WO2022062573A1 - 资源配置方法、装置及系统 - Google Patents

资源配置方法、装置及系统 Download PDF

Info

Publication number
WO2022062573A1
WO2022062573A1 PCT/CN2021/105169 CN2021105169W WO2022062573A1 WO 2022062573 A1 WO2022062573 A1 WO 2022062573A1 CN 2021105169 W CN2021105169 W CN 2021105169W WO 2022062573 A1 WO2022062573 A1 WO 2022062573A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
space
transfer
target
instruction
Prior art date
Application number
PCT/CN2021/105169
Other languages
English (en)
French (fr)
Inventor
郭炯光
李廷温
李辉
陆凯华
沈凌楠
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2022062573A1 publication Critical patent/WO2022062573A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • G06Q20/0655Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed centrally
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/349Rechargeable cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/351Virtual cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Definitions

  • the present specification relates to the field of computer technology, and in particular, to a resource allocation method, device, and system.
  • a user can apply for an electronic account, and pre-store a certain amount of funds in the electronic account for subsequent daily consumption; when the subsequent user consumes, the corresponding consumption amount can be directly deducted from the electronic account, Pay to the payee.
  • recharging and consumption are two completely independent processes. Users are required to regularly pay attention to the remaining funds in their electronic accounts and recharge in time. Therefore, it is very likely that the funds in the electronic accounts are insufficient and users cannot consume. In this case, it brings inconvenience to users, and it is necessary to provide a simpler and more convenient resource allocation method for completing fund recharge.
  • the embodiments of this specification provide a resource configuration method.
  • This specification also relates to a resource configuration device, a resource configuration system, a computing device, and a computer-readable storage medium, so as to solve the technical defects existing in the prior art.
  • a resource configuration method including: generating a resource acquisition request for the first resource space when detecting that a resource is transferred out of a first resource space of a target application; Send the resource acquisition request to the resource manager of the target application, and receive a resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the first target resource to be allocated ; according to the resource allocation instruction, transfer the first target resource to the first resource space of the target application.
  • the generating a resource acquisition request for the first resource space includes: generating a resource acquisition verification factor for acquiring resources, and generating second verification information; Obtain the verification factor to generate third verification information; and generate the resource acquisition request according to the second verification information and the third verification information.
  • the resource allocation instruction carries fourth check information
  • the transferring the first target resource to the first resource space of the target application according to the resource allocation instruction includes: The resource allocation instruction is verified according to the fourth verification information carried in the resource allocation instruction, and if the verification is passed, the first target resource according to the resource allocation instruction is executed. The operation steps of transferring to the first resource space of the target application.
  • the method before generating the resource acquisition request for the first resource space, the method further includes: receiving a resource transfer instruction sent by the resource receiver, where the resource transfer instruction carries the second target resource to be transferred; According to the resource transfer instruction, transfer the second target resource in the first resource space to a second resource space, where the second resource space is the resource space corresponding to the resource receiver; In the case that the transfer out of the second target resource is completed, it is determined that the resource transfer out of the first resource space is detected.
  • the resource transfer instruction further carries first verification information, and after the resource transfer instruction sent by the resource receiver is received, and according to the resource transfer instruction, the first resource space is stored in the first resource space.
  • the method further includes: verifying the resource transfer instruction according to the first verification information, and if the verification is passed, executing the The transfer-out instruction is an operation step of transferring the second target resource in the first resource space to the second resource space.
  • the resource transfer instruction sent by the resource receiver after receiving the resource transfer instruction sent by the resource receiver, and before transferring the second target resource in the first resource space to the second resource space according to the resource transfer instruction, further Including: judging whether the resource in the first resource space is greater than or equal to the second target resource, and if so, executing the transfer instruction according to the resource to transfer the second target resource in the first resource space. Operation steps for exporting to the second resource space.
  • the method further includes: after the transfer of the second target resource is completed. In this case, determine whether the remaining resources in the first resource space are greater than a preset threshold, and if not, generate a resource acquisition request for the first resource space.
  • the method further includes: generating a first resource transfer response message carrying fifth verification information; transferring the A resource transfer response message is sent to the resource manager.
  • the method further includes: generating a second resource transfer carrying sixth verification information A response message; sending the second resource transfer response message to the resource manager.
  • the method further includes: generating a third resource transfer response message according to the third verification information; Three resource transfer response messages are sent to the resource receiver.
  • a resource configuration apparatus including: a generating module configured to generate a resource for the first resource when it is detected that the resource is transferred out of the first resource space of the target application a resource acquisition request of the space; a first receiving module, configured to send the resource acquisition request to a resource manager of the target application, and receive a resource allocation instruction returned by the resource manager for the resource acquisition request,
  • the resource allocation instruction carries the first target resource to be allocated;
  • the transfer module is configured to transfer the first target resource to the first resource space of the target application according to the resource allocation instruction.
  • a resource configuration system includes a first terminal device, a second terminal device configured with a target application, and a server for a resource management service of the target application, the The first terminal device establishes a communication connection with the second terminal device, and the second terminal device establishes a communication connection with the server; the first terminal device is configured to generate a resource transfer instruction, and transfer the resource A transfer-out instruction is sent to the second terminal device, and the resource-transfer-out instruction carries the second target resource to be transferred out; the second terminal device is configured to receive the resource-transfer-out instruction, according to the resource A transfer-out instruction to transfer the second target resource in the first resource space to a second resource space, where the first resource space is the resource space corresponding to the target application, and the second resource space is the first resource space the resource space corresponding to the terminal device; generate a resource acquisition request for the first resource space according to the result of the resource transfer, and send the resource acquisition request to the server; receive the
  • the resource transfer out instruction further carries first verification information
  • the second terminal device is further configured to: in the case of receiving the resource transfer out instruction, according to the first verification information Verifying the resource transfer-out instruction, and if the verification is passed, executing the operation steps of transferring the second target resource in the first resource space to the second resource space according to the resource transfer-out instruction .
  • the second terminal device is further configured to: generate a resource acquisition verification factor for acquiring resources, and generate second verification information; generate a third verification factor according to the resource transfer result and the resource acquisition verification factor. check information, and carry the second check information and the third check information in the resource acquisition request.
  • the server is further configured to: verify the resource acquisition request according to the third verification information carried in the resource acquisition request;
  • the second check information and the third check information generate fourth check information; and the fourth check information is carried in the resource allocation instruction.
  • the second terminal device is further configured to: verify the resource allocation instruction according to the fourth verification information carried in the resource allocation instruction, and if the verification is passed, execute the The operation steps of transferring the first target resource to the first resource space of the target application according to the resource allocation instruction.
  • the second terminal device is further configured to: in the case of receiving the resource transfer instruction, determine whether the resources in the first resource space are greater than or equal to the second target resource, and if so, then The operation steps of transferring the second target resource in the first resource space to the second resource space are performed.
  • the second terminal device is further configured to: in the case that the transfer of the second target resource is completed, determine whether the remaining resources in the first resource space are greater than a preset threshold, and if not, generate A resource acquisition request for the first resource space.
  • the second terminal device is further configured to: in the case of transferring the second target resource in the first resource space to the second resource space, generate a first resource transfer that carries fifth verification information response message; sending the first resource transfer response message to the server; correspondingly, the server is further configured to: according to the fifth check carried in the received first resource transfer response message information, the first resource transfer response message is checked, and if the check is passed, the resources of the first resource space are updated.
  • the second terminal device is further configured to: in the case of transferring the first target resource to the first resource space of the target application, generate a second resource transfer response message; sending the second resource transfer response message to the server; correspondingly, the server is further configured to: according to the received second resource transfer response message carried in the sixth For the verification information, the second resource transfer response message is verified, and if the verification is passed, the resources of the first resource space are updated.
  • the second terminal device is further configured to: generate a third resource transfer response message according to the third verification information; send the third resource transfer response message to the first terminal device; correspondingly
  • the first terminal device is further configured to: generate and display the result of resource transfer according to the received third resource transfer response message.
  • the first terminal device is further configured to: send an application selection instruction carrying the device identification of the first terminal device to the second terminal device, and receive an application returned by the second terminal device response message; in the case of receiving the application response message, generating the resource transfer instruction; correspondingly, the second terminal device is further configured to: select the application according to the received instruction carried in the instruction the device identifier, determine the corresponding target application, and send the application selection instruction to the target application; obtain the application response message returned by the target application, and send the application response message to the first terminal device .
  • a resource configuration method including: a first terminal device generates a resource transfer instruction, and sends the resource transfer instruction to a second terminal device, and the resource transfer out The instruction carries the second target resource to be transferred out; the second terminal device receives the resource transfer out instruction, and transfers the second target resource in the first resource space to the second resource according to the resource transfer out instruction space, the first resource space is the resource space corresponding to the target application, and the second resource space is the resource space corresponding to the first terminal device; space resource acquisition request, and send the resource acquisition request to the server; the server receives the resource acquisition request, generates a resource allocation instruction carrying the first target resource to be allocated according to the resource acquisition request, and assigns the sending the resource allocation instruction to the second terminal device; the second terminal device receives the resource allocation instruction returned by the server; and transfers the first target resource to the target according to the resource allocation instruction the first resource space of the application.
  • a computing device comprising: a memory and a processor; the memory is used for storing computer-executable instructions, and the processor is used for executing the computer-executable instructions to achieve The following method: generating a resource acquisition request for the first resource space when it is detected that resources are transferred out of the first resource space of the target application; sending the resource acquisition request to the resource manager of the target application , and receive the resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the first target resource to be allocated; according to the resource allocation instruction, transfer the first target resource to the first resource space of the target application.
  • a computer-readable storage medium which stores computer-executable instructions, and when the instructions are executed by a processor, implements the steps of the resource configuration method provided in the first aspect.
  • the resource configuration method provided in this specification generates a resource acquisition request for the first resource space when it is detected that resources are transferred out of the first resource space of the target application; sends the resource acquisition request to the resource manager of the target application, and Receive a resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the first target resource to be allocated; according to the resource allocation instruction, transfer the first target resource to the first resource space of the target application.
  • the resources configured in the first resource space are used for subsequent resource transfer, that is, the behavior of acquiring resources and the behavior of resource transfer are related to each other.
  • the resource acquisition operation can be directly and automatically initiated according to the result of the resource transfer, so as to request the resource management party to acquire resources, and the user does not need to initiate the resource acquisition operation separately, ensuring that there are always sufficient resources in the first resource space. Due to the transfer of resources, the situation of inability to consume caused by insufficient balance is avoided, which is convenient for users to use and improves the user experience.
  • FIG. 1 is a flowchart of a resource configuration method provided by an embodiment of this specification
  • FIG. 2 is a process flow diagram of a resource configuration method applied to a terminal device provided by an embodiment of this specification
  • FIG. 3 is an interaction diagram of a resource configuration method applied to a public transportation scenario provided by an embodiment of this specification
  • FIG. 4 is a schematic structural diagram of a resource configuration apparatus provided by an embodiment of this specification.
  • FIG. 5 is a schematic structural diagram of a resource configuration system provided by an embodiment of this specification.
  • FIG. 6 is a structural block diagram of a computing device provided by an embodiment of the present specification.
  • Radio Frequency Identification Radio Frequency Identification Technology
  • the abbreviation of Radio Frequency Identification is a kind of automatic identification technology.
  • non-contact two-way data communication can be carried out by radio frequency, and the recording medium (electronic tag or radio frequency card) can be read and written by radio frequency, so as to achieve the purpose of identifying targets and data exchange.
  • Rapid information exchange and storage technology combined with data access technology through wireless communication, and then connected to the database system to achieve non-contact two-way communication, so as to achieve the purpose of identification, used for data exchange, and connected in series to an extremely complex system.
  • the reading, writing and communication of electronic tags are realized through electromagnetic waves.
  • the application of RFID is very wide, typical applications are animal chip, car chip anti-theft device, access control, parking lot control, production line automation, material management and so on.
  • NFC Near Field Communication
  • RFID RFID
  • interconnection technology by integrating the functions of inductive card reader, inductive card and point-to-point communication on a single chip, using mobile terminals to realize mobile payment, electronic ticketing, access control, mobile identity recognition , anti-counterfeiting and other applications.
  • Mobile terminal also known as mobile communication terminal, it refers to computer equipment that can be used on the move. Broadly speaking, it includes mobile phones, notebooks, tablet computers, POS machines, and even car computers. But in most cases, it refers to mobile phones or smartphones and tablets with multiple application functions. With the development of network and technology in the direction of more and more broadband, the mobile communication industry will move towards the real mobile information age. On the other hand, with the rapid development of integrated circuit technology, the mobile terminal already has a powerful processing capability, and the mobile terminal is changing from a simple communication tool to a comprehensive information processing platform.
  • Smart card A general term for a plastic card (usually the size of a credit card) with a microchip embedded in it. Some smart cards contain a microelectronic chip. The smart card requires a reader for data interaction. The smart card is equipped with CPU, RAM and I/O. , which can process a large amount of data by itself without interfering with the work of the host CPU. The smart card can also filter wrong data to reduce the burden of the host CPU, and is suitable for occasions with a large number of ports and fast communication speed requirements.
  • the integrated circuit in the card includes the central processing unit CPU, the programmable read-only memory EEPROM, the random access memory RAM and the in-card operating system COS (Chip Operating System) solidified in the read-only memory ROM. The data in the card is divided into external reading and Internal processing section.
  • COS Chip Operating System (on-chip operating system), which is generally developed around the characteristics of the smart card it serves.
  • COS is a dedicated system rather than a general system, that is, a COS can generally only be applied For a certain (or some) smart card, the COS in different cards are generally different.
  • COS is closer to a temporary control program in essence, rather than a so-called real operating system.
  • What COS needs to solve is mainly correct The problem of how to process and respond to external commands generally does not involve the management and processing of sharing and concurrency, and considering the application of smart cards, concurrency and sharing are indeed unnecessary.
  • Applet Application program unit, a mobile application developed on the mobile terminal platform based on the java language, used to implement the business logic of the mobile terminal, and can be a form of COS.
  • Protocol data unit PDU Protocol Data Unit
  • PDU Protocol Data Unit
  • the PDU of the protocol data unit physical layer is a data bit (bit)
  • the PDU of the data link layer is a data frame (frame)
  • the PDU of the network layer is a data frame (frame). It is a data packet (packet)
  • the PDU of the transport layer is a data segment (segment)
  • other higher-level PDUs are data (data).
  • Token In computer authentication, it means token (temporary), representing the object of the right to perform certain operations. Commonly, it can be called a cipher. Before some data transmission, the cipher must be checked first. The ciphers are authorized for different data operations.
  • a resource configuration method is provided, and this specification also relates to a resource configuration device, a resource configuration system, a computing device, and a computer-readable storage medium. In the following embodiments, one by one Explain in detail.
  • Step 102 When it is detected that resources are transferred out of the first resource space of the target application, generate a A resource acquisition request for a resource space.
  • a certain value of resources can be pre-stored in the resource space of the target application for subsequent resource transfer; when subsequent users consume, they can directly transfer resources of the corresponding value from the resource space and transfer them to the resource receiver. square.
  • resource pre-storage and resource transfer are two completely independent processes. It is necessary to regularly pay attention to the remaining resources in the resource space of the target application, and obtain resources from the resource management party for pre-storage in time. Therefore, it is very likely that resources will appear. The resource balance in the space is insufficient and cannot be transferred out, which brings inconvenience to the user's use.
  • This specification provides a resource configuration method, which generates a resource acquisition request for the first resource space when it is detected that resources are transferred out of the first resource space of the target application; and sends the resource acquisition request to the resource manager of the target application. , and receive the resource allocation instruction returned by the resource management party for the resource acquisition request.
  • the resource allocation instruction carries the first target resource to be allocated; according to the resource allocation instruction, the first target resource is transferred to the first resource space of the target application.
  • the resource acquisition operation can be directly and automatically initiated according to the result of the resource transfer, so as to request the resource management party to acquire resources, and the user does not need to initiate the resource acquisition operation separately, ensuring that there are always sufficient resources in the first resource space. Due to the transfer of resources, the situation of inability to consume due to insufficient balance is avoided.
  • the target application refers to the application of the resource transfer party, for example, the target application may be a bus card application, a one-card application, a meal card application, a recharge card application, and the like.
  • the first resource space refers to the space in which the target application stores resources, and the resources include but are not limited to funds, data resources, computing resources, or virtual resources.
  • Resource transfer out refers to transferring resources in the first resource space to other resource spaces.
  • the resource acquisition request refers to a request for acquiring resources, that is, a request for adding resources in the first resource space. Taking resources as funds as an example, the first resource space is the account where the target application stores funds, the resource transfer refers to the deduction of the target amount of funds in the account, and the resource acquisition request is a request to recharge funds to the account.
  • this solution can be implemented by creating a virtual card for the target application, such as a virtual bus card, a virtual meal card, and the like.
  • the process of creating the virtual card may include: receiving a virtual card application request for the target application; in the case of receiving application confirmation information for the virtual card, creating the virtual card for the target application, and associating the virtual card with the first resource space.
  • an application entry for a virtual card can be provided through the NFC transportation card applet.
  • the card features can be displayed through the card receiving page, prompting the user to agree to receive the card, and then prompting the user to sign the withholding service through the withholding contract page.
  • the user completes the contract for the withholding service it is equivalent to issuing the application for the transportation card.
  • the contract is successful, enter the card writing page and call the mobile phone service to start writing the card, and the transportation card is created.
  • the transportation card can be bound to the user's resource space, and subsequent users can use the transportation card to take public transportation.
  • the deletion method may include: receiving a return request for the virtual card; in the case of receiving return confirmation information for the virtual card, deleting the virtual card data, and releasing the virtual card from the first Resource space association.
  • the transportation card can still be implemented through the NFC transportation card applet.
  • Click Refund on the card details page call the mobile phone service to delete the card data, and after the app corresponding to the transportation card refunds the user's card balance, the card refund status will be updated from Refunding to Complete.
  • the first resource space associated with the transportation card needs to be released.
  • the resource transfer instruction only when the resource transfer instruction is received, the resources in the first resource space will be transferred out, and then the resource generation in the first resource space of the target application will be detected. Therefore, before generating the resource acquisition request for the first resource space in this specification, it also includes: receiving a resource transfer instruction sent by the resource receiver, and the resource transfer instruction carries the second target resource to be transferred out; The transfer-out instruction is to transfer the second target resource in the first resource space to the second resource space, and the second resource space is the resource space corresponding to the resource receiver; in the case that the transfer of the second target resource is completed, it is determined to detect Resource transfer occurs in the first resource space.
  • the resource receiver refers to the party that receives the resource
  • the second resource space is the space in which the resource receiver stores resources
  • the resource transfer instruction refers to an instruction for transferring resources from the resource transferer to the resource receiver.
  • the resource receiver can be a bus card swiping machine, subway gate, meal card swiping machine, access control equipment, etc.
  • the second target resource refers to the resource to be transferred out, that is, how much resources need to be transferred from the first resource space to the second resource space. Taking resources as funds as an example, if the resource recipient spends 20 yuan, That is, the second target resource is 20 yuan. At this time, the resource transfer instruction sent by the resource receiver to transfer 20 yuan will be received.
  • the resources in the first resource space will be transferred. 20 yuan is transferred to the second resource space. After the transfer is completed, the funds in the first resource space will be reduced by 20 yuan. At this time, it can be determined that the resource transfer behavior has been detected in the first resource space.
  • the resource transfer instruction sent by the resource receiver may further carry first verification information, so that after the resource transferer receives the resource transfer instruction, it can first check the resource transfer instruction of the resource receiver. The identity is legally verified. After the verification is passed, the resource is transferred out.
  • the specific implementation process can be as follows: Verify the resource transfer instruction according to the first verification information. The operation steps of issuing an instruction to transfer the second target resource in the first resource space to the second resource space.
  • the first verification information is generated by the resource receiver and can represent identification information of the resource receiver's identity.
  • the first verification information can be a token (token), and the token can be the device address of the resource receiver.
  • the resource receiver and the resource transfer party will establish a communication connection before the resource transfer. After the communication connection is established, the resource receiver can send the resource transfer instruction to the resource transfer party, and the resource transfer party receives the resource transfer instruction. After that, the identity of the resource receiver is verified. After the verification is passed, the resource is transferred out. If the verification fails, the resource transfer is not performed.
  • the first verification information carried in the received resource transfer instruction can be verified, so as to legally verify the identity of the resource recipient. If the identity of the resource recipient passes the legal verification, The resource transfer will be carried out to ensure the resource security of the resource transfer party.
  • the resource transfer can be performed normally only when the resources in the first resource space are sufficient for resource transfer.
  • the specific implementation process can be as follows:
  • the second target resource is the resource to be transferred out, so it can be determined whether the resource in the first resource space is greater than or equal to the second target resource, and if so, it means that the resource in the first resource space is sufficient to support this resource. Transfer out, at this time, the operation steps of transferring the second target resource in the first resource space to the second resource space are normally performed, and the resource transfer is successful. If not, it means that the resources in the first resource space cannot support the resource transfer, and the operation steps of transferring the second target resource in the first resource space to the second resource space are not executed at this time, and the resource transfer fails. .
  • the method further includes: generating a first resource transfer response message carrying fifth verification information; transferring The first resource transfer response message is sent to the resource manager.
  • the fifth verification information is generated by the resource transfer party (target application) and represents the legal identification information of the resource transfer party's behavior of transferring resources.
  • the fifth verification information can also be a token (token) .
  • the first resource transfer response message refers to the result of resource transfer, that is, the transfer-out voucher. Since the resource manager will manage the resources of the resource transferer, if the second target resource in the first resource space is transferred to the second resource space, the resource manager needs to be notified to synchronize the resource transfer operation and update the resource. The resource of the first resource space stored by the manager.
  • a resource acquisition request for the first resource space may be automatically and directly generated. That is to say, as long as the resource is transferred out of the first resource space, the resource acquisition operation will be directly initiated, that is, the resource is acquired while being transferred out.
  • the resource transfer after the resource transfer is completed, it may also be determined whether to initiate a resource acquisition request according to the remaining resources in the first resource space.
  • the specific implementation process may be as follows: when the second target resource is transferred out In the case of completion, it is determined whether the remaining resources in the first resource space are greater than the preset threshold, and if not, a resource acquisition request for the first resource space is generated.
  • the preset threshold is a preset value used to determine whether to initiate a resource acquisition request.
  • the preset threshold may be 20, 30, 50, or the like.
  • a resource acquisition request for the first resource space can be generated; if it is, it means that there are many remaining resources in the first resource space, and a resource acquisition request for the first resource space can not be generated at this time, that is, no resource acquisition is required. Get action.
  • verification information may also be carried to prove the legitimacy of the resource acquisition request.
  • the specific implementation process may be as follows: The resource acquisition verification factor of the resource, and the second verification information is generated; the third verification information is generated according to the result of the resource transfer and the resource acquisition verification factor; the resource acquisition request is generated according to the second verification information and the third verification information .
  • the resource acquisition verification factor refers to the authentication information generated by the resource transfer party (target application) after the resource is transferred out
  • the resource transfer result refers to the resource transfer certificate
  • the resource transfer occurs in the first resource space.
  • the second verification information is information generated by the resource transfer party and used for subsequent verification of whether the resource management party is legal.
  • the second verification information may be a random number generated by the resource transfer party.
  • the resource transfer party will After the random number is carried in the resource acquisition request and sent to the resource management party, the resource management party can encrypt the random number, and then carry it in the resource allocation instruction and return it to the resource transfer party, and the resource transfer party performs the random number operation. Decrypt, determine whether the random number is the same as the previously generated random number to verify whether the identity of the resource manager is legal.
  • the resource acquisition request When generating a resource acquisition request in this specification, the resource acquisition request will not only carry the third verification information for verifying whether the resource acquisition behavior is legal, but also carry the second verification information for verifying whether the identity of the resource manager is legal. Verification information greatly ensures the security of the entire resource acquisition process.
  • a resource acquisition request will be generated after a transaction is generated.
  • the resource acquisition request may carry the transaction time, transaction serial number,
  • the parameter information such as transaction equipment enables the subsequent resource manager to check and analyze the resource acquisition request after receiving the resource acquisition request, ensuring that for the same transaction task, the resource manager only issues a resource allocation instruction once.
  • the resource transfer result may also be returned to the resource receiver, and the specific implementation process may be as follows: Generate a third resource transfer response message according to the third verification information ; Send the third resource transfer response message to the resource receiver.
  • the third resource transfer response message refers to the result of the resource transfer from the resource transfer party, that is, whether the resource is successfully transferred out. Since the third verification information is generated according to the result of the resource transfer and the resource acquisition verification factor, the third verification information includes not only the identity verification information generated by the resource transfer party after the resource is transferred out, but also the resource transfer out. Therefore, the third resource transfer response message can be generated directly according to the third verification information. After receiving the third resource transfer response message, the resource receiver can verify the identity of the resource transfer party according to the third verification information. , and get the result of resource transfer at the same time.
  • Step 104 Send the resource acquisition request to the resource manager of the target application, and receive a resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the first target resource to be allocated.
  • the resource manager is the party that manages the resources of the target application, that is, the resource manager stores the resources of the first resource space of the target application, for example, the resource manager may be the server of the target application.
  • the first target resource refers to the resource to be allocated, that is, how many resources need to be allocated to the first resource space. Taking resources as funds as an example, the first target resource carried in the resource allocation instruction may be 100 yuan.
  • the resource allocation instruction is an instruction to allocate resources to the first resource space of the target application, and the resource allocation instruction may be an APDU instruction.
  • the APDU instruction may carry multiple identification parameters, and the specific operation of resource transfer is indicated by each identification parameter.
  • the resource transfer behavior and resource acquisition behavior of the first resource space of the target application are associated, and resource acquisition will be automatically initiated as long as the first resource space is detected to be resource transferred out.
  • this specification does not limit the amount of resources transferred from the first resource space and the amount of resources transferred to the first resource space, which may be the same or different; that is, the first target resource may be the same as the first target resource.
  • the two target resources are the same or different, and both can be set in advance, which is not limited in this specification.
  • Step 106 Transfer the first target resource to the first resource space of the target application according to the resource allocation instruction.
  • the resource allocation instruction can be executed directly according to the parameters carried in the resource allocation instruction, as in the first example.
  • the target resource is 100 yuan, and 100 yuan can be added to the first resource space of the target application at this time.
  • the resource management party when the resource management party returns the resource allocation instruction, it may also carry fourth verification information in the resource allocation instruction, which is used to prove that the identity of the resource management party is legal.
  • the fourth verification information carried in the resource allocation instruction needs to be checked first.
  • the specific implementation process can be as follows: The carried fourth verification information verifies the resource allocation instruction, and if the verification is passed, the operation steps of transferring the first target resource to the first resource space of the target application according to the resource allocation instruction are performed.
  • the fourth verification information is generated by the resource manager according to the second verification information and the third verification information, and is used to verify whether the identity of the resource manager is legal.
  • the fourth verification information carried in the resource allocation instruction can be verified first, and then the resource allocation instruction is executed after the verification, which greatly ensures the security of the entire resource acquisition process.
  • the method further includes: generating a second resource transfer response message carrying the sixth verification information;
  • the sixth verification information is generated by the resource transfer party (target application), and represents the identity information of the resource transfer party.
  • the sixth verification information may also be a token.
  • the second resource transfer response message is directed to the result of adding resources in the first resource space. Since the resource manager will manage the resources of the resource transfer party, if the first target resource is transferred to the first resource space of the target application, the resource manager needs to be notified to synchronize the operation of resource transfer and update the first target resource stored by the resource manager. A resource of a resource space.
  • the resource configuration method provided in this specification generates a resource acquisition request for the first resource space when it is detected that resources are transferred out of the first resource space of the target application; sends the resource acquisition request to the resource manager of the target application, and Receive a resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the first target resource to be allocated; according to the resource allocation instruction, transfer the first target resource to the first resource space of the target application.
  • the resources configured in the first resource space are used for subsequent resource transfer, that is, the behavior of acquiring resources and the behavior of resource transfer are related to each other.
  • the resource acquisition operation can be directly and automatically initiated according to the result of the resource transfer, so as to request the resource management party to acquire resources, and the user does not need to initiate the resource acquisition operation separately, ensuring that there are always sufficient resources in the first resource space. Due to the transfer of resources, the situation of inability to consume caused by insufficient balance is avoided, which is convenient for users to use and improves the user experience.
  • FIG. 2 shows a processing flow chart of a resource configuration method applied to a terminal device provided by an embodiment of this specification, which specifically includes the following steps:
  • Step 202 The first terminal device generates a resource transfer instruction, and sends the resource transfer instruction to the second terminal device, where the resource transfer instruction carries the second target resource to be transferred.
  • the first terminal device may be the device of the resource receiver, such as bus card swiping machine, subway gate, meal card swiping machine, access control equipment, etc.;
  • the second terminal device may be the equipment of the resource transfer party, such as the user using mobile terminals (mobile phones, tablets, bracelets, etc.).
  • the first terminal device and the second terminal device establish a communication connection, and in specific implementation, the first terminal device may implement the connection through (not limited to) Near Field Communication (Near Field Communication, NFC for short).
  • NFC Near Field Communication
  • the target application refers to the application of the resource transfer party, including but not limited to the electronic bus card application and the electronic meal card application.
  • the second terminal device is configured with the target application, that is, the target application can communicate with the second terminal device. It can also be installed directly on the second terminal device.
  • the target application can be a COS application set in the smart card, the smart card can be connected to the second terminal device for communication, and the second terminal device is configured with the target application at this time; or, the target application can be in the second terminal device.
  • Installed application (Applet), the application (Applet) is actually a COS application.
  • the first terminal device before the first terminal device generates the resource transfer instruction, it should also determine whether there is a corresponding target application in the second terminal device. Therefore, the first terminal device should send the second terminal device to the second terminal device in advance. Sending an application selection instruction, instructing the second terminal device to find the corresponding target application, and returning a response message, the specific implementation process is as follows: the first terminal device sends an application selection instruction that carries the device identifier of the first terminal device to the second terminal device, and receive the application response message returned by the second terminal device; the second terminal device determines the corresponding target application according to the device identifier carried in the received application selection instruction, and sends the application selection instruction to the target application; after that, obtains the target application The application response message returned by the application sends the application response message to the first terminal device; the first terminal device generates a resource transfer instruction when receiving the application response message.
  • the device identifier can uniquely identify the first terminal device, and the corresponding target application can be determined according to the device identifier.
  • the first terminal device is the resource receiver.
  • the resource receiver will have a corresponding resource transferer.
  • the resource transferer generally implements resource storage and transfer through an application. For example, If the first terminal device is a subway gate, then the corresponding subway card application needs to be found in the second terminal device; if the first terminal device is a bus credit card machine, then the corresponding bus card application needs to be found in the second terminal device application.
  • the first terminal device may send an application selection instruction carrying the device identification of the first terminal device to the second terminal device.
  • the second terminal device After receiving the application selection instruction, the second terminal device searches whether there is a corresponding target application. In the case of receiving the application selection instruction, the application selection instruction is transparently transmitted to the target application.
  • the target application After receiving the application selection instruction, the target application can return an application response message to the second terminal device, indicating that it has known that the resource is to be transferred out, and the second terminal device The application response message is forwarded to the first terminal device.
  • the first terminal device learns that the second terminal device has a target application that can perform resource transfer out, and generates a resource transfer out instruction.
  • Step 204 The second terminal device receives the resource transfer instruction, and according to the resource transfer instruction, transfers the second target resource in the first resource space to the second resource space, where the first resource space is the resource space corresponding to the target application, The second resource space is the resource space corresponding to the first terminal device.
  • the first resource space refers to the space for storing resources of the target application configured by the second terminal device of the resource transfer party.
  • the second resource space is the space in which the resource receiver's first terminal device stores resources.
  • the resource transfer instruction sent by the first terminal device may also carry the first verification information, so that after receiving the resource transfer instruction, the target application of the second terminal device can The identity of the first terminal device is legally verified, and after the verification is passed, the resource is transferred out.
  • the specific implementation process may be as follows: when the target application of the second terminal device receives the resource transfer instruction, it can A verification message verifies the resource transfer instruction, and if the verification is passed, the operation steps of transferring the second target resource in the first resource space to the second resource space according to the resource transfer instruction are performed.
  • the second terminal device can transparently transmit the resource transfer instruction to the target application, and then the target application can transfer the resource to the target application.
  • the instruction is sent out for verification, and if the verification is passed, the resource transfer out instruction is executed.
  • the first verification information carried in the received resource transfer instruction can be verified, so as to legally verify the identity of the first terminal device.
  • the resource is transferred out, which ensures the security of the resource in the target application of the second terminal device.
  • the resource transfer can be performed normally only when the resources in the first resource space are sufficient for resource transfer.
  • the specific implementation process may be as follows: when the target application of the second terminal device receives the resource transfer instruction, it determines whether the resources in the first resource space are greater than or equal to the second target resource, and if so, execute the first The operation steps of transferring the second target resource in the resource space to the second resource space.
  • the method further includes: the target application of the second terminal device generates and carries the The first resource transfer response message of the fifth check information, and send the first resource transfer response message to the server; the server transfers the first resource according to the fifth check information carried in the received first resource transfer response message.
  • the response message is verified, and if the verification is passed, the resources of the first resource space are updated.
  • the server refers to the server of the resource management service of the target application. That is to say, the server will manage the resources of the target application. Therefore, if the second target resource in the first resource space of the target application is transferred to the second resource space, the server needs to be notified to synchronize the resource transfer operation, update the The resources of the first resource space stored by the server.
  • the target application of the second terminal device may also return the resource transfer result to the server, and the specific implementation process may be as follows: the target application of the second terminal device is based on The third verification information generates a third resource transfer response message, and sends the third resource transfer response message to the first terminal device; the first terminal device generates and displays the resource transfer response message according to the received third resource transfer response message. result.
  • the resource space of the subway card application transfers 5 yuan to the resource space corresponding to the subway gate device.
  • the subway card application will generate a third resource transfer response message, which indicates that the transfer to the subway gate is successful.
  • the resource space corresponding to the device is transferred out of 5 yuan.
  • the subway gate device receives the third resource transfer response message, it shows that the deduction is successful, and the gate is opened to allow the user to pass.
  • Step 206 The second terminal device generates a resource acquisition request for the first resource space according to the result of the resource transfer, and sends the resource acquisition request to the server.
  • the second terminal device receives the resource transfer instruction, and according to the resource transfer instruction, transfers the second target resource in the first resource space to the second resource space, there are two transfer results, the transfer is successful and the Transfer out failed. If the transfer out is successful, it means that the resources in the first resource space are reduced. At this time, it can be determined that the resource transfer out of the first resource space of the target application is detected, and the generation of a resource acquisition request for the first resource space is automatically triggered. Supplement the resources in the first resource space. In this case, as long as the resources are transferred out of the first resource space, the resource acquisition operation will be directly initiated, that is, the resources are acquired while transferring out, and always ensure that there are enough resources in the first resource space. resource of.
  • the transfer out fails, it means that the resources in the first resource space may not have changed, and the resource acquisition request may not be generated.
  • the target application also judges whether the resources in the first resource space can support the resource transfer before performing the resource transfer, then if the resources in the first resource space are smaller than the second target resources, the execution will not be executed.
  • the resource transfer instruction will cause the transfer to fail. This kind of transfer failure is due to insufficient resources in the first resource space, and resources need to be obtained. Therefore, at this time, the target application can generate an indicator of insufficient resources. If the indicator is detected , it may also be determined that a resource transfer out of the first resource space of the target application is detected, and a resource acquisition request for the first resource space is generated.
  • the target application of the second terminal device determines whether the remaining resources in the first resource space are greater than the preset threshold, and if not, generates a resource acquisition request for the first resource space.
  • the target application of the second terminal device when the target application of the second terminal device generates a resource acquisition request for the first resource space, it may also carry verification information to prove the legitimacy of the resource acquisition request.
  • the specific implementation process It can be as follows: generate a resource acquisition verification factor for acquiring resources, and generate second verification information; generate third verification information according to the result of resource transfer and the resource acquisition verification factor, and combine the second verification information with the third verification information.
  • the verification information is carried in the resource acquisition request.
  • the target application of the second terminal device in this specification When the target application of the second terminal device in this specification generates a resource acquisition request, it will not only carry the third verification information used to verify the legality of the resource acquisition behavior in the resource acquisition request, but also carry the subsequent verification information for resource management verification.
  • the second verification information of whether the party's identity is legal greatly ensures the security of the entire resource acquisition process.
  • Step 208 The server receives the resource acquisition request, generates a resource allocation instruction carrying the first target resource to be allocated according to the resource acquisition request, and sends the resource allocation instruction to the second terminal device.
  • the server after the server receives the resource acquisition request, it means that the server has learned the requirement that the target application wants to acquire resources. At this time, the server can verify the resource acquisition request, and if the verification passes, generate a resource allocation
  • the instruction, sent to the target application of the second terminal device, represents the server agreeing to the target application to obtain resources.
  • the specific implementation process can be as follows: according to the third verification information carried in the resource acquisition request, the resource acquisition request is verified, and the verification is passed. In the case of , generate fourth verification information according to the second verification information and the third verification information;
  • the fourth check information is carried in the resource allocation instruction.
  • the third verification information is generated by the target application according to the result of the resource transfer and the resource acquisition verification factor, and is used to verify whether the resource acquisition behavior is legal. Therefore, after receiving the resource acquisition request, the server only The third verification information in the resource acquisition request needs to be verified to determine whether the resource acquisition behavior is legal.
  • the second verification information is a random number generated by the target application of the second terminal device, which is used for subsequent verification of the identity of the server. Therefore, the server only needs to encrypt the second verification information and return it to the second terminal device. , so the server can generate fourth verification information according to the second verification information and the third verification information when the third verification information passes the verification, and carry the fourth verification information in the resource allocation instruction and return it to the second terminal equipment.
  • Step 210 The second terminal device receives the resource allocation instruction returned by the server, and according to the resource allocation instruction, transfers the first target resource to the first resource space of the target application.
  • the fourth verification information may also be carried in the resource allocation instruction to prove that the identity of the server is legal.
  • the target application of the second terminal device is based on the resource allocation instruction.
  • the fourth verification information carried in the resource allocation instruction needs to be checked first.
  • the specific implementation process may be as follows: According to the fourth verification information carried in the resource allocation instruction The verification information verifies the resource allocation instruction, and if the verification is passed, the operation steps of transferring the first target resource to the first resource space of the target application according to the resource allocation instruction are performed.
  • the method further includes: generating a target application of the second terminal device that carries the sixth Check the second resource transfer response message of the information, and send the second resource transfer response message to the server; the server responds to the second resource transfer response message according to the sixth verification information carried in the received second resource transfer response message The verification is performed, and if the verification is passed, the resources of the first resource space are updated.
  • the server since the server will manage the resources of the target application, if the first target resource is successfully transferred to the first resource space of the target application, the server needs to be notified to synchronize the operation of resource transfer and update the first resource stored by the server. space resources.
  • the first terminal device generates a resource transfer instruction, and sends the resource transfer instruction to the second terminal device; the second terminal device receives the resource transfer instruction, and according to the resource transfer instruction, transfers the first The second target resource in a resource space is transferred out to the second resource space, and according to the result of the resource transfer, a resource acquisition request for the first resource space is generated, and the resource acquisition request is sent to the server; the server receives the resource acquisition request, Generate a resource allocation instruction carrying the first target resource to be allocated according to the resource acquisition request, and send the resource allocation instruction to the second terminal device; the second terminal device receives the resource allocation instruction returned by the server, The target resource is transferred to the first resource space of the target application.
  • the resource acquisition operation can be directly and automatically initiated according to the result of the resource transfer, so as to request the server to acquire resources, and the user does not need to initiate the resource acquisition operation separately, ensuring that there are always sufficient resources in the first resource space for resources.
  • the transfer out avoids the inability to consume due to insufficient balance, which is convenient for users to use and improves the user experience.
  • FIG. 2 shows a schematic solution of a resource configuration method according to this embodiment. It should be noted that the technical solution of the resource configuration method and the technical solution of the resource configuration method shown in FIG. 1 above belong to the same concept. For details that are not described in detail in the technical solution of the resource configuration method shown in FIG. 2, please refer to The description of the technical solution of the resource configuration method shown in FIG. 1 above.
  • Step 302 After the mobile terminal approaches the cash register, the cash register The establishment of a communication connection with the mobile terminal is triggered by means of near field communication.
  • This specification provides a resource configuration method, which can provide an application entry for a virtual card through the NFC traffic card applet of the mobile terminal.
  • the card features are displayed on the card receiving page, and the user is prompted to agree to receive the card, and then the user is prompted to sign up for the withholding service through the withholding contract page.
  • the user completes the contract for the withholding service it is equivalent to sending out the application confirmation information for the transportation card.
  • the contract is successful, enter the card writing page and call the mobile phone service to start writing the card, and the traffic card is created.
  • the transportation card can be bound to the user's resource space, and subsequent users can use the transportation card to take public transportation.
  • a recharge request for the fund account is generated; the recharge request is sent to the server, and the recharge instruction returned by the server for the recharge request is received; the card application can, according to the recharge instruction, send Funds are recharged in the fund account.
  • the card application itself directly associates the deduction behavior in the fund account in the card with the recharge behavior. If the fund account of the card application is debited, it can directly and automatically trigger the recharge according to the result of the deduction. process, and actively notify the mobile terminal of the behavior, and the mobile terminal initiates a fund recharge request to request recharge funds from the server, without requiring the user to initiate a recharge operation separately, ensuring that there is always sufficient funds in the fund account of the card application. on consumption.
  • payment gates include but are not limited to subway gates
  • mobile terminals include but are not limited to mobile phones and tablets.
  • both the cash register and the mobile terminal have the NFC function. The user brings the mobile terminal close to the cash register, and the cash register can identify the mobile terminal and establish a connection with the mobile terminal.
  • the cash register can establish a communication connection request through near field communication, wherein the communication connection request carries communication parameters; the mobile terminal can receive the communication connection request after approaching the cash register, and in response to the communication connection request, based on Communication parameters establish a communication connection with the cash register.
  • NFC is a non-contact, short-range, high-frequency radio technology.
  • the frequency band used by NFC can be 13.56MHz, and the use distance is usually within 10cm.
  • the NFC tag is a coil that can write data.
  • the coil contacts the radio frequency signal sent by the NFC chip, it can generate a signal that carries the written data; the NFC chip A reader in can read the signal and parse out the data it carries.
  • Both the cash collection gate and the mobile terminal have a built-in NFC module, and the cash collection gate continues to send radio frequency signals through the NFC module to establish a communication connection request, wherein the communication connection request carries the device information of the cash collection gate, and the mobile terminal After approaching the cash register, a communication connection request is received, and in response to the communication connection request, a communication connection is established with the mobile terminal according to the device information of the cash register.
  • Step 304 the payment gate sends an application selection instruction carrying the device identification of the payment gate to the mobile terminal.
  • Step 306 The mobile terminal determines the corresponding card application according to the device identifier carried in the received application selection instruction, and sends the application selection instruction to the card application.
  • Step 308 After receiving the application selection instruction, the card application returns an application response message to the cash register via the mobile terminal.
  • Step 310 The cash collection gate generates a deduction instruction, and sends the deduction instruction to the card application via the mobile terminal.
  • Step 312 The card application receives the deduction instruction, deducts the first target fund from the fund account of the card application according to the deduction instruction, and while the card application deducts the money, the card application generates funds for the card application according to the result of the deduction of funds For the recharge request of the account, the recharge request is sent to the server via the mobile terminal.
  • Step 314 The card application generates a deduction response, and sends the deduction response to the cash collection gate via the mobile terminal, so as to notify the payment gate of the deduction response, and then the cash collection gate notifies the corresponding payment gate of the deduction response.
  • the server side is added to the fund account corresponding to the cash collection gate from the server side.
  • Step 316 The payment gate generates and displays the deduction result according to the received deduction response.
  • Step 318 The server receives the recharge request, generates a recharge instruction according to the recharge request, and sends the recharge instruction to the card application via the mobile terminal.
  • Step 320 The card application receives the recharge instruction returned by the server, recharges the second target amount of funds in the fund account of the card application according to the recharge instruction, generates a recharge response, and sends the recharge response to the server via the mobile terminal.
  • the deletion method may include: receiving a return request for the virtual card; in the case of receiving return confirmation information for the virtual card, deleting the virtual card data, and releasing the virtual card from the first Resource space association.
  • the transportation card can still be implemented through the NFC transportation card applet.
  • Click Refund on the card details page call the mobile phone service to delete the card data, and after the app corresponding to the transportation card refunds the user's card balance, the card refund status will be updated from Refunding to Complete.
  • the first resource space associated with the transportation card needs to be released.
  • FIG. 4 shows a schematic structural diagram of a resource configuration apparatus provided by an embodiment of the present specification.
  • the apparatus includes: a generating module 402, configured to generate a resource acquisition request for the first resource space when detecting that a resource is transferred out of the first resource space of the target application; the first receiving Module 404, configured to send the resource acquisition request to the resource manager of the target application, and receive a resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the resource allocation instruction to be The allocated first target resource; the transferring module 406 is configured to transfer the first target resource to the first resource space of the target application according to the resource allocation instruction.
  • the generating module 402 is further configured to: generate a resource acquisition verification factor for acquiring resources, and generate second verification information; and generate third verification information according to the result of resource transfer and the resource acquisition verification factor. ; Generate the resource acquisition request according to the second verification information and the third verification information.
  • the transfer module 406 is further configured to: verify the resource allocation instruction according to the fourth verification information carried in the resource allocation instruction, and if the verification is passed, execute the The resource allocation instruction is an operation step of transferring the first target resource to the first resource space of the target application.
  • the apparatus further includes: a second receiving module, configured to receive a resource transfer instruction sent by the resource receiver, where the resource transfer instruction carries the second target resource to be transferred; is configured to, according to the resource transfer instruction, transfer the second target resource in the first resource space to a second resource space, where the second resource space is the resource space corresponding to the resource receiver; determining module , which is configured to determine that, when the transfer out of the second target resource is completed, it is detected that the resource transfer out occurs in the first resource space.
  • the apparatus further includes: a verification module configured to verify the resource transfer instruction according to the first verification information, and if the verification is passed, execute the verification according to the resource.
  • the transfer-out instruction is an operation step of transferring the second target resource in the first resource space to the second resource space.
  • the apparatus further includes: a first judging module configured to judge whether the resources in the first resource space are greater than or equal to the second target resources, and if so, execute the transferring out according to the resources
  • the instruction is an operation step of transferring the second target resource in the first resource space to the second resource space.
  • the apparatus further includes: a second judgment module, configured to judge whether the remaining resources in the first resource space are greater than a preset threshold when the transfer of the second target resource is completed, and if not , a resource acquisition request for the first resource space is generated.
  • a second judgment module configured to judge whether the remaining resources in the first resource space are greater than a preset threshold when the transfer of the second target resource is completed, and if not , a resource acquisition request for the first resource space is generated.
  • the apparatus further includes: a first generating module configured to generate a first resource transfer response message carrying fifth verification information; a first sending module configured to generate the first resource transfer response message sent to the resource manager.
  • the apparatus further includes: a second generating module configured to generate a second resource transfer response message carrying sixth verification information; a second sending module configured to generate the second resource transfer response message sent to the resource manager.
  • the generating module 402 is further configured to: generate a third resource transfer response message according to the third verification information; and send the third resource transfer response message to the resource receiver.
  • the resource configuration device provided in this specification generates a resource acquisition request for the first resource space when it detects that resources are transferred out of the first resource space of the target application; sends the resource acquisition request to the resource manager of the target application, and Receive a resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the first target resource to be allocated; according to the resource allocation instruction, transfer the first target resource to the first resource space of the target application.
  • the resources configured in the first resource space are used for subsequent resource transfer, that is, the behavior of acquiring resources and the behavior of resource transfer are related to each other.
  • the resource acquisition operation can be directly and automatically initiated according to the result of the resource transfer, so as to request the resource management party to acquire resources, and the user does not need to initiate the resource acquisition operation separately, ensuring that there are always sufficient resources in the first resource space. Due to the transfer of resources, the situation of inability to consume caused by insufficient balance is avoided, which is convenient for users to use and improves the user experience.
  • FIG. 5 shows a schematic structural diagram of a resource configuration system provided by an embodiment of the present specification.
  • the system includes: a first terminal device 502, a second terminal device 504 configured with a target application, and a server 506 for resource management services of the target application, the first terminal device 502 and the first terminal device 502
  • Two terminal devices 504 establish a communication connection, and the second terminal device 504 establishes a communication connection with the server 506;
  • the first terminal device 502 is configured to generate a resource transfer instruction, and send the resource transfer instruction To the second terminal device, the resource transfer out instruction carries the second target resource to be transferred out;
  • the second terminal device 504 is configured to receive the resource transfer out instruction, and according to the resource transfer out instruction , transfer the second target resource in the first resource space to the second resource space, the first resource space is the resource space corresponding to the target application, and the second resource space is the corresponding resource space
  • the resource transfer instruction further carries first verification information
  • the second terminal device 504 is further configured to: in the case of receiving the resource transfer instruction, according to the first verification information to verify the resource transfer out instruction, and if the verification is passed, execute the operation of transferring the second target resource in the first resource space to the second resource space according to the resource transfer out instruction step.
  • the second terminal device 504 is further configured to: generate a resource acquisition verification factor for acquiring resources, and generate second verification information; generate a first verification factor according to the resource transfer result and the resource acquisition verification factor. Three verification information, the second verification information and the third verification information are carried in the resource acquisition request.
  • the server 506 is further configured to: verify the resource acquisition request according to the third verification information carried in the resource acquisition request;
  • the second verification information and the third verification information generate fourth verification information; and the fourth verification information is carried in the resource allocation instruction.
  • the second terminal device 504 is further configured to: verify the resource allocation instruction according to the fourth verification information carried in the resource allocation instruction, and if the verification is passed, execute The operation step of transferring the first target resource to the first resource space of the target application according to the resource allocation instruction.
  • the second terminal device 504 is further configured to: in the case of receiving the resource transfer instruction, determine whether the resources in the first resource space are greater than or equal to the second target resource, and if so, Then, the operation step of transferring the second target resource in the first resource space to the second resource space is performed.
  • the second terminal device 504 is further configured to: in the case that the transfer of the second target resource is completed, determine whether the remaining resources in the first resource space are greater than a preset threshold, and if not, then A resource acquisition request for the first resource space is generated.
  • the second terminal device 504 is further configured to: in the case of transferring the second target resource in the first resource space to the second resource space, generate the first resource carrying the fifth verification information transfer response message; send the first resource transfer response message to the server; correspondingly, the server 506 is further configured to: according to the received first resource transfer response message carried in the fifth For the verification information, the first resource transfer response message is verified, and if the verification is passed, the resources of the first resource space are updated.
  • the second terminal device 504 is further configured to: in the case of transferring the first target resource to the first resource space of the target application, generate a first resource carrying sixth verification information.
  • the second terminal device 504 is further configured to: generate a third resource transfer response message according to the third verification information; send the third resource transfer response message to the first terminal device;
  • the first terminal device 502 is further configured to: generate and display the result of resource transfer according to the received third resource transfer response message.
  • the first terminal device 502 is further configured to: send an application selection instruction carrying the device identification of the first terminal device to the second terminal device, and receive an application selection instruction returned by the second terminal device. application response message; in the case of receiving the application response message, generate the resource transfer instruction; correspondingly, the second terminal device 504 is further configured to: according to the received application selection instruction carried in the instruction the device identifier, determine the corresponding target application, and send the application selection instruction to the target application; obtain the application response message returned by the target application, and send the application response message to the first Terminal Equipment.
  • the second terminal device 504 is further configured to: receive a virtual card application request for the target application; in the case of receiving the application confirmation information for the virtual card, assign the target application the virtual card, and associate the virtual card with the first resource space.
  • the second terminal device 504 is further configured to: receive a return request for the virtual card; in the case of receiving the return confirmation information for the virtual card, delete the virtual card data, and Disassociate the virtual card with the first resource space.
  • the first terminal device generates a resource transfer instruction, and sends the resource transfer instruction to the second terminal device; the second terminal device receives the resource transfer instruction, and according to the resource transfer instruction, transfers the first The second target resource in a resource space is transferred out to the second resource space, and according to the result of the resource transfer, a resource acquisition request for the first resource space is generated, and the resource acquisition request is sent to the server; the server receives the resource acquisition request, Generate a resource allocation instruction carrying the first target resource to be allocated according to the resource acquisition request, and send the resource allocation instruction to the second terminal device; the second terminal device receives the resource allocation instruction returned by the server, The target resource is transferred to the first resource space of the target application.
  • the resource acquisition operation can be directly and automatically initiated according to the result of the resource transfer, so as to request the server to acquire resources, and the user does not need to initiate the resource acquisition operation separately, ensuring that there are always sufficient resources in the first resource space for resources.
  • the transfer out avoids the inability to consume due to insufficient balance, which is convenient for users to use and improves the user experience.
  • FIG. 6 shows a structural block diagram of a computing device 600 according to an embodiment of the present specification.
  • Components of the computing device 600 include, but are not limited to, memory 610 and processor 620 .
  • the processor 620 is connected with the memory 610 through the bus 630, and the database 650 is used for saving data.
  • Computing device 600 also includes access device 640 that enables computing device 600 to communicate via one or more networks 660 .
  • networks include a public switched telephone network (PSTN), a local area network (LAN), a wide area network (WAN), a personal area network (PAN), or a combination of communication networks such as the Internet.
  • Access device 640 may include one or more of any type of network interface (eg, network interface card (NIC)), wired or wireless, such as IEEE 802.11 wireless local area network (WLAN) wireless interface, World Interoperability for Microwave Access ( Wi-MAX) interface, Ethernet interface, Universal Serial Bus (USB) interface, cellular network interface, Bluetooth interface, Near Field Communication (NFC) interface, and the like.
  • NIC network interface card
  • computing device 600 may also be connected to each other, such as through a bus.
  • bus may also be connected to each other, such as through a bus.
  • FIG. 6 the structural block diagram of the computing device shown in FIG. 6 is only for the purpose of example, rather than limiting the scope of this specification. Those skilled in the art can add or replace other components as required.
  • Computing device 600 may be any type of stationary or mobile computing device, including mobile computers or mobile computing devices (eg, tablet computers, personal digital assistants, laptop computers, notebook computers, netbooks, etc.), mobile phones (eg, smart phones) ), wearable computing devices (eg, smart watches, smart glasses, etc.) or other types of mobile devices, or stationary computing devices such as desktop computers or PCs.
  • Computing device 600 may also be a mobile or stationary server.
  • the processor 620 is configured to execute the following computer-executable instructions: when it is detected that a resource is transferred out of the first resource space of the target application, generate a resource acquisition request for the first resource space; Send it to the resource manager of the target application, and receive a resource allocation instruction returned by the resource manager for the resource acquisition request, where the resource allocation instruction carries the first target resource to be allocated; according to the resource allocation an instruction to transfer the first target resource to the first resource space of the target application.
  • An embodiment of the present specification further provides a computer-readable storage medium, which stores computer instructions, and when the instructions are executed by a processor, is used to implement the following method: it is detected that the first resource space of the target application is transferred out of the resources. In this case, generate a resource acquisition request for the first resource space; send the resource acquisition request to the resource manager of the target application, and receive the resource allocation returned by the resource manager for the resource acquisition request instruction, wherein the resource allocation instruction carries the first target resource to be allocated; according to the resource allocation instruction, the first target resource is transferred to the first resource space of the target application.
  • the computer instructions include computer program code, which may be in source code form, object code form, an executable file, some intermediate form, or the like.
  • the computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, removable hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory) , Random Access Memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium, etc. It should be noted that the content contained in the computer-readable media may be appropriately increased or decreased according to the requirements of legislation and patent practice in the jurisdiction, for example, in some jurisdictions, according to legislation and patent practice, the computer-readable media Electric carrier signals and telecommunication signals are not included.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本说明书提供资源配置方法、装置及系统,其中所述资源配置方法包括:检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。本说明书中若第一资源空间发生了资源转出,则可以根据资源转出的结果,直接自动发起资源获取请求,以向资源管理方请求获取资源,保证了第一资源空间中始终有充足的资源用于资源转出。

Description

资源配置方法、装置及系统 技术领域
本说明书涉及计算机技术领域,特别涉及资源配置方法、装置及系统。
背景技术
随着计算机技术的快速发展,网络已经成为人们生活的重要部分,尤其是电子支付更是为人们的日常生活提供了便利。现有技术中,用户可以申请一个电子账户,并在该电子账户中预存一定金额的资金,用于后续的日常消费;后续用户在消费时,可以直接从该电子账户中扣除相应的消费金额,付给收款方。然而,上述过程中,充值和消费是两个完全独立的过程,需要用户定时关注自己的电子账户中的剩余资金,并及时充值,因而很有可能出现电子账户中的资金余额不足,用户无法消费的情况,给用户的使用带来不便,进而需要提供一种更简单更便捷的完成资金充值的资源配置方法。
发明内容
有鉴于此,本说明书实施例提供了一种资源配置方法。本说明书同时涉及一种资源配置装置,一种资源配置系统,一种计算设备,以及一种计算机可读存储介质,以解决现有技术中存在的技术缺陷。
根据本说明书实施例的第一方面,提供了一种资源配置方法,包括:检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
可选的,所述生成针对所述第一资源空间的资源获取请求,包括:生成用于获取资源的资源获取验证因子,并生成第二校验信息;根据资源转出的结果和所述资源获取验证因子生成第三校验信息;根据所述第二校验信息和所述第三校验信息,生成所述资源获取请求。
可选的,所述资源分配指令中携带有第四校验信息,所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间,包括:根据所述资源分配指令中携带的所述第四校验信息对所述资源分配指令进行校验,校验通过的情况下,执行所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间的操作步骤。
可选的,所述生成针对所述第一资源空间的资源获取请求之前,还包括:接收资源接收方发送的资源转出指令,所述资源转出指令携带有待转出的第二目标资源;根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间,所述第二资源空间为所述资源接收方对应的资源空间;在所述第二目标资源转出完成的情况下,确定检测到所述第一资源空间发生资源转出。
可选的,所述资源转出指令还携带有第一校验信息,所述接收资源接收方发送的资源转出指令之后,且根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间之前,还包括:根据所述第一校验信息对所述资源转出指令进行校验,校验通过的情况下,执行所述根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述接收资源接收方发送的资源转出指令之后,且根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间之前,还包括:判断所述第一资源空间中的资源是否大于等于所述第二目标资源,若是,则执行所述根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间之后,还包括:在所述第二目标资源转出完成的情况下,判断所述第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对所述第一资源空间的资源获取请求。
可选的,所述将所述第一资源空间中的第二目标资源转出至第二资源空间之后,还包括:生成携带第五校验信息的第一资源转移应答消息;将所述第一资源转移应答消息发送给所述资源管理方。
可选的,所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间之后,还包括:生成携带第六校验信息的第二资源转移应答消息;将所述第二资源转移应答消息发送给所述资源管理方。
可选的,所述根据资源转出的结果和所述资源获取验证因子生成第三校验信息之后,还包括:根据所述第三校验信息生成第三资源转移应答消息;将所述第三资源转移应答消息发送给资源接收方。
根据本说明书实施例的第二方面,提供了一种资源配置装置,包括:生成模块,被配置为检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;第一接收模块,被配置为将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;转移模块,被配置为根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
根据本说明书实施例的第三方面,提供了一种资源配置系统,所述系统包括第一终端设备、配置有目标应用的第二终端设备和所述目标应用的资源管理业务的服务器,所述第一终端设备与所述第二终端设备建立通信连接,所述第二终端设备与所述服务器建立通信连接;所述第一终端设备,被配置为生成资源转出指令,并将所述资源转出指令发送给所述第二终端设备,所述资源转出指令携带有待转出的第二目标资源;所述第二终端设备,被配置为接收所述资源转出指令,根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,所述第一资源空间为所述目标应用对应的资源空间,所述第二资源空间为所述第一终端设备对应的资源空间;根据资源转出的结果,生成针对所述第一资源空间的资源获取请求,并将所述资源获取请求发送给所述服务器;接收所述服务器返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间;所述服务器,被配置为接收所述资源获取请求,根据所述资源获取请求生成携带所述第一目标资源的资源分配指令,并将所述资源分配指令发送给所述第二终端设备。
可选的,所述资源转出指令还携带有第一校验信息,所述第二终端设备进一步被配置为:接收到所述资源转出指令的情况下,根据所述第一校验信息对所述资源转出指令进行校验,校验通过的情况下,执行所述根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述第二终端设备进一步被配置为:生成用于获取资源的资源获取验证因子,并生成第二校验信息;根据资源转出的结果和所述资源获取验证因子生成第三校验信息,将所述第二校验信息和所述第三校验信息携带在所述资源获取请求中。
可选的,所述服务器进一步被配置为:根据所述资源获取请求中携带的所述第三校验信息,对所述资源获取请求进行校验,校验通过的情况下,根据所述第二校验信息 和所述第三校验信息生成第四校验信息;将所述第四校验信息携带在所述资源分配指令中。
可选的,所述第二终端设备进一步被配置为:根据所述资源分配指令中携带的所述第四校验信息对所述资源分配指令进行校验,校验通过的情况下,执行所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间的操作步骤。
可选的,所述第二终端设备进一步被配置为:接收到所述资源转出指令的情况下,判断所述第一资源空间中的资源是否大于等于所述第二目标资源,若是,则执行所述将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述第二终端设备进一步被配置为:在所述第二目标资源转出完成的情况下,判断所述第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对所述第一资源空间的资源获取请求。
可选的,所述第二终端设备进一步被配置为:在将第一资源空间中的第二目标资源转出至第二资源空间的情况下,生成携带第五校验信息的第一资源转移应答消息;将所述第一资源转移应答消息发送给所述服务器;相应的,所述服务器进一步被配置为:根据接收到的所述第一资源转移应答消息中携带的所述第五校验信息,对所述第一资源转移应答消息进行校验,校验通过的情况下,对所述第一资源空间的资源进行更新。
可选的,所述第二终端设备进一步被配置为:在将所述第一目标资源转移至所述目标应用的所述第一资源空间的情况下,生成携带第六校验信息的第二资源转移应答消息;将所述第二资源转移应答消息发送给所述服务器;相应的,所述服务器进一步被配置为:根据接收到的所述第二资源转移应答消息中携带的所述第六校验信息,对所述第二资源转移应答消息进行校验,校验通过的情况下,对所述第一资源空间的资源进行更新。
可选的,所述第二终端设备进一步被配置为:根据所述第三校验信息生成第三资源转移应答消息;将所述第三资源转移应答消息发送给所述第一终端设备;相应的,所述第一终端设备进一步被配置为:根据接收到的所述第三资源转移应答消息,生成并展示资源转出的结果。
可选的,所述第一终端设备进一步被配置为:向所述第二终端设备发送携带有所述第一终端设备的设备标识的应用选择指令,并接收所述第二终端设备返回的应用应答消息;在接收到所述应用应答消息的情况下,生成所述资源转出指令;相应的,所述第二终端设备进一步被配置为:根据接收到的所述应用选择指令中携带的所述设备标识,确定对应的目标应用,并将所述应用选择指令发送给所述目标应用;获取所述目标应用返回的应用应答消息,并将所述应用应答消息发送给所述第一终端设备。
根据本说明书实施例的第四方面,提供了一种资源配置方法,包括:第一终端设备生成资源转出指令,并将所述资源转出指令发送给第二终端设备,所述资源转出指令携带有待转出的第二目标资源;所述第二终端设备接收所述资源转出指令,根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,所述第一资源空间为所述目标应用对应的资源空间,所述第二资源空间为所述第一终端设备对应的资源空间;根据资源转出的结果,生成针对所述第一资源空间的资源获取请求,并将所述资源获取请求发送给服务器;所述服务器接收所述资源获取请求,根据所述资源获取请求生成携带有待分配的第一目标资源的资源分配指令,并将所述资源分配指令发送给所述第二终端设备;所述第二终端设备接收所述服务器返回的所述资源分配指令;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
根据本说明书实施例的第五方面,提供了一种计算设备,包括:存储器和处理器;所述存储器用于存储计算机可执行指令,所述处理器用于执行所述计算机可执行指令, 以实现下述方法:检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
根据本说明书实施例的第六方面,提供了一种计算机可读存储介质,其存储有计算机可执行指令,该指令被处理器执行时实现所述第一方面提供的资源配置方法的步骤。
本说明书提供的资源配置方法,检测到目标应用的第一资源空间发生资源转出的情况下,生成针对第一资源空间的资源获取请求;将资源获取请求发送给目标应用的资源管理方,并接收资源管理方针对资源获取请求返回的资源分配指令,资源分配指令中携带有待分配的第一目标资源;根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。这种情况下,由于向第一资源空间中配置的资源是用于后续资源转出的,即获取资源的行为和资源转出的行为是相互关联的,因而如果第一资源空间发生了资源转出,则可以根据资源转出的结果,直接自动发起资源获取操作,以向资源管理方请求获取资源,不需要用户再单独发起资源获取操作,保证了第一资源空间中始终有充足的资源用于资源转出,避免了余额不足导致的无法消费的情况,便于用户的使用,提高了用户的使用体验。
附图说明
图1是本说明书一实施例提供的一种资源配置方法的流程图;
图2是本说明书一实施例提供的一种应用于终端设备的资源配置方法的处理流程图;
图3是本说明书一实施例提供的一种应用于公共交通场景的资源配置方法的交互图;
图4是本说明书一实施例提供的一种资源配置装置的结构示意图;
图5是本说明书一实施例提供的一种资源配置系统的结构示意图;
图6是本说明书一实施例提供的一种计算设备的结构框图。
具体实施方式
在下面的描述中阐述了很多具体细节以便于充分理解本说明书。但是本说明书能够以很多不同于在此描述的其它方式来实施,本领域技术人员可以在不违背本说明书内涵的情况下做类似推广,因此本说明书不受下面公开的具体实施的限制。
在本说明书一个或多个实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本说明书一个或多个实施例。在本说明书一个或多个实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本说明书一个或多个实施例中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本说明书一个或多个实施例中可能采用术语第一、第二等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本说明书一个或多个实施例范围的情况下,第一也可以被称为第二,类似地,第二也可以被称为第一。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
首先,对本说明书一个或多个实施例涉及的名词术语进行解释。
射频识别(RFID):无线射频识别技术,Radio Frequency Identification的缩写,是自动识别技术的一种,其原理为阅读器与标签之间进行非接触式的数据通信,达到识别目标的目的。具体的,可以通过无线射频方式进行非接触双向数据通信,利用无线射频方式对记录媒体(电子标签或射频卡)进行读写,从而达到识别目标和数据交换的目的,RFID可以通过无线电波不接触快速信息交换和存储技术,通过无线通信结合数据访问技术,然后连接数据库系统,加以实现非接触式的双向通信,从而达到了识别的目的,用于数据交换,串联起一个极其复杂的系统,在识别系统中,通过电磁波实现电子标签的读写与通信。RFID的应用非常广泛,典型应用有动物晶片、汽车晶片防盗器、门禁管制、停车场管制、生产线自动化、物料管理等。
NFC:近场通信(Near Field Communication,简称NFC),是一种新兴的技术,使用了NFC技术的设备(例如移动电话)可以在彼此靠近的情况下进行数据交换,是由非接触式射频识别(RFID)及互连互通技术整合演变而来的,通过在单一芯片上集成感应式读卡器、感应式卡片和点对点通信的功能,利用移动终端实现移动支付、电子票务、门禁、移动身份识别、防伪等应用。
移动终端:也称移动通信终端,是指可以在移动中使用的计算机设备,广义的讲包括手机、笔记本、平板电脑、POS机甚至包括车载电脑。但是大部分情况下是指手机或者具有多种应用功能的智能手机以及平板电脑。随着网络和技术朝着越来越宽带化的方向的发展,移动通信产业将走向真正的移动信息时代。另一方面,随着集成电路技术的飞速发展,移动终端已经拥有了强大的处理能力,移动终端正在从简单的通话工具变为一个综合信息处理平台。
智能卡:内嵌有微芯片的塑料卡(通常是一张信用卡的大小)的通称,一些智能卡包含一个微电子芯片,智能卡需要通过读写器进行数据交互,智能卡配备有CPU、RAM和I/O,可自行处理数量较多的数据而不会干扰到主机CPU的工作。智能卡还可过滤错误的数据,以减轻主机CPU的负担,适应于端口数目较多且通信速度需求较快的场合。卡内的集成电路包括中央处理器CPU、可编程只读存储器EEPROM、随机存储器RAM和固化在只读存储器ROM中的卡内操作系统COS(Chip Operating System),卡中数据分为外部读取和内部处理部分。
COS:全称是Chip Operating System(片内操作系统),一般是紧紧围绕着它所服务的智能卡的特点而开发的,COS是一个专用系统而不是通用系统,即一种COS一般都只能应用于特定的某种(或者是某些)智能卡,不同卡内的COS一般是不相同的。与那些常见的微机上的操作系统相比较而言,COS在本质上更加接近于临控程序,而不是一个通常所谓的真正意义上的操作系统,在当前阶段,COS所需要解决的主要还是对外部的命令如何进行处理、响应的问题,这其中一般并不涉及到共享、并发的管理及处理,而且就智能卡在应用情况而看,并发和共享的工作也确实是不需要的。
Applet:应用程序单元,一种基于java语言在移动终端平台上开发的移动应用,用于实现移动终端的业务逻辑,可以是COS的一种形态。
APDU:ApplicationProtocolDataUnit,应用协议数据单元。协议数据单元PDU(ProtocolDataUnit)是指对等层次之间传递的数据单位;协议数据单元物理层的PDU是数据位(bit),数据链路层的PDU是数据帧(frame),网络层的PDU是数据包(packet),传输层的PDU是数据段(segment),其他更高层次的PDU是数据(data)。
token(令牌):在计算机身份认证中是令牌(临时)的意思,代表执行某些操作的权利的对象,通俗点可以叫暗号,在一些数据传输之前,要先进行暗号的核对,不同的暗号被授权不同的数据操作。
在本说明书中,提供了一种资源配置方法,本说明书同时涉及一种资源配置装置,一种资源配置系统,一种计算设备,以及一种计算机可读存储介质,在下面的实施例中 逐一进行详细说明。
图1示出了根据本说明书一实施例提供的一种资源配置方法的流程图,具体包括以下步骤:步骤102:检测到目标应用的第一资源空间发生资源转出的情况下,生成针对第一资源空间的资源获取请求。
实际应用中,可以在目标应用的资源空间中预存一定数值的资源,用于后续的资源转出;后续用户在消费时,可以直接从该资源空间中转出相应数值的资源,转给资源接收方。然而,上述过程中,资源预存和资源转出是两个完全独立的过程,需要定时关注目标应用的资源空间中的剩余资源,并及时向资源管理方获取资源进行预存,因而很有可能出现资源空间中的资源余额不足,无法转出的情况,给用户的使用带来不便。
本说明书提供了一种资源配置方法,检测到目标应用的第一资源空间发生资源转出的情况下,生成针对第一资源空间的资源获取请求;将资源获取请求发送给目标应用的资源管理方,并接收资源管理方针对资源获取请求返回的资源分配指令,资源分配指令中携带有待分配的第一目标资源;根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。这种情况下,由于向第一资源空间中配置的资源是用于后续资源转出的,即获取资源的行为和资源转出的行为是相互关联的,因而如果第一资源空间发生了资源转出,则可以根据资源转出的结果,直接自动发起资源获取操作,以向资源管理方请求获取资源,不需要用户再单独发起资源获取操作,保证了第一资源空间中始终有充足的资源用于资源转出,避免了余额不足导致的无法消费的情况。
具体的,目标应用是指资源转出方的应用,如目标应用可以为公交卡应用、一卡通应用、饭卡应用、充值卡应用等。第一资源空间是指目标应用存储资源的空间,该资源包括但不限于资金、数据资源、计算资源或虚拟资源等。资源转出是指将第一资源空间中的资源转移至其他资源空间。资源获取请求是指获取资源的请求,即增加第一资源空间中的资源的请求。以资源为资金为例,第一资源空间就是目标应用存储资金的账户,资源转出就是指扣除该账户中的目标数额的资金,资源获取请求就是向该账户充值资金的请求。
实际应用中,可以通过为所述目标应用创建虚拟卡,如虚拟公交卡,虚拟饭卡等的方式来实现本方案。
所述虚拟卡的创建过程可以包括:接收对所述目标应用的虚拟卡申请请求;在接收到针对所述虚拟卡的申请确认信息的情况下,为所述目标应用创建所述虚拟卡,并将所述虚拟卡与所述第一资源空间进行关联。
以交通卡为例,实际应用中,可以通过NFC交通卡小程序提供虚拟卡的申请入口。并且可以通过领卡页来展示卡片特性,提示用户同意领卡,然后通过代扣签约页提示用户签约代扣服务,当用户完成代扣服务签约,则相当于发出了对所述交通卡的申请确认信息,则签约成功,进入写卡页面调用手机服务开始写卡,交通卡就创建完成。
完成创建后,可以将该交通卡和用户的资源空间进行绑定,后续用户就可以通过这个交通卡搭乘公共交通工具了。
当然,在创建了虚拟卡之后,如果后续无需再使用所述目标应用,则可以将创建的虚拟卡删除。删除的方法可以包括:接收对所述虚拟卡的退还请求;在接收到针对所述虚拟卡的退还确认信息的情况下,删除所述虚拟卡数据,并解除所述虚拟卡与所述第一资源空间的关联。
仍然以交通卡为例,依然可以通过NFC交通卡小程序来实现。在卡片详情页点击退卡,调用手机服务删除卡片数据,交通卡对应的应用退还用户卡片余额后,退卡状态由退卡中更新为完成。退卡时还需要解除交通卡关联的第一资源空间。
需要说明的是,在检测到目标应用的第一资源空间发生资源转出的情况下,说明 第一资源空间中的资源减少了,此时可以自动触发生成针对第一资源空间的资源获取请求,用来补充第一资源空间中的资源,不需要用户再单独发起资源获取操作,保证了第一资源空间中始终有充足的资源用于资源转出。
本实施例一个可选的实施方式中,在接收到资源转出指令的情况下,才会对第一资源空间中的资源进行转出,进而才会检测到目标应用的第一资源空间发生资源转出,因而本说明书中在生成针对第一资源空间的资源获取请求之前,还包括:接收资源接收方发送的资源转出指令,资源转出指令携带有待转出的第二目标资源;根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,第二资源空间为资源接收方对应的资源空间;在第二目标资源转出完成的情况下,确定检测到第一资源空间发生资源转出。
具体的,资源接收方是指接收资源的一方,第二资源空间为资源接收方存储资源的空间,资源转出指令是指用于将资源转出方的资源转出至资源接收方的指令,如资源接收方可以为公交刷卡机、地铁闸机、饭卡刷卡机、门禁设备等。第二目标资源是指待转出的资源,即需要将多少资源从第一资源空间中转出至第二资源空间中,以资源为资金为例,若在资源接收方消费了20元钱,即第二目标资源为20元钱,此时会接收到资源接收方发送的转出20元钱的资源转出指令,在接收到该资源转出指令后,就会将第一资源空间中的20元钱转出给第二资源空间,转出完成之后,第一资源空间中的资金会减少20元钱,此时即可以确定检测到第一资源空间发生资源转出行为。
本实施例一个可选的实施方式中,资源接收方发送的资源转出指令中还可以携带第一校验信息,使得资源转出方接收到资源转出指令后,可以先对资源接收方的身份进行合法校验,在校验通过后,再进行资源转出,具体实现过程可以如下:根据第一校验信息对资源转出指令进行校验,校验通过的情况下,执行根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
具体的,第一校验信息是资源接收方生成的,可代表资源接收方身份的标识信息,如第一校验信息可以是一个token(令牌),该token可为资源接收方的设备地址。资源接收方和资源转出方在进行资源转出之前会建立通信连接,在建立通信连接后,资源接收方可向资源转出方发送资源转出指令,资源转出方接收到资源转出指令后,对资源接收方的身份进行校验,校验通过后,进行资源转出,若校验不通过,则不执行资源转出。
本说明书中可以对接收到的资源转出指令中携带的第一校验信息进行校验,从而对资源接收方的身份进行合法验证,在所述资源接收方的身份通过合法验证的情况下,才会进行资源转出,保证了资源转出方的资源安全。
本实施例一个可选的实施方式中,只有第一资源空间中的资源足够进行资源转出的情况下,才能正常进行资源转出,因而需要在转出资源之前,对第一资源空间中的资源进行判断,具体实现过程可以如下:
判断第一资源空间中的资源是否大于等于第二目标资源,若是,则执行根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
需要说明的是,第二目标资源是待转出的资源,因而可判断第一资源空间中的资源是否大于等于第二目标资源,若是,则说明第一资源空间中的资源足够支持此次资源转出,此时正常执行将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤,资源转出成功。若否,则说明第一资源空间中的资源不能支持此次资源转出,此时不执行将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤,资源转出失败。
本实施例一个可选的实施方式中,将第一资源空间中的第二目标资源转出至第二资源空间之后,还包括:生成携带第五校验信息的第一资源转移应答消息;将第一资源转移应答消息发送给资源管理方。
具体的,第五校验信息是资源转出方(目标应用)生成的,代表资源转出方转出资源的行为合法的标识信息,如第五校验信息也可以是一个token(令牌)。第一资源转移应答消息是指资源转出的结果,即转出凭证。由于资源管理方会管理资源转出方的资源,因而如果将第一资源空间中的第二目标资源转出至第二资源空间,则需要通知资源管理方,同步资源转出的操作,更新资源管理方存储的第一资源空间的资源。
本实施例一个可选的实施方式中,在资源转出完成之后,可以自动直接生成针对第一资源空间的资源获取请求。也就是说,只要第一资源空间发生了资源转出,那么就会直接发起资源获取操作,即一边转出一边获取。
本实施例一个可选的实施方式中,在资源转出完成之后,还可以根据第一资源空间中的剩余资源,确定是否发起资源获取请求,具体实现过程可以如下:在第二目标资源转出完成的情况下,判断第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对第一资源空间的资源获取请求。
具体的,预设阈值是预先设置的一个数值,用于判断是否发起资源获取请求,如预设阈值可以为20、30、50等。本说明书中在将第一资源空间中的资源转出至第二资源空间后,可以判断第一资源空间中剩余资源是否大于预设阈值,若否,则说明第一资源空间中的剩余资源较少,此时可以生成针对第一资源空间的资源获取请求;若是,则说明第一资源空间中的剩余资源较多,此时可以不生成针对第一资源空间的资源获取请求,即不进行资源获取操作。
本实施例一个可选的实施方式中,在生成针对第一资源空间的资源获取请求时,也可以携带校验信息,以证明该资源获取请求合法性,具体实现过程可以如下:生成用于获取资源的资源获取验证因子,并生成第二校验信息;根据资源转出的结果和资源获取验证因子生成第三校验信息;根据第二校验信息和第三校验信息,生成资源获取请求。
具体的,资源获取验证因子是指资源转出方(目标应用)在转出资源之后生成的身份验证信息,资源转出的结果是指资源转出的凭证,第一资源空间发生了资源转出,证明第一资源空间可以合法进行资源获取,因而可以根据资源转出的结果和资源获取验证因子共同生成第三校验信息,该第三校验信息用于证明资源获取行为合法。
另外,第二校验信息是资源转出方生成的一个用于后续校验资源管理方是否合法的信息,该第二校验信息可以是资源转出方生成的随机数,资源转出方将该随机数携带在资源获取请求中发送给资源管理方后,资源管理方可以对该随机数进行加密,然后再携带在资源分配指令中返回给资源转出方,资源转出方对随机数进行解密,判断和之前生成的随机数是否相同,来验证资源管理方的身份是否合法。
本说明书中在生成资源获取请求时,不仅会在资源获取请求中携带用于验证资源获取行为是否合法的第三校验信息,还会携带后续用于校验资源管理方身份是否合法的第二校验信息,极大的保证了整个资源获取过程的安全性。
另外,除了在资源获取请求中携带第二校验信息和第三校验信息外,还可以根据应用场景的不同,在资源获取请求中携带其他参数,以避免针对一个任务重复下发多次资源分配指令,示例的,交易场景下,产生交易后会生成资源获取请求,该资源获取请求中除了携带随机数、资源获取验证因子等校验信息外,还可以携带有交易时间、交易序列号、交易设备等参数信息,使得后续资源管理方在接收到资源获取请求后,可以对该资源获取请求进行校验和分析,保证了针对同一交易任务,资源管理方只下发一次资源分配指令。
本实施例一个可选的实施方式中,在资源转出完成后,还可以将资源转出结果返回给资源接收方,具体实现过程可以如下:根据第三校验信息生成第三资源转移应答消息;将第三资源转移应答消息发送给资源接收方。
需要说明的是,第三资源转移应答消息是指资源转出方的资源转出的结果,即是否成功转出资源。由于第三校验信息是根据资源转出的结果和资源获取验证因子生成的,因而第三校验信息中即包括资源转出方在转出资源之后生成的身份验证信息,又包括资源转出的凭证,因而可以直接根据第三校验信息生成该第三资源转移应答消息,资源接收方接收到该第三资源转移应答消息后,可以根据第三校验信息,验证资源转出方的身份,并同时获取到资源转出的结果。
步骤104:将资源获取请求发送给目标应用的资源管理方,并接收资源管理方针对资源获取请求返回的资源分配指令,资源分配指令中携带有待分配的第一目标资源。
具体的,资源管理方是管理目标应用的资源的一方,即资源管理方中存储有目标应用的第一资源空间的资源,如资源管理方可以为目标应用的服务器。第一目标资源是指待分配的资源,即需要将多少资源分配给第一资源空间,以资源为资金为例,资源分配指令中携带的第一目标资源可以为100元钱。资源分配指令是指向目标应用的第一资源空间分配资源的指令,该资源分配指令可以为APDU指令,该APDU指令中可以携带多个标识参数,通过各个标识参数,指示资源转移的具体操作。
需要说明的是,本说明书中将针对目标应用的第一资源空间的资源转出行为和资源获取行为进行关联,只要检测到第一资源空间发生了资源转出,就会自动发起资源获取。另外,本说明书中不对从第一资源空间中转出资源的数额,以及向第一资源空间转移资源的数额进行限定,其可以相同,也可以不同;也即是,第一目标资源可以和第二目标资源相同,也可以不同,都可以预先进行设置,本说明书不进行限定。
也就是说,本说明书中从第一资源空间中转出了多少资源,就可以向资源管理方申请获取多少资源,或者可以向资源管理方申请获取转出资源的预设倍数的资源。示例的,以消费扣款场景为例,假设从第一资金账户中扣除了100元钱,则此时可以自动发起充值请求,请求向第一资金账户充值100元钱,也可以请求向第一资金账户充值200元钱。
步骤106:根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。
需要说明的是,接收到资源管理方返回的资源分配指令后,表示资源管理方已经同意资源获取请求,此时直接根据资源分配指令中携带的参数,执行该资源分配指令即可,如第一目标资源为100元钱,此时可以在目标应用的第一资源空间中增加100元钱。本实施例一个可选的实施方式中,资源管理方在返回资源分配指令时,也可以在该资源分配指令中携带第四校验信息,用来证明资源管理方的身份合法,此时在根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间时,就需要先对资源分配指令中携带的第四校验信息进行校验,具体实现过程可以如下:根据资源分配指令中携带的第四校验信息对资源分配指令进行校验,校验通过的情况下,执行根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间的操作步骤。
具体的,第四校验信息是资源管理方根据第二校验信息和第三校验信息生成的,用于校验资源管理方身份是否合法的信息。
本说明书中在接收到资源分配指令时,可先对资源分配指令中携带的第四校验信息进行校验,校验通过再执行该资源分配指令,极大保证了整个资源获取过程的安全性。
本实施例一个可选的实施方式中,根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间之后,还包括:生成携带第六校验信息的第二资源转移应答消息;
将第二资源转移应答消息发送给资源管理方。
具体的,第六校验信息是资源转出方(目标应用)生成的,代表资源转出方的身份标识信息,如第六校验信息也可以是一个token(令牌)。第二资源转移应答消息是指向第一资源空间中增加资源的结果。由于资源管理方会管理资源转出方的资源,因而如 果将第一目标资源转移至目标应用的第一资源空间,则需要通知资源管理方,同步资源转移的操作,更新资源管理方存储的第一资源空间的资源。
本说明书提供的资源配置方法,检测到目标应用的第一资源空间发生资源转出的情况下,生成针对第一资源空间的资源获取请求;将资源获取请求发送给目标应用的资源管理方,并接收资源管理方针对资源获取请求返回的资源分配指令,资源分配指令中携带有待分配的第一目标资源;根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。这种情况下,由于向第一资源空间中配置的资源是用于后续资源转出的,即获取资源的行为和资源转出的行为是相互关联的,因而如果第一资源空间发生了资源转出,则可以根据资源转出的结果,直接自动发起资源获取操作,以向资源管理方请求获取资源,不需要用户再单独发起资源获取操作,保证了第一资源空间中始终有充足的资源用于资源转出,避免了余额不足导致的无法消费的情况,便于用户的使用,提高了用户的使用体验。
下述结合附图2,以本说明书提供的资源配置方法在终端设备的应用为例,对所述资源配置方法进行进一步说明。其中,图2示出了本说明书一实施例提供的一种应用于终端设备的资源配置方法的处理流程图,具体包括以下步骤:
步骤202:第一终端设备生成资源转出指令,并将资源转出指令发送给第二终端设备,资源转出指令携带有待转出的第二目标资源。
具体的,第一终端设备可以为资源接收方的设备,如公交卡刷卡机、地铁闸机、饭卡刷卡机、门禁设备等;第二终端设备可以为资源转出方的设备,如用户使用的移动终端(手机、平板、手环等)。第一终端设备和第二终端设备建立通信连接,具体实现时,第一终端设备可以通过(不限于)近场通信(Near Field Communication,简称NFC)实现连接。
另外,目标应用是指资源转出方的应用,包括但不限于电子公交卡应用、电子饭卡应用,第二终端设备配置有目标应用,也即目标应用可以和第二终端设备进行通信连接,也可以直接安装在第二终端设备上。示例的,目标应用可以为智能卡里面设置的COS应用,该智能卡可以和第二终端设备进行通信连接,此时第二终端设备即配置有该目标应用;或者,目标应用可以为第二终端设备里面安装的应用程序(Applet),该应用程序(Applet)实际上也是一个COS应用。
本实施例一个可选的实施方式中,第一终端设备生成资源转出指令之前,还应该先确定第二终端设备中是否存在对应的目标应用,因而第一终端设备应该提前向第二终端设备发送应用选择指令,指示第二终端设备找到对应的目标应用,并返回应答消息,具体实现过程如下:第一终端设备向第二终端设备发送携带有第一终端设备的设备标识的应用选择指令,并接收第二终端设备返回的应用应答消息;第二终端设备根据接收到的应用选择指令中携带的设备标识,确定对应的目标应用,并将应用选择指令发送给该目标应用;之后,获取目标应用返回的应用应答消息,将应用应答消息发送给第一终端设备;第一终端设备在接收到应用应答消息的情况下,生成资源转出指令。
具体的,该设备标识可以唯一标识第一终端设备,根据该设备标识可确定出对应的目标应用。需要说明的是,第一终端设备是资源接收方,一般来说,资源接收方都会有对应的资源转出方,该资源转出方一般是通过一个应用实现资源存储和转移的,示例的,若第一终端设备为地铁闸机,那么就需要在第二终端设备中找到对应的地铁卡应用;若第一终端设备为公交刷卡机,那么就需要在第二终端设备中找到对应的公交卡应用。
本说明书中第一终端设备可以向第二终端设备发送携带有第一终端设备的设备标识的应用选择指令,第二终端设备接收到该应用选择指令后,查找是否存在对应的目标应用,在查找到的情况下,将所述应用选择指令透传给目标应用,目标应用接收到应用选择指令后,可以向第二终端设备返回应用应答消息,表示已经知道要进行资源转出, 第二终端设备将该应用应答消息转发给第一终端设备,此时第一终端设备获知第二终端设备存在能够进行资源转出的目标应用,生成资源转出指令。
步骤204:第二终端设备接收资源转出指令,根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,第一资源空间为目标应用对应的资源空间,第二资源空间为第一终端设备对应的资源空间。
具体的,第一资源空间是指资源转出方第二终端设备配置的目标应用存储资源的空间。第二资源空间是资源接收方第一终端设备存储资源的空间。
本实施例一个可选的实施方式中,第一终端设备发送的资源转出指令中还可以携带第一校验信息,使得第二终端设备的目标应用在接收到资源转出指令后,可以先对第一终端设备的身份进行合法校验,在校验通过后,再进行资源转出,具体实现过程可以如下:第二终端设备的目标应用接收到资源转出指令的情况下,可以根据第一校验信息对资源转出指令进行校验,校验通过的情况下,执行根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
需要说明的是,第一终端设备将资源转出指令发送给第二终端设备后,第二终端设备(收发模块)可以将该资源转出指令透传给目标应用,然后目标应用可以对资源转出指令进行校验,并在校验通过的情况下,执行该资源转出指令。
本说明书中可以对接收到的资源转出指令中携带的第一校验信息进行校验,从而对第一终端设备的身份进行合法验证,在第一终端设备的身份通过合法验证的情况下,才会进行资源转出,保证了第二终端设备的目标应用中资源的安全。
本实施例一个可选的实施方式中,只有第一资源空间中的资源足够进行资源转出的情况下,才能正常进行资源转出,因而需要在转出资源之前,对第一资源空间中的资源进行判断,具体实现过程可以如下:第二终端设备的目标应用接收到资源转出指令的情况下,判断第一资源空间中的资源是否大于等于第二目标资源,若是,则执行将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
本实施例一个可选的实施方式中,第二终端设备的目标应用将第一资源空间中的第二目标资源转出至第二资源空间之后,还包括:第二终端设备的目标应用生成携带第五校验信息的第一资源转移应答消息,并将第一资源转移应答消息发送给服务器;服务器根据接收到的第一资源转移应答消息中携带的第五校验信息,对第一资源转移应答消息进行校验,校验通过的情况下,对第一资源空间的资源进行更新。
其中,该服务器是指目标应用的资源管理业务的服务器。也就是说,该服务器会管理目标应用的资源,因而如果将目标应用的第一资源空间中的第二目标资源转出至第二资源空间,则需要通知服务器,同步资源转出的操作,更新服务器存储的第一资源空间的资源。
本实施例一个可选的实施方式中,在资源转出完成后,第二终端设备的目标应用还可以将资源转出结果返回给服务器,具体实现过程可以如下:第二终端设备的目标应用根据第三校验信息生成第三资源转移应答消息,并将第三资源转移应答消息发送给第一终端设备;第一终端设备根据接收到的第三资源转移应答消息,生成并展示资源转出的结果。
示例的,地铁卡应用的资源空间向地铁闸机设备对应的资源空间转出了5元钱,转出成功后,地铁卡应用会生成第三资源转移应答消息,该消息指示成功向地铁闸机设备对应的资源空间转出了5元钱,地铁闸机设备接收到该第三资源转移应答消息后,展示扣费成功,并打开闸门,让用户通行。
步骤206:第二终端设备根据资源转出的结果,生成针对第一资源空间的资源获取请求,并将资源获取请求发送给服务器。
需要说明的是,第二终端设备接收资源转出指令,根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间有两个转出结果,转出成功和转出失败。若转出成功,则说明第一资源空间中的资源减少了,此时可以确定检测到目标应用的第一资源空间发生资源转出,自动触发生成针对第一资源空间的资源获取请求,用来补充第一资源空间中的资源,此种情况下,只要第一资源空间发生了资源转出,那么就会直接发起资源获取操作,即一边转出一边获取,始终保证第一资源空间中有足够的资源。
若转出失败,则说明第一资源空间中的资源可能没有发生变化,可以不生成资源获取请求。但是,若目标应用在进行资源转出之前,还判断了第一资源空间中的资源是否能够支持此次资源转出,那么若第一资源空间中的资源小于第二目标资源,则不会执行资源转出指令,会导致转出失败,而此种转出失败是由于第一资源空间中的资源不足,需要获取资源,因而此时目标应用可以生成一个资源不足的标识,若检测到该标识,也可以确定检测到目标应用的第一资源空间发生资源转出,生成针对第一资源空间的资源获取请求。
本实施例一个可选的实施方式中,在第二目标资源转出完成之后,还可以根据第一资源空间中的剩余资源,确定是否发起资源获取请求,具体实现过程可以如下:
第二终端设备的目标应用判断第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对第一资源空间的资源获取请求。
本实施例一个可选的实施方式中,第二终端设备的目标应用在生成针对第一资源空间的资源获取请求时,也可以携带校验信息,以证明该资源获取请求合法性,具体实现过程可以如下:生成用于获取资源的资源获取验证因子,并生成第二校验信息;根据资源转出的结果和资源获取验证因子生成第三校验信息,将第二校验信息和第三校验信息携带在资源获取请求中。
本说明书中第二终端设备的目标应用在生成资源获取请求时,不仅会在资源获取请求中携带用于验证资源获取行为是否合法的第三校验信息,还会携带后续用于校验资源管理方身份是否合法的第二校验信息,极大的保证了整个资源获取过程的安全性。
步骤208:服务器接收资源获取请求,根据资源获取请求生成携带有待分配的第一目标资源的资源分配指令,并将资源分配指令发送给第二终端设备。
具体实现时,服务器接收到资源获取请求后,说明服务器已经获知到目标应用想要获取资源的需求,此时服务器可以对该资源获取请求进行校验,在校验通过的情况下,生成资源分配指令,发送给第二终端设备的目标应用,代表服务器同意目标应用获取资源,具体实现过程可以如下:根据资源获取请求中携带的第三校验信息,对资源获取请求进行校验,校验通过的情况下,根据第二校验信息和第三校验信息生成第四校验信息;
将第四校验信息携带在资源分配指令中。
需要说明的是,第三校验信息是目标应用根据资源转出的结果和资源获取验证因子共同生成的,用于验证资源获取行为是否合法的信息,因而服务器在接收到资源获取请求后,只需要对该资源获取请求中的第三校验信息进行校验,即可确定资源获取行为是否合法。而第二校验信息是第二终端设备的目标应用生成的随机数,用于后续验证服务器的身份的,因而服务器只需要对第二校验信息进行加密,再返回给第二终端设备即可,因而服务器可以在第三校验信息通过校验的情况下,根据第二校验信息和第三校验信息生成第四校验信息,将第四校验信息携带在资源分配指令中返回给第二终端设备。
步骤210:第二终端设备接收服务器返回的资源分配指令,根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。
具体实现时,服务器在返回资源分配指令时,也可以在该资源分配指令中携带第四校验信息,用来证明服务器的身份合法,此时第二终端设备的目标应用在根据资源分 配指令,将第一目标资源转移至目标应用的第一资源空间时,就需要先对资源分配指令中携带的第四校验信息进行校验,具体实现过程可以如下:根据资源分配指令中携带的第四校验信息对资源分配指令进行校验,校验通过的情况下,执行根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间的操作步骤。
本实施例一个可选的实施方式中,第二终端设备根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间之后,还包括:第二终端设备的目标应用生成携带第六校验信息的第二资源转移应答消息,并将第二资源转移应答消息发送给服务器;服务器根据接收到的第二资源转移应答消息中携带的第六校验信息,对第二资源转移应答消息进行校验,校验通过的情况下,对第一资源空间的资源进行更新。
需要说明的是,由于服务器会管理目标应用的资源,因而如果成功将第一目标资源转移至目标应用的第一资源空间,则需要通知服务器,同步资源转移的操作,更新服务器存储的第一资源空间的资源。
本说明书提供的资源配置方法,第一终端设备生成资源转出指令,并将资源转出指令发送给第二终端设备;第二终端设备接收该资源转出指令,根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,并根据资源转出的结果,生成针对第一资源空间的资源获取请求,将资源获取请求发送给服务器;服务器接收资源获取请求,根据资源获取请求生成携带有待分配的第一目标资源的资源分配指令,并将资源分配指令发送给第二终端设备;第二终端设备接收服务器返回的资源分配指令,根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。这种情况下,由于向第一资源空间中配置的资源是用于后续资源转出的,即获取资源的行为和资源转出的行为是相互关联的,因而如果第一资源空间发生了资源转出,则可以根据资源转出的结果,直接自动发起资源获取操作,以向服务器请求获取资源,不需要用户再单独发起资源获取操作,保证了第一资源空间中始终有充足的资源用于资源转出,避免了余额不足导致的无法消费的情况,便于用户的使用,提高了用户的使用体验。
上述图2所示为本实施例的一种资源配置方法的示意性方案。需要说明的是,该资源配置方法的技术方案与上述图1所示的资源配置方法的技术方案属于同一构思,图2所示的资源配置方法的技术方案未详细描述的细节内容,均可以参见上述图1所述的资源配置方法的技术方案的描述。
下述结合附图3,以本说明书提供的资源配置方法在公共交通场景下的应用为例,对所述资源配置方法进行进一步说明。其中,图3示出了本说明书一实施例提供的一种应用于公共交通场景的资源配置方法的交互图,具体包括以下步骤:步骤302:移动终端靠近收款闸机后,收款闸机通过近场通信方式触发与移动终端建立通信连接。
实际应用中,公共交通领域出现了多种解决方案,用于服务各种出行支付,例如手机NFC乘坐公交、非接触智能卡乘坐地铁、二维码坐公交、二维码乘地铁。多种方式都有各自的优势,二维码应用减少了老百姓出行预充值的环节,实现了先乘车后支付,但是没有网络或者网络信号较差的情况下,用户无法打开或刷新二维码,常常导致无法乘车的问题。而手机NFC以及智能卡也有本身的优势,乘客可以在很短的时间内实现乘公交、做地铁,快速通行,但是必须需要预先充值,如果余额不足,将无法乘车。也就是说,现有卡应用的充值业务和消费业务是两个相互独立的流程。
本说明书中提供了一种资源配置方法,可以通过移动终端的NFC交通卡小程序提供虚拟卡的申请入口。通过领卡页来展示卡片特性,提示用户同意领卡,然后通过代扣签约页提示用户签约代扣服务,当用户完成代扣服务签约,则相当于发出了对所述交通卡的申请确认信息,则签约成功,进入写卡页面调用手机服务开始写卡,交通卡就创建完成。完成创建后,可以将该交通卡和用户的资源空间进行绑定,后续用户就可以通过这个交通卡搭乘公共交通工具了。
在检测到卡应用的资金账户发生扣款的情况下,生成针对该资金账户的充值请求;将充值请求发送给服务器,并接收服务器针对充值请求返回的充值指令;卡应用可以根据充值指令,向该资金账户中充值资金。这种情况下,卡应用本身直接将卡内的资金账户中的扣款行为和充值行为进行了关联,如果卡应用的资金账户发生了扣款,则可以根据扣款的结果,直接自动触发充值流程,并将该行为主动通知到移动终端,由移动终端发起资金充值请求,以向服务器请求充值资金,不需要用户再单独发起充值操作,保证了卡应用的资金账户中始终有充足的资金用于消费。
具体的,收款闸机包括但不限于地铁闸机,移动终端包括但不限于手机、平板。并且,该收款闸机和移动终端均具有NFC功能。用户将移动终端靠近收款闸机,收款闸机即可识别该移动终端,和移动终端建立连接。
具体实现时,收款闸机可以通过近场通信方式建立通信连接请求,其中,通信连接请求携带通信参数;移动终端靠近收款闸机后可以接收该通信连接请求,响应于通信连接请求,基于通信参数建立与收款闸机之间的通信连接。
需要说明的是,NFC是一种非接触式的短距离高频的无线电技术。一般的,NFC使用的频段可以为13.56MHz,使用距离通常在10cm以内。NFC芯片在启动的情况下,可以持续发出射频信号;NFC标签是一块可以写入数据的线圈,该线圈在接触到NFC芯片发出的射频信号时,可以产生携带所写入数据的信号;NFC芯片中的阅读器可以读取该信号并解析出携带的数据。
该收款闸机以及移动终端中均内置有NFC模块,收款闸机通过NFC模块持续发射频信号,建立通信连接请求,其中,通信连接请求中携带有收款闸机的设备信息,移动终端靠近收款闸机后,接收通信连接请求,响应于通信连接请求,根据收款闸机的设备信息与移动终端建立通信连接。
步骤304:收款闸机向移动终端发送携带有收款闸机的设备标识的应用选择指令。
步骤306:移动终端根据接收到的应用选择指令中携带的设备标识,确定对应的卡应用,并将应用选择指令发送给卡应用。
步骤308:卡应用接收到应用选择指令后,经移动终端向收款闸机返回应用应答消息。
步骤310:收款闸机生成扣款指令,并将扣款指令经移动终端发送给卡应用。
步骤312:卡应用接收扣款指令,根据扣款指令,从卡应用的资金账户中扣除第一目标资金,在卡应用扣款的同时,卡应用根据资金扣除的结果,生成针对卡应用的资金账户的充值请求,将充值请求经移动终端发送给服务器。
步骤314:卡应用生成扣费响应,并将扣费响应经移动终端发送给收款闸机,以把此扣费响应通知到收款闸机,之后收款闸机把扣费响应通知到对应的服务端,由服务端增加至收款闸机对应的资金账户中。
步骤316:收款闸机根据接收到的扣费响应,生成并展示扣费结果。
步骤318:服务器接收充值请求,根据充值请求生成充值指令,并将充值指令经移动终端发送给卡应用。
步骤320:卡应用接收服务器返回的充值指令,根据充值指令,在卡应用的资金账户中充值第二目标数额的资金,并生成充值响应,将充值响应经移动终端发送给服务器。
当然,在创建了虚拟卡之后,如果后续无需再使用所述目标应用,则可以将创建的虚拟卡删除。删除的方法可以包括:接收对所述虚拟卡的退还请求;在接收到针对所述虚拟卡的退还确认信息的情况下,删除所述虚拟卡数据,并解除所述虚拟卡与所述第一资源空间的关联。
仍然以交通卡为例,依然可以通过NFC交通卡小程序来实现。在卡片详情页点击退卡,调用手机服务删除卡片数据,交通卡对应的应用退还用户卡片余额后,退卡状态由退卡中更新为完成。退卡时还需要解除交通卡关联的第一资源空间。
本说明书提供的资源配置方法,由于向卡应用的资金账户中充值资金是用于后续消费使用的,即资金充值行为和消费行为是相互关联的,因而如果卡应用的资金账户发生了扣款,则可以根据扣款的结果,直接自动发起资金充值请求,以向服务器请求充值资金,不需要用户再单独发起充值操作,保证了卡应用的资金账户中始终有充足的资金用于消费,避免了余额不足导致的无法消费的情况,便于用户的使用,提高了用户的使用体验。
与上述图1所示的资源配置方法实施例相对应,本说明书还提供了资源配置装置实施例,图4示出了本说明书一实施例提供的一种资源配置装置的结构示意图。如图4所示,该装置包括:生成模块402,被配置为检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;第一接收模块404,被配置为将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;转移模块406,被配置为根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
可选的,生成模块402进一步被配置为:生成用于获取资源的资源获取验证因子,并生成第二校验信息;根据资源转出的结果和所述资源获取验证因子生成第三校验信息;根据所述第二校验信息和所述第三校验信息,生成所述资源获取请求。
可选的,转移模块406进一步被被配置为:根据所述资源分配指令中携带的所述第四校验信息对所述资源分配指令进行校验,校验通过的情况下,执行所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间的操作步骤。
可选的,所述装置还包括:第二接收模块,被配置为接收资源接收方发送的资源转出指令,所述资源转出指令携带有待转出的第二目标资源;转出模块,被配置为根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间,所述第二资源空间为所述资源接收方对应的资源空间;确定模块,被配置为在所述第二目标资源转出完成的情况下,确定检测到所述第一资源空间发生资源转出。
可选的,所述装置还包括:校验模块,被配置为根据所述第一校验信息对所述资源转出指令进行校验,校验通过的情况下,执行所述根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述装置还包括:第一判断模块,被配置为判断所述第一资源空间中的资源是否大于等于所述第二目标资源,若是,则执行所述根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述装置还包括:第二判断模块,被配置为在所述第二目标资源转出完成的情况下,判断所述第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对所述第一资源空间的资源获取请求。
可选的,所述装置还包括:第一生成模块,被配置为生成携带第五校验信息的第一资源转移应答消息;第一发送模块,被配置为将所述第一资源转移应答消息发送给所述资源管理方。
可选的,所述装置还包括:第二生成模块,被配置为生成携带第六校验信息的第二资源转移应答消息;第二发送模块,被配置为将所述第二资源转移应答消息发送给所述资源管理方。
可选的,生成模块402进一步被配置为:根据所述第三校验信息生成第三资源转 移应答消息;将所述第三资源转移应答消息发送给资源接收方。
本说明书提供的资源配置装置,检测到目标应用的第一资源空间发生资源转出的情况下,生成针对第一资源空间的资源获取请求;将资源获取请求发送给目标应用的资源管理方,并接收资源管理方针对资源获取请求返回的资源分配指令,资源分配指令中携带有待分配的第一目标资源;根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。这种情况下,由于向第一资源空间中配置的资源是用于后续资源转出的,即获取资源的行为和资源转出的行为是相互关联的,因而如果第一资源空间发生了资源转出,则可以根据资源转出的结果,直接自动发起资源获取操作,以向资源管理方请求获取资源,不需要用户再单独发起资源获取操作,保证了第一资源空间中始终有充足的资源用于资源转出,避免了余额不足导致的无法消费的情况,便于用户的使用,提高了用户的使用体验。
上述为本实施例的一种资源配置装置的示意性方案。需要说明的是,该资源配置装置的技术方案与上述的资源配置方法的技术方案属于同一构思,资源配置装置的技术方案未详细描述的细节内容,均可以参见上述资源配置方法的技术方案的描述。
与上述图2所示的资源配置方法实施例相对应,本说明书还提供了资源配置系统实施例,图5示出了本说明书一实施例提供的一种资源配置系统的结构示意图。如图5所示,该系统包括:第一终端设备502、配置有目标应用的第二终端设备504和所述目标应用的资源管理业务的服务器506,所述第一终端设备502与所述第二终端设备504建立通信连接,所述第二终端设备504与所述服务器506建立通信连接;所述第一终端设备502,被配置为生成资源转出指令,并将所述资源转出指令发送给所述第二终端设备,所述资源转出指令携带有待转出的第二目标资源;所述第二终端设备504,被配置为接收所述资源转出指令,根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,所述第一资源空间为所述目标应用对应的资源空间,所述第二资源空间为所述第一终端设备对应的资源空间;根据资源转出的结果,生成针对所述第一资源空间的资源获取请求,并将所述资源获取请求发送给所述服务器;接收所述服务器返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间;所述服务器506,被配置为接收所述资源获取请求,根据所述资源获取请求生成携带所述第一目标资源的资源分配指令,并将所述资源分配指令发送给所述第二终端设备。
可选的,所述资源转出指令还携带有第一校验信息,所述第二终端设备504进一步被配置为:接收到所述资源转出指令的情况下,根据所述第一校验信息对所述资源转出指令进行校验,校验通过的情况下,执行所述根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述第二终端设备504进一步被配置为:生成用于获取资源的资源获取验证因子,并生成第二校验信息;根据资源转出的结果和所述资源获取验证因子生成第三校验信息,将所述第二校验信息和所述第三校验信息携带在所述资源获取请求中。
可选的,所述服务器506进一步被配置为:根据所述资源获取请求中携带的所述第三校验信息,对所述资源获取请求进行校验,校验通过的情况下,根据所述第二校验信息和所述第三校验信息生成第四校验信息;将所述第四校验信息携带在所述资源分配指令中。
可选的,所述第二终端设备504进一步被配置为:根据所述资源分配指令中携带的所述第四校验信息对所述资源分配指令进行校验,校验通过的情况下,执行所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间的操作步骤。
可选的,所述第二终端设备504进一步被配置为:接收到所述资源转出指令的情 况下,判断所述第一资源空间中的资源是否大于等于所述第二目标资源,若是,则执行所述将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
可选的,所述第二终端设备504进一步被配置为:在所述第二目标资源转出完成的情况下,判断所述第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对所述第一资源空间的资源获取请求。
可选的,所述第二终端设备504进一步被配置为:在将第一资源空间中的第二目标资源转出至第二资源空间的情况下,生成携带第五校验信息的第一资源转移应答消息;将所述第一资源转移应答消息发送给所述服务器;相应的,所述服务器506进一步被配置为:根据接收到的所述第一资源转移应答消息中携带的所述第五校验信息,对所述第一资源转移应答消息进行校验,校验通过的情况下,对所述第一资源空间的资源进行更新。
可选的,所述第二终端设备504进一步被配置为:在将所述第一目标资源转移至所述目标应用的所述第一资源空间的情况下,生成携带第六校验信息的第二资源转移应答消息;将所述第二资源转移应答消息发送给所述服务器;相应的,所述服务器506进一步被配置为:根据接收到的所述第二资源转移应答消息中携带的所述第六校验信息,对所述第二资源转移应答消息进行校验,校验通过的情况下,对所述第一资源空间的资源进行更新。
可选的,所述第二终端设备504进一步被配置为:根据所述第三校验信息生成第三资源转移应答消息;将所述第三资源转移应答消息发送给所述第一终端设备;相应的,所述第一终端设备502进一步被配置为:根据接收到的所述第三资源转移应答消息,生成并展示资源转出的结果。
可选的,所述第一终端设备502进一步被配置为:向所述第二终端设备发送携带有所述第一终端设备的设备标识的应用选择指令,并接收所述第二终端设备返回的应用应答消息;在接收到所述应用应答消息的情况下,生成所述资源转出指令;相应的,所述第二终端设备504进一步被配置为:根据接收到的所述应用选择指令中携带的所述设备标识,确定对应的目标应用,并将所述应用选择指令发送给所述目标应用;获取所述目标应用返回的应用应答消息,并将所述应用应答消息发送给所述第一终端设备。
可选地,所述第二终端设备504进一步被配置为:接收对所述目标应用的虚拟卡申请请求;在接收到针对所述虚拟卡的申请确认信息的情况下,为所述目标应用分配所述虚拟卡,并将所述虚拟卡与所述第一资源空间进行关联。
可选地,所述第二终端设备504进一步被配置为:接收对所述虚拟卡的退还请求;在接收到针对所述虚拟卡的退还确认信息的情况下,删除所述虚拟卡数据,并解除所述虚拟卡与所述第一资源空间的关联。
本说明书提供的资源配置系统,第一终端设备生成资源转出指令,并将资源转出指令发送给第二终端设备;第二终端设备接收该资源转出指令,根据资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,并根据资源转出的结果,生成针对第一资源空间的资源获取请求,将资源获取请求发送给服务器;服务器接收资源获取请求,根据资源获取请求生成携带有待分配的第一目标资源的资源分配指令,并将资源分配指令发送给第二终端设备;第二终端设备接收服务器返回的资源分配指令,根据资源分配指令,将第一目标资源转移至目标应用的第一资源空间。这种情况下,由于向第一资源空间中配置的资源是用于后续资源转出的,即获取资源的行为和资源转出的行为是相互关联的,因而如果第一资源空间发生了资源转出,则可以根据资源转出的结果,直接自动发起资源获取操作,以向服务器请求获取资源,不需要用户再单独发起资源获取操作,保证了第一资源空间中始终有充足的资源用于资源转出,避免了余额不足导致的无法消费的情况,便于用户的使用,提高了用户的使用体验。
图6示出了根据本说明书一实施例提供的一种计算设备600的结构框图。该计算设备600的部件包括但不限于存储器610和处理器620。处理器620与存储器610通过总线630相连接,数据库650用于保存数据。
计算设备600还包括接入设备640,接入设备640使得计算设备600能够经由一个或多个网络660通信。这些网络的示例包括公用交换电话网(PSTN)、局域网(LAN)、广域网(WAN)、个域网(PAN)或诸如因特网的通信网络的组合。接入设备640可以包括有线或无线的任何类型的网络接口(例如,网络接口卡(NIC))中的一个或多个,诸如IEEE802.11无线局域网(WLAN)无线接口、全球微波互联接入(Wi-MAX)接口、以太网接口、通用串行总线(USB)接口、蜂窝网络接口、蓝牙接口、近场通信(NFC)接口,等等。
在本说明书的一个实施例中,计算设备600的上述部件以及图6中未示出的其他部件也可以彼此相连接,例如通过总线。应当理解,图6所示的计算设备结构框图仅仅是出于示例的目的,而不是对本说明书范围的限制。本领域技术人员可以根据需要,增添或替换其他部件。
计算设备600可以是任何类型的静止或移动计算设备,包括移动计算机或移动计算设备(例如,平板计算机、个人数字助理、膝上型计算机、笔记本计算机、上网本等)、移动电话(例如,智能手机)、可佩戴的计算设备(例如,智能手表、智能眼镜等)或其他类型的移动设备,或者诸如台式计算机或PC的静止计算设备。计算设备600还可以是移动式或静止式的服务器。
其中,处理器620用于执行如下计算机可执行指令:检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
上述为本实施例的一种计算设备的示意性方案。需要说明的是,该计算设备的技术方案与上述的资源配置方法的技术方案属于同一构思,计算设备的技术方案未详细描述的细节内容,均可以参见上述资源配置方法的技术方案的描述。
本说明书一实施例还提供一种计算机可读存储介质,其存储有计算机指令,该指令被处理器执行时以用于实现下述方法:检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
上述为本实施例的一种计算机可读存储介质的示意性方案。需要说明的是,该存储介质的技术方案与上述的资源配置方法的技术方案属于同一构思,存储介质的技术方案未详细描述的细节内容,均可以参见上述资源配置方法的技术方案的描述。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。
所述计算机指令包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM, Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
需要说明的是,对于前述的各方法实施例,为了简便描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本说明书并不受所描述的动作顺序的限制,因为依据本说明书,某些步骤可以采用其它顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定都是本说明书所必须的。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。
以上公开的本说明书优选实施例只是用于帮助阐述本说明书。可选实施例并没有详尽叙述所有的细节,也不限制该发明仅为所述的具体实施方式。显然,根据本说明书的内容,可作很多的修改和变化。本说明书选取并具体描述这些实施例,是为了更好地解释本说明书的原理和实际应用,从而使所属技术领域技术人员能很好地理解和利用本说明书。本说明书仅受权利要求书及其全部范围和等效物的限制。

Claims (29)

  1. 一种资源配置方法,包括:
    检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;
    将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;
    根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
  2. 根据权利要求1所述的资源配置方法,所述生成针对所述第一资源空间的资源获取请求,包括:
    生成用于获取资源的资源获取验证因子,并生成第二校验信息;
    根据资源转出的结果和所述资源获取验证因子生成第三校验信息;
    根据所述第二校验信息和所述第三校验信息,生成所述资源获取请求。
  3. 根据权利要求2所述的资源配置方法,所述资源分配指令中携带有第四校验信息,所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间,包括:
    根据所述资源分配指令中携带的所述第四校验信息对所述资源分配指令进行校验,校验通过的情况下,执行所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间的操作步骤。
  4. 根据权利要求1所述的资源配置方法,所述生成针对所述第一资源空间的资源获取请求之前,还包括:
    接收资源接收方发送的资源转出指令,所述资源转出指令携带有待转出的第二目标资源;
    根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间,所述第二资源空间为所述资源接收方对应的资源空间;
    在所述第二目标资源转出完成的情况下,确定检测到所述第一资源空间发生资源转出。
  5. 根据权利要求4所述的资源配置方法,所述资源转出指令还携带有第一校验信息,所述接收资源接收方发送的资源转出指令之后,且根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间之前,还包括:
    根据所述第一校验信息对所述资源转出指令进行校验,校验通过的情况下,执行所述根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
  6. 根据权利要求4所述的资源配置方法,所述接收资源接收方发送的资源转出指令之后,且根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间之前,还包括:
    判断所述第一资源空间中的资源是否大于等于所述第二目标资源,若是,则执行所述根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
  7. 根据权利要求4所述的资源配置方法,所述根据所述资源转出指令,将所述第一资源空间中的第二目标资源转出至第二资源空间之后,还包括:
    在所述第二目标资源转出完成的情况下,判断所述第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对所述第一资源空间的资源获取请求。
  8. 根据权利要求4所述的资源配置方法,所述将所述第一资源空间中的第二目标资源转出至第二资源空间之后,还包括:
    生成携带第五校验信息的第一资源转移应答消息;
    将所述第一资源转移应答消息发送给所述资源管理方。
  9. 根据权利要求8所述的资源配置方法,所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间之后,还包括:
    生成携带第六校验信息的第二资源转移应答消息;
    将所述第二资源转移应答消息发送给所述资源管理方。
  10. 根据权利要求2所述的资源配置方法,所述根据资源转出的结果和所述资源获取验证因子生成第三校验信息之后,还包括:
    根据所述第三校验信息生成第三资源转移应答消息;
    将所述第三资源转移应答消息发送给资源接收方。
  11. 根据权利要求1所述的资源配置方法,还包括:
    接收对所述目标应用的虚拟卡申请请求;
    在接收到针对所述虚拟卡的申请确认信息的情况下,为所述目标应用创建所述虚拟卡,并将所述虚拟卡与所述第一资源空间进行关联。
  12. 根据权利要求11所述的资源配置方法,还包括:
    接收对所述虚拟卡的退还请求;
    在接收到针对所述虚拟卡的退还确认信息的情况下,删除所述虚拟卡数据,并解除所述虚拟卡与所述第一资源空间的关联。
  13. 一种资源配置装置,包括:
    生成模块,被配置为检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;
    第一接收模块,被配置为将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;
    转移模块,被配置为根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
  14. 一种资源配置系统,所述系统包括第一终端设备、配置有目标应用的第二终端设备和所述目标应用的资源管理业务的服务器,所述第一终端设备与所述第二终端设备建立通信连接,所述第二终端设备与所述服务器建立通信连接;
    所述第一终端设备,被配置为生成资源转出指令,并将所述资源转出指令发送给所述第二终端设备,所述资源转出指令携带有待转出的第二目标资源;
    所述第二终端设备,被配置为接收所述资源转出指令,根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,所述第一资源空间为所述目标应用对应的资源空间,所述第二资源空间为所述第一终端设备对应的资源空间;根据资源转出的结果,生成针对所述第一资源空间的资源获取请求,并将所述资源获取请求发送给所述服务器;接收所述服务器返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间;
    所述服务器,被配置为接收所述资源获取请求,根据所述资源获取请求生成携带所述第一目标资源的资源分配指令,并将所述资源分配指令发送给所述第二终端设备。
  15. 根据权利要求14所述的资源配置系统,所述资源转出指令还携带有第一校验信息,所述第二终端设备进一步被配置为:
    接收到所述资源转出指令的情况下,根据所述第一校验信息对所述资源转出指令进行校验,校验通过的情况下,执行所述根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
  16. 根据权利要求14或15所述的资源配置系统,所述第二终端设备进一步被配置为:
    生成用于获取资源的资源获取验证因子,并生成第二校验信息;
    根据资源转出的结果和所述资源获取验证因子生成第三校验信息,将所述第二校验信息和所述第三校验信息携带在所述资源获取请求中。
  17. 根据权利要求16所述的资源配置系统,所述服务器进一步被配置为:
    根据所述资源获取请求中携带的所述第三校验信息,对所述资源获取请求进行校验,校验通过的情况下,根据所述第二校验信息和所述第三校验信息生成第四校验信息;
    将所述第四校验信息携带在所述资源分配指令中。
  18. 根据权利要求17所述的资源配置系统,所述第二终端设备进一步被配置为:
    根据所述资源分配指令中携带的所述第四校验信息对所述资源分配指令进行校验,校验通过的情况下,执行所述根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间的操作步骤。
  19. 根据权利要求14所述的资源配置系统,所述第二终端设备进一步被配置为:
    接收到所述资源转出指令的情况下,判断所述第一资源空间中的资源是否大于等于所述第二目标资源,若是,则执行所述将第一资源空间中的第二目标资源转出至第二资源空间的操作步骤。
  20. 根据权利要求14所述的资源配置系统,所述第二终端设备进一步被配置为:
    在所述第二目标资源转出完成的情况下,判断所述第一资源空间中剩余资源是否大于预设阈值,若否,则生成针对所述第一资源空间的资源获取请求。
  21. 根据权利要求14所述的资源配置系统,所述第二终端设备进一步被配置为:
    在将第一资源空间中的第二目标资源转出至第二资源空间的情况下,生成携带第五校验信息的第一资源转移应答消息;
    将所述第一资源转移应答消息发送给所述服务器;
    相应的,所述服务器进一步被配置为:
    根据接收到的所述第一资源转移应答消息中携带的所述第五校验信息,对所述第一资源转移应答消息进行校验,校验通过的情况下,对所述第一资源空间的资源进行更新。
  22. 根据权利要求21所述的资源配置系统,所述第二终端设备进一步被配置为:
    在将所述第一目标资源转移至所述目标应用的所述第一资源空间的情况下,生成携带第六校验信息的第二资源转移应答消息;
    将所述第二资源转移应答消息发送给所述服务器;
    相应的,所述服务器进一步被配置为:
    根据接收到的所述第二资源转移应答消息中携带的所述第六校验信息,对所述第二资源转移应答消息进行校验,校验通过的情况下,对所述第一资源空间的资源进行更新。
  23. 根据权利要求16所述的资源配置系统,所述第二终端设备进一步被配置为:
    根据所述第三校验信息生成第三资源转移应答消息;
    将所述第三资源转移应答消息发送给所述第一终端设备;
    相应的,所述第一终端设备进一步被配置为:
    根据接收到的所述第三资源转移应答消息,生成并展示资源转出的结果。
  24. 根据权利要求14所述的资源配置系统,所述第一终端设备进一步被配置为:
    向所述第二终端设备发送携带有所述第一终端设备的设备标识的应用选择指令,并接收所述第二终端设备返回的应用应答消息;
    在接收到所述应用应答消息的情况下,生成所述资源转出指令;
    相应的,所述第二终端设备进一步被配置为:
    根据接收到的所述应用选择指令中携带的所述设备标识,确定对应的目标应用,并将所述应用选择指令发送给所述目标应用;
    获取所述目标应用返回的应用应答消息,并将所述应用应答消息发送给所述第一终端设备。
  25. 根据权利要求14所述的资源配置系统,所述第二终端设备进一步被配置为:
    接收对所述目标应用的虚拟卡申请请求;
    在接收到针对所述虚拟卡的申请确认信息的情况下,为所述目标应用分配所述虚拟卡,并将所述虚拟卡与所述第一资源空间进行关联。
  26. 根据权利要求25所述的资源配置系统,所述第二终端设备进一步被配置为:
    接收对所述虚拟卡的退还请求;
    在接收到针对所述虚拟卡的退还确认信息的情况下,删除所述虚拟卡数据,并解除所述虚拟卡与所述第一资源空间的关联。
  27. 一种资源配置方法,包括:
    第一终端设备生成资源转出指令,并将所述资源转出指令发送给第二终端设备,所述资源转出指令携带有待转出的第二目标资源;
    所述第二终端设备接收所述资源转出指令,根据所述资源转出指令,将第一资源空间中的第二目标资源转出至第二资源空间,所述第一资源空间为所述目标应用对应的资源空间,所述第二资源空间为所述第一终端设备对应的资源空间;根据资源转出的结果,生成针对所述第一资源空间的资源获取请求,并将所述资源获取请求发送给服务器;
    所述服务器接收所述资源获取请求,根据所述资源获取请求生成携带有待分配的第一目标资源的资源分配指令,并将所述资源分配指令发送给所述第二终端设备;
    所述第二终端设备接收所述服务器返回的所述资源分配指令;根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
  28. 一种计算设备,包括存储器和处理器;
    所述存储器用于存储计算机可执行指令,所述处理器用于执行所述计算机可执行指令,以实现下述方法:
    检测到目标应用的第一资源空间发生资源转出的情况下,生成针对所述第一资源空间的资源获取请求;
    将所述资源获取请求发送给所述目标应用的资源管理方,并接收所述资源管理方针对所述资源获取请求返回的资源分配指令,所述资源分配指令中携带有待分配的第一目标资源;
    根据所述资源分配指令,将所述第一目标资源转移至所述目标应用的所述第一资源空间。
  29. 一种计算机可读存储介质,其存储有计算机指令,该指令被处理器执行时实现权利要求1至12任意一项所述资源配置方法的步骤。
PCT/CN2021/105169 2020-09-23 2021-07-08 资源配置方法、装置及系统 WO2022062573A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011009324.3A CN112150140B (zh) 2020-09-23 2020-09-23 资源配置方法、装置及系统
CN202011009324.3 2020-09-23

Publications (1)

Publication Number Publication Date
WO2022062573A1 true WO2022062573A1 (zh) 2022-03-31

Family

ID=73897807

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/105169 WO2022062573A1 (zh) 2020-09-23 2021-07-08 资源配置方法、装置及系统

Country Status (3)

Country Link
US (1) US20220092564A1 (zh)
CN (2) CN112150140B (zh)
WO (1) WO2022062573A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112150140B (zh) * 2020-09-23 2022-03-25 支付宝(杭州)信息技术有限公司 资源配置方法、装置及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256694A (zh) * 2008-03-21 2008-09-03 中兴通讯股份有限公司 一种近场通信终端的电子钱包自动充值的方法
CN108074094A (zh) * 2017-12-13 2018-05-25 北京小米移动软件有限公司 资源补充方法及装置
CN109389396A (zh) * 2018-08-17 2019-02-26 深圳壹账通智能科技有限公司 交通卡账户自动充值方法、装置、设备和计算机存储介质
US10552912B1 (en) * 2014-10-30 2020-02-04 State Farm Mutual Automobile Insurance Company Integrated investment and insurance accounts
CN112150140A (zh) * 2020-09-23 2020-12-29 支付宝(杭州)信息技术有限公司 资源配置方法、装置及系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104753910A (zh) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 数据处理方法、平台、服务器及系统
CN108470298B (zh) * 2017-02-23 2021-10-26 腾讯科技(深圳)有限公司 资源数值转移的方法、装置和系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256694A (zh) * 2008-03-21 2008-09-03 中兴通讯股份有限公司 一种近场通信终端的电子钱包自动充值的方法
US10552912B1 (en) * 2014-10-30 2020-02-04 State Farm Mutual Automobile Insurance Company Integrated investment and insurance accounts
CN108074094A (zh) * 2017-12-13 2018-05-25 北京小米移动软件有限公司 资源补充方法及装置
CN109389396A (zh) * 2018-08-17 2019-02-26 深圳壹账通智能科技有限公司 交通卡账户自动充值方法、装置、设备和计算机存储介质
CN112150140A (zh) * 2020-09-23 2020-12-29 支付宝(杭州)信息技术有限公司 资源配置方法、装置及系统

Also Published As

Publication number Publication date
CN114707985A (zh) 2022-07-05
CN112150140B (zh) 2022-03-25
CN112150140A (zh) 2020-12-29
US20220092564A1 (en) 2022-03-24

Similar Documents

Publication Publication Date Title
US11397936B2 (en) Method, device and secure element for conducting a secured financial transaction on a device
CN102656599A (zh) 移动支付应用程序体系结构
US20170185993A1 (en) Mobile near field communication payment for banking activities from an automated teller machine
JP2023524538A (ja) 近距離無線通信nfc通信方法、装置及び電子機器
WO2022062573A1 (zh) 资源配置方法、装置及系统
JP2004193808A (ja) 情報処理装置及び情報処理方法
KR101771546B1 (ko) 모바일 핀테크 기술을 이용한 간편결제 방법
WO2021155785A1 (zh) 一种支付方法、终端、服务器及系统
CN111222864A (zh) 车联网安全支付方法、系统、存储介质及车机
WO2013063166A1 (en) System for offline processing of purchases
Hinga et al. A Bird’s Eye View of Near Field Communication Technology: Applications, Global Adoption, and Impact in Africa
WO2018161519A1 (zh) 支付方法及终端
CN117974135A (zh) 处理数字货币硬钱包交易的受理终端和方法
EP4104048A1 (en) Method and system for non-monolithic contactless acceptance on mobile devices
CN114519580A (zh) 近距离通信的请求支付方法、支付方法、终端及存储介质
KR20150146463A (ko) 금융 자동화 기기, 카드사 서버, 모바일 단말, 컴퓨터 판독 가능한 기록 매체 및 그들의 제어 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21870952

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21870952

Country of ref document: EP

Kind code of ref document: A1