Data interaction method, verification terminal, server, and system

ABSTRACT

A data interaction method, a verification terminal, a server, and a system are described. The method includes: receiving, by a verification terminal, identity verification information from a user terminal, the identity verification information being information sent to the user terminal by a server in advance; sending, by the verification terminal, a request instruction to the server, the request instruction including the identity verification information; executing, by the server, an operation corresponding to the request instruction; and sending, by the server, feedback information to the verification terminal.

CROSS REFERENCE TO RELATED APPLICATIONS

This is a continuation application of International Patent ApplicationNo. PCT/CN2015/072693, filed on Feb. 10, 2015, which claims priority toChinese Patent Application No.: 201410049288.1, filed on Feb. 12, 2014,the disclosures of which are incorporated by reference herein in theirentirety.

FIELD OF THE TECHNOLOGY

The present disclosure relates to the field of computer technologies,and in particular, to a data interaction method, a verificationterminal, a server, and a system.

BACKGROUND OF THE DISCLOSURE

In the existing technology, a payment manner based on the mobileInternet is mainly implemented by means of data interaction processingbetween a mobile terminal and a payment server, and currently there aremainly the following two processing manners:

In the first manner, a payment server cooperates with a merchantterminal. The merchant terminal installs, on a vending machine or acomputer, an identification code generating program identifiable to thepayment server; during consumption of a common user, the vending machineor the merchant terminal generates an identification code (such asserial numbers, a bar code, or a two-dimensional code picture) for thisconsumption behavior; the user uses a mobile terminal to identify theidentification code, and then inputs a payment password; and after thepayment server successfully verifies the password, the merchant terminalor the vending machine delivers goods, thereby finally completing thisconsumption and purchase process. By using a vending machine, a mobileterminal having a payment function, and a payment server as examples, aspecific process is as follows:

1. The vending machine receives a selection instruction input by a user,where the selection instruction is used to determine an item that theuser needs to purchase;

2. The vending machine displays, on a display screen, a two-dimensionalcode of the purchased item;

3. The user scans the two-dimensional code by using a scan function ofthe mobile terminal, and then a payment password input box pops up onthe mobile terminal;

4. The payment server receives a payment password input by the user, andafter the verification succeeds, instructs the vending machine to sellthe selected and purchased item;

5. The vending machine confirms completion of this consumption processafter the user takes away the purchased item.

In this data interaction processing manner, during identification of theidentification code by the mobile terminal, the mobile terminal needs toreceive serial numbers or scan a bar code (or a two-dimensional codepicture), which consumes a relatively long time. Moreover, a paymentpassword needs to be input for each consumption, so that it takes alonger time to complete the payment process; therefore, this manner iscompletely incompetent in some scenarios requiring quick payment (forexample, ticket purchasing in a subway station).

In the second manner, for a payment solution of an Online 2 Offline(O2O) website such as a group buying website, the group buying websitesigns a cooperation agreement with a merchant terminal; when a userperforms selection on the group buying website and pays for a purchaseditem, the group buying website generates an SMS verification code or atwo-dimensional code picture for this consumption; when the userperforms consumption settlement at the merchant terminal, the user showsthe SMS verification code or the two-dimensional code; and after themerchant terminal successfully verifies the code, this consumptionprocess is completed.

By using the foregoing data interaction manner, when the user selectsand purchases an item online, the user needs to complete online paymentbefore the user experiences the item. Although a payment time is short,an offline transaction is completed only after the user receives thepurchased item or goes to a store providing the purchased item toperform consumption, which makes the entire process consume a longertime.

No effective solution is proposed for the problem that the datainteraction manners in the existing technology consume a relatively longtime.

SUMMARY

An embodiment of the present disclosure is to provide a data interactionmethod, a verification terminal, a server, and a system, so as to solvethe problem that the data interaction manners in the existing technologyconsume a relatively long time.

According to one aspect of an embodiment of the present invention, adata interaction method is provided, including: receiving, by averification terminal, identity verification information from a userterminal, the identity verification information being information sentto the user terminal by a server in advance; sending, by theverification terminal, a request instruction to the server, the requestinstruction including the identity verification information; executing,by the server, an operation corresponding to the request instruction;and sending, by the server, feedback information to the verificationterminal.

According to another aspect of an embodiment of the present invention, adata interaction method is provided, including: receiving, by averification terminal, identity verification information from a userterminal, the identity verification information being information sentto the user terminal by a server in advance; sending, by theverification terminal, a request instruction to the server, the requestinstruction including the identity verification information; andreceiving, by the verification terminal, feedback information from theserver, the feedback information being information sent by the server tothe verification terminal after executing an operation corresponding tothe request instruction.

According to another aspect of an embodiment of the present invention, adata interaction method is provided, including: receiving, by a server,a request instruction from a verification terminal, the requestinstruction including identity verification information received from auser terminal by the verification terminal, the identity verificationinformation being information sent to the user terminal by the server inadvance; executing, by the server, an operation corresponding to therequest instruction; and sending, by the server, feedback information tothe verification terminal.

According to another aspect of an embodiment of the present invention, averification terminal is provided, including: a first receiving unit,configured to receive identity verification information from a userterminal, the identity verification information being information sentto the user terminal by a server in advance; a sending unit, configuredto send a request instruction to the server, the request instructionincluding the identity verification information; and a second receivingunit, configured to receive feedback information from the server, thefeedback information being information sent by the server to theverification terminal after executing an operation corresponding to therequest instruction.

According to another aspect of an embodiment of the present invention, aserver is provided, including: a first receiving unit, configured toreceive a request instruction from a verification terminal, the requestinstruction including identity verification information received from auser terminal by the verification terminal, and the identityverification information being information sent to the user terminal bythe server in advance; an executing unit, configured to execute anoperation corresponding to the request instruction; and a first sendingunit, configured to send feedback information to the verificationterminal.

According to another aspect of an embodiment of the present invention, adata interaction system is provided, including a verification terminaland a server, the verification terminal being configured to receiveidentity verification information from a user terminal, send a requestinstruction to the server, and receive feedback information from theserver, the identity verification information being information sent tothe user terminal by the server in advance, and the request instructionincluding the identity verification information; and the server beingconfigured to receive the request instruction, execute an operationcorresponding to the request instruction, and send the feedbackinformation to the verification terminal.

Compared with the manner in the existing technology that the userterminal receives a verification code from the verification terminal,the present disclosure does not require the user terminal to manuallyinput or scan the verification code, which shortens the transactiontime; in addition, after receiving the request instruction including theidentity verification information, the server can execute thecorresponding operation without the need of receiving and verifying atransaction password input by the user terminal, which further shortensthe transaction time compared with the manner in the existing technologythat a user needs to input the transaction password for eachtransaction. Further, the data interaction manner provided by thisembodiment of the present invention is initiated when the user performsreal-time consumption, and compared with the manner in the existingtechnology that the user needs to first perform an on-line payment andthen conduct an off-line transaction, the manner provided by the presentdisclosure implements synchronization of an on-line payment and anoff-line transaction, and further shortens the transaction time.Therefore, the embodiments of the present invention solve the problemthat the data interaction manners in the existing technology consume arelatively long time, thereby achieving effects of shortening the timeand improving efficiency.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings constituting a part of this application areused to provide a further understanding of the present disclosure, andthe exemplary embodiments of the present invention and descriptionsthereof are used to explain the present disclosure, but are notconstrued as an inappropriate limitation to the present disclosure. Inthe accompanying drawings:

FIG. 1 is a schematic diagram of a data interaction system according toan embodiment of the present invention;

FIG. 2 is an interaction principle diagram of a data interaction systemaccording to an embodiment of the present invention;

FIG. 3 is a flowchart of a data interaction method according to someembodiments of the present invention;

FIG. 4 is a flowchart of a data interaction method according to a someembodiments of the present invention;

FIG. 5 is a flowchart of a data interaction method according to a someembodiments of the present invention;

FIG. 6 is a schematic diagram of a verification terminal according to anembodiment of the present invention; and

FIG. 7 is a schematic diagram of a server according to an embodiment ofthe present invention.

DESCRIPTION OF EMBODIMENTS

To make a person skilled in the art better understand the solutions ofthe present disclosure, the following clearly and completely describesthe technical solutions in the embodiments of the present invention withreference to the accompanying drawings in the embodiments of the presentinvention. Apparently, the described embodiments are merely a partrather than all of the embodiments of the present invention. All otherembodiments obtained by a person of ordinary skill in the art based onthe embodiments of the present invention without creative efforts shallfall within the protection scope of the present disclosure.

It should be noted that, terms such as “first” and “second” in thespecification, claims and the foregoing accompanying drawings of thepresent disclosure are used to distinguish similar objects, but are notnecessarily used to describe a specific sequence or order. It should beunderstood that, the terms used in this manner can be interchanged ifappropriate, so that the embodiments of the present invention describedherein can be implemented in other sequences than those shown ordescribed herein. In addition, the terms “include” and “have” and anyother variations thereof are intended to cover nonexclusive inclusions,for example, a process, a method, a system, a product or a device thatincludes a series of steps or units is not necessarily limited toincluding those explicitly listed steps or units, but may include othersteps or units that are not explicitly listed, or inherent to theprocess, method, product, or device.

According to this embodiment of the present invention, a systemembodiment that can be used to implement an apparatus embodiment of thepresent invention is provided, and the system embodiment can also beused to execute a method embodiment of the present invention. The systemembodiment provided by this embodiment of the present invention isspecifically described as follows:

FIG. 1 is a schematic diagram of a data interaction system according toan embodiment of the present invention. As shown in FIG. 1, the datainteraction system mainly includes a verification terminal 10 and aserver 20.

The verification terminal 10 is configured to receive identityverification information from a user terminal 30, send a requestinstruction to the server 20, and receive feedback information from theserver 20, where the identity verification information is informationsent to the user terminal 30 by the server 20 in advance, and therequest instruction includes the identity verification information. Theserver 20 is configured to receive the request instruction, execute anoperation corresponding to the request instruction, and send thefeedback information to the verification terminal 10.

In the data interaction system of this embodiment of the presentinvention, a verification terminal receives identity verificationinformation from a user terminal, and sends a request instructionincluding the received identity verification information to a server;and then the server executes a corresponding operation, and sendsfeedback information to the verification terminal, so that in atransaction process, the user terminal only needs to show, to theverification terminal, the identity verification information thatrepresents a user terminal identity and is received in advance. Comparedwith the consumption manner in the existing technology that the userterminal receives a verification code from the verification terminal,the present disclosure does not require the user terminal to manuallyinput or scan the verification code, which shortens the transactiontime; in addition, after receiving the request instruction including theidentity verification information, the server can execute thecorresponding operation without the need of receiving and verifying atransaction password input by the user terminal, which further shortensthe transaction time compared with the manner in the existing technologythat a user needs to input the transaction password for eachtransaction. Further, the data interaction manner provided by thisembodiment of the present invention is initiated when the user performsreal-time consumption, and compared with the manner in the existingtechnology that the user needs to first perform an on-line payment andthen conduct an off-line transaction, the manner provided by the presentdisclosure implements synchronization of an on-line payment and anoff-line transaction, and further shortens the transaction time.Therefore, this embodiment of the present invention solves the problemthat the data interaction manners in the existing technology consume arelatively long time, thereby achieving effects of shortening the timeand improving efficiency.

Specifically, by using an example in which the user terminal 30 performsa consumption transaction by using an e-commerce platform, the principleof the foregoing embodiment is further specifically described in detailas follows:

Before a consumption, the user terminal 30 interacts with the server 20to set corresponding setting information on an e-commerce platform runby the server 20. Optionally, the setting information in this embodimentmay include, but is not limited to, a preset value (such as 100 yuan)used to represent a maximum payment amount, and a period of validity ofthe maximum payment amount, where the period of validity may beindicated by a setting duration and a preset duration (such as 12hours). After the setting information is received and the verificationof a payment password input by the user terminal 30 succeeds, the server20 generates, on an interface of the e-commerce platform, identityverification information corresponding to the setting information byusing the setting information from the user terminal 30. In thisembodiment, the identity verification information may be displayed inthe form of a two-dimensional code, a bar code, a string, or the like,and the user terminal 30 may be a portable device such as a smart phoneor a tablet computer. The verification terminal 10 may be a device suchas a two-dimensional code scanner, a bar code scanner, or a stringreceiver, the verification terminal 10 may communicate with the server20 in a wired and or wireless manner, the user terminal 30 maycommunicate with the server 20 by using a mobile network or theInternet, and the user terminal 30 may communicate with the verificationterminal 10 by using a manner such as a near field communication manneror a scan manner.

A consumption transaction scenario is described below with reference tothe foregoing setting information and identity verification information,but it should be noted that, the following scenario is merely anexample, which is not limited in this embodiment.

In a first scenario, a consumption transaction is performed on a vendingmachine on which the verification terminal 10 is installed. During anactual consumption transaction, after selecting an item, a consumerdisplays identity verification information saved in the user terminal 30to a verification information scan area of the verification terminal 10,so that the verification terminal 10 reads the identity verificationinformation; after reading the identity verification information, theverification terminal 10 sends a request instruction including theidentity verification information and an actual consumption amount tothe server 20 to verify a consumption deduction; the server 20 verifiesvalidity of information such as the identity verification information;and if the verification succeeds, the server 20 executes an operationcorresponding to the request instruction, and sends feedback informationto the verification terminal 10 after the operation is completed. Theoperation that is corresponding to the request instruction and executedby the server 20 may be deducting a corresponding consumption amountfrom an account corresponding to the identity verification information,and adding the same consumption amount to an account corresponding tothe verification terminal 10, or may be directly transferring acorresponding consumption amount to an account corresponding to theverification terminal 10 from an account corresponding to the identityverification information.

In a second scenario, a consumption transaction is performed on a subwayturnstile on which the verification terminal 10 is installed. During anactual consumption transaction, a consumer displays identityverification information saved in the user terminal 30 to a verificationinformation scan area of the verification terminal 10; and after readingthe identity verification information, the verification terminal 10performs verification communication with the server 20; and after theverification succeeds, the subway turnstile is opened. A verificationcommunication manner between the verification terminal 10 and the server20 is the same as the manner in the first scenario, which is notdescribed herein again.

In a third scenario, a consumer does the shopping in a shopping mall.During an actual consumption transaction, after selecting an item in astore in which the verification terminal 1020 is installed, the consumerdisplays identity verification information displayed on the userterminal 30 to a verification information scan area of the verificationterminal 10; after reading the identity verification information, theverification terminal 10 performs verification communication with theserver 20; and after the verification succeeds, the consumptionsettlement is completed. A verification communication manner between theverification terminal 10 and the server 20 is also the same as themanner in the first scenario, which is not described herein again.

FIG. 2 is an interaction principle diagram of a data interaction systemaccording to an embodiment of the present invention. As shown in FIG. 2,after receiving a request instruction, and before executing an operationcorresponding to the request instruction, the server 20 may furtherfirst determine whether to send a confirmation request to the userterminal 30, which specifically is as follows:

The server 20 determines whether to communicate with the user terminal30; in a case in which the server 20 determines to communicate with theuser terminal 30, sends a confirmation request to the user terminal 30,and receives a confirmation instruction from the user terminal 30 inresponse to the confirmation request, and in a case in which the server20 receives the confirmation instruction, the server 20 executes anoperation corresponding to the request instruction; or in a case inwhich the server 20 determines not to communicate with the user terminal30, the server 20 directly executes an operation corresponding to therequest instruction. The operation that is corresponding to the requestinstruction and executed by the server 20 may be deducting acorresponding consumption amount from an account corresponding to theidentity verification information, and adding the same consumptionamount to an account corresponding to the verification terminal 10, ormay be directly transferring a corresponding consumption amount to anaccount corresponding to the verification terminal 10 from an accountcorresponding to the identity verification information.

In a case in which the server 20 receives the request instruction, theserver 20 first determines whether to communicate with the user terminal30; if the server 20 needs to communicate with the user terminal 30, theserver 20 sends a confirmation request to the user terminal 30; andafter receiving a confirmation instruction from the user terminal 30 inresponse to the confirmation request, the server 20 executes anoperation corresponding to the request instruction, to ensure thesecurity of the transaction process, thereby avoiding the verificationterminal 10 from bringing an economic loss to a consumer due tomisoperations or other reasons. If the server 20 does not need tocommunicate with the user terminal 30, it indicates that the server 20already obtains a confirmation from the user terminal 30 duringgeneration of the identity verification information, where theconfirmation indicates that the user terminal 30 does not need to give aconfirmation any longer during an actual consumption transaction.

According to this embodiment of the present invention, a methodembodiment that may be used to implement an apparatus embodiment of thisapplication is provided. It should be noted that, steps shown inflowcharts of the accompanying drawings may be performed in a computersystem including a group of computer executable instructions. Moreover,although a logical sequence is shown in the flowcharts, in some cases,the shown or described steps may be performed in a sequence differentfrom the sequence herein.

According to this embodiment of the present invention, a datainteraction method is provided, which is mainly executed by using theforegoing data interaction system that constitutes the embodiments ofthe present invention. FIG. 3 is a flowchart of a data interactionmethod according to some embodiments of the present invention. As shownin FIG. 3, the method includes step S302 to step S308 as follows:

S302: A verification terminal 10 receives identity verificationinformation from a user terminal 30, where the identity verificationinformation is information sent to the user terminal 30 by a server 20in advance.

In this embodiment, the identity verification information may bedisplayed in the form of a two-dimensional code, a bar code, a string,or the like, and the user terminal 30 may be a portable device such as asmart phone or a tablet computer. The verification terminal 10 may be anelectronic device such as a two-dimensional code scanner, a bar codescanner, or a string receiver, the user terminal 30 may communicate withthe server 20 by using a mobile network or the Internet, and the userterminal 30 may communicate with the verification terminal 10 by using amanner such as a near field communication manner or a scan manner.

S304: The verification terminal 10 sends a request instruction to theserver 20, where the request instruction includes identity verificationinformation, and the verification terminal 10 may communicate with theserver 20 in a wired and/or a wireless manner.

S306: The server 20 executes an operation corresponding to the requestinstruction.

S308: The server 20 sends feedback information to the verificationterminal 10.

In the data interaction method of this embodiment of the presentinvention, a verification terminal receives identity verificationinformation from a user terminal, and sends a request instructionincluding the received identity verification information to a server;and then the server executes a corresponding operation, and sendsfeedback information to the verification terminal, so that in atransaction process, the user terminal only needs to show, to theverification terminal, the identity verification information thatrepresents a user terminal identity and is received in advance. Comparedwith the consumption manner in the existing technology that the userterminal receives a verification code from the verification terminal,the present disclosure does not require the user terminal to manuallyinput or scan the verification code, which shortens the transactiontime; in addition, after receiving the request instruction including theidentity verification information, the server can execute thecorresponding operation without the need of receiving and verifying atransaction password input by the user terminal, which further shortensthe transaction time compared with the manner in the existing technologythat a user needs to input the transaction password for eachtransaction. Further, the data interaction manner provided by thisembodiment of the present invention is initiated when the user performsreal-time consumption, and compared with the manner in the existingtechnology that the user needs to first perform an on-line payment andthen conduct an off-line transaction, the manner provided by the presentdisclosure implements synchronization of an on-line payment and anoff-line transaction, and further shortens the transaction time.Therefore, this embodiment of the present invention solves the problemthat the data interaction processing manners in the existing technologyconsume a relatively long time, thereby achieving effects of shorteningthe time and improving efficiency.

Further, after step S304 that the verification terminal 10 sends arequest instruction to the server 20, the data interaction method ofthis embodiment of the present invention further includes: determining,by the server 20, whether to communicate with the user terminal 30; in acase in which the server 20 determines to communicate with the userterminal 30, sending a confirmation request to the user terminal 30, andreceiving a confirmation instruction from the user terminal 30 inresponse to the confirmation request, and in a case in which the server20 receives the confirmation instruction, executing an operationcorresponding to the request instruction; or in a case in which theserver 20 determines not to communicate with the user terminal 30,directly executing an operation corresponding to the requestinstruction. The operation that is corresponding to the requestinstruction and executed by the server 20 may be deducting acorresponding consumption amount from an account corresponding to theidentity verification information, and adding the same consumptionamount to an account corresponding to the verification terminal 10, ormay be directly transferring a corresponding consumption amount to anaccount corresponding to the verification terminal 10 from an accountcorresponding to the identity verification information.

In a case in which the server 20 receives the request instruction, theserver 20 first determines whether to communicate with the user terminal30; if the server 20 needs to communicate with the user terminal 30, theserver 20 sends a confirmation request to the user terminal 30; andafter receiving a confirmation instruction from the user terminal 30 inresponse to the confirmation request, the server 20 executes anoperation corresponding to the request instruction, to ensure thesecurity of the transaction process, thereby avoiding the verificationterminal 10 from bringing an economic loss to a consumer due tomisoperations or other reasons. If the server 20 does not need tocommunicate with the user terminal 30, it indicates that the server 20already obtains a confirmation from the user terminal 30 duringgeneration of the identity verification information, where theconfirmation indicates that the user terminal 30 does not need to give aconfirmation any longer during an actual consumption transaction.

It should be noted that, in this embodiment of the present invention,the identity verification information received by the verificationterminal 10 may be information generated by the server 20 according to asetting instruction from the user terminal 30. Specifically, before aconsumption transaction, a consumer logs in, by using a registeredaccount number and a password, to an e-commerce platform run by theserver 20 on the user terminal 30, after the login succeeds, the userterminal 30 sends the setting instruction to the server 20; and theserver 20 generates identity verification information according to thereceived setting instruction, and returns the generated identityverification information to the user terminal 30.

The setting instruction includes a password and setting information, andbefore generating the identity verification information according to thesetting instruction, the server 20 first determines whether the receivedpassword is the same as a preset password. The preset password is atransaction password of an account logged in to the e-commerce platformon the user terminal 30; and the setting information may include, but isnot limited to, a preset value (such as 100 yuan) used to represent amaximum payment amount, a valid consumption period of the maximumpayment amount, where the period of validity may be indicated by asetting duration and a preset duration (such as 12 hours), informationindicating whether the server 20 needs to feed back a consumptionconfirmation request in a consumption process, and the like. In a casein which the server 20 determines that the received password is the sameas the preset password, the server 20 generates the identityverification information by using the setting information.

FIG. 4 is a flowchart of a data interaction method according to someembodiments of the present invention. As shown in FIG. 4, the methodincludes step S402 to step S406 as follows:

S402: A verification terminal 10 receives identity verificationinformation from a user terminal 30, where the identity verificationinformation is information sent to the user terminal 30 by a server 20in advance.

In this embodiment, the identity verification information may bedisplayed in the form of a two-dimensional code, a bar code, a string,or the like, and the user terminal 30 may be a portable device such as asmart phone or a tablet computer. The verification terminal 10 may be adevice such as a two-dimensional code scanner, a bar code scanner, or astring receiver, the user terminal 30 may communicate with the server 20by using a mobile network or the Internet, and the user terminal 30 maycommunicate with the verification terminal 10 by using a manner such asa near field communication manner or a scan manner.

S404: The verification terminal 10 sends a request instruction to theserver 20, where the request instruction includes identity verificationinformation, and the verification terminal 10 may communicate with theserver 20 in a wired and/or a wireless manner.

S406: The verification terminal 10 receives feedback information fromthe server 20, where the feedback information is information sent by theserver 20 to the verification terminal 10 after executing an operationcorresponding to the request instruction.

In the data interaction method of this embodiment of the presentinvention, a verification terminal receives identity verificationinformation from a user terminal, and sends a request instructionincluding the received identity verification information to a server;and then the server executes a corresponding operation, and sendsfeedback information to the verification terminal, so that in atransaction process, the user terminal only needs to show, to theverification terminal, the identity verification information thatrepresents a user terminal identity and is received in advance. Comparedwith the consumption manner in the existing technology that the userterminal receives a verification code from the verification terminal,the present disclosure does not require the user terminal to manuallyinput or scan the verification code, which shortens the transactiontime; in addition, after receiving the request instruction including theidentity verification information, the server can execute thecorresponding operation without the need of receiving and verifying atransaction password input by the user terminal, which further shortensthe transaction time compared with the manner in the existing technologythat a user needs to input the transaction password for eachtransaction. Further, the data interaction manner provided by thisembodiment of the present invention is initiated when the user performsreal-time consumption, and compared with the manner in the existingtechnology that the user needs to first perform an on-line payment andthen conduct an off-line transaction, the manner provided by the presentdisclosure implements synchronization of an on-line payment and anoff-line transaction, and further shortens the transaction time.Therefore, this embodiment of the present invention solves the problemthat the data interaction processing manners in the existing technologyconsume a relatively long time, thereby achieving effects of shorteningthe time and improving efficiency.

Further, after step S404 that the verification terminal 10 sends arequest instruction to the server 20, the data interaction methodprovided by the some embodiments of the present invention furtherincludes: determining, by the server 20, whether to communicate with theuser terminal 30; in a case in which the server 20 determines tocommunicate with the user terminal 30, sending a confirmation request tothe user terminal 30, and receiving a confirmation instruction from theuser terminal 30 in response to the confirmation request, and in a casein which the server 20 receives the confirmation instruction, executingan operation corresponding to the request instruction; or in a case inwhich the server 20 determines not to communicate with the user terminal30, directly executing an operation corresponding to the requestinstruction. The operation that is corresponding to the requestinstruction and executed by the server 20 may be deducting acorresponding consumption amount from an account corresponding to theidentity verification information, and adding the same consumptionamount to an account corresponding to the verification terminal 10, ormay be directly transferring a corresponding consumption amount to anaccount corresponding to the verification terminal 10 from an accountcorresponding to the identity verification information.

In a case in which the server 20 receives the request instruction, theserver 20 first determines whether to communicate with the user terminal30; if the server 20 needs to communicate with the user terminal 30, theserver 20 sends a confirmation request to the user terminal 30; andafter receiving a confirmation instruction from the user terminal 30 inresponse to the confirmation request, the server 20 executes anoperation corresponding to the request instruction, to ensure thesecurity of the transaction process, thereby avoiding the verificationterminal 10 from bringing an economic loss to a consumer due tomisoperations or other reasons. If the server 20 does not need tocommunicate with the user terminal 30, it indicates that the server 20already obtains a confirmation from the user terminal 30 duringgeneration of the identity verification information, where theconfirmation indicates that the user terminal 30 does not need to give aconfirmation any longer during an actual consumption transaction.

It should be noted that, in this embodiment of the present invention,the identity verification information received by the verificationterminal 10 may be information generated by the server 20 according to asetting instruction from the user terminal 30. Specifically, before aconsumption transaction, a consumer logs in, by using a registeredaccount number and a password, to an e-commerce platform run by theserver 20 on the user terminal 30, after the login succeeds, the userterminal 30 sends the setting instruction to the server 20, and theserver 20 generates identity verification information according to thereceived setting instruction, and returns the generated identityverification information to the user terminal 30.

The setting instruction includes a password and setting information, andbefore generating the identity verification information according to thesetting instruction, the server 20 first determines whether the receivedpassword is the same as a preset password. The preset password is atransaction password of an account logged in to the e-commerce platformon the user terminal 30; and the setting information may include, but isnot limited to, a preset value (such as 100 yuan) used to represent amaximum payment amount, a valid consumption period of the maximumpayment amount, where the period of validity may be indicated by asetting duration and a preset duration (such as 12 hours), informationindicating whether the server 20 needs to feed back a consumptionconfirmation request in a consumption process, and the like. In a casein which the server 20 determines that the received password is the sameas the preset password, the server 20 generates the identityverification information by using the setting information.

FIG. 5 is a flowchart of a data interaction method according to someembodiments of the present invention. The data interaction method ismainly executed by the server 20 of the foregoing data interactionsystem that constitutes the embodiments of the present invention. Asshown in FIG. 5, the method includes step S502 to step S506 as follows:

S502: A server 20 receives a request instruction from a verificationterminal 10, where the request instruction includes identityverification information received from a user terminal 30 by theverification terminal 10, and the identity verification information isinformation sent to the user terminal 30 by the server 20 in advance.

In this embodiment, the identity verification information may bedisplayed in the form of a two-dimensional code, a bar code, a string,or the like, and the user terminal 30 may be a portable device such as asmart phone or a tablet computer. The verification terminal 10 may be adevice such as a two-dimensional code scanner, a bar code scanner, or astring receiver, the user terminal 30 may communicate with the server 20by using a mobile network or the Internet, the user terminal 30 maycommunicate with the verification terminal 10 by using a manner such asa near field communication manner or a scan manner, and the verificationterminal 10 may communicate with the server 20 in a wired and/or awireless manner.

S504: The server 20 executes an operation corresponding to the requestinstruction.

S506: The server 20 sends feedback information to the verificationterminal 10.

In the data interaction method of this embodiment of the presentinvention, a verification terminal receives identity verificationinformation from a user terminal, and sends a request instructionincluding the received identity verification information to a server;and then the server executes a corresponding operation, and sendsfeedback information to the verification terminal, so that in atransaction process, the user terminal only needs to show, to theverification terminal, the identity verification information thatrepresents a user terminal identity and is received in advance. Comparedwith the consumption manner in the existing technology that the userterminal receives a verification code from the verification terminal,the present disclosure does not require the user terminal to manuallyinput or scan the verification code, which shortens the transactiontime; in addition, after receiving the request instruction including theidentity verification information, the server can execute thecorresponding operation without the need of receiving and verifying atransaction password input by the user terminal, which further shortensthe transaction time compared with the manner in the existing technologythat a user needs to input the transaction password for eachtransaction. Further, the data interaction manner provided by thisembodiment of the present invention is initiated when the user performsreal-time consumption, and compared with the manner in the existingtechnology that the user needs to first perform an on-line payment andthen conduct an off-line transaction, the manner provided by the presentdisclosure implements synchronization of an on-line payment and anoff-line transaction, and further shortens the transaction time.Therefore, this embodiment of the present invention solves the problemthat the data interaction processing manners in the existing technologyconsume a relatively long time, thereby achieving effects of shorteningthe time and improving efficiency.

Further, after the server 20 receives the request instruction from theverification terminal 10, the data interaction method provided by thesome embodiments further includes: determining, by the server 20,whether to communicate with the user terminal 30; in a case in which theserver 20 determines to communicate with the user terminal 30, sending aconfirmation request to the user terminal 30; and receiving, by theserver 20, a confirmation instruction from the user terminal 30 inresponse to the confirmation request. In a case in which the server 20determines not to communicate with the user terminal 30, or in a case inwhich the server 20 receives the confirmation instruction, the server 20executes an operation corresponding to the request instruction. Theoperation that is corresponding to the request instruction and executedby the server 20 may be deducting a corresponding consumption amountfrom an account corresponding to the identity verification information,and adding the same consumption amount to an account corresponding tothe verification terminal 10, or may be directly transferring acorresponding consumption amount to an account corresponding to theverification terminal 10 from an account corresponding to the identityverification information.

In a case in which the server 20 receives the request instruction, theserver 20 first determines whether to communicate with the user terminal30; if the server 20 needs to communicate with the user terminal 30, theserver 20 sends a confirmation request to the user terminal 30; andafter receiving a confirmation instruction from the user terminal 30 inresponse to the confirmation request, the server 20 executes anoperation corresponding to the request instruction, to ensure thesecurity of the transaction process, thereby avoiding the verificationterminal 10 from bringing an economic loss to a consumer due tomisoperations or other reasons. If the server 20 does not need tocommunicate with the user terminal 30, it indicates that the server 20already obtains a confirmation from the user terminal 30 duringgeneration of the identity verification information, where theconfirmation indicates that the user terminal 30 does not need to give aconfirmation any longer during an actual consumption transaction.

Specifically, in this embodiment of the present invention, the server 20may determine whether to communicate with the user terminal 30 by usingthe following manners:

S1: The server 20 acquires an identification value in the identityverification information, where the identification value may be a stateflag bit in the identity verification information, for example, theidentification value may be 1 or 0.

S2: The server 20 determines whether the acquired identification valueis a first preset identification value or a second preset identificationvalue, and as an exemplary example, the first preset identificationvalue may be 1, and the second preset identification value may be 0.

S3: Determine, in a case in which the server 20 determines that theacquired identification value is the first preset identification value,to communicate with the user terminal 30, and determine, in a case inwhich the server 20 determines that the acquired identification value isthe second preset identification value, not to communicate with the userterminal 30. If the acquired identification value is 1, that is, it isdetermined that the acquired identification value is the first presetidentification value, the server 20 determines to communicate with theuser terminal 30; and if the acquired identification value is 0, thatis, it is determined that the acquired identification value is thesecond preset identification value, the server 20 determines not tocommunicate with the user terminal 30.

Further, after receiving the request instruction from the verificationterminal 10, the server 20 may first authenticate the identityverification information in the request instruction, where theauthentication mainly is authenticating whether an account correspondingto the identity verification information is one account of registeredaccounts stored in the server 20, that is, authenticating validity ofthe identity verification information, to achieve an effect of improvingsecurity of the transaction process. In a case in which authenticationof the identity verification information succeeds, the server 20determines whether to communicate with the user terminal 30.

It should be noted that, in this embodiment of the present invention,the identity verification information sent to the user terminal 30 bythe server 20 in advance may be information generated by the server 20according to a setting instruction from the user terminal 30.Specifically, before a consumption transaction, a consumer logs in, byusing a registered account number and a password, to an e-commerceplatform run by the server 20 on the user terminal 30, after the loginsucceeds, the user terminal 30 sends the setting instruction to theserver 20, and the server 20 generates identity verification informationaccording to the received setting instruction, and returns the generatedidentity verification information to the user terminal 30.

The setting instruction includes a password and setting information, andbefore generating the identity verification information according to thesetting instruction, the server 20 first determines whether the receivedpassword is the same as a preset password. The preset password is atransaction password of an account logged in to the e-commerce platformon the user terminal 30; and the setting information may include, but isnot limited to, a preset value (such as 100 yuan) used to represent amaximum payment amount, a valid consumption period of the maximumpayment amount, where the period of validity may be indicated by asetting duration and a preset duration (such as 12 hours), informationindicating whether the server 20 needs to feed back a consumptionconfirmation request in a consumption process, and the like. In a casein which the server 20 determines that the received password is the sameas the preset password, the server 20 generates the identityverification information by using the setting information.

Further, the request instruction sent to the server 20 by theverification terminal 10 further includes a target value, where thetarget value is an actual consumption transaction amount, while thesetting information includes a preset value of a certain amount set bythe consumer by using the user terminal 30. Correspondingly, thegenerated identity verification information also includes the presetvalue. After the server 20 receives the request instruction from theverification terminal 10, and before the server 20 executes an operationcorresponding to the request instruction, the data interaction method ofthis embodiment of the present invention further includes: determining,by the server 20, whether the target value is greater than the presetvalue. In a case in which the server 20 determines that the target valueis less than or equal to the preset value, the server 20 executes anoperation corresponding to the request instruction, that is, in a casein which the server 20 determines that the actual consumptiontransaction amount does not exceed a preset amount, the server 20deducts a corresponding consumption amount from an account correspondingto the identity verification information, and adds the same consumptionamount to an account corresponding to the verification terminal 10, ordirectly transfers a corresponding consumption amount to an accountcorresponding to the verification terminal 10 from an accountcorresponding to the identity verification information.

Further, the setting information further includes a valid consumptionperiod of the preset value, and the valid consumption period may be apreset duration. Correspondingly, the generated identity verificationinformation also includes the preset duration. After the server 20receives the request instruction from the verification terminal 10, andbefore the server 20 executes an operation corresponding to the requestinstruction, the data interaction method of this embodiment of thepresent invention further includes: determining, by the server 20,whether time at which the request instruction is received is within apreset duration. In a case in which the server 20 determines that thetime at which the request instruction is received is within the presetduration, the server 20 executes an operation corresponding to therequest instruction, that is, in a case in which the server 20determines that the time at which the request instruction is receiveddoes not exceed a valid consumption period set by a consumer, the server20 deducts a corresponding consumption amount from an accountcorresponding to the identity verification information, and adds thesame consumption amount to an account corresponding to the verificationterminal 10, or directly transfers a corresponding consumption amount toan account corresponding to the verification terminal 10 from an accountcorresponding to the identity verification information.

The determining whether the a target value is greater than preset dataand the determining whether the receiving time is within a presetduration both aim to ensure security of the transaction process, so thatthe transaction security is ensured on the basis of shortening the timeand improving efficiency.

It should be noted that, for the methods according to the embodiments,for purposes of simplicity of explanation, the methods are described asa combination of a series of actions, but it should be clear to personsskilled in the art that the present disclosure is not limited by theorder of the actions, as some steps can, in accordance with the presentdisclosure, be performed in other orders or concurrently. Next, personsskilled in the art should also know that, the embodiments described inthe specification all fall within exemplary embodiments, and the relatedactions and modules are not necessarily required by the presentdisclosure.

Through the foregoing description of the implementation manners, it isclear to persons skilled in the art that the present disclosure may beaccomplished through software plus a necessary hardware platform, orcompletely through hardware, but in many cases the former is a preferredimplementation manner. Based on this, the technical solution of thepresent disclosure or the part that makes contributions to the existingtechnology can be embodied in the form of a software product. Thecomputer software product may be stored in a storage medium (such as aROM/RAM, a magnetic disk or an optical disc), and contain severalinstructions to instruct computer equipment (for example, a mobilephone, a personal computer, a server, or network equipment) to performthe method described in the embodiments of the present invention.

According to this embodiment of the present invention, a verificationterminal 10 for implementing the data interaction method in the someembodiments is further provided, and the verification terminal 10provided by this embodiment of the present invention is specificallydescribed as follows:

FIG. 6 is a schematic diagram of a verification terminal 10 according toan embodiment of the present invention. As shown in FIG. 6, theverification terminal 10 is a verification terminal 10 of the foregoingdata interaction system that constitutes the embodiments of the presentinvention, and includes one or more processors, a memory, and one ormore program units. The one or more program units are stored in thememory, and executed by the one or more processors, to perform the datainteraction method. In the embodiment, the one or more program units mayinclude a first receiving unit 601, a sending unit 602, and a secondreceiving unit 603.

The first receiving unit 601 is configured to receive identityverification information from a user terminal 30, where the identityverification information is information sent to the user terminal 30 bya server 20 in advance.

In this embodiment, the identity verification information may bedisplayed in the form of a two-dimensional code, a bar code, a string,or the like, and the user terminal 30 may be a portable device such as asmart phone or a tablet computer. The verification terminal 10 may be adevice such as a two-dimensional code scanner, a bar code scanner, or astring receiver, the user terminal 30 may communicate with the server 20by using a mobile network or the Internet, and the user terminal 30 maycommunicate with the verification terminal 10 by using a manner such asa near field communication manner or a scan manner.

The sending unit 602 is configured to send a request instruction to theserver 20, where the request instruction includes the identityverification information, and the verification terminal 10 maycommunicate with the server 20 in a wired and/or a wireless manner.

The second receiving unit 603 is configured to receive feedbackinformation from the server 20, where the feedback information isinformation sent by the server 20 to the verification terminal 10 afterexecuting an operation corresponding to the request instruction.

In the verification terminal of this embodiment of the presentinvention, the first receiving unit 601 receives identity verificationinformation from a user terminal, the sending unit 602 sends a requestinstruction including the received identity verification information toa server, and then the server executes a corresponding operation, andthe second receiving unit 603 receives feedback information sent by theserver, so that in a transaction process, the user terminal only needsto show, to the verification terminal, the identity verificationinformation that represents a user terminal identity and is received inadvance. Compared with the consumption manner in the existing technologythat the user terminal receives a verification code from theverification terminal, the present disclosure does not require the userterminal to manually input or scan the verification code, which shortensthe transaction time; in addition, after receiving the requestinstruction including the identity verification information, the servercan execute the corresponding operation without the need of receivingand verifying a transaction password input by the user terminal, whichfurther shortens the transaction time compared with the manner in theexisting technology that a user needs to input the transaction passwordfor each transaction. Further, the data interaction manner provided bythis embodiment of the present invention is initiated when the userperforms real-time consumption, and compared with the manner in theexisting technology that the user needs to first perform an on-linepayment and then conduct an off-line transaction, the manner provided bythe present disclosure implements synchronization of an on-line paymentand an off-line transaction, and further shortens the transaction time.Therefore, this embodiment of the present invention solves the problemthat the data interaction processing manners in the existing technologyconsume a relatively long time, thereby achieving effects of shorteningthe time and improving efficiency.

The identity verification information is information generated by theserver 20 according to a setting instruction from the user terminal 30.Specifically, before a consumption transaction, a consumer logs in, byusing a registered account number and a password, to an e-commerceplatform run by the server 20 on the user terminal 30, after the loginsucceeds, the user terminal 30 sends the setting instruction to theserver 20, and the server 20 generates identity verification informationaccording to the received setting instruction, and returns the generatedidentity verification information to the user terminal 30.

According to this embodiment of the present invention, a server 20 forimplementing the data interaction method in the some embodiments isfurther provided, and the server 20 provided by this embodiment of thepresent invention is specifically introduced as follows:

FIG. 7 is a schematic diagram of a server 20 according to an embodimentof the present invention. As shown in FIG. 7, the server 20 is a server20 of the foregoing data interaction system that constitutes theembodiments of the present invention, and includes one or moreprocessors, a memory, and one or more program units. The one or moreprogram units are stored in the memory, and executed by the one or moreprocessors, to perform the data interaction method. In the embodiment,the one or more program units may include a first receiving unit 701, anexecuting unit 702, and a first sending unit 703.

The first receiving unit 701 is configured to receive a requestinstruction from a verification terminal 10, where the requestinstruction includes identity verification information received from auser terminal 30 by the verification terminal 10, and the identityverification information is information sent to the user terminal 30 bythe server 20 in advance.

In this embodiment, the identity verification information may bedisplayed in the form of a two-dimensional code, a bar code, a string,or the like, and the user terminal 30 may be a portable device such as asmart phone or a tablet computer. The verification terminal 10 may be adevice such as a two-dimensional code scanner, a bar code scanner, or astring receiver, the user terminal 30 may communicate with the server 20by using a mobile network or the Internet, the user terminal 30 maycommunicate with the verification terminal 10 by using a manner such asa near field communication manner or a scan manner, and the verificationterminal 10 may communicate with the server 20 in a wired and/or awireless manner.

The executing unit 702 is configured to execute an operationcorresponding to the request instruction.

The first sending unit 703 is configured to send feedback information tothe verification terminal 10.

In the server of this embodiment of the present invention, averification terminal receives identity verification information from auser terminal, and sends a request instruction including the receivedidentity verification information to a first receiving unit 701, then anexecuting unit 702 executes a corresponding operation, and a firstsending unit 703 sends feedback information to the verificationterminal, so that in a transaction process, the user terminal only needsto show, to the verification terminal, the identity verificationinformation that represents a user terminal identity and is received inadvance. Compared with the consumption manner in the existing technologythat the user terminal receives a verification code from theverification terminal, the present disclosure does not require the userterminal to manually input or scan the verification code, which shortensthe transaction time; in addition, after the first receiving unit 701receives the request instruction including the identity verificationinformation, the server can execute the corresponding operation withoutthe need of receiving and verifying a transaction password input by theuser terminal, which further shortens the transaction time compared withthe manner in the existing technology that a user needs to input thetransaction password for each transaction. Further, the data interactionmanner provided by this embodiment of the present invention is initiatedwhen the user performs real-time consumption, and compared with themanner in the existing technology that the user needs to first performan on-line payment and then conduct an off-line transaction, the mannerprovided by the present disclosure implements synchronization of anon-line payment and an off-line transaction, and further shortens thetransaction time. Therefore, this embodiment of the present inventionsolves the problem that the data interaction processing manners in theexisting technology consume a relatively long time, thereby achievingeffects of shortening the time and improving efficiency.

Further, the one or more program units of the server 20 further includea first determining unit, a second sending unit, and a second receivingunit, and after the first receiving unit 701 receives the requestinstruction from the verification terminal 10, the first determiningunit determines whether to communicate with the user terminal 30. In acase in which the first determining unit determines to communicate withthe user terminal 30, the second sending unit sends a confirmationrequest to the user terminal 30, and the second receiving unit receivesa confirmation instruction from the user terminal 30 in response to theconfirmation request. The executing unit 702 is configured to execute,in a case in which the first determining unit determines not tocommunicate with the user terminal 30, or in a case in which the secondreceiving unit receives the confirmation instruction, an operationcorresponding to the request instruction. The operation that iscorresponding to the request instruction and executed by executing unit702 may be deducting a corresponding consumption amount from an accountcorresponding to the identity verification information, and adding thesame consumption amount to an account corresponding to the verificationterminal 10, or may be directly transferring a corresponding consumptionamount to an account corresponding to the verification terminal 10 froman account corresponding to the identity verification information.

In a case in which the server 20 receives the request instruction, theserver 20 first determines whether to communicate with the user terminal30; if the server 20 needs to communicate with the user terminal 30, theserver 20 sends a confirmation request to the user terminal 30; andafter receiving a confirmation instruction from the user terminal 30 inresponse to the confirmation request, the server 20 executes anoperation corresponding to the request instruction, to ensure thesecurity of the transaction process, thereby avoiding the verificationterminal 10 from bringing an economic loss to a consumer due tomisoperations or other reasons. If the server 20 does not need tocommunicate with the user terminal 30, it indicates that the server 20already obtains a confirmation from the user terminal 30 duringgeneration of the identity verification information, where theconfirmation indicates that the user terminal 30 does not need to give aconfirmation any longer during an actual consumption transaction.

Specifically, the first determining unit mainly includes an acquiringmodule, a determining module, a first determining module, and a seconddetermining module.

The acquiring module is configured to acquire an identification value inthe identity verification information, where the identification valuemay be a state flag bit in the identity verification information, forexample, the identification value may be 1 or 0.

The determining module is configured to determine whether the acquiredidentification value is a first preset identification value or a secondpreset identification value, and as an exemplary example, the firstpreset identification value may be 1, and the second presetidentification value may be 0.

The first determining module is configured to determine, in a case inwhich the determining module determines that the acquired identificationvalue is the first preset identification value, to communicate with theuser terminal 30, and determine, if the acquired identification value is1, that is, it is determined that the acquired identification value isthe first preset identification value, to communicate with the userterminal 30.

The second determining module is configured to determine, in a case inwhich the determining module determines that the acquired identificationvalue is the second preset identification value, not to communicate withthe user terminal 30, and determine, if the acquired identificationvalue is 0, that is, it is determined that the acquired identificationvalue is the second preset identification value, not to communicate withthe user terminal 30.

Further, the server 20 further includes an authentication unit, andbefore the first determining unit determines whether to communicate withthe user terminal 30, the authentication unit first authenticates theidentity verification information in the request instruction, whichmainly is authenticating whether an account corresponding to theidentity verification information is one account of registered accountsstored in the server 20, that is, authenticating validity of theidentity verification information, to achieve an effect of improving thesecurity of the transaction process. In a case in which authenticationof the identity verification information succeeds, the first determiningunit determines whether to communicate with the user terminal 30.

Further, the server 20 provided by this embodiment of the presentinvention further includes a third receiving unit, a generating unit,and a third sending unit. The server 20 generates identity verificationinformation with the cooperation of the third receiving unit, thegenerating unit, and the third sending unit. Specifically, before aconsumption transaction, a consumer logs in to an e-commerce platform onthe user terminal 30 by using a registered account number and apassword, and after login, the user terminal 30 sends a settinginstruction to the server 20. The third receiving unit is configured toreceive the setting instruction from the user terminal 30, thegenerating unit is configured to generate the identity verificationinformation according to the setting instruction, and the third sendingunit is configured to send the identity verification information to theuser terminal 30.

The setting instruction includes a password and setting information, andthe server 20 further includes a second determining unit. before thegenerating unit generates the identity verification informationaccording to the setting instruction, the second determining unit isconfigured to determine whether the password in the setting instructionis the same as a preset password. The preset password is a transactionpassword of an account logged in to the e-commerce platform on the userterminal 30; and the setting information may include, but is not limitedto, a preset value (such as 100 yuan) used to represent a maximumpayment amount, a valid consumption period of the maximum paymentamount, where the period of validity may be indicated by a settingduration and a preset duration (such as 12 hours), informationindicating whether the server 20 needs to feed back a consumptionconfirmation request in a consumption process, and the like. In a casein which the second determining unit determines that the receivedpassword is the same as the preset password, the generating unitgenerates the identity verification information by using the settinginformation.

Further, the request instruction received by the first receiving unit701 further includes a target value, where the target value is an actualconsumption transaction amount, while the setting information includes apreset value of a certain amount set by the consumer by using the userterminal 30. Correspondingly, the generated identity verificationinformation also includes the preset value. The server 20 furtherincludes a third determining unit, and after the first receiving unit701 receives the request instruction from the verification terminal 10,the third determining unit determines whether the target value isgreater than the preset value. In a case in which the third determiningunit determines that the target value is less than or equal to thepreset value, the executing unit 702 executes an operation correspondingto the request instruction. That is, in a case in which the thirddetermining unit determines that the actual consumption transactionamount does not exceed a preset amount, the executing unit 702 deducts acorresponding consumption amount from an account corresponding to theidentity verification information, and adds the same consumption amountto an account corresponding to the verification terminal 10, or directlytransfers a corresponding consumption amount to an account correspondingto the verification terminal 10 from an account corresponding to theidentity verification information.

Further, the setting information further includes a valid consumptionperiod of the preset value, and the valid consumption period may be apreset duration. Correspondingly, the generated identity verificationinformation also includes the preset duration. The server 20 furtherincludes a fourth determining unit, and after the first receiving unit701 receives the request instruction from the verification terminal 10,the fourth determining unit determines whether time at which the requestinstruction is received is within the preset duration. In a case inwhich the fourth determining unit determines that the time at which therequest instruction is received is within the preset duration, theexecuting unit 702 executes an operation corresponding to the requestinstruction, that is, in a case in which the fourth determining unitdetermines that the time at which the request instruction is receiveddoes not exceed a valid consumption period set by a consumer, theexecuting unit 702 deducts a corresponding consumption amount from anaccount corresponding to the identity verification information, and addsthe same consumption amount to an account corresponding to theverification terminal 10, or directly transfers a correspondingconsumption amount to an account corresponding to the verificationterminal 10 from an account corresponding to the identity verificationinformation.

The determining by the third determining unit whether the a target valueis greater than preset data and the determining by the fourthdetermining unit whether the receiving time is within a preset durationboth aim to ensure security of the transaction process, so that thetransaction security is ensured on the basis of shortening the time andimproving efficiency.

It can be seen from the foregoing descriptions that, the presentdisclosure solves the problem that the data interaction manners in theexisting technology consume a relatively long time, thereby achievingeffects of shortening the time and improving efficiency.

The sequence numbers of the foregoing embodiments of the presentinvention are merely for the convenience of description, and do notimply the preference among the embodiments.

In the foregoing embodiments of the present invention, description forthe embodiments has its own emphasis, and reference may be made torelevant description in other embodiments for a part without beingdescribed in detail in a certain embodiment.

In the several embodiments provided in the present application, itshould be understood that the disclosed verification terminal may beimplemented in other manners. The described apparatus embodiments aremerely exemplary. For example, the unit division is merely logicalfunction division and may be other division in actual implementation.For example, a plurality of units or components may be combined orintegrated into another system, or some features may be ignored or notperformed. In addition, the shown or discussed mutual couplings ordirect coupling or communication connection may be accomplished throughsome interfaces. The indirect coupling or communication connectionbetween the units or modules may be electrical or in other forms.

Units described as separate components may be or may not be physicallyseparated. Components shown as units may be or may not be physicalunits, that is, may be integrated or distributed to a plurality ofnetwork units. Some or all of the units may be selected to achieve theobjectives of the solution of the embodiment according to actual needs.

In addition, functional units in the embodiments of the presentinvention may be integrated into one processing unit, or each of theunits may exist alone physically, or two or more units may be integratedinto one unit. The integrated unit may be implemented in the form ofhardware, or may be implemented in the form of a software functionalunit.

When the integrated unit is implemented in the form of a softwarefunctional unit and sold or used as a separate product, the integratedunit may be stored in a computer-readable storage medium. Therefore, thetechnical solution of the present disclosure or the part that makescontributions to the existing technology can be substantially embodiedin the form of a software product. The computer software product isstored in a storage medium, and contains several instructions toinstruct computer equipment (such as, a personal computer, a server, ornetwork equipment) to perform all or part of steps of the method asdescribed in the embodiments of the present invention. The storagemedium includes various media capable of storing program code, such as,a flash disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), amobile hard disk, a magnetic disk or an optical disc.

The foregoing descriptions are merely preferred implementation mannersof the present disclosure. It should be noted that, a person of ordinaryskill in the art may further make improvements and modifications withoutdeparting from the principle of the present disclosure, and theimprovements and modifications should also be regarded as the protectionscope of the present disclosure.

The invention claimed is:
 1. A data interaction method, applied in averification system including a verification terminal and a server, themethod comprising: receiving, by the server, a pre-authorization requestalong with an account number and a password from a user terminal of auser; processing, by the server, the account number and the passwordaccording to the pre-authorization request; pre-authorizing, by theserver, identity verification information according to the accountnumber and the password as processed, the identity verificationinformation including information on a maximum payment amount, a validconsumption period, and whether for the server to communicate with theuser when the verification terminal seeks feedback information from theserver; sending the identity verification information, by the server, tothe user terminal; receiving, by the verification terminal, the identityverification information from the user terminal; sending, by theverification terminal, a request instruction to the server, the requestinstruction including the identity verification information and arequest for validity confirmation on the identity verificationinformation; after receiving the request instruction, communicating, bythe server, with the user terminal corresponding to the identityverification information by sending a confirmation request directly tothe user terminal, bypassing the verification terminal, wherein sendingthe confirmation request further comprises: determining, by the server,a time at which the request instruction is received is outside of thevalid consumption period; and after having determined that the time isoutside of the valid consumption period, seeking, by the server,confirmation of approval from the user terminal; executing, by theserver, an operation corresponding to the request instruction, andsending, by the server, the feedback information to the verificationterminal; and receiving, by the verification terminal, the feedbackinformation from the server, the feedback information including adecision on validity confirmation of the identity verificationinformation.
 2. The method according to claim 1, after submitting theaccount number and the password by the user, the method furthercomprising: determining, by the server, whether the password assubmitted by the user is the same as a preset password; and generatingthe identity verification information upon determining by the serverthat the password as submitted by the user is the same as the presetpassword.
 3. The method according to claim 1, wherein sending by theserver to the user terminal of the identification verificationinformation occurs in advance of receipt by the verification terminal ofthe identity verification information from the user terminal.
 4. Themethod according to claim 1, further comprising: acquiring, by theserver, an identification value in the identity verificationinformation; determining, by the server, whether the identificationvalue is a first preset identification value or a second presetidentification value different than the first preset identificationvalue; and in response to determining the identification is the firstpreset identification value but not the second preset identificationvalue, determining, by the server, to communicate with the userterminal.
 5. The method according to claim 1, further comprising:authenticating, by the server, the identity verification informationprior to communicating with the user terminal.
 6. A verification system,comprising a verification terminal and a server, wherein theverification terminal includes a first processor and a first memory, thefirst memory storing one or more computer programs that, when executedby the first processor, causes the first processor to execute operationsincluding: receiving identity verification information from a userterminal, the identity verification information being information sentto the user terminal by the server in advance; sending a requestinstruction to the server, the request instruction including theidentity verification information and a request for validityconfirmation on the identity verification information; and receivingfeedback information from the server, the feedback information beinginformation sent by the server to the verification terminal afterexecuting an operation corresponding to the request instruction; andwherein the server includes a second processor and a second memory, thesecond memory storing one or more computer programs that, when executedby the second processor, causes the second processor to executeoperations including: processing an account number and a passwordaccording to a pre-authorization request submitted from a user;pre-authorizing identity verification information according to theaccount number and the password as processed, the identity verificationinformation including information on a maximum payment amount, a validconsumption period, and whether for the server to communicate with theuser when the verification terminal seeks feedback information from theserver; sending the identity verification information to the userterminal; executing the operation corresponding to the requestinstruction, and sending feedback information to the verificationterminal, the feedback information including a decision on validityconfirmation of the identity verification information; and afterreceiving the request instruction and before sending the feedbackinformation, communicating with the user terminal corresponding to theidentity verification information by sending a confirmation requestdirectly to the user terminal, bypassing the verification terminal,wherein sending the confirmation request further comprises: determininga time at which the request instruction is received is outside of thevalid consumption period; and after having determined that the time isoutside of the valid consumption period, seeking confirmation ofapproval from the user terminal.
 7. The verification system according toclaim 6, wherein the second processor is further configured to executeoperations including: receiving a confirmation instruction from the userterminal in response to the confirmation request; and executing, uponreceipt of the confirmation instruction is received, the operationcorresponding to the request instruction.
 8. The verification systemaccording to claim 6, wherein the second processor is further configuredto execute operations including: acquiring an identification value inthe identity verification information; acquiring whether theidentification value as acquired is a first preset identification valueor a second preset identification value; and determining that theidentification value as acquired is the first preset identificationvalue, prior to communicating with the user terminal.
 9. Theverification system according to claim 6, the second processor isfurther configured to execute operations including: authenticating theidentity verification information prior to communicating with the userterminal.
 10. The verification system according to claim 6, wherein thesecond processor is further configured to execute operations including:determining, before generating the identity verification information,whether the password as submitted by the user is the same as a presetpassword, and generating the identity verification information upondetermining the password as submitted by the user is the same as thepreset password.