CN106921498B - The security processing of virtual resource, device and system - Google Patents

The security processing of virtual resource, device and system Download PDF

Info

Publication number
CN106921498B
CN106921498B CN201510998883.4A CN201510998883A CN106921498B CN 106921498 B CN106921498 B CN 106921498B CN 201510998883 A CN201510998883 A CN 201510998883A CN 106921498 B CN106921498 B CN 106921498B
Authority
CN
China
Prior art keywords
resource
identifying code
terminal
verified
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510998883.4A
Other languages
Chinese (zh)
Other versions
CN106921498A (en
Inventor
邬振海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510998883.4A priority Critical patent/CN106921498B/en
Publication of CN106921498A publication Critical patent/CN106921498A/en
Application granted granted Critical
Publication of CN106921498B publication Critical patent/CN106921498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of security processings of virtual resource, device and system.Wherein, this method comprises: receiving verify data to be verified when resource handles terminal processes virtual resource;Verify data to be verified is matched with the identifying code got in advance, wherein resource processing terminal generates terminal from the identifying code communicated with resource processing terminal and obtains identifying code;If verify data to be verified and identifying code successful match, resource processing terminal completes the process of processing virtual resource.The present invention solves in the treatment process of terminal processes virtual resource in the prior art, and the technical problem of process safety difference for handling virtual resource is caused there are network hole, hacker attacks etc..

