementation, Generate resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and by the target resource Transfer token is added in the second field in the resource transfers label message, obtains the resource transfers label.
It is described that token is shifted according to the signatory mark and the target resource in alternatively possible implementation, Before generating resource transfers label, the method also includes:
Obtain resource transfers information;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and by the target resource Transfer token is added in the second field in the resource transfers label message, and the resource transfers information is added to In information resources in the resource transfers label message, the resource transfers label is obtained.
On the other hand, a kind of resource transfers method is provided, the method is applied in second server, the method packet It includes:
The second transfer request that first server is sent is received, resource transfers label is carried in second transfer request;
The resource transfers label is parsed, signatory mark and target resource transfer token are obtained;
Token is shifted according to the signatory mark and the target resource, second transfer request is verified;
In response to being verified, resource transfers are carried out according to second transfer request.
In one possible implementation, described that token is shifted according to the signatory mark and the target resource, it is right Second transfer request is verified, comprising:
Verify whether the target resource transfer token is effective resource transfers token, and in verifying signatory mark library With the presence or absence of the signatory mark;
It is effective resource transfers token in response to target resource transfer token, and exists in the signatory mark library The signatory mark, determination are verified.
In alternatively possible implementation, before second transfer request for receiving first server transmission, institute State method further include:
Resource transfers token is generated, Xiang Suoshu first server sends the resource transfers token, so that first clothes The resource transfers token is added in resource transfers token pool by business device.
In alternatively possible implementation, the method also includes:
Receive the acquisition request that the first server is sent;
According to the acquisition request, new resource transfers token is generated;
The new resource transfers token is sent to the first server, so that the first server will be described new Resource transfers token is added in the resource transfers token pool.
It is described that token is shifted according to the signatory mark and the target resource in alternatively possible implementation, Before being verified to second transfer request, the method also includes:
Receive the signatory mark that the first server is sent;
The signatory mark is added in signatory mark library.
In alternatively possible implementation, the generation resource transfers token, comprising:
Determine current time, third timestamp, the third timestamp is the expired time point of current slot, and obtains Take preset duration and time coefficient;
According to the current time, the preset duration and the time coefficient, determines and generate the resource transfers token The 4th timestamp;
In response to the 4th timestamp in the third timestamp, according to the third timestamp, validity period is generated It is limited to the resource transfers token of the third timestamp;
In response to the 4th timestamp not in the third timestamp, according to the third timestamp, the 5th is determined Timestamp generates the resource transfers token that term of validity is the 5th timestamp.
On the other hand, a kind of resource transfers system is provided, the system comprises: terminal, first server and the second clothes Business device;
The terminal carries user in first transfer request for sending the first transfer request to first server User identifier;
The first server, according to the user identifier, obtains the user for receiving first transfer request Signatory mark, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the money It is the resource transfers token that second server is sent that the resource transfers token in token pool is shifted in source;According to the signatory mark and The target resource shifts token, generates resource transfers label;To second server send the second transfer request, described second turn It moves in request and carries the resource transfers label;
The second server carries out resource according to second transfer request for receiving second transfer request Transfer.
In one possible implementation, the first server is also used to send acquisition to the second server Request, the acquisition request is for requesting the second server to generate new resource transfers token;
The second server is also used to receive the acquisition request, generates new resource transfers token, Xiang Suoshu first Server sends the new resource transfers token;
The first server is also used to receive the new resource transfers token, by the new resource transfers token It is added in the resource transfers token pool.
In alternatively possible implementation, the terminal is also used to send bind request to the first server, The information to be verified of the user is carried in the bind request;
The first server is also used to receive the bind request that the terminal is sent, and carries out to the information to be verified Verifying;
The first server, is also used in response to being verified, and generates the user's according to the information to be verified Signatory mark, user identifier and the signatory mark described in associated storage.
In alternatively possible implementation, the first server is also used to send institute to the second server State signatory mark;
The second server is also used to receive the signatory mark, and the signatory mark is added to signatory mark library In.
On the other hand, a kind of resource transfers device is provided, described device is applied to first server, described device packet It includes:
First receiving module carries user's mark of user for receiving the first transfer request in first transfer request Know;
First obtains module, is used to obtain the signatory mark of the user, and turn from resource according to the user identifier Move selection target resource transfers token in the resource transfers token in token pool, the resource transfers in the resource transfers token pool Token is the resource transfers token that second server is sent;
First generation module generates resource transfers for shifting token according to the signatory mark and the target resource Label;
First sending module carries in second transfer request for sending the second transfer request to second server The resource transfers label, for requesting the second server to carry out resource transfers.
In one possible implementation, described first module is obtained, is also used to determine the resource transfers token pool In multiple resource transfers tokens state;According to the state of the multiple resource transfers token, from the resource transfers token pool In resource transfers token in select state and shift token for the target resource that is not used by.
In alternatively possible implementation, described first obtains module, is also used to from the resource transfers token pool In, select a resource transfers token;
Determine the state of the resource transfers token;State in response to the resource transfers token is to be not used by, will The resource transfers token shifts token as target resource.
In alternatively possible implementation, described first obtains module, is also used to determine the resource transfers token The term of validity of each resource transfers token in library;According to the term of validity of each resource transfers token, from the resource Selection term of validity includes the target resource transfer token of current time in resource transfers token in transfer token pool.
In alternatively possible implementation, it is described first obtain module, be also used to according to current time and it is default when It is long, it determines and stabs at the first time;According to the term of validity of each resource transfers token, from the resource transfers token pool It includes the target resource transfer token of the first time stamp that term of validity is selected in resource transfers token.
In alternatively possible implementation, described first obtains module, is also used to according to current time, preset duration And time coefficient, determine the second timestamp;According to the term of validity of each resource transfers token, enabled from the resource transfers It includes the target resource transfer token of second timestamp that term of validity is selected in resource transfers token in board library.
In alternatively possible implementation, described device further include:
Second sending module, for sending acquisition request to the second server, the acquisition request is for requesting institute It states second server and generates new resource transfers token;
Second receiving module adds the new resource transfers token for receiving the new resource transfers token Into the resource transfers token pool.
In alternatively possible implementation, described device further include:
Third receiving module carries the use in the bind request for receiving the bind request of the terminal transmission The information to be verified at family;
First authentication module, for being verified to the information to be verified;
Second generation module, for generating the signing of the user according to the information to be verified in response to being verified Mark;
Memory module, for user identifier and the signatory mark described in associated storage.
In alternatively possible implementation, described device further include:
Third sending module, for sending the signatory mark to the second server, so that the second server The signatory mark is added in signatory mark library.
In alternatively possible implementation, described device further include:
First modified module is used for when sending the second transfer request to the second server, by the target resource The state for shifting token is revised as in by being not used;
Second modified module, when for completing instruction in the transfer for receiving the second server return, by the mesh The state of mark resource transfers token is had been used by being revised as in using;
Removing module, in response to clear up resource transfers token, by state in the resource transfers token pool be by Using or term of validity do not include current time resource transfers token delete.
In alternatively possible implementation, first generation module, for the signatory mark to be added to money In the first field in the metastatic marker message of source, and target resource transfer token is added to the resource transfers and is marked In the second field in message, the resource transfers label is obtained.
In alternatively possible implementation, described device further include:
Second obtains module, for obtaining resource transfers information;
First generation module is also used to for the signatory mark being added to the first word in resource transfers label message Duan Zhong, and target resource transfer token is added in the second field in the resource transfers label message, and The resource transfers information is added in the information resources in the resource transfers label message, the resource transfers mark is obtained Note.
On the other hand, a kind of resource transfers device is provided, described device is applied in second server, described device packet It includes:
4th receiving module, for receiving the second transfer request of first server transmission, in second transfer request Carry resource transfers label;
Parsing module obtains signatory mark and target resource transfer token for parsing the resource transfers label;
Second authentication module, for shifting token according to the signatory mark and the target resource, to described second turn Request is moved to be verified;
Resource transfers module, for carrying out resource transfers according to second transfer request in response to being verified.
In one possible implementation, second authentication module is also used to verify the target resource transfer and enables Whether board is effective resource transfers token, and whether there is the signatory mark in verifying signatory mark library;In response to institute Stating target resource transfer token is effective resource transfers token, and there are the signatory marks in the signatory mark library, really Surely it is verified.
In alternatively possible implementation, described device further include:
Third generation module, for generating resource transfers token, Xiang Suoshu first server sends the resource transfers and enables Board, so that the resource transfers token is added in resource transfers token pool by the first server.
In alternatively possible implementation, described device further include:
5th receiving module, the acquisition request sent for receiving the first server;
The third generation module is also used to generate new resource transfers token according to the acquisition request;
4th sending module, for sending the new resource transfers token to the first server, so that described The new resource transfers token is added in the resource transfers token pool by one server.
In alternatively possible implementation, described device further include:
6th receiving module, the signatory mark sent for receiving the first server;
Adding module, for the signatory mark to be added in signatory mark library.
In alternatively possible implementation, the third generation module is also used to determine current time, third time Stamp, the third timestamp is the expired time point of current slot, and obtains preset duration and time coefficient;According to described Current time, the preset duration and the time coefficient determine the 4th timestamp for generating the resource transfers token;Response In the 4th timestamp in the third timestamp, according to the third timestamp, generation term of validity is the third The resource transfers token of timestamp;In response to the 4th timestamp not in the third timestamp, when according to the third Between stab, determine the 5th timestamp, generate the resource transfers token that term of validity is the 5th timestamp.
On the other hand, a kind of first server is provided, the first server includes one or more processors and one A or multiple memories are stored at least one instruction in one or more of memories, and at least one instruction is by institute One or more processors are stated to load and execute to realize the resource transfers as described in above-mentioned any possible implementation Operation performed by method.
On the other hand, a kind of second server is provided, the second server includes one or more processors and one A or multiple memories are stored at least one instruction in one or more of memories, and at least one instruction is by institute One or more processors are stated to load and execute to realize the resource transfers as described in above-mentioned any possible implementation Operation performed by method.
On the other hand, provide a kind of non-transitorycomputer readable storage medium, be stored in the storage medium to A few instruction, at least one instruction are loaded by processor and are executed to realize such as above-mentioned any possible implementation Described in resource transfers method performed by operation.
On the other hand, provide a kind of non-transitorycomputer readable storage medium, be stored in the storage medium to A few instruction, at least one instruction are loaded by processor and are executed to realize such as above-mentioned any possible implementation Described in resource transfers method performed by operation.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not It can the limitation present invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is that exemplary partial implements system architecture involved in a kind of resource transfers method exemplified according to the present invention Figure;
Fig. 2 is that exemplary partial implements a kind of system architecture that resource transfers method is related to exemplified according to the present invention Figure;
Fig. 3 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 4 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 5 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 6 is a kind of schematic diagram of resource transfers label provided according to an exemplary embodiment;
Fig. 7 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment;
Fig. 9 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment;
Figure 10 is the structural schematic diagram that exemplary partial implements a kind of terminal exemplified according to the present invention;
Figure 11 is the structural schematic diagram that exemplary partial implements a kind of server exemplified according to the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is that exemplary partial implements a kind of system architecture that resource transfers method is related to exemplified according to the present invention Figure, which includes: terminal 101, first server 102 and second server 103.The terminal 101 is that the present invention is implemented In example, the terminal 101 of resource transfers request is initiated.Third-party application can be installed, first server 102 is in the terminal 101 The corresponding server of the third-party application, second server 103 is the server for carrying out resource transfers, for example, the second service Device 103 can be the corresponding server of banking system.When terminal 101 initiates resource transfers request, pass through the third in terminal 101 Fang Yingyong sends the first transfer request to first server 102.First server 102 receives first transfer request, according to this First transfer request determines the signatory mark of user, and according to first transfer request from the resource in resource transfers token pool One target resource transfer transfer token of selection in token is shifted, token is shifted to second according to the signatory mark and target resource Server 103 sends the second transfer request, and second server 103 receives second transfer request, according to second transfer request Carry out resource transfers.
Wherein, first server 102 passes through network link or data between terminal 101 and second server 103 respectively Interface carries out data interaction.The terminal 101 can be mobile phone, computer or wearable device etc..Third-party application is with certain Strength and the corresponding application of the independent agency of prestige guarantee, the third-party application can be payment application, social application or bank Client etc..Terminal 101, using docking with first server 102, is facilitated resource transfers both sides to complete resource and turned by the third It moves.Correspondingly, the resource transfers process can be payment process, shopping online is carried out, take-away is ordered, pays stop on the net for example, working as Fare or on the net when paying the cost of living, can carry out delivery operation by third-party application.Correspondingly, working as the resource transfers process When for payment process, which can be payment token, which can be the mark of bank's card number of user Know, transfer request can be payment request.The payment process can be with are as follows: when terminal 101 receive shopping online, it is fixed take out, net On when paying parking fee or paying cost-of-living order on the net, terminal 101 initiates payment request according to the order;Correspondingly, eventually Third-party application in end 101 sends the first payment request, first server 102 to first server 102 according to the order According to first payment request, the selection target payment token in payment token library is taken according to the target payment token to second Business device 103 sends the second payment request, and second server 103 receives second payment request, in second payment instruction Signatory mark and target payment token are verified, and in response to being verified, complete delivery operation according to second payment request.
Fig. 2 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in Fig. 2, the resource Transfer method the following steps are included:
Step 201: terminal sends the first transfer request to first server, and the use of user is carried in first transfer request Family mark.
Step 202: the first server receives first transfer request, according to the user identifier, obtains the label of the user It about identifies, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource transfers Resource transfers token in token pool is the resource transfers token that second server is sent;It is provided according to the signatory mark and the target Token is shifted in source, generates resource transfers label;The second transfer request is sent to second server, is carried in second transfer request Resource transfers label.
Step 203: the second server receives second transfer request, carries out resource according to second transfer request and turns It moves.
In one possible implementation, this method further include:
The first server sends acquisition request to the second server, and the acquisition request is for requesting the second server Generate new resource transfers token;
The second server receives the acquisition request, generates new resource transfers token, and sending to the first server should New resource transfers token;
The first server receives the new resource transfers token, which is added to the resource and is turned It moves in token pool.
In alternatively possible implementation, before which sends the first transfer request to first server, the party Method further include:
The terminal sends bind request to the first server, and the information to be verified of the user is carried in the bind request;
The first server receives the bind request of terminal transmission, verifies to the information to be verified;
In response to being verified, which generates the signatory mark of the user according to the information to be verified, association Store the user identifier and the signatory mark.
In alternatively possible implementation, which generates the signing of the user according to the information to be verified After mark, this method further include:
The first server sends the signatory mark to the second server;
The second server receives the signatory mark, which is added in signatory mark library.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
Fig. 3 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in figure 3, this method Applied to first server, the resource transfers method the following steps are included:
Step 301: receiving the first transfer request, the user identifier of user is carried in first transfer request.
Step 302: according to the user identifier, obtaining the signatory mark of the user, and from resource transfers token pool Selection target resource transfers token in resource transfers token, the resource transfers token in the resource transfers token pool are second service The resource transfers token that device is sent.
Step 303: token being shifted according to the signatory mark and the target resource, generates resource transfers label.
Step 304: sending the second transfer request to second server, carry the resource transfers mark in second transfer request Note, for requesting the second server to carry out resource transfers.
In one possible implementation, it selection target should be provided from the resource transfers token in resource transfers token pool Shift token in source, comprising:
Determine the state of multiple resource transfers tokens in the resource transfers token pool;
According to the state of multiple resource transfers token, selected from the resource transfers token in the resource transfers token pool State is the target resource transfer token being not used by.
In alternatively possible implementation, it is somebody's turn to do the selection target from the resource transfers token in resource transfers token pool Resource transfers token, comprising:
From the resource transfers token pool, a resource transfers token is selected;
Determine the state of the resource transfers token;
State in response to the resource transfers token is to be not used by, and is shifted the resource transfers token as target resource Token.
In alternatively possible implementation, it is somebody's turn to do the selection target from the resource transfers token in resource transfers token pool Resource transfers token, comprising:
Determine the term of validity of each resource transfers token in the resource transfers token pool;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool Selection term of validity includes the target resource transfer token of current time.
In alternatively possible implementation, term of validity according to each resource transfers token, from the resource It shifts target resource of the selection current time within term of validity in the resource transfers token in token pool and shifts token, comprising:
According to current time and preset duration, determines and stab at the first time;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool Selection term of validity includes the target resource transfer token of first time stamp.
In alternatively possible implementation, term of validity according to each resource transfers token, from the resource It shifts target resource of the selection current time within term of validity in the resource transfers token in token pool and shifts token, comprising:
According to current time, preset duration and time coefficient, the second timestamp is determined;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool Selection term of validity includes the target resource transfer token of second timestamp.
In alternatively possible implementation, this method further include:
Acquisition request is sent to the second server, the acquisition request is for requesting the second server to generate new resource Shift token;
The new resource transfers token is received, which is added in the resource transfers token pool.
In alternatively possible implementation, before first transfer request of reception, this method further include:
The bind request of terminal transmission is received, the information to be verified of the user is carried in the bind request;
The information to be verified is verified;
In response to being verified, the signatory mark of the user is generated according to the information to be verified;
The associated storage user identifier and the signatory mark.
In alternatively possible implementation, after this generates the signatory mark of the user according to the information to be verified, This method further include:
The signatory mark is sent to the second server, so that the signatory mark is added to signing mark by the second server Know in library.
In alternatively possible implementation, this method further include:
When sending the second transfer request to the second server, by the state of target resource transfer token by being not used It is revised as in;
Receive the second server return transfer complete instruction when, by the target resource transfer token state by It is revised as having been used in use;
It is to have been used or term of validity by state in the resource transfers token pool in response to clearing up resource transfers token It does not include the resource transfers token deletion of current time.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, generates money Source metastatic marker, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted Token is added in the second field in resource transfers label message, obtains resource transfers label.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, generates money Before the metastatic marker of source, this method further include:
Obtain resource transfers information;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted Token is added in the second field in resource transfers label message, and the resource transfers information is added to the resource and is turned It moves in the information resources in label message, obtains resource transfers label.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
Fig. 4 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in figure 4, this method Applied to second server, the resource transfers method the following steps are included:
Step 401: receiving the second transfer request that first server is sent, carry resource transfers in second transfer request Label.
Step 402: parsing resource transfers label, obtain signatory mark and target resource transfer token.
Step 403: token being shifted according to the signatory mark and the target resource, which is verified.
Step 404: in response to being verified, resource transfers being carried out according to second transfer request.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, to this Two transfer requests are verified, comprising:
It verifies whether target resource transfer token is effective resource transfers token, and is in verifying signatory mark library It is no that there are the signatory marks;
It is effective resource transfers token in response to target resource transfer token, and there are the label in the signatory mark library It about identifies, determination is verified.
In alternatively possible implementation, before the second transfer request which sends, the party Method further include:
Resource transfers token is generated, sends the resource transfers token to the first server, so that the first server will The resource transfers token is added in resource transfers token pool.
In alternatively possible implementation, this method further include:
Receive the acquisition request of first server transmission;
According to the acquisition request, new resource transfers token is generated;
The new resource transfers token is sent to the first server, so that the first server is by the new resource transfers Token is added in the resource transfers token pool.
In alternatively possible implementation, this shifts token according to the signatory mark and the target resource, to this Before two transfer requests are verified, this method further include:
Receive the signatory mark of first server transmission;
The signatory mark is added in signatory mark library.
In alternatively possible implementation, the generation resource transfers token, comprising:
Determine current time, third timestamp, which is the expired time point of current slot, and is obtained Preset duration and time coefficient;
According to the current time, the preset duration and the time coefficient, when determining the generate the resource transfers token the 4th Between stab;
In response to the 4th timestamp in the third timestamp, according to the third timestamp, generating term of validity is to be somebody's turn to do The resource transfers token of third timestamp;
In response to the 4th timestamp not in the third timestamp, according to the third timestamp, the 5th timestamp is determined, Generate the resource transfers token that term of validity is the 5th timestamp.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
Fig. 5 is a kind of resource transfers method flow diagram provided according to an exemplary embodiment, as shown in figure 5, the resource Transfer method the following steps are included:
Step 501: terminal sends the first transfer request to first server, and the use of user is carried in first transfer request Family mark.
Needing to carry out resource transfers in response to terminal, terminal sends the first transfer request to first server, and this first turn It moves in request and carries the user identifier of user, which can be the user currently logged in terminal, which is used for table Show the object of this resource transfers operation.
Step 502: first server receives first transfer request, according to the user identifier, obtains the signing of the user Mark.
In this step, after terminal receives first transfer request, according to the user identifier in first transfer request, From in the corresponding relationship of user identifier and signatory mark, the signatory mark of the user is determined.
The first server can be directly from the corresponding relationship of the user identifier and signatory mark that are locally stored, and determining should The corresponding signatory mark of user identifier.The user identifier can also be sent to second server by first server, correspondingly, the The corresponding relationship that user identifier and signatory mark are stored in two servers, by second server according to the user identifier, from user In the corresponding relationship of mark and signatory mark, the corresponding signatory mark of the user identifier is determined.
Wherein, which can be the unique corresponding signatory mark of resource transfers card of user.The resource transfers Card is the resource transfers card bound in user account.
Correspondingly, terminal by the resource transfers card of the user and can be used by first server before this step Family account is bound, and is generated and the unique corresponding signatory mark of the card number of resource transfers card.The generation signatory mark process It can be realized by following steps (1)-(3), comprising:
(1) terminal sends bind request to the first server, and the letter to be verified of the user is carried in the bind request Breath.
The verification information may include user identifier, the card number of resource transfers card of user, the name of user, user At least one of identification card number and the phone number of user.The verification information carries out identity to the user for first server Verifying.
The trigger action of bind request is detected in response to terminal, can by the third-party application in the terminal to this One server sends bind request.For example, can show binding button in the interface of third-party application, detected in response to terminal The binding button is triggered, and confirmly detects the trigger action of bind request, and terminal sends bind request to first server.Its In the user can be the third-party application new user, or the historical user of the third-party application.In response to the use Family is the new user of the third-party application, which also sends registration request to first server, can take in the registration request With the bind request;It is the historical user of the third-party application in response to the user, which can be used for user's addition New resource transfers card.In embodiments of the present invention, this is not especially limited.
(2) first server receives the bind request of terminal transmission, verifies to the information to be verified.
In the first server, the corresponding relationship of the user information of multiple users can be stored in advance, correspondingly, in response to The first server receives the information to be verified of terminal transmission, waits checking and accepting card user information of the information from multiple users according to this One user information of middle selection, which is compared with the user information, in response to the information to be verified and is somebody's turn to do User information is identical, determines that the Information Authentication to be verified passes through, and executes step (3);In response to the information to be verified and the user There is difference in information, determine that the verification information is unverified, the first prompt information of authentication failed be sent to terminal, accordingly , when terminal receives first prompt information, according to first prompt information, show the second prompt information, second prompt Whether information can also prompt user to detect information solicitation to be verified correct, for example, being somebody's turn to do for prompting user's current authentication to fail Second prompt information can be " Bind Failed please determine whether information solicitation is wrong " etc..
It should be noted is that the terminal can also be verified by third server to the information to be verified.Phase It answers, which is sent to third server for the information to be verified, and third server receives the information to be verified, right The information to be verified is verified, and the verification result of the information to be verified is obtained, which is sent to first server, First server receives verification result.Wherein, the process that third server verifies the information to be verified takes with first The process that business device verifies the information to be verified is similar, and details are not described herein.In addition, the third server and second service Device can be identical server, or different servers is in embodiments of the present invention not especially limited this.
(3) in response to being verified, which generates the signatory mark of the user according to the information to be verified, closes Connection stores the user identifier and the signatory mark.
In this step, in response to the information to be verified by verifying, first server generates signatory mark at random, by this The user information correlation of signatory mark and user, first server can also be according to the card numbers of resource transfers card in user information Signatory mark is generated in embodiments of the present invention to be not especially limited the generating mode of the signatory mark.First server will The signatory mark and user identifier associated storage are in designated memory space.
It should be noted is that being carried out by the third server to the information to be verified in response to the first server Verifying, third server can directly generate signatory mark after being verified, which are sent to first service Device, after first server receives the signatory mark, by the signatory mark and user identifier associated storage.
In addition, signatory mark can also be sent to by first server after first server generates signatory mark The signatory mark is stored in signatory mark library by two servers, second server, correspondingly, the process can pass through following step Rapid to realize: the first server sends the signatory mark to the second server;The second server receives the signatory mark;The The signatory mark is added in signatory mark library by two servers.It should be noted is that this step can step (3) it Preceding execution can also be executed after step (3), can also be performed simultaneously with step (3), in embodiments of the present invention, to this The execution sequence with step (3) of step is not especially limited.
In this implementation, terminal sends bind request to first server, and first server is according to the bind request The information to be verified sent to the terminal is verified, and in response to being verified, generates the signatory mark of the information to be verified, and The first identifier is sent to second server, so that second server can carry out resource transfers according to the signatory mark, is kept away The sensitive information leakage for having exempted from user improves the safety of resource transfers.
Step 503: first server selection target resource transfers from the resource transfers token in resource transfers token pool Token, the resource transfers token in the resource transfers token pool are the resource transfers token that second server is sent.
Storage resource shifts token pool in first server, and multiple resource transfers are stored in the resource transfers token pool and are enabled Board, terminal can select a resource transfers token to shift token as target resource from multiple resource transfers token.
In one possible implementation, the resource transfers that first server can at random in resource transfers token pool A resource transfers token is selected to shift token as target resource in token.In alternatively possible implementation, first Server can also select the resource transfers token for being not used by state from the resource transfers token in resource transfers token pool, Token is shifted as target resource.In alternatively possible implementation, first server can also be enabled according to resource transfers In board library, the generation selection of time of resource transfers token generates resource transfers token of the time within term of validity and provides as target Shift token in source.
In response to first server according to the token status selection target resource transfers token of resource transfers token, the first clothes Being engaged in device can be by following two implementation, and selection target resource turns from the resource transfers token in resource transfers token pool Move token.
The first implementation, terminal determines the state of multiple resource transfers tokens in resource transfers token pool, more from this Selection target resource transfers token in a resource transfers token.The process can be realized by following steps (A1)-(A2), be wrapped It includes:
(A1) first server determines the state of multiple resource transfers tokens in the resource transfers token pool.
Wherein, multiple resource transfers token can be all resource transfers tokens in the resource transfers token pool, This can be not especially limited in embodiments of the present invention for the resource transfers token of preset quantity.Also, the specified number Amount, which can according to need, to be configured and changes, and in embodiments of the present invention, is not especially limited to the preset quantity.For example, The preset quantity can be 20,25 or 30 etc..
Wherein, the state of the resource transfers token can be to be not used by, had been used using neutralization.Correspondingly, the One server can be according to the service condition of resource transfers token, for the resource transfers token flag in the resource transfers token pool State.
In embodiments of the present invention, first server receives the newly-generated resource transfers token that second server is sent, The resource transfers token flag received can be to be not used by state by first server.First server confirmed to contract After mark and target resource transfer token, first server can send the second transfer request, first service to second server Device is corresponding by target resource transfer token in resource transfers token pool when sending the second transfer request to the second server Resource transfers token state by be not used be revised as in.Second server carries out resource according to the second transfer request and turns After shifting, transfer can be sent to first server and complete instruction, correspondingly, first server is returned receiving the second server When instruction is completed in the transfer returned, by the shape of the corresponding resource transfers token of target resource transfer token in resource transfers token pool State is had been used by being revised as in using.Wherein, first server can be by any mark mode to the resource transfers token State be marked, in embodiments of the present invention, mark the mode of the resource transfers token not make to have the first server Body limits.For example, the status indication for the resource transfers token being not used by can be 1 by the first server, in using The status indication of resource transfers token is 0, is -1 by the status indication for the resource transfers token having been used.
(A2) resource of the first server according to the state of multiple resource transfers token, from the resource transfers token pool The target resource for selecting state in transfer token to be not used by shifts token.
In this step, first server is the money being not used by from state according to the state of each resource transfers token It shifts one target resource of random selection in token and shifts token in source.
In this implementation, first server determines the state of multiple resource transfers tokens, from multiple resource transfers The resource transfers token being not used by is selected in token, is avoided multiple resource transfers and is operated with same resource transfers token, Resource transfers transfer operation is caused to fail.
Second of implementation, first server randomly choose a resource transfers from the resource transfers token pool and enable Board, then judge the state of the resource transfers token, the state in response to the resource transfers token selected be it is unused, by the choosing The resource transfers token selected shifts token as target resource, and the state in response to the resource transfers token of selection is not not make With, the resource transfers token is abandoned, selects resource transfers token from the resource transfers token in resource transfers token pool again, The process can be realized by following steps (B1)-(B3), comprising:
(B1) first server selects a resource transfers token from the resource transfers token pool.
In this step, first server can be randomly choosed from the resource transfers token in the resource transfers token pool One resource transfers token.
It should be noted is that after resource transfers token had been selected in the server, if the resource transfers of selection The state of token be not it is unused, then first server by the resource transfers token abandon, selected from other resource transfers tokens Select a resource transfers token.
(B2) first server determines the state of the resource transfers token.
In this step, first server can determine money according to the status indication of resource transfers token, first server The state of source transfer token.For example, first server determines that the resource turns when the status indication of the resource transfers token is 1 The state for moving token is to be not used by.
It (B3) is to be not used by response to the state of the resource transfers token, first server makees the resource transfers token Token is shifted for target resource.
State in response to the resource transfers token is in use or to have been used, and first server enables the resource transfers Board abandons, and re-execute the steps (B1)-(B3), randomly chooses one in the resource transfers token in resource transfers token pool again A resource transfers token, and determine the state of the resource transfers token reselected.
In this implementation, first server selects a resource transfers token from multiple resource transfers tokens, and The state for determining the resource transfers token selects the resource transfers token being not used by from multiple resource transfers token, keeps away Multiple resource transfers are exempted from and have operated with same resource transfers token, resource transfers transfer operation is caused to fail.
In response to first server according to resource transfers token pool, the generation selection of time of resource transfers token generates the time When resource transfers token within term of validity shifts token as target resource, first server can be from resource transfers token A resource transfers token is selected in resource transfers token in library, determines the resource transfers token whether within term of validity; If the resource transfers token is within term of validity, using the resource transfers token as goal displacement token, if the resource When shifting token not within term of validity, a resource transfers token is reselected, judges that the resource transfers reselected enable Board whether within term of validity, if, using the resource transfers token reselected as target resource shift token, if Do not exist, reselect again, until selecting the resource transfers token within term of validity.
In response to first server according to resource transfers token pool, the generation selection of time of resource transfers token generates the time When resource transfers token within term of validity shifts token as target resource, first server can also determine that the resource turns The resource transfers token within term of validity in token pool is moved, one is selected from the resource transfers token within term of validity The resource transfers token is shifted token by resource transfers token.
Wherein, first server can also determine that the resource transfers within term of validity in the resource transfers token pool enable When board, for each resource transfers token in resource transfers token pool, which determines that the resource transfers token is It is no within term of validity.
Wherein, first server determine the resource transfers token whether the process within term of validity can be with are as follows: in one kind In possible implementation, when second server sends resource transfers token to first server, directly the resource transfers are enabled The term of validity of board is sent to first server, correspondingly, first server receives the resource transfers of second server transmission The term of validity of token;In alternatively possible implementation, second server sends resource transfers to first server and enables When board, the effective time of the resource transfers token is sent to first server, correspondingly, first server is according to receiving this The effective time of the time of resource transfers token and the resource transfers token determine the term of validity of target resource transfer token. For example, the time that first server receives the resource transfers token is 13:00:00, the effective time of the resource transfers token It is 1 hour, then the term of validity of the resource transfers token is 14:00:00.
It should be noted is that can also subtract when first server determines the term of validity of the resource transfers token It goes the generation duration of the resource transfers token, using duration and maintenance duration etc., turns for example, first server receives the resource The time for moving token is 13:00:00, and the effective time of the resource transfers token is 1 hour, which shifts the life of token At duration, using duration and maintenance the total 5s of duration, then the term of validity of the resource transfers token be 13:59:55.
Whether first server determines current time, and determines preset duration, judge resource transfers token in validity period Process in limit can be realized by following steps (C1)-(C2), comprising:
(C1) first server is determined and is stabbed at the first time according to current time and preset duration.
Wherein, required duration determines when which can be according to the generation of resource transfers token, in the present invention In embodiment, which is not especially limited.For example, the preset duration can be 10s, 15s or 20s etc..This first Timestamp can be time and preset duration time point after being added before deserving, for example, current time is tc=13:00:00 O'clock sharp, the preset duration are ts=10s, then it is t that this is stabbed at the first time1=13:00:10.
(C2) first server is according to term of validity of each resource transfers token, from the resource transfers token pool It includes the target resource transfer token of first time stamp that term of validity is selected in resource transfers token.
Wherein, the term of validity of the resource transfers token, which can according to need, is configured, in embodiments of the present invention, right The term of validity of the resource transfers token is not especially limited.For example, the term of validity of the resource transfers token can be small for 1 When, 1.5 hours or 2 hours etc..In one possible implementation, first server can be from the resource transfers token pool Resource transfers token in randomly choose a resource transfers token, determine the term of validity of the resource transfers token, determining should Whether stamp is within the term of validity of the resource transfers token at the first time.In alternatively possible implementation, first service Device can determine the term of validity of multiple resource transfers neck boards, and stamp is having at the first time for selection from multiple resource transfers token Resource transfers token in the effect phase.
It should be noted is that first server can only determine that the first time stabs whether within term of validity, the One server can also determine the second time of the use or maintenance time comprising the resource transfers token in first server Whether stamp is within the term of validity of the resource transfers token.Correspondingly, the first server determine second timestamp whether Process in the term of validity of the resource transfers token can be realized by following steps (C2-1)-(C2-2), comprising:
(C2-1) first server determines the second timestamp according to current time, preset duration and time coefficient.
Wherein, which can be determined according to first server using the duration of the resource transfers token, the time Coefficient in embodiments of the present invention can be not especially limited the time coefficient for any number greater than 1.For example, the time Coefficient can be 1.2,1.5 or 2 etc..Second timestamp can be the product and current time of preset duration and time coefficient With for example, current time tc=13:00:00 o'clock sharp, the preset duration are ts=10s, the time coefficient are μ=1.2, then this Two timestamps are t1=13:00:12.
(C2-2) first server is according to term of validity of each resource transfers token, from the resource transfers token pool Resource transfers token in selection term of validity include second timestamp target resource transfer token.
In this implementation, first server selects the resource within term of validity to turn from multiple resource transfers tokens Token is moved, resource transfers token is avoided and is not used by for a long time, resource transfers token is caused to reveal, causes resource transfers uneasy Full problem.
In this implementation, first server selected from multiple resource transfers tokens one within term of validity, and Not used resource transfers token, it is therefore prevented that repeatedly select the resource transfers token having been used, avoid multiple resource transfers Same resource transfers token is operated with, resource transfers transfer operation is caused to fail.
It should be noted is that first server can first determine the signatory mark, then determine that the target resource shifts Token;First server can also first determine that the target resource shifts token, then determine the signatory mark;First server may be used also To determine that the signatory mark and target resource transfer token determine the label to first server in embodiments of the present invention simultaneously It about identifies and the sequence of target resource transfer token is not especially limited.Namely first server can first carry out step 502, then Execute step 503;First server can also first carry out step 503, then execute step 502;First server can also be simultaneously Execute step 502 and step 503.In embodiments of the present invention, the execution sequence of step 502 and step 503 is not limited specifically It is fixed.
Step 504: first server shifts token according to the signatory mark and the target resource, generates resource transfers mark Note.
Resource transfers label can be the resource transfers label for including the signatory mark and resource transfers token.
Resource transfers label can be packet labeling, and resource transfers label can be by the corresponding character of the signatory mark String character string composition corresponding with target resource transfer token.What the resource transfers marked message can be multidigit resource transfers mark Remember message, in embodiments of the present invention, the digit of resource transfers label message is not especially limited.For example, the resource turns Moving label message can be 36 etc..As shown in fig. 6, Fig. 6 is that a kind of resource shown according to an exemplary embodiment is shifting Mark the schematic diagram of message.
Correspondingly, the process of generation resource transfers label can be realized by following steps, comprising: first server will The signatory mark is added in the first field in resource transfers label message;Target resource transfer token is added to the money In the second field in the metastatic marker message of source, resource transfers label is obtained.
Wherein, which can be the character string generated at random, and the digit of the character string can be 8 character strings, The character string can be for by the digital character string formed, or the character string being made of numeral and letter, of the invention real It applies in example, the building form of the character string is not especially limited.
In this step, the corresponding character string of resource transfers token is determined, which can be thought as the second clothes The multidigit character string that business device generates at random is in embodiments of the present invention not especially limited the digit of the resource transfers token, For example, the resource transfers token can be 8 character strings.Also, the character string can be the character string being made of number, may be used also Think the character string being made of numeral and letter, in embodiments of the present invention, this is not especially limited.
It should be noted is that can also include other resource transfers information in resource transfers label message, accordingly , first server can also obtain resource transfers information, which is added in resource transfers message, accordingly Above-mentioned steps could alternatively be: first server by the signatory mark be added to resource transfers label message in the first field In, and target resource transfer token is added in the second field in resource transfers label message, and by the money Source transinformation is added in the information resources in resource transfers label message, obtains resource transfers label.
Wherein, which may include the serial number for identifying resource transfers request, indicates resource transfers card At least one of the label of the type of service of support, the Code Number of the corresponding card sending mechanism of resource transfers card, reserved field. It may include multiple fields that the resource transfers, which mark in message, and each field corresponds to different resource transfers information.For example, continuing Referring to Fig. 6, it includes 6 fields which, which marks message, totally 36 resource transfers labels.Wherein, the first field corresponds to mesh Resource transfers token is marked, takes 8 character strings, which can be made of random string and/or number, also, at this Additional character can also be added on the basis of random string and/or number, as shown in fig. 6, the character string of first field can " AsfAd~12 " are thought, in addition, in order to allow second server that can perceive target resource transfer token expired time, target money Source transfer token can consist of two parts :+six token random codes of two time points.Such as 13j2L23~expression token with Machine code be j2L23~target resource transfer token expired time be the same day 13 points.Second field corresponds to signatory mark, takes 8 Character string, second field can also be made of random string and/or number, also, in the random string and/or number On the basis of additional character can also be added, as shown in fig. 6, the character string of second field can be " TAG14214 ".Third Field corresponding resource transfer request serial number, takes 12 character strings, which can be made of random digit, the random number Word can have current time+water dispenser code, as shown in fig. 6, the third field can be " 201911442795 ".4th field is corresponding The label of the type of service of resource transfers card takes 3 character strings, and the 4th field can be made of number, as shown in fig. 6, 4th field can be " 001 ".The Code Number of the card sending mechanism of 5th field corresponding resource transfer card takes 3 character strings, 5th field can be made of number, as shown in fig. 6, the 5th field can be " 101 ".6th field is reserved field, 2 character strings are taken, excess is provided for third field and reserves, as shown in fig. 6, the 6th field can be " 00 ".
In this implementation, first server adds signatory mark, resource transfers token and other resource transfers information It is added in resource transfers label message, obtains resource transfers label, improve the safety in data transmission procedure.
Step 505: first server sends the second transfer request to second server, and carrying in second transfer request should Resource transfers label.
After first server generates the corresponding resource transfers label of this resource transfers, resource is completed by second server Transfer operation, during being somebody's turn to do, first server carries resource transfers label in second transfer request, to second service Device sends second transfer request.
Step 506: second server receives second transfer request.
Step 507: second server parses resource transfers label, obtains signatory mark and target resource transfer token.
In this step, it after second server receives resource transfers label, is parsed from resource transfers label Signatory mark and target resource shift token, correspondingly, determining between second server and first server before this step Specified resolution rules, second server specify resolution rules to parse resource transfers label, obtain the resource according to this Signatory mark and target resource in metastatic marker shift token.
It should be noted is that further including other resource transfers information, second server solution in the resource transfers token After analysing resource transfers label, other resource transfers information of this resource transfers can be determined.
Step 508: second server shifts token according to the signatory mark and the target resource, to second transfer request It is verified.
In this step, second server according to signatory mark and target resource transfer token to second transfer request into Row verifying.The verification process can be realized by following steps (1)-(3), comprising:
(1) second server verifies whether target resource transfer token is effective resource transfers token.
In this step, whether second server can be by verifying the timeliness of the resource transfers token and/or being made With etc., determine whether target resource transfer token is to have effective resource transfers token.
(2) it whether there is the signatory mark in second server verifying signatory mark library.
It should be noted is that second server can first carry out step (1), then execute step (2);Second server Step (2) can also be first carried out, then execute step (1);Second server may also be performed simultaneously step (1) and step (2).In In the embodiment of the present invention, the execution sequence of the step (1) and step (2) is not especially limited.
(3) it is effective resource transfers token in response to target resource transfer token, and exists in the signatory mark library The signatory mark, second server determination are verified.
In this implementation, first server ensure that by verifying to resource transfers token and signatory mark First resource shifts a corresponding resource transfers token, and different resource transfers operations corresponds to different resource transfers tokens, and Resource transfers token avoids the use for a long time of resource transfers token and is compromised, improve resource transfers in service life Safety.
Step 509: in response to being verified, second server carries out resource transfers according to second transfer request.
Second server carries out resource transfers by the resource transfers label in second transfer request in this step, the Two servers determine payer and the side of collecting of this resource transfers from resource transfers label, and determine resource transfers number Value carries out resource transfers according to the payer, the side of collecting and resource transfers numerical value.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
In embodiments of the present invention, storage resource shifts token pool in first server, wraps in the resource transfers token pool Multiple resource transfers tokens are included, multiple resource transfers token is generated by second server, is sent to second server.In one kind In possible implementation, which periodically sends resource transfers token to first server, correspondingly, the second clothes Business device sends multiple resource transfers tokens to first server every the first preset duration.Wherein, which can be with It is configured and changes as needed, in embodiments of the present invention, which is not especially limited.For example, should First preset duration can be 1min, 2min or 2.5min etc..In alternatively possible implementation, first server is to Two servers send acquisition request, after second server receives the acquisition request of first server transmission, to first server Send resource transfers token.As shown in fig. 7, Fig. 7 is a kind of resource transfers method flow shown according to an exemplary embodiment Figure.This method comprises:
Step 701: the first server sends acquisition request to the second server, the acquisition request for request this Two servers generate new resource transfers token.
In one possible implementation, first server detects the resource transfers token in resource transfers token pool Quantity when being less than preset quantity, first server sends acquisition request to the second server, wherein the preset quantity can be with It is configured, in embodiments of the present invention, this is not especially limited as needed.For example, the preset quantity can be 10,15 Or 20 etc..
In alternatively possible implementation, first server is sent every the second preset duration to the second server Acquisition request.Second preset duration, which can according to need, to be configured, also, the second preset duration can be with first in advance , can also be identical with the first preset duration if duration is identical, second preset duration is not made specifically in embodiments of the present invention It limits.For example, second preset duration can be 1min, 2min or 2.5min etc..
In alternatively possible implementation, which can also detect every time resource transfers token pool In resource transfers tokens by use, sending acquisition request to the second server.
Step 702: the second server receives the acquisition request.
Step 703: second server generates new resource transfers token according to the acquisition request.
In this step, second server can be directly by the resource transfers token new according to generation;The second server The resource transfers token with term of validity can also be generated according to current time, second server is according to factors such as current times The process for generating new resource transfers token can be realized by following steps (1)-(4), comprising:
(1) second server determines current time, third timestamp, the third timestamp be current slot it is expired when Between point, and obtain preset duration and time coefficient.
It should be noted is that the third timestamp can be the expired time point in current slot, for example, this Three timestamps can be integral point time point.The third timestamp can also be second server according to current time and term of validity Determining expired time point.For example, current time is 13:00:00 o'clock sharp, term of validity is 2 hours, then the third timestamp It can be 15:00:00 o'clock sharp
(2) second server determines according to the current time, the preset duration and the time coefficient and generates the resource transfers 4th timestamp of token.
In this step, second server is using the sum of the product and current time of the preset duration and time coefficient as Four timestamps generate the time of the resource transfers token.
(3) in response to the 4th timestamp in the third timestamp, according to the third timestamp, generation term of validity is The resource transfers token of the third timestamp.
In response to the 4th timestamp in the third timestamp, illustrating can be default after the resource transfers token generates Failure in duration, has utility value, the resource transfers token in term of validity can be generated.
(4) in response to the 4th timestamp not in the third timestamp, according to the third timestamp, determined for the 5th time Stamp generates the resource transfers token that term of validity is the 5th timestamp.
In response to the 4th timestamp not in the third timestamp, the 5th time after the third timestamp is determined Stamp generates the resource transfers token that term of validity is the 5th timestamp.For example, the time for generating the resource transfers token is 12:59:55, then the resource transfers token correspond to third timestamp 13:00:00 o'clock sharp be term of validity when, the resource transfers enable Board is nonsensical resource transfers token, then can add the term of validity of the resource transfers token 1 hour, generates validity period It is limited to the resource transfers token of 14:00:00 o'clock sharp.
Step 704: second server sends the new resource transfers token to the first server.
Step 705: the first server receives the new resource transfers token, which is added to In the resource transfers token pool.
It should be noted is that memory space in the resource transfers token pool may be limited, first server can be with Useless resource transfers token in resource transfers token pool is removed, for example, resource transfers token pool can be deleted and be had been used Resource transfers token or resource transfers token pool can delete expired resource transfers token.Also, in a kind of possible realization In mode, first server detects the resource transfers token having been used, or detects that the resource for having more than term of validity turns When moving token, when first server, deletes the resource transfers token having been used and enables more than the resource transfers of term of validity Board.In alternatively possible implementation, first server deletes first resource every third preset duration and shifts token pool In all resource transfers tokens, which, which can according to need, is configured, also, the third preset duration and First preset duration may be the same or different with the second preset duration, in embodiments of the present invention, not limit specifically this It is fixed.For example, the third preset duration can be 1min, 2min or 2.5min etc..In alternatively possible implementation, this One server can delete the resource transfers token having been used in first resource transfer token pool every the 4th preset duration With the resource transfers token for being more than term of validity.4th preset duration, which can according to need, to be configured, also, the 4th is pre- If duration can be identical or different with the first preset duration, the second preset duration and third preset duration, in the embodiment of the present invention In, this is not especially limited.For example, the 4th preset duration can be 1min, 2min or 2.5min etc..
Wherein, the resource transfers token in the deletion resource transfers token pool of the use state according to resource transfers token Method can be realized by following steps (1)-(3), comprising:
(1) when sending the second transfer request to the second server, which is shifted token by first server State by be not used be revised as in.
In this step and step 502, first server can turn according to the service condition of resource transfers token for the resource The process for moving the resource transfers token flag state in token pool is similar, and details are not described herein.
(2) when instruction is completed in the transfer for receiving second server return, first server turns the target resource The state for moving token is had been used by being revised as in using.
In this step and step 502, first server can turn according to the service condition of resource transfers token for the resource The process for moving the resource transfers token flag state in token pool is similar, and details are not described herein.
(3) in response to clearing up resource transfers token, state in the resource transfers token pool is to have been made by first server With or term of validity do not include current time resource transfers token delete.
It should be noted is that first server can also mark the resource transfers token of speculation in stocks service life, accordingly First server can be periodically detected the resource transfers token in resource transfers token pool, in response to detecting resource transfers Token is the resource transfers token more than service life, is the resource transfers token to exceed the time limit by the resource transfers token flag.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
Also, in embodiments of the present invention, first server deletes in resource transfers token pool in time and has been used and surpass The resource transfers token for crossing service life, has saved the memory space in resource transfers token pool, ensure that resource transfers token The workability of resource transfers token in library, improves the safety of resource transfers token.
Fig. 8 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment, as shown in figure 8, the device Applied to first server, which includes:
First receiving module 81 carries user's mark of user for receiving the first transfer request in first transfer request Know;
First obtains module 82, for according to the user identifier, obtaining the signatory mark of the user, and from resource transfers Selection target resource transfers token in resource transfers token in token pool, the resource transfers token in the resource transfers token pool The resource transfers token sent for second server;
First generation module 83 generates resource transfers mark for shifting token according to the signatory mark and the target resource Note;
First sending module 84 carries in second transfer request for sending the second transfer request to second server Resource transfers label, for requesting the second server to carry out resource transfers.
In one possible implementation, the first acquisition module 82, is also used to determine in the resource transfers token pool The state of multiple resource transfers tokens;Money according to the state of multiple resource transfers token, from the resource transfers token pool The target resource for selecting state in source transfer token to be not used by shifts token.
In alternatively possible implementation, which is also used to from the resource transfers token pool, Select a resource transfers token;
Determine the state of the resource transfers token;State in response to the resource transfers token is to be not used by, by the money Token is shifted as target resource and shifts token in source.
In alternatively possible implementation, which is also used to determine the resource transfers token pool In each resource transfers token term of validity;According to the term of validity of each resource transfers token, enabled from the resource transfers It includes the target resource transfer token of current time that term of validity is selected in resource transfers token in board library.
In alternatively possible implementation, this first obtain module 82, be also used to according to current time and it is default when It is long, it determines and stabs at the first time;Resource according to the term of validity of each resource transfers token, from the resource transfers token pool Selection term of validity includes the target resource transfer token of first time stamp in transfer token.
In alternatively possible implementation, which is also used to according to current time, preset duration And time coefficient, determine the second timestamp;According to the term of validity of each resource transfers token, from the resource transfers token pool In resource transfers token in selection term of validity include second timestamp target resource transfer token.
In alternatively possible implementation, the device further include:
Second sending module, for the second server send acquisition request, the acquisition request for request this second Server generates new resource transfers token;
The new resource transfers token is added to this for receiving the new resource transfers token by the second receiving module In resource transfers token pool.
In alternatively possible implementation, the device further include:
Third receiving module, carried for receiving the bind request of terminal transmission, in the bind request user to Verification information;
First authentication module, for being verified to the information to be verified;
Second generation module, for generating the signatory mark of the user according to the information to be verified in response to being verified;
Memory module, for the associated storage user identifier and the signatory mark.
In alternatively possible implementation, the device further include:
Third sending module, for sending the signatory mark to the second server, so that the second server is by the label About mark is added in signatory mark library.
In alternatively possible implementation, the device further include:
First modified module, for when sending the second transfer request to the second server, which to be shifted The state of token is revised as in by being not used;
Second modified module provides the target when for completing instruction in the transfer for receiving second server return The state of source transfer token is had been used by being revised as in using;
Removing module, for being to have been made by state in the resource transfers token pool in response to clearing up resource transfers token With or term of validity do not include current time resource transfers token delete.
In alternatively possible implementation, first generation module 83, for the signatory mark to be added to resource In the first field in metastatic marker message, and target resource transfer token is added to the resource transfers and is marked in message The second field in, obtain the resource transfers label.
In alternatively possible implementation, the device further include:
Second obtains module, for obtaining resource transfers information;
First generation module 83 is also used to for the signatory mark being added to the first field in resource transfers label message In, and target resource transfer token is added in the second field in resource transfers label message, and by the money Source transinformation is added in the information resources in resource transfers label message, obtains resource transfers label.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
Fig. 9 is a kind of block diagram of the resource transfers device provided according to an exemplary embodiment, as shown in figure 9, the device Applied to second server, which includes:
4th receiving module 91, for receiving the second transfer request of first server transmission, in second transfer request Carry resource transfers label;
Parsing module 92 obtains signatory mark and target resource transfer token for parsing resource transfers label;
Second authentication module 93 asks second transfer for shifting token according to the signatory mark and the target resource It asks and is verified;
Resource transfers module 94, for carrying out resource transfers according to second transfer request in response to being verified.
In one possible implementation, second authentication module 93 is also used to verify target resource transfer token Whether it is effective resource transfers token, and whether there is the signatory mark in verifying signatory mark library;In response to the target Resource transfers token is effective resource transfers token, and there are the signatory mark in the signatory mark library, determination is verified.
In alternatively possible implementation, the device further include:
Third generation module sends the resource transfers token to the first server for generating resource transfers token, with Be added to the first server resource transfers token in resource transfers token pool.
In alternatively possible implementation, the device further include:
5th receiving module, for receiving the acquisition request of first server transmission;
The third generation module is also used to generate new resource transfers token according to the acquisition request;
4th sending module, for sending the new resource transfers token to the first server, so that the first service The new resource transfers token is added in the resource transfers token pool by device.
In alternatively possible implementation, the device further include:
6th receiving module, for receiving the signatory mark of first server transmission;
Adding module, for the signatory mark to be added in signatory mark library.
In alternatively possible implementation, which is also used to determine current time, third time Stamp, which is the expired time point of current slot, and obtains preset duration and time coefficient;It is current according to this Time, the preset duration and the time coefficient determine the 4th timestamp for generating the resource transfers token;When in response to the 4th Between stamp in the third timestamp, according to the third timestamp, generate the resource transfers that term of validity is the third timestamp and enable Board;In response to the 4th timestamp not in the third timestamp, according to the third timestamp, the 5th timestamp is determined, generate Term of validity is the resource transfers token of the 5th timestamp.
In embodiments of the present invention, by first server according to the first transfer request, from the money of second server transmission Selection target resource transfers token in the resource transfers token in token pool is shifted in source, shifts token and label according to the target resource About identify, generate resource transfers label, to second server send carry the resource transfers mark the second transfer request, second Server carries out resource transfers according to second transfer request.Resource transfers process is carried out by the way that target resource is shifted token Dynamic authentication, realization first resource shift corresponding first resource and shift token, avoid the second shifting and request after being trapped, user's Sensitive information leakage improves the safety of resource transfers.
It should be understood that resource transfers device provided by the above embodiment is in resource transfers, only with above-mentioned each function The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function moulds Block is completed, i.e., the internal structure of terminal is divided into different functional modules, to complete all or part of function described above Energy.In addition, resource transfers device provided by the above embodiment and resource transfers embodiment of the method belong to same design, it is specific real Existing process is detailed in embodiment of the method, and which is not described herein again.
Figure 10 shows the structural block diagram for the terminal 1000 that exemplary partial embodiment of the present invention provides.The terminal 1000 can To be: smart phone, tablet computer, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) player, laptop or desktop computer.Terminal 1000 is also Other titles such as user equipment, portable terminal, laptop terminal, terminal console may be referred to as.
In general, terminal 1000 includes: processor 1001 and memory 1002.
Processor 1001 may include one or more processing cores, such as 4 core processors, 8 core processors etc..Place Reason device 1001 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field- Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed Logic array) at least one of example, in hardware realize.Processor 1001 also may include primary processor and coprocessor, master Processor is the processor for being handled data in the awake state, also referred to as CPU (Central Processing Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.In In some embodiments, processor 1001 can be integrated with GPU (Graphics Processing Unit, image processor), GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 1001 can also be wrapped AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processor is for handling related machine learning Calculating operation.
Memory 1002 may include one or more computer readable storage mediums, which can To be non-transient.Memory 1002 may also include high-speed random access memory and nonvolatile memory, such as one Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 1002 can Storage medium is read for storing at least one instruction, at least one instruction for performed by processor 1001 to realize this hair The resource transfers method that bright middle embodiment of the method provides.
In some embodiments, terminal 1000 is also optional includes: peripheral device interface 1003 and at least one periphery are set It is standby.It can be connected by bus or signal wire between processor 1001, memory 1002 and peripheral device interface 1003.It is each outer Peripheral equipment can be connected by bus, signal wire or circuit board with peripheral device interface 1003.Specifically, peripheral equipment includes: In radio circuit 1004, display screen 1005, camera 1006, voicefrequency circuit 1007, positioning component 1008 and power supply 1009 extremely Few one kind.
Peripheral device interface 1003 can be used for I/O (Input/Output, input/output) is relevant outside at least one Peripheral equipment is connected to processor 1001 and memory 1002.In some embodiments, processor 1001, memory 1002 and periphery Equipment interface 1003 is integrated on same chip or circuit board;In some other embodiments, processor 1001, memory 1002 and peripheral device interface 1003 in any one or two can be realized on individual chip or circuit board, this implementation Example is not limited this.
Radio circuit 1004 is for receiving and emitting RF (Radio Frequency, radio frequency) signal, also referred to as electromagnetic signal. Radio circuit 1004 is communicated by electromagnetic signal with communication network and other communication equipments.Radio circuit 1004 is by telecommunications Number being converted to electromagnetic signal is sent, alternatively, the electromagnetic signal received is converted to electric signal.Optionally, radio circuit 1004 include: antenna system, RF transceiver, one or more amplifiers, tuner, oscillator, digital signal processor, volume solution Code chipset, user identity module card etc..Radio circuit 1004 can by least one wireless communication protocol come with it is other Terminal is communicated.The wireless communication protocol includes but is not limited to: Metropolitan Area Network (MAN), each third generation mobile communication network (2G, 3G, 4G and 5G), WLAN and/or WiFi (Wireless Fidelity, Wireless Fidelity) network.In some embodiments, radio frequency electrical Road 1004 can also include NFC (Near Field Communication, wireless near field communication) related circuit, the present invention This is not limited.
Display screen 1005 is for showing UI (User Interface, user interface).The UI may include figure, text, Icon, video and its their any combination.When display screen 1005 is touch display screen, display screen 1005 also there is acquisition to exist The ability of the touch signal on the surface or surface of display screen 1005.The touch signal can be used as control signal and be input to place Reason device 1001 is handled.At this point, display screen 1005 can be also used for providing virtual push button and/or dummy keyboard, it is also referred to as soft to press Button and/or soft keyboard.In some embodiments, display screen 1005 can be one, and the front panel of terminal 1000 is arranged;Another In a little embodiments, display screen 1005 can be at least two, be separately positioned on the different surfaces of terminal 1000 or in foldover design; In still other embodiments, display screen 1005 can be flexible display screen, is arranged on the curved surface of terminal 1000 or folds On face.Even, display screen 1005 can also be arranged to non-rectangle irregular figure, namely abnormity screen.Display screen 1005 can be with Using LCD (Liquid Crystal Display, liquid crystal display), OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) etc. materials preparation.
CCD camera assembly 1006 is for acquiring image or video.Optionally, CCD camera assembly 1006 includes front camera And rear camera.In general, the front panel of terminal is arranged in front camera, the back side of terminal is arranged in rear camera.In In some embodiments, rear camera at least two is that main camera, depth of field camera, wide-angle camera, focal length are taken the photograph respectively As any one in head, to realize that main camera and the fusion of depth of field camera realize background blurring function, main camera and wide Pan-shot and VR (Virtual Reality, virtual reality) shooting function or other fusions are realized in camera fusion in angle Shooting function.In some embodiments, CCD camera assembly 1006 can also include flash lamp.Flash lamp can be monochromatic temperature flash of light Lamp is also possible to double-colored temperature flash lamp.Double-colored temperature flash lamp refers to the combination of warm light flash lamp and cold light flash lamp, can be used for Light compensation under different-colour.
Voicefrequency circuit 1007 may include microphone and loudspeaker.Microphone is used to acquire the sound wave of user and environment, and It converts sound waves into electric signal and is input to processor 1001 and handled, or be input to radio circuit 1004 to realize that voice is logical Letter.For stereo acquisition or the purpose of noise reduction, microphone can be separately positioned on the different parts of terminal 1000 to be multiple. Microphone can also be array microphone or omnidirectional's acquisition type microphone.Loudspeaker is then used to that processor 1001 or radio frequency will to be come from The electric signal of circuit 1004 is converted to sound wave.Loudspeaker can be traditional wafer speaker, be also possible to piezoelectric ceramics loudspeaking Device.When loudspeaker is piezoelectric ceramic loudspeaker, the audible sound wave of the mankind can be not only converted electrical signals to, can also be incited somebody to action Electric signal is converted to the sound wave that the mankind do not hear to carry out the purposes such as ranging.In some embodiments, voicefrequency circuit 1007 may be used also To include earphone jack.
Positioning component 1008 is used for the current geographic position of positioning terminal 1000, to realize navigation or LBS (Location Based Service, location based service).Positioning component 1008 can be the GPS (Global based on the U.S. Positioning System, global positioning system), the dipper system of China, Russia Gray receive this system or European Union The positioning component of Galileo system.
Power supply 1009 is used to be powered for the various components in terminal 1000.Power supply 1009 can be alternating current, direct current Electricity, disposable battery or rechargeable battery.When power supply 1009 includes rechargeable battery, which can support wired Charging or wireless charging.The rechargeable battery can be also used for supporting fast charge technology.
In some embodiments, terminal 1000 further includes having one or more sensors 1010.One or more sensing Device 1010 includes but is not limited to: acceleration transducer 1011, gyro sensor 1012, pressure sensor 1013, fingerprint sensing Device 1014, optical sensor 1015 and proximity sensor 1016.
Acceleration transducer 1011 can detecte the acceleration in three reference axis of the coordinate system established with terminal 1000 Size.For example, acceleration transducer 1011 can be used for detecting component of the acceleration of gravity in three reference axis.Processor The 1001 acceleration of gravity signals that can be acquired according to acceleration transducer 1011, control display screen 1005 with transverse views or indulge The display of direction view progress user interface.Acceleration transducer 1011 can be also used for adopting for game or the exercise data of user Collection.
Gyro sensor 1012 can detecte body direction and the rotational angle of terminal 1000, gyro sensor 1012 Acquisition user can be cooperateed with to act the 3D of terminal 1000 with acceleration transducer 1011.Processor 1001 is according to gyro sensors The data that device 1012 acquires, following function may be implemented: action induction (for example changing UI according to the tilt operation of user) is clapped Image stabilization, game control and inertial navigation when taking the photograph.
The lower layer of side frame and/or display screen 1005 in terminal 1000 can be set in pressure sensor 1013.Work as pressure When the side frame of terminal 1000 is arranged in sensor 1013, user can detecte to the gripping signal of terminal 1000, by processor 1001 carry out right-hand man's identification or prompt operation according to the gripping signal that pressure sensor 1013 acquires.When pressure sensor 1013 When the lower layer of display screen 1005 is set, the pressure operation of display screen 1005 is realized to UI according to user by processor 1001 Operability control on interface is controlled.Operability control includes button control, scroll bar control, icon control, dish At least one of single control part.
Fingerprint sensor 1014 is used to acquire the fingerprint of user, is collected by processor 1001 according to fingerprint sensor 1014 Fingerprint recognition user identity, alternatively, by fingerprint sensor 1014 according to the identity of collected fingerprint recognition user.Knowing Not Chu the identity of user when being trusted identity, authorize the user to execute relevant sensitive operation by processor 1001, which grasps Make to include solving lock screen, checking encryption information, downloading software, payment and change setting etc..Fingerprint sensor 1014 can be set Set the front, the back side or side of terminal 1000.When being provided with physical button or manufacturer Logo in terminal 1000, fingerprint sensor 1014 can integrate with physical button or manufacturer Logo.
Optical sensor 1015 is for acquiring ambient light intensity.In one embodiment, processor 1001 can be according to light The ambient light intensity that sensor 1015 acquires is learned, the display brightness of display screen 1005 is controlled.Specifically, when ambient light intensity is higher When, the display brightness of display screen 1005 is turned up;When ambient light intensity is lower, the display brightness of display screen 1005 is turned down.Another In one embodiment, the ambient light intensity that processor 1001 can also be acquired according to optical sensor 1015, dynamic adjustment camera shooting The acquisition parameters of head assembly 1006.
Proximity sensor 1016, also referred to as range sensor are generally arranged at the front panel of terminal 1000.Proximity sensor 1016 for acquiring the distance between the front of user Yu terminal 1000.In one embodiment, when proximity sensor 1016 is examined When measuring the distance between the front of user and terminal 1000 and gradually becoming smaller, display screen 1005 is controlled from bright screen by processor 1001 State is switched to breath screen state;When proximity sensor 1016 detects that the distance between user and the front of terminal 1000 gradually become When big, display screen 1005 is controlled by processor 1001 and is switched to bright screen state from breath screen state.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal 1000 of structure shown in Fig. 9, can wrap It includes than illustrating more or fewer components, perhaps combine certain components or is arranged using different components.
Figure 11 is a kind of structural schematic diagram for server that exemplary partial of the invention real applies example offer, which can be with For first server or second server, which can generate bigger difference because configuration or performance are different It is different, it may include one or more processors (central processing units, CPU) 1101 and one or one Above memory 1102, wherein be stored at least one instruction in the memory 1102, at least one instruction is by the processing Device 1101 loads and executes the resource transfers method to realize above-mentioned each embodiment of the method offer.Certainly, which may be used also With the components such as wired or wireless network interface, keyboard and input/output interface, to carry out input and output, the server It can also include other for realizing the component of functions of the equipments, this will not be repeated here.
In the exemplary embodiment, a kind of computer readable storage medium is additionally provided, the memory for example including instruction, Above-metioned instruction can be executed by the processor in terminal to complete resource transfers method in above-described embodiment.For example, the computer can Reading storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, which can store in a kind of computer-readable storage In medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above is only a preferred embodiment of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (32)

1. a kind of resource transfers method, which is characterized in that the described method includes:
Terminal sends the first transfer request to first server, and the user identifier of user is carried in first transfer request;
The first server receives first transfer request and obtains the signing mark of the user according to the user identifier Know, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource transfers enable Resource transfers token in board library is the resource transfers token that second server is sent;According to the signatory mark and the target Resource transfers token generates resource transfers label;The second transfer request is sent to second server, in second transfer request Carry the resource transfers label;
The second server receives second transfer request, carries out resource transfers according to second transfer request.
2. the method according to claim 1, wherein the method also includes:
The first server sends acquisition request to the second server, and the acquisition request is for requesting second clothes Business device generates new resource transfers token;
The second server receives the acquisition request, generates new resource transfers token, and Xiang Suoshu first server is sent The new resource transfers token;
The first server receives the new resource transfers token, and the new resource transfers token is added to the money It shifts in token pool in source.
3. the method according to claim 1, wherein the terminal sends the first transfer request to first server Before, the method also includes:
The terminal sends bind request to the first server, and the letter to be verified of the user is carried in the bind request Breath;
The first server receives the bind request that the terminal is sent, and verifies to the information to be verified;
In response to being verified, the first server generates the signatory mark of the user according to the information to be verified, closes Connection stores the user identifier and the signatory mark.
4. according to the method described in claim 3, it is characterized in that, the first server is generated according to the information to be verified After the signatory mark of the user, the method also includes:
The first server sends the signatory mark to the second server;
The second server receives the signatory mark, and the signatory mark is added in signatory mark library.
5. a kind of resource transfers method, which is characterized in that the method is applied to first server, which comprises
The first transfer request is received, the user identifier of user is carried in first transfer request;
According to the user identifier, the signatory mark of the user is obtained, and from the resource transfers in resource transfers token pool Selection target resource transfers token in token, the resource transfers token in the resource transfers token pool are that second server is sent Resource transfers token;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label;
The second transfer request is sent to second server, the resource transfers label is carried in second transfer request, is used for The second server is requested to carry out resource transfers.
6. according to the method described in claim 5, it is characterized in that, the resource transfers token from resource transfers token pool Middle selection target resource transfers token, comprising:
Determine the state of multiple resource transfers tokens in the resource transfers token pool;
According to the state of the multiple resource transfers token, selected from the resource transfers token in the resource transfers token pool State is the target resource transfer token being not used by.
7. according to the method described in claim 5, it is characterized in that, the resource transfers token from resource transfers token pool Middle selection target resource transfers token, comprising:
From the resource transfers token pool, a resource transfers token is selected;
Determine the state of the resource transfers token;
State in response to the resource transfers token is to be not used by, and is shifted the resource transfers token as target resource Token.
8. according to the method described in claim 5, it is characterized in that, the resource transfers token from resource transfers token pool Middle selection target resource transfers token, comprising:
Determine the term of validity of each resource transfers token in the resource transfers token pool;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool Selection term of validity includes the target resource transfer token of current time.
9. according to the method described in claim 8, it is characterized in that, the validity period according to each resource transfers token Limit selects target resource of the current time within term of validity to turn from the resource transfers token in the resource transfers token pool Move token, comprising:
According to current time and preset duration, determines and stab at the first time;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool Selection term of validity includes the target resource transfer token of the first time stamp.
10. according to the method described in claim 8, it is characterized in that, described according to the effective of each resource transfers token Time limit selects target resource of the current time within term of validity from the resource transfers token in the resource transfers token pool Shift token, comprising:
According to current time, preset duration and time coefficient, the second timestamp is determined;
According to the term of validity of each resource transfers token, from the resource transfers token in the resource transfers token pool Selection term of validity includes the target resource transfer token of second timestamp.
11. according to the described in any item methods of claim 5-10, which is characterized in that the method also includes:
Acquisition request is sent to the second server, the acquisition request is for requesting the second server to generate new money Shift token in source;
The new resource transfers token is received, the new resource transfers token is added to the resource transfers token pool In.
12. according to the method described in claim 5, it is characterized in that, the method is also before the first transfer request of the reception Include:
The bind request that the terminal is sent is received, the information to be verified of the user is carried in the bind request;
The information to be verified is verified;
In response to being verified, the signatory mark of the user is generated according to the information to be verified;
User identifier described in associated storage and the signatory mark.
13. according to the method for claim 12, which is characterized in that described to generate the user according to the information to be verified Signatory mark after, the method also includes:
The signatory mark is sent to the second server, so that the signatory mark is added to label by the second server About in home banking.
14. according to the method described in claim 8, it is characterized in that, the method also includes:
When sending the second transfer request to the second server, by the state of target resource transfer token by being not used It is revised as in;
When receiving the transfer that the second server returns and completing instruction, by the state of target resource transfer token by It is revised as having been used in use;
In response to clear up resource transfers token, by state in the resource transfers token pool be have been used or term of validity not Resource transfers token including current time is deleted.
15. according to the method described in claim 5, it is characterized in that, described according to the signatory mark and the target resource Token is shifted, resource transfers label is generated, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted Token is added in the second field in the resource transfers label message, obtains the resource transfers label.
16. according to the method described in claim 5, it is characterized in that, described according to the signatory mark and the target resource Token is shifted, before generating resource transfers label, the method also includes:
Obtain resource transfers information;
Token is shifted according to the signatory mark and the target resource, generates resource transfers label, comprising:
The signatory mark is added in the first field in resource transfers label message, and the target resource is shifted Token is added in the second field in resource transfers label message, and the resource transfers information is added to described Resource transfers mark in the information resources in message, obtain the resource transfers label.
17. a kind of resource transfers method, which is characterized in that the method is applied in second server, which comprises
The second transfer request that first server is sent is received, resource transfers label is carried in second transfer request;
The resource transfers label is parsed, signatory mark and target resource transfer token are obtained;
Token is shifted according to the signatory mark and the target resource, second transfer request is verified;
In response to being verified, resource transfers are carried out according to second transfer request.
18. according to the method for claim 17, which is characterized in that described according to the signatory mark and the target resource Token is shifted, second transfer request is verified, comprising:
Verify whether target resource transfer token is effective resource transfers token, and in verifying signatory mark library whether There are the signatory marks;
It is effective resource transfers token in response to target resource transfer token, and exists in the signatory mark library described Signatory mark, determination are verified.
19. method described in 7 or 18 according to claim 1, which is characterized in that second turn for receiving first server and sending It moves before request, the method also includes:
Resource transfers token is generated, Xiang Suoshu first server sends the resource transfers token, so that the first server The resource transfers token is added in resource transfers token pool.
20. according to the method for claim 19, which is characterized in that the method also includes:
Receive the acquisition request that the first server is sent;
According to the acquisition request, new resource transfers token is generated;
The new resource transfers token is sent to the first server, so that the first server is by the new resource Transfer token is added in the resource transfers token pool.
21. according to the method for claim 17, which is characterized in that described according to the signatory mark and the target resource Token is shifted, before being verified to second transfer request, the method also includes:
Receive the signatory mark that the first server is sent;
The signatory mark is added in signatory mark library.
22. according to the method for claim 19, which is characterized in that the generation resource transfers token, comprising:
Determine current time, third timestamp, the third timestamp is the expired time point of current slot, and is obtained pre- If duration and time coefficient;
According to the current time, the preset duration and the time coefficient, determines and generate the of the resource transfers token Four timestamps;
In response to the 4th timestamp in the third timestamp, according to the third timestamp, generation term of validity is The resource transfers token of the third timestamp;
In response to the 4th timestamp not in the third timestamp, according to the third timestamp, determined for the 5th time Stamp generates the resource transfers token that term of validity is the 5th timestamp.
23. a kind of resource transfers system, which is characterized in that the system comprises: terminal, first server and second server;
The terminal carries the use of user for sending the first transfer request to first server in first transfer request Family mark;
The first server, according to the user identifier, obtains the label of the user for receiving first transfer request It about identifies, and the selection target resource transfers token from the resource transfers token in resource transfers token pool, the resource turns The resource transfers token moved in token pool is the resource transfers token that second server is sent;According to the signatory mark and described Target resource shifts token, generates resource transfers label;The second transfer request is sent to second server, second transfer is asked It asks middle and carries the resource transfers label;
The second server carries out resource transfers according to second transfer request for receiving second transfer request.
24. system according to claim 23, which is characterized in that
The first server is also used to send acquisition request to the second server, and the acquisition request is for requesting institute It states second server and generates new resource transfers token;
The second server is also used to receive the acquisition request, generates new resource transfers token, Xiang Suoshu first service Device sends the new resource transfers token;
The first server is also used to receive the new resource transfers token, and the new resource transfers token is added Into the resource transfers token pool.
25. system according to claim 23, which is characterized in that
The terminal is also used to send bind request to the first server, carries the user's in the bind request Information to be verified;
The first server is also used to receive the bind request that the terminal is sent, verifies to the information to be verified;
The first server is also used to generate the signing of the user according to the information to be verified in response to being verified It identifies, user identifier and the signatory mark described in associated storage.
26. system according to claim 25, which is characterized in that
The first server is also used to send the signatory mark to the second server;
The second server is also used to receive the signatory mark, and the signatory mark is added in signatory mark library.
27. a kind of resource transfers device, which is characterized in that described device is applied to first server, and described device includes:
First receiving module carries the user identifier of user for receiving the first transfer request in first transfer request;
First obtains module, is used to obtain the signatory mark of the user, and enable from resource transfers according to the user identifier Selection target resource transfers token in resource transfers token in board library, the resource transfers token in the resource transfers token pool The resource transfers token sent for second server;
First generation module generates resource transfers label for shifting token according to the signatory mark and the target resource;
First sending module, for sending the second transfer request to second server, in second transfer request described in carrying Resource transfers label, for requesting the second server to carry out resource transfers.
28. a kind of resource transfers device, which is characterized in that described device is applied in second server, and described device includes:
4th receiving module carries in second transfer request for receiving the second transfer request of first server transmission Resource transfers label;
Parsing module obtains signatory mark and target resource transfer token for parsing the resource transfers label;
Second authentication module asks second transfer for shifting token according to the signatory mark and the target resource It asks and is verified;
Resource transfers module, for carrying out resource transfers according to second transfer request in response to being verified.
29. a kind of first server, which is characterized in that the first server includes one or more processors and one or more A memory is stored at least one instruction in one or more of memories, and at least one instruction is by one Or multiple processors are loaded and are executed to realize the behaviour as performed by claim 5 to 16 described in any item resource transfers methods Make.
30. a kind of second server, which is characterized in that the second server includes one or more processors and one or more A memory is stored at least one instruction in one or more of memories, and at least one instruction is by one Or multiple processors are loaded and are executed to realize as performed by the described in any item resource transfers methods of claim 17 to 22 Operation.
31. a kind of non-transitorycomputer readable storage medium, which is characterized in that be stored at least one in the storage medium Instruction, at least one instruction are loaded by processor and are executed to realize such as the described in any item resources of claim 5 to 16 Operation performed by transfer method.
32. a kind of non-transitorycomputer readable storage medium, which is characterized in that be stored at least one in the storage medium Instruction, at least one instruction are loaded by processor and are executed to realize such as the described in any item resources of claim 17 to 22 Operation performed by transfer method.
CN201910810691.4A 2019-08-29 2019-08-29 Resource transfers method, system, device, server and storage medium Pending CN110517032A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910810691.4A CN110517032A (en) 2019-08-29 2019-08-29 Resource transfers method, system, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910810691.4A CN110517032A (en) 2019-08-29 2019-08-29 Resource transfers method, system, device, server and storage medium

Publications (1)

Publication Number Publication Date
CN110517032A true CN110517032A (en) 2019-11-29

Family

ID=68628277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910810691.4A Pending CN110517032A (en) 2019-08-29 2019-08-29 Resource transfers method, system, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN110517032A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131440A (en) * 2019-12-20 2020-05-08 腾讯科技(深圳)有限公司 Resource scheduling method and device and server
CN111144777A (en) * 2019-12-30 2020-05-12 北京三快在线科技有限公司 Resource transfer method, device, electronic equipment and storage medium
CN111158878A (en) * 2019-12-30 2020-05-15 北京三快在线科技有限公司 Resource transfer request thread control method, device and storage medium
CN111242592A (en) * 2020-01-13 2020-06-05 北京三快在线科技有限公司 Resource transfer detection method, device, server and computer readable storage medium
CN113691379A (en) * 2021-10-25 2021-11-23 徐州蜗牛智能科技有限公司 Authentication method and device for big data

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131440A (en) * 2019-12-20 2020-05-08 腾讯科技(深圳)有限公司 Resource scheduling method and device and server
CN111131440B (en) * 2019-12-20 2021-09-28 腾讯科技(深圳)有限公司 Resource scheduling method and device and server
CN111144777A (en) * 2019-12-30 2020-05-12 北京三快在线科技有限公司 Resource transfer method, device, electronic equipment and storage medium
CN111158878A (en) * 2019-12-30 2020-05-15 北京三快在线科技有限公司 Resource transfer request thread control method, device and storage medium
CN111144777B (en) * 2019-12-30 2022-06-07 北京三快在线科技有限公司 Resource transfer method, device, electronic equipment and storage medium
CN111158878B (en) * 2019-12-30 2023-08-29 北京三快在线科技有限公司 Resource transfer request thread control method, device and storage medium
CN111242592A (en) * 2020-01-13 2020-06-05 北京三快在线科技有限公司 Resource transfer detection method, device, server and computer readable storage medium
CN111242592B (en) * 2020-01-13 2022-06-07 北京三快在线科技有限公司 Resource transfer detection method, device, server and computer readable storage medium
CN113691379A (en) * 2021-10-25 2021-11-23 徐州蜗牛智能科技有限公司 Authentication method and device for big data

Similar Documents

Publication Publication Date Title
KR102350462B1 (en) Signature generation method, electronic device and storage medium
CN110517032A (en) Resource transfers method, system, device, server and storage medium
CN111339086B (en) Block processing method, and data query method and device based on block chain
CN110288332A (en) System, method, apparatus, equipment and the storage medium of bank card binding
JP7169434B2 (en) Service processing method and device
CN109615515A (en) Credits voucher transfer method, device, electronic equipment and storage medium
CN108830572A (en) Resource transfers method, apparatus, storage medium and equipment
CN109729378A (en) Information processing method, the method and device that welfare is got in live streaming platform
CN110378678A (en) Numerical value integration method, device, system, node device and storage medium
CN110046018A (en) Show method, apparatus, electronic equipment and the medium of message
CN110213153A (en) Display methods, acquisition methods, device, terminal and the storage medium of unread message
CN111340482A (en) Conflict detection method, device, node equipment and storage medium
CN110147380A (en) Data-updating method, device, server and storage medium
CN108897597A (en) The method and apparatus of guidance configuration live streaming template
CN109711832A (en) The methods, devices and systems paid
CN110581831B (en) Communication method, information acquisition method, electronic device, and storage medium
CN110322151A (en) Platform enters system, method, equipment and storage medium
CN108900925A (en) The method and apparatus of live streaming template are set
CN109522146A (en) The method, apparatus and storage medium of abnormality test are carried out to client
CN109413098A (en) Method, apparatus, terminal and the storage medium that web page element is shown
CN110288689A (en) The method and apparatus that electronic map is rendered
CN110007981A (en) Start method, apparatus, electronic equipment and the medium of application program
CN109218751A (en) The method, apparatus and system of recommendation of audio
CN110290191B (en) Resource transfer result processing method, device, server, terminal and storage medium
CN108848492A (en) Enabling method, apparatus, terminal and the storage medium of subscriber identification card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination