[go: up one dir, main page]

HK1205606B - Method for data interaction and system thereof - Google Patents

Method for data interaction and system thereof Download PDF

Info

Publication number
HK1205606B
HK1205606B HK15106147.2A HK15106147A HK1205606B HK 1205606 B HK1205606 B HK 1205606B HK 15106147 A HK15106147 A HK 15106147A HK 1205606 B HK1205606 B HK 1205606B
Authority
HK
Hong Kong
Prior art keywords
user
code
authorization code
interactive
interaction
Prior art date
Application number
HK15106147.2A
Other languages
Chinese (zh)
Other versions
HK1205606A1 (en
Inventor
黄冕
Original Assignee
创新先进技术有限公司
Filing date
Publication date
Priority claimed from CN201310566609.0A external-priority patent/CN104639586B/en
Application filed by 创新先进技术有限公司 filed Critical 创新先进技术有限公司
Publication of HK1205606A1 publication Critical patent/HK1205606A1/en
Publication of HK1205606B publication Critical patent/HK1205606B/en

Links

Description

Data interaction method and system
Technical Field
The present application relates to the field of data processing, and more particularly, to a data interaction method and system.
Background
With the development of networking, data of users can be conveniently stored in a network, and particularly personal data about the users can be safely stored in the network and can be accessed, viewed, interacted and the like through terminal equipment. In the prior art, for such data stored in the network, short-distance and real-time data interaction under the ground line is performed between users, and data interaction can be realized through terminal devices of the users, for example, through a mobile phone and the like, by installing corresponding client apps. One party user wants to interact data with the other party user, a data interaction request is activated, corresponding registered account information and the like are input in an interface displayed by a client App, and the interaction is confirmed after the input is finished. However, this method always requires that at least one of the two users of data interaction inputs personal information, account number, and secret key of the user or collects registration information, and more data operations are always required in the same period of time, even the user interface and the two interaction parties need to be switched continuously for operation. Such offline data interaction mode is not simple and convenient, the processing time and the processing cost are relatively high, and the processing is tedious and time-consuming, so that the overall efficiency of the interaction processing is low.
Disclosure of Invention
Based on the defects of low data interaction efficiency, long data interaction processing operation process time and low convenience in the prior art, the application mainly aims to provide a data interaction method and a data interaction system so as to improve the data interaction efficiency and solve the technical problem of improving the data interaction processing efficiency.
In order to solve the above technical problem, the present application is implemented by the following technical solutions.
The application provides a data interaction method, which comprises the following steps: determining a first user with a position within a certain range of the position of a second user according to the position information of the second user and the position information of the first user; matching an authorization code in the received data interaction request from the second user with an interaction code pre-allocated to the first user within a certain range of the position of the second user, and verifying the validity of the authorization code; and when the interactive code of the first user in a certain range of the position of the second user exists, the interactive code matched with the authorization code of the second user exists, and the authorization code of the second user is verified to be valid, executing data interaction between the first user and the second user corresponding to the interactive code matched with the authorization code of the second user.
Wherein the certain range comprises a preset geographical area range; determining a first user with a position within a certain range of the position of a second user according to the position information of the second user and the position information of the first user, and further comprising: and comparing the position information from the first user with the position information from the second user, and determining that the first user is the first user within a certain range of the position of the second user if the position indicated by the position information of the first user falls within a preset geographical area range of the position indicated by the position information of the second user.
Wherein, can also include: and when the interactive code of the first user in a certain range of the position of the second user does not have the interactive code matched with the authorization code of the second user, or the authorization code of the second user is verified to be invalid, ending the data interaction process.
The method for matching the authorization code in the received data interaction request from the second user with the interaction code pre-allocated to the first user within a certain range of the location of the second user and verifying the validity of the authorization code includes: matching, and verifying the validity of the authorization code when an interactive code matched with the authorization code of the second user exists; if the authorization code is verified to be invalid, ending the data interaction process; and matching is carried out firstly, and when the interaction code matched with the authorization code of the second user does not exist, the validity of the authorization code is not verified any more, and the data interaction process is ended.
Wherein, can also include: the interactive code represents unique, random data having a valid time and being usable only once by a first user that can be bound by the interactive code during the valid time; alternatively, the interactive code represents random data that is unique within a certain range, has a valid time, and can be used only once by the first user bound by the interactive code within the valid time.
Wherein, can also include: the authorization code in the data interaction request of the second user is formed according to the interaction code pre-allocated by the first user.
Wherein verifying the validity of the authorization code comprises: and comparing the uploading time of the authorization code with the deadline of the interactive code matched with the authorization code, wherein the authorization code is valid if the uploading time of the authorization code is less than or equal to the deadline.
The application also provides a data interaction device, comprising: the determining module is used for determining a first user of which the position is within a certain range of the position of a second user according to the position information of the second user and the position information of the first user; the matching module is used for matching the authorization code in the received data interaction request from the second user with a first user which is pre-allocated to the second user within a certain range of the position of the second user, and verifying the validity of the authorization code; the interaction module is used for executing data interaction between a first user and a second user corresponding to an interaction code matched with the authorization code of the second user when the interaction code of the first user in a certain range of the position of the second user exists and the authorization code of the second user is verified to be valid.
Wherein the certain range comprises a preset geographical area range; the determination module is further configured to: and comparing the position information from the first user with the position information from the second user, and determining that the first user is the first user within a certain range of the position of the second user if the position indicated by the position information of the first user falls within a preset geographical area range of the position indicated by the position information of the second user.
Wherein the matching module further comprises: and when the interactive codes of one or more first users in a certain range of the position of the second user do not have the interactive codes matched with the authorization codes of the second user, or the authorization codes of the second user are verified to be invalid, ending the data interaction process.
Compared with the prior art, the technical scheme according to the application has the following beneficial effects:
according to the method and the device, short-distance and timely data interaction is achieved through the scheme that the password security technology and the positioning server technology are combined. The method comprises the steps of allocating an interactive code to a first user in advance, using the interactive code as an authorization code of a second user, and completing data interaction between the first user and the second user based on the authorization code within a certain range around the second user. According to the scheme, data interaction can be conveniently and rapidly completed, the data interaction time is shortened, and the data interaction efficiency and safety are improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow diagram of one embodiment of a data interaction method according to the present application; and
FIG. 2 is a block diagram of one embodiment of a data interaction device according to the present application.
Detailed Description
The method and the device have the main idea that the working efficiency and the safety in the data interaction process are improved by combining the password security technology and the positioning service technology. Specifically, before the data interaction of the users, the interaction code with the valid time is allocated to the first user in advance. An authorization code having a valid time formed by the second user in accordance with the interaction code provided by the first user may be received. The authorization code may be an authorization code that the first user transmits the interaction code obtained by the first user to a second user performing data interaction with the first user, so as to serve as the second user. And further, according to the acquired position information of the first user reported by the first user and the position information of the second user reported by the second user, determining one or more first users in a certain range around the second user, and matching the received authorization code from the second user with the determined interaction codes pre-allocated to the one or more first users. If the authorization code and the interaction code which are matched exist and are within the valid time, data interaction can be carried out between the first user corresponding to the interaction code and the second user corresponding to the authorization code. And if the matched authorization code and the interaction code do not exist or the authorization code and the interaction code exceed the valid time, not performing data interaction.
Further, the cryptographic security technique may employ One-Time Password (OTP). The one-time password is a random password that is bound (corresponding) to a user by the one-time password only once within a certain time, limited by valid time and the user. Applying the cryptographic security techniques, for example: an interaction code and an authorization code. The Location Based service technology may adopt a Location Based Service (LBS) technology, or may adopt technologies such as Wifi hotspot and bluetooth to implement a Location function for a user.
Further, the positioning of the user is realized by using a Wifi hotspot, which may be a Basic Service Set Identifier (bsid) broadcast that acquires the Wifi hotspot existing around the user through a mobile terminal of the user, and since the bsid broadcast has a corresponding relationship with a geographic location, the location information of the user may be acquired according to the method.
Furthermore, the positioning of the user can be realized by adopting a Bluetooth technology, the Bluetooth equipment can be used, the Bluetooth equipment already has accurate position information on the server side, and the user can search the Bluetooth equipment through a Bluetooth function, so that the position information of the user can be determined through the position relation between the user and the Bluetooth equipment.
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As shown in fig. 1, fig. 1 is a flowchart of an embodiment of a data interaction method according to the present application. The flow of this embodiment mainly takes LBS and OTP as examples.
In step S110, an interactive code is pre-allocated to a first user who sends an interactive code request, and location information of the first user is pre-obtained. The first user will typically have one or more.
The location information of the first user may be obtained when the first user sends the interactive code request, before the first user sends the interactive code request, and/or after the first user sends the interactive code request.
< Allocation of an interaction code to a first user who sent a request for an interaction code in advance >
The interactive code may be a one-time password. The interactive code can be used as a password for data interaction between the first user and the second user; or forming a password for data interaction between the first user and the second user according to the interactive code. The first user and the second user can perform data interaction based on the password. The interactive code request sent by the first user to the server side may be used to request the server side to obtain the interactive code.
Specifically, the first user may send an interactive code request for obtaining an interactive code to the server before data interaction is required. Wherein the identity information of the user, e.g. the user ID of the first user, may be included in the interactive code request. The user ID of the first user has uniqueness, and a unique first user can be identified by the user ID of the first user, so that the user IDs of all the first users are not repeated. The server may analyze the first user (user ID) sending the interactive code request based on the interactive code request. An interactive code may be pre-assigned to the first user in accordance with the interactive code request and bound to the first user (user ID) prior to data interaction. The binding includes forming an association or correspondence with the user ID, and the like. For example, the interactive code assigned to the first user may be associated with the first user (user ID). Furthermore, the binding relationship may also be stored on the server side, and the relationship is referred to table 1, where the user ID is stored in correspondence with the interactive code.
Further, in one case, the interactive code may be expressed as: random data with uniqueness and the interactive code has a valid time and is used only once by the first user bound (corresponding) to the interactive code during the valid time. Alternatively, the interactive code can be expressed as: a range of unique, random data that has a validity time and can be used only once by a first user bound by the interactive code during the validity time. The random data (interactive code) may be a numerical value, a letter, or the like. For example, the server randomly generates an interactive code for the first user, where the interactive code includes a valid time, and within the valid time of the interactive code, the interactive code is guaranteed to be within a certain range, and there is no other interactive code that is duplicated (identical) with the interactive code, and the interactive code is not reusable, i.e., is used only once by the first user. The "certain range" may be a preset geographical area range, such as: the Beijing City may be a geographic area.
Specifically, the validity time of the interactive code indicates that the interactive code needs to be used within the validity time, and the interactive code is invalidated or invalidated after the validity time. For example: the effective time of the interactive code is 8 hours, the effective time is 1 click in the morning of 9, month and 5 days in 2013, and then the deadline, namely the failure time point, is 9 clicks in 9, month and 5 days in 2013. Thus, if the first user who obtains the interactive code clicks and uses the interactive code in the 5.5.9.2013 night 22, the click exceeds the valid time period of 8 hours from the effective time after the 9-click on the day, which means that the interactive code exceeds the valid time, and is invalid and invalid, therefore, any data interaction task cannot be completed by using the interactive code. Further, the effective time may also be the time when the server generates the interactive code according to the request, such as the aforementioned 1 o' clock in the morning of 9-5 months in 2013.
The interactive code can only be used once by the first user to which it belongs. For example: the first user who obtains the interactive code can not use the interactive code again for data interaction after finishing the data interaction by using the interactive code. The interactive code may be bound to the first user who obtained the interactive code. For example: for a first user a with a user ID of 123, an 8-digit interactive code "12345678" generated by the server is assigned, and the interactive code 12345678 may be made to correspond to the first user a.
The interactive code generation and design can ensure that other users except the first user distributed with the interactive code cannot crack or illegally utilize the interactive code, so that the safety of data interaction is improved.
In one embodiment, a user-interaction-code information table as shown in table 1 may be generated for storing the interaction code information pre-assigned to the first user, which may include the user ID of the first user who obtained the interaction code, the effective time of the interaction code, and so on.
Table 1:
user ID Interactive code Effective time Effective time
123 12345678 20130905-1:00 8 hours
Listed in table 1 is an example of a user-opcode information table, where the user ID of the first user is 123, the opcode of the first user is 12345678, the time for generating the opcode, i.e., the effective time of the opcode is 20130905-1:00 (9/5/2013, 1 click in the morning), the effective time of the opcode is 8 hours, the deadline time of the opcode is 9 clicks in the 9/5/2013 in the morning, i.e., the opcode will expire at 9 clicks in the 9/5/2013 in the morning.
< obtaining and storing in advance location information reported from one or more first users >
The location information reported by the first user may include geographical location information of the first user. The geographical location information of the first user is used to identify the location where the first user is located. The geographical location information of the first user may be Global Positioning information (GPS) of the first user.
The location information reported by the first user each time may carry the identity information of the user, for example, carry the user ID of the first user. And the position information reported by the first user is corresponding to the user ID of the first user and is stored at the server side, so that the server side can know the current position of each first user. The location information reported by the first user and the unique user ID corresponding to the first user are sent to the server, and are received by the server to further obtain the location information and the user ID, and are correspondingly stored, as shown in table 2. The server may update the stored location information according to the location information reported by the first user.
The first user may report the location information to the server at regular time and/or fixed point by using a location Based service (lbs) technology. Further, the first user may report the current location information to the server in real time or periodically during the moving process along with the real-time change of the location of the first user, and the server may update the location information of the first user stored at the server side after receiving the location information reported by the first user.
The LBS technology is adopted to report the position information at regular time, and the position information can be reported by taking time as a reference. For example, the first user may report the location information periodically (at regular time), specifically, the first user reports the location information to the server every 10 minutes.
The LBS technology is adopted to report the position information in a fixed point mode, and the position information can be reported by taking a specific position as a reference quantity. For example, the first user may report the location information within a certain range (fixed point) covered by a certain wifi hotspot.
In addition, the first user can also report the position information by adopting the mode of combining the timing and the fixed point. For example, the first user reports the location information periodically (at regular time) in a supermarket covered by a Wifi hotspot with a period of 10 minutes.
The server may add the location information reported by the first user to the user interaction code information table in table 1 according to the location information reported by the first user at regular time and/or fixed point, and update or newly build a corresponding user interaction code information table. As shown in table 2:
table 2:
in table 2, if the location information reported by the first user is received for the first time, the server may create a column of location information of the first user in the interactive code information table, that is, add the location information of the first user (the user with the user ID of 123), such as: north latitude 39 "26 ', east longitude 115" 25'. The location information may change with the movement of the first user, that is, if the reported location information is not received for the first time, the server may update the location information corresponding to the corresponding user ID in table 2 in real time according to the location information of the first user received (acquired) each time, so as to determine the current accurate location information of the first user, that is, determine the current location.
An example of a specific application: a first user using a terminal device, such as a mobile phone user, installs a client program (App) on a mobile phone, and the mobile phone user can apply for an interactive code from a corresponding server through the App. The interactive code is randomly generated by the server, such as an unused 8-digit number, and the 8-digit number is bound to the account of the mobile phone user. Meanwhile, a validity period of 8 digits is set, for example, 8 hours. The mobile phone user client App can also display the obtained interactive code. Moreover, the App of the mobile phone can detect the change of the geographic position of the mobile phone user, and further, the account information and the LBS information of the mobile phone user can be transmitted to the server side in a timing/periodic manner and the like. In addition, a mode of reporting the LBS information at regular time is adopted, for example, whether the LBS timer is overtime or not can be monitored, the App can report the position information of the mobile phone user when the time is overtime, and the mobile phone user is in a waiting state when the time is not overtime.
At step S120, a data interaction request submitted by a second user is received, and location information of the second user is acquired. And the data interaction request comprises information for requesting data interaction processing. Obtaining location information of the second user enables a determination of the location of the second user. There may be one or more second users.
The location information of the second user may be obtained when the second user sends or submits (sends/submits) the data interaction request, and/or before the second user submits the data interaction request, and/or after the second user submits the data interaction request.
< receiving a data interaction request sent or submitted from a second user >.
The information (data interaction request) requesting data interaction processing at least comprises identity information of the second user and an authorization code formed according to the interaction code transmitted by the first user.
Here, the authorization code represents the authority granted by the first user to the second user, and may be used as a password for data interaction between the first user and the second user. And the first user transmits the interactive code obtained by pre-distribution to the second user to form an authorization code of the second user. Forming an authorization code of the second user according to the interactive code transmitted by the first user, for example, a simpler manner, in which the second user can directly use the interactive code transmitted by the first user as the authorization code; alternatively, the authorization code may be formed by encrypting or decrypting the interactive code, adding other predetermined rules such as other identifiers, and the like. Thus, a second user may engage in data interaction with the first user through the authorization code.
In particular, prior to the first user interacting with the second user's data, the first user may communicate (or inform/send/input) its interaction code to the second user, with which the second user forms the authorization code of the second user. Thus, the second user may have an opportunity to interact with or obtain data from the first user, provided that the first user allows (or authorizes).
In one way, the first user may communicate (inform/transmit) its pre-obtained interactive code to the second user, and the interactive code is used as the authorization code of the second user, i.e. the data interaction password, to represent the authorization of the second user by the first user, and to permit the second user to obtain data from the first user.
For example, if the first user stores data that the second user wants to obtain on the personal network disk of the server side, the second user may request the server to obtain the data from the personal network disk of the first user by inputting an authorization code (interactive code) transmitted by the first user.
The second user sends the authorization code to the server side, so that the server can establish a data interaction channel between the first user and the second user by using the received authorization code, and finally, the data interaction can be completed. When the second user sends the authorization code to the server, the identity information of the second user, for example, the user ID of the second user, may be sent to the server together, so that the server may distinguish which authorization code the second user sent according to the user ID of the second user. And the user ID of the second user has uniqueness, and the unique second user is identified by the user ID of the second user, so that the user ID of each second user is not repeated.
< obtaining location information of second user >
Each second user may submit or otherwise report its location information to the server. The location information of the second user may include geographic location information of the second user identifying a location at which the second user is located. The geographical location information of the second user may be GPS information of the second user. The server may determine the location of the second user based on the submitted location information of the second user. Similar to the aforementioned location information of the first user, the description is omitted here.
In one embodiment, the location information of the second user may be reported by the second user in advance. The location information reported in advance can be stored in advance at the server side corresponding to the identity information of the location information, so as to form a record of the second user. If the location of the second user has not changed, the location information of the second user may not need to be updated, and if the location of the second user has changed, the location information of the second user may be resubmitted or reported to be updated. If the server receives the information of the second user requesting the data interactive processing, the server may correspondingly find the second user storing and recording the corresponding second user of the identity information according to the identity information (e.g., user ID) and the like in the information requesting the data interactive processing, find the position information recorded therein, and obtain the position information recorded therein, thereby determining the position of the second user requesting the data interactive processing. If the position of the second user is relatively fixed and cannot be moved frequently, the position information of the second user can be stored in the server side in advance in the mode, and the second user does not need to report or reports the position information only when the second user is moved.
In another mode, the second user may also report the location information of the second user when sending the authorization code, for example, the location information of the second user is included in the sent information requesting the data interaction processing, and is sent to the server together with the authorization code, the identity information, and the like. Further, the authorization code, the identity information and the position information corresponding to the second user are obtained from the information requesting the data interactive processing, so that the position of the second user can be determined. Further, if the location information is different from the location information reported last time or previously and stored in the record, the content table 3 of the location information stored previously may be updated, which is an example of the location information table of the second user stored on the server side.
Table 3:
the record of the correspondence relationship between the second user and the location information thereof, i.e., the storage form of the location information of the second user and the second user, is schematically listed in table 3, but is not limited thereto. In the example, the user ID of the second user is 456, and the location information corresponding to the second user with the user ID of 456 is north latitude 39 "26" and east longitude 115 "25". When the position of the second user changes, the server can update the record of the position information table of the second user regularly or in real time through the reported position information.
An example of a specific application (carrying the foregoing specific application example): if the mobile phone user provides the interaction code "12345678" of the mobile phone user to a merchant (second user), the merchant inputs the interaction code as an authorization code into his cash register, i.e., the authorization code "12345678". The cash register is connected to the server, and the authorization code, the location information, the identity information and the like of the merchant are transmitted to the server through the cash register. The server receives the information and finds the merchant and its corresponding location in the stored record.
In step S130, one or more first users whose positions are within a certain range of the position of the second user are determined according to the position information of the second user and the position information of the one or more first users.
The "certain range" of the location of the second user may be a geographical area range preset according to the requirement, similar to the aforementioned geographical area range preset when the interactive code is allocated. For example, if the second user needs to occupy a larger field when the second user is a larger supermarket, a circular area with the center point of the position of the supermarket as the center of a circle and the radius of 500m as the radius can be set as a certain range of the second user according to the size of the field occupied by the supermarket.
On the server side, since the location information of each first user and the location information of the second user are already stored or obtained, the location information of one or more first users may be compared with the location information of the second user who sent the data interaction request, so as to determine one or more first users located within a certain range of the location of the second user. That is, one or more first users in the preset area are searched based on the position of one second user. Specifically, the position information from the first user is compared with the position information from the second user, the position indicated by the position information of the first user falls within a preset geographic area range of the position indicated by the position information of the second user, and it can be determined that the first user is the first user within a certain range of the position where the second user is located.
For example, the location information of the second user is longitude 120.1262 and latitude 30.2619, and the stored location information of the first user includes: the location information of the first user a is longitude 120.1272 and latitude 30.2629, the location information of the first user B is 120.1292 and latitude 30.2609, and the location information of the first user C is 120.1262 and latitude 30.2719. If the area within the radius range of 500m is set by taking the position information of the second user as the center of a circle, the first user A and the first user B are within the range of 500m around the second user, and the first user C is located outside the range of 500m around the second user.
An example of a specific application (carrying the foregoing specific application example): the mobile phone users nearby the merchant (such as the cash register of the merchant) are searched according to the geographic position.
In step S140, the authorization code in the received information requesting data interaction submitted by the second user is matched with the interaction codes pre-allocated to one or more first users whose locations are within a certain range of the location of the second user, and the validity of the authorization code matched with the interaction code is verified. So as to determine the interaction code matched with the authorization code of the second user, determine the validity of the authorization code, and further determine the first user corresponding to the interaction code.
Since the first user and the corresponding (bound) interactive code are stored in advance, one or more first users whose positions are determined to be within a certain range of the position of the second user can know the interactive code bound by each of the one or more first users.
The authorization code of the second user may be matched to the interaction codes of the one or more first users. The matching may be performed by searching the interactive codes of the one or more first users according to the authorization code of the second user, such as 1: n, and searching in n interactive codes by using the authorization code as a search term, where n is a natural number.
If there is a matching authorization code and interaction code, the related interaction code is searched, such as: the content of the matching authorization code and the content of the interaction code are consistent, or the matching authorization code and the matching interaction code are consistent with a preset rule, and the like, it may indicate that the corresponding first user exists. For example: when the authorization code of the second user is the interaction code which is directly used and is obtained in advance and transmitted to the second user by the first user, the authorization code and the interaction code which are matched exist, namely the authorization code is consistent with the content of the interaction code. Further, if it can be determined that there is a matching authorization code and interaction code, the records in tables 1 and 2 may be referenced to determine the first user to which the matching interaction code is bound.
If no matched authorization code and interaction code exist, the related interaction code cannot be searched: no content-consistent interaction code, no interaction code that meets certain rules, etc., may indicate: the authorization code provided by the second user is in error, or the first user who provided the interaction code to the second user to form his authorization code is not within the certain range of the second user, etc. Further, if there is no matching authorization code and interaction code, the authorization code may be invalidated, and the second user may be notified that the request for data interaction fails, that is, the data interaction procedure is ended.
In addition, it may be verified whether the authorization code is valid. Matching may be performed first, and when there is an interaction code matching the authorization code of the second user, the validity of the authorization code is verified, and then, if the authorization code is verified to be invalid, the data interaction procedure is ended; and matching is carried out firstly, and when the interaction code matched with the authorization code of the second user does not exist, the validity of the authorization code is not verified any more, and the data interaction process is ended.
Specifically, if the second user directly uses the interaction code transmitted by the first user as the authorization code, it may be verified whether the authorization code is within the valid time, that is, the validity of the authorization code is verified when the server receives the authorization code of the second user, or when the server determines that the matching authorization code and the interaction code exist.
Further, the second user receives the interactive code from the first user, and directly sends the interactive code as an authorization code to the server side. When the interaction code of one of the one or more first users located within the geographic location of the second user matches the authorization code of the second user (e.g., content match/identity), the validity of the authorization code also needs to be verified. If the authorization code is not verified as invalid or invalid within the valid time, the data interaction process is ended. If the authorization code is verified to be valid within the valid time, it indicates that the matched interaction code is present and belongs to the valid period, and data interaction can be performed.
The authorization code may be uploaded at a time that is later than the expiration time of the interaction code. If the upload time of the authorization code is less than or equal to the expiration time, the authorization code is valid. If the upload time of the authorization code is greater than (exceeds) the expiration time, the authorization code is invalid. The expiration or validity time cut-off point, for example, the corresponding time point obtained by adding the validity time to the validity time in tables 1 and 2, is the expiration time of the interactive code. Specifically, the interaction code is matched, such as: after the authorization code is equal to the interactive code, according to the contents shown in tables 1 and 2, 1+8=9, it is determined that the valid time of the interactive code is 9 am by 9.5.2013.9.5.a. Then if the server receives the authorization code after 9 o' clock in 2013, 9/5, such as: at 10 am, the effective time of the interactive code is more than 8 hours from 1 am to 10 am, 9 hours, i.e. the effective time of the interactive code is beyond, see tables 1 and 2, and the expiration of the interactive code also indicates that the authorization code is expired (expired). That is, even if the interaction code is matched, the interaction code expires, that is, the authorization code also expires, and the data interaction cannot be performed, and the process ends. Further, processes such as: and clearing the interactive code and the first user information thereof in the tables 1 and 2. Of course, if the time of receiving the authorization code is 8 o' clock of the day, it indicates that the matched interaction code and the authorization code are both valid, and step S150 may be entered to perform data interaction processing between the second user and the first user corresponding to the matched interaction code.
The method and the device can avoid the same interactive code by using the unique interactive code, and particularly can avoid the same interactive code of two first users in the position range of the second user. That is, there is no such as: the first users a and B have the interaction codes 12345678 at the same time and cannot determine which first user should be interacted with.
Alternatively, the interactive code may be random data having uniqueness within a certain range, which has a valid time and can be used only once by the first user bound by the interactive code within the valid time. The certain range may be a preset geographical area range, such as beijing area, tianjin area, etc., where the same interactive code generated by the random number may exist in different areas, and thus, when the interactive code is matched with the authorization code, there may exist a plurality of interactive codes that are the same as the authorization code, that is, a plurality of the same interactive codes, in a certain range of the location where the second user is located, such as a case where the same invalid interactive code is not cleared in time by the server, or a case where the first user in another area carries the same interactive code to enter the area, so as to avoid the server performing data interaction between the first user and the second user who are wrong and do not need to perform data interaction, the server may also send verification information to the second user when a plurality of the same interactive codes are matched, to verify the identity of the first user who needs to perform data interaction with the second user, to determine which of the first users bound the same interactive code requires data interaction with the second user. The verification information may be a first user requesting to transmit an interactive code to a second user to provide its identity information, such as a user ID of the first user. The server determines a first user needing data interaction according to the user ID of the first user.
As an example, the interaction code received by the second user from the first user is passed to the server as an authorization code to request data interaction, such as authorization code 12345678, which matches the interaction code of the first user A, B. If the authorization code is uploaded at 7 am, if A is uploaded at 9 am and B is uploaded at 6 am, because the interaction code has a validity time limit (tables 1 and 2), B is expired (7 am exceeds 6 am), and actually valid A is A, namely the expired interaction code of invalid B is not cleared in the server, the validity verification operation is performed, the invalid authorization code and the invalid interaction code can be eliminated, data interaction with the first user B corresponding to the invalid interaction code cannot be performed, and only the valid data interaction is performed. In order to ensure the correctness and safety of the data interaction object, if a plurality of interaction codes matched with the authorization code exist, the server is required to send verification information to the second user with the effective interaction code, and the first user providing the interaction code is required to provide identity information (such as a user ID) to the second user and feed back the identity information to the server. Therefore, the server can verify whether the stored interactive code is the effective first user or not, the data safety of the effective first user of the interactive code is guaranteed, and wrong data interaction is avoided.
As another example, a first user C in another geographic area enters another geographic area, and a first user D who happens to be within a certain range of the same second user holds the same interactive code as the first user C. Once the second user has communicated the obtained interaction code to the server as an authorization code, the server matches the interaction codes of the two first users C, D, and the server sends authentication information to the second user requesting that the first user who provided the interaction code to the second user provide a user ID to determine which first user actually to interact with.
The process is ended (the data interaction process is ended), that is, the data interaction between the first user and the second user corresponding to the interaction code matched with the authorization code is refused to be executed, so that the user can be informed that the data interaction is failed. Of course, once the authorization code is validated and there is a matching interaction code, the following data interaction may be performed, as in step S150.
If the authorization code is not successfully matched with the interactive code of the first user, that is, the interactive code matched with the authorization code does not exist, or if the authorization code is not valid within the valid time, that is, the authorization code is invalid and exceeds the valid time, the first user and the second user can be prompted to 'fail operation', data interaction is rejected, and the process is ended.
An example of a specific application (carrying the foregoing specific application example): the server searches corresponding interactive codes (such as the interactive codes identical to the authorization codes) in the searched information stored in the server by all mobile phone users nearby according to the authorization codes of the merchants (such as cash registers of the merchants), and then matching is carried out. Matching is successful, namely the same interactive code is matched, and in the valid period, the next operation can be carried out, such as: and deducting money from the account of the mobile phone user corresponding to the interactive code. If the matching is not successful, the process is ended, and information such as failure, transaction incapability and the like is returned to the cash register and/or the mobile phone user of the merchant.
In step S150, when the interaction code of one of the one or more first users located in a certain range of the location of the second user matches the authorization code of the second user and the authorization code of the second user is valid, performing data interaction between the first user and the second user corresponding to the interaction code matching the authorization code of the second user.
Since the interaction code matching with the authorization code is determined, and the corresponding first user is also determined, a correlation (a channel for data interaction is established) can be established between the second user sending the authorization code and the first user bound by the matching interaction code to perform data interaction.
Upon establishing the association, the second user may obtain the desired data at the first user. Further, after the first user establishes an association with the second user, the server may further receive a data request from the second user, where the data request corresponds to data that the second user wants to obtain from the first user, and the server may transfer the data of the first user corresponding to the data request from the first user to the second user according to the data request. Conversely, the server may receive a data request from the first user according to the established channel, and transfer the data of the second user to the first user according to the data request. Furthermore, when the server successfully transfers the data of the first user to the second user, a prompt of "successful data interaction" between the first user and the second user can be prompted. In addition, for security reasons, the validity period (e.g., 8 hours, etc.) is set in addition to the one-time expiration of the interactive code/authorization code, so as to ensure that the number or capacity of the interactive code/authorization code within the predetermined coverage area of the geographical location of the second user is sufficiently small. For example, the number of first users near a second user is 100, and all of the 100 users apply 8-digit interactive codes/authorized codes =1/1000000 to the power of 8 of the last 10, which has a low probability, that is, the first user and the second user are in close proximity to each other and have a low probability of being broken violently.
In the application, the first user can apply (request) to obtain the interactive code at any time and any place, and can perform data interaction with the second user only by carrying the interactive code and using the interactive code within the effective time of the interactive code. For example: the first user obtains the interactive code before going to a supermarket for shopping. After shopping, the first user transmits the interactive code to the second user, for example, the interactive code is input into a cash register, the cash register takes the interactive code as an authorization code, and uploads the authorization code and the amount of money to be deducted from the account of the first user to a server, a channel for data interaction is established between the account of the first user and the account of the second user by the server, the corresponding amount of money to be deducted from the account of the first user is deducted, and the corresponding amount of money is added to the account of the second user. In the process, the first user and the second user do not need to perform a large amount of data operation, and a large amount of data operation tasks in the data interaction (payment) process are completed by the server, so that the data interaction time is shortened, and the data interaction efficiency is improved.
The application also provides a data interaction system. As shown in fig. 2, fig. 2 is a block diagram of an embodiment of a data interaction device 200 according to the present application.
The allocating and acquiring module 210 may be configured to allocate an interactive code to a first user who sends an interactive code request in advance, and acquire location information of the first user in advance. The interactive code represents unique, random data that has a valid time and can be used only once by a first user bound by the interactive code during the valid time. In addition, the interactive code may be only random data unique within a certain range, which has valid time and can be used only once by the first user bound by the interactive code within the valid time.
The specific implementation process of the allocating and acquiring module 210 can be seen in step S110.
The receiving and acquiring module 220 may be configured to receive a data interaction request (information requesting data interaction processing) submitted by a second user, and acquire location information of the second user. The specific implementation process of the receiving and acquiring module 220 can be seen in step S120.
The determining module 230 may be configured to determine one or more first users whose locations are within a certain range of the location of the second user according to the location information of the second user and the location information of each first user. The range includes a preset geographical area range. Further, comparing the position information from the first user with the position information from the second user, and determining that the first user is the first user in a certain range of the position where the second user is located if the position indicated by the position information of the first user falls within a preset geographical area range of the position indicated by the position information of the second user.
The specific implementation process of the determining module 230 can be seen in step S130.
The matching module 240 may be configured to match the authorization code in the received data interaction request from the second user with the interaction codes pre-assigned to one or more first users within a certain range of the location of the second user and verify the validity of the authorization code. The authorization code in the data interaction request of the second user is formed according to the interaction code pre-allocated by the first user. And when the interaction codes of one or more first users in a certain range of the position of the second user do not have the interaction code matched with the authorization code of the second user, or the authorization code of the second user is verified to be invalid, ending the data interaction process. Further, the matching and verifying process may be performed first, and when there is an interactive code matching the authorization code of the second user, the validity of the authorization code is verified; if the authorization code is verified to be invalid, ending the data interaction process; and matching, and when the interactive code matched with the authorization code of the second user does not exist, not verifying the validity of the authorization code any more, and ending the data interaction process. Further, the uploading time of the authorization code is compared with the deadline of the interaction code matched with the authorization code; the authorization code is valid if the upload time of the authorization code is less than or equal to the expiration time.
The specific implementation process of the matching module 240 can be seen in step S140.
The interaction module 250 may be configured to, when an interaction code matching the authorization code of the second user exists in the interaction codes of one or more first users located in a certain range of the location where the second user is located, and the authorization code of the second user is verified to be valid, perform data interaction between the first user and the second user corresponding to the interaction code matching the authorization code of the second user. The specific implementation process of the interaction module 250 can be seen in step S150.
Since the specific embodiments of the various modules included in the apparatus of the present application described in fig. 2 correspond to the specific embodiments of the steps in the method of the present application, the specific details of the various modules will not be described here in order not to obscure the present application, since fig. 1 has been described in detail.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for data interaction, comprising:
determining a first user with a position within a certain range of the position of a second user according to the position information of the second user and the position information of the first user;
matching an authorization code in the received data interaction request from the second user with an interaction code pre-allocated to the first user within a certain range of the position of the second user, and verifying the validity of the authorization code;
when the interactive code of the first user in a certain range of the position of the second user exists, the interactive code matched with the authorization code of the second user exists, and the authorization code of the second user and the interactive code matched with the authorization code of the second user are verified to be valid, executing data interaction between the first user and the second user corresponding to the interactive code matched with the authorization code of the second user.
2. The method of claim 1, wherein the certain range comprises a preset geographic area range;
determining a first user with a position within a certain range of the position of a second user according to the position information of the second user and the position information of the first user, and further comprising:
and comparing the position information from the first user with the position information from the second user, and determining that the first user is the first user within a certain range of the position of the second user if the position indicated by the position information of the first user falls within a preset geographical area range of the position indicated by the position information of the second user.
3. The method of claim 1 or 2, further comprising:
and when the interactive code of the first user in a certain range of the position of the second user does not have the interactive code matched with the authorization code of the second user, or the authorization code of the second user is verified to be invalid, ending the data interaction process.
4. The method of claim 1, wherein matching an authorization code in the received data interaction request from the second user with an interaction code pre-assigned to a first user within a range of locations of the second user, and verifying validity of the authorization code comprises:
matching, and verifying the validity of the authorization code when an interactive code matched with the authorization code of the second user exists; if the authorization code is verified to be invalid, ending the data interaction process;
and matching is carried out firstly, and when the interaction code matched with the authorization code of the second user does not exist, the validity of the authorization code is not verified any more, and the data interaction process is ended.
5. The method according to claim 1 or 2, comprising:
the interactive code represents unique, random data having a valid time and being usable only once by a first user that can be bound by the interactive code during the valid time; alternatively, the first and second electrodes may be,
the interactive code represents random data that is unique within a range, has a valid time, and can be used only once by a first user bound by the interactive code within the valid time.
6. The method according to claim 1 or 2, comprising: the authorization code in the data interaction request of the second user is formed according to the interaction code pre-allocated by the first user.
7. The method of claim 1 or 2, wherein verifying the validity of the authorization code comprises:
and comparing the uploading time of the authorization code with the deadline of the interactive code matched with the authorization code, wherein the authorization code is valid if the uploading time of the authorization code is less than or equal to the deadline.
8. A data interaction device, comprising:
the determining module is used for determining a first user of which the position is within a certain range of the position of a second user according to the position information of the second user and the position information of the first user;
the matching module is used for matching the authorization code in the received data interaction request from the second user with a first user which is pre-allocated to the second user within a certain range of the position of the second user, and verifying the validity of the authorization code;
the interaction module is used for executing data interaction between a first user and a second user corresponding to an interaction code matched with an authorization code of the second user when the interaction code of the first user in a certain range of the position of the second user exists, and the authorization code of the second user and the interaction code matched with the authorization code of the second user are verified to be valid.
9. The apparatus of claim 8,
the certain range comprises a preset geographical area range;
the determination module is further configured to: and comparing the position information from the first user with the position information from the second user, and determining that the first user is the first user within a certain range of the position of the second user if the position indicated by the position information of the first user falls within a preset geographical area range of the position indicated by the position information of the second user.
10. The apparatus of claim 8 or 9, wherein the matching module further comprises: and when the interactive codes of one or more first users in a certain range of the position of the second user do not have the interactive codes matched with the authorization codes of the second user, or the authorization codes of the second user are verified to be invalid, ending the data interaction process.
HK15106147.2A 2015-06-29 Method for data interaction and system thereof HK1205606B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310566609.0A CN104639586B (en) 2013-11-13 2013-11-13 A kind of data interactive method and system

Publications (2)

Publication Number Publication Date
HK1205606A1 HK1205606A1 (en) 2015-12-18
HK1205606B true HK1205606B (en) 2019-08-09

Family

ID=

Similar Documents

Publication Publication Date Title
CN104639586B (en) A kind of data interactive method and system
RU2704750C2 (en) Mobile device identification systems and methods
CN110086768B (en) Service processing method and device
US11429975B1 (en) Token management system
US10397215B2 (en) Secure element installation and provisioning
CN105592011B (en) Account login method and device
US20170351852A1 (en) Identity authentication method, server, and storage medium
JP2019512976A (en) Identity registration method and device
CN112134708A (en) Authorization method, authorization request method and device
CN102713953A (en) Device, system and method for location-based payment authorization
JP4753398B2 (en) File encryption system with position information, decryption system, and method thereof
CN104702415A (en) Account number permission control method and device
CN105373723A (en) Automatic authorization method and device of equipment
CN112422475B (en) Service authentication method, device, system and storage medium
HK1205606B (en) Method for data interaction and system thereof
JP6702987B2 (en) Generate short key for communication
JP2016039427A (en) Determination device, terminal device, determination program, terminal program, and communication system
CN117557363A (en) Financing request processing method and device based on blockchain and storage medium
HK40031426A (en) Service processing method and device, electronic equipment and storage medium
HK1213378A1 (en) Authorization method, permission setting method and devices thereof
HK1235522A (en) Risk identification method and apparatus
HK1235522A1 (en) Risk identification method and apparatus
HK1226563A (en) Method and device for identifying user identity
HK1226563A1 (en) Method and device for identifying user identity