Description

The security processing of virtual resource, device and system
Technical field
The present invention relates to virtual resource process fields, security processing, dress in particular to a kind of virtual resource It sets and system.
Background technique
Virtual resource (Virtual Resources) is another expression way of physical resources or actual resource, with The universal use of virtual resource, user is also higher and higher using the frequency of virtual resource, in the process of terminal processes virtual resource In, user only needs to click corresponding button in terminal, so that it may the treatment process of virtual resource is completed, still, if locating Occur network hole or hacker attacks during reason, virtual resource will will appear security risk, lead to losing for virtual resource It loses or leakage passes, influence user's normal use virtual resource.
For in the treatment process of terminal processes virtual resource in the prior art, there are network hole, hacker attacks etc. to lead The technical problem of the process safety difference of processing virtual resource is caused, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides a kind of security processings of virtual resource, device and system, existing at least to solve Have in technology in the treatment process of terminal processes virtual resource, causes to handle virtual resource there are network hole, hacker attacks etc. Process safety difference technical problem.
According to an aspect of an embodiment of the present invention, a kind of security processing of virtual resource is provided, comprising: providing When source processing terminal handles virtual resource, verify data to be verified is received;By verify data to be verified with get in advance Identifying code matched, wherein resource processing terminal generates terminal acquisition from the identifying code that communicates with resource processing terminal and tests Demonstrate,prove code;If verify data to be verified and identifying code successful match, resource processing terminal completes the mistake of processing virtual resource Journey.
According to another aspect of an embodiment of the present invention, a kind of security processing of virtual resource is additionally provided, comprising: When resource handles terminal processes virtual resource, verify data to be verified is received;By verify data to be verified and pre-generate Identifying code matched, wherein by resource processing terminal built-in identifying code generate chip generate identifying code;If to be verified Verify data and identifying code successful match, then resource processing terminal complete processing virtual resource process.
According to another aspect of an embodiment of the present invention, a kind of secure processing device of virtual resource is additionally provided, comprising: connect Module is received, for receiving verify data to be verified when resource handles terminal processes virtual resource;Matching module, being used for will Verify data to be verified is matched with the identifying code got in advance, wherein resource processing terminal is handled eventually from resource The identifying code of end communication generates terminal and obtains identifying code;Processing module, if for verify data and identifying code to be verified With success, then resource processing terminal completes the process of processing virtual resource.
According to another aspect of an embodiment of the present invention, a kind of secure processing device of virtual resource is additionally provided, comprising: connect Module is received, for receiving verify data to be verified when resource handles terminal processes virtual resource;Matching module, being used for will Verify data to be verified is matched with pre-generated identifying code, wherein the identifying code by resource processing terminal built-in is raw Identifying code is generated at chip;Processing module, if for verify data and identifying code successful match to be verified, resource processing Terminal completes the process of processing virtual resource.
According to another aspect of an embodiment of the present invention, a kind of safe processing system of virtual resource is additionally provided, comprising: test It demonstrate,proves code and generates terminal, for generating identifying code;Resource processing terminal generates terminal with identifying code and communicates, for virtual in processing When resource, verify data to be verified is received, and verify data to be verified is matched with the identifying code got in advance, If verify data to be verified and identifying code successful match, resource processing terminal completes the process of processing virtual resource.
According to another aspect of an embodiment of the present invention, a kind of safe processing system of virtual resource is additionally provided, comprising: money Source processing terminal, for receiving verify data to be verified, and will be to be verified when resource handles terminal processes virtual resource Verify data is matched with pre-generated identifying code, wherein it is raw to generate chip by the identifying code of resource processing terminal built-in At identifying code, if verify data to be verified and identifying code successful match, resource processing terminal completes processing virtual resource Process.
In embodiments of the present invention, when resource handles terminal processes virtual resource, verify data to be verified is received, and Verify data to be verified is matched with the identifying code got in advance, if verify data to be verified and identifying code With success, then resource processing terminal completes the process of processing virtual resource.Through the embodiment of the present invention, by verifying number to be verified It is matched according to the identifying code got in advance, so that user in the case where that can ensure information safety, completes entire processing Flow operations, and do not destroy original convenience, and in network there are in the case where loophole or hacker attacks, due to nothing Method gets identifying code in advance and generates the identifying code that terminal generates, and can not carry out verify data and identifying code progress to be verified The process matched further is unable to complete the process of processing virtual resource, virtually provides to solve terminal processes in the prior art In the treatment process in source, there are network hole, hacker attacks etc., and the technology for the process safety difference for handling virtual resource to be caused to be asked Topic, improves the safety of virtual resource treatment process.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of structural frames of the terminal of the security processing of virtual resource according to an embodiment of the present invention Figure;
Fig. 2 is a kind of flow chart of the security processing of virtual resource according to an embodiment of the present invention;
Fig. 3 is a kind of flow chart of the security processing of optional virtual resource according to an embodiment of the present invention;
Fig. 4 is the flow chart of the security processing of another virtual resource according to an embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of the secure processing device of virtual resource according to an embodiment of the present invention;
Fig. 6 is the schematic diagram of the secure processing device of another virtual resource according to an embodiment of the present invention;
Fig. 7 is a kind of schematic diagram of the safe processing system of virtual resource according to an embodiment of the present invention;
Fig. 8 is the schematic diagram of the safe processing system of another virtual resource according to an embodiment of the present invention;And
Fig. 9 is a kind of structural block diagram of terminal according to an embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Firstly, the part noun or term that occur during the embodiment of the present application is described are suitable for following solution It releases:
IBeacon technology: iBeacon is that the mobile device of Apple Inc.'s in September, 2013 publication is equipped with on OS (iOS7) New function.Its working method is sent out using BLE technology to surrounding equipped with the equipment of low-power consumption bluetooth (BLE) communication function Oneself distinctive ID is given, the application software for receiving the ID can take some actions according to the ID.For example, being arranged in shop If iBeacon communication module, it can allow on iPhone and iPad and run an information tell the server, or from server to Gu Visitor sends coupons and integrates into shop.Further, it is also possible to use iBeacon to application when household electrical appliances break down or stop working Software sends information.
Embodiment 1
Embodiment of the method provided by the embodiment of the present invention one can be in mobile terminal, terminal or similar fortune It calculates and is executed in device.For running on computer terminals, Fig. 1 is a kind of peace of virtual resource according to an embodiment of the present invention The structural block diagram of the terminal of full processing method.As shown in Figure 1, the terminal of the security processing of virtual resource 10 may include that (processor 102 can include but is not limited to micro process to one or more (one is only shown in figure) processors 102 The processing unit of device MCU or programmable logic device FPGA etc.), memory 104 for storing data and for communicating function The transmitting device 106 of energy.It will appreciated by the skilled person that structure shown in FIG. 1 is only to illustrate, not to above-mentioned The structure of electronic device causes to limit.For example, terminal 10 may also include than shown in Fig. 1 more or less groups Part, or with the configuration different from shown in Fig. 1.
Memory 104 can be used for storing the software program and module of application software, in the embodiment of the present invention Corresponding program instruction/the module of the security processing of virtual resource, processor 102 are stored in memory 104 by operation Software program and module realize the peace of above-mentioned virtual resource thereby executing various function application and data processing Full processing method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, such as one or more A magnetic storage device, flash memory or other non-volatile solid state memories.In some instances, memory 104 can be further Including the memory remotely located relative to processor 102, these remote memories can pass through network connection to computer end End 10.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 10 provide.In an example, transmitting device 106 includes that a network is suitable Orchestration (Network Interf10ce Controller, NIC), can be connected by base station with other network equipments so as to It is communicated with internet.In an example, transmitting device 106 can be radio frequency (R10dio Frequency, RF) module, It is used to wirelessly be communicated with internet.
Under above-mentioned running environment, the present invention provides the security processings of virtual resource as shown in Figure 2.Fig. 2 is A kind of flow chart of the security processing of virtual resource according to an embodiment of the present invention, this method may include steps of:
Step S21 receives verify data to be verified when resource handles terminal processes virtual resource.
Specifically, above-mentioned resource processing terminal can be the intelligent terminals such as mobile phone, iPad, tablet computer, above-mentioned virtual money Source can be ideal money, virtual goods, virtual book etc., and above-mentioned verify data to be verified can be the verifying of user's input Code generates the mark (ID) of terminal.
For example, resource processing terminal is mobile phone, and verify data to be verified is that ID is using virtual resource as ideal money Example, is illustrated the above embodiment of the present invention.It is carried out virtually using mobile phone in the place such as supermarket, market, convenience store in user When moneytary operations, user can input identifying code and generate Termination ID.
Step S23 matches verify data to be verified with the identifying code got in advance, wherein resource processing Terminal generates terminal from the identifying code communicated with resource processing terminal and obtains identifying code.
Specifically, above-mentioned identifying code, which generates terminal, can be the wearable devices such as wrist-watch, earphone, glasses, be also possible to mobile phone, The intelligent terminals such as iPad, tablet computer, above-mentioned identifying code can be identifying code and generate the distinctive mark (ID) of terminal, above-mentioned resource Processing terminal and identifying code generate terminal can be led to by low-power consumption bluetooth BLE technology or near-field communication NFC technique Letter.
In a kind of optional scheme, resource processing terminal and identifying code generate terminal and can be provided by BLE technical communication The verify data to be verified received is generated the identifying code progress that terminal is got with code is able to verify that by source processing terminal Match, it is determined whether the transmission of virtual resource can be carried out.
Herein it should be noted that resource processing terminal, which can first obtain identifying code, generates the identifying code that terminal generates, then Receive verify data to be verified;Verify data to be verified can also be first received, then obtains identifying code and generates what terminal generated Identifying code.
For example, resource processing terminal is mobile phone using virtual resource as ideal money, verify data to be verified is ID, is tested It demonstrate,proves code and generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.User using mobile phone supermarket, market, When the place such as convenience store carries out ideal money transaction, the wrist-watch that user wears is sent using BLE technology to the mobile phone of user specific ID, user can input identifying code and generate Termination ID, and obtain the ID of wrist-watch transmission, the ID that the ID of input and wrist-watch are sent It is matched.
Step S25, if verify data to be verified and identifying code successful match, it is empty that resource processing terminal completes processing The process of quasi- resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient When the place such as field, convenience store carries out ideal money transaction, the wrist-watch that user wears is sent using BLE technology to the mobile phone of user special Fixed ID, user can input identifying code and generate Termination ID, and obtain the ID of wrist-watch transmission, and the ID of input and wrist-watch are sent ID is matched, if the ID successful match that the ID and mobile phone of input are sent, mobile phone complete the transaction of ideal money.
Verify data to be verified is received when resource handles terminal processes virtual resource using the embodiment of the present invention, and Verify data to be verified is matched with the identifying code got in advance, if verify data to be verified and identifying code With success, then resource processing terminal completes the process of processing virtual resource.Through the embodiment of the present invention, by verifying number to be verified It is matched according to the identifying code got in advance, so that user in the case where that can ensure information safety, completes entire processing Flow operations, and do not destroy original convenience, and in network there are in the case where loophole or hacker attacks, due to nothing Method gets identifying code in advance and generates the identifying code that terminal generates, and can not carry out verify data and identifying code progress to be verified The process matched further is unable to complete the process of processing virtual resource, virtually provides to solve terminal processes in the prior art In the treatment process in source, there are network hole, hacker attacks etc., and the technology for the process safety difference for handling virtual resource to be caused to be asked Topic, improves the safety of virtual resource treatment process.
According to that above embodiment of the present invention, in step S23, by verify data to be verified and the identifying code that gets in advance Before being matched, the above method further include:
Step S201, resource processing terminal detect whether that scanning generates terminal to the identifying code with correspondence.
In a kind of optional scheme, when resource processing terminal needs to handle virtual resource, resource processing terminal can be with It first scans the identifying code near resource processing terminal and generates terminal.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient Before the place such as field, convenience store carries out ideal money transaction, user detects whether that user's wearing can be scanned using mobile phone Wrist-watch.
Step S203, after resource processing terminal detects that the identifying code with correspondence generates terminal, Energy Resources Service Reason terminal judges whether that successfully getting identifying code generates the identifying code that terminal is currently generated.
In a kind of optional scheme, if resource processing terminal can scanned to after identifying code generation terminal, obtain It takes identifying code to generate the identifying code that terminal generates, and judges whether successfully to get the identifying code.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient Before the place such as field, convenience store carries out ideal money transaction, user detects whether that user's wearing can be scanned using mobile phone Wrist-watch detects whether the ID for getting wrist-watch transmission if mobile phone scans the wrist-watch worn to user.
Step S205, if resource processing terminal successfully gets identifying code and generates the identifying code that terminal is currently generated, Into the step of verify data to be verified is matched with the identifying code got in advance.
In a kind of optional scheme, if resource processing terminal can scanned to after identifying code generation terminal, obtain Identifying code is taken to generate the identifying code that terminal generates, and after successfully getting the identifying code, by verify data to be verified It is matched with the identifying code, if successful match, resource processing terminal completes the process of processing virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient Before the place such as field, convenience store carries out ideal money transaction, user detects whether that user's wearing can be scanned using mobile phone Wrist-watch, if mobile phone scans the wrist-watch worn to user, and gets the ID of wrist-watch transmission, then the ID sent the wrist-watch and ID to be detected is matched, if successful match, mobile phone completes the process of exchange of ideal money.
Step S207, if resource processing terminal obtains identifying code failure or verify data to be verified and identifying code With failure, then resource processing terminal aborts handle virtual resource.
In a kind of optional scheme, if resource processing terminal can scanned to after identifying code generation terminal, obtain Identifying code is taken to generate the identifying code that terminal generates, and after successfully getting the identifying code, by verify data to be verified It is matched with the identifying code, if it fails to match;Or the identifying code that goes back generates the identifying code failure that terminal is sent, then resource Processing terminal interrupt processing virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient Before the place such as field, convenience store carries out ideal money transaction, user detects whether that user's wearing can be scanned using mobile phone Wrist-watch, if mobile phone scans the wrist-watch worn to user, and gets the ID of wrist-watch transmission, then the ID sent the wrist-watch and ID to be detected is matched, if it fails to match or mobile phone does not get the ID of wrist-watch transmission, in user mobile phone The process of exchange of disconnected ideal money.
Through the above scheme, resource processing terminal is obtaining identifying code failure or verify data to be verified and identifying code It fails to match, then interrupt processing virtual resource, to realize that resource processing terminal is detecting that being unsatisfactory for completing processing virtually provides In the case where source, the purpose of interrupt processing is carried out to virtual resource.
According to that above embodiment of the present invention, the identifying code got in advance include at least it is following any one: digital information, Text information, image information, video information and voice messaging.
In a kind of optional scheme, identifying code can be digital information, text information, image information, video information or Person's voice messaging.It can be by by bit comparison digital information or text when identifying code is digital information perhaps text information The whether identical matching process to realize digital information or text information of information;When identifying code is image information, Ke Yitong It crosses and image procossing is carried out to image information, the key message in further movement images is to realize the matching of image information Journey;When identifying code is voice messaging, can by extract voice messaging in word content, by word content be compared from And realize the matching process of voice messaging;When identifying code is video information, can be believed by the image extracted in video information Breath and voice messaging, then matching is carried out to realize the matching process of video information to image information and voice messaging.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient When the place such as field, convenience store carries out ideal money transaction, what the wrist-watch that the mobile phone of user receives ID and user to be verified was sent The ID step-by-step that ID to be verified and wrist-watch are sent is compared by ID, if two ID each number it is all the same, it is determined that The ID successful match that the ID to be verified and wrist-watch are sent;If there is one-bit digital different in two ID, it is determined that the verifying It fails to match by the ID that ID and wrist-watch are sent.
According to that above embodiment of the present invention, it is more for generating terminal in the identifying code with resource processing terminal with correspondence In the case where a, step S23, verify data to be verified match with the identifying code got in advance include:
Step S231, resource processing terminal detect multiple identifying codes generate in the identifying code that terminals generate with the presence or absence of with to The identifying code that the verify data of verifying matches.
Step S233, if resource processing terminal detects the presence of the identifying code to match with verify data to be verified, Then complete the process of processing virtual resource.
In a kind of optional scheme, if the scanning of resource processing terminal generates terminal to multiple identifying codes, obtain more A identifying code generates the identifying code that terminal generates, and verify data to be verified is matched with multiple identifying codes, if there is Any one identifying code and verify data successful match to be verified, then resource processing terminal completes the mesh of processing virtual resource 's.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, For identifying code generates terminal as two wrist-watches, the above embodiment of the present invention is illustrated.User using mobile phone supermarket, When the place such as market, convenience store carries out ideal money transaction, the mobile phone scanning of user obtains two wrist-watch hairs to two wrist-watches The ID1 and ID2 sent matches the ID to be verified of input with ID1 and ID2, if ID and ID1 successful match, mobile phone Complete the process of ideal money transaction;If ID is with ID1, it fails to match, and also it fails to match with ID2 by ID, then mobile phone interrupts empty The process of quasi- moneytary operations.
According to that above embodiment of the present invention, the identifying code being obtained ahead of time includes: treatment conditions information, and treatment conditions information is Complete processing or interrupt processing, wherein in step S25, before resource processing terminal completes the process of processing virtual resource, on State method further include:
Step S251, resource processing terminal judge whether treatment conditions information is completion processing.
Step S252, if resource processing terminal determines that treatment conditions information is completion processing, resource processing terminal is complete At the process of processing virtual resource.
Step S253, if it is interrupt processing that resource processing terminal, which determines treatment conditions information, in resource processing terminal Disconnected processing virtual resource.
In a kind of optional scheme, identifying code generates terminal when generating identifying code, generates in identifying code for referring to The treatment conditions information for whether completing processing virtual resource shown, in the verifying that verify data and identifying code terminal to be verified generate After code successful match, whether the treatment conditions information that the judgement of resource processing terminal is got is completion processing, if it is determined that should Treatment conditions information is completion processing, then resource processing terminal completes the process of processing virtual resource;If it is determined that the processing item Part information is interrupt processing, then the process of resource processing terminal aborts processing virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, It is wrist-watch that identifying code, which generates terminal, and treatment conditions information is for completion is handled, to be illustrated to the above embodiment of the present invention.? For user using mobile phone when the place such as supermarket, market, convenience store carries out ideal money transaction, wrist-watch will be at specific ID and completion Mobile phone is given in haircut, and mobile phone matches the specific ID that wrist-watch is sent with ID to be verified, if successful match, and determine The treatment conditions information that wrist-watch is sent is completion processing, then completes the process of exchange of ideal money.
According to that above embodiment of the present invention, in step S25, resource processing terminal complete processing virtual resource process it Before, the above method further include:
Step S254, resource processing terminal show verify data to be verified, and obtain the treatment conditions letter of user's input Breath, wherein treatment conditions information is to complete processing or interrupt processing.
Step S255, if resource processing terminal detects that treatment conditions information is completion processing, resource processing terminal Complete the process of processing virtual resource.
Step S256, if resource processing terminal detects that treatment conditions information is interrupt processing, resource processing terminal Interrupt processing virtual resource.
In a kind of optional scheme, in the identifying code successful match that verify data and identifying code terminal to be verified generate Later, resource processing terminal obtains the treatment conditions information of user's input, and judge the treatment conditions information that gets whether be Completion processing, if it is determined that the treatment conditions information is completion processing, then resource processing terminal completes the mistake of processing virtual resource Journey;If it is determined that the treatment conditions information is interrupt processing, then resource processing terminal aborts handle the process of virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, It is wrist-watch that identifying code, which generates terminal, and treatment conditions information is for completion is handled, to be illustrated to the above embodiment of the present invention.? For user using mobile phone when the place such as supermarket, market, convenience store carries out ideal money transaction, wrist-watch will be at specific ID and completion Mobile phone is given in haircut, and mobile phone matches the specific ID that wrist-watch is sent with ID to be verified, if successful match, on mobile phone It shows ID to be verified, and receives the signal of the completion processing of user's input, complete the transaction of ideal money.
According to that above embodiment of the present invention, in step S201, resource processing terminal detects whether that scanning is closed to communication Before the identifying code of system generates terminal, the above method further include:
Step S200, the processing page of resource processing terminal display processing virtual resource.
In a kind of optional scheme, when resource processing terminal needs to handle virtual resource, display needs to carry out virtual The processing page of resource processing waits user to determine processing virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, It is wrist-watch that identifying code, which generates terminal, and treatment conditions information is for completion is handled, to be illustrated to the above embodiment of the present invention.? User, when the place such as supermarket, market, convenience store carries out ideal money transaction, shows that needs progress is virtual on mobile phone using mobile phone The transaction page of moneytary operations waits user to determine that carry out virtual resource transaction connects after receiving the determination signal of user Receive ID to be verified.
According to that above embodiment of the present invention, identifying code generate terminal be it is following any one: wearable device, mobile phone or flat Plate computer.
In a kind of optional scheme, identifying code, which generates terminal, can be the wearable devices such as wrist-watch, glasses or earphone, can also To be the intelligent terminals such as mobile phone, iPad or tablet computer.
According to that above embodiment of the present invention, above-mentioned after resource handles terminal aborts processing virtual resource in step S207 Method further include:
Step S211, resource processing terminal show the corresponding prompt information of verify data to be verified, wherein prompt information For prompting resource processing terminal aborts processing virtual resource.
Step S213, resource processing terminal receives verify data to be verified again, and enters verifying number to be verified According to the step of being matched with the identifying code got in advance.
In a kind of optional scheme, after resource processing terminal aborts processing virtual resource, to be verified test is shown The prompt information of data and interrupt processing virtual resource is demonstrate,proved, the waiting of resource processing terminal receives verify data to be verified again, And match the verify data to be verified received again with the identifying code got in advance, if successful match, Complete the process of processing virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient When the place such as field, convenience store carries out ideal money transaction, after mobile phone interrupts ideal money transaction, display reminding information alert User interrupts ideal money transaction, and receives ID to be verified again, the specific ID that the ID to be verified and wrist-watch are sent into Row matching, if successful match, completes the transaction of ideal money.
The above embodiment of the present invention is discussed in detail below with reference to Fig. 3, according to that above embodiment of the present invention, is with virtual resource Ideal money, resource processing terminal are mobile phone, and verify data to be verified is ID, and identifying code generates terminal to mention for wrist-watch The security processing for having supplied a kind of optional virtual resource, as shown in figure 3, this method may include:
Step S302 detects the specific ID that neighbouring wrist-watch is sent before mobile phone carries out ideal money transaction.
In a kind of optional scheme, wrist-watch sends specific ID to surrounding by BLE technology, and mobile phone needs to carry out in user When ideal money is traded, search nearby with the presence or absence of the wrist-watch for sending specific ID.
Step S304 judges whether to get specific ID after the specific ID that mobile phone detects that neighbouring wrist-watch is sent.
In a kind of optional scheme, wrist-watch sends specific ID to surrounding by BLE technology, and mobile phone needs to carry out in user When ideal money is traded, if detecting nearby has the wrist-watch for sending specific ID, the spy for getting wrist-watch transmission is detected whether Determine ID, if getting the specific ID of wrist-watch transmission, enters step S304, if the specific ID of wrist-watch transmission has not been obtained, Then enter step S310.
Step S306, mobile phone match specific ID with ID to be verified.
In a kind of optional scheme, wrist-watch sends specific ID to surrounding by BLE technology, and mobile phone needs to carry out in user When ideal money is traded, if detecting nearby has the wrist-watch for sending specific ID, the spy for getting wrist-watch transmission is detected whether Determine ID, if get wrist-watch transmission specific ID, which is matched with ID to be verified, if match at Function then enters step S308, if it fails to match, enters step S310.
Step S308, mobile phone complete the transaction of ideal money.
In a kind of optional scheme, wrist-watch sends specific ID to surrounding by BLE technology, and mobile phone needs to carry out in user When ideal money is traded, if detecting nearby has the wrist-watch for sending specific ID, the spy for getting wrist-watch transmission is detected whether Determine ID, if get wrist-watch transmission specific ID, which is matched with ID to be verified, if match at Function, then mobile phone completes the process of exchange of this ideal money.
Step S310, mobile phone interrupt the process of exchange of ideal money.
In a kind of optional scheme, wrist-watch sends specific ID to surrounding by BLE technology, and mobile phone needs to carry out in user When ideal money is traded, if detecting nearby has the wrist-watch for sending specific ID, the spy for getting wrist-watch transmission is detected whether Determine ID, if mobile phone have not been obtained wrist-watch transmission specific ID, or get wrist-watch transmission specific ID, but the specific ID with It fails to match by ID to be verified, then mobile phone interrupts the process of exchange of this ideal money.
Optionally, in the present embodiment, the security processing of above-mentioned virtual resource can be applied to meter as shown in Figure 1 In the hardware environment that calculation machine terminal 10 is constituted.As shown in Figure 1, terminal 10 by network and other terminals into Row connection, above-mentioned network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
According to embodiments of the present invention, a kind of security processing of virtual resource is additionally provided, if Fig. 4 shows, this method can To include:
Step S41 receives verify data to be verified when resource handles terminal processes virtual resource.
Specifically, above-mentioned resource processing terminal can be the intelligent terminals such as mobile phone, iPad, tablet computer, above-mentioned virtual money Source can be ideal money, and virtual goods, virtual book etc., it is close that above-mentioned verify data to be verified can be verifying to be verified Code.
For example, resource processing terminal is mobile phone using virtual resource as ideal money, verify data to be verified is that verifying is close For code, the above embodiment of the present invention is illustrated.It is carried out using mobile phone in the place such as supermarket, market, convenience store in user When ideal money is traded, user can input verifying password to be verified, and mobile phone receives verifying password to be verified.
Step S43 matches verify data to be verified with pre-generated identifying code, wherein handled by resource The identifying code of terminal built-in generates chip and generates identifying code.
Specifically, above-mentioned identifying code can be identifying code and generate the specific cryptosystem that chip generates.
In a kind of optional scheme, resource processing terminal is by the verify data to be verified received and is able to verify that code It generates the identifying code that terminal is got to be matched, it is determined whether the transmission of virtual resource can be carried out.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is verifying For password, the above embodiment of the present invention is illustrated.User using mobile phone supermarket, market, convenience store etc. place into When row ideal money is traded, user can input verifying password to be verified, after mobile phone receives verifying password to be verified, Verifying password to be verified is generated the specific cryptosystem that chip generates with identifying code to match.
Step S45, if verify data to be verified and identifying code successful match, it is empty that resource processing terminal completes processing The process of quasi- resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is verifying For password, the above embodiment of the present invention is illustrated.User using mobile phone supermarket, market, convenience store etc. place into When row ideal money is traded, user can input verifying password to be verified, after mobile phone receives verifying password to be verified, Verifying password to be verified is generated the specific cryptosystem that chip generates with identifying code to match, if successful match, mobile phone Complete the process of exchange of ideal money.
Verify data to be verified is received when resource handles terminal processes virtual resource using the embodiment of the present invention, and Verify data to be verified is matched with pre-generated identifying code, if verify data to be verified is matched with identifying code Success, then resource processing terminal completes the process of processing virtual resource.Through the embodiment of the present invention, by verify data to be verified It is matched with pre-generated identifying code, so that user in the case where that can ensure information safety, completes entire process flow Operation, and does not destroy original convenience, and in network there are in the case where loophole or hacker attacks, due to that can not obtain Get pre-generated identifying code, verify data to be verified can not be carried out and identifying code carries out matched process, further without The process that method completes processing virtual resource is deposited to solve in the treatment process of terminal processes virtual resource in the prior art Lead to the technical problem for handling the process safety difference of virtual resource in network hole, hacker attacks etc., improves virtual resource The safety for the treatment of process.
According to that above embodiment of the present invention, pre-generated identifying code include at least it is following any one: digital information, text Word information, image information, video information and voice messaging.
In a kind of optional scheme, identifying code can be digital information, text information, image information, video information or Person's voice messaging.It can be by by bit comparison digital information or text when identifying code is digital information perhaps text information The whether identical matching process to realize digital information or text information of information;When identifying code is image information, Ke Yitong It crosses and image procossing is carried out to image information, the key message in further movement images is to realize the matching of image information Journey;When identifying code is voice messaging, can by extract voice messaging in word content, by word content be compared from And realize the matching process of voice messaging;When identifying code is video information, can be believed by the image extracted in video information Breath and voice messaging, then matching is carried out to realize the matching process of video information to image information and voice messaging.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is verifying For password, the above embodiment of the present invention is illustrated.User using mobile phone supermarket, market, convenience store etc. place into When row ideal money is traded, user can input verifying password to be verified, after mobile phone receives verifying password to be verified, Verifying password to be verified is generated the specific cryptosystem step-by-step that chip generates with identifying code to be compared, if verifying password and spy Determining password, each is all identical, it is determined that verifying password and specific cryptosystem successful match, mobile phone complete the transaction of ideal money Journey.
Optionally, in the present embodiment, the security processing of above-mentioned virtual resource can be applied to meter as shown in Figure 1 In the hardware environment that calculation machine terminal 10 is constituted.As shown in Figure 1, terminal 10 by network and other terminals into Row connection, above-mentioned network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 3
According to embodiments of the present invention, it additionally provides a kind of for implementing the virtual of the security processing of above-mentioned virtual resource The secure processing device of resource, as shown in figure 5, the device includes: receiving module 51, matching module 53 and processing module 55.
Wherein, receiving module 51 is used to receive verify data to be verified when resource handles terminal processes virtual resource.
Specifically, above-mentioned resource processing terminal can be the intelligent terminals such as mobile phone, iPad, tablet computer, above-mentioned virtual money Source can be ideal money, virtual goods, virtual book etc., and above-mentioned verify data to be verified can be the verifying of user's input Code generates the mark (ID) of terminal.
For example, resource processing terminal is mobile phone, and verify data to be verified is that ID is using virtual resource as ideal money Example, is illustrated the above embodiment of the present invention.It is carried out virtually using mobile phone in the place such as supermarket, market, convenience store in user When moneytary operations, user can input identifying code and generate Termination ID.
Matching module 53 is for matching verify data to be verified with the identifying code got in advance, wherein money Source processing terminal generates terminal from the identifying code communicated with resource processing terminal and obtains identifying code.
Specifically, above-mentioned identifying code, which generates terminal, can be the wearable devices such as wrist-watch, earphone, glasses, be also possible to mobile phone, The intelligent terminals such as iPad, tablet computer, above-mentioned identifying code can be identifying code and generate the distinctive mark (ID) of terminal, above-mentioned resource Processing terminal and identifying code generate terminal can be led to by low-power consumption bluetooth BLE technology or near-field communication NFC technique Letter.
In a kind of optional scheme, resource processing terminal and identifying code generate terminal and can be provided by BLE technical communication The verify data to be verified received is generated the identifying code progress that terminal is got with code is able to verify that by source processing terminal Match, it is determined whether the transmission of virtual resource can be carried out.
Herein it should be noted that resource processing terminal, which can first obtain identifying code, generates the identifying code that terminal generates, then Receive verify data to be verified;Verify data to be verified can also be first received, then obtains identifying code and generates what terminal generated Identifying code.
For example, resource processing terminal is mobile phone using virtual resource as ideal money, verify data to be verified is ID, is tested It demonstrate,proves code and generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.User using mobile phone supermarket, market, When the place such as convenience store carries out ideal money transaction, the wrist-watch that user wears is sent using BLE technology to the mobile phone of user specific ID, user can input identifying code and generate Termination ID, and obtain the ID of wrist-watch transmission, the ID that the ID of input and wrist-watch are sent It is matched.
If processing module 55 is completed for verify data and identifying code successful match to be verified, resource processing terminal Handle the process of virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient When the place such as field, convenience store carries out ideal money transaction, the wrist-watch that user wears is sent using BLE technology to the mobile phone of user special Fixed ID, user can input identifying code and generate Termination ID, and obtain the ID of wrist-watch transmission, and the ID of input and wrist-watch are sent ID is matched, if the ID successful match that the ID and mobile phone of input are sent, mobile phone complete the transaction of ideal money.
Verify data to be verified is received when resource handles terminal processes virtual resource using the embodiment of the present invention, and Verify data to be verified is matched with the identifying code got in advance, if verify data to be verified and identifying code With success, then resource processing terminal completes the process of processing virtual resource.Through the embodiment of the present invention, by verifying number to be verified It is matched according to the identifying code got in advance, so that user in the case where that can ensure information safety, completes entire processing Flow operations, and do not destroy original convenience, and in network there are in the case where loophole or hacker attacks, due to nothing Method gets identifying code in advance and generates the identifying code that terminal generates, and can not carry out verify data and identifying code progress to be verified The process matched further is unable to complete the process of processing virtual resource, virtually provides to solve terminal processes in the prior art In the treatment process in source, there are network hole, hacker attacks etc., and the technology for the process safety difference for handling virtual resource to be caused to be asked Topic, improves the safety of virtual resource treatment process.
Optionally, in the present embodiment, the secure processing device of above-mentioned virtual resource can be applied to meter as shown in Figure 1 In the hardware environment that calculation machine terminal 10 is constituted.As shown in Figure 1, terminal 10 by network and other terminals into Row connection, above-mentioned network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
Embodiment 4
According to embodiments of the present invention, it additionally provides a kind of for implementing the virtual of the security processing of above-mentioned virtual resource The secure processing device of resource, as shown in fig. 6, the device includes: receiving module 61, matching module 63 and processing module 65.
Wherein, receiving module 61 is used to receive verify data to be verified when resource handles terminal processes virtual resource.
Specifically, above-mentioned resource processing terminal can be the intelligent terminals such as mobile phone, iPad, tablet computer, above-mentioned virtual money Source can be ideal money, and virtual goods, virtual book etc., it is close that above-mentioned verify data to be verified can be verifying to be verified Code.
For example, resource processing terminal is mobile phone using virtual resource as ideal money, verify data to be verified is that verifying is close For code, the above embodiment of the present invention is illustrated.It is carried out using mobile phone in the place such as supermarket, market, convenience store in user When ideal money is traded, user can input verifying password to be verified, and mobile phone receives verifying password to be verified.
Matching module 63 is used to match verify data to be verified with pre-generated identifying code, wherein by providing Identifying code built in the processing terminal of source generates chip and generates identifying code.
Specifically, above-mentioned identifying code can be identifying code and generate the specific cryptosystem that chip generates.
In a kind of optional scheme, resource processing terminal is by the verify data to be verified received and is able to verify that code It generates the identifying code that terminal is got to be matched, it is determined whether the transmission of virtual resource can be carried out.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is verifying For password, the above embodiment of the present invention is illustrated.User using mobile phone supermarket, market, convenience store etc. place into When row ideal money is traded, user can input verifying password to be verified, after mobile phone receives verifying password to be verified, Verifying password to be verified is generated the specific cryptosystem that chip generates with identifying code to match.
If processing module 65 is completed for verify data and identifying code successful match to be verified, resource processing terminal Handle the process of virtual resource.
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is verifying For password, the above embodiment of the present invention is illustrated.User using mobile phone supermarket, market, convenience store etc. place into When row ideal money is traded, user can input verifying password to be verified, after mobile phone receives verifying password to be verified, Verifying password to be verified is generated the specific cryptosystem that chip generates with identifying code to match, if successful match, mobile phone Complete the process of exchange of ideal money.
Verify data to be verified is received when resource handles terminal processes virtual resource using the embodiment of the present invention, and Verify data to be verified is matched with pre-generated identifying code, if verify data to be verified is matched with identifying code Success, then resource processing terminal completes the process of processing virtual resource.Through the embodiment of the present invention, by verify data to be verified It is matched with pre-generated identifying code, so that user in the case where that can ensure information safety, completes entire process flow Operation, and does not destroy original convenience, and in network there are in the case where loophole or hacker attacks, due to that can not obtain Get pre-generated identifying code, verify data to be verified can not be carried out and identifying code carries out matched process, further without The process that method completes processing virtual resource is deposited to solve in the treatment process of terminal processes virtual resource in the prior art Lead to the technical problem for handling the process safety difference of virtual resource in network hole, hacker attacks etc., improves virtual resource The safety for the treatment of process.
Optionally, in the present embodiment, the secure processing device of above-mentioned virtual resource can be applied to meter as shown in Figure 1 In the hardware environment that calculation machine terminal 10 is constituted.As shown in Figure 1, terminal 10 by network and other terminals into Row connection, above-mentioned network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
Embodiment 5
According to embodiments of the present invention, a kind of safe processing system of virtual resource is additionally provided, as shown in fig. 7, the system It may include: that identifying code generates terminal 72 and resource processing terminal 74.
Wherein, identifying code generates terminal 72, for generating identifying code.
Resource processing terminal 74 generates terminal 72 with identifying code and communicates, for receiving to be verified when handling virtual resource Verify data, and verify data to be verified is matched with the identifying code got in advance, if verifying to be verified Data and identifying code successful match, then resource processing terminal completes the process of processing virtual resource.
Specifically, above-mentioned resource processing terminal can be the intelligent terminals such as mobile phone, iPad, tablet computer, above-mentioned virtual money Source can be ideal money, virtual goods, virtual book etc., and above-mentioned verify data to be verified can be the verifying of user's input Code generates the mark (ID) of terminal, and above-mentioned resource processing terminal can be the intelligent terminals such as mobile phone, iPad, tablet computer, above-mentioned Virtual resource can be ideal money, virtual goods, virtual book etc., and above-mentioned verify data to be verified can be user's input Identifying code generate terminal mark (ID).
For example, resource processing terminal is mobile phone still using virtual resource as ideal money, verify data to be verified is ID, Identifying code generates terminal to be illustrated for wrist-watch to the above embodiment of the present invention.In user using mobile phone in supermarket, quotient When the place such as field, convenience store carries out ideal money transaction, the wrist-watch that user wears is sent using BLE technology to the mobile phone of user special Fixed ID, user can input identifying code and generate Termination ID, and obtain the ID of wrist-watch transmission, and the ID of input and wrist-watch are sent ID is matched, if the ID successful match that the ID and mobile phone of input are sent, mobile phone complete the transaction of ideal money.
Verify data to be verified is received when resource handles terminal processes virtual resource using the embodiment of the present invention, and Verify data to be verified is matched with the identifying code got in advance, if verify data to be verified and identifying code With success, then resource processing terminal completes the process of processing virtual resource.Through the embodiment of the present invention, by verifying number to be verified It is matched according to the identifying code got in advance, so that user in the case where that can ensure information safety, completes entire processing Flow operations, and do not destroy original convenience, and in network there are in the case where loophole or hacker attacks, due to nothing Method gets identifying code in advance and generates the identifying code that terminal generates, and can not carry out verify data and identifying code progress to be verified The process matched further is unable to complete the process of processing virtual resource, virtually provides to solve terminal processes in the prior art In the treatment process in source, there are network hole, hacker attacks etc., and the technology for the process safety difference for handling virtual resource to be caused to be asked Topic, improves the safety of virtual resource treatment process.
Optionally, in the present embodiment, the safe processing system of above-mentioned virtual resource can be applied to meter as shown in Figure 1 In the hardware environment that calculation machine terminal 10 is constituted.As shown in Figure 1, terminal 10 by network and other terminals into Row connection, above-mentioned network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
Embodiment 6
According to embodiments of the present invention, a kind of safe processing system of virtual resource is additionally provided, as shown in figure 8, the system It may include: resource processing terminal 82.
Wherein, resource processing terminal 82 is used to receive verifying to be verified when resource handles terminal processes virtual resource Data, and verify data to be verified is matched with pre-generated identifying code, wherein by resource processing terminal built-in Identifying code generates chip and generates identifying code, if verify data to be verified and identifying code successful match, resource processing terminal Complete the process of processing virtual resource.
Specifically, above-mentioned resource processing terminal can be the intelligent terminals such as mobile phone, iPad, tablet computer, above-mentioned virtual money Source can be ideal money, and virtual goods, virtual book etc., it is close that above-mentioned verify data to be verified can be verifying to be verified Code, above-mentioned identifying code can be identifying code and generate the specific cryptosystem that chip generates.
For example, resource processing terminal is mobile phone using virtual resource as ideal money, verify data to be verified is that verifying is close For code, the above embodiment of the present invention is illustrated.It is carried out using mobile phone in the place such as supermarket, market, convenience store in user When ideal money is traded, user can input verifying password to be verified, and mobile phone receives verifying password to be verified, and mobile phone connects After receiving verifying password to be verified, verifying password to be verified and identifying code are generated into the specific cryptosystem that chip generates and carried out Matching, if successful match, mobile phone completes the process of exchange of ideal money.
Verify data to be verified is received when resource handles terminal processes virtual resource using the embodiment of the present invention, and Verify data to be verified is matched with pre-generated identifying code, if verify data to be verified is matched with identifying code Success, then resource processing terminal completes the process of processing virtual resource.Through the embodiment of the present invention, by verify data to be verified It is matched with pre-generated identifying code, so that user in the case where that can ensure information safety, completes entire process flow Operation, and does not destroy original convenience, and in network there are in the case where loophole or hacker attacks, due to that can not obtain Get pre-generated identifying code, verify data to be verified can not be carried out and identifying code carries out matched process, further without The process that method completes processing virtual resource is deposited to solve in the treatment process of terminal processes virtual resource in the prior art Lead to the technical problem for handling the process safety difference of virtual resource in network hole, hacker attacks etc., improves virtual resource The safety for the treatment of process.
Optionally, in the present embodiment, the safe processing system of above-mentioned virtual resource can be applied to meter as shown in Figure 1 In the hardware environment that calculation machine terminal 10 is constituted.As shown in Figure 1, terminal 10 by network and other terminals into Row connection, above-mentioned network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
Embodiment 7
The embodiment of the present invention can provide a kind of terminal, which can be in terminal group Any one computer terminal.Optionally, in the present embodiment, above-mentioned terminal also could alternatively be mobile whole The terminal devices such as end.
Optionally, in the present embodiment, above-mentioned terminal can be located in multiple network equipments of computer network At least one network equipment.
Optionally, Fig. 9 is a kind of structural block diagram of terminal according to an embodiment of the present invention.As shown in figure 9, the meter Calculation machine terminal A may include: one or more (one is only shown in figure) processors 91, memory 93 and transmitting device 95.
Wherein, memory 93 can be used for storing software program and module, such as the virtual resource in the embodiment of the present invention Corresponding program instruction/the module of method and device of safe processing, the software that processor 91 is stored in memory 93 by operation Program and module realize the safe handling of above-mentioned virtual resource thereby executing various function application and data processing Method.Memory 93 may include high speed random access memory, can also include nonvolatile memory, such as one or more magnetism Storage device, flash memory or other non-volatile solid state memories.In some instances, memory 93 can further comprise phase The memory remotely located for processor 91, these remote memories can pass through network connection to terminal A.It is above-mentioned The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Above-mentioned transmitting device 95 is used to that data to be received or sent via a network.Above-mentioned network specific example can Including cable network and wireless network.In an example, transmitting device 95 includes a network adapter (Network Interface Controller, NIC), can be connected by cable with other network equipments with router so as to interconnection Net or local area network are communicated.In an example, transmitting device 95 is radio frequency (Radio Frequency, RF) module, is used In wirelessly being communicated with internet.
Wherein, specifically, memory 93 is for storing the identifying code got in advance, virtual resource, treatment conditions information And application program.
The information and application program that processor 91 can call memory 93 to store by transmitting device, to execute following steps It is rapid: when resource handles terminal processes virtual resource, to receive verify data to be verified;By verify data to be verified and in advance The identifying code got is matched, wherein resource processing terminal generates terminal from the identifying code communicated with resource processing terminal Obtain identifying code;If verify data to be verified and identifying code successful match, resource processing terminal completes the virtual money of processing The process in source.
Optionally, the program code of following steps can also be performed in above-mentioned processor 91: resource processing terminal detects whether It scans the identifying code with correspondence and generates terminal;Detect that the identifying code with correspondence is raw in resource processing terminal After terminal, resource processing terminal judges whether that successfully getting identifying code generates the identifying code that terminal is currently generated;If Resource processing terminal successfully gets identifying code and generates the identifying code that terminal is currently generated, then enters verify data to be verified The step of being matched with the identifying code got in advance;Wherein, if resource processing terminal obtains identifying code failure or to be tested It fails to match with identifying code for the verify data of card, then resource processing terminal aborts handle virtual resource.
Optionally, the program code of following steps can also be performed in above-mentioned processor 91: the detection of resource processing terminal is multiple Identifying code generates in the identifying code that terminal generates with the presence or absence of the identifying code to match with verify data to be verified;If resource Processing terminal detects the presence of the identifying code to match with verify data to be verified, then completes the process of processing virtual resource.
Optionally, the program code of following steps: resource processing terminal judgement processing can also be performed in above-mentioned processor 91 Whether conditional information is completion processing;If resource processing terminal determines that treatment conditions information is completion processing, resource processing Terminal completes the process of processing virtual resource;If resource processing terminal determines that treatment conditions information is interrupt processing, resource Processing terminal interrupt processing virtual resource.
Optionally, the program code of following steps can also be performed in above-mentioned processor 91: resource processing terminal shows to be tested The verify data of card, and obtain the treatment conditions information of user's input, wherein treatment conditions information is to complete processing or interrupt Processing;If resource processing terminal detects that treatment conditions information is completion processing, it is virtual that resource processing terminal completes processing The process of resource;If resource processing terminal detects that treatment conditions information is interrupt processing, resource is handled at terminal aborts Manage virtual resource.
Optionally, the program code of following steps: resource processing terminal display processing can also be performed in above-mentioned processor 91 The processing page of virtual resource.
Optionally, the program code of following steps can also be performed in above-mentioned processor 91: resource processing terminal shows to be tested The corresponding prompt information of the verify data of card, wherein prompt information is for prompting resource processing terminal aborts processing virtual resource; Resource processing terminal receives verify data to be verified again, and enters and test verify data to be verified with what is got in advance The step of card code is matched.
Optionally, the specific example in the present embodiment can be shown with reference to described in above-described embodiment 1 to embodiment 6 Example, details are not described herein for the present embodiment.
Embodiment 8
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can To store the program code of the security processing of the virtual resource of above-described embodiment 1 and embodiment 2.
Optionally, in the present embodiment, multiple networks that above-mentioned storage medium 902 can be located in the network of computer are set At least one network equipment in standby.
Optionally, in the present embodiment, storage medium 902 is arranged to store the program generation for executing following steps Code:
S1 receives verify data to be verified when resource handles terminal processes virtual resource;
S2 matches verify data to be verified with the identifying code got in advance, wherein resource processing terminal from The identifying code communicated with resource processing terminal generates terminal and obtains identifying code;
S3, if verify data to be verified and identifying code successful match, resource processing terminal completes the virtual money of processing The process in source.
Optionally, storage medium 902 is also configured to store the program code for executing following steps: resource processing is eventually End detects whether that scanning generates terminal to the identifying code with correspondence;It detects in resource processing terminal with correspondence Identifying code generate terminal after, resource processing terminal judges whether successfully to get that identifying code generates that terminal is currently generated tests Demonstrate,prove code;If resource processing terminal successfully gets identifying code and generates the identifying code that terminal is currently generated, entering will be to be verified Verify data the step of being matched with the identifying code got in advance;Wherein, if resource processing terminal obtains identifying code It fails to match with identifying code for failure or verify data to be verified, then resource processing terminal aborts handle virtual resource.
Optionally, storage medium 902 is also configured to store the program code for executing following steps: resource processing is eventually It detects multiple identifying codes and generates in the identifying code that terminal generates with the presence or absence of the verifying to match with verify data to be verified in end Code;If resource processing terminal detects the presence of the identifying code to match with verify data to be verified, it is virtual to complete processing The process of resource.
Optionally, storage medium 902 is also configured to store the program code for executing following steps: resource processing is eventually End judges whether treatment conditions information is completion processing;If resource processing terminal determines that treatment conditions information is completion processing, Then resource processing terminal completes the process of processing virtual resource;If resource processing terminal determines that treatment conditions information is at interruption Reason, then resource processing terminal aborts handle virtual resource.
Optionally, storage medium 902 is also configured to store the program code for executing following steps: resource processing is eventually End shows verify data to be verified, and obtains the treatment conditions information of user's input, wherein treatment conditions information is at completion Reason or interrupt processing;If resource processing terminal detects that treatment conditions information is completion processing, resource processing terminal is complete At the process of processing virtual resource;If resource processing terminal detects that treatment conditions information is interrupt processing, resource processing Terminal aborts handle virtual resource.
Optionally, storage medium 902 is also configured to store the program code for executing following steps: resource processing is eventually The processing page of end display processing virtual resource.
Optionally, storage medium 902 is also configured to store the program code for executing following steps: resource processing is eventually End shows the corresponding prompt information of verify data to be verified, wherein prompt information is for prompting at resource processing terminal aborts Manage virtual resource;Resource processing terminal receives verify data to be verified again, and by verify data to be verified and in advance The step of identifying code first got is matched.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or The various media that can store program code such as CD.
Optionally, the specific example in the present embodiment can be shown with reference to described in above-described embodiment 1 to embodiment 6 Example, details are not described herein for the present embodiment.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
If the integrated unit in above-described embodiment is realized in the form of SFU software functional unit and as independent product When selling or using, it can store in above-mentioned computer-readable storage medium.Based on this understanding, skill of the invention Substantially all or part of the part that contributes to existing technology or the technical solution can be with soft in other words for art scheme The form of part product embodies, which is stored in a storage medium, including some instructions are used so that one Platform or multiple stage computers equipment (can be personal computer, server or network equipment etc.) execute each embodiment institute of the present invention State all or part of the steps of method.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed client, it can be by others side Formula is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, and only one Kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or It is desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed it is mutual it Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (9)

1. a kind of security processing of virtual resource characterized by comprising
When resource handles terminal processes virtual resource, verify data to be verified is received;
The verify data to be verified is matched with the identifying code got, wherein the resource processing terminal from The identifying code of the resource processing terminal communication generates terminal and obtains the identifying code, wherein the verify data to be verified It is received before getting the identifying code;
If the verify data to be verified and the identifying code successful match, the resource processing terminal completes processing institute State the process of virtual resource;
Wherein, the identifying code got includes: treatment conditions information, the treatment conditions information be complete processing or in Disconnected processing, wherein before the process that the resource processing terminal completes the processing virtual resource, the method also includes: In the case where the resource processing terminal determines that the treatment conditions information is completion processing, the resource processing terminal Complete the process of the processing virtual resource;Determine that the treatment conditions information is at the interruption in the resource processing terminal In the case where reason, the resource processing terminal aborts handle the virtual resource.
2. the method according to claim 1, wherein the verify data to be verified is tested with what is got Before card code is matched, the method also includes:
The resource processing terminal detects whether that scanning generates terminal to the identifying code with correspondence;
After the resource processing terminal detects that the identifying code with correspondence generates terminal, the resource processing Terminal judges whether that successfully getting the identifying code generates the identifying code that terminal is currently generated;
If the resource processing terminal successfully gets the identifying code and generates the identifying code that terminal is currently generated, entering will The step of verify data to be verified is matched with the identifying code got;
Wherein, if the resource processing terminal obtain identifying code failure or the verify data to be verified with it is described It fails to match for identifying code, then the resource processing terminal aborts handle the virtual resource.
3. according to the method described in claim 2, it is characterized in that, the identifying code got is including at least following any one Kind: digital information, text information, image information, video information and voice messaging.
4. according to the method described in claim 3, it is characterized in that, in the institute with the resource processing terminal with correspondence State identifying code generate terminal be it is multiple in the case where, the verify data to be verified is matched with the identifying code got Include:
The resource processing terminal detect multiple identifying codes generate in the identifying code that terminals generate with the presence or absence of with it is described to be verified The identifying code that matches of verify data;
If the resource processing terminal detects the presence of the identifying code to match with the verify data to be verified, Complete the process of the processing virtual resource.
5. according to the method described in claim 3, it is characterized in that, detecting whether scanning to having in the resource processing terminal Before the identifying code of correspondence generates terminal, the method also includes:
The resource processing terminal display handles the processing page of the virtual resource.
6. method as claimed in any of claims 1 to 5, which is characterized in that it is such as that the identifying code, which generates terminal, Descend any one: wearable device, mobile phone or tablet computer.
7. method as claimed in any of claims 1 to 5, which is characterized in that handle terminal aborts in the resource After handling the virtual resource, the method also includes:
The resource processing terminal shows the corresponding prompt information of the verify data to be verified, wherein the prompt information For prompting the resource processing terminal aborts to handle the virtual resource;
The resource processing terminal receives verify data to be verified again, and enter by the verify data to be verified with obtain The step of identifying code got is matched.
8. a kind of secure processing device of virtual resource characterized by comprising
Receiving module, for receiving verify data to be verified when resource handles terminal processes virtual resource;
Matching module, for matching the verify data to be verified with the identifying code got, wherein the resource Processing terminal generates terminal from the identifying code communicated with the resource processing terminal and obtains the identifying code, wherein described to be tested The verify data of card receives before getting the identifying code;
Processing module, if for the verify data to be verified and the identifying code successful match, the resource processing Terminal is completed to handle the process of the virtual resource;
Wherein, the identifying code got includes: treatment conditions information, the treatment conditions information be complete processing or in Disconnected processing, wherein described device is also used to before the resource processing terminal is completed to handle the process of the virtual resource, In the case that the resource processing terminal determines that the treatment conditions information is the completion processing, the resource processing terminal is complete At the process for handling the virtual resource;Determine that the treatment conditions information is the interrupt processing in the resource processing terminal In the case where, the resource processing terminal aborts handle the virtual resource.
9. a kind of safe processing system of virtual resource characterized by comprising
Identifying code generates terminal, for generating identifying code;
Resource processing terminal generates terminal with the identifying code and communicates, for receiving to be verified test when handling virtual resource Data are demonstrate,proved, and the verify data to be verified is matched with the identifying code got, if described to be verified Verify data and the identifying code successful match, then the resource processing terminal is completed to handle the process of the virtual resource, In, the verify data to be verified receives before generating the identifying code;
Wherein, the identifying code got includes: treatment conditions information, the treatment conditions information be complete processing or in Disconnected processing, wherein the resource processing terminal is also used to before the process for completing to handle the virtual resource, in the processing In the case that conditional information is the completion processing, the process for handling the virtual resource is completed;In the treatment conditions information In the case where being the interrupt processing, virtual resource described in interrupt processing.
CN201510998883.4A 2015-12-28 2015-12-28 The security processing of virtual resource, device and system Active CN106921498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510998883.4A CN106921498B (en) 2015-12-28 2015-12-28 The security processing of virtual resource, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510998883.4A CN106921498B (en) 2015-12-28 2015-12-28 The security processing of virtual resource, device and system

Publications (2)

Publication Number Publication Date
CN106921498A CN106921498A (en) 2017-07-04
CN106921498B true CN106921498B (en) 2019-09-20

Family

ID=59455024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510998883.4A Active CN106921498B (en) 2015-12-28 2015-12-28 The security processing of virtual resource, device and system

Country Status (1)

Country Link
CN (1) CN106921498B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443699A (en) * 2018-05-03 2019-11-12 阿里巴巴集团控股有限公司 Method for processing resource and system
CN112578763B (en) * 2019-09-30 2023-01-17 北京国双科技有限公司 Security authorization method, fault diagnosis method, system and related products

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102194A (en) * 2007-07-31 2008-01-09 北京飞天诚信科技有限公司 A method for OTP device and identity authentication with this device
CN103745151A (en) * 2014-01-08 2014-04-23 杭州晟元芯片技术有限公司 System and method for authenticating identity through combination of two-dimension codes and dynamic passwords
CN103955820A (en) * 2014-05-09 2014-07-30 捷德(中国)信息科技有限公司 Non-card payment method and device
CN104601324A (en) * 2013-10-30 2015-05-06 阿里巴巴集团控股有限公司 Verification method specific to applications, terminal and system
CN105069615A (en) * 2015-08-07 2015-11-18 上海微肯网络科技有限公司 Information release device and method for verifying same by using user terminal
CN105187368A (en) * 2015-06-05 2015-12-23 惠州Tcl移动通信有限公司 Method and system for accessing to applications of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102194A (en) * 2007-07-31 2008-01-09 北京飞天诚信科技有限公司 A method for OTP device and identity authentication with this device
CN104601324A (en) * 2013-10-30 2015-05-06 阿里巴巴集团控股有限公司 Verification method specific to applications, terminal and system
CN103745151A (en) * 2014-01-08 2014-04-23 杭州晟元芯片技术有限公司 System and method for authenticating identity through combination of two-dimension codes and dynamic passwords
CN103955820A (en) * 2014-05-09 2014-07-30 捷德(中国)信息科技有限公司 Non-card payment method and device
CN105187368A (en) * 2015-06-05 2015-12-23 惠州Tcl移动通信有限公司 Method and system for accessing to applications of mobile terminal
CN105069615A (en) * 2015-08-07 2015-11-18 上海微肯网络科技有限公司 Information release device and method for verifying same by using user terminal

Also Published As

Publication number Publication date
CN106921498A (en) 2017-07-04

Similar Documents

Publication Publication Date Title
US9508065B2 (en) Method and apparatus for providing real time mutable credit card information with future timestamp functionality
CN106503584B (en) A kind of session content methods of exhibiting and system
CN106716917A (en) Techniques and system for extended authentication
CN107423974A (en) Intellectual broadcast method and apparatus
CN106331372B (en) Data transmission method and mobile terminal
CN106709301A (en) Intelligent watch and locking control method and device for intelligent wearable equipment
CN104077101B (en) A kind of projecting method and electronic equipment
US20170154327A1 (en) Mobile Payment Method and Apparatus and Near Field Communication Device
CN105117121B (en) A kind of method that smartwatch is sought help and smartwatch
WO2021121112A1 (en) Fingerprint anti-counterfeiting method and electronic device
US20190007831A1 (en) Communication method and device
CN106648583B (en) Information processing method and terminal
CN106921498B (en) The security processing of virtual resource, device and system
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN106255102A (en) The authentication method of a kind of terminal unit and relevant device
CN108200572A (en) Switching method, the apparatus and system of terminal
Bindroo et al. A wearable NFC wristband for remote home automation system
CN103916856B (en) Establish method, user equipment and the access point of wireless communication
JP2017079446A (en) Human body communication device, human body communication method, and program
CN109474734A (en) Recognition methods, device and the terminal of type of call
CN109218507A (en) The methods, devices and systems of task execution
CN105578384B (en) A kind of business information storage method and device
CN106331169A (en) Method for reporting loss of mobile terminal and cloud customer terminal, cloud server, mobile terminal
KR102293416B1 (en) Communication device, server and communication method thereof
CN106056377A (en) Data processing method and smartwatch

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant