CN111709752A - Virtual resource processing method and device, computer readable medium and electronic equipment - Google Patents

Virtual resource processing method and device, computer readable medium and electronic equipment Download PDF

Info

Publication number
CN111709752A
CN111709752A CN202010469564.5A CN202010469564A CN111709752A CN 111709752 A CN111709752 A CN 111709752A CN 202010469564 A CN202010469564 A CN 202010469564A CN 111709752 A CN111709752 A CN 111709752A
Authority
CN
China
Prior art keywords
virtual resource
information
verification
identification information
dynamic code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010469564.5A
Other languages
Chinese (zh)
Inventor
录红亮
郑欣
秦泗明
谢东东
朱元杰
钟碧园
姚雷
钟嘉伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010469564.5A priority Critical patent/CN111709752A/en
Publication of CN111709752A publication Critical patent/CN111709752A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a virtual resource processing method and device, a computer readable medium and electronic equipment. The virtual resource processing method comprises the following steps: generating a use request for the virtual resource according to the static identification information of the virtual resource; sending the use request of the virtual resource to a server so that the server acquires the static identification information from the use request, and coding the static identification information to obtain dynamic code information corresponding to the virtual resource; receiving and displaying the dynamic code information sent by the server; and acquiring verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to finish verification and cancellation. The technical scheme of the embodiment of the application can ensure that the virtual resources are not stolen, and further improves the safety of the virtual resources.

Description

Virtual resource processing method and device, computer readable medium and electronic equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a virtual resource processing method and apparatus, a computer-readable medium, and an electronic device.
Background
With the development of internet technology and the popularization of mobile terminal devices, more and more merchants issue virtual resources (such as electronic cards, virtual items or virtual gifts) through the internet, and users draw the virtual resources through the mobile terminal devices for consumption. The user shows the virtual resources to the merchant during consumption, and the merchant performs verification and cancellation according to the virtual resources shown by the user. Therefore, how to ensure that the virtual resources are not stolen, and further improve the security of the virtual resources becomes an urgent technical problem to be solved.
Disclosure of Invention
Embodiments of the present application provide a virtual resource processing method, an apparatus, a computer-readable medium, and an electronic device, so that virtual resources can be prevented from being stolen at least to a certain extent, and thus security of the virtual resources is improved.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned by practice of the application.
According to an aspect of an embodiment of the present application, there is provided a virtual resource processing method, including:
generating a use request for the virtual resource according to the static identification information of the virtual resource;
sending the use request of the virtual resource to a server so that the server acquires the static identification information from the use request, and coding the static identification information to obtain dynamic code information corresponding to the virtual resource;
receiving and displaying the dynamic code information sent by the server;
and acquiring verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to finish verification and cancellation.
According to an aspect of an embodiment of the present application, there is provided a virtual resource processing method, including:
acquiring static identification information of the virtual resource from a received use request of the virtual resource;
coding the static identification information to obtain dynamic code information corresponding to the static identification information;
associating the dynamic code information with the static identification information, and sending the dynamic code information to a terminal for the terminal to display;
and acquiring the identity verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the identity verification information to finish verification and cancellation.
According to an aspect of an embodiment of the present application, there is provided a virtual resource processing apparatus, including:
the request generation module is used for generating a use request of the virtual resource according to the static identification information of the virtual resource;
the sending module is used for sending a use request of the virtual resource to a server so that the server can obtain the static identification information from the use request and encode the static identification information to obtain dynamic code information corresponding to the virtual resource;
the first processing module is used for receiving and displaying the dynamic code information sent by the server;
and the second processing module is used for acquiring the verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to complete verification and cancellation.
Based on the foregoing, in some embodiments of the present application, the first processing module is configured to: receiving the dynamic code information after encryption processing sent by the server; decrypting the encrypted dynamic code information by adopting a decryption certificate; and if the decryption is successful, displaying the decrypted dynamic code information.
Based on the foregoing solutions, in some embodiments of the present application, the first processing module is further configured to: determining a virtual resource to be viewed, and acquiring static identification information of the virtual resource; generating a viewing request for the virtual resource according to the static identification information; sending a viewing request for the virtual resource to the server so that the server acquires static identification information of the virtual resource from the viewing request and inquires utility content of the virtual resource according to the static identification information; receiving and displaying the utility content of the virtual resource sent by the server; and determining the effectiveness of the virtual resources according to the utility content, and if the virtual resources are effective, generating a use request of the virtual resources according to the static identification information of the virtual resources.
Based on the foregoing, in some embodiments of the present application, the second processing module is configured to: if a password verification request for the virtual resource is received, displaying a verification information acquisition interface; and sending the identity verification information acquired by the verification information acquisition interface to the server so that the server verifies the virtual resource according to the identity verification information.
Based on the foregoing solution, in some embodiments of the present application, the virtual resource is an electronic card, and the first processing module is further configured to: and receiving and displaying confirmation information sent by the server, wherein the confirmation information is generated after the server successfully verifies and sells the electronic card ticket and is used for indicating that the electronic card ticket is successfully used.
According to an aspect of an embodiment of the present application, there is provided a virtual resource processing apparatus, including:
the acquisition module is used for acquiring the static identification information of the virtual resource from the received use request of the virtual resource;
the dynamic code information generating module is used for coding the static identification information to obtain dynamic code information corresponding to the identification information;
the third processing module is used for associating the dynamic code information with the static identification information and sending the dynamic code information to a terminal for displaying by the terminal;
and the fourth processing module is used for acquiring the verification information of the virtual resource according to the dynamic code information and verifying the virtual resource according to the verification information of the verification to complete verification and cancellation.
Based on the foregoing solutions, in some embodiments of the present application, the third processing module is further configured to: obtaining static identification information of the virtual resource from a received viewing request of the virtual resource; inquiring according to the static identification information to obtain the utility content of the virtual resource; and then the utility content of the virtual resource is sent to a terminal for the terminal to display.
Based on the foregoing solution, in some embodiments of the present application, before obtaining the verification information of the virtual resource according to the dynamic code information, the third processing module is further configured to: acquiring dynamic code information of the virtual resource from a received cancel request of the virtual resource; inquiring according to the dynamic code information to obtain static identification information of the virtual resource associated with the dynamic code information; and carrying out validity verification on the virtual resources according to the static identification information of the virtual resources.
Based on the foregoing, in some embodiments of the present application, the third processing module is configured to: acquiring the identity information of the holder of the virtual resource according to the static identification information of the virtual resource; inquiring according to the identity information of the holder to obtain a virtual resource list held by the holder; and if the virtual resource exists in the virtual resource list and the using state of the virtual resource is the unused state, determining that the virtual resource passes the validity verification.
Based on the foregoing, in some embodiments of the present application, the fourth processing module is configured to: generating an encryption verification request for the virtual resources according to the static identification information of the virtual resources, and sending the encryption verification request to a terminal so that the terminal displays a verification information acquisition interface; receiving and verifying the identity verification information acquired by the verification information acquisition interface sent by the terminal; and if the identity authentication information passes the authentication, verifying and canceling the virtual resource.
Based on the foregoing, in some embodiments of the present application, the fourth processing module is configured to: acquiring the identity information of the holder of the virtual resource according to the static identification information of the virtual resource; inquiring according to the identity information of the holder to obtain a verification and cancellation record of the holder; and based on the cancel record, canceling the virtual resource if the number of cancel records of the virtual resource of the same category as the virtual resource in a preset time length is less than a preset threshold value.
Based on the foregoing solution, in some embodiments of the present application, after the virtual resource is checked, the fourth processing module is further configured to: and modifying the use state of the virtual resource to be used, associating the dynamic code information with the virtual resource, and modifying the use state of the dynamic code information to be used.
According to an aspect of the embodiments of the present application, there is provided a computer readable medium on which a computer program is stored, the computer program, when executed by a processor, implementing the virtual resource processing method as described in the above embodiments.
According to an aspect of an embodiment of the present application, there is provided an electronic device including: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the virtual resource processing method as described in the above embodiments.
In the technical solutions provided in some embodiments of the present application, a virtual resource usage request is generated according to static identification information of a virtual resource, and then the virtual resource usage request is sent to a server, so that the server obtains the static identification information from the usage request, encodes the static identification information to obtain dynamic code information corresponding to the virtual resource, receives and displays the dynamic code information of the virtual resource sent by the server, obtains verification information of the virtual resource according to the dynamic code information, and verifies the virtual resource according to the verification information to complete verification. Therefore, when the user consumes the virtual resources, the static identification information of the virtual resources is not required to be displayed on the interface, and the user can consume the virtual resources only by displaying the dynamic code information of the virtual resources, so that the static identification information of the virtual resources can be prevented from being recorded by other people and stolen, the safety of the virtual resources is improved, and the property safety of the user is further ensured.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. In the drawings:
FIG. 1 shows a schematic diagram of an exemplary system architecture to which aspects of embodiments of the present application may be applied;
FIG. 2 shows a schematic flow diagram of a virtual resource handling method according to an embodiment of the present application;
FIG. 3 illustrates a flowchart of step S230 of the virtual resource processing method of FIG. 2 according to an embodiment of the present application;
FIG. 4 illustrates a flowchart of step S210 of the virtual resource processing method of FIG. 2 according to one embodiment of the present application;
fig. 5 is a schematic flowchart illustrating a virtual resource processing method according to an embodiment of the present application, where the virtual resource processing method acquires verification information of a virtual resource for verification;
FIG. 6 shows a schematic flow diagram of a virtual resource handling method according to another embodiment of the present application;
FIG. 7 illustrates a schematic flow diagram for viewing virtual resources further included in a virtual resource processing method according to an embodiment of the present application;
fig. 8 is a schematic flowchart illustrating validity verification of a virtual resource further included in the virtual resource processing method according to an embodiment of the present application;
FIG. 9 is a flowchart illustrating step S830 of the virtual resource processing method of FIG. 8 according to an embodiment of the application;
FIG. 10 illustrates a flowchart of step S640 of the virtual resource processing method of FIG. 6 according to one embodiment of the present application;
fig. 11 is a schematic flowchart illustrating a virtual resource verification method according to an embodiment of the present application;
fig. 12 to 15 are schematic diagrams illustrating terminal interfaces applied to a virtual resource processing method according to an embodiment of the present application;
FIG. 16 is a flowchart illustrating a method of requesting dynamic code information according to an embodiment of the present application;
FIG. 17 is a flow diagram illustrating the use of virtual resources in a method of processing virtual resources according to an embodiment of the present application;
FIG. 18 shows a block diagram of a virtual resource processing apparatus according to an embodiment of the present application;
FIG. 19 shows a block diagram of a virtual resource processing apparatus according to another embodiment of the present application;
FIG. 20 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the subject matter of the present application can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the application.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solution of the embodiments of the present application can be applied.
As shown in fig. 1, the system architecture may include a user terminal 110, a merchant terminal 120 and a server 130, wherein the user terminal 110 and the server 130, and the merchant terminal 120 and the server 130 may be connected through a network. The network is used to provide a medium for communication links between the user terminal 110 and the server 130 and between the user terminal 120 and the server 130. It should be appreciated that the network can include various types of connections, such as wired communication links, wireless communication links, and the like.
It should be noted that the number of the user terminals, the merchant terminals and the servers in fig. 1 is only illustrative, and any number of the user terminals, the merchant terminals and the servers may be provided according to actual implementation requirements. For example, the server 130 may be a server cluster composed of a plurality of servers, and the like.
In a specific application scenario, a user may obtain the virtual resource issued by the merchant through the user terminal 110, and present the virtual resource to the merchant during consumption, and the merchant obtains the virtual resource presented by the user through the merchant terminal, and performs verification and cancellation according to the obtained virtual resource.
A user may use a user terminal 110 to interact with a server 130 through a network to receive or transmit information, etc., and the server 130 may be a server providing various services. For example, the user side 110 may generate a usage request for the virtual resource according to the static identification information of the virtual resource, and send the usage request for the virtual resource to the server 130, so that the server 130 obtains the static identification information from the usage request, and encodes the static identification information to obtain the dynamic code information corresponding to the virtual resource. The user terminal 110 may receive and display the dynamic code information sent by the server 130, obtain the verification information of the virtual resource according to the dynamic code information, and verify the virtual resource according to the verification information of the verification of the virtual resource.
The implementation details of the technical solution of the embodiment of the present application are set forth in detail below:
fig. 2 is a flowchart illustrating a virtual resource processing method according to an embodiment of the present application, which may be executed by a mobile terminal, which may be the user terminal 110 shown in fig. 1. Referring to fig. 2, the virtual resource processing method at least includes steps S210 to S240, which are described in detail as follows:
in step S210, a request for using the virtual resource is generated according to the static identification information of the virtual resource.
The virtual resource may be a resource based on the internet and used to provide various services for the user, and the user may obtain the service corresponding to the virtual resource by obtaining the virtual resource. For example, virtual resources may include, but are not limited to, electronic card tickets, virtual items (e.g., game items), and virtual gifts, among others. The electronic card ticket may be a certificate issued by a merchant and having access to a corresponding service, such as a coupon, a group purchase ticket, or a voucher. The user can receive the electronic card issued by the merchant through the terminal and show the electronic card to the merchant during consumption so that the merchant can check and sell the electronic card to complete consumption.
The static identification information may be identification information corresponding to the virtual resource, for example, the static identification information may be a card number or a serial number of the virtual resource. It should be appreciated that a static identification information corresponds to a virtual resource, and that both are uniquely bound.
The usage request for the virtual resource may be information for requesting consumption using the virtual resource. In an example, a user may generate a request for use of a virtual resource by clicking on a particular area on the interface (e.g., clicking on an "use immediately" button on the interface, etc.).
In an embodiment of the present application, a user may query a user side to obtain virtual resource information held by the user, and select a virtual resource that needs to be used. The user side can use the virtual resource selected by the user as the virtual resource to be processed, and correspondingly obtain the static identification information of the virtual resource.
In a specific application scenario, a virtual resource is taken as an example of the electronic card. The user can check the electronic card information held by the user by inquiring the card package in the WeChat client. The wechat client can display an electronic card list held by the user on an interface according to a viewing request of the user for the card package, wherein the electronic card list can contain electronic cards historically taken by the user. And the user selects a specific electronic card from the electronic card list for consumption according to the use requirement of the user. The WeChat client takes the electronic card selected by the user as the electronic card to be processed, and correspondingly obtains the static identification information of the electronic card.
The user side can generate a use request corresponding to the electronic card according to the acquired static identification information of the electronic card to be processed. This makes it possible to associate the use request with the electronic card, thereby preventing the occurrence of an erroneous consumption or the generation of an erroneous request.
In step S220, the request for using the virtual resource is sent to a server, so that the server obtains the static identification information from the request for using, and encodes the static identification information to obtain dynamic code information corresponding to the virtual resource.
The dynamic code information may be dynamic identification information corresponding to the virtual resource. It should be understood that the virtual resource may correspond to different dynamic code information at different time periods to prevent others from recording the dynamic code information and hacking the electronic card.
It should be noted that the dynamic code information may be any form of dynamic identification information, and in an example, the dynamic code information may be dynamic identification information composed of random numbers, such as "215154614" or the like; in another example, the dynamic code information may also be dynamic two-dimensional code information, and so on. Therefore, the method can prevent other people from recording the dynamic code information of the virtual resource and stealing the dynamic code information.
In this embodiment, the usage request for the virtual resource may include static identification information of the virtual resource, and after the client generates the usage request for the virtual resource, the client sends the usage request to the server, and the server may obtain the static identification information of the virtual resource to be used from the usage request and encode the static identification information to obtain dynamic code information corresponding to the virtual resource.
In step S230, the dynamic code information of the virtual resource transmitted by the server is received and displayed.
In this embodiment, the server may send the dynamic code information of the virtual resource to the user side after generating the dynamic code information. The user side can receive the dynamic code information sent by the server and display the dynamic code information on the interface, so that the merchant side can acquire the dynamic code information and verify the dynamic code information to finish consumption.
Corresponding to the specific application scenario, the user may send a use request for the electronic card through the wechat client, and after receiving the use request, the server may obtain the static identification information of the electronic card to be used from the use request, and generate the dynamic code information according to the static identification information. And the WeChat client can receive and display the dynamic code information for the merchant to obtain.
In step S240, acquiring verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to complete verification.
The verification information may be information for determining whether the virtual resource can be verified, for example, the verification information may be authentication information of the user (e.g., a certificate number, fingerprint information, voiceprint information, a payment password, etc.), or verification code information sent by the server to the user terminal, and the like.
In an embodiment of the application, according to the virtual resource corresponding to the dynamic code, the user side may display an acquisition interface displaying verification information for verification and cancellation on the interface, and the user may input verification information for verification and cancellation, such as a certificate number, fingerprint information, voiceprint information, a payment password, or verification code information, held by the user side through an input device (e.g., an input keyboard or a touch-sensitive display screen, etc.) configured by the user side.
In an example, the user side may compare the acquired verification information for verification and cancellation with verification information for verification and cancellation of a holder of the virtual resource pre-stored in the server to determine whether the two are the same, and if the two are the same, it indicates that verification of the virtual resource is passed, and verification and cancellation of the virtual resource may be performed on the virtual resource; if the two are different, it indicates that there may be illegal behaviors in the use of the virtual resource, and the verification fails, so that the virtual resource cannot be verified. In another example, the user side may also send the verification information to the server, so that the server compares the received verification information with the pre-stored verification information to determine whether the received verification information and the pre-stored verification information are the same, thereby achieving the purpose of verifying the virtual resource. Those skilled in the art can configure the device according to actual needs, and the present application is not limited to this.
In the embodiment shown in fig. 2, a usage request for a virtual resource is generated according to static identification information of the virtual resource, and then the usage request is sent to a server, so that the server obtains the static identification information of the virtual resource from the usage request, and codes the static identification information to obtain dynamic code information corresponding to the virtual resource, and a user side can receive and display the dynamic code information sent by the server, and then obtains verification information of the virtual resource according to the dynamic code information, and verifies the virtual resource according to the verification information of the verification of. Therefore, consumption can be carried out through the dynamic code information of the virtual resources without displaying the static identification information of the virtual resources, so that the static identification information of the virtual resources can be prevented from being recorded by other people and the virtual resources can be prevented from being stolen, the safety of the virtual resources is improved, and the property safety of the holders of the virtual resources is ensured.
Based on the embodiment shown in fig. 2, fig. 3 shows a flowchart of step S230 in the virtual resource processing method of fig. 2 according to an embodiment of the present application. Referring to fig. 3, step S230 at least includes steps S310 to S330, which are described in detail as follows:
in step S310, the encrypted dynamic code information sent by the server is received.
In this embodiment, after the server generates the dynamic code information corresponding to the virtual resource according to the static identification information of the virtual resource, the server may encrypt the dynamic code in advance, and then send the encrypted dynamic code information to the user side for receiving, so as to prevent the dynamic code information from being acquired by an illegal user side, for example, the illegal user side may include but is not limited to a user side without a legal client installed and a user side consuming by a client without authorization, and so on.
In step S320, the encrypted dynamic code information is decrypted by using the decryption certificate.
The decryption certificate may be a certificate for decrypting the encrypted dynamic code information. The decryption credentials may be pre-issued by the server to a specific application client (e.g., a wechat client, etc.) or a user end. Having the decryption certificate indicates that the application client or the user end can use the electronic card for consumption.
In this embodiment, the decryption credential may be a certificate that is issued to the application client in advance by the server, and after the user receives the encrypted dynamic code information sent by the server, the user may decrypt the dynamic code information by using the own certificate (i.e., the decryption credential) to obtain the decrypted dynamic code information.
In an embodiment of the present application, one application client may correspond to one decryption credential, and decryption credentials of different application clients may be different, so as to prevent a virtual resource sent to one application client from being consumed by another application client, thereby causing a loss of interest of the application client.
In step S330, if the decryption is successful, the decrypted dynamic code information is displayed.
In this embodiment, the user side decrypts the encrypted dynamic code information by using the own decryption certificate, and if the decryption certificate is legal, the user side can complete decryption of the dynamic code information to obtain unencrypted dynamic code information and display the unencrypted dynamic code information.
In the embodiment shown in fig. 3, the server encrypts and then transmits the dynamic code information, so as to ensure that only the user side holding the legal decryption certificate can decrypt the dynamic code information, thereby ensuring that the dynamic code information is not acquired by the illegal user side to consume the virtual resources, and improving the security of the virtual resources.
Based on the embodiment shown in fig. 2, fig. 4 shows a flowchart of step S210 in the virtual resource processing method of fig. 2 according to an embodiment of the present application. Referring to fig. 4, before step S210, step S210 at least includes steps S410 to S450, which are described in detail as follows:
in step S410, a virtual resource to be viewed is determined, and static identification information of the virtual resource is obtained.
In an embodiment of the present application, a user may query a virtual resource held by the user through a user side, and the user side may display a virtual resource list held by the user on an interface, where the virtual resource list may include virtual resources historically retrieved by the user. The user may select a virtual resource in the virtual resource list as a virtual resource to be viewed, for example, the user may click on a display area corresponding to the virtual resource to be viewed on the interface, and the like. After the user side determines the virtual resource that the user wants to view, the static identification information of the virtual resource can be correspondingly obtained.
In step S420, a viewing request for the virtual resource is generated according to the static identification information.
Wherein the viewing request for the virtual resource may be information for requesting viewing of utility content of the virtual resource.
The utility content of the virtual resource may be content for describing the virtual resource that should be profitable, for example, the utility content of the virtual resource may include, but is not limited to, a right description and a lifetime of the virtual resource.
In this embodiment, after the client acquires the static identification information of the virtual resource to be viewed, a viewing request for the virtual resource may be generated according to the static identification information, where the viewing request may include the identification information of the virtual resource, so that a subsequent server may acquire the identification information.
In step S430, the viewing request for the virtual resource is sent to the server, so that the server obtains the static identification information of the virtual resource from the viewing request, and queries the utility content of the virtual resource according to the static identification information.
In an embodiment of the application, a server receives a viewing request for a virtual resource sent by a user side, analyzes the viewing request to obtain static identification information of the virtual resource to be viewed, and queries and obtains utility content corresponding to the virtual resource according to the static identification information.
Corresponding to a specific application scene, when the wechat client displays the electronic card list on the interface, a user can click the position corresponding to the electronic card to be checked on the interface to select the electronic card to be checked, and the wechat client can generate a checking request for the electronic card according to the static identification information of the electronic card and send the checking request to the server. The server can inquire and obtain the utility content of the electronic card according to the viewing request.
In step S440, the utility content of the virtual resource sent by the server is received and displayed.
In this embodiment, the server sends the obtained utility content of the virtual resource to the user side, and the user side receives and displays the utility content of the virtual resource.
Corresponding to the specific application scene, after the user selects the electronic card to be checked, the detail page of the electronic card can be displayed on the interface, and the user side displays the utility content in the detail page of the electronic card according to the received utility content for the user to check.
In an embodiment of the present application, when the user displays the utility content of the electronic card in the detail page, the static identification information of the electronic card may not be displayed, so as to prevent other people from recording the static identification information of the electronic card and stealing the electronic card, which may cause property loss of the user. Specifically, when the server sends the utility content of the electronic card to the user terminal, the server may send the indication information to the user terminal, where the indication information is used to indicate that the user terminal prohibits displaying the static identification information of the electronic card. The user side can only display the utility content of the electronic card in the detail page according to the indication information, but not display the static identification information, so as to prevent other people from recording or stealing.
In another embodiment of the present application, when the user displays the utility content of the electronic card in the detail page, the user may perform desensitization processing on the static identification information of the electronic card in advance and then display the desensitization processing. For example, the static identification information of the electronic card ticket is composed of 16 digits, and desensitization processing can be carried out on the static identification information to display only partial contents of the static identification information, such as only the first four digits and the last four digits, and the like. Therefore, the static identification information of the electronic card can be prevented from being revealed, the electronic card is prevented from being stolen by others, and the safety of the electronic card is ensured.
In step S450, the validity of the virtual resource is determined according to the utility content, and if the virtual resource is valid, a request for using the virtual resource is generated according to the static identification information of the virtual resource.
Wherein, the validity may be state information for indicating whether the virtual resource is within the validity period.
In this embodiment, the user end may determine whether the virtual resource is valid by determining whether the current time is within the validity period of the virtual resource, for example, the validity period of the virtual resource is 2019.03.15-2020.03.15, and the current time is 2020.04.28, and the current time is not within the validity period of the virtual resource, so the virtual resource is invalid and cannot be used.
Corresponding to the above-mentioned specific application scenario, after determining the validity of the electronic card, the validity of the electronic card may be displayed corresponding to the detail page of the electronic card, for example, displaying the text identifier "valid" or "invalid" at a predetermined position in the detail page.
When a user checks the utility content of the electronic card, if the electronic card is valid, the user can determine that the electronic card is an electronic card to be used, so that the user end generates a use request for the electronic card according to the static identification information of the electronic card. For example, the user may click a specific area (such as an "immediate use" button) in the detail page of the electronic card to determine that the electronic card is the electronic card to be used, and the user terminal generates a use request for the electronic card according to the static identification information of the electronic card to be used.
In the embodiment shown in fig. 4, a user side may determine a virtual resource to be viewed, acquire static identification information of the virtual resource, generate a viewing request for the virtual resource according to the static identification information, send the viewing request for the virtual resource to a server, so that the server queries and acquires utility content of the virtual resource according to the viewing request, send the utility content of the virtual resource to the user side for viewing, determine validity of the virtual resource according to the utility content, and if the virtual resource is valid, generate a use request for the virtual resource according to the static identification information of the virtual resource.
At the moment, when the user side displays the utility content of the virtual resource, the static identification information of the virtual resource is not displayed or is displayed after desensitization treatment is carried out on the static identification information, so that the situation that the user records the static identification information of the virtual resource by other people when looking over the virtual resource so as to steal the virtual resource can be prevented, the safety of the virtual resource is improved, and the property safety of the user is ensured. In addition, after the user views the utility content of the virtual resource, the user can also quickly generate a use request for the virtual resource, so that the processing efficiency of the user on the virtual resource is improved.
Based on the embodiment shown in fig. 2, fig. 5 is a schematic flowchart illustrating a process of acquiring verification information of a virtual resource in a virtual resource processing method according to an embodiment of the present application. Referring to fig. 5, acquiring the verification information of the virtual resource at least includes steps S510 to S520, which are described in detail as follows:
in step S510, if a request for verifying the secret of the virtual resource is received, a verification information obtaining interface is displayed.
The secret verification request for the virtual resource may be information of authentication information of a holder corresponding to the virtual resource due to the request. When the server receives the use request of the virtual resource, a secret verification request of the virtual resource can be sent to the user side so as to obtain the identity verification information of the holder.
The authentication information acquisition interface may be an interface for acquiring authentication information of the holder of the virtual resource. When the user side receives the password verification request for the virtual resource, a verification information acquisition interface can be displayed on the interface, and the user can input own identity verification information on the verification information acquisition interface. It should be noted that the identity authentication information may be identity information corresponding to a holder of the virtual resource, for example, the identity authentication information may be fingerprint information, voiceprint information, payment password information, or certificate information of the holder, and this is not limited in this application.
In this embodiment, after the user displays the verification information obtaining interface, the user may input the own authentication information on the verification information obtaining interface through an input device (e.g., an input keyboard, a touch-sensitive display screen, or a voice input device) configured at the user, so as to verify the ownership of the virtual resource.
In step S520, the authentication information acquired by the authentication information acquisition interface is sent to the server, so that the server authenticates the virtual resource according to the authentication information.
In this embodiment, the user side sends the authentication information acquired by the authentication information acquisition interface to the server, and the server may authenticate the virtual resource according to the authentication information, specifically, the server may compare the received authentication information with authentication information prestored in the server, and if the received authentication information and the authentication information are consistent, it indicates that the user is a legitimate owner of the virtual resource, and the user may use the virtual resource for consumption, and if the received authentication information and the authentication information are not consistent, the server may prohibit the user from consuming the virtual resource.
In the embodiment shown in fig. 5, the server sends a request for verifying the secret of the virtual resource to the user side to obtain the authentication information of the user, so as to verify the virtual resource, thereby ensuring the validity of the virtual resource that the user wants to consume, preventing other people from stealing the virtual resource, and ensuring the property security of the user.
Based on the embodiment shown in fig. 2, in an embodiment of the present application, the virtual resource is an electronic card, and the virtual resource processing method further includes:
and receiving and displaying confirmation information sent by the server, wherein the confirmation information is generated after the server successfully verifies and sells the electronic card ticket and is used for indicating that the electronic card ticket is successfully used.
In this embodiment, when the server confirms that the electronic card has been successfully verified, that is, the electronic card has been successfully used, the server may correspondingly generate the confirmation information and send the confirmation information to the user side. The user side can display the confirmation information on the interface for the user to know, and the participation degree of the user to the electronic card is improved.
Corresponding to a specific application scene, after the server confirms that the electronic card is consumed, the server correspondingly generates confirmation information and sends the confirmation information to a wechat client in the user side, and the wechat client can push the confirmation information to the user in a message mode so that the user can know the using state of the electronic card.
Therefore, the user can confirm the use state of the electronic card according to the confirmation information, and if the electronic card is not the electronic card consumed by the user, the user can correspondingly feed back or complain, so that the electronic card is prevented from being stolen by merchants or other people, and the participation degree and consumption experience of the user are improved.
Fig. 6 shows a flowchart of a virtual resource processing method according to another embodiment of the present application. The virtual resource processing method may be performed by a server, which may be the server 130 shown in fig. 1. Referring to fig. 6, the virtual resource processing method at least includes steps S610 to S640, which are described in detail as follows:
in step S610, static identification information of the virtual resource is acquired from the received request for using the virtual resource.
The static identification information may be identification information corresponding to the virtual resource, and according to the static identification information, the server may perform processing such as querying related information of the virtual resource or performing verification and cancellation on the virtual resource.
In this embodiment, the server may parse the received request for using the virtual resource, and obtain the static identification information of the virtual resource from the request for using, so as to specify the virtual resource that the user wants to use.
In step S620, the static identification information is encoded to obtain dynamic code information corresponding to the static identification information.
In this embodiment, the server may encode the static identification information according to the obtained static identification information of the virtual resource to obtain dynamic code information corresponding to the static identification information, where the dynamic code information may be a dynamic number sequence or dynamic two-dimensional code information, or the like.
In step S630, the dynamic code information is associated with the static identification information, and the dynamic code information is sent to a terminal for display by the terminal.
In this embodiment, the server associates the generated dynamic code information with the static identification information of the virtual resource, and specifically, according to the dynamic code information and the static identification information, a mapping relationship table between the dynamic code information and the static identification information may be established, and the mapping relationship table is stored in the server for subsequent query.
The server sends the dynamic code information to the user side, and the user side can display the dynamic code information on the interface after receiving the dynamic code information. The user may present the dynamic code information to the merchant for the merchant to obtain the dynamic code information to complete the consumption.
Therefore, when consuming the virtual resources, the user only needs to show the dynamic code information corresponding to the virtual resources, but does not need to show the static identification information of the virtual resources, so that the static identification information of the virtual resources can be prevented from being recorded by other people or merchants, the virtual resources can be prevented from being stolen, and the safety of the virtual resources is improved.
In step S640, acquiring verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to complete verification.
Wherein the cancel verification information may be information for determining whether the virtual resource can be cancelled. For example, the verification information may be the user's authentication information (e.g., certificate number, fingerprint information, voiceprint information, payment password, etc.), or the authentication code information sent by the server to the user terminal, etc.
In an embodiment of the present application, the server may send a request for obtaining the cancel/cancel verification information to the user side, and the user side may obtain the cancel/cancel verification information from the user according to the received request for obtaining the cancel/cancel verification information, for example, the user inputs the cancel/cancel verification information through an input device configured in the user side, or obtains the cancel/cancel verification information of the user pre-stored in the user side.
The user side sends the acquired verification information of the verification of.
Based on the embodiment shown in fig. 6, fig. 7 is a schematic flowchart illustrating a virtual resource viewing process further included in the virtual resource processing method according to an embodiment of the present application. Referring to fig. 7, the step of viewing the virtual resource at least includes steps S710 to S730, which are described in detail as follows:
in step S710, static identification information of the virtual resource is obtained from the received viewing request for the virtual resource.
In this embodiment, when the server receives a viewing request for a virtual resource, the viewing request may be parsed, and the static identification information of the virtual resource may be obtained from the viewing request.
In step S720, a query is performed according to the static identification information to obtain the utility content of the virtual resource.
In an embodiment of the present application, the server may query and obtain, according to the obtained static identification information, the utility content of the virtual resource in the virtual resource database corresponding to the static identification information. It should be understood that the utility content of the virtual resource may include, but is not limited to, rights expression and usage duration of the virtual resource. Due to the unique corresponding relation between the static identification information and the virtual resources, the accuracy of the obtained utility content of the virtual resources can be ensured by inquiring according to the static identification information.
In step S730, the utility content of the virtual resource is sent to a terminal for displaying by the terminal.
In this embodiment, the server sends the obtained utility content of the virtual resource to a terminal (i.e., a user side), and after receiving the utility content of the virtual resource, the user side can display the utility content in a detail page of the virtual resource for the user to view.
In an embodiment of the present application, the server may send, to the terminal, indication information together with the utility content of the virtual resource, where the indication information is used to instruct the terminal to prohibit displaying of the static identification information of the virtual resource. When the terminal displays the utility content on the detail page of the virtual resource, the static identification information of the virtual resource is not displayed according to the indication information, so that the condition that the static identification information is recorded by other people to steal the virtual resource when a user views the virtual resource can be prevented.
In an embodiment of the present application, the indication information may also be information used to instruct the terminal to perform desensitization processing on the static identification information of the virtual resource and then display the desensitization processing. The terminal can perform desensitization processing on the static identification information of the virtual resource according to the indication information, and then display the desensitized static identification information of the virtual resource in a detail page to prevent the static identification information from being leaked.
Therefore, only the utility content of the virtual resource or the static identification information after desensitization processing can be displayed in the detail page of the virtual resource, and the user can check the utility content of the virtual resource and prevent the static identification information of the virtual resource from being recorded by other people so as to be stolen, thereby improving the safety of the virtual resource and ensuring the property safety of the user.
Based on the embodiment shown in fig. 6, fig. 8 is a schematic flowchart illustrating a process of verifying validity of a virtual resource, which is further included in a virtual resource processing method according to an embodiment of the present application. Referring to fig. 8, before obtaining the authentication information of the virtual resource according to the dynamic code information, the validity verification of the virtual resource at least includes steps S810 to S830, which are described in detail as follows:
in step S810, dynamic code information of the virtual resource is obtained from the received cancel request for the virtual resource.
The cancel request for the virtual resource may be information for requesting cancel of the virtual resource. Wherein, the verification can be a process of the merchant verifying the relevant information of the virtual resource to complete consumption. The provider side (e.g., the provider side 120 shown in fig. 1) may obtain, through a scanning device configured by the provider side, dynamic code information of the virtual resource shown by the provider side, generate, according to the dynamic code information, an approval/cancellation request for the virtual resource, and send the approval/cancellation request to the server.
In this embodiment, the server may parse the cancel verification request according to the received cancel verification request for the virtual resource sent by the merchant terminal, so as to obtain the dynamic code information of the virtual resource from the cancel verification request.
In step S820, query is performed according to the dynamic code information, and static identification information of the virtual resource associated with the dynamic code information is obtained.
In an embodiment of the present application, according to the obtained dynamic code information, the server may query static identification information of a virtual resource associated with the dynamic code information to determine a virtual resource that needs to be underwritten. Specifically, the server may query the mapping relationship table between the dynamic code information and the static identification information according to the dynamic code information, so as to obtain the static identification information associated with the dynamic code information.
If the server can inquire the mapping relation with the static identification information according to the dynamic code information, the dynamic code information is effective, and subsequent operation can be carried out. If the mapping relation with the static identification information cannot be inquired according to the dynamic code information, the dynamic code information is false dynamic code information or the dynamic code information is invalid, the server can return information of dynamic code errors to the merchant terminal, and stop subsequent operation.
In an embodiment of the present application, the dynamic code information may have a time effectiveness, for example, the dynamic code information is valid within 3 minutes from the generation time, or valid within 5 minutes, and the above is only an exemplary example, and the present application is not limited to this. If the dynamic code information exceeds the effective time period, the user side is required to resend the use request for the electronic safety so as to enable the server to generate new dynamic code information, and the user consumes according to the newly generated dynamic code information.
Therefore, the situation that the leakage risk is increased due to the fact that the dynamic code information exists for too long time can be prevented. The mapping relation between the newly generated dynamic code information and the static identification information can replace the original mapping relation, so that the condition that other people consume or repeatedly consume by using the old dynamic code information is prevented, and the property safety of users and merchants is ensured.
In step S830, validity verification is performed on the virtual resource according to the static identification information of the virtual resource.
The validity verification may be a verification process for verifying the validity of using the virtual resource. By carrying out validity verification on the virtual resource, whether the virtual resource used by the user is legal or not can be verified, so that the risk that other people steal the virtual resource is eliminated.
In this embodiment, the server may obtain information related to the virtual resource, such as identity information of a holder of the virtual resource, a usage status of the virtual resource, a lifetime of the virtual resource, and the like, according to the static identification information of the virtual resource. And based on the information related to the virtual resource, performing validity verification on the virtual resource to determine whether the virtual resource can be used.
After the virtual resource passes the validity verification, it means that the consumption using the virtual resource is legal, so the virtual resource can be verified to complete the consumption.
In the embodiment shown in fig. 8, the server may obtain the dynamic code information of the virtual resource according to the cancel request of the virtual resource, obtain the static identification information associated with the dynamic code information according to the dynamic code information, perform validity verification on the virtual resource based on the static identification information, and cancel the virtual resource after verification. Therefore, the consumption validity of the virtual resources can be ensured, and the virtual resources are prevented from being stolen by others to cause property loss of the holders of the virtual resources.
In one embodiment of the application, when the server receives a cancel request for the virtual resource, security verification may be performed on the cancel request, where the security verification may be a verification process for verifying security of the cancel request, so as to prevent situations such as illegal forgery of the cancel request by others or sending the cancel request by using an illegal application client.
In particular, the security verification may include one or more of an interface signature verification, a business parameter verification, and an authorization verification. The interface signature verification may be a verification process for verifying the validity of the interface called by the cancel request. The server can obtain the interface signature information of the interface called by the cancel request from the cancel request of the virtual resource, and determine whether the interface called by the cancel request is a legal interface according to the interface signature information, so as to prevent others from calling an illegal interface to send a false cancel request and cause property loss of a user.
The service parameter verification may be a verification process for verifying the validity of the service parameter contained in the cancel verification request. It should be understood that the type, number, etc. of the service parameters included in the legitimate cancel request should be uniform. The service parameters in the verification and cancellation request received by the acquisition server are compared with the preset service parameter rule to determine whether the received verification and cancellation request conforms to the preset service parameter rule, so that the verification and cancellation request can be prevented from being forged by others, and the property safety of a user can be ensured.
The authority verification may be a verification process for verifying the authority of the merchant terminal that sends the verification request. For example, a certain type of virtual resource is only allowed to be consumed at a certain merchant terminal, or only certain merchant terminals can be used for consumption of the virtual resource, and so on. When the merchant terminal sends the verification and sale request for the virtual resources to the server, the authority information of the merchant terminal can be sent together, so that the server can inquire whether the merchant terminal has the authority for consuming the virtual resources according to the authority information, and the virtual resources are prevented from being stolen by other people or merchants.
By carrying out security verification on the verification and cancellation request of the virtual resource, the verification and cancellation request can be generated and sent by a legal merchant end, so that the virtual resource is prevented from being stolen by other people or merchants, and property loss of a holder of the virtual resource and an issuer is further caused.
Based on the embodiments shown in fig. 6 and fig. 8, fig. 9 shows a flowchart of step S830 in the virtual resource processing method of fig. 8 according to an embodiment of the present application. Referring to fig. 10, step S830 includes at least steps S910 to S930, and the detailed description is as follows:
in step S910, according to the static identification information of the virtual resource, the identity information of the holder of the virtual resource is obtained.
The identity information of the holder may be information indicating the identity of the holder, which corresponds to the holder. For example, the identity information of the holder may be social account information (e.g., a QQ account or a WeChat account, etc.) of the holder, certificate information (e.g., an identity document number, a passport document number, etc.), or a telephone number, etc. that may represent the identity of the holder.
In this embodiment, the server may query and obtain the identity information of the holder holding the virtual resource according to the static identification information of the virtual resource.
In step S920, a query is performed according to the identity information of the holder, so as to obtain a virtual resource list held by the holder.
In this embodiment, it should be understood that the virtual resource held by the holder should be bound with the identity information of the holder to prevent theft by others. Therefore, the server can query the database according to the identity information of the holder to obtain the relevant information of all virtual resources held by the holder, and correspondingly generate a virtual resource list according to the virtual resources held by the holder.
In step S930, if the virtual resource exists in the virtual resource list and the usage status of the virtual resource is an unused status, it is determined that the virtual resource passes the validity verification.
The usage state of the virtual resource may be state information for characterizing whether the virtual resource is used. The state usage information may include used and unused states, and thus, the server may determine whether the virtual resource is used according to the corresponding usage state of the virtual resource. In an example, the usage status of the virtual resource may be stored in a virtual resource list corresponding to the virtual resource, so as to determine the usage status of the virtual resource subsequently according to the virtual resource list.
In this embodiment, the server determines whether the virtual resource to be checked out exists in the virtual resource list by querying the virtual resource list of the holder to determine whether the user is a valid holder of the virtual resource, and determines whether the virtual resource is used by using the usage status of the virtual resource in the virtual resource list. If the virtual resource to be verified exists in the virtual resource list of the holder and the use state of the virtual resource is unused, the virtual resource can pass validity verification and can be verified; on the contrary, if the virtual resource to be verified does not exist in the virtual resource list of the holder or the usage status of the virtual resource is used, it indicates that the virtual resource does not pass the validity verification, and the virtual resource may be stolen or repeatedly consumed for another person, so that the virtual resource cannot be verified.
In the embodiment shown in fig. 9, the identity information of the holder of the virtual resource is obtained according to the static identification information of the virtual resource, the virtual resource list held by the holder is obtained according to the identity information, and if the virtual resource to be verified exists in the virtual resource list and the use state is not used, it indicates that the virtual resource passes the validity verification and can be verified, so that the security of the virtual resource can be ensured, and the virtual resource is prevented from being stolen or repeatedly consumed by other people.
Based on the embodiment shown in fig. 6, fig. 10 shows a flowchart of step S640 in the virtual resource processing method of fig. 6 according to an embodiment of the present application. Referring to fig. 9, step S640 includes at least steps S1010 to S1030, which are described in detail as follows:
in step S1010, a secret verification request for the virtual resource is generated according to the static identification information of the virtual resource, and the secret verification request is sent to a terminal, so that the terminal displays a verification information acquisition interface.
In this embodiment, the server may specify the virtual resource to be consumed according to the obtained static identification information of the virtual resource, generate a request for verifying the secret of the virtual resource, and send the request for verifying the secret of the virtual resource to the terminal. And after the terminal receives the password verification request, displaying a verification information acquisition interface on the interface so that the user can input own identity verification information on the verification information acquisition interface.
In step S1020, the authentication information acquired by the authentication information acquisition interface sent by the terminal is received and authenticated.
In the embodiment, the terminal sends the user identity authentication information acquired by the authentication information acquisition interface to the server, the server compares the identity authentication information with the pre-stored identity authentication information of the holder of the virtual resource, if the identity authentication information is consistent with the pre-stored identity authentication information of the holder of the virtual resource, the user is indicated as the holder of the virtual resource, and subsequent operations can be performed; if the two are not consistent, the user steals the virtual resource for consumption, and the subsequent operation is stopped.
In step S1030, if the authentication information passes the verification, performing validity verification on the virtual resource.
In this embodiment, if the authentication information input by the user passes the authentication of the server, that is, the authentication information acquired by the terminal is consistent with the authentication information of the pre-stored holder of the virtual resource, it indicates that the subsequent operation can be performed on the virtual resource; and if the identity authentication information input by the user fails to pass the authentication of the server, namely the identity authentication information acquired by the terminal is inconsistent with the identity authentication information of the pre-stored holder of the virtual resource, indicating that the user steals the virtual resource of other people for consumption, and stopping the subsequent operation on the virtual resource.
Based on the embodiments shown in fig. 2 and fig. 8, fig. 11 is a schematic flowchart illustrating a virtual resource verification process in a virtual resource processing method according to an embodiment of the present application. Referring to fig. 11, the process of verifying the virtual resource at least includes steps S1110 to S1130, which are described in detail as follows:
in step S1110, the identity information of the holder of the virtual resource is obtained according to the static identification information of the virtual resource.
In step S1120, a query is performed according to the identity information of the holder, and a verification record of the holder is obtained.
The audit trail record may be information for recording historical audit trail records of the holders of the virtual resources. One audit trail record may correspond to the holder of one virtual resource, and when the holder of the virtual resource completes each consumption, the consumption record (e.g., the type of virtual resource consumed, the time of consumption, the place of consumption, etc.) may be added to the audit trail record to maintain the accuracy of the audit trail record.
In this embodiment, the server may query the cancel record corresponding to the identity information according to the identity information of the holder to obtain the cancel record of the holder, and may know the historical consumption condition of the holder of the virtual resource according to the cancel record.
In step S1130, based on the cancel record, if the number of cancel records of the virtual resource of the same category as the virtual resource within the predetermined time period is less than the predetermined threshold, cancel is performed on the virtual resource.
In this embodiment, based on the acquired verification and verification records, the server may perform statistics on consumption conditions of the holders of the virtual resources, for example, statistics on the number of virtual resources historically consumed by the holders of the same type, or the number of virtual resources consumed within a specified time period of the same type, or the number of virtual resources consumed at the same location, and so on.
It should be noted that the predetermined time period may be preset by a person skilled in the art, and the predetermined time period may be a time range of any length, such as 5 hours, 8 hours, 24 hours, etc., which are only exemplary and are not limited in this application.
The predetermined threshold may be a threshold preset by one skilled in the art to define the number of virtual resources of the same category consumed by the holder of virtual resources within a predetermined length of time. For example, if the predetermined threshold is 20, it indicates that the holder of the virtual resource is not allowed to consume more than 20 times the amount of the virtual resource in the same category within a predetermined time period; if the predetermined threshold is 30, it means that the holder of the virtual resource is not allowed to consume more than 30 times the amount of the virtual resource of the same category within the predetermined time period, and so on. The above is merely an exemplary example, and a person skilled in the art may set the predetermined threshold value with any size according to implementation needs, and the present application is not limited to this.
In the embodiment shown in fig. 11, by setting the predetermined threshold, it is prevented that the same user consumes too many virtual resources in the same merchant or within a predetermined time period, which results in a situation that the merchant has insufficient inventory and other users cannot consume.
In an embodiment of the application, after the merchant terminal sends the verification and cancellation request for the virtual resource to the server, the verification and cancellation condition of the virtual resource may be queried in real time from the server, specifically, the merchant terminal may send information for confirming a consumption state of the virtual resource to the server at predetermined intervals, and if the verification and cancellation of the virtual resource by the server are completed, the confirmation information for successful verification and cancellation is sent to the merchant terminal, so that the merchant provides a corresponding service to the user according to the confirmation information for successful verification and cancellation. And if the merchant end does not receive the verification information of successful verification and cancellation, continuously sending the information for verifying the consumption state of the virtual resources at preset time intervals.
In another embodiment of the application, after the server confirms that the virtual resource is successfully verified and sold, the server can actively send verification information of successful verification and sale to the merchant side without sending information for confirming the consumption state of the virtual resource to the server by the merchant side, so that unnecessary interaction between the merchant side and the server is reduced, and the power consumption of the merchant side and the server is reduced.
In an example, the merchant terminal and the server may be connected through a WebSocket, which is a protocol for performing full-duplex communication on a single TCP connection, and may make data exchange between the merchant terminal and the server simpler, and allow the server to push data to the merchant terminal, so that efficiency of information exchange between the server and the merchant terminal may be improved.
In addition, when the user uses the virtual resource to consume in the online shopping mall, if the server confirms that the virtual resource is successfully verified, the server may add the verification record to the merchant callback notification record, where the merchant callback record is used for recording the verification record of the virtual resource, and the server may send a notification to the merchant corresponding to the virtual resource that is successfully verified according to the merchant callback record, so as to notify the merchant to provide corresponding service to the user.
Based on the embodiments shown in fig. 2 and fig. 8, in an embodiment of the present application, after the virtual resource is verified, the virtual resource processing method further includes:
and modifying the use state of the virtual resource to be used, associating the dynamic code information with the virtual resource, and modifying the use state of the dynamic code information to be used.
In this embodiment, after the server performs the verification on the virtual resource, the usage status of the virtual resource corresponding to the verified virtual resource in the virtual resource list of the holder may be modified from unused to used, so as to prevent the holder of the virtual resource from repeatedly consuming the virtual resource, which results in loss of benefits of the merchant.
And associating the dynamic code information of the virtual resource with the virtual resource, specifically, the server may establish a correspondence table according to the checked virtual resource and the dynamic code information shown when the virtual resource is checked, and store the correspondence table for subsequent checking. And the using state of the dynamic code information is changed into the used state, so that the phenomenon that other people steal the dynamic code information for consumption, repeated consumption of virtual resources is caused, and benefit loss to merchants is prevented.
Based on the technical solution of the above embodiment, a specific application scenario of an embodiment of the present application is introduced as follows:
fig. 12 to 15 are schematic diagrams of terminal interfaces applied to the virtual resource processing method according to the embodiment of the present application (hereinafter, a virtual resource is taken as an electronic card as an example for description).
As shown in fig. 12, a user may query the electronic card held by the user through a user terminal, and the user terminal may query the server and display a list of electronic cards held by the user on an interface, where the list of electronic cards may include electronic cards historically held by the user. And displays general information of each electronic card on an interface, such as 1210, which may include but is not limited to the issuer of the electronic card, the subject of the electronic card, and so on.
As shown in fig. 13, the user can determine the electronic card to be viewed by clicking the position corresponding to the electronic card on the interface. The user side can send a checking request for the electronic card to the server according to the electronic card determined by the user, and the server returns the utility content of the electronic card to the user side according to the received checking request. The user displays a detail page of the electronic card ticket on the interface according to the received utility content of the electronic card ticket, as shown in 1310, the detail page may include a description of the authority and the lifetime of the electronic card ticket for the user to view.
In addition, the detail page does not display the static identification information of the electronic card, such as the card number or the card density of the electronic card, so as to prevent other people from recording the static identification information of the electronic card and stealing the electronic card. Therefore, the security of the electronic card can be improved, and the property security of the user is ensured.
When the customer wants to use the electronic card, he can click on a specific area in the details page of the electronic card, such as the "use immediately" button 1320 in the figure, to generate a request for use of the electronic card and send it to the server.
As shown in fig. 14, when the server receives a request for using the electronic card, the server may generate dynamic code information of the electronic card according to the static identification information of the electronic card included in the request for using, and transmit the dynamic code information to the user side. The user end may display the dynamic code information on an interface (as shown at 1410) for the user to present to the merchant for consumption.
As shown in fig. 15, when the server receives a verification request for the electronic card sent by the merchant, a request for verifying the electronic card may be generated according to the static identification information of the electronic card, and the request for verifying the electronic card is sent to the user side, the user side displays a verification information obtaining interface (shown as 1510 in the figure) on the interface according to the request for verifying the electronic card, and the user may input authentication information on the verification information obtaining interface, so that the server completes verification of the electronic card.
Fig. 16 is a flowchart illustrating a method for processing virtual resources according to an embodiment of the present application.
As shown in fig. 16 (hereinafter, the virtual resource is taken as a gift card as an example for explanation), the user can send a request for viewing the gift card to the server 1620 through the user terminal 1610 to view the gift cards held by the user history.
The server 1620 may include a public gateway interface 1621, a gift card intermediate module 1622, a gift card database 1623, and a dynamic code module 1624. Wherein, the public gateway interface 1621 may be used to connect with applications external to the server to receive and transmit information; the gift card intermediate module 1622 may be used to process information of applications outside the server, such as a view request, a cancel request, etc. for the gift card; gift card database 1623 may be used to store information related to the gift card, such as identification information of the holder of the gift card, usage status of the gift card, and utility content of the gift card, among others; the dynamic code module 1624 may be configured to generate dynamic code information according to the static identification information of the gift card, and store a mapping relationship table between the static identification information and the dynamic code information for subsequent query.
When the public gateway interface 1621 receives a view request sent by the user terminal 1610 for a gift card held by the user, the view request may be sent to the gift card intermediate module 1622, where the view request may include identity information of the user. The gift card intermediate module 1622 obtains the identity information of the user from the received viewing request, and queries the gift card information corresponding to the user in the gift card database 1623 according to the identity information, and outputs a gift card list held by the user from the gift card database 1623. The gift card intermediate module 1622 transmits the list of gift cards held by the user from the public gateway interface 1621 to the user terminal 1610 to display the list of gift cards held by the user in the user terminal 1610.
When the user side 1610 displays a list of gift cards held by the user, the user can select a particular gift card to view the details page for that gift card. The user terminal 1610 may generate a viewing request for the gift card according to the static identification information of the gift card selected by the user and transmit the viewing request to the server 1620. The public gateway interface 1621 transmits the view request for the gift card to the gift card intermediate module 1622, so that the gift card intermediate module 1622 queries the utility content of the gift card from the gift card database 1623 and transmits the queried utility content of the gift card to the user terminal 1610, so that the user terminal 1610 displays the detail page of the gift card on the interface. At this time, the static identification information of the gift card may not be displayed or desensitized in the detail page of the gift card, so as to achieve the purpose of preventing the gift card from being stolen by others, thereby ensuring the property safety of the user.
When the user views the detail page of the finished gift card, if the user wants to use the gift card, the user may click a specific area (for example, an "immediate use" button) in the detail page, and the user terminal 1610 may generate a use request for the gift card according to the static identification information of the gift card and send the use request to the server 1620. The public gateway interface 1621 sends the received request for use of the gift card to the gift card intermediate module 1622. The gift card intermediate module 1622 may request the dynamic code module 1624 to generate corresponding dynamic code information according to the static identification information included in the usage request, and after the validity of the dynamic code information is verified, the dynamic code information is sent to the user terminal 1610 for the user terminal 1610 to display.
Based on the embodiment shown in fig. 16, fig. 17 is a schematic flow chart showing the use of the electronic card in the processing method of the electronic card according to an embodiment of the present application.
Referring to fig. 17, as shown in part a, when a user uses a gift card, the dynamic code information of the gift card can be displayed through the user terminal 1610. The merchant 1630 scans the user 1610 through its configured scanning device to obtain the dynamic code information of the gift card, and invokes the api 1625 and the convergence gateway 1626 according to the obtained dynamic code information to generate a verification request for the gift card.
The application interface 1625 may be an interface through which the merchant terminal 1630 connects to the server, and the merchant terminal 1630 may implement communication with the server through the application interface 1625; the convergence gateway 1626 may be a gateway for performing protocol conversion between different regions to realize information transmission with a different-location merchant, and in other examples, if the merchant terminal 1630 and the server are in the same region, the convergence gateway 1626 does not need to be called.
The gift card intermediate module 1622 performs security verification on the verification request according to the received verification request for the gift card, wherein the security verification may be a verification process for verifying the security of the verification request, so as to prevent situations such as illegal forgery of the verification request by others or sending the verification request by using an illegal application client. In particular, the security verification may include one or more of an interface signature verification, a business parameter verification, and an authorization verification.
After the verification request passes the security verification, the gift card intermediate module 1622 may obtain the dynamic code information included in the verification request, and send the dynamic code information to the dynamic code module 1624, the dynamic code module 1624 queries whether a generation record of the dynamic code information exists according to the dynamic code information, and if so, feeds back the static identification information corresponding to the dynamic code information to the gift card intermediate module 1622.
The gift card intermediate module 1622 queries, according to the static identification information fed back by the dynamic code module 1624, gift card information corresponding to the static identification information, such as identity information of a holder of the gift card, a usage state of the gift card, and the like, from the gift card database 1623. And verifying the gift card by the verification, and if the gift card passes the verification, verifying and selling the gift card according to the dynamic code information. And feeding back the verification and cancellation result to the merchant terminal.
In one embodiment of the present application, as shown in part B of fig. 17, when the gift card is underwritten, the user terminal 1610 may send a query request for the usage result of the gift card to the public gateway interface 1621 in a loop, and the public gateway interface 1621 may feed back the usage result of the gift card to the user terminal 1610, for example, the usage result is not used successfully or has been used successfully. If the feedback message received by the user end 1610 is that the gift card has not been verified or the information fed back by the public gateway interface 1621 has not been received, the user end may continue to send the query request for the gift card usage result to the public gateway interface 1621 at predetermined intervals.
In one embodiment of the present application, as shown in part C of fig. 17, when the gift card is checked and sold, the merchant terminal 1630 may send a checklist request for the checking and selling result of the gift card to the application program interface 1625 according to the dynamic code information in a loop to determine whether the gift card order is generated, i.e., whether the gift card is checked and sold successfully. The api 1625 may feed back the result of the order checking to the merchant 1630, and if the gift card is successfully checked, the merchant may provide the corresponding service, such as delivery or commodity transaction, to the user according to the order. If the order is not generated or no feedback information is received, the merchant terminal 1630 may continue to send the order checking request according to a predetermined interval.
In an embodiment of the present application, as shown in part D of fig. 17, when the server authenticates the gift card, the server may send a request for verifying the gift card to the user terminal 1610, and the user terminal 1610 displays a password obtaining interface on the interface according to the received request for verifying the gift card, so that the user can input the payment password. The user terminal 1610 sends the payment password inputted by the user to the public gateway interface 1621, so that the gift card intermediate module 1622 verifies the payment password and determines whether the payment password is correct. If the gift card is correct, the gift card is verified, the using state of the gift card is correspondingly modified, and the flow information of the gift card is recorded. The gift card intermediate module 1622 feeds back the password verification result to the user terminal 1610, so that the user terminal 1610 displays a password verification success interface or a password verification failure interface.
In one embodiment of the present application, as shown in fig. 17, section E, after the user successfully uses the gift card in an online mall, the gift card middle module 1622 may trigger and generate an asynchronous template message to notify the user of the approval message of the gift card. And also sends an asynchronous callback notification to the merchant terminal 1630 to notify the merchant of the verification result of the gift card, so that the merchant provides services, such as delivery or commodity transaction, to the user according to the callback notification that the gift card verification is successful.
Therefore, consumption is carried out in a mode of generating dynamic code information, static identification information of the electronic card can be prevented from being leaked, the safety of the electronic card is improved, and the property safety of a user is further ensured.
The following describes an embodiment of an apparatus of the present application, which may be used to execute the virtual resource processing method in the foregoing embodiment of the present application. For details that are not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the virtual resource processing method described above in the present application.
FIG. 18 shows a block diagram of a virtual resource processing apparatus according to an embodiment of the present application.
Referring to fig. 18, a virtual resource processing apparatus according to an embodiment of the present application includes:
a request generating module 1810, configured to generate a request for using a virtual resource according to static identification information of the virtual resource;
a sending module 1820, configured to send a request for using virtual resources to a server, so that the server obtains the static identification information from the request for using, and encodes the static identification information to obtain dynamic code information corresponding to the virtual resources;
a first processing module 1830, configured to receive and display the dynamic code information sent by the server;
the second processing module 1840 is configured to obtain verification information of the virtual resource according to the dynamic code information, and verify the virtual resource according to the verification information to complete verification.
Based on the foregoing, in some embodiments of the present application, the first processing module 1830 is configured to: receiving the dynamic code information after encryption processing sent by the server; decrypting the encrypted dynamic code information by adopting a decryption certificate; and if the decryption is successful, displaying the decrypted dynamic code information.
Based on the foregoing, in some embodiments of the present application, the first processing module 1830 is further configured to: determining a virtual resource to be viewed, and acquiring static identification information of the virtual resource; generating a viewing request for the virtual resource according to the static identification information; sending a viewing request for the virtual resource to the server so that the server acquires static identification information of the virtual resource from the viewing request and inquires utility content of the virtual resource according to the static identification information; receiving and displaying the utility content of the virtual resource sent by the server; and determining the effectiveness of the virtual resources according to the utility content, and if the virtual resources are effective, generating a use request of the virtual resources according to the static identification information of the virtual resources.
Based on the foregoing, in some embodiments of the present application, the second processing module 1840 is configured to: if a password verification request for the virtual resource is received, displaying a verification information acquisition interface; and sending the identity verification information acquired by the verification information acquisition interface to the server so that the server verifies the virtual resource according to the identity verification information.
Based on the foregoing solution, in some embodiments of the present application, the virtual resource is an electronic card, and the first processing module 1830 is further configured to: and receiving and displaying confirmation information sent by the server, wherein the confirmation information is generated after the server successfully verifies and sells the electronic card ticket and is used for indicating that the electronic card ticket is successfully used.
Fig. 19 shows a block diagram of a virtual resource processing apparatus according to another embodiment of the present application.
Referring to fig. 19, a virtual resource processing apparatus according to an embodiment of the present application includes:
an obtaining module 1910, configured to obtain, from a received request for using a virtual resource, static identification information of the virtual resource;
a dynamic code information generating module 1920, configured to encode the static identification information to obtain dynamic code information corresponding to the identification information;
a third processing module 1930, configured to associate the dynamic code information with the static identification information, and send the dynamic code information to a terminal, so that the terminal displays the dynamic code information;
the fourth processing module 1940 is configured to obtain verification information of the virtual resource according to the dynamic code information, and verify the virtual resource according to the verification information of the verification.
Based on the foregoing, in some embodiments of the present application, the third processing module 1930 is further configured to: obtaining static identification information of the virtual resource from a received viewing request of the virtual resource; inquiring according to the static identification information to obtain the utility content of the virtual resource; and then the utility content of the virtual resource is sent to a terminal for the terminal to display.
Based on the foregoing solution, in some embodiments of the present application, before obtaining the verification information of the virtual resource according to the dynamic code information, the third processing module 1930 is further configured to: acquiring dynamic code information of the virtual resource from a received cancel request of the virtual resource; inquiring according to the dynamic code information to obtain static identification information of the virtual resource associated with the dynamic code information; and carrying out validity verification on the virtual resources according to the static identification information of the virtual resources.
Based on the foregoing, in some embodiments of the present application, the third processing module 1930 is configured to: acquiring the identity information of the holder of the virtual resource according to the static identification information of the virtual resource; inquiring according to the identity information of the holder to obtain a virtual resource list held by the holder; and if the virtual resource exists in the virtual resource list and the using state of the virtual resource is the unused state, determining that the virtual resource passes the validity verification.
Based on the foregoing, in some embodiments of the present application, the fourth processing module 1940 is configured to: generating an encryption verification request for the virtual resources according to the static identification information of the virtual resources, and sending the encryption verification request to a terminal so that the terminal displays a verification information acquisition interface; receiving and verifying the identity verification information acquired by the verification information acquisition interface sent by the terminal; and if the identity authentication information passes the authentication, verifying and canceling the virtual resource.
Based on the foregoing, in some embodiments of the present application, the fourth processing module 1940 is configured to: acquiring the identity information of the holder of the virtual resource according to the static identification information of the virtual resource; inquiring according to the identity information of the holder to obtain a verification and cancellation record of the holder; and based on the cancel record, canceling the virtual resource if the number of cancel records of the virtual resource of the same category as the virtual resource in a preset time length is less than a preset threshold value.
Based on the foregoing, in some embodiments of the present application, after the virtual resource is de-committed, the fourth processing module 1940 is further configured to: and modifying the use state of the virtual resource to be used, associating the dynamic code information with the virtual resource, and modifying the use state of the dynamic code information to be used.
FIG. 20 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
It should be noted that the computer system of the electronic device shown in fig. 20 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 20, the computer system includes a Central Processing Unit (CPU)2001, which can perform various appropriate actions and processes, such as performing the method described in the above-described embodiment, according to a program stored in a Read-Only Memory (ROM) 2002 or a program loaded from a storage section 2008 into a Random Access Memory (RAM) 2003. In the RAM 2003, various programs and data necessary for system operation are also stored. The CPU 2001, ROM 2002, and RAM 2003 are connected to each other via a bus 2004. An Input/Output (I/O) interface 2005 is also connected to bus 2004.
The following components are connected to the I/O interface 2005: an input portion 2006 including a keyboard, a mouse, and the like; an output section 2007 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 2008 including a hard disk and the like; and a communication section 2009 including a network interface card such as a LAN (Local area network) card, a modem, or the like. The communication section 2009 performs communication processing via a network such as the internet. Drive 2010 is also connected to I/O interface 2005 as needed. A removable medium 2011 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 2010 as necessary, so that a computer program read out therefrom is mounted in the storage section 2008 as necessary.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 2009, and/or installed from the removable medium 2011. When the computer program is executed by the Central Processing Unit (CPU)2001, various functions defined in the system of the present application are executed.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with a computer program embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present application.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (15)

1. A virtual resource processing method is characterized by comprising the following steps:
generating a use request for the virtual resource according to the static identification information of the virtual resource;
sending the use request of the virtual resource to a server so that the server acquires the static identification information from the use request, and coding the static identification information to obtain dynamic code information corresponding to the virtual resource;
receiving and displaying the dynamic code information sent by the server;
and acquiring verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to finish verification and cancellation.
2. The method of claim 1, wherein receiving and displaying the dynamic code information sent by the server comprises:
receiving the dynamic code information after encryption processing sent by the server;
decrypting the encrypted dynamic code information by adopting a decryption certificate;
and if the decryption is successful, displaying the decrypted dynamic code information.
3. The method of claim 1, wherein generating the request for use of the virtual resource based on static identification information of the virtual resource comprises:
determining a virtual resource to be viewed, and acquiring static identification information of the virtual resource;
generating a viewing request for the virtual resource according to the static identification information;
sending a viewing request for the virtual resource to the server so that the server acquires static identification information of the virtual resource from the viewing request and inquires utility content of the virtual resource according to the static identification information;
receiving and displaying the utility content of the virtual resource sent by the server;
and determining the effectiveness of the virtual resources according to the utility content, and if the virtual resources are effective, generating a use request of the virtual resources according to the static identification information of the virtual resources.
4. The method of claim 1, wherein obtaining verification information for verification of the virtual resource comprises:
if a password verification request for the virtual resource is received, displaying a verification information acquisition interface;
and sending the identity verification information acquired by the verification information acquisition interface to the server so that the server verifies the virtual resource according to the identity verification information.
5. The method of claim 1, wherein the virtual resource is an electronic card ticket, the method further comprising:
and receiving and displaying confirmation information sent by the server, wherein the confirmation information is generated after the server successfully verifies and sells the electronic card ticket and is used for indicating that the electronic card ticket is successfully used.
6. A virtual resource processing method is characterized by comprising the following steps:
acquiring static identification information of the virtual resource from a received use request of the virtual resource;
coding the static identification information to obtain dynamic code information corresponding to the static identification information;
associating the dynamic code information with the static identification information, and sending the dynamic code information to a terminal for the terminal to display;
and acquiring verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to complete verification and cancellation.
7. The method of claim 6, further comprising:
obtaining static identification information of the virtual resource from a received viewing request of the virtual resource;
inquiring according to the static identification information to obtain the utility content of the virtual resource;
and sending the utility content of the virtual resource to a terminal for displaying by the terminal.
8. The method of claim 6, wherein before obtaining the verification information of the virtual resource based on the dynamic code information, the method further comprises:
acquiring dynamic code information of the virtual resource from a received cancel request of the virtual resource;
inquiring according to the dynamic code information to obtain static identification information of the virtual resource associated with the dynamic code information;
and carrying out validity verification on the virtual resources according to the static identification information of the virtual resources.
9. The method of claim 8, wherein performing validity verification on the virtual resource according to the static identification information of the virtual resource comprises:
acquiring the identity information of the holder of the virtual resource according to the static identification information of the virtual resource;
inquiring according to the identity information of the holder to obtain a virtual resource list held by the holder;
and if the virtual resource exists in the virtual resource list and the using state of the virtual resource is the unused state, determining that the virtual resource passes the validity verification.
10. The method of claim 6, wherein obtaining verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to complete verification, comprises:
generating an encryption verification request for the virtual resources according to the static identification information of the virtual resources, and sending the encryption verification request to a terminal so that the terminal displays a verification information acquisition interface;
receiving and verifying the identity verification information acquired by the verification information acquisition interface sent by the terminal;
and if the identity authentication information passes the authentication, verifying and canceling the virtual resource.
11. The method of claim 10, wherein the verifying the virtual resource comprises:
acquiring the identity information of the holder of the virtual resource according to the static identification information of the virtual resource;
inquiring according to the identity information of the holder to obtain a verification and cancellation record of the holder;
and based on the cancel record, canceling the virtual resource if the number of cancel records of the virtual resource of the same category as the virtual resource in a preset time length is less than a preset threshold value.
12. The method of claim 10, wherein after the virtual resource is committed, the method further comprises:
and modifying the use state of the virtual resource to be used, associating the dynamic code information with the virtual resource, and modifying the use state of the dynamic code information to be used.
13. A virtual resource processing apparatus, comprising:
the request generation module is used for generating a use request of the virtual resource according to the static identification information of the virtual resource;
the sending module is used for sending a use request of the virtual resource to a server so that the server can obtain the static identification information from the use request and encode the static identification information to obtain dynamic code information corresponding to the virtual resource;
the first processing module is used for receiving and displaying the dynamic code information sent by the server;
and the second processing module is used for acquiring the verification information of the virtual resource according to the dynamic code information, and verifying the virtual resource according to the verification information to complete verification and cancellation.
14. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the virtual resource handling method according to any one of claims 1-5, 6-12.
15. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the virtual resource processing method of any of claims 1-5, 6-12.
CN202010469564.5A 2020-05-28 2020-05-28 Virtual resource processing method and device, computer readable medium and electronic equipment Pending CN111709752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010469564.5A CN111709752A (en) 2020-05-28 2020-05-28 Virtual resource processing method and device, computer readable medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010469564.5A CN111709752A (en) 2020-05-28 2020-05-28 Virtual resource processing method and device, computer readable medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN111709752A true CN111709752A (en) 2020-09-25

Family

ID=72537049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010469564.5A Pending CN111709752A (en) 2020-05-28 2020-05-28 Virtual resource processing method and device, computer readable medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN111709752A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380547A (en) * 2020-11-10 2021-02-19 零氪科技(天津)有限公司 Electronic prescription credit granting method, device and system
CN113222685A (en) * 2021-04-07 2021-08-06 上海多维度网络科技股份有限公司 Order form verification and cancellation method, device, equipment and storage medium
CN113627930A (en) * 2021-07-08 2021-11-09 支付宝(杭州)信息技术有限公司 Electronic ticket verification method and device, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380547A (en) * 2020-11-10 2021-02-19 零氪科技(天津)有限公司 Electronic prescription credit granting method, device and system
CN113222685A (en) * 2021-04-07 2021-08-06 上海多维度网络科技股份有限公司 Order form verification and cancellation method, device, equipment and storage medium
CN113222685B (en) * 2021-04-07 2024-02-20 上海多维度网络科技股份有限公司 Order verification method, device, equipment and storage medium
CN113627930A (en) * 2021-07-08 2021-11-09 支付宝(杭州)信息技术有限公司 Electronic ticket verification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US10049360B2 (en) Secure communication of payment information to merchants using a verification token
US8843415B2 (en) Secure software service systems and methods
CN101373528B (en) Electronic payment system, device and method based on position authentication
US7003497B2 (en) System and method for confirming electronic transactions
KR20080108549A (en) Secure network commercial transactions
KR20090006831A (en) Authentication for a commercial transaction using a mobile module
TWI591553B (en) Systems and methods for mobile devices to trade financial documents
CN111709752A (en) Virtual resource processing method and device, computer readable medium and electronic equipment
CN110472426B (en) Method for scanning, encrypting and decrypting bid document instead of real object U shield
CN102457509A (en) Safe access method, device and system of cloud computing resource
CN115760082B (en) Digital payment processing method, device, equipment, system and medium
AU2010292125A1 (en) Secure communication of payment information to merchants using a verification token
CN111243145B (en) Method, device, medium and electronic equipment for processing visitor information
WO2023021572A1 (en) Data processing system, data processing method, and data processing device
CA2947281C (en) Method and system for authentication token generation
WO2020091841A1 (en) Account assertion
JP6501813B2 (en) INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
KR101691169B1 (en) Method for distributing encrypt key, card reader, authentification server and system for distributing encrypt key thereof
EP4250210A1 (en) Devices, methods and a system for secure electronic payment transactions
EP4250208B1 (en) Devices, methods and a system for secure electronic payment transactions
EP4250209B1 (en) Devices, methods and a system for secure electronic payment transactions
EP4250207B1 (en) Devices, methods and a system for secure electronic payment transactions
CN111179099B (en) Method, device, medium and electronic equipment for acquiring insurance contract
KR20100136019A (en) System and method for processing settlement, server and recording medium
CN112737790A (en) Data transmission method and device, server and client terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40028548

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination