CN117314408A - Transfer method, transfer device, transfer equipment and computer storage medium - Google Patents

Transfer method, transfer device, transfer equipment and computer storage medium Download PDF

Info

Publication number
CN117314408A
CN117314408A CN202311265961.0A CN202311265961A CN117314408A CN 117314408 A CN117314408 A CN 117314408A CN 202311265961 A CN202311265961 A CN 202311265961A CN 117314408 A CN117314408 A CN 117314408A
Authority
CN
China
Prior art keywords
user
client
account information
account
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311265961.0A
Other languages
Chinese (zh)
Inventor
林洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202311265961.0A priority Critical patent/CN117314408A/en
Publication of CN117314408A publication Critical patent/CN117314408A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
    • A63F13/792Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories for payment purposes, e.g. monthly subscriptions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a transfer method, a transfer device, transfer equipment and a computer storage medium. The method may be used with a first client, comprising: receiving a first control input of a first user; responding to a first control input, and controlling a first virtual device of a first user in the universe to move to a target position, wherein the target position is a position corresponding to a second virtual device of a second user; receiving first account information corresponding to a second user sent by a second client under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold; the first account information is virtual account information in the meta universe; and sending the first account information to the server so that the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information. According to the embodiment of the application, the transfer efficiency is effectively improved.

Description

Transfer method, transfer device, transfer equipment and computer storage medium
Technical Field
The application belongs to the technical field of computers, and particularly relates to a transfer method, a transfer device, transfer equipment and a computer storage medium.
Background
The current online transfer mode is mainly based on electronic account transfer, namely, a payer needs to input the electronic account number of a payee to transfer when performing transfer operation.
The user needs to acquire the electronic account information and the identity information of the payee in the service mechanism in advance, and the transfer operation can be performed after the electronic account information and the identity information of the payee are manually uploaded, so that the transfer efficiency is low.
Disclosure of Invention
The embodiment of the application provides a transfer method, a transfer device, transfer equipment and a computer storage medium, which can effectively improve transfer efficiency.
In a first aspect, an embodiment of the present application provides a method for transferring accounts, where the method is applied to a first client, and includes:
receiving a first control input of a first user;
responding to a first control input, and controlling a first virtual device of a first user in the universe to move to a target position, wherein the target position is a position corresponding to a second virtual device of a second user;
receiving first account information corresponding to a second user sent by a second client under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold; the first account information is virtual account information in the meta universe;
And sending the first account information to the server so that the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information.
In some embodiments, after the virtual device receives the first account information corresponding to the second user sent by the second client, the method further includes:
receiving first identity information corresponding to a second user sent by a second client;
acquiring a first identifier of a second user in a meta universe;
the first identifier, the first identity information and the first account information are sent to the server, so that the server carries out identity authentication on the second user based on the first identifier, the first identity information and the first account information, and a first authentication result is obtained;
receiving a first authentication result sent by a server;
and in the case that the first authentication result is that the authentication is passed, sending a transfer request to a server is executed.
In some embodiments, after receiving the first account information corresponding to the second user sent by the second client, the method further includes:
acquiring a first identifier of a second user in a meta universe;
the first identifier is displayed on the first virtual device, so that the first user confirms the identity of the second user according to the first identifier.
In some embodiments, after receiving the first account information corresponding to the second user sent by the second client, the method further includes:
receiving transfer amount input of a first user;
and sending the transfer amount corresponding to the transfer amount input to the server in response to the transfer amount input, so that the server determines the virtual resources of the target quantity according to the transfer amount, and obtains the target transfer resources.
In a second aspect, an embodiment of the present application provides a method for transferring accounts, where the method is applied to a second client, and includes:
receiving a second control input of a second user;
responding to a second control input, and controlling a second virtual device of a second user in the universe to move to a target position, wherein the target position is a position corresponding to a first virtual device of a first user;
and under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value, sending first account information of the second user to a first client corresponding to the first user, so that the first client sends the first account information to a server, the server transfers target virtual resources in the first account of the first user to a second account of the second user according to the first account information, and the first account information is virtual account information in the universe.
In some embodiments, the method further comprises:
and under the condition that the server transfers the target virtual resource in the first account to the second account, receiving the password sent by the server, wherein the password is used for verifying the identity of the second user by using the password under the condition that the second user takes the target virtual resource.
In some embodiments, before sending the first account information of the second user to the first client corresponding to the first user, the method further includes:
and acquiring second virtual equipment in the meta universe, wherein the second virtual equipment has a binding relationship with entity equipment, and the entity equipment is used for acquiring identity information of the second user by utilizing the entity equipment under the condition that the second user takes out the target virtual resource.
In some embodiments, a first network address corresponding to the second user is stored in the entity device, where the network address is used to verify the identity of the second user using the first network address and the second network address, where the second user stores the network address of the second user after transferring the target virtual resource in the first account corresponding to the first client to the second account of the second user.
In some embodiments, the method further comprises:
acquiring second identity information and second account information of a first user under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value;
acquiring a second identifier of the first user in the meta universe;
the second identification, the second identity information and the second account information are sent to the server, so that the server carries out identity authentication on the first user based on the second identification, the second identity information and the second account information, and a second authentication result is obtained;
and receiving a second authentication result sent by the server.
In a third aspect, an embodiment of the present application provides a method for transferring accounts, where the method is applied to a server, and includes:
receiving first account information corresponding to a second user sent by a first client, wherein the first account information is virtual account information in a meta universe, and the first account information is account information sent to the first client by the second client corresponding to the second user under the condition that the distance between first virtual equipment of the first user and second virtual equipment of the second user is smaller than a preset threshold value;
and transferring the target virtual resource in the first account corresponding to the first client to a second account of the second user according to the first account information.
In some embodiments, before receiving the transfer request sent by the first client, the method further includes:
receiving a first identifier and first identity information of a second user in a meta universe, which are sent by a first client; the first identity information and the first account information are obtained by the first client when the distance between the first virtual device of the first user and the second virtual device of the second user is smaller than a preset threshold value;
performing identity authentication on the second user according to the first identifier, the first identity information and the first account information to obtain a first authentication result;
and sending a first authentication result to the first client so that the first client can send the first account information to the server when the first authentication result is that the authentication is passed.
In some embodiments, before receiving the transfer request sent by the first client, the method further includes:
receiving a second identifier, second identity information and second account information of a first user in a meta universe, which are sent by a second client; the second identity information and the second account information are obtained by the second client under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value;
Carrying out identity authentication on the second user according to the second identifier, the second identity information and the second account information to obtain a second authentication result;
and sending the second authentication result to the first client so that the first client can send the first account information to the server under the condition that the second authentication result and the first authentication result are both authentication passing.
In some embodiments, after transferring the target virtual resource in the first account corresponding to the first client to the second account of the second user according to the first account information, the method further comprises:
and storing a second network address of a second client corresponding to the second user, wherein the network address is used for verifying the identity of the second user by using the first network address and the second network address under the condition that the second user is extracting the target virtual resource, and the first network address is obtained from the entity equipment of the second user.
In some embodiments, after transferring the target virtual resource in the first account corresponding to the first client to the second account of the second user according to the first account information, the method further comprises:
and sending the password to a second client corresponding to the second user, wherein the password is used for verifying the identity of the second user by using the password under the condition that the second user is extracting the target virtual resource.
In some embodiments, after receiving the first account information corresponding to the second user sent by the first client, the method further includes:
receiving the transfer amount sent by a first client;
and determining virtual resources of the target quantity according to the transfer amount to obtain target virtual resources.
In a fourth aspect, an embodiment of the present application provides a transfer apparatus, where the transfer apparatus is applied to a first client, including:
the first receiving module is used for receiving a first control input of a first user;
the first control module is used for responding to the first control input and controlling the first virtual equipment of the first user in the meta-universe to move to a target position, wherein the target position is a position corresponding to the second virtual equipment of the second user;
the second receiving module is used for receiving first account information corresponding to a second user sent by the second client under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value; the first account information is virtual account information in the meta universe;
the first sending module is used for sending the first account information to the server so that the server can transfer the target virtual resources in the first account of the first user to the second account of the second user according to the first account information.
In a fifth aspect, an embodiment of the present application provides a transfer apparatus, where the transfer apparatus is applied to a second client, including:
the third receiving module is used for receiving a second control input of a second user;
the second control module is used for responding to a second control input and controlling the second virtual equipment of the second user in the meta-universe to move to a target position, wherein the target position is a position corresponding to the first virtual equipment of the first user;
the second sending module is used for sending the first account information of the second user to the first client corresponding to the first user under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value, so that the first client sends the first account information to the server, the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information, and the first account information is virtual account information in the universe.
In a sixth aspect, an embodiment of the present application provides a transfer apparatus, where the apparatus is applied to a server, including:
the third receiving module is used for receiving first account information corresponding to a second user sent by the first client, wherein the first account information is virtual account information in the meta universe, and the first account information is account information sent to the first client by the second client corresponding to the second user under the condition that the distance between first virtual equipment of the first user and second virtual equipment of the second user is smaller than a preset threshold value;
And the transfer module is used for transferring the target virtual resource in the first account corresponding to the first client to the second account of the second user according to the first account information.
In a seventh aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the transfer method as in any one of the first aspects, or performs the transfer method as in any one of the second aspects, or performs the transfer method as in any one of the third aspects.
In an eighth aspect, embodiments of the present application provide a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, implement the transfer method according to any one of the first aspect, or perform the transfer method according to any one of the second aspect, or perform the transfer method according to any one of the third aspect.
In a ninth aspect, embodiments of the present application provide a computer program product, the instructions in the computer program product, when executed by a processor of an electronic device, cause the electronic device to perform the transfer method according to any one of the first aspect, or perform the transfer method according to any one of the second aspect, or perform the transfer method according to any one of the third aspect.
According to the transfer method, the transfer device, the transfer equipment and the computer storage medium, the first virtual equipment corresponding to the first user can be controlled to move to the target position corresponding to the second virtual equipment of the second user in the meta universe through the first client, the first account information of the second user can be obtained, and the server transfers the target transfer resource in the first account of the first user to the second account of the second user according to the first account information sent by the first client, so that the first user can obtain the first account information of the second user only by attaching the first virtual equipment of the first user to the second virtual equipment of the second user, transfer operation is performed, and transfer efficiency is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described, and it is possible for a person skilled in the art to obtain other drawings according to these drawings without inventive effort.
Fig. 1 is a flow chart of a transfer method under a system architecture according to an embodiment of the present application.
FIG. 2 is a flow chart of a transfer method provided in one embodiment of the present application;
FIG. 3 is a flow chart of a transfer method provided in another embodiment of the present application;
fig. 4 is a flow chart illustrating a transfer method according to still another embodiment of the present application;
FIG. 5 is a schematic view of a transfer apparatus according to an embodiment of the present application;
fig. 6 is a schematic view of a transfer apparatus according to another embodiment of the present application;
fig. 7 is a schematic view of a transfer apparatus according to still another embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application are described in detail below to make the objects, technical solutions and advantages of the present application more apparent, and to further describe the present application in conjunction with the accompanying drawings and the detailed embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative of the application and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by showing examples of the present application.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
In addition, the technical scheme of the application is used for acquiring, storing, using, processing and the like data, and the data are in accordance with relevant regulations of national laws and regulations.
Before describing the embodiments of the present application, technical terms used in describing the embodiments of the present application will be first described.
Meta universe: the virtual world is closely integrated with the real world on an economic system, a social system and an identity system, is a digital living space of a novel social system, and can be provided with a virtual avatar in the meta universe.
The Virtual Reality technology (VR) includes a computer, electronic information and simulation technology, and its basic implementation manner is that the computer technology is mainly used, and the latest development achievements of various high technologies such as three-dimensional graphics technology, multimedia technology, simulation technology, display technology and servo technology are utilized and integrated, so that a realistic Virtual world with various sensory experiences such as three-dimensional vision, touch sense and smell sense is generated by means of devices such as a computer, so that a person in the Virtual world generates a feeling of being personally on the scene.
Near field communication (Near Field Communication, abbreviated as NFC) is an emerging technology, devices (such as mobile phones) using NFC technology can exchange data in a situation of being close to each other, and the devices are integrated and evolved by non-contact radio frequency identification and interconnection technology, and through integrating functions of an inductive card reader, an inductive card and point-to-point communication on a single chip, mobile terminals are utilized to realize applications such as mobile payment, electronic ticketing, access control, mobile identity identification, anti-counterfeiting and the like.
The current online transfer mode is mainly based on electronic account transfer, namely, a payer needs to input the electronic account number of a payee to transfer when performing transfer operation. The user needs to acquire the electronic account information and the identity information of the payee in the service mechanism in advance, and the transfer operation can be performed after the electronic account information and the identity information of the payee are manually uploaded, so that the transfer efficiency is low.
Based on the above problems, the present application proposes a transfer method, apparatus, device and computer storage medium, where a first virtual device corresponding to a first user can be controlled by a first client to move to a target position corresponding to a second virtual device of a second user in a meta universe, so that first account information of the second user can be obtained, and a server transfers a target transfer resource in a first account of the first user to a second account of the second user according to the first account information sent by the first client, so that the first user only needs to attach the first virtual device of the first user to the second virtual device of the second user, and can obtain the first account information of the second user, thereby performing transfer operation and effectively improving transfer efficiency.
Fig. 1 is a flow chart of a transfer method under a system architecture according to an embodiment of the present application.
As shown in fig. 1, a first client, a second client, and a server may be included in the system architecture. The server is respectively in communication connection with the first client and the second client, and the second client is in communication connection with the first terminal device. The first client may be a client corresponding to a payer, that is, the first client proposed in the embodiment of the present application may be a client corresponding to a first user, and the second client may be a client corresponding to a payee, that is, a client corresponding to a second user proposed in the embodiment of the present application.
In order to solve the problems in the prior art, the embodiments of the present application provide a transfer method, apparatus, device, and computer storage medium. The transfer method provided in the embodiment of the present application will be described first.
Based on the architecture, the transfer method provided in the embodiment of the present application may be, for example, that the first client receives a first control input of the first user; responding to a first control input, and controlling a first virtual device of a first user in the universe to move to a target position, wherein the target position is a position corresponding to a second virtual device of a second user; the second client receives a second control input of a second user, and responds to the second control input, and the second virtual equipment of the second user in the control universe moves to a target position, wherein the target position is a position corresponding to the first virtual equipment of the first user; under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value, the second client sends first account information of the second user to a first client corresponding to the first user; the first client sends first account information to the server; and the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information, wherein the first account information is virtual account information in the meta universe.
In other embodiments of the present application, the transfer method provided in the embodiments of the present application may further include, for example, the first client receiving a first control input of a first user, and in response to the first control input, controlling a first virtual device of the first user in the meta-universe to move to a target location, where the target location is a location corresponding to a second virtual device of a second user; the second client receives a second control input of a second user, and responds to the second control input, and the second virtual equipment of the second user in the control universe moves to a target position, wherein the target position is a position corresponding to the first virtual equipment of the first user; under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value, the second client sends first account information and first identity information of the second user to a first client corresponding to the first user; the first client acquires a first identifier of a second user in the meta universe, sends the first identifier, the first identity information and the first account information to the server, and the server performs identity authentication on the second user based on the first identifier, the first identity information and the first account information to obtain a first authentication result; the server sends a first authentication result to the first client; the second client acquires second identity information and second account information of the first user and a second identifier of the first user in the meta universe, the second identifier, the second identity information and the second account information are sent to the server, the server carries out identity authentication on the first user based on the second identifier, the second identity information and the second account information to obtain a second authentication result, and the second authentication result is sent to the second client; under the condition that the first authentication result and the second authentication result are authentication passing, the first client sends first account information to the server; the method comprises the steps that a first client receives transfer amount input of a first user, and responds to the transfer amount input, the first client sends transfer amount corresponding to the transfer amount input to a server; the server determines virtual resources of a target quantity according to the transfer amount, obtains target transfer resources, and transfers the target virtual resources in a first account of a first user to a second account of a second user; the server sends a branch password to the second client, wherein the branch password is used for verifying the identity of the second user by using the branch password under the condition that the second user branches the target virtual resource; the server stores a second network address of a second client corresponding to the second user, wherein the network address is used for verifying the identity of the second user by using the first network address and the second network address under the condition that the second user extracts the target virtual resource.
The transfer method provided in the embodiment of the present application is described below.
Fig. 2 is a flow chart of a transfer method according to an embodiment of the present application. As shown in fig. 1, the transfer method provided in the embodiment of the present application is applied to a second client, and includes the following steps: S201-S204.
S201: a first control input of a first user is received.
It should be noted that, the first user may log in to the first client through the VR device, and input the first control input to the first client through the VR device.
S202: in response to the first control input, a first virtual device of a first user in the metauniverse is controlled to move to a target location.
In this embodiment of the present application, the target location is a location corresponding to the second virtual device of the second user.
It is appreciated that the second user may log onto the second client through the VR device.
As one example, a first client controls a first virtual device of a first user in a metauniverse to move to a target location corresponding to a second virtual device of a second user in response to a first control input. That is, the first client controls the first virtual device to be close to the second virtual device to interact with the second virtual device in a manner simulating near field communication NFC of the real world.
As another example, the first client may control a first avatar of the first user to carry a first virtual device and the second client may control a second avatar of the second user to carry a second virtual device, thereby controlling the first avatar to bring the first virtual device in close proximity to the second virtual device carried by the second avatar.
The first virtual device and the second virtual device may be virtual mobile terminal devices such as a virtual bracelet and a virtual mobile phone.
As an example, the virtual wristband may be bound with the user's network address information, the user's identity information.
S203: and receiving first account information corresponding to the second user sent by the second client under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold.
In the embodiment of the application, the first account information is virtual account information in the meta universe.
It can be understood that, in the meta universe, when the distance between the first virtual device and the second virtual device is smaller than the preset threshold, that is, when the first virtual device is close to the second virtual device, the first account information corresponding to the second user sent by the second client is received.
The first account information may be information corresponding to an account of the second user in a service mechanism in the meta universe, for example, an account name, an account number, and a reserved mobile phone number, and the first account information may be information pre-stored in the second client.
In some embodiments of the present application, after S203, the method may further include:
receiving first identity information corresponding to a second user sent by a second client;
acquiring a first identifier of a second user in a meta universe;
the first identifier, the first identity information and the first account information are sent to the server, so that the server carries out identity authentication on the second user based on the first identifier, the first identity information and the first account information, and a first authentication result is obtained;
receiving a first authentication result sent by a server;
and in the case that the first authentication result is that the authentication is passed, sending a transfer request to a server is executed.
It should be noted that the first identity information may be information pre-stored in the second client, for example, identity card information of the second user. The first identification may be a metauniverse account number of the second user in the metauniverse.
As an example, in a case where a distance between the first virtual device and the second virtual device is smaller than a preset threshold, that is, when the first client controls the first virtual device to be close to the second virtual device, the second client sends first identity information corresponding to the second user to the first client. In addition, the first client may obtain a first identification of the second user in the meta-universe.
As an example, the first virtual device sends the first identifier, the first identity information and the first account information to the server, and the server can verify whether a binding relationship exists between the first identifier, the first identity information and the first account information and the second user, and can also authenticate the validity and the authenticity of the first identity information and the first account information to obtain a first authentication result.
As an example, in a case where the first authentication result is authentication pass, S204 is performed.
As another example, in the case where the first authentication result is that the authentication fails, the server may send the first authentication result to the first client so that the first user knows the first authentication result.
It can be understood that the identity authentication is performed on the second user through the first identifier, the first identity information and the first account information, so that the transfer safety is further improved.
In some embodiments of the present application, after S203, the method may further include:
acquiring a first identifier of a second user in a meta universe;
the first identifier is displayed on the first virtual device, so that the first user confirms the identity of the second user according to the first identifier.
As an example, when the distance between the first virtual device and the second virtual device is smaller than the preset threshold, the first terminal device obtains the first identifier of the second user in the meta universe, and displays the first identifier on the first virtual device, so that the first user can confirm whether the second user is a transfer object according to the first identifier, the transfer safety is further improved, and the situation that the second user is not the object to be transferred actually by the first user is avoided.
In some embodiments of the present application, after S203, the method may further include:
receiving transfer amount input of a first user;
and sending the transfer amount corresponding to the transfer amount input to the server in response to the transfer amount input, so that the server determines the virtual resources of the target quantity according to the transfer amount, and obtains the target transfer resources.
After S203, the server may transfer the target virtual resource in the first account to the second account according to the preset amount, or may transfer the target virtual resource in the first account to the second account according to the transfer amount input by the first user.
As an example, after receiving the transfer amount input of the first user, the first client transmits the transfer amount corresponding to the transfer amount input to the server in response to the transfer amount input, and the server determines a target number of virtual resources according to the transfer amount to obtain the target transfer resources.
S204: and sending the first account information to the server so that the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information.
As one example, a first client sends first account information to a server, which transfers a target virtual resource in a first account of a first user to a second account of a second user according to the first account information.
According to the transfer method, the first client controls the first virtual device corresponding to the first user to move to the target position corresponding to the second virtual device of the second user in the meta universe, so that the first account information of the second user can be obtained, the server transfers the target transfer resource in the first account of the first user to the second account of the second user according to the first account information sent by the first client, and therefore the first user can obtain the first account information of the second user only by attaching the first virtual device of the first user to the second virtual device of the second user, transfer operation is performed, and transfer efficiency is effectively improved.
The transfer method provided in the embodiment of the present application is described below.
Fig. 3 is a flow chart of a transfer method according to another embodiment of the present application. As shown in fig. 1, the transfer method provided in the embodiment of the present application is applied to a first client, and includes the following steps: S301-S303.
S301: a second control input is received for a second user.
It should be noted that, the second user may log in to the second client through the VR device, and input the second control input to the second client through the VR device.
S302: in response to the second control input, a second virtual device of a second user in the metauniverse is controlled to move to a target location.
In this embodiment of the present application, the target location is a location corresponding to a first virtual device of a first user.
It is appreciated that the second user may log onto the second client through the VR device.
As one example, the second client controls the second virtual device of the first user in the universe to move to a target location corresponding to the first virtual device of the first user in response to the second control input. That is, the first client controls the second virtual device to interact with the first virtual device in a manner that mimics real-world near field communication (Near Field Communication, NFC) proximate to the first virtual device.
As another example, the second client may control the second avatar of the second user to carry the second virtual device, and the first client may control the second avatar of the first user to carry the first virtual device, thereby controlling the second avatar to bring the second virtual device in close proximity to the first virtual device carried by the first avatar.
The first virtual device and the second virtual device may be virtual mobile terminal devices such as a virtual bracelet and a virtual mobile phone. The virtual device may be a mapping of the physical device in the meta-universe. Whether it is a physical device or a virtual device, it has unique, non-tamper-able, dynamic encryption security protection functions. The physical bracelet and the virtual bracelet can be respectively bound with the identity information of the user and used as the internet of things equipment for identifying the identity of the user.
In some embodiments of the present application, prior to S302, the method may further include:
and acquiring second virtual equipment in the meta universe, wherein the second virtual equipment has a binding relationship with entity equipment, and the entity equipment is used for acquiring identity information of the second user by utilizing the entity equipment under the condition that the second user takes out the target virtual resource.
It should be noted that, the virtual device and the entity device may be bound with the network address information of the user and the identity information of the user, and may be used to verify the validity of the transfer.
For example, the second user may obtain a second virtual device in the meta-universe in advance, and may also bind with the entity device, where the entity device and the second virtual device are both bound with the second account. Under the condition that the second user needs to draw the target virtual resource in the entity mechanism, the entity mechanism can carry out identity authentication on the second user according to the information stored in the entity equipment and acquire the first account information bound with the entity equipment. Therefore, when the second user can draw the target virtual resource in the entity mechanism, the first account information is not required to be additionally provided, the entity mechanism only needs to provide the entity equipment, and the entity mechanism can obtain the first account information from the entity equipment, so that the efficiency of drawing the resource is further improved, and the user experience is improved.
As an example of one possible implementation, the manner in which the user draws the target virtual resource in the entity institution may be: and transferring the target virtual resources in the second account to the entity account by staff in the entity mechanism, and then issuing entity resources corresponding to the target number of the target virtual resources from the entity account to the second user.
In some embodiments of the present application, a first network address corresponding to a second user is stored in the entity device, where the network address is used to verify an identity of the second user by using the first network address and the second network address when the second user draws the target virtual resource, and the second network address is a network address of the second user stored by the server after transferring the target virtual resource in the first account corresponding to the first client to the second account of the second user.
As an example, a first network address corresponding to the second user may be stored in the entity device, and after completing transferring the target virtual resource in the first account of the first user to the second account of the second user, the server may also store second network address information of the second user, and in a case that the second user withdraws the target virtual resource, verify the identity of the second user using the first network address and the second network address. Thereby, the identity of the second user is further authenticated through the network address information of the second user, and the security of the transfer is improved.
As another example, after completing the transfer of the target virtual resource in the first account of the first user to the second account of the second user, the server may further store the network address information of the first user, so as to record the transfer process in more detail and comprehensively, and improve traceability of the transfer process.
In some embodiments of the present application, prior to S303, the method may further include:
acquiring second identity information and second account information of a first user under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value;
acquiring a second identifier of the first user in the meta universe;
the second identification, the second identity information and the second account information are sent to the server, so that the server carries out identity authentication on the first user based on the second identification, the second identity information and the second account information, and a second authentication result is obtained;
and receiving a second authentication result sent by the server.
It should be noted that, the identity of the first user may also be authenticated, so as to further improve the security and legitimacy of the transfer.
As an example, in a case that a distance between the first virtual device and the second virtual device is smaller than a preset threshold, the second client obtains second identity information and second account information of the first user from the first client, obtains a second identifier of the first user in the meta-universe, and obtains a second identifier of the first user in the meta-universe. The server can authenticate whether a binding relationship exists among the second identifier, the second identity information and the second account information, and can also authenticate the authenticity and validity of the second identity information and the second account information to obtain a second authentication result.
The server sends the second authentication result to the second client, which displays the second authentication result so that the second user knows the second authentication result.
S303: and under the condition that the distance between the first virtual equipment and the second virtual equipment is smaller than a preset threshold value, sending first account information of the second user to a first client corresponding to the first user, so that the first client sends the first account information to a server, and the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information.
In some embodiments of the present application, the first account information is virtual account information in a meta universe.
It can be understood that, in the meta universe, when the distance between the first virtual device and the second virtual device is smaller than the preset threshold, that is, when the first virtual device is close to the second virtual device, the second client sends the first account information corresponding to the second user to the first client.
The first account information may be information corresponding to an account of the second user in a service mechanism in the meta universe, for example, an account name, an account number, and a reserved mobile phone number, and the first account information may be information pre-stored in the second client.
In some embodiments of the present application, the method further comprises:
and under the condition that the server transfers the target virtual resource in the first account to the second account, receiving the password sent by the server, wherein the password is used for verifying the identity of the second user by using the password under the condition that the second user takes the target virtual resource.
As an example, in the case where the server transfers the target virtual resource in the first account to the second account, the server may generate a challenge, send the challenge to the second client, and in the case where the second user challenges the target virtual resource, the second user may provide the challenge to compare with the first challenge provided by the second user and the second challenge corresponding to the target virtual resource, thereby authenticating the identity of the second user. And under the condition that the first extracted password is consistent with the second extracted password, the authentication result is that the target virtual resource is extracted for the second user through authentication. Thereby improving the security of the target virtual resource.
It can be understood that when the second user takes the target virtual resource by the entity mechanism under the online state, the identity is authenticated by the entity device, the network address information and the taking password, and after the authentication is passed, the target virtual resource is taken, the validity of the transfer and the taking of the target virtual resource is ensured, meanwhile, the direct connection between the real society and the meta universe virtual scene is established, the problem of virtual resource turnover in the meta universe is solved, the true credibility of the identities of both sides of the transfer transaction is ensured, and the privacy of the customer is also protected. The transfer operation is more convenient and quick.
According to the transfer method, the first client controls the first virtual device corresponding to the first user to move to the target position corresponding to the second virtual device of the second user in the meta universe, so that the first account information of the second user can be obtained, the server transfers the target transfer resource in the first account of the first user to the second account of the second user according to the first account information sent by the first client, and therefore the first user can obtain the first account information of the second user only by attaching the first virtual device of the first user to the second virtual device of the second user, transfer operation is performed, and transfer efficiency is effectively improved.
The transfer method provided in the embodiment of the present application is described below.
Fig. 4 is a flow chart of a transfer method according to still another embodiment of the present application. As shown in fig. 4, the transfer method provided in the embodiment of the present application is applied to a server, and includes the following steps: S401-S402.
S401: receiving first account information corresponding to a second user sent by a first client, wherein the first account information is virtual account information in a meta universe, and the first account information is account information sent to the first client by the second client corresponding to the second user under the condition that the distance between first virtual equipment of the first user and second virtual equipment of the second user is smaller than a preset threshold value.
As an example, in a case that a distance between a first virtual device of a first user and a second virtual device of a second user is smaller than a preset threshold, a second client corresponding to the second user sends first account information to a first client, and the first client sends the first account information to a server.
In some embodiments of the present application, before S401, the method may further include:
receiving a first identifier and first identity information of a second user in a meta universe, which are sent by a first client; the first identity information and the first account information are obtained by the first client when the distance between the first virtual device of the first user and the second virtual device of the second user is smaller than a preset threshold value;
performing identity authentication on the second user according to the first identifier, the first identity information and the first account information to obtain a first authentication result;
and sending a first authentication result to the first client so that the first client can send the first account information to the server when the first authentication result is that the authentication is passed.
It should be noted that the first identity information may be information pre-stored in the second client, for example, identity card information of the second user. The first identification may be a metauniverse account number of the second user in the metauniverse.
In an exemplary embodiment, when the distance between the first virtual device and the second virtual device is smaller than the preset threshold, that is, when the first client controls the first virtual device to be close to the second virtual device, the second client sends first identity information corresponding to the second user to the first client. In addition, the first client may obtain a first identification of the second user in the meta-universe.
As an example, the first virtual device sends the first identifier, the first identity information and the first account information to the server, and the server can verify whether a binding relationship exists between the first identifier, the first identity information and the first account information and the second user, and can also authenticate the validity and the authenticity of the first identity information and the first account information to obtain a first authentication result.
As an example, in a case where the first authentication result is authentication pass, S402 is performed.
As another example, in the case where the first authentication result is that the authentication fails, the server may send the first authentication result to the first client so that the first user knows the first authentication result.
It can be understood that the identity authentication is performed on the second user through the first identifier, the first identity information and the first account information, so that the transfer safety is further improved.
In some embodiments of the present application, before S401, the method may further include:
receiving a second identifier, second identity information and second account information of a first user in a meta universe, which are sent by a second client; the second identity information and the second account information are obtained by the second client under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value;
carrying out identity authentication on the second user according to the second identifier, the second identity information and the second account information to obtain a second authentication result;
and sending the second authentication result to the first client so that the first client can send the first account information to the server under the condition that the second authentication result and the first authentication result are both authentication passing.
It should be noted that, the identity of the first user may also be authenticated, so as to further improve the security of the transfer.
In an exemplary embodiment, when the distance between the first virtual device and the second virtual device is smaller than the preset threshold, the second client obtains second identity information and second account information of the first user from the first client, obtains a second identifier of the first user in the meta-universe, and sends the second identifier, the second identity information and the second account information to the server.
In the embodiment of the application, the server can authenticate whether the binding relationship exists among the second identifier, the second identity information and the second account information, and can also authenticate the authenticity and the validity of the second identity information and the second account information to obtain a second authentication result.
The server sends the second authentication result to the second client, which displays the second authentication result so that the second user knows the second authentication result.
S402: and transferring the target virtual resource in the first account corresponding to the first client to a second account of the second user according to the first account information.
In some embodiments of the present application, prior to S402, the method may further include:
receiving the transfer amount sent by a first client;
and determining virtual resources of the target quantity according to the transfer amount to obtain target virtual resources.
It should be noted that, the server may transfer the target virtual resource in the first account to the second account according to the preset amount, or may transfer the target virtual resource in the first account to the second account according to the transfer amount input by the first user.
As an example, after receiving the transfer amount input of the first user, the first client transmits the transfer amount corresponding to the transfer amount input to the server in response to the transfer amount input, and the server determines a target number of virtual resources according to the transfer amount to obtain the target transfer resources.
In some embodiments of the present application, after S402, the method may further include:
and storing a second network address of a second client corresponding to the second user, wherein the network address is used for verifying the identity of the second user by using the first network address and the second network address under the condition that the second user is extracting the target virtual resource, and the first network address is obtained from the entity equipment of the second user.
As an example, a first network address corresponding to the second user may be stored in the entity device, and after completing transferring the target virtual resource in the first account of the first user to the second account of the second user, the server may also store second network address information of the second user, and in a case that the second user withdraws the target virtual resource, verify the identity of the second user using the first network address and the second network address. Thereby, the identity of the second user is further authenticated through the network address information of the second user, and the security of the transfer is improved.
In some embodiments of the present application, after S402, the method may further include:
and sending the password to a second client corresponding to the second user, wherein the password is used for verifying the identity of the second user by using the password under the condition that the second user is extracting the target virtual resource.
As an example, in the case where the server transfers a target virtual resource in a first account to a second account, the server may generate an extraction password corresponding to the target virtual resource, send the extraction password to the second client, and in the case where the second user extracts the target virtual resource, the second user may provide the extraction password to compare with the first extraction password provided by the second user to authenticate the identity of the second user. And under the condition that the first extracted password is consistent with the second extracted password, the authentication result is that the target virtual resource is extracted for the second user through authentication. Thereby improving the security of the target virtual resource.
According to the transfer method, the first client controls the first virtual device corresponding to the first user to move to the target position corresponding to the second virtual device of the second user in the meta universe, so that the first account information of the second user can be obtained, the server transfers the target transfer resource in the first account of the first user to the second account of the second user according to the first account information sent by the first client, and therefore the first user can obtain the first account information of the second user only by attaching the first virtual device of the first user to the second virtual device of the second user, transfer operation is performed, and transfer efficiency is effectively improved.
Based on the transfer method provided in the foregoing embodiment, a specific implementation of the transfer apparatus provided in the embodiment of the present application will be described with reference to fig. 5.
Referring to fig. 5, which is a schematic structural diagram of a transfer apparatus according to an embodiment of the present application, the transfer apparatus 500 may be applied to a first client, and the apparatus includes:
a first receiving module 501, configured to receive a first control input of a first user;
a first control module 502, configured to control, in response to a first control input, a first virtual device of a first user in a meta-universe to move to a target location, where the target location is a location corresponding to a second virtual device of a second user;
a second receiving module 503, configured to receive first account information corresponding to a second user sent by a second client, where a distance between the first virtual device and the second virtual device is smaller than a preset threshold; the first account information is virtual account information in the meta universe;
and the first sending module 504 is configured to send the first account information to the server, so that the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information.
According to the training device for the bearing fault diagnosis model, which is provided by the embodiment of the application, the first client controls the first virtual equipment corresponding to the first user to move to the target position corresponding to the second virtual equipment of the second user in the meta universe, so that the first account information of the second user can be obtained, the server transfers the target transfer resource in the first account of the first user to the second account of the second user according to the first account information sent by the first client, and therefore the first user only needs to be close to the first virtual equipment of the first user and the second virtual equipment of the second user, the first account information of the second user can be obtained, transfer operation is performed, and transfer efficiency is effectively improved.
As an implementation manner of the present application, the foregoing apparatus may further include:
the fourth receiving module is used for receiving first identity information corresponding to a second user sent by the second client;
the first acquisition module is used for acquiring a first identifier of the second user in the meta universe;
the third sending module is used for sending the first identifier, the first identity information and the first account information to the server so that the server can carry out identity authentication on the second user based on the first identifier, the first identity information and the first account information to obtain a first authentication result;
the fifth receiving module is used for receiving the first authentication result sent by the server;
and the execution module is used for executing the transmission of the transfer request to the server when the first authentication result is that the authentication is passed.
As an implementation manner of the present application, the foregoing apparatus may further include:
the second acquisition module is used for acquiring a first identifier of a second user in the meta universe;
and the display module is used for displaying the first identifier on the first virtual equipment so that the first user can confirm the identity of the second user according to the first identifier.
As an implementation manner of the present application, the foregoing apparatus may further include:
A sixth receiving module for receiving transfer amount input of the first user;
and the fourth sending module is used for responding to the transfer amount input, sending the transfer amount corresponding to the transfer amount input to the server, so that the server determines virtual resources of the target quantity according to the transfer amount, and obtaining the target transfer resources.
Based on the transfer method provided in the foregoing embodiment, a specific implementation of the transfer apparatus provided in the embodiment of the present application will be described with reference to fig. 6.
Referring to fig. 6, which is a schematic structural diagram of a transfer apparatus according to another embodiment of the present application, the transfer apparatus 600 may be applied to a second client, and the apparatus includes:
a third receiving module 601, configured to receive a second control input of a second user;
a second control module 602, configured to control, in response to a second control input, a second virtual device of a second user in the meta-universe to move to a target location, where the target location is a location corresponding to a first virtual device of a first user;
the second sending module 603 is configured to send, when a distance between the first virtual device and the second virtual device is smaller than a preset threshold, first account information of the second user to a first client corresponding to the first user, so that the first client sends the first account information to the server, so that the server transfers, according to the first account information, a target virtual resource in the first account of the first user to a second account of the second user, where the first account information is virtual account information in the meta space.
According to the training device for the bearing fault diagnosis model, which is provided by the embodiment of the application, the first client controls the first virtual equipment corresponding to the first user to move to the target position corresponding to the second virtual equipment of the second user in the meta universe, so that the first account information of the second user can be obtained, the server transfers the target transfer resource in the first account of the first user to the second account of the second user according to the first account information sent by the first client, and therefore the first user only needs to be close to the first virtual equipment of the first user and the second virtual equipment of the second user, the first account information of the second user can be obtained, transfer operation is performed, and transfer efficiency is effectively improved.
As an implementation manner of the present application, the foregoing apparatus may further include:
and the seventh receiving module is used for receiving the password sent by the server under the condition that the server transfers the target virtual resource in the first account to the second account, and the password is used for verifying the identity of the second user by using the password under the condition that the second user transfers the target virtual resource.
As an implementation manner of the present application, the foregoing apparatus may further include:
The third obtaining module is used for obtaining second virtual equipment in the meta universe, the second virtual equipment has binding relation with entity equipment, and the entity equipment is used for obtaining identity information of the second user by utilizing the entity equipment under the condition that the second user is used for extracting the target virtual resource.
As one implementation manner of the application, a first network address corresponding to a second user is stored in the entity device, where the network address is used to verify the identity of the second user by using the first network address and the second network address when the second user draws the target virtual resource, and the second network address is the network address of the second user stored by the server after transferring the target virtual resource in the first account corresponding to the first client to the second account of the second user.
As an implementation manner of the present application, the foregoing apparatus may further include:
a fourth obtaining module, configured to obtain second identity information and second account information of the first user when a distance between the first virtual device and the second virtual device is smaller than a preset threshold;
a fifth acquisition module, configured to acquire a second identifier of the first user in the meta universe;
the fifth sending module is used for sending the second identifier, the second identity information and the second account information to the server so that the server can carry out identity authentication on the first user based on the second identifier, the second identity information and the second account information to obtain a second authentication result;
And the eighth receiving module is used for receiving the second authentication result sent by the server.
Based on the transfer method provided in the foregoing embodiment, a specific implementation of the transfer apparatus provided in the embodiment of the present application will be described with reference to fig. 6.
Referring to fig. 7, which is a schematic structural diagram of a transfer apparatus according to still another embodiment of the present application, the transfer apparatus 700 may be applied to a second client, and the apparatus includes:
the third receiving module 701 is configured to receive first account information corresponding to a second user sent by a first client, where the first account information is virtual account information in a meta universe, and the first account information is account information sent to the first client by the second client corresponding to the second user when a distance between a first virtual device of the first user and a second virtual device of the second user is less than a preset threshold;
and the transfer module 702 is configured to transfer the target virtual resource in the first account corresponding to the first client to the second account of the second user according to the first account information.
According to the training device for the bearing fault diagnosis model, which is provided by the embodiment of the application, the first client controls the first virtual equipment corresponding to the first user to move to the target position corresponding to the second virtual equipment of the second user in the meta universe, so that the first account information of the second user can be obtained, the server transfers the target transfer resource in the first account of the first user to the second account of the second user according to the first account information sent by the first client, and therefore the first user only needs to be close to the first virtual equipment of the first user and the second virtual equipment of the second user, the first account information of the second user can be obtained, transfer operation is performed, and transfer efficiency is effectively improved.
As an implementation manner of the present application, the foregoing apparatus may further include:
a ninth receiving module, configured to receive a first identifier and first identity information of a second user in a meta universe, where the first identifier and the first identity information are sent by a first client; the first identity information and the first account information are obtained by the first client when the distance between the first virtual device of the first user and the second virtual device of the second user is smaller than a preset threshold value;
the first authentication module is used for carrying out identity authentication on the second user according to the first identifier, the first identity information and the first account information to obtain a first authentication result;
and the sixth sending module is used for sending the first authentication result to the first client so that the first client can send the first account information to the server under the condition that the first authentication result is authentication passing.
As an implementation manner of the present application, the foregoing apparatus may further include:
a tenth receiving module, configured to receive a second identifier, second identity information, and second account information of the first user in the meta universe, where the second identifier, the second identity information, and the second account information are sent by the second client; the second identity information and the second account information are obtained by the second client under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value;
The second authentication module is used for carrying out identity authentication on the second user according to the second identifier, the second identity information and the second account information to obtain a second authentication result;
and the seventh sending module is used for sending the second authentication result to the first client so that the first client can send the first account information to the server under the condition that the second authentication result and the first authentication result are both authentication passing.
As an implementation manner of the present application, the foregoing apparatus may further include:
the storage module is used for storing a second network address of a second client corresponding to the second user, the network address is used for verifying the identity of the second user by utilizing the first network address and the second network address under the condition that the second user is extracting the target virtual resource, and the first network address is obtained from the entity equipment of the second user.
As an implementation manner of the present application, the foregoing apparatus may further include:
and the eighth sending module is used for sending a password to a second client corresponding to the second user, wherein the password is used for verifying the identity of the second user by using the password under the condition that the second user is taking the target virtual resource.
As an implementation manner of the present application, the foregoing apparatus may further include:
an eleventh receiving module, configured to receive the transfer amount sent by the first client;
and the first determining module is used for determining the virtual resources of the target quantity according to the transfer amount to obtain target virtual resources.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The electronic device 800 may include a processor 801 and a memory 802 storing computer program instructions.
In particular, the processor 801 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more integrated circuits of embodiments of the present application.
Memory 802 may include mass storage for data or instructions. By way of example, and not limitation, memory 802 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the above. Memory 802 may include removable or non-removable (or fixed) media, where appropriate. Memory 802 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 802 is a non-volatile solid-state memory. Memory 802 may include Read Only Memory (ROM), random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, memory 802 includes one or more tangible (non-transitory) computer-readable storage media (e.g., memory devices) encoded with software comprising computer-executable instructions and which, when executed (e.g., by one or more processors), perform the operations described in any of the transfer methods of the above embodiments.
The processor 801 implements any one of the transfer methods of the above embodiments by reading and executing computer program instructions stored in the memory 802.
In one example, electronic device 800 may also include a communication interface 803 and a bus 810. As shown in fig. 8, the processor 801, the memory 802, and the communication interface 803 are connected to each other via a bus 810 and perform communication with each other.
The communication interface 803 is mainly used to implement communication between each module, apparatus, unit and/or device in the embodiments of the present application.
Bus 810 includes hardware, software, or both, coupling components of the online data flow billing device to each other. By way of example, and not limitation, the buses may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a micro channel architecture (MCa) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus, or a combination of two or more of the above. Bus 810 may include one or more buses, where appropriate. Although embodiments of the present application describe and illustrate a particular bus, the present application contemplates any suitable bus or interconnect.
In addition, in combination with the transfer method in the above embodiment, the embodiment of the application may be implemented by providing a computer storage medium. The computer storage medium has stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the transfer methods of the above embodiments.
It should be clear that the present application is not limited to the particular arrangements and processes described above and illustrated in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions, or change the order between steps, after appreciating the spirit of the present application.
The functional blocks shown in the above block diagrams may be implemented in hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine readable medium or transmitted over transmission media or communication links by a data signal carried in a carrier wave. A "machine-readable medium" may include any medium that can store or transfer information. Examples of machine-readable media include electronic circuitry, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and the like. The code segments may be downloaded via computer networks such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be different from the order in the embodiments, or several steps may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to being, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware which performs the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In the foregoing, only the specific embodiments of the present application are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, which are intended to be included in the scope of the present application.

Claims (21)

1. A method of transferring accounts, the method being applied to a first client and comprising:
receiving a first control input of a first user;
responsive to the first control input, controlling a first virtual device of the first user in a universe to move to a target location, the target location being a location corresponding to a second virtual device of a second user;
receiving first account information corresponding to the second user, which is sent by a second client, under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold; the first account information is virtual account information in the meta universe;
And sending the first account information to a server so that the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information.
2. The transfer method of claim 1, wherein after the virtual device receives the first account information corresponding to the second user transmitted by the second client, the method further comprises:
receiving first identity information corresponding to the second user, which is sent by a second client;
acquiring a first identifier of the second user in a meta universe;
the first identifier, the first identity information and the first account information are sent to a server, so that the server performs identity authentication on the second user based on the first identifier, the first identity information and the first account information to obtain a first authentication result;
receiving the first authentication result sent by the server;
and executing the transfer request to a server under the condition that the first authentication result is that the authentication is passed.
3. The transfer method according to claim 1, wherein after the receiving the first account information corresponding to the second user transmitted from the second client, the method further comprises:
Acquiring a first identifier of the second user in a meta universe;
and displaying the first identifier on the first virtual device so that the first user confirms the identity of the second user according to the first identifier.
4. The transfer method according to claim 1, wherein after the receiving the first account information corresponding to the second user transmitted from the second client, the method further comprises:
receiving transfer amount input of a first user;
and responding to the transfer amount input, and sending the transfer amount corresponding to the transfer amount input to the server, so that the server determines virtual resources of a target quantity according to the transfer amount to obtain the target transfer resources.
5. A method of transferring accounts, the method being applied to a second client, comprising:
receiving a second control input of a second user;
responsive to the second control input, controlling a second virtual device of the second user in the universe to move to a target location, the target location being a location corresponding to a first virtual device of the first user;
and under the condition that the distance between the first virtual equipment and the second virtual equipment is smaller than a preset threshold value, sending first account information of the second user to a first client corresponding to the first user, so that the first client sends the first account information to a server, and the server transfers target virtual resources in the first account of the first user to the second account of the second user according to the first account information, wherein the first account information is virtual account information in a universe.
6. A transfer method according to claim 5, wherein the method further comprises:
and under the condition that the server transfers the target virtual resource in the first account to the second account, receiving a retrieval password sent by the server, wherein the retrieval password is used for verifying the identity of the second user by using the retrieval password under the condition that the second user retrieves the target virtual resource.
7. The transfer method of claim 5, wherein prior to the sending the first account information of the second user to the first client corresponding to the first user, the method further comprises:
and acquiring the second virtual equipment in the meta universe, wherein the second virtual equipment has a binding relation with entity equipment, and the entity equipment is used for acquiring identity information of the second user by utilizing the entity equipment under the condition that the second user is used for extracting the target virtual resource.
8. The transfer method according to claim 7, wherein a first network address corresponding to the second user is stored in the entity device, the network address being used to verify an identity of the second user using the first network address and a second network address, the second network address being a network address of the second user stored by the server after transferring a target virtual resource in a first account corresponding to the first client to a second account of the second user, in a case where the second user withdraws the target virtual resource.
9. A transfer method according to claim 5, wherein the method further comprises:
acquiring second identity information and second account information of the first user under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value;
acquiring a second identifier of the first user in a meta universe;
the second identifier, the second identity information and the second account information are sent to the server, so that the server carries out identity authentication on the first user based on the second identifier, the second identity information and the second account information to obtain a second authentication result;
and receiving the second authentication result sent by the server.
10. A transfer method, wherein the method is applied to a server, comprising:
receiving first account information corresponding to a second user sent by a first client, wherein the first account information is virtual account information in a meta universe, and the first account information is account information sent to the first client by the second client corresponding to the second user under the condition that the distance between first virtual equipment of the first user and second virtual equipment of the second user is smaller than a preset threshold;
And transferring the target virtual resource in the first account corresponding to the first client to a second account of the second user according to the first account information.
11. The transfer method according to claim 10, wherein before the receiving the transfer request transmitted from the first client, the method further comprises:
receiving a first identifier and first identity information of the second user in a meta universe, which are sent by a first client; the first identity information and the first account information are obtained by the first client when the distance between the first virtual device of the first user and the second virtual device of the second user is smaller than a preset threshold value;
performing identity authentication on the second user according to the first identifier, the first identity information and the first account information to obtain a first authentication result;
and sending the first authentication result to the first client so that the first client executes the sending of the first account information to the server when the first authentication result is authentication passing.
12. The transfer method according to claim 11, wherein before the receiving the transfer request transmitted from the first client, the method further comprises:
Receiving a second identifier, second identity information and second account information of the first user in the meta universe, which are sent by a second client; the second identity information and the second account information are obtained by the second client when the distance between the first virtual device and the second virtual device is smaller than a preset threshold;
carrying out identity authentication on the second user according to the second identifier, the second identity information and the second account information to obtain a second authentication result;
and sending the second authentication result to the first client so that the first client executes the sending of the first account information to the server under the condition that the second authentication result and the first authentication result are both authentication passing.
13. The transfer method according to claim 10, wherein after the transferring of the target virtual resource in the first account corresponding to the first client to the second account of the second user according to the first account information, the method further comprises:
and storing a second network address of a second client corresponding to the second user, wherein the network address is used for verifying the identity of the second user by using a first network address and the second network address under the condition that the second user is extracting the target virtual resource, and the first network address is obtained from the entity equipment of the second user.
14. The transfer method according to claim 10, wherein after the transferring of the target virtual resource in the first account corresponding to the first client to the second account of the second user according to the first account information, the method further comprises:
and sending a branch password to a second client corresponding to the second user, wherein the branch password is used for verifying the identity of the second user by using the branch password under the condition that the second user branches the target virtual resource.
15. The transfer method of claim 10, wherein after receiving the first account information corresponding to the second user transmitted from the first client, the method further comprises:
receiving the transfer amount sent by the first client;
and determining the virtual resources of the target quantity according to the transfer amount to obtain the target virtual resources.
16. A transfer apparatus, the apparatus being applied to a first client, comprising:
the first receiving module is used for receiving a first control input of a first user;
the first control module is used for responding to the first control input and controlling the first virtual equipment of the first user in the universe to move to a target position, wherein the target position is a position corresponding to the second virtual equipment of the second user;
The second receiving module is used for receiving first account information corresponding to the second user sent by the second client side under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value; the first account information is virtual account information in the meta universe;
and the first sending module is used for sending the first account information to a server so that the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information.
17. A transfer apparatus, the apparatus being applied to a second client, comprising:
the third receiving module is used for receiving a second control input of a second user;
the second control module is used for responding to the second control input and controlling the second virtual equipment of the second user in the universe to move to a target position, wherein the target position is a position corresponding to the first virtual equipment of the first user;
and the second sending module is used for sending the first account information of the second user to the first client corresponding to the first user under the condition that the distance between the first virtual device and the second virtual device is smaller than a preset threshold value, so that the first client sends the first account information to a server, the server transfers the target virtual resource in the first account of the first user to the second account of the second user according to the first account information, and the first account information is virtual account information in a universe.
18. A transfer apparatus, the apparatus being applied to a server, comprising:
the third receiving module is used for receiving first account information corresponding to a second user and sent by a first client, wherein the first account information is virtual account information in a meta universe, and the first account information is account information sent to the first client by the second client when the distance between first virtual equipment of the first user and second virtual equipment of the second user is smaller than a preset threshold;
and the transfer module is used for transferring the target virtual resource in the first account corresponding to the first client to the second account of the second user according to the first account information.
19. An electronic device, the device comprising: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the transfer method according to any one of claims 1 to 4, or performs the transfer method according to any one of claims 5 to 9, or performs the transfer method according to any one of claims 10 to 15.
20. A computer readable storage medium, having stored thereon computer program instructions, which when executed by a processor, implement the transfer method of any one of claims 1-4, or perform the transfer method of any one of claims 5-9, or perform the transfer method of any one of claims 10-15.
21. A computer program product, characterized in that instructions in the computer program product, when executed by a processor of an electronic device, cause the electronic device to perform the transfer method according to any one of claims 1-4, or to perform the transfer method according to any one of claims 5-9, or to perform the transfer method according to any one of claims 10-15.
CN202311265961.0A 2023-09-27 2023-09-27 Transfer method, transfer device, transfer equipment and computer storage medium Pending CN117314408A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311265961.0A CN117314408A (en) 2023-09-27 2023-09-27 Transfer method, transfer device, transfer equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311265961.0A CN117314408A (en) 2023-09-27 2023-09-27 Transfer method, transfer device, transfer equipment and computer storage medium

Publications (1)

Publication Number Publication Date
CN117314408A true CN117314408A (en) 2023-12-29

Family

ID=89287894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311265961.0A Pending CN117314408A (en) 2023-09-27 2023-09-27 Transfer method, transfer device, transfer equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN117314408A (en)

Similar Documents

Publication Publication Date Title
CN104836780B (en) Data interactive method, checking terminal, server and system
CN107408170B (en) Authentication-activated augmented reality display device
CN112801655B (en) Payment card migration method, device, electronic equipment, server and medium
CN103971239A (en) Verification method and device
CN104145297A (en) Hub and spokes pin verification
CN103400265A (en) Quick payment method and system based on position information
CN105096113B (en) Mobile payment method and device
CN104683104B (en) The method, apparatus and system of authentication
WO2014155154A1 (en) Secure payment transaction system
CN112669062B (en) Electronic card management method, server, system and storage medium
US11625713B2 (en) Method for securing transactional data processing, corresponding terminal and computer program
US20170228726A1 (en) Systems and methods for secure transactions
US10699268B2 (en) Method, server and system for authorizing a transaction
CN105610796A (en) Method, server and system for transferring user identity recognition information
CN106779711A (en) Safe payment method and device based on eID
CN117314408A (en) Transfer method, transfer device, transfer equipment and computer storage medium
CN105577607A (en) User identity authentication method and user identity authentication device
CN111178873B (en) NFC (near field communication) based collection method and NFC based collection device
CN113128993A (en) Payment method, payment device, electronic equipment and storage medium
CN115271705A (en) Payment method and device based on NFC
CN106886927A (en) A kind of processing method and processing device, system for extracting voucher
CN117114832A (en) Meta universe-based business processing method and device and computer storage medium
KR101110775B1 (en) Method and server for providing service
CN110610367B (en) Transaction data payment method and device, electronic equipment and server
CN108133366B (en) payment method and payment system of financial card and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination