CN116668158A - Interactive identifier generation method, interactive device and computer equipment - Google Patents

Interactive identifier generation method, interactive device and computer equipment Download PDF

Info

Publication number
CN116668158A
CN116668158A CN202310744895.9A CN202310744895A CN116668158A CN 116668158 A CN116668158 A CN 116668158A CN 202310744895 A CN202310744895 A CN 202310744895A CN 116668158 A CN116668158 A CN 116668158A
Authority
CN
China
Prior art keywords
interaction
identifier
interactive
tag
theft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310744895.9A
Other languages
Chinese (zh)
Inventor
钟胤峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202310744895.9A priority Critical patent/CN116668158A/en
Publication of CN116668158A publication Critical patent/CN116668158A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The application relates to the technical field of communication processing, in particular to an interactive identifier generating method, an interactive device, computer equipment, a storage medium and a computer program product. The interactive identification generation method comprises the following steps: receiving an interaction instruction; generating an anti-theft identification of the target object according to the interaction instruction; when tag information aiming at a target object is received, the tag information is compared with the anti-theft mark; when the comparison result shows that the tag information corresponds to the anti-theft tag, an interaction tag is generated according to the tag information, and through the setting, other terminals cannot directly obtain interaction authorization provided by an interaction response party, so that the interaction tag is prevented from being acquired by other terminals except the interaction initiator.

Description

Interactive identifier generation method, interactive device and computer equipment
Technical Field
The present application relates to the field of communications processing technologies, and in particular, to an interaction identifier generating method, an interaction device, a computer device, a storage medium, and a computer program product.
Background
Generally, when an interaction initiator and an interaction responder need to interact, the interaction responder will first generate authorization information, so that the interaction initiator can directly interact with the interaction initiator after acquiring the authorization information.
However, because the interaction between the interaction initiator and the interaction responder generally realizes information transmission by means of scanning the plane graph displayed by the interaction responder by the interaction initiator, in the process, other equipment may scan and shoot the plane graph displayed by the interaction responder, so that information leakage of the interaction responder is caused, and great potential safety hazards are caused.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an interactive identifier generating method, an interactive method, an apparatus, a computer device, a storage medium, and a computer program product that can ensure the security of an interactive process.
In a first aspect, the present application provides a method for generating an interaction identifier, including:
receiving an interaction instruction;
generating an anti-theft identification of the target object according to the interaction instruction;
when tag information aiming at the target object is received, comparing the tag information with the anti-theft identifier;
and when the comparison result shows that the tag information corresponds to the anti-theft identifier, generating an interaction identifier according to the tag information.
In one embodiment, the anti-theft identifier carries a first identity tag of the target object and a first resource storage address tag corresponding to the target object;
the label information carries a second identity label and a second resource storage address label;
the comparing the tag information with the anti-theft identifier comprises:
and comparing the first identity tag with the second identity tag, and comparing the first resource storage address tag with the second resource storage address tag.
In one embodiment, after the comparing the tag information with the anti-theft identifier, the method further includes:
when the identity tag is matched with the target identity tag and the resource storage address tag is matched with the target resource storage address tag, the tag information is considered to correspond to the anti-theft identifier; otherwise, the tag information is not considered to correspond to the anti-theft identification.
In one embodiment, after the tag information is considered not to correspond to the anti-theft identifier, the method further includes:
and when the comparison result shows that the tag information does not correspond to the anti-theft identifier, an alarm is sent to prompt that the generation of the interaction identifier fails.
In one embodiment, the method further comprises:
starting timing when tag information for the target object is received;
and deleting the interaction identifier when the timing reaches the preset duration.
In a second aspect, the present application further provides an interaction method, including:
acquiring an interaction identifier; the interactive identification is generated by adopting the interactive identification generation method in any embodiment;
and subtracting a preset value from a resource storage area corresponding to the resource storage address label according to the resource storage address label carried by the interactive label.
In a third aspect, the present application further provides an interaction identifier generating device, including:
the receiving module is used for receiving the interaction instruction;
the first generation module is used for generating an anti-theft identifier of the target object according to the interaction instruction;
the comparison module is used for comparing the tag information with the anti-theft identifier when receiving the tag information aiming at the target object;
and the second generation module is used for generating an interaction identifier according to the tag information when the comparison result shows that the tag information corresponds to the anti-theft identifier.
In a fourth aspect, the present application further provides an interaction device, including:
the acquisition module is used for acquiring the interaction identification; the interactive identification is generated by the interactive identification generating device according to any embodiment;
and the processing module is used for subtracting a preset value from a resource storage area corresponding to the resource storage address label according to the resource storage address label carried by the interactive identifier.
In a fifth aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor executes the computer program to implement the interactive identifier generating method or the interactive method according to any one of the above embodiments.
In a sixth aspect, the present application also provides a computer readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the interactive identifier generating method or the interactive method described in any of the above embodiments.
In a seventh aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the interactive identifier generating method or the interactive method according to any of the above embodiments.
The interactive identifier generating method, the interactive method, the device, the computer equipment, the storage medium and the computer program product can firstly generate the antitheft identifier without the interactive authorization function, and at the moment, even if other terminals acquire the information carried by the antitheft identifier in a scanning and shooting mode, the interactive authorization provided by the interactive response party cannot be directly obtained; by limiting the validity period of the interaction identifier, the interaction identifier is effectively prevented from being acquired by other terminals except the interaction initiator in a scanning and shooting mode.
Drawings
FIG. 1 is an application environment diagram of an interactive identification generation method in one embodiment;
FIG. 2 is a flow diagram of a method of interactive identification generation in one embodiment;
FIG. 3 is a flow diagram of a method of interactive identification generation in one embodiment;
FIG. 4 is a flow diagram of a method of interactive identification generation in one embodiment;
FIG. 5 is a flow diagram of a method of interactive identification generation in one embodiment;
FIG. 6 is a flow diagram of an interaction method in one embodiment;
FIG. 7 is a block diagram of an interactive identification generation device in one embodiment;
FIG. 8 is a block diagram of an interactive identification generation device in one embodiment;
FIG. 9 is a block diagram of an interaction device in one embodiment;
fig. 10 is an internal structural view of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The interactive identifier generating method provided by the embodiment of the application can be applied to an application environment shown in figure 1. Wherein the terminal 102 communicates with the server 104 via a network.
For example, the interactive identifier generating method is applied to the terminal 102, and when the terminal 102 receives an interactive instruction sent by a user from the human-computer interaction interface, the terminal 102 can generate an anti-theft identifier of a target object according to the interactive instruction; then, when receiving the tag information for the target object forwarded by the server 104, the terminal 102 compares the tag information with the anti-theft identifier, and when the comparison result indicates that the tag information corresponds to the anti-theft identifier, generates an interaction identifier according to the tag information. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, among others. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers. The terminal 102 and the server 104 may be connected directly or indirectly through wired or wireless communication means, for example, through a network connection.
For another example, the interactive identifier generating method is applied to the server 104, when the terminal 102 receives an interactive instruction sent by a user from the man-machine interactive interface, the terminal 102 can send the interactive instruction to the server 104, and after the server 104 generates the anti-theft identifier of the target object, the anti-theft identifier is stored in the data storage system and is simultaneously sent to the terminal 102 for display; then, when receiving the tag information for the target object, the server 104 compares the tag information with the anti-theft identifier, generates an interaction identifier according to the tag information when the comparison result indicates that the tag information corresponds to the anti-theft identifier, and sends the interaction identifier to the terminal 102 for display. It will be appreciated that the data storage system may be a stand-alone storage device, or the data storage system may be located on a server, or the data storage system may be located on another terminal.
In one embodiment, an interactive identifier generating method is provided, and the embodiment uses the interactive identifier generating method to be applied to a terminal for example. As shown in fig. 2, the interactive identification generating method includes:
step 202, receiving an interaction instruction.
The interaction instruction may be an instruction for indicating that the interaction responder corresponds to the terminal to perform interaction authorization for the interaction initiator when the interaction initiator performs interaction with the interaction responder.
As an example, the interaction instruction may be issued by the user through a man-machine interaction interface of the terminal, or, the interaction initiator and the interaction responder may be respectively installed with a near field communication device; when the interval distance between the interaction initiator and the interaction responder is smaller than the handshake threshold distance, the interaction initiator and the near field communication device of the interaction responder handshake successfully, and at the moment, the corresponding terminal of the interaction responder can automatically trigger to generate an interaction instruction after the handshake is successful.
And 204, generating the anti-theft identification of the target object according to the interaction instruction.
The target object may refer to identity information which is formed by a user registering in advance in a specific resource storage platform and can be used for uniquely identifying the identity of the user. In this embodiment, the target object may be understood to be equivalent to an interactive responder.
As an example, the user may select a corresponding resource storage platform through the man-machine interaction interface of the terminal to send an interaction instruction, in this case, the interaction instruction received by the terminal may carry a platform tag of the resource storage platform selected by the user, where the platform tag may be at least one of letters, characters or numbers, so as to uniquely identify the resource storage platform.
Or, the user can preset the interaction priority of different resource storage platforms through the man-machine interaction interface of the terminal, and when the interval distance between the interaction initiator and the interaction responder is smaller than the handshake threshold distance, the terminal corresponding to the interaction responder can automatically trigger to generate the interaction instruction carrying the platform label corresponding to the resource storage platform with the highest interaction priority after the near-field communication device of the interaction initiator and the interaction responder is successfully handshake.
The anti-theft mark can be a graph which is distributed on a plane according to a certain rule by using a certain specific geometric figure, is black-white and records data symbol information; the anti-theft identification may use a number of geometric shapes corresponding to binary numbers to represent alphanumeric information.
As an example, when the anti-theft identifier is generated, the terminal corresponding to the interaction responder may mark the anti-theft identifier with the identity information for identifying the interaction responder, and accordingly, the anti-theft identifier may, for example, carry the identity information of the interaction responder and the platform tag corresponding to the interaction responder.
In this embodiment, after receiving the interaction instruction, the terminal corresponding to the interaction responder may first generate the anti-theft identifier corresponding to the interaction responder. As an example, the anti-theft identification may carry the identity information of the target object, i.e. the anti-theft identification carries the anti-theft identification of the interactive respondent.
In order to ensure the safety of interaction, other terminals are prevented from acquiring interaction authorization information provided by an interaction responder for an interaction initiator in the embodiment in a shooting and scanning mode, and the terminal corresponding to the interaction responder in the embodiment can generate an anti-theft identifier without the interaction authorization function in advance.
And 206, when the tag information aiming at the target object is received, comparing the tag information with the anti-theft mark.
The tag information refers to an interaction tag which is sent by a resource storage platform and is aimed at a target object and corresponds to the interaction instruction, the tag information can be at least one of letters, characters or numbers, and the tag information can be understood to be interaction authorization information which is sent by the resource storage platform and is aimed at the resource stored by the target object.
As an example, the interaction initiator may obtain the identity information of the interaction responder and the platform tag corresponding to the interaction responder carried by the interaction initiator by scanning the anti-theft identifier, and match the address information of the resource storage platform corresponding to the current platform tag from the pre-stored mapping relationship of the platform tag and the address information according to the platform tag corresponding to the interaction responder, and then generate a tag information request instruction to send the tag information request instruction to the address corresponding to the address information.
When the terminal receives the tag information, the tag information can be compared with the anti-theft identifier to confirm that the tag information is generated by the resource interaction platform after the anti-theft identifier of the target object is generated by the terminal corresponding to the interaction response party, and the information is used for carrying out interaction authorization for the interaction initiator.
And step 208, when the comparison result shows that the tag information corresponds to the anti-theft identifier, generating an interaction identifier according to the tag information.
The interactive mark can also be a graph which is distributed on a plane according to a certain rule by a certain specific geometric figure, is black-white and records data symbol information; the interactive identity may also represent alphanumeric information using a number of geometric shapes corresponding to binary numbers.
The interactive identifier carries tag information, namely information which is generated by the resource interactive platform and is used for carrying out interactive authorization on the interactive initiator, and the interactive responder provides interactive authorization for the interactive initiator in a mode of generating the interactive identifier.
When the comparison result shows that the tag information corresponds to the anti-theft identifier, the terminal corresponding to the interaction response party can confirm that the tag information is information which is regenerated by the resource storage platform and is used for carrying out interaction authorization on the target object after the terminal generates the anti-theft identifier of the target object, and through the comparison setting, each interaction carried out by the interaction response party can be ensured to be carried out according to the sequence of generating the anti-theft identifier at the terminal and then continuing the actual interaction.
According to the method for generating the interactive identification, after the corresponding terminal of the interactive response party can receive the interactive instruction, the anti-theft identification without the interactive authorization function is generated at first, at this time, even if other terminals acquire information carried by the anti-theft identification in a scanning and shooting mode, the interactive authorization provided by the interactive response party cannot be obtained directly, after the interactive initiator acquires the information carried by the anti-theft identification, the corresponding resource storage platform of the interactive response party can acquire tag information, so that the interactive response party can generate the interactive identification according to the tag information newly sent by the resource storage platform, and the interactive initiator can acquire the interactive authorization of the interactive response party.
As shown in fig. 3, in some alternative embodiments, the anti-theft identifier carries a first identity tag of the target object and a first resource storage address tag corresponding to the target object;
the label information carries a second identity label and a second resource storage address label;
step 206 comprises: step 206a, comparing the first identity tag with the second identity tag, and comparing the first resource storage address tag with the second resource storage address tag.
The first identity tag refers to identity information of the interaction responder, and the first resource storage address tag refers to address information of a resource storage platform corresponding to the interaction responder.
The second identity tag refers to the identity information of the interaction response party corresponding to the tag information acquired by the interaction response party; the second resource storage address tag refers to address information of a resource storage platform sending out tag information, and is used for identifying a source of the tag information acquired by the interaction responding party.
In this embodiment, the terminal corresponding to the interaction responder compares the identity information of the interaction responder with the identity information of the interaction responder corresponding to the tag information acquired by the interaction responder, and compares the address information of the resource storage platform corresponding to the interaction responder with the address information of the resource storage platform sending the tag information, so as to determine that the tag information is the interaction authorization information sent from the resource storage platform corresponding to the interaction responder and issued for the interaction responder.
In some alternative embodiments, further comprising:
when the identity tag is matched with the target identity tag and the resource storage address tag is matched with the target resource storage address tag, the tag information is considered to correspond to the anti-theft identifier; otherwise, the tag information is not considered to correspond to the anti-theft identification.
After comparing the tag information with the anti-theft identifier, if the identity information of the interaction responder is not consistent with the identity information of the interaction responder corresponding to the tag information acquired by the interaction responder, the terminal of the interaction responder can be considered to receive the tag information which is not specific to the target object; if the address information of the resource storage platform corresponding to the interactive response party is not consistent with the address information of the resource storage platform sending the tag information, the tag information of the resource interaction platform corresponding to the target object received by the terminal of the current interactive response party can be considered, and the two conditions indicate that the current target object does not successfully obtain the interaction authorization permission of the corresponding resource interaction platform, so that the interaction identifier with the interaction authorization function cannot be generated.
In some alternative embodiments, after the tag information is considered not to correspond to the anti-theft identification, the method further comprises:
and when the comparison result shows that the tag information does not correspond to the anti-theft identifier, an alarm is sent to prompt that the generation of the interactive identifier fails.
In this embodiment, when the identity information of the interaction responder does not conform to the identity information of the interaction responder corresponding to the tag information acquired by the interaction responder, or the address information of the resource storage platform corresponding to the interaction responder does not conform to the address information of the resource storage platform sending the tag information, the terminal of the interaction responder can send an alarm and prompt specific comparison content, so that the user can perform subsequent corresponding operations according to the prompt.
As shown in fig. 4, in some alternative embodiments, the interactive identifier generating method further includes:
step 402, starting timing when label information for a target object is received;
and step 404, deleting the interaction identifier when the timing reaches the preset duration.
In order to prevent the terminals of the interaction respondent from acquiring interaction authorization by other terminals except the interaction initiator through scanning and shooting after generating the interaction identifier, the terminals of the interaction respondent in the embodiment can time after receiving the tag information, and the service time of the interaction identifier is limited through setting a preset duration.
Or, in this embodiment, the terminal of the interaction responder may start timing after generating the interaction identifier, and delete the interaction identifier after the timing reaches another preset duration.
As shown in fig. 5, in some alternative embodiments, after step 404, further comprising:
step 406, obtaining interaction result information;
step 408, when the interaction result information indicates that the interaction fails or the interaction does not proceed, generating a new interaction identifier again according to the received tag information.
The interaction result information is used for representing the interaction action execution result of the interaction response party and the interaction initiator.
When the resource value stored by the interaction response party in the corresponding resource storage platform does not reach the resource value which is required to be subtracted by the interaction action executed by the interaction initiation party, the interaction response party fails to initiate Fang Jiaohu interaction, and the interaction result information is that interaction is not performed; or when the interaction initiator cannot acquire the information carried by the interaction identifier because the user moves the terminal of the interaction responder, the interaction between the interaction responder and the interaction initiator cannot be performed, and the interaction result information is that the interaction is not performed.
In some optional embodiments, the interactive identification generating method further includes:
counting the number of times of generating new interaction identification;
when the count reaches a preset number of times threshold, an alarm is sent out to prompt interaction failure.
In this embodiment, if the user moves the terminal of the interaction responder, so that the interaction initiator cannot acquire the information carried by the interaction identifier, the terminal of the interaction responder may automatically generate a new interaction identifier without acquiring new tag information from the resource storage platform again, and if the number of times of generating the new interaction identifier is excessive, the user may be considered to have no interaction will, and at this time, the terminal of the interaction responder may issue an alarm to prompt the user that the interaction fails.
According to the method for generating the interactive identification, after the corresponding terminal of the interactive response party can receive the interactive instruction, the anti-theft identification without the interactive authorization function is generated at first, at the moment, even if other terminals acquire information carried by the anti-theft identification in a scanning and shooting mode, the interactive authorization provided by the interactive response party cannot be obtained directly, the interactive response party effectively prevents the interactive identification from being acquired by other terminals except the interactive initiator in a scanning and shooting mode by limiting the effective period of the interactive identification, meanwhile, the interactive identification can be automatically and repeatedly generated according to the received label information on the premise that the interactive action does not occur, so that the time consumed for acquiring the label information again is saved, interactive resources are saved, and the interactive efficiency is higher.
Based on the same inventive concept, as shown in fig. 6, the embodiment of the application further provides an interaction method, which includes:
step 602, obtaining an interaction identifier; the interactive identification is generated by adopting the interactive identification generation method of any embodiment;
step 604, subtracting a preset value from a resource storage area corresponding to the resource storage address label according to the resource storage address label carried by the interaction identifier.
The resource storage address tag is used for identifying resource storage address information corresponding to the interactive response party.
The interaction initiator can scan the interaction identifier displayed by the corresponding terminal of the interaction response end through the corresponding terminal to acquire the interaction authorization of the resource storage platform corresponding to the interaction response end, and further, after the interaction initiator acquires the interaction authorization, the interaction initiator sends an interaction request to the resource storage platform corresponding to the interaction response end, wherein the interaction request carries information of a preset value and resource storage address information corresponding to the interaction response end, and after the resource storage platform corresponding to the interaction response end receives the interaction request, the preset value is subtracted from a resource storage area corresponding to the resource storage address label to complete interaction.
As an example, after subtracting the preset value, the resource storage platform may send a confirmation message to the resource responder to prompt the user to complete the interaction.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides an interactive identifier generating device for realizing the interactive identifier generating method and an interactive device for realizing the interactive method. The implementation scheme of the solution to the problem provided by the device is similar to the implementation scheme recorded in the method, so the specific limitation in the embodiments of the one or more interactive identifier generating devices and the interactive devices provided below can be referred to the above limitation of the interactive identifier generating method and the interactive method, which are not repeated herein.
In one embodiment, as shown in fig. 7, an interaction identifier generating device 700 is provided: a receiving module 702, a first generating module 704, a comparing module 706, and a second generating module 708, wherein:
the receiving module 702 is configured to receive an interaction instruction;
the first generation module 704 is configured to generate an anti-theft identifier of the target object according to the interaction instruction;
the comparison module 706 is configured to compare the tag information with the anti-theft identifier when tag information for the target object is received;
the second generation module 708 is configured to generate an interaction identifier according to the tag information when the comparison result indicates that the tag information corresponds to the anti-theft identifier.
In some optional embodiments, the anti-theft identifier carries a first identity tag of the target object and a first resource storage address tag corresponding to the target object;
the label information carries a second identity label and a second resource storage address label;
the comparison module 706 is further configured to:
and comparing the first identity label with the second identity label, and comparing the first resource storage address label with the second resource storage address label.
In some alternative embodiments, the comparison module 706 is further configured to:
when the identity tag is matched with the target identity tag and the resource storage address tag is matched with the target resource storage address tag, the tag information is considered to correspond to the anti-theft identifier; otherwise, the tag information is not considered to correspond to the anti-theft identification.
In some alternative embodiments, the comparison module 706 is further configured to:
and when the comparison result shows that the tag information does not correspond to the anti-theft identifier, an alarm is sent to prompt that the generation of the interactive identifier fails.
As shown in fig. 8, in some alternative embodiments, the interactive identification generating apparatus 700 further includes:
a timing module 710, configured to start timing when tag information for a target object is received;
and the deleting module 712 is configured to delete the interaction identifier when the timing reaches the preset duration.
In one embodiment, as shown in fig. 9, there is provided an interaction device 900 comprising:
an obtaining module 902, configured to obtain an interaction identifier; the interactive identification is generated by the interactive identification generating device according to claim 7;
and the processing module 904 is configured to subtract a preset value from a resource storage area corresponding to the resource storage address tag according to the resource storage address tag carried by the interaction identifier.
The various modules in the memory data access device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and an internal structure diagram thereof may be as shown in fig. 10. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements an interactive identification generation method, an interactive method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 10 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the steps of the interaction identification generation method, interaction method described above.
In one embodiment, a computer program product is provided, comprising a computer program, which when executed by a processor, implements the steps of the interactive identification generation method, the interactive method described above.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (11)

1. An interactive identification generation method is characterized by comprising the following steps:
receiving an interaction instruction;
generating an anti-theft identification of the target object according to the interaction instruction;
when tag information aiming at the target object is received, comparing the tag information with the anti-theft identifier;
and when the comparison result shows that the tag information corresponds to the anti-theft identifier, generating an interaction identifier according to the tag information.
2. The method of claim 1, wherein the anti-theft identifier carries a first identity tag of the target object and a first resource storage address tag corresponding to the target object;
the label information carries a second identity label and a second resource storage address label;
the comparing the tag information with the anti-theft identifier comprises:
and comparing the first identity tag with the second identity tag, and comparing the first resource storage address tag with the second resource storage address tag.
3. The method of claim 2, wherein after comparing the tag information with the anti-theft identification, further comprising:
when the identity tag is matched with the target identity tag and the resource storage address tag is matched with the target resource storage address tag, the tag information is considered to correspond to the anti-theft identifier; otherwise, the tag information is not considered to correspond to the anti-theft identification.
4. The method of claim 3, wherein after said recognizing that said tag information does not correspond to said anti-theft identification, further comprising:
and when the comparison result shows that the tag information does not correspond to the anti-theft identifier, an alarm is sent to prompt that the generation of the interaction identifier fails.
5. The method according to claim 1, wherein the method further comprises:
starting timing when tag information for the target object is received;
and deleting the interaction identifier when the timing reaches the preset duration.
6. An interaction method, comprising:
acquiring an interaction identifier; the interactive identification is generated by adopting the interactive identification generation method according to any one of claims 1-5;
and subtracting a preset value from a resource storage area corresponding to the resource storage address label according to the resource storage address label carried by the interactive label.
7. An interactive identification generating apparatus, comprising:
the receiving module is used for receiving the interaction instruction;
the first generation module is used for generating an anti-theft identifier of the target object according to the interaction instruction;
the comparison module is used for comparing the tag information with the anti-theft identifier when receiving the tag information aiming at the target object;
and the second generation module is used for generating an interaction identifier according to the tag information when the comparison result shows that the tag information corresponds to the anti-theft identifier.
8. An interactive apparatus, comprising:
the acquisition module is used for acquiring the interaction identification; the interactive identification is generated by the interactive identification generating device according to claim 7;
and the processing module is used for subtracting a preset value from a resource storage area corresponding to the resource storage address label according to the resource storage address label carried by the interactive identifier.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the interaction identification generation method of any one of claims 1 to 5 or the interaction method of claim 6.
10. A computer readable storage medium having stored thereon a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the interaction identification generation method of any of claims 1 to 5 or the interaction method of claim 6.
11. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the interactive identification generation method of any one of claims 1 to 5 or the interactive method of claim 6.
CN202310744895.9A 2023-06-21 2023-06-21 Interactive identifier generation method, interactive device and computer equipment Pending CN116668158A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310744895.9A CN116668158A (en) 2023-06-21 2023-06-21 Interactive identifier generation method, interactive device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310744895.9A CN116668158A (en) 2023-06-21 2023-06-21 Interactive identifier generation method, interactive device and computer equipment

Publications (1)

Publication Number Publication Date
CN116668158A true CN116668158A (en) 2023-08-29

Family

ID=87715163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310744895.9A Pending CN116668158A (en) 2023-06-21 2023-06-21 Interactive identifier generation method, interactive device and computer equipment

Country Status (1)

Country Link
CN (1) CN116668158A (en)

Similar Documents

Publication Publication Date Title
US10417620B2 (en) User attribute value transfer method and terminal
EP3419251B1 (en) User position verification method, controlled device access method, controlled device and user terminal
CN112153582B (en) Verification code short message display method and device
TWI694380B (en) Method and device for realizing dynamic graphic coding
CN109525949A (en) Register method and device, storage medium, server, user terminal
CN116668158A (en) Interactive identifier generation method, interactive device and computer equipment
CN113873450B (en) Short message configuration method, device, computer equipment and storage medium
CN116233847A (en) Login method, login device, computer equipment and storage medium
WO2017129068A1 (en) Event execution method and device and system therefor
CN111124932B (en) Scheme verification method, system, device, computer equipment and storage medium
CN114745178A (en) Identity authentication method, identity authentication device, computer equipment, storage medium and program product
CN117544371A (en) Login state processing method and device and computer equipment
CN117034244A (en) Account security authentication method, account security authentication device, computer equipment and storage medium
CN117151717A (en) Device password modification method, device, computer device and storage medium
CN117608405A (en) Resource transfer method, device, equipment and storage medium based on meta universe
CN116700977A (en) Resource transfer method and device and computer equipment
CN117424721A (en) Front-end application security protection method and device, computer equipment and storage medium
CN116915434A (en) Verification code asynchronous acquisition method and device based on RxJS and computer equipment
CN117436888A (en) Payment service processing method, device, computer equipment and storage medium
CN117792684A (en) Data verification method, device, computer equipment and storage medium
CN116861396A (en) Login method, device, apparatus, storage medium and program product
CN116846974A (en) Service request processing method, device, computer equipment and storage medium
CN116546103A (en) Processing method, device, equipment, storage medium and product of distributed service
CN115738238A (en) Method and device for detecting serial number, computer equipment and storage medium
CN116760537A (en) Key generation method and key filling method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination