TW202030665A - Method and apparatus for displaying digital object identifier - Google Patents

Method and apparatus for displaying digital object identifier Download PDF

Info

Publication number
TW202030665A
TW202030665A TW109111930A TW109111930A TW202030665A TW 202030665 A TW202030665 A TW 202030665A TW 109111930 A TW109111930 A TW 109111930A TW 109111930 A TW109111930 A TW 109111930A TW 202030665 A TW202030665 A TW 202030665A
Authority
TW
Taiwan
Prior art keywords
application
icon
unique identifier
digital object
payment
Prior art date
Application number
TW109111930A
Other languages
Chinese (zh)
Other versions
TWI741555B (en
Inventor
任健
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202030665A publication Critical patent/TW202030665A/en
Application granted granted Critical
Publication of TWI741555B publication Critical patent/TWI741555B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices

Abstract

Disclosed in the present application are a method and an apparatus for displaying a digital object identifier: when monitoring the operation of a user on an icon of a sub-program (i.e. a first application) of a second application, acquiring a digital object identifier from the first application, and replacing the icon of the first application with the digital object identifier.

Description

顯示數位物件唯一識別符的方法及裝置Method and device for displaying unique identifier of digital object

本發明涉及資訊技術領域,尤其涉及一種顯示數位物件唯一識別符的方法及裝置。The present invention relates to the field of information technology, and in particular to a method and device for displaying unique identifiers of digital objects.

行動支付是一種使用行動終端執行支付業務的方法,按照技術手段或者支付方式的不同,行動支付可分為多種方式,常見的有簡訊支付、掃碼支付、指紋支付等。 目前,由於掃碼支付的相對其他方式更為便捷、對硬體要求較低,所以成為了主流的行動支付方式。 在現有技術中,掃碼支付的過程為:使用者在需要執行支付業務時(如,對購買的商品進行付款時),啟動行動終端(如,手機)上安裝的支付應用,並操作該支付應用,使該支付應用創建並顯示用於執行支付業務的數位物件唯一識別符(Digital Object Identifier,DOI),而商戶通過掃描該DOI獲取執行支付業務所需的資料,並完成支付業務。其中,常用的DOI為二維條碼。 相較於其他行動支付方式,掃碼支付時使用者通常只需執行點擊操作即可(如,點擊支付應用、點擊支付圖標),操作較為便利,如圖1所示。圖1為現有技術中進行掃碼支付時,使用者需要執行的操作示意圖。圖1中的箭頭為使用者操作的順序,即,先點擊支付應用,再點擊支付圖標,支付應用顯示二維條碼。 但是,相對於新型的利用生物特徵(如,指紋、聲紋等)進行支付的方式來說,掃碼支付方式仍顯得較為繁複,需要使用者執行多次操作。因此,為了提高使用者體驗,本說明書提供一種新的顯示DOI的方法及裝置。Mobile payment is a method of using mobile terminals to perform payment services. According to different technical means or payment methods, mobile payment can be divided into multiple methods, such as SMS payment, QR code payment, and fingerprint payment. At present, scanning code payment is more convenient than other methods and has lower hardware requirements, so it has become the mainstream mobile payment method. In the prior art, the process of scanning code payment is: when a user needs to perform a payment service (for example, when paying for a purchased product), start a payment application installed on a mobile terminal (for example, a mobile phone), and operate the payment The application allows the payment application to create and display a Digital Object Identifier (DOI) used to execute the payment service, and the merchant scans the DOI to obtain the information required to execute the payment service and complete the payment service. Among them, the commonly used DOI is a two-dimensional barcode. Compared with other mobile payment methods, users usually only need to perform a click operation (for example, click the payment application, click the payment icon) when scanning the QR code, which is more convenient, as shown in Figure 1. FIG. 1 is a schematic diagram of operations that a user needs to perform when scanning a code for payment in the prior art. The arrows in Figure 1 are the sequence of user operations, that is, first click the payment application, and then click the payment icon, the payment application displays a two-dimensional barcode. However, compared to new payment methods using biological characteristics (eg, fingerprints, voiceprints, etc.), the scan code payment method is still more complicated, requiring users to perform multiple operations. Therefore, in order to improve the user experience, this specification provides a new method and device for displaying DOI.

本說明書實施例提供一種顯示數位物件唯一識別符的方法及裝置,用於解決現有掃碼支付方法,使用者操作不夠便利,使用者體驗差的問題。 本說明書實施例採用下述技術方案: 一種顯示數位物件唯一識別符的方法,包括: 監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 從所述第一應用獲取數位物件唯一識別符; 將所述第一應用的圖標替換為所述數位物件唯一識別符。 一種顯示數位物件唯一識別符的裝置,包括: 監測模組,監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 獲取模組,從所述第一應用獲取數位物件唯一識別符; 替換模組,將所述第一應用的圖標替換為所述數位物件唯一識別符。 一種終端,其中,所述伺服器包括:一個或多個處理器及記憶體,記憶體儲存有程式,並且被配置成由一個或多個處理器執行以下步驟: 監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 從所述第一應用獲取數位物件唯一識別符; 將所述第一應用的圖標替換為所述數位物件唯一識別符。 本說明書實施例採用的上述至少一個技術方案能夠達到以下有益效果: 通過本說明書提供的方法及裝置,在監測到使用者對第二應用的子程式(即,第一應用)的圖標的操作時,可從該第一應用獲取DOI,再將該第一應用的圖標替換為該DOI。使得使用者在通過DOI進行掃碼支付時,無需再進入應用的界面中進行操作,而只需對該第一應用的圖標進行的操作即可。並且,可將該第一應用圖標替換為DOI進行掃碼支付,而無需通過該第一應用或者第二應用的界面展示該DOI。簡化了使用者的操作,提高了使用者體驗。The embodiments of the present specification provide a method and device for displaying a unique identifier of a digital object, which are used to solve the problem of insufficient user operation and poor user experience in the existing scan code payment method. The embodiments of this specification adopt the following technical solutions: A method for displaying unique identifiers of digital objects, including: Monitoring the user's operation on the icon of the first application, where the first application is a subprogram of the second application; Obtaining a unique identifier of the digital object from the first application; Replace the icon of the first application with the unique identifier of the digital object. A device for displaying unique identifiers of digital objects, including: The monitoring module monitors the user's operation on the icon of the first application, where the first application is a subprogram of the second application; An obtaining module, which obtains the unique identifier of the digital object from the first application; The replacement module replaces the icon of the first application with the unique identifier of the digital object. A terminal, wherein the server includes: one or more processors and a memory, the memory stores a program, and is configured to execute the following steps by the one or more processors: Monitoring the user's operation on the icon of the first application, where the first application is a subprogram of the second application; Obtaining a unique identifier of the digital object from the first application; Replace the icon of the first application with the unique identifier of the digital object. The above at least one technical solution adopted in the embodiments of this specification can achieve the following beneficial effects: With the method and device provided in this specification, when the user's operation of the icon of the second application's sub-program (ie, the first application) is monitored, the DOI can be obtained from the first application, and then the first application’s The icon is replaced with the DOI. Therefore, when the user scans and pays through the DOI, he does not need to enter the application interface to perform operations, but only needs to perform operations on the icon of the first application. In addition, the first application icon can be replaced with a DOI for scanning code payment without displaying the DOI through the interface of the first application or the second application. It simplifies the user's operation and improves the user experience.

在現有技術中,通過掃碼支付的方式進行行動支付的過程具體可以如圖2所示: S100:買家的第一終端產生並顯示DOI(如,二維條碼),S102:商戶通過第二終端掃描該二維條碼,獲取執行支付業務所需的業務資料(如,買家的帳戶資訊等),S104:商戶根據該業務資料向相應的支付平臺發起支付請求(如,第二終端將該業務資料攜帶在支付請求中發送給該支付平臺的伺服器),S106:支付平臺的伺服器根據接收到的該支付請求,執行相應的支付業務,並將該執行結果返回該第一終端。 其中,第一終端為買家使用的終端,因此步驟S100中第一終端產生DOI的過程,可參考圖1所示現有技術產生二維條碼的過程。即,使用者通過多步操作,使該第一終端顯示DOI。 而本說明書提供的顯示數位物件唯一識別符的過程,也屬圖2所示的業務執行過程中步驟S100的過程。 為使本說明書的目的、技術方案和優點更加清楚,下面將結合本說明書具體實施例及相應的附圖對本發明技術方案進行清楚、完整地描述。顯然,所描述的實施例僅是本發明一部分實施例,而不是全部的實施例。基於說明書中的實施例,本領域普通技術人員在沒有做出進步性勞動前提下所獲得的所有其他實施例,都屬本發明保護的範圍。 以下結合附圖,詳細說明本發明各實施例提供的技術方案。 圖3為說明書實施例提供的一種顯示數位物件唯一識別符的過程,具體可包括以下步驟: S200:監測使用者對第一應用的圖標的操作。 在本說明書一個或多個實施例中,可由終端執行顯示DOI的過程。其中,該DOI中可包含執行支付業務所需的業務資料。該顯示DOI的過程可以是支付業務的過程中的一環,即,通過掃碼支付的方式執行的支付業務。 當然,本說明書對該DOI中包含何種業務資料不做限定,具體可根據需要進行設置。例如,執行支付業務所需的業務資料,執行添加好友業務所需的業務資料,等等。為了方便描述,本說明書中後續以該DOI中包含的業務資料是執行支付業務所需的業務資料為例進行說明。 另外,當應用中整合多種功能時,不同的功能可以通過該應用不同的子程式實現。其中,應用的主程式可通過主進程(也稱為父進程)運行,各子程式可分別通過子進程運行,並獨立的執行業務,如圖4所示。 圖4為整合多個子程式的應用的結構示意圖,其中,該應用的主程式可通過一個主進程運行,而可實現各功能的子程式也可分別通過不同的子進程獨立的運行。左側包含各子程式的矩形為該應用的主程式,可將各子程式也是該主程式的一部分,但也可的通過不同的子獨立的運行。 在本說明書中,該第一應用為提供DOI的應用,並且該第一應用可以是第二應用的子程式。並且,由於該DOI中包含的可以是執行支付業務所需的業務資料,因此,該第二應用和/或該第一應用可以是具有支付功能的應用。也就是說,只要該第一應用、該第二應用至少有一個是支付應用即可。 進一步地,對於包含多個可獨立運行的子程式的應用,該應用中不同的子程式可對應不同的圖標,以使使用者可方便的啟動該子程式,而無需啟動該應用的主進程,如圖5所示。 在圖5中的手機的系統界面中顯示了一個應用的圖標,以及該應用的子程式的圖標。其中,圖標為A為啟動應用的主程式的入口(即,第二應用的圖標),圖標為

Figure 02_image001
為啟動該應用的子程式的入口(即,第一應用的圖標)。當然,刪除該子程式的圖標並不意味著刪除了該子程式,而僅僅是刪除了啟動該子程式的入口。同理,添加子程式的圖標也僅僅是添加了啟動子程式的入口。為方便理解,後續說明書附圖中第一應用的圖標名稱為“應用”,第二應用的圖標名稱為“快捷方式”。 在本說明書中,該終端可監測使用者對第一應用的圖標的操作,以啟動該第一應用,便於後續步驟獲取DOI。其中,該第一應用的圖標,可以是該第二應用在確定不存在第一應用的圖標時創建的。具體的,由於第一應用為第二應用的子程式,因此第二應用為主程式,當主程式啟動後,可判斷是否存在該第一應用的子程式的圖標,若不存在,則創建該第一應用的圖標,若存在,則不進行處理。使得使用者無需手動創建該第一應用的圖標,而由該第二應用自行創建。 另外,在本說明書中,該終端具體可以是手機、平板電腦、個人電腦等設備,當然,本說明書對此不做限定。為方便描述,後續以該終端為行動終端,具體為手機為例進行說明。當該顯示DOI的過程應用於圖2所示的業務執行過程中時,該行動終端可為圖2中的第一終端。 S202:從所述第一應用獲取數位物件唯一識別符。 在本說明書中,當該行動終端監測到使用者對該第一應用的圖標執行操作後,可啟動該第一應用,使該第一應用獲取DOI,並進一步從該第一應用獲取該DOI。 由於本說明書提供的顯示DOI方法,為解決現有採用掃碼支付方式使用者操作較為複雜的問題,因此為了簡化使用者的操作,獲取該DOI的過程無需使用者操作。而為了避免使用者執行不必要的操作,該行動終端獲得該DOI的過程可在使用者的感知外進行。 具體的,該行動終端可以在後臺啟動該第一應用,使該第一應用獲得包含執行支付業務所需的業務資料的DOI,則該行動終端可從第一應用獲取該DOI。其中,該DOI具體可以是二維條碼。而執行支付業務具體需要哪些業務資料,可根據需要設置,本說明書對此不做限定。例如,通過掃碼支付的方式執行支付業務時,買方需要產生包含身份識別的二維條碼,則該業務資料可為身份識別,等等。 另外,該二維條碼可以是第一應用根據業務資料創建的,或者也可以是由第二應用或者伺服器根據業務資料創建後,再提供給該第一應用的。若是前一種情況,則該第一應用是創建並提供該二維條碼的應用,而若是後一種情況,則該第一應用僅為獲取二維條碼的應用。當然,由於創建二維條碼的方式已經有多種成熟的方法,因此本說明書對此不再贅述,只要該行動終端獲取該二維條碼的過程無需使用者進一步執行操作,並且是在後臺進行的即可。 進一步地,由於支付業務涉及使用者的隱私,所以通常為了保證業務執行的安全性,在執行支付業務之前還需要對使用者的身份進行驗證。因此在本說明書中,該第一應用在獲得該二維條碼之前,還可確定使用者的身份驗證通過。並且,當第一應用以不同的方式獲得二維條碼時,該身份驗證的過程可不完全相同。 具體的,在本說明書中,身份驗證的過程可包括:確定帳戶登錄狀態、確定登錄有效期、確定風控結果為通過等身份驗證的過程中的至少一種,本說明書對此不做限定。為方便描述,以第一應用從第二應用獲取業務資料為例進行說明。當第一應用向第二應用發送獲取請求時,可由第二應用執行該身份驗證過程,並在身份驗證通過後,確定業務資料並返回該第一應用。其中,第二應用可判斷自身是否存在處於登錄狀態的帳戶,若是,則確定身份驗證通過,若否,則確定不通過。或者,第二應用也可判斷自身記錄的處於登錄狀態的帳戶的登錄時間是否在登錄有效期內,若是,則確定身份驗證通過,若否,則確定不通過。或者,由該第二應用,根據處於登錄狀態的帳戶的資訊,對該帳戶進行風控,並當風控結果為通過時,確定身份驗證通過,當風控結果為不通過時,確定身份驗證不通過。 當然,上述身份驗證過程也可由伺服器執行。而具體如何進行身份驗證已經是較為成熟的技術,可以根據需要進行設置,本說明書對此不做限定,並不再贅述。 更進一步地,若該第一應用確定身份驗證結果為不通過,則為了提示使用者該二維條碼未能成功創建,該第一應用還可創建提示資訊對應的影像。其中,該提示資訊可為身份認證不通過的提示資訊。則該行動終端還可獲取身份認證不通過的提示資訊對應的影像。 另外,在本說明書中,該第一應用在創建該二維條碼時,可根據該第一應用的圖標的尺寸,創建尺寸不大於該圖標的尺寸的二維條碼的影像。 具體的,由於通常應用的圖標是位圖,因此在創建在二維條碼的影像時,可創建不超過該第一應用的圖標長寬的二維條碼的影像。當然,為了儘量增加二維條碼的容量,第一應用可創建與該第一應用的圖標尺寸一致的二維條碼的影像,如圖6所示。 圖6為本說明書實施例提供的二維條碼影像的尺寸的示意圖。其中,左側為第一應用的圖標,其大小為32×32,右側為第一應用創建的尺寸不大於該圖標的尺寸的二維條碼的影像,其大小也為32×32。 進一步地,第一應用在創建該身份認證不通過的提示資訊對應的影像時,該提示資訊對應的影像的尺寸也可不超過該第一應用的圖標的尺寸。並且,該影像中可以是文字的形式,提示使用者身份認證不通過的原因。如圖7所示,可見各種提示資訊對應的影像中,以文字形式顯示了“請登錄”、“登錄超時”、“未開通伺服”等提示資訊。 S204:將所述第一應用的圖標替換為所述數位物件唯一識別符。 在本說明書實施例中,當獲得二維條碼之後,該行動終端便可將第一應用的圖標替換為該二維條碼。以使得後續第三方(如,賣家、商戶等)可通過掃描該二維條碼,獲取執行支付業務所需的業務資料,並執行支付業務。即,圖2中S102~S106的各步驟,本說明書對此不再贅述。 另外,該行動終端在將影像或二維條碼展示在第一應用的圖標上時,若該行動終端的系統程式中有快捷方式管理模組時,可由在步驟S202中啟動的第一應用,向該快捷方式管理模組發送攜帶有該二維條碼(或者該二維條碼的儲存地址)的替換請求,並由該快捷方式管理模組替換該第一應用的圖標,如圖8所示。當然,不同的系統程式可採用不完全相同的方法替換該第一應用的圖標,具體可根據該應用安裝環境(即,系統)確定,本說明書對此不做限定。同理,若步驟S202產生的是身份認證不通過的提示資訊對應的影像,也可採用相同的方式替換該第一應用的圖標。 其中,該第一應用的圖標,用於提示使用者點擊該圖標可獲取二維條碼,本說明書對該第一應用的圖標的內容不做限定。如,該第一應用的圖標的內容可以為文字“獲取二維條碼”,或者影像示意圖,等等。 基於圖3所示的顯示數位物件唯一識別符的過程,終端可監測使用者對第二應用的子程式(即,第一應用)的圖標的操作,並從該第一應用獲取DOI,再將第一應用的圖標替換為該DOI。當在通過掃碼支付的方式執行支付業務時,使用者只需點擊第一應用的圖標,便可使該圖標替換為執行掃碼支付所需的二維條碼,使得使用者可以不用進入應用的界面便完成支付業務,提高了使用者體驗。同時,由於產生二維條碼的第一應用僅為該第二應用中的一個子程式,所以本方法可以避免啟動第二應用的主程式以及其他與支付業務無關的子程式,減少了資源消耗,提高了業務執行的速度以及效率。 另外,如圖2所示的業務執行過程中,可見伺服器還會向行動終端返回業務執行結果。同理在本說明書實施例中,行動終端在執行步驟S204之後,還可接收到伺服器返回的基於該DOI執行業務的執行結果(如,支付結果)。 於是,該行動終端還可根據接收到的執行結果,替換該第一應用的圖標。具體的,行動終端在接收該伺服器返回的支付結果之後,可採用與步驟S202中產生提示資訊對應的影像相同的方法,根據該支付結果產生支付結果對應的影像,。然後,該行動終端可採用與步驟S204中相同的方法,將第一應用的圖標替換為該支付結果對應的影像,如圖9所示。在圖9中,第一應用的圖標替換為“支付成功”的支付結果對應的影像。 進一步地,在本說明書中,由於替換第一應用的圖標以外,該行動終端還可在接收到基於該DOI執行業務的執行結果後,通過替換第一應用的圖標的名稱,提示使用者該業務的執行結果。 更進一步地,由於掃碼支付通常不需要使用者確認,所以存在二維條碼被人盜用的情況。在現有技術中,除了提高二維條碼的更新速度以外(即,減少二維條碼的生命週期),對於大額支付交易,還可採用要求使用者對交易進行二次確認的方式,避免二維條碼盜用的情況發生。例如,當使用者提供的二維條碼被第三方掃描之後,支付應用會根據伺服器返回的資訊,跳轉至確認頁面要求使用者對本次交易進行二次確認,並且只有當使用者二次確認執行時,該交易業務才會執行。其中,該伺服器返回的資訊,可以包含該交易的具體資訊,例如交易金額、交易物件、交易物品等等,用於使使用者能根據該資訊確認該交易是自己要求執行的交易。 因此,在本說明書實施例中,該行動終端也可接收伺服器返回的資訊,並根據該資訊顯示提示資訊。或者,該行動終端根據該資訊產生提示影像並替換該第一應用的圖標。例如,該子程式可產生包含“點擊確認”的文字的影像,並將第一應用的圖標替換為該影像,如圖10a所示。或者,行動終端也可將該提示資訊發送至消息欄中,使該行動終端顯示如圖10b所示的界面,其中,可見該手機界面的消息欄中,顯示了“再次點擊快捷方式,以確認執行”的提示資訊。以提示使用者需要再次點擊該第一應用的圖標進行二次確認。 另外,由於通常二維條碼都是有生命週期的,因此在步驟S204中,若該行動終端未能在一個生命週期內接收到伺服器返回的業務執行結果,則該行動終端可以再次重複步驟S202以及步驟S204,重新替換該第一應用的圖標(即,用新的二維條碼替換舊的二維條碼)。或者,該行動終端未能在一個生命週期內接收到伺服器返回的業務執行結果,也可將該二維條碼重新替換為第一應用預設顯示的圖標。 進一步地,在本說明書中,行動終端在根據伺服器返回的執行結果替換該第一應用的圖標之後,還可將該第一應用的圖標恢復為預設顯示的圖標。具體的,該行動終端可以判斷將執行結果對應的影像替換該第一應用的圖標的時長是否超過預設時長,若是,則不進行處理,若否,則恢復該第一應用的圖標為預設顯示的圖標。該預設時長可以根據需要設置,用於在短時間內提示使用者該支付業務的執行結果。 需要說明的是,本說明書實施例所提供方法的各步驟的執行主體均可以是同一設備,或者,該方法也由不同設備作為執行主體。比如,步驟S200和步驟S202的執行主體可以為設備1,步驟S202的執行主體可以為設備2;或者,步驟S200的執行主體可以為設備1,步驟S202和步驟S204的執行主體可以為設備2;等等。上述對本說明書特定實施例進行了描述。其它實施例在所附申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在附圖中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多工處理和平行處理也是可以的或者可能是有利的。 基於圖3所示的顯示數位物件唯一識別符的方法,本說明書實施例還提供一種顯示DOI的裝置,如圖11所示。 圖11為本說明書實施例提供的一種顯示數位物件唯一識別符的裝置的結構示意圖,所述裝置包括: 監測模組300,監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 獲取模組302,從所述第一應用獲取數位物件唯一識別符; 替換模組304,將所述第一應用的圖標替換為所述數位物件唯一識別符。 所述第一應用的圖標為所述第二應用在確定不存在所述第一應用的圖標時創建的。 所述獲取模組302,在後臺啟動所述第一應用,並通過所述第一應用獲取所述數位物件唯一識別符,其中,所述第一應用根據執行業務所需的業務資料,創建所述數位物件唯一識別符。 所述獲取模組302,從所述第一應用獲取數位物件唯一識別符之前,所述第一應用向所述第二應用發送獲取請求,使所述第二應用根據處於登錄狀態的帳戶進行身份驗證,並在身份驗證通過後,將執行業務所需的業務資料返回所述第一應用,或者所述第一應用向伺服器發送獲取請求,使所述伺服器根據所述第一應用或者所述第二應用中處於登錄狀態的帳戶進行身份驗證,並在身份驗證通過後,將執行業務所需的業務資料返回所述第一應用。 所述替換模組304,當確定身份認證不通過時,獲取身份認證不通過的提示資訊對應的影像,將所述第一應用的圖標替換為所述提示資訊對應的影像。 所述替換模組304,將所述第一應用的圖標替換為所述數位物件唯一識別符之後,接收基於所述數位物件唯一識別符執行業務的執行結果,根據所述執行結果,產生提示影像,將所述第一應用的圖標替換為所述提示影像。 所述替換模組304,將所述第一應用的圖標替換為所述數位物件唯一識別符之後,接收基於所述數位物件唯一識別符執行業務的執行結果,根據所述執行結果,替換所述圖標的名稱。 所述第一應用和/或所述第二應用為具有支付功能的應用,所述數位物件唯一識別符為支付二維條碼。 基於圖3所述的顯示數位物件唯一識別符的方法,本說明書對應提供一種終端,如圖12所示,其中,所述伺服器包括:一個或多個處理器及記憶體,記憶體儲存有程式,並且被配置成由一個或多個處理器執行以下步驟: 監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 從所述第一應用獲取數位物件唯一識別符; 將所述第一應用的圖標替換為所述數位物件唯一識別符。 在20世紀90年代,對於一個技術的改進可以很明顯地區分是硬體上的改進(例如,對二極體、電晶體、開關等電路結構的改進)還是軟體上的改進(對於方法流程的改進)。然而,隨著技術的發展,當今的很多方法流程的改進已經可以視為硬體電路結構的直接改進。設計人員幾乎都通過將改進的方法流程編程到硬體電路中來得到相應的硬體電路結構。因此,不能說一個方法流程的改進就不能用硬體實體模組來實現。例如,可程式設計邏輯裝置可程式裝置(Programmable Logic Device,PLD)(例如現場可程式閘陣列(Field Programmable Gate Array,FPGA))就是這樣一種積體電路,其邏輯功能由使用者對裝置編程來確定。由設計人員自行編程來把一個數位系統“整合”在一片PLD上,而不需要請晶片製造廠商來設計和製作專用的積體電路晶片。而且,如今,取代手工地製作積體電路晶片,這種編程也多半改用“邏輯編譯器(logic compiler)”軟體來實現,它與程式開發撰寫時所用的軟體編譯器相類似,而要編譯之前的原始碼也得用特定的編程語言來撰寫,此稱之為硬體描述語言(Hardware Description Language,HDL),而HDL也並非僅有一種,而是有許多種,如ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL (Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)與Verilog。本領域中具有通常知識者也應該清楚,只需要將方法流程用上述幾種硬體描述語言稍作邏輯編程並編程到積體電路中,就可以很容易得到實現該邏輯方法流程的硬體電路。 控制器可以按任何適當的方式實現,例如,控制器可以採取例如微處理器或處理器以及儲存可由該(微)處理器執行的電腦可讀程式碼(例如軟體或韌體)的電腦可讀媒體、邏輯閘、開關、特殊應用積體電路(Application Specific Integrated Circuit,ASIC)、可程式邏輯控制器和嵌入微控制器的形式,控制器的例子包括但不限於以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,記憶體控制器還可以被實現為記憶體的控制邏輯的一部分。本領域中具有通常知識者也知道,除了以純電腦可讀程式碼方式實現控制器以外,完全可以通過將方法步驟進行邏輯編程來使得控制器以邏輯閘、開關、特殊應用積體電路、可程式邏輯控制器和嵌入微控制器等的形式來實現相同功能。因此這種控制器可以被認為是一種硬體部件,而對其內包括的用於實現各種功能的裝置也可以視為硬體部件內的結構。或者甚至,可以將用於實現各種功能的裝置視為既可以是實現方法的軟體模組又可以是硬體部件內的結構。 上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦。具體的,電腦例如可以為個人電腦、膝上型電腦、行動電話、相機電話、智慧電話、個人數位助理、媒體播放器、導航設備、電子郵件設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任何設備的組合。 為了描述的方便,描述以上裝置時以功能分為各種單元分別描述。當然,在實施本發明時可以把各單元的功能在同一個或多個軟體和/或硬體中實現。 本領域內的技術人員應明白,本發明的實施例可提供為方法、系統、或電腦程式產品。因此,本發明可採用完全硬體實施例、完全軟體實施例、或結合軟體和硬體態樣的實施例的形式。而且,本發明可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。 本發明是參照根據本發明實施例的方法、設備(系統)、和電腦程式產品的流程圖和/或方塊圖來描述的。應理解可由電腦程式指令實現流程圖和/或方塊圖中的每一流程和/或方塊、以及流程圖和/或方塊圖中的流程和/或方塊的結合。可提供這些電腦程式指令到通用電腦、專用電腦、嵌入式處理機或其他可程式資料處理設備的處理器以產生一個機器,使得通過電腦或其他可程式資料處理設備的處理器執行的指令產生用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的裝置。 這些電腦程式指令也可儲存在能引導電腦或其他可程式資料處理設備以特定方式工作的電腦可讀記憶體中,使得儲存在該電腦可讀記憶體中的指令產生包括指令裝置的製造品,該指令裝置實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能。 這些電腦程式指令也可裝載到電腦或其他可程式資料處理設備上,使得在電腦或其他可程式設備上執行一系列操作步驟以產生電腦實現的處理,從而在電腦或其他可程式設備上執行的指令提供用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的步驟。 在一個典型的配置中,計算設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和內部記憶體。 內部記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或內部記憶體非揮發性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。內部記憶體是電腦可讀媒體的示例。 電腦可讀媒體包括永久性和非永久性、可行動和非可行動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可編程唯讀記憶體(EEPROM)、快閃記憶體或其他內部記憶體技術、光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶式磁碟儲存器或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 本領域中具有通常知識者應明白,本發明的實施例可提供為方法、系統或電腦程式產品。因此,本發明可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體態樣的實施例的形式。而且,本發明可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。 本發明可以在由電腦執行的電腦可執行指令的一般上下文中描述,例如程式模組。一般地,程式模組包括執行特定任務或實現特定抽象資料類型的常式、程式、物件、組件、資料結構等等。也可以在分散式計算環境中實踐本發明,在這些分散式計算環境中,由通過通信網路而被連接的遠端處理設備來執行任務。在分散式計算環境中,程式模組可以位於包括儲存設備在內的本地和遠端電腦儲存媒體中。 本說明書中的各個實施例均採用循序的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於系統實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。 以上所述僅為本發明的實施例而已,並不用於限制本發明。對於本領域中具有通常知識者來說,本發明可以有各種更改和變化。凡在本發明的精神和原理之內所作的任何修改、等同替換、改進等,均應包含在本發明的申請專利範圍之內。In the prior art, the process of mobile payment by scanning code payment can be specifically shown in Figure 2: S100: the buyer’s first terminal generates and displays DOI (eg, two-dimensional barcode), S102: the merchant passes the second The terminal scans the two-dimensional bar code to obtain the business information (such as buyer’s account information, etc.) required to perform the payment service. S104: The merchant initiates a payment request to the corresponding payment platform based on the business data (such as the second terminal The service data is carried in the payment request and sent to the server of the payment platform), S106: The server of the payment platform executes the corresponding payment service according to the received payment request, and returns the execution result to the first terminal. The first terminal is the terminal used by the buyer, so the process of generating the DOI by the first terminal in step S100 can refer to the process of generating a two-dimensional barcode in the prior art shown in FIG. 1. That is, the user makes the first terminal display DOI through multiple operations. The process of displaying the unique identifier of the digital object provided in this specification also belongs to the process of step S100 in the service execution process shown in FIG. 2. In order to make the purpose, technical solutions and advantages of this specification clearer, the technical solutions of the present invention will be described clearly and completely in conjunction with specific embodiments of this specification and the corresponding drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments in the specification, all other embodiments obtained by a person of ordinary skill in the art without making progressive work fall within the protection scope of the present invention. The technical solutions provided by the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. FIG. 3 is a process of displaying a unique identifier of a digital object provided by an embodiment of the specification, which may specifically include the following steps: S200: monitoring the user's operation on the icon of the first application. In one or more embodiments of this specification, the process of displaying the DOI may be performed by the terminal. Among them, the DOI may include business data required to perform payment services. The process of displaying the DOI may be a part of the payment service process, that is, the payment service performed by scanning a code. Of course, this manual does not limit what kind of business data is included in the DOI, and it can be specifically set as needed. For example, business data required to perform payment services, business data required to perform add friend services, and so on. For the convenience of description, the following description in this manual will take the business data contained in the DOI as the business data required to execute the payment business as an example. In addition, when multiple functions are integrated in an application, different functions can be implemented through different subprograms of the application. Among them, the main program of the application can be run through the main process (also referred to as the parent process), and each sub-program can be run through the child process separately, and execute business independently, as shown in Figure 4. FIG. 4 is a schematic diagram of the structure of an application integrating multiple sub-programs, wherein the main program of the application can be run through a main process, and the sub-programs that can realize each function can also be run independently through different sub-processes. The rectangle on the left that contains the sub-programs is the main program of the application. Each sub-program can also be a part of the main program, but it can also be run independently through different sub-programs. In this specification, the first application is an application that provides DOI, and the first application may be a subprogram of the second application. In addition, since the DOI may include business data required to perform payment services, the second application and/or the first application may be applications with payment functions. That is, as long as at least one of the first application and the second application is a payment application. Furthermore, for an application that contains multiple independently runable subprograms, different subprograms in the application can correspond to different icons, so that the user can easily start the subprogram without starting the main process of the application. As shown in Figure 5. In the system interface of the mobile phone in FIG. 5, an icon of an application and icons of subprograms of the application are displayed. Among them, the icon A is the entry of the main program that starts the application (ie, the icon of the second application), and the icon is
Figure 02_image001
It is the entry of the sub-program to start the application (ie, the icon of the first application). Of course, deleting the icon of the subprogram does not mean that the subprogram is deleted, but merely the entry to start the subprogram. In the same way, the icon for adding a subprogram is only an entry for starting the subprogram. To facilitate understanding, the icon name of the first application in the accompanying drawings in the subsequent description is "application", and the icon name of the second application is "shortcut". In this specification, the terminal can monitor the user's operation on the icon of the first application to start the first application, facilitating the subsequent steps to obtain the DOI. The icon of the first application may be created by the second application when it is determined that there is no icon of the first application. Specifically, because the first application is a sub-program of the second application, the second application is the main program. When the main program is started, it can be determined whether there is an icon of the first application's sub-program, and if it does not exist, create the If the icon of the first application exists, it will not be processed. Therefore, the user does not need to manually create the icon of the first application, but is created by the second application. In addition, in this specification, the terminal can be a mobile phone, a tablet computer, a personal computer, etc., of course, this specification does not limit this. For the convenience of description, the terminal is used as a mobile terminal, specifically a mobile phone as an example. When the process of displaying DOI is applied to the service execution process shown in FIG. 2, the mobile terminal may be the first terminal in FIG. 2. S202: Obtain a unique identifier of the digital object from the first application. In this specification, after the mobile terminal monitors that the user performs an operation on the icon of the first application, the first application can be started to enable the first application to obtain the DOI, and further obtain the DOI from the first application. Since the DOI display method provided in this manual solves the problem of complicated user operations in the existing payment method by scanning code, in order to simplify the user's operation, the process of obtaining the DOI does not require user operation. In order to prevent the user from performing unnecessary operations, the process of obtaining the DOI by the mobile terminal can be performed outside the user's perception. Specifically, the mobile terminal may start the first application in the background, so that the first application obtains a DOI containing service data required to execute a payment service, and the mobile terminal may obtain the DOI from the first application. Wherein, the DOI may specifically be a two-dimensional barcode. The specific business data required for the execution of the payment business can be set as required, and this manual does not limit this. For example, when a payment service is executed by scanning a code, the buyer needs to generate a two-dimensional bar code containing identification, then the business information can be identification, and so on. In addition, the two-dimensional barcode may be created by the first application based on the business data, or it may be created by the second application or server based on the business data and then provided to the first application. In the former case, the first application is an application that creates and provides the two-dimensional barcode, and in the latter case, the first application is only an application that obtains the two-dimensional barcode. Of course, since there are many mature methods for creating two-dimensional barcodes, this manual will not repeat them, as long as the process of obtaining the two-dimensional barcode by the mobile terminal does not require any further operation by the user, and it is done in the background. can. Further, since the payment service involves the privacy of the user, it is usually necessary to verify the identity of the user before executing the payment service in order to ensure the security of the execution of the service. Therefore, in this specification, before the first application obtains the two-dimensional barcode, it can also determine that the user's identity verification is passed. Moreover, when the first application obtains the two-dimensional barcode in a different manner, the identity verification process may not be completely the same. Specifically, in this specification, the identity verification process may include at least one of the process of determining the account login status, determining the login validity period, and determining that the risk control result is passed, which is not limited in this specification. For the convenience of description, take the first application to obtain business data from the second application as an example for description. When the first application sends an acquisition request to the second application, the second application can perform the identity verification process, and after the identity verification is passed, the business information is determined and returned to the first application. Among them, the second application can determine whether it has an account in the login state, if it is, it determines that the identity verification is passed, and if it is not, it determines that it is not. Alternatively, the second application may also determine whether the login time of the account in the login state recorded by itself is within the login validity period, if yes, it is determined that the identity verification is passed, if not, it is determined that it is not passed. Or, the second application can perform risk control on the account based on the information of the account that is in the logged-in state, and when the risk control result is passed, the identity verification is determined to be passed, and when the risk control result is not passed, the identity verification is determined Fail. Of course, the above authentication process can also be performed by the server. How to perform identity verification is already a relatively mature technology and can be set as required. This manual does not limit this and will not repeat it. Furthermore, if the first application determines that the identity verification result is not passed, in order to prompt the user that the two-dimensional barcode was not successfully created, the first application may also create an image corresponding to the prompt information. Among them, the prompt information may be prompt information that the identity authentication fails. Then the mobile terminal can also obtain the image corresponding to the prompt message that the identity authentication fails. In addition, in this specification, when the first application creates the two-dimensional barcode, it can create an image of the two-dimensional barcode whose size is not larger than the size of the icon according to the size of the icon of the first application. Specifically, since the commonly used icon is a bitmap, when creating an image of a two-dimensional barcode, an image of a two-dimensional barcode that does not exceed the length and width of the icon of the first application can be created. Of course, in order to maximize the capacity of the two-dimensional barcode, the first application may create an image of the two-dimensional barcode with the same size as the icon of the first application, as shown in FIG. 6. FIG. 6 is a schematic diagram of the size of a two-dimensional barcode image provided by an embodiment of this specification. Among them, the left side is the icon of the first application, the size of which is 32×32, and the right side is the image of the two-dimensional barcode created by the first application whose size is not larger than the size of the icon, and its size is also 32×32. Further, when the first application creates the image corresponding to the prompt information that the identity authentication fails, the size of the image corresponding to the prompt information may not exceed the size of the icon of the first application. Moreover, the image can be in the form of text, prompting the user the reason for the failure of identity authentication. As shown in Figure 7, it can be seen that in the images corresponding to various prompt information, prompt information such as "please log in", "login timeout", and "servo not activated" are displayed in text form. S204: Replace the icon of the first application with the unique identifier of the digital object. In the embodiment of the present specification, after obtaining the two-dimensional barcode, the mobile terminal can replace the icon of the first application with the two-dimensional barcode. This allows subsequent third parties (for example, sellers, merchants, etc.) to scan the two-dimensional bar code to obtain the business information required to execute the payment service and execute the payment service. That is, the steps from S102 to S106 in FIG. 2 will not be repeated in this specification. In addition, when the mobile terminal displays an image or a two-dimensional barcode on the icon of the first application, if there is a shortcut management module in the system program of the mobile terminal, the first application activated in step S202 can be sent to The shortcut management module sends a replacement request carrying the two-dimensional barcode (or the storage address of the two-dimensional barcode), and the shortcut management module replaces the icon of the first application, as shown in FIG. 8. Of course, different system programs can use different methods to replace the icon of the first application, which can be specifically determined according to the application installation environment (ie, system), which is not limited in this specification. In the same way, if the image corresponding to the prompt information that the identity authentication fails is generated in step S202, the icon of the first application can also be replaced in the same way. Wherein, the icon of the first application is used to prompt the user to click on the icon to obtain a two-dimensional barcode, and the content of the icon of the first application is not limited in this specification. For example, the content of the icon of the first application may be the text "obtain a two-dimensional barcode", or an image diagram, and so on. Based on the process of displaying the unique identifier of the digital object shown in FIG. 3, the terminal can monitor the user's operation on the icon of the subprogram of the second application (ie, the first application), and obtain the DOI from the first application, and then The icon of the first application is replaced with the DOI. When the payment service is executed by scanning the code, the user only needs to click the icon of the first application to replace the icon with the QR code required to perform the scanning payment, so that the user does not need to enter the application The interface completes the payment business and improves the user experience. At the same time, since the first application that generates the two-dimensional barcode is only a sub-program in the second application, this method can avoid starting the main program of the second application and other sub-programs that have nothing to do with payment services, and reduce resource consumption. Improve the speed and efficiency of business execution. In addition, during the service execution process shown in Figure 2, it can be seen that the server will also return the service execution result to the mobile terminal. Similarly, in the embodiment of this specification, after performing step S204, the mobile terminal may also receive the execution result (for example, payment result) of the service executed based on the DOI returned by the server. Therefore, the mobile terminal can also replace the icon of the first application according to the received execution result. Specifically, after receiving the payment result returned by the server, the mobile terminal can use the same method as the image corresponding to the prompt information generated in step S202 to generate an image corresponding to the payment result according to the payment result. Then, the mobile terminal can use the same method as in step S204 to replace the icon of the first application with the image corresponding to the payment result, as shown in FIG. 9. In FIG. 9, the icon of the first application is replaced with an image corresponding to the payment result of "payment successful". Further, in this specification, in addition to replacing the icon of the first application, the mobile terminal can also prompt the user to replace the name of the icon of the first application after receiving the execution result of executing the service based on the DOI. The results of the implementation. Furthermore, since scan code payment usually does not require user confirmation, there are cases where the two-dimensional barcode is stolen. In the prior art, in addition to increasing the update speed of the two-dimensional barcode (ie, reducing the life cycle of the two-dimensional barcode), for large-value payment transactions, a method that requires the user to confirm the transaction a second time can also be used to avoid the two-dimensional barcode. Bar code embezzlement occurred. For example, when the two-dimensional barcode provided by the user is scanned by a third party, the payment application will jump to the confirmation page according to the information returned by the server to request the user to confirm the transaction a second time, and only when the user confirms the second time When executed, the transaction will be executed. Among them, the information returned by the server may include specific information about the transaction, such as transaction amount, transaction object, transaction item, etc., to enable the user to confirm that the transaction is a transaction requested by the user based on the information. Therefore, in the embodiment of this specification, the mobile terminal can also receive the information returned by the server, and display prompt information based on the information. Or, the mobile terminal generates a prompt image according to the information and replaces the icon of the first application. For example, the subprogram can generate an image containing the text "click to confirm", and replace the icon of the first application with the image, as shown in FIG. 10a. Alternatively, the mobile terminal can also send the prompt information to the message bar, so that the mobile terminal displays the interface shown in Figure 10b, where it can be seen that the message bar of the mobile phone interface displays "click the shortcut again to confirm "Execute" prompt information. To prompt the user to click the icon of the first application again for a second confirmation. In addition, since two-dimensional barcodes usually have a life cycle, in step S204, if the mobile terminal fails to receive the service execution result returned by the server within a life cycle, the mobile terminal can repeat step S202 again And step S204, replace the icon of the first application again (ie, replace the old two-dimensional barcode with the new one). Or, if the mobile terminal fails to receive the service execution result returned by the server within a life cycle, the two-dimensional barcode may be replaced with the icon displayed by the first application preset. Further, in this specification, after replacing the icon of the first application according to the execution result returned by the server, the mobile terminal may also restore the icon of the first application to the icon displayed by default. Specifically, the mobile terminal may determine whether the time period for replacing the icon of the first application with the image corresponding to the execution result exceeds the preset time period, if yes, no processing is performed, if not, the icon of the first application is restored to The icon displayed by default. The preset duration can be set as required, and is used to prompt the user of the execution result of the payment service in a short time. It should be noted that the execution subject of each step of the method provided in the embodiments of this specification may be the same device, or the method may also be executed by different devices. For example, the execution subject of step S200 and step S202 may be device 1, and the execution subject of step S202 may be device 2; or, the execution subject of step S200 may be device 1, and the execution subject of step S202 and step S204 may be device 2; and many more. The foregoing describes specific embodiments of this specification. Other embodiments are within the scope of the attached patent application. In some cases, the actions or steps described in the scope of the patent application may be performed in a different order from the embodiment and still achieve desired results. In addition, the processes depicted in the drawings do not necessarily require the specific order or sequential order shown to achieve the desired result. In some embodiments, multiplexing and parallel processing are also possible or may be advantageous. Based on the method for displaying the unique identifier of a digital object as shown in FIG. 3, an embodiment of this specification also provides a device for displaying DOI, as shown in FIG. 11. FIG. 11 is a schematic structural diagram of a device for displaying a unique identifier of a digital object according to an embodiment of this specification. The device includes: a monitoring module 300 that monitors a user's operation on an icon of a first application, wherein the first The application is a sub-program of the second application; the obtaining module 302 obtains the unique identifier of the digital object from the first application; the replacement module 304 replaces the icon of the first application with the unique identifier of the digital object. The icon of the first application is created by the second application when it is determined that there is no icon of the first application. The acquiring module 302 starts the first application in the background, and acquires the unique identifier of the digital object through the first application, wherein the first application creates the unique identifier of the digital object according to the business data required to execute the business. The unique identifier of the digital object. The acquiring module 302, before acquiring the unique identifier of the digital object from the first application, the first application sends an acquisition request to the second application, so that the second application performs an identity according to the account in the logged-in state After the identity verification is passed, the business data required to execute the business is returned to the first application, or the first application sends an acquisition request to the server, so that the server can make the server according to the first application or the The account in the logged-in state in the second application performs identity verification, and after the identity verification is passed, the business data required to execute the business is returned to the first application. The replacement module 304, when determining that the identity authentication fails, obtains the image corresponding to the prompt information that the identity authentication fails, and replaces the icon of the first application with the image corresponding to the prompt information. The replacement module 304, after replacing the icon of the first application with the unique identifier of the digital object, receives the execution result of executing the service based on the unique identifier of the digital object, and generates a prompt image according to the execution result , Replacing the icon of the first application with the prompt image. The replacement module 304, after replacing the icon of the first application with the unique identifier of the digital object, receives the execution result of executing the service based on the unique identifier of the digital object, and replaces the icon according to the execution result. The name of the icon. The first application and/or the second application are applications with a payment function, and the unique identifier of the digital object is a payment two-dimensional barcode. Based on the method for displaying the unique identifier of a digital object described in FIG. 3, this specification provides a corresponding terminal, as shown in FIG. 12, wherein the server includes: one or more processors and memory, and the memory stores The program is configured to be executed by one or more processors: monitoring the user's operation on the icon of the first application, wherein the first application is a sub-program of the second application; from the first application Acquiring a unique identifier of the digital object; replacing the icon of the first application with the unique identifier of the digital object. In the 1990s, the improvement of a technology can be clearly distinguished between hardware improvements (for example, improvements to the circuit structure of diodes, transistors, switches, etc.) or software improvements (for method flow Improve). However, with the development of technology, the improvement of many methods and processes of today can be regarded as a direct improvement of the hardware circuit structure. Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by the hardware entity module. For example, Programmable Logic Device (Programmable Logic Device, PLD) (such as Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic function is programmed by the user. determine. It is programmed by the designer to "integrate" a digital system on a PLD, without requiring the chip manufacturer to design and manufacture a dedicated integrated circuit chip. Moreover, nowadays, instead of manually making integrated circuit chips, this kind of programming is mostly realized by using "logic compiler" software, which is similar to the software compiler used in program development and writing, but compiles The previous source code must also be written in a specific programming language, which is called the Hardware Description Language (HDL), and there is not only one HDL, but many, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., currently the most Commonly used are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. Those with ordinary knowledge in the field should also be aware that only a little logic programming of the method flow in the above hardware description languages and programming into the integrated circuit can easily obtain the hardware circuit that realizes the logic method flow. . The controller can be implemented in any suitable manner. For example, the controller can be a microprocessor or a processor, and a computer readable program code (such as software or firmware) that can be executed by the (micro) processor. Media, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory control logic. Those with ordinary knowledge in the field also know that in addition to implementing the controller in a purely computer-readable program code, it is completely possible to program the method steps to make the controller use logic gates, switches, special application integrated circuits, and programmable Logic controller and embedded microcontroller are used to achieve the same function. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for realizing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure in a hardware component. The systems, devices, modules or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a laptop computer, a mobile phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices. For the convenience of description, when describing the above device, the functions are divided into various units and described separately. Of course, when implementing the present invention, the functions of each unit can be implemented in the same or multiple software and/or hardware. Those skilled in the art should understand that the embodiments of the present invention can be provided as methods, systems, or computer program products. Therefore, the present invention can take the form of a completely hardware embodiment, a completely software embodiment, or an embodiment combining software and hardware aspects. Moreover, the present invention can be in the form of computer program products implemented on one or more computer-usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer-usable program codes. . The present invention is described with reference to flowcharts and/or block diagrams of methods, equipment (systems), and computer program products according to embodiments of the present invention. It should be understood that each process and/or block in the flowchart and/or block diagram, and the combination of processes and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions can be provided to the processors of general-purpose computers, dedicated computers, embedded processors, or other programmable data processing equipment to generate a machine, so that the instructions executed by the processor of the computer or other programmable data processing equipment are generated It is a device that realizes the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram. These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory generate a manufactured product including the instruction device, The instruction device realizes the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram. These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to generate computer-implemented processing, which can be executed on the computer or other programmable equipment. The instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram. In a typical configuration, the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and internal memory. Internal memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or internal memory non-volatile memory, such as read-only memory (ROM) or flash Memory (flash RAM). Internal memory is an example of computer-readable media. Computer-readable media include permanent and non-permanent, movable and non-movable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other internal memory technology, CD-ROM, digital multi-function optical disc ( DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. It should also be noted that the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, product or equipment including a series of elements not only includes those elements, but also includes Other elements that are not explicitly listed, or include elements inherent to this process, method, commodity, or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity, or equipment that includes the element. Those skilled in the art should understand that the embodiments of the present invention can be provided as methods, systems, or computer program products. Therefore, the present invention can take the form of a completely hardware embodiment, a completely software embodiment, or an embodiment combining software and hardware aspects. Moreover, the present invention can be in the form of computer program products implemented on one or more computer-usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer-usable program codes. . The invention can be described in the general context of computer-executable instructions executed by a computer, such as a program module. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. The present invention can also be practiced in distributed computing environments in which tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules can be located in local and remote computer storage media including storage devices. The various embodiments in this specification are described in a sequential manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiment. The above descriptions are merely embodiments of the present invention, and are not intended to limit the present invention. For those with ordinary knowledge in the field, the present invention can have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included in the scope of the patent application of the present invention.

S100:步驟 S102:步驟 S104:步驟 S106:步驟 S200:步驟 S202:步驟 S204:步驟 300:監測模組 302:獲取模組 304:替換模組S100: steps S102: Step S104: Step S106: Step S200: steps S202: Step S204: Step 300: Monitoring module 302: Get the module 304: Replacement module

此處所說明的附圖用來提供對本發明的進一步理解,構成本發明的一部分,本發明的示意性實施例及其說明用於解釋本發明,並不構成對本發明的不當限定。在附圖中: [圖1]為掃碼支付時使用者操作示意圖; [圖2]為通過掃碼支付的方式進行行動支付的過程; [圖3]為本說明書提供例提供的一種顯示數位物件唯一識別符的過程; [圖4]為整合多個子程式的應用的結構示意圖; [圖5]為本說明書實施例提供的系統界面中應用對應多個圖標的示意圖; [圖6]為本說明書實施例提供的二維條碼影像的尺寸的示意圖; [圖7]為本說明書實施例提供的多種提示資訊對應的影像的示意圖; [圖8]為本說明書實施例提供的更新指定圖標的示意圖; [圖9]為本說明書實施例提供的“支付成功”影像的形式展示在圖標上的示意圖; [圖10a]和[圖10b]為本說明書實施例提供的提示影像的示意圖; [圖11]為本說明書實施例提供的一種顯示數位物件唯一識別符的裝置的結構示意圖; [圖12]為本說明書實施例提供的一種終端的結構示意圖。The drawings described here are used to provide a further understanding of the present invention and constitute a part of the present invention. The exemplary embodiments and descriptions of the present invention are used to explain the present invention, and do not constitute an improper limitation of the present invention. In the attached picture: [Figure 1] is a schematic diagram of user operation when scanning the code to pay; [Figure 2] is the process of mobile payment by scanning code payment; [Figure 3] A process of displaying the unique identifier of a digital object provided by the example provided in this manual; [Figure 4] is a structural diagram of an application integrating multiple sub-programs; [Figure 5] A schematic diagram of multiple icons corresponding to applications in the system interface provided by this embodiment of this specification; [Figure 6] A schematic diagram of the size of the two-dimensional barcode image provided by the embodiment of this specification; [Fig. 7] A schematic diagram of images corresponding to various prompt information provided in the embodiment of this specification; [Figure 8] A schematic diagram of updating the designated icon provided by the embodiment of this specification; [Figure 9] A schematic diagram of the "payment successful" image provided by the embodiment of this specification displayed on the icon; [Figure 10a] and [Figure 10b] are schematic diagrams of prompt images provided by the embodiments of this specification; [FIG. 11] A schematic diagram of the structure of a device for displaying unique identifiers of digital objects according to an embodiment of this specification; [Fig. 12] A schematic diagram of the structure of a terminal provided by an embodiment of this specification.

Claims (15)

一種顯示數位物件唯一識別符的方法,包括: 監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 從所述第一應用獲取數位物件唯一識別符;及 將所述第一應用的圖標替換為所述數位物件唯一識別符; 其中,將所述第一應用的圖標替換為所述數位物件唯一識別符之後,所述方法還包括: 接收基於所述數位物件唯一識別符執行業務的執行結果; 根據所述執行結果,產生提示影像;及 將所述第一應用的圖標替換為所述提示影像。A method for displaying unique identifiers of digital objects, including: Monitoring the user's operation on the icon of the first application, where the first application is a subprogram of the second application; Obtain the unique identifier of the digital object from the first application; and Replacing the icon of the first application with the unique identifier of the digital object; Wherein, after replacing the icon of the first application with the unique identifier of the digital object, the method further includes: Receiving the execution result of executing the service based on the unique identifier of the digital object; Generate a prompt image based on the execution result; and Replace the icon of the first application with the prompt image. 如請求項1所述的方法,所述第一應用的圖標為所述第二應用在確定不存在所述第一應用的圖標時創建的。According to the method described in claim 1, the icon of the first application is created by the second application when it is determined that there is no icon of the first application. 如請求項1所述的方法,從所述第一應用獲取數位物件唯一識別符,具體包括: 在後臺啟動所述第一應用,並通過所述第一應用獲取所述數位物件唯一識別符; 其中,所述數位物件唯一識別符為所述第一應用根據執行業務所需的業務資料獲得的。According to the method described in claim 1, obtaining the unique identifier of the digital object from the first application specifically includes: Start the first application in the background, and obtain the unique identifier of the digital object through the first application; Wherein, the unique identifier of the digital object is obtained by the first application according to the business data required to execute the business. 如請求項3所述的方法,通過所述第一應用獲取所述數位物件唯一識別符之前,所述方法還包括: 所述第一應用根據所述操作向所述第二應用發送獲取請求,使所述第二應用根據處於登錄狀態的帳戶進行身份驗證,並在身份驗證通過後,將執行業務所需的業務資料返回所述第一應用。According to the method described in claim 3, before obtaining the unique identifier of the digital object through the first application, the method further includes: The first application sends an acquisition request to the second application according to the operation, so that the second application performs identity verification based on the account in the logged-in state, and after the identity verification is passed, the business data required to perform the business is sent Return to the first application. 如請求項4所述的方法,當確定身份認證不通過時,所述方法還包括: 從所述第一應用獲取身份認證不通過的提示資訊對應的影像; 將所述第一應用的圖標替換為所述提示資訊對應的影像。For the method described in claim 4, when it is determined that the identity authentication fails, the method further includes: Acquiring, from the first application, an image corresponding to the prompt information that the identity authentication fails; Replace the icon of the first application with an image corresponding to the prompt information. 如請求項1所述的方法,將所述第一應用的圖標替換為所述數位物件唯一識別符之後,所述方法還包括: 接收基於所述數位物件唯一識別符執行業務的執行結果; 根據所述執行結果,替換所述圖標的名稱。According to the method described in claim 1, after replacing the icon of the first application with the unique identifier of the digital object, the method further includes: Receiving the execution result of executing the service based on the unique identifier of the digital object; According to the execution result, the name of the icon is replaced. 如請求項1至6任一項所述的方法,所述第一應用和/或所述第二應用為具有支付功能的應用,所述數位物件唯一識別符為支付二維條碼。According to the method according to any one of claim items 1 to 6, the first application and/or the second application are applications with a payment function, and the unique identifier of the digital object is a payment two-dimensional barcode. 一種顯示數位物件唯一識別符的裝置,包括: 監測模組,監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 獲取模組,從所述第一應用獲取數位物件唯一識別符; 替換模組,將所述第一應用的圖標替換為所述數位物件唯一識別符; 其中,所述替換模組,將所述第一應用的圖標替換為所述數位物件唯一識別符之後,接收基於所述數位物件唯一識別符執行業務的執行結果,根據所述執行結果,產生提示影像,將所述第一應用的圖標替換為所述提示影像。A device for displaying unique identifiers of digital objects, including: The monitoring module monitors the user's operation on the icon of the first application, where the first application is a subprogram of the second application; An obtaining module, which obtains the unique identifier of the digital object from the first application; A replacement module, replacing the icon of the first application with the unique identifier of the digital object; Wherein, the replacement module, after replacing the icon of the first application with the unique identifier of the digital object, receives the execution result of executing the service based on the unique identifier of the digital object, and generates a prompt according to the execution result Image, replacing the icon of the first application with the prompt image. 如請求項8所述的裝置,所述第一應用的圖標為所述第二應用在確定不存在所述第一應用的圖標時創建的。In the device according to claim 8, the icon of the first application is created by the second application when it is determined that there is no icon of the first application. 如請求項8所述的裝置,所述獲取模組,在後臺啟動所述第一應用,並通過所述第一應用獲取所述數位物件唯一識別符,其中,所述第一應用根據執行業務所需的業務資料,創建所述數位物件唯一識別符。According to the device according to claim 8, the acquisition module starts the first application in the background, and acquires the unique identifier of the digital object through the first application, wherein the first application executes the business according to The required business information is used to create the unique identifier of the digital object. 如請求項10所述的裝置,所述獲取模組,所述第一應用根據所述操作向所述第二應用發送獲取請求,使所述第二應用根據處於登錄狀態的帳戶進行身份驗證,並在身份驗證通過後,將執行業務所需的業務資料返回所述第一應用。For the device according to claim 10, the acquisition module, the first application sends an acquisition request to the second application according to the operation, so that the second application performs identity verification according to the account in the logged-in state, And after the identity verification is passed, the business data required to execute the business is returned to the first application. 如請求項10所述的裝置,所述替換模組,當確定身份認證不通過時,獲取身份認證不通過的提示資訊對應的影像,將所述第一應用的圖標替換為所述提示資訊對應的影像。For the device described in claim 10, the replacement module, when determining that the identity authentication fails, obtains the image corresponding to the prompt information that the identity authentication fails, and replaces the icon of the first application with the prompt information corresponding Of the image. 如請求項8所述的裝置,所述替換模組,將所述第一應用的圖標替換為所述數位物件唯一識別符之後,接收基於所述數位物件唯一識別符執行業務的執行結果,根據所述執行結果,替換所述圖標的名稱。According to the device of claim 8, the replacement module, after replacing the icon of the first application with the unique identifier of the digital object, receives the execution result of executing the service based on the unique identifier of the digital object, according to The execution result replaces the name of the icon. 如請求項5至13任一項所述的裝置,所述第一應用和/或所述第二應用為具有支付功能的應用,所述數位物件唯一識別符為支付二維條碼。According to the device according to any one of claim items 5 to 13, the first application and/or the second application are applications with a payment function, and the unique identifier of the digital object is a payment two-dimensional barcode. 一種終端,其中,所述伺服器包括:一個或多個處理器及記憶體,記憶體儲存有程式,並且被配置成由一個或多個處理器執行以下步驟: 監測使用者對第一應用的圖標的操作,其中,所述第一應用為第二應用的子程式; 從所述第一應用獲取數位物件唯一識別符; 將所述第一應用的圖標替換為所述數位物件唯一識別符; 其中,將所述第一應用的圖標替換為所述數位物件唯一識別符之後,所述方法還包括: 接收基於所述數位物件唯一識別符執行業務的執行結果; 根據所述執行結果,產生提示影像;及 將所述第一應用的圖標替換為所述提示影像。A terminal, wherein the server includes: one or more processors and a memory, the memory stores a program, and is configured to execute the following steps by the one or more processors: Monitoring the user's operation on the icon of the first application, where the first application is a subprogram of the second application; Obtaining a unique identifier of the digital object from the first application; Replacing the icon of the first application with the unique identifier of the digital object; Wherein, after replacing the icon of the first application with the unique identifier of the digital object, the method further includes: Receiving the execution result of executing the service based on the unique identifier of the digital object; Generate a prompt image based on the execution result; and Replace the icon of the first application with the prompt image.
TW109111930A 2018-03-01 2018-12-25 Method and device for displaying unique identifier of digital object TWI741555B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810172061.4 2018-03-01
CN201810172061.4A CN108550033B (en) 2018-03-01 2018-03-01 Method and device for displaying unique identifier of digital object

Publications (2)

Publication Number Publication Date
TW202030665A true TW202030665A (en) 2020-08-16
TWI741555B TWI741555B (en) 2021-10-01

Family

ID=63516051

Family Applications (2)

Application Number Title Priority Date Filing Date
TW107146920A TWI694392B (en) 2018-03-01 2018-12-25 Method and device for displaying unique identifier of digital object
TW109111930A TWI741555B (en) 2018-03-01 2018-12-25 Method and device for displaying unique identifier of digital object

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW107146920A TWI694392B (en) 2018-03-01 2018-12-25 Method and device for displaying unique identifier of digital object

Country Status (3)

Country Link
CN (2) CN111861454B (en)
TW (2) TWI694392B (en)
WO (1) WO2019165871A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861454B (en) * 2018-03-01 2024-01-30 创新先进技术有限公司 Method and device for displaying unique identifier of digital object
CN111444737A (en) * 2020-03-25 2020-07-24 维沃移动通信有限公司 Graphic code identification method and electronic equipment
CN117113962A (en) * 2020-04-01 2023-11-24 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
CN111966439A (en) * 2020-08-25 2020-11-20 维沃移动通信有限公司 Riding code display method and device and electronic equipment

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9619794B2 (en) * 2002-10-01 2017-04-11 Tiger T G Zhou Systems and methods for providing compensation, rebate, cashback, and reward for using mobile and wearable payment services, digital currency, NFC touch payments, mobile digital card barcode payments, and multimedia haptic capture buying
TWI442274B (en) * 2010-02-11 2014-06-21 Hon Hai Prec Ind Co Ltd Electronic device and graphical user interface control method thereof
US8677503B2 (en) * 2011-01-04 2014-03-18 Motorola Mobility Llc Mechanism for embedding device identification information into graphical user interface objects
WO2014155154A1 (en) * 2013-03-27 2014-10-02 Sabatier Mikaël Secure payment transaction system
CN103970576A (en) * 2014-05-23 2014-08-06 小米科技有限责任公司 Installation information displaying method, obtaining method and device
CN105447534A (en) * 2014-08-07 2016-03-30 阿里巴巴集团控股有限公司 Imaged-based information presenting method and device
CN112214260B (en) * 2015-09-21 2023-09-22 创新先进技术有限公司 Method and device for loading APP (application) of terminal
CN106547769B (en) * 2015-09-21 2020-06-02 阿里巴巴集团控股有限公司 DOI display method and device
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
CN106201482A (en) * 2016-06-30 2016-12-07 努比亚技术有限公司 A kind of data processing method and electronic equipment
CN106326710B (en) * 2016-08-26 2019-07-26 维沃移动通信有限公司 A kind of quickly starting payment interface method and mobile terminal
CN106406666A (en) * 2016-09-22 2017-02-15 乐视控股(北京)有限公司 A processing method and device for application program icons
CN106527854A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Method for updating icon of application program and mobile terminal
CN107016420B (en) * 2016-12-08 2022-01-28 创新先进技术有限公司 Service processing method and device
CN107230065B (en) * 2017-05-23 2020-11-10 努比亚技术有限公司 Two-dimensional code display method and device and computer readable storage medium
CN107644335A (en) * 2017-09-18 2018-01-30 维沃移动通信有限公司 A kind of method of payment, mobile terminal and server
CN111861454B (en) * 2018-03-01 2024-01-30 创新先进技术有限公司 Method and device for displaying unique identifier of digital object

Also Published As

Publication number Publication date
WO2019165871A1 (en) 2019-09-06
TW201937423A (en) 2019-09-16
CN111861454A (en) 2020-10-30
CN111861454B (en) 2024-01-30
TWI741555B (en) 2021-10-01
TWI694392B (en) 2020-05-21
CN108550033B (en) 2020-07-28
CN108550033A (en) 2018-09-18

Similar Documents

Publication Publication Date Title
TWI741555B (en) Method and device for displaying unique identifier of digital object
CN107038042B (en) Service execution method and device
JP6490071B2 (en) Launching a client application based on a message
US9535726B2 (en) Reverse dependency injection in a system with dynamic code loading
CN113259224B (en) Method and device for sending customer service data
WO2019029455A1 (en) Payment method and apparatus and device thereof
WO2019179243A1 (en) Information display method, apparatus and device
JP2020501258A (en) Method, apparatus and client device for processing service data
CN109754515B (en) Queuing system and queuing data processing method
WO2021244474A1 (en) Login data processing method, apparatus, device and system
TWI742324B (en) Information processing method, device and equipment based on scanning DOI
US9720750B1 (en) Invoking a restricted access service through a restful interface
WO2016004814A1 (en) Service visualization method and system
CN109003071B (en) Payment method, device and equipment
WO2019137357A1 (en) Payment code acquisition and payment request response method, apparatus and device
EP3713183A1 (en) Network interaction method, electronic device, client, and server
TWI732139B (en) Digital object unique identification code (DOI) display and transaction information verification method, device and equipment
WO2019095855A1 (en) Method and apparatus for generating pay order information, and device
CN112596781A (en) Service execution and service configuration method and device
CN113448960A (en) Method and device for importing form file
CN113805990B (en) Method, device, equipment and system for processing display position page
CN117764571A (en) Payment processing method, device, electronic equipment and storage medium
CN112000694A (en) Data acquisition method, device, equipment and medium
WO2024069470A1 (en) Systems and methods for automatic and selective remote mobile device data extraction
CN117875959A (en) Payment method, device and equipment