CN109472656B - Virtual article display method and device and storage medium - Google Patents

Virtual article display method and device and storage medium Download PDF

Info

Publication number
CN109472656B
CN109472656B CN201710804677.4A CN201710804677A CN109472656B CN 109472656 B CN109472656 B CN 109472656B CN 201710804677 A CN201710804677 A CN 201710804677A CN 109472656 B CN109472656 B CN 109472656B
Authority
CN
China
Prior art keywords
user
virtual
virtual resource
preset
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710804677.4A
Other languages
Chinese (zh)
Other versions
CN109472656A (en
Inventor
王莹
钟鹏飞
朱海洋
陈艳良
李尚喜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710804677.4A priority Critical patent/CN109472656B/en
Publication of CN109472656A publication Critical patent/CN109472656A/en
Application granted granted Critical
Publication of CN109472656B publication Critical patent/CN109472656B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0605Supply or demand aggregation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0641Shopping interfaces
    • G06Q30/0643Graphical representation of items or shoppers

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a method, a device and a storage medium for displaying virtual articles; after receiving a virtual article display request carrying a user identifier of a requesting user, an embodiment of the present invention may obtain an original virtual article list according to the request, where the virtual article list includes at least one virtual article, each virtual article includes at least one interface for requesting transfer of virtual resources and virtual resource information corresponding to each interface, and when it is determined that virtual resource information meeting a preset condition exists, a user tag of the requesting user is obtained to determine whether the requesting user is a malicious user, if so, an interface corresponding to the virtual resource information meeting the preset condition is shielded, and the shielded virtual article list is provided to the requesting user, otherwise, the original virtual article list is provided to the requesting user; according to the scheme, on the premise that normal operation of non-malicious users can be guaranteed, attacks of the malicious users are reduced, and safety of virtual resource transfer is improved.

Description

Virtual article display method and device and storage medium
Technical Field
The invention relates to the technical field of communication, in particular to a virtual article display method, a virtual article display device and a storage medium.
Background
In the current society, the processing modes of transferring virtual resources, such as payment, payment or account transfer, are more and more various and convenient, and payment through a certain terminal application is a common one.
In the prior art, when payment is performed through a terminal application, in order to improve processing efficiency, generally, for micropayment, the amount of a bank card bound by a user is not deducted immediately, but deduction operation is performed after a certain time, for example, several hours, and if the user logs off the bound bank card during the period, the deduction operation cannot be performed smoothly, so that benefits of a service provider are damaged. Therefore, most of the existing service providers cancel the service items of the small amount payment or block the user accounts with excessive details of the small amount purchase so as to avoid the excessive damage of benefits.
In the research and practice processes of the prior art, the inventor of the invention finds that the existing scheme has a rough processing mode on the micropayment vulnerability, not only influences the operation of normal users, but also can not avoid the attack of malicious users, and has poor safety.
Disclosure of Invention
Embodiments of the present invention provide a method, an apparatus, and a storage medium for displaying a virtual article, which can reduce attacks of malicious users and improve security of virtual resource transfer on the premise of ensuring that users can perform normal operations.
The embodiment of the invention provides a virtual article display method, which comprises the following steps:
receiving a virtual article display request, wherein the virtual article display request carries a user identifier of a requesting user;
acquiring an original virtual article list according to the virtual article display request, wherein the original virtual article list comprises at least one virtual article, and each virtual article comprises at least one interface for requesting to transfer virtual resources and virtual resource information corresponding to each interface;
when the virtual resource information meeting the preset conditions is determined to exist, acquiring a user tag of a requesting user according to the user identification of the requesting user;
determining whether the requesting user is a malicious user or not according to the user tag;
if so, shielding an interface corresponding to the virtual resource information meeting the preset conditions to obtain a shielded virtual article list, and providing the shielded virtual article list to the requesting user;
and if not, providing the original virtual article list to the requesting user.
Correspondingly, an embodiment of the present invention further provides a display device for virtual articles, including:
the virtual article display system comprises a receiving unit, a display unit and a display unit, wherein the receiving unit is used for receiving a virtual article display request which carries a user identifier of a requesting user;
a list obtaining unit, configured to obtain an original virtual item list according to the virtual item display request, where the original virtual item list includes at least one virtual item, and each virtual item includes at least one interface for requesting to transfer a virtual resource and virtual resource information corresponding to each interface;
the portrait acquisition unit is used for acquiring a user tag of a requesting user according to a user identifier of the requesting user when the virtual resource information meeting the preset condition is determined to exist;
and the processing unit is used for determining whether the requesting user is a malicious user according to the user tag, if so, shielding an interface corresponding to the virtual resource information meeting preset conditions to obtain a shielded virtual article list, and providing the shielded virtual article list to the requesting user, and if not, providing the original virtual article list to the requesting user.
The embodiment of the present invention further provides a storage medium, where the storage medium stores a plurality of instructions, and the instructions are suitable for being loaded by a processor to perform the steps in any one of the methods for displaying a virtual article provided by the embodiments of the present invention.
After receiving a virtual article display request carrying a user identifier of a requesting user, an original virtual article list can be obtained according to the virtual article display request, wherein the original virtual article list comprises at least one virtual article, each virtual article comprises at least one interface for requesting to transfer virtual resources and virtual resource information corresponding to each interface, then when the virtual resource information meeting preset conditions is determined to exist, a user tag of the requesting user is obtained according to the user identifier of the requesting user, whether the requesting user is a malicious user is determined according to the user tag, if yes, an interface corresponding to the virtual resource information meeting the preset conditions is shielded, the shielded virtual article list is provided for the requesting user, and if not, the original virtual article list is provided for the requesting user; according to the scheme, the malicious user can be identified according to the user label, the interface corresponding to the virtual resource information meeting the preset condition in the virtual article list requested by the malicious user is shielded, so that the requesting user is limited to perform further operation based on the interface, for example, virtual resource transfer is performed, and normal display is performed on non-malicious users.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1a is a schematic view of a scene of a method for displaying a virtual article according to an embodiment of the present invention;
fig. 1b is another schematic view of a scene of a method for displaying a virtual object according to an embodiment of the present invention;
fig. 1c is a schematic flow chart of a method for displaying a virtual article according to an embodiment of the present invention;
fig. 2a is another schematic flow chart of a method for displaying a virtual object according to an embodiment of the present invention;
FIG. 2b is an exemplary diagram of a user operation interface in the method for displaying a virtual object according to the embodiment of the present invention;
FIG. 3a is a schematic structural diagram of a display apparatus for virtual articles according to an embodiment of the present invention;
FIG. 3b is another structural diagram of a display device for a virtual object according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a virtual article display method, a virtual article display device and a storage medium.
The virtual article display device is simply referred to as a display device, and can be specifically integrated in a server, such as a business server.
For example, referring to fig. 1a and fig. 1b, when a requesting user needs to view or purchase a virtual article, such as viewing or purchasing a terminal Application (APP), a virtual article display request may be sent to the display apparatus through a terminal (i.e., a requesting terminal), such as opening an Application market or sending an initiating terminal Application search, and the user identifier of the requesting user is carried in the virtual article display request; after receiving the virtual article display request, the display device obtains an original virtual article list according to the virtual article display request, where the original virtual article list may include at least one virtual article, each virtual article may include at least one interface for requesting transfer of a virtual resource and virtual resource information corresponding to each interface, and then, when it is determined that virtual resource information meeting a preset condition exists (if at least one virtual resource exists, the transfer amount required is less than a preset amount), the display device obtains a user tag of a requesting user according to a user identifier of the requesting user, and determines whether the requesting user is a malicious user according to the user tag, if the requesting user is a malicious user, as shown in fig. 1a, an interface corresponding to the virtual resource information meeting the preset condition may be shielded, and the shielded virtual article list is provided to the requesting user, otherwise, if the requesting user is a non-malicious user, as shown in fig. 1b, the original virtual article list may be provided to the requesting user, so that a subsequent requesting user may purchase the virtual article through the virtual interface corresponding to the virtual resource information, and so on the like.
The following are detailed below.
The embodiment is an embodiment provided by the present invention, and the embodiment will be described from the perspective of a virtual article display device, where the virtual article display device may be specifically integrated in a server, such as a business server and other devices.
A method of displaying a virtual item, comprising: receiving a virtual article display request carrying a user identifier of a requesting user; acquiring an original virtual article list according to the virtual article display request, wherein the original virtual article list comprises at least one virtual article, and each virtual article comprises at least one interface for requesting to transfer virtual resources and virtual resource information corresponding to each interface; when virtual resource information meeting preset conditions is determined to exist, a user tag of a requesting user is obtained according to a user identifier of the requesting user, whether the requesting user is a malicious user is determined according to the user tag, if yes, an interface corresponding to the virtual resource information meeting the preset conditions is shielded, a shielded virtual article list is obtained, and the shielded virtual article list is provided for the requesting user; if not, the original virtual item list is provided to the requesting user.
As shown in fig. 1c, a specific flow of the virtual article displaying method may be as follows:
101. a virtual article display request is received, and the virtual article display request may carry information such as a user identifier (also referred to as a request user identifier) of a requesting user.
The virtual article refers to a non-physical article, an invisible article, an article derived from a virtual network, and may be a service, such as a membership of a certain terminal application, or a function, such as a certain terminal application, etc.; the requesting user refers to a user requesting virtual article display, such as a user in an operation of purchasing or searching a virtual article, and the like; the user identification may include information such as a user name, a mailbox address, an instant messaging tool account number, and/or a virtual resource account, which may include a bank account number, or other financial-related account number, etc.
The virtual article display request may specifically be a search request, a purchase request, or a login request of an application market of the terminal application. The virtual article showing request can be triggered by the requesting user through the terminal to which the requesting user belongs, for example, clicking or sliding a search trigger key in the terminal application interface, a purchase trigger key in the terminal application purchase interface, or an icon of an application market on a desktop, etc.; for convenience of description, in the embodiment of the present invention, a terminal to which the requesting user belongs is referred to as a requesting terminal; that is, the step "receiving a virtual article display request" may specifically be:
and receiving a virtual article display request sent by the request terminal, for example, receiving a search request of a terminal application, a purchase request of the terminal application, or a login request of an application market, which is sent by the request terminal, and the like.
102. For convenience of description, in the embodiment of the present invention, the virtual item list is referred to as an original virtual item list.
For example, the original virtual item list may be specifically obtained from a preset database according to the virtual item display request; or, a corresponding virtual article may be acquired from a preset database according to the virtual article display request, and an original virtual article list may be generated according to the acquired virtual article, and so on.
The original virtual item list may include at least one virtual item, and each virtual item may include at least one interface for requesting to transfer a virtual resource and virtual resource information corresponding to each interface.
The representation form of the interface may be set according to the requirement of the actual application, for example, the representation form may be a purchase trigger key, and the virtual resource information corresponding to the interface refers to profile information of the interface, and the profile information may indicate the amount of virtual resources that need to be transferred. For example, taking the interface as a purchase trigger key as an example, the virtual resource information corresponding to the interface refers to the price of the virtual item corresponding to the purchase trigger key, and so on.
For example, taking the virtual item as a member qualification of a certain terminal application, and the interface as a purchase trigger key as an example, a plurality of corresponding purchase trigger keys may be provided for the member qualification, such as a purchase trigger key of "annual membership", a purchase trigger key of "semi-annual membership", and a purchase trigger key of "single-month membership", etc., where the price of "annual membership" is "100 yuan", the price of "semi-annual membership" is "60 yuan", and the price of "single-month membership" is 15 yuan, then the price of "100 yuan" may be referred to as virtual resource information corresponding to the purchase trigger key of "annual membership", and similarly, the price of "60 yuan" may be referred to as virtual resource information corresponding to the purchase trigger key of "semi-annual membership", and the price of "15 yuan" may be referred to as virtual resource information corresponding to the purchase trigger key of "single-month membership", etc.
Optionally, the original virtual item list may further include other information, such as profile information of each virtual item function, profile information of each virtual item developer, shelf life of each virtual item, and/or evaluation information of each virtual item, which will not be described herein again.
103. And when the virtual resource information meeting the preset conditions is determined to exist, acquiring the user tag of the requesting user according to the user identification of the requesting user.
The preset condition may be set according to a requirement of an actual application, for example, if the preset condition is that "the required transfer amount of the virtual resources is less than a preset number", then at this time, the required transfer amount of the virtual resources may be determined according to the virtual resource information, and if the required transfer amount is less than the preset number, then it is determined that the virtual resource information satisfies the preset condition; otherwise, if the required transfer amount is greater than or equal to the preset amount, determining that the virtual resource information does not meet the preset condition.
For example, taking payment as an example, if a certain payment application determines payment below 40 yuan as a small amount transaction, in order to limit the small amount transaction, the preset amount may be set to 40 yuan, and so on.
Optionally, if it is determined that there is no virtual resource information that meets the preset condition, that is, all the virtual resource information in the virtual item list does not meet the preset condition, a preset rule may be used for processing, where the preset rule may be set according to a requirement of an actual application, for example, the original virtual item list may be provided to the requesting user, and so on, which is not described herein again.
The user label is a labeled user model abstracted according to user information such as user social attributes, living habits, consumption behaviors and the like. In the embodiment of the invention, the social attributes, living habits and consumption behaviors of the user mainly refer to behaviors of the user when the user performs related activities of virtual resources, and the user information mainly comprises login places, login equipment, virtual resource account setting information, virtual resource account use information and the like of the user. The core work in constructing user tags is to label users with "tags", which are highly refined signatures from analysis of user information. Through the user tags, data mining can be performed, and the behavior of the user can be predicted.
The user tag may be stored in the database in advance by an operation and maintenance person, or may be established and stored in advance by the display device of the virtual article, that is, before the step "obtaining the user tag of the requesting user according to the identifier of the requesting user", the display method of the virtual article may further include:
the method comprises the steps of obtaining a user identification, collecting information such as a login place, login equipment, virtual resource account setting information and virtual resource account using information of a user according to the user identification, establishing a user label according to the collected information, and storing a corresponding relation between the user identification and the user label.
Then, at this time, the step "obtaining the user tag of the requesting user according to the user identifier of the requesting user" may include: and acquiring a user label corresponding to the user identifier of the requesting user according to the stored corresponding relation.
The method for establishing the user tag according to the acquired information may be various, for example, the acquired information, such as the login location, the login device, the virtual resource account setup information, the virtual resource account usage information, and the like of the user, may be analyzed to mine some key information of the network environment where the user is located, and then the key information may be analyzed and learned with the preset granularity, so as to obtain the user tag corresponding to the user.
The virtual resource account setup information may include setup time (i.e., account opening time) of the virtual resource account, setup location (i.e., account opening location), and device information used in setup, and optionally, the virtual resource account setup information may further include related information of historically setup virtual resource accounts, such as logout time, logout location, and device information used in logout of the virtual resource account. The virtual resource account usage information may include expenditure information, income information, and transaction details of the virtual resource account.
104. Determining whether the requesting user is a malicious user according to the user tag, if so, executing a step 105, and if not, executing a step 106; for example, the following may be specifically mentioned:
(1) And determining information such as a common login place, common login equipment, virtual resource account setup information, virtual resource account use information and the like of the requesting user according to the user tag.
For example, information such as a login location, a login device, virtual resource account setup information, and virtual resource account usage information of the requesting user within a past preset time limit may be specifically determined according to the user tag, and then, a login location where the login number exceeds a set first value is determined as a common login location, and a login device where the login number exceeds a set second value is determined as a common login device.
The preset time limit, the first value and the second value may be set according to the requirement of the actual application, for example, the first value may be set to 5 times, the second value may be set to 3 times, and so on, which is not described herein again.
(2) And determining whether the requesting user is a malicious user according to the information such as the common login place, the common login equipment, the virtual resource account setup information, the virtual resource account use information and the like.
For example, it may be specifically determined whether the requesting user meets a preset policy according to information such as the common login location, the common login device, the virtual resource account setup information, and the virtual resource account usage information, and if the predetermined policy is met, it is determined that the requesting user is a malicious user, otherwise, it is determined that the requesting user is a non-malicious user.
The preset policy may be determined according to a requirement of an actual application, for example, the preset policy includes any one or more of the following conditions:
A. the times of setting up the virtual resource account at the common login place exceed a preset first threshold;
B. the times of setting up the virtual resource account by using the common login equipment exceed a preset second threshold;
C. within a preset first time, the times of opening a preset service by using the common login equipment exceed a preset third threshold;
D. and in the preset second time, the times of opening the preset service by using the same virtual resource account exceed a preset fourth threshold value.
The first threshold, the second threshold, the third threshold, the fourth threshold, the first time, and the first time may be set according to requirements of practical applications, and are not described herein again.
It should be noted that the preset policy may be preset by an operation and maintenance person, or may be set by a user, the four cases A, B, C and D listed above are merely examples, and it should be understood that, in addition to the above four cases, other cases may also be included, for example, if the total number of times that a preset service is opened by using several fixed virtual resource accounts exceeds a preset fourth threshold in a third time (which may be set according to a requirement), the preset policy may also be considered as a malicious user, and the like, which is not described herein again.
105. When the requesting user is determined to be a malicious user, shielding an interface corresponding to the virtual resource information meeting the preset conditions to obtain a shielded virtual article list, and providing the shielded virtual article list for the requesting user.
For example, the shielding operation may be specifically implemented by deleting or not displaying the interface corresponding to the virtual resource information meeting the preset condition, and then, returning the shielded virtual item list to the request terminal.
For example, if the virtual item is a membership of a certain terminal application, the interface is a purchase trigger key, the preset condition is that "the amount of virtual resources to be transferred out is less than the preset amount", and the preset amount is "40 yuan", if the price of the "annual membership" is "100 yuan", "the price of the semi-annual membership" is "60 yuan", and the price of the monthly membership "is 15 yuan, then since" 15 yuan "is lower than" 40 yuan ", the virtual resource information corresponding to the purchase trigger key of the" monthly membership "can meet the preset condition, and therefore, the purchase trigger key of the monthly membership" can be masked, that is, in the masked virtual item list, the membership of the terminal application has only two purchase items, one is "annual membership", and the other is "semi-annual membership", and for the malicious requesting user, the "monthly membership" is a purchase item, which is invisible, so that the malicious requesting user can be prevented from using a mechanism of delaying payment for the malicious requesting user, and the malicious account can be cancelled in a malicious order.
106. Upon determining that the requesting user is a non-malicious user, the original virtual item list is provided to the requesting user.
For example, taking the example in step 105 as an example, since the received virtual item list is the original virtual item list for the non-malicious requesting user, there are three purchase items in the purchase interface of the membership of the terminal application seen by the requesting user at this time: "annual membership", "semi-annual membership" and "monthly membership", that is, for non-malicious users, there is no impact.
As can be seen from the above, in this embodiment, after receiving a virtual article display request carrying a user identifier of a requesting user, an original virtual article list may be obtained according to the virtual article display request, where the original virtual article list includes at least one virtual article, each virtual article includes at least one interface for requesting transfer of virtual resources and virtual resource information corresponding to each interface, and then, when it is determined that virtual resource information meeting preset conditions exists, a user tag of the requesting user is obtained according to the user identifier of the requesting user, and it is determined whether the requesting user is a malicious user according to the user tag, if so, an interface corresponding to the virtual resource information meeting the preset conditions is shielded, and the shielded virtual article list is provided to the requesting user, otherwise, the original virtual article list is provided to the requesting user; according to the scheme, the malicious user can be identified according to the user tag, the interface corresponding to the virtual resource information meeting the preset conditions in the virtual object list requested by the malicious user is shielded, so that the requesting user is limited to perform further operation based on the interface, for example, virtual resource transfer is performed, and normal display is performed on the non-malicious user.
The method described in the previous embodiment is further detailed by way of example.
In this embodiment, a description will be given taking an example in which the display device of the virtual article is specifically integrated in a service server.
As shown in fig. 2a, a method for displaying a virtual article may specifically include the following steps:
201. the request terminal sends a virtual article display request to the service server, and the virtual article display request can carry information such as a user identifier of a requesting user.
The virtual article display request may be triggered by the requesting user through a requesting terminal (i.e. a terminal to which the requesting user belongs), specifically, the virtual article display request may be a search request of a terminal application, a purchase request, or a login of an application market, and the like.
For example, taking a small amount transaction as an example, when a user a needs to purchase a certain service a, the user a may enter a purchase virtual item page, enter the service a and click on a search, thereby triggering generation of a search request for the service a, where the search request for the service a may carry information such as a user identifier of the user a (i.e., the requesting user).
The user identifier may include information such as a user name, a mailbox address, an instant messaging tool account number, and/or a virtual resource account, and the virtual resource account may include a bank account number of the requesting user, or other financial-related account numbers.
202. And after receiving the virtual article display request, the service server acquires an original virtual article list according to the virtual article display request.
For example, the service server may specifically obtain the original virtual item list from a preset database according to the virtual item display request; or, the service server may also obtain a corresponding virtual article from a preset database according to the virtual article display request, and generate an original virtual article list according to the obtained virtual article, and so on.
The original virtual item list may include at least one virtual item, and each virtual item may include at least one interface for requesting transfer of a virtual resource, and virtual resource information corresponding to each interface.
The representation form of the interface may be set according to the requirement of the actual application, for example, the representation form may be a purchase trigger key, and the virtual resource information corresponding to the interface refers to profile information of the interface, and the profile information may indicate the amount of virtual resources that need to be transferred. For example, taking the interface as a purchase trigger key as an example, the virtual resource information corresponding to the interface refers to the price of the virtual item corresponding to the purchase trigger key, and so on.
For example, taking the virtual article as service a and the interface as a purchase trigger key as an example, the service a may be provided with a plurality of corresponding purchase trigger keys of different grades, such as a purchase trigger key of "package year" and a purchase trigger key of "package month", where a price of "package year" is "100 yuan" and a price of "package month" is 10 yuan, and then the price of "100 yuan" may be referred to as virtual resource information corresponding to the purchase trigger key of "package year", and similarly, the price of "10 yuan" may be referred to as virtual resource information corresponding to the purchase trigger key of "package month", and so on.
Optionally, the original virtual item list may further include other information, such as profile information of each virtual item function, profile information of each virtual item developer, shelf life of each virtual item, and/or evaluation information of each virtual item, which will not be described herein again.
203. Determining whether the virtual list has virtual resource information meeting a preset condition, if so, executing step 205, and if not, executing step 204.
The preset condition may be set according to a requirement of an actual application, for example, if the preset condition is that "the required transfer amount of the virtual resources is less than a preset number", then at this time, the required transfer amount of the virtual resources may be determined according to the virtual resource information, and if the required transfer amount is less than the preset number, it is determined that the virtual resource information satisfies the preset condition; otherwise, if the required transfer amount is greater than or equal to the preset amount, determining that the virtual resource information does not meet the preset condition.
For example, if the payment below 40 yuan is determined as a small amount transaction, in order to limit the small amount transaction, the preset amount may be set to 40 yuan, and so on.
For example, taking the case that payment less than 40 yuan is determined as a small amount transaction and the small amount transaction needs to be limited (i.e. the preset amount is set to 40 yuan), after the service server acquires the original virtual item list, it may be determined whether the number of money to be paid (i.e. the price) is less than 40 yuan according to the virtual resource information corresponding to each interface, if the number is less than 40 yuan, it indicates that the transaction is a small amount transaction, and the virtual resource information corresponding to the interface satisfies the preset condition, so step 205 may be executed at this time, otherwise, if the number is greater than or equal to 40 yuan, it indicates that the transaction is a non-small amount transaction, and the virtual resource information corresponding to the interface does not satisfy the preset condition, so step 204 may be executed.
204. When it is determined that there is no virtual resource information satisfying the preset condition in the virtual list (i.e., when all the virtual resource information in the virtual item list does not satisfy the preset condition), the service server may send the original virtual item list to the request terminal.
Thereafter, the requesting terminal may perform a subsequent preset operation based on the original virtual item list, where the preset operation may be determined according to requirements of an actual application. For example, taking an apple mobile terminal operating System (IOS, iPhone/iPad Operation System) System as an example, the following may be specifically mentioned:
the requesting terminal may display the original virtual item list to the requesting user after receiving the original virtual item list (it should be noted that, in the displaying process, virtual resource information corresponding to each interface, such as price, may not be displayed), when the requesting user selects a certain purchase item of a certain virtual item, for example, when the "one year membership" option of the purchase service B is clicked, the requesting terminal may send a Production Identifier (Production Identifier) of the purchase item to the apple server, and may then receive information, such as description information and/or price, of a corresponding purchase item returned by the apple server according to the Production Identifier, and when the requesting user clicks to confirm the purchase item, the requesting terminal sends a purchase request to the apple server, after the apple server completes the purchase, the requesting terminal returns a voucher for completing the purchase to the requesting terminal, sends the voucher to the business server, the business server sends the voucher to the apple server for verification, and if the verification result indicates that the voucher is valid, the business server opens a "one year membership" service for the business B for the requesting user, and ends the process.
205. When it is determined that the virtual resource information meeting the preset condition exists in the virtual list, the service server obtains the user tag of the requesting user according to the user identifier of the requesting user, and then executes step 206.
For example, by taking the case that the payment of less than 40 yuan is determined as a small amount transaction and the small amount transaction needs to be limited (i.e. the preset amount is set to 40 yuan), if the amount of money to be paid is less than 40 yuan, for example, if there is a purchase item with a price lower than 40 yuan in a plurality of purchase items corresponding to one or several virtual items, it indicates that the transaction is a non-small amount transaction, and therefore, the service server may obtain the user tag of the requesting user according to the user identifier of the requesting user, such as the user identifier of the user a.
The user tag refers to behavior data of a user when performing virtual resource related activities, and may specifically include a login location of the user, login equipment, virtual resource account setup information, virtual resource account usage information, and the like.
The user tag may be pre-stored in the database by an operation and maintenance person, or pre-established and stored by the service server, for example, before the service server obtains the user tag of the requesting user according to the user tag of the requesting user, the service server may obtain the user tag, collect information such as a login location, login equipment, virtual resource account setup information, and virtual resource account usage information of the user according to the user tag, then establish the user tag according to the collected information, and store a corresponding relationship between the user tag and the user tag, so that when it is determined that the virtual resource information satisfies a preset condition, the service server may obtain the user tag corresponding to the user tag of the requesting user according to the stored corresponding relationship, and so on, which is not described herein again.
For example, the collected information, such as the login location, the login device, the virtual resource account setup information, and the virtual resource account usage information of the user, may be analyzed to mine some key information of the network environment where the user is located, and then, the key information may be analyzed and learned at a preset granularity, so as to obtain the user tag corresponding to the user.
The virtual resource account setup information may include setup time, setup location, and device information used when setting up the virtual resource account; for example, also taking the small amount transaction as an example, the virtual resource account setup information may include an opening time of the electronic payment account of the user (such as a time of binding a bank card), an opening place of the electronic payment account (such as in which city the bank card binding operation is performed, etc.), device information of opening the electronic payment account (such as on which terminal device the bank card binding operation is performed), and the like.
The virtual resource account usage information may include information such as expenditure information, revenue information, and transaction details of the virtual resource account, for example, also in the case of a small transaction, the virtual resource account usage information may include information such as expenditure information, revenue information, and transaction details of the user's electronic payment account.
Optionally, the virtual resource account setup information may further include related information for setting up the virtual resource account historically, such as a logout time, a logout location, and device information used in logout of the virtual resource account, and so on, which are not described herein again.
206. The service server determines the information such as the common login location, the common login device, the virtual resource account setup information, and the virtual resource account usage information of the requesting user according to the user tag, and then executes step 207.
For example, information such as a login location, a login device, virtual resource account setup information, and virtual resource account usage information of the requesting user within a past preset time limit may be specifically determined according to the user tag, and then, a login location where the login number exceeds a set first value is determined as a common login location, and a login device where the login number exceeds a set second value is determined as a common login device.
The preset time limit, the first value and the second value may be set according to the requirement of the actual application, for example, the first value may be set to 5 times, the second value may be set to 3 times, and so on, which is not described herein again.
207. The service server determines whether the requesting user meets a preset policy according to the information such as the common login location, the common login equipment, the virtual resource account setup information, the virtual resource account use information and the like, if so, the requesting user is determined to be a malicious user, and step 208 is executed; otherwise, if the preset policy is not satisfied, it is determined that the requesting user is a non-malicious user, and step 209 is performed.
The preset policy may be determined according to a requirement of an actual application, for example, the preset policy includes any one or more of the following situations:
(1) The number of times of setting up the virtual resource account at the common login location exceeds a preset first threshold.
(2) The number of times the virtual resource account is set up using the common login device exceeds a preset second threshold.
(3) And in a preset first time, the times of opening the preset service by using the common login equipment exceed a preset third threshold value.
(4) And within the preset second time, the times of opening the preset service by using the same virtual resource account exceed a preset fourth threshold.
The first threshold, the second threshold, the third threshold, the fourth threshold, the first time and the first time may be set according to the requirements of the practical application, and are not described herein again.
For example, by taking the example that the payment of less than 40 yuan is determined as the small amount transaction and the small amount transaction needs to be limited, if the first threshold and the second threshold are 5 times, the third threshold and the fourth threshold are 8 times, and both the first time and the second time are 24 hours, then if the user a opens a certain electronic payment account in the K city by using his mobile phone for 7 times, and opens a service for 10 small amount transactions within 5 hours by using the electronic payment account, at this time, it may be determined that the user a meets the preset policy, so it may be determined that the user a is a malicious user, and step 208 may be executed. Otherwise, if the number of times that the user a opens a certain electronic payment account in the K city is lower than 5, the number of times that the user a opens a certain electronic payment account through the mobile phone of the user a is lower than 5, the number of times that the user a opens the preset service using the mobile phone of the user a is lower than 8 within 24 hours, and the number of times that the user a opens the preset service using the same bank account is lower than 8 within 24 hours, it may be determined that the user a does not satisfy the preset policy, it may be determined that the user a is a non-malicious user, step 209 may be performed, and so on.
It should be noted that the preset policy may be preset by an operation and maintenance person, or may be set by a user, the four cases (1), (2), (3), and (4) listed above are merely examples, and it should be understood that, in addition to the above four cases, other cases may also be included, for example, if the total number of times of opening the preset service by using several fixed virtual resource accounts exceeds a preset fourth threshold in a third time (which may be set according to a requirement), the user may also be considered as a malicious user, and the like, which is not described herein again.
208. And when the service server determines that the requesting user is a malicious user, shielding an interface corresponding to the virtual resource information meeting the preset conditions to obtain a shielded virtual article list, and sending the shielded virtual article list to the requesting terminal.
The shielding manner may be determined according to the requirement of the actual application, for example, the service server may specifically delete or not display the interface corresponding to the virtual resource information that meets the preset condition, and the like.
For example, in an example where payment of 40 yuan or less is determined as a small amount transaction and the small amount transaction needs to be limited, if the virtual item is service a, and the service a includes two interfaces, i.e., "year-on-package" purchase trigger key and "month-on-package" purchase trigger key, where the price of "year-on-package" is "100 yuan" and the price of "month-on-package" is 10 yuan, when the requesting user is determined to be a malicious user, the "month-on-package" purchase trigger key may be masked to obtain a masked virtual item list, and then the masked virtual item list is sent to the requesting terminal.
Thereafter, the requesting terminal may perform a subsequent preset operation based on the masked virtual item list, where the preset operation may be determined according to requirements of an actual application. For example, taking the IOS system as an example, the following may be specifically used:
after receiving the masked virtual item list, the requesting terminal may display the masked virtual item list to the requesting user (it should be noted that, when displaying, virtual resource information corresponding to each interface, such as price, may not be displayed), and compared to the original virtual item list, at this time, the requesting user can only see a part of purchase items, for example, see fig. 2b, where the left diagram of fig. 2b is a display interface of a service a in the normally displayed virtual item list (i.e., a display interface of a service a in the original virtual item list displayed by a non-malicious user), in the display interface, there are two interfaces of a "package year" purchase item and a "package month" purchase item, and the right diagram of fig. 2b is a display interface of a service a in the masked virtual item list corresponding to the malicious user, and since at this time, only the "package month" purchase item of the service a is masked, the user sees the "package year" purchase item, but cannot see the "package month" purchase item, and so on the like. When a requesting user selects a certain purchase item of a certain virtual article, for example, clicking a package year option of a purchase service a, the requesting terminal sends a production identifier of the purchase item to the apple server, and then, may receive information, such as description information and/or price, of the corresponding purchase item returned by the apple server according to the production identifier, and when the user clicks to confirm the purchase of the purchase item, the requesting terminal sends a purchase request to the apple server, and after the apple server completes the purchase, the requesting terminal returns a purchase completion credential to the requesting terminal, and sends the credential to the service server, and the service server sends the credential to the apple server for verification, and if the verification result indicates that the credential is valid, the service server opens a package year service related to the service a for the user, and the process is ended.
In addition, the service server may also limit the number of times that the requesting user sets up the virtual resource account, even block the virtual resource account of the requesting user or other related accounts, and the like, which may be determined according to the requirements of the actual application and will not be described herein again.
209. And when determining that the requesting user is a non-malicious user, the service server provides the original virtual item list to the requesting user.
Thereafter, the request terminal may perform subsequent preset operations based on the original virtual item list, where the preset operations may be determined according to requirements of actual applications, which may specifically refer to step 204, and details are not described herein.
It can be known from the foregoing that, after receiving a virtual article display request carrying a user identifier of a requesting user, a service server in this embodiment may obtain an original virtual article list according to the virtual article display request, where the original virtual article list includes at least one virtual article, each virtual article includes at least one interface for requesting transfer of a virtual resource and virtual resource information corresponding to each interface, and then, when it is determined that virtual resource information meeting preset conditions exists, obtain a user tag of the requesting user according to the user identifier of the requesting user, and determine whether the requesting user is a malicious user according to the user tag, if so, shield an interface corresponding to the virtual resource information meeting the preset conditions, provide the shielded virtual article list to the requesting user, and otherwise, provide the original virtual article list to the requesting user; according to the scheme, the malicious user can be identified according to the user tag, the interface corresponding to the virtual resource information meeting the preset conditions in the virtual object list requested by the malicious user is shielded, so that the requesting user is limited to perform further operations based on the interface, such as purchasing of virtual objects, and the like, and normal display is performed on the non-malicious user, so that the attack of the malicious user can be reduced and the safety of virtual resource transfer can be improved on the premise that the non-malicious user can perform normal operations.
In addition, because the condition for identifying the malicious user can be adjusted according to the requirement of practical application, compared with the prior art, the flexibility of the method is greatly improved.
It should be noted that the virtual article display method may be applicable to operating systems of various mobile terminals, and may also be applicable to various application scenarios that employ a delayed payment mechanism, such as a small amount transaction scenario, for example, an IAP (in-App Purchase, a payment mode for an intelligent mobile terminal application of an IOS platform) scenario in the IOS platform, and the like, which are not described herein again.
In order to better implement the method, an embodiment of the present invention further provides a virtual article display apparatus, where the virtual article display apparatus may be specifically integrated in a server, such as a business server.
For example, as shown in fig. 3a, the virtual article transferring apparatus includes a receiving unit 301, a list acquiring unit 302, a label acquiring unit 303, and a processing unit 304, as follows:
(1) A receiving unit 301;
a receiving unit 301, configured to receive a virtual article display request, where the virtual article display request carries a user identifier of a requesting user.
The virtual article refers to a non-real article, an article which cannot be touched, and an article derived from a virtual network, which may be a service, such as a membership of a certain terminal application, or a function, such as a certain terminal application, and the like; the requesting user refers to a user requesting virtual article display, such as a user in an operation of purchasing or searching a virtual article, and the like; the user identification may include information such as a user name, a mailbox address, an instant messaging tool account number, and/or a virtual resource account, which may include a bank account number of the requesting user, or other financial-related account number.
(2) A list acquisition unit 302;
a list obtaining unit 302, configured to obtain an original virtual item list according to the virtual item display request.
For example, the list obtaining unit 302 may be specifically configured to obtain the original virtual item list from a preset database according to the virtual item display request.
Alternatively, the list obtaining unit 302 may be specifically configured to obtain a corresponding virtual item from a preset database according to the virtual item display request, and generate an original virtual item list according to the obtained virtual item, and the like.
The original virtual item list may include at least one virtual item, and each virtual item may include at least one interface for requesting to transfer a virtual resource and virtual resource information corresponding to each interface.
The representation form of the interface may be set according to the requirement of the actual application, for example, the representation form may be a purchase trigger key, and the virtual resource information corresponding to the interface refers to profile information of the interface, and the profile information may indicate the amount of virtual resources that need to be transferred.
Optionally, the original virtual item list may further include other information, such as profile information of each virtual item function, profile information of each virtual item developer, shelf life of each virtual item, and/or evaluation information of each virtual item, which will not be described herein again.
(3) A tag acquisition unit 303;
a tag obtaining unit 303, configured to obtain, when it is determined that virtual resource information meeting a preset condition exists, a user tag of the requesting user according to the user identifier of the requesting user.
The user tag refers to behavior data of a user when performing virtual resource related activities, and may specifically include a login location of the user, login equipment, virtual resource account setup information, virtual resource account usage information, and the like.
The preset condition may be set according to a requirement of an actual application, for example, if the preset condition is that "the required transfer amount of the virtual resources is less than a preset number", then at this time, the required transfer amount of the virtual resources may be determined according to the virtual resource information, and if the required transfer amount is less than the preset number, it is determined that the virtual resource information satisfies the preset condition; otherwise, if the required roll-out amount is greater than or equal to the preset amount, it is determined that the virtual resource information does not satisfy the preset condition, that is, as shown in fig. 3b, the display apparatus of the virtual object may further include a determining unit 305, as follows:
the determining unit 305 may be configured to determine a required transferring amount of a virtual resource according to virtual resource information, determine that the virtual resource information satisfies a preset condition if the required transferring amount is less than a preset amount, and determine that the virtual resource information does not satisfy the preset condition if the required transferring amount is greater than or equal to the preset amount.
At this time, the tag obtaining unit 303 may be specifically configured to obtain the user tag of the requesting user according to the user identifier of the requesting user when the determining unit 305 determines that the virtual resource information satisfies the preset condition.
The preset number can be set according to the requirements of practical application, and is not described herein again.
Optionally, the user tag may be pre-stored in the database by the operation and maintenance personnel, or pre-established and stored by the service server, that is, as shown in fig. 3b, the display apparatus for virtual articles may further include an establishing unit 306, as follows:
the establishing unit 306 may be configured to obtain a user identifier, collect login location, login equipment, virtual resource account setup information, and virtual resource account usage information of a user according to the user identifier, establish a user tag according to the collected information, and store a corresponding relationship between the user identifier and the user tag
The tag obtaining unit 303 may be specifically configured to, when the determining unit 305 determines that the virtual resource information satisfies the preset condition, obtain the user tag corresponding to the user identifier of the requesting user according to the corresponding relationship stored in the establishing unit 306.
(4) A processing unit 304;
a processing unit 304, configured to determine whether the requesting user is a malicious user according to the user tag, if yes, mask an interface corresponding to the virtual resource information that meets a preset condition, obtain a masked virtual item list, provide the masked virtual item list to the requesting user, and if not, provide the original virtual item list to the requesting user.
For example, the processing unit 304 may include a determination subunit, a discrimination subunit, and an operation subunit, as follows:
and the determining subunit may be configured to determine, according to the user tag, a common login location, a common login device, virtual resource account setup information, and virtual resource account usage information of the requesting user.
For example, the determining subunit may be specifically configured to determine, according to the user tag, a login location, a login device, virtual resource account setup information, and virtual resource account usage information of the requesting user within a past preset time limit; a login point where the number of times of login exceeds a set first value is determined as a common login point, and a login device where the number of times of login exceeds a set second value is determined as a common login device.
The preset time limit, the first value and the second value may be set according to the requirement of the actual application, for example, the first value may be set to 5 times, the second value may be set to 3 times, and so on, which is not described herein again.
And the judging subunit is used for determining whether the requesting user is a malicious user according to the common login place, the common login equipment, the virtual resource account setup information and the virtual resource account use information.
For example, the determining subunit may be specifically configured to determine whether the requesting user meets a preset policy according to the common login location, the common login device, the virtual resource account setup information, and the virtual resource account usage information, and if so, determine that the requesting user is a malicious user; if not, determining that the requesting user is a non-malicious user.
The preset policy may be determined according to a requirement of an actual application, for example, the preset policy includes any one or more of the following conditions:
A. the times of setting up the virtual resource account at the common login place exceed a preset first threshold;
B. the times of setting up the virtual resource account by using the common login equipment exceed a preset second threshold;
C. within a preset first time, the times of opening a preset service by using the common login equipment exceed a preset third threshold;
D. and in the preset second time, the times of opening the preset service by using the same virtual resource account exceed a preset fourth threshold value.
The first threshold, the second threshold, the third threshold, the fourth threshold, the first time and the first time may be set according to the requirements of the practical application, and are not described herein again.
It should be noted that the preset policy may be preset by an operation and maintenance person, or may be set by a user, the four cases listed above are merely examples, and it should be understood that, in addition to the four cases, other cases may also be included, for example, if the total number of times of opening the preset service by using several fixed virtual resource accounts exceeds a preset fourth threshold in a third time, the user may also be considered as a malicious user, and so on, which are not described herein again.
The operation subunit may be configured to, when the determining subunit determines that the requesting user is a malicious user, shield an interface corresponding to the virtual resource information that meets the preset condition to obtain a shielded virtual item list, provide the shielded virtual item list to the requesting user, and when the determining subunit determines that the requesting user is a non-malicious user, provide the original virtual item list to the requesting user.
Optionally, if it is determined that there is no virtual resource information that meets a preset condition, that is, all the virtual resource information in the virtual item list does not meet the preset condition, a preset rule may be used for processing, where the preset rule may be set according to a requirement of an actual application, for example, the original virtual item list may be provided to the requesting user, and so on, that is:
the processing unit 304 may be further configured to provide the original virtual item list to the requesting user when it is determined that there is no virtual resource information satisfying a preset condition.
In a specific implementation, the above units may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and the specific implementation of the above units may refer to the foregoing embodiments, which are not described herein again.
As can be seen from the above, after the transfer device of this embodiment receives a virtual article display request carrying a user identifier of a requesting user, the list obtaining unit 302 obtains an original virtual article list according to the virtual article display request, where the original virtual article list includes at least one virtual article, each virtual article includes at least one interface for requesting transfer of a virtual resource and virtual resource information corresponding to each interface, and then, when it is determined that virtual resource information meeting preset conditions exists, the tag obtaining unit 303 obtains a user tag of the requesting user according to the user identifier of the requesting user, and the processing unit 304 determines whether the requesting user is a malicious user according to the user tag, if so, the interface corresponding to the virtual resource information meeting the preset conditions is shielded, and the shielded virtual article list is provided to the requesting user, otherwise, the original virtual article list is provided to the requesting user; according to the scheme, the malicious user can be identified according to the user tag, the interface corresponding to the virtual resource information meeting the preset conditions in the virtual object list requested by the malicious user is shielded, so that the requesting user is limited to perform further operation based on the interface, for example, virtual resource transfer is performed, and normal display is performed on the non-malicious user.
Correspondingly, an embodiment of the present invention further provides a server, as shown in fig. 4, which shows a schematic structural diagram of the server according to the embodiment of the present invention, specifically:
the server may include components such as a processor 401 of one or more processing cores, memory 402 of one or more computer-readable storage media, a power supply 403, and an input unit 404. Those skilled in the art will appreciate that the server architecture shown in FIG. 4 is not meant to be limiting, and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. Wherein:
the processor 401 is a control center of the server, connects various parts of the entire server using various interfaces and lines, performs various functions of the server and processes data by running or executing software programs and/or modules stored in the memory 402 and calling data stored in the memory 402, thereby performing overall detection of the server. Optionally, processor 401 may include one or more processing cores; preferably, the processor 401 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 401.
The memory 402 may be used to store software programs and modules, and the processor 401 executes various functional applications and data processing by operating the software programs and modules stored in the memory 402. The memory 402 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to the use of the server, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 402 may also include a memory controller to provide the processor 401 access to the memory 402.
The server further includes a power supply 403 for supplying power to each component, and preferably, the power supply 403 may be logically connected to the processor 401 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The power supply 403 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The server may also include an input unit 404, the input unit 404 being operable to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the server may further include a display unit and the like, which will not be described in detail herein. Specifically, in this embodiment, the processor 401 in the server loads the executable file corresponding to the process of one or more application programs into the memory 402 according to the following instructions, and the processor 401 runs the application program stored in the memory 402, thereby implementing various functions as follows:
receiving a virtual article display request carrying a user identifier of a requesting user; acquiring an original virtual article list according to the virtual article display request, wherein the original virtual article list comprises at least one virtual article, and each virtual article comprises at least one interface for requesting to transfer virtual resources and virtual resource information corresponding to each interface; when virtual resource information meeting preset conditions is determined to exist, a user tag of a requesting user is obtained according to a user identifier of the requesting user, whether the requesting user is a malicious user is determined according to the user tag, if yes, an interface corresponding to the virtual resource information meeting the preset conditions is shielded, a shielded virtual article list is obtained, and the shielded virtual article list is provided for the requesting user; if not, the original virtual item list is provided to the requesting user.
The preset condition may be set according to a requirement of an actual application, for example, if the preset condition is that "the required transfer amount of the virtual resources is less than a preset number", then at this time, the required transfer amount of the virtual resources may be determined according to the virtual resource information, and if the required transfer amount is less than the preset number, it is determined that the virtual resource information satisfies the preset condition; otherwise, if the required transfer amount is larger than or equal to the preset amount, determining that the virtual resource information does not meet the preset condition.
The preset number can be set according to the requirements of practical application, and is not described herein again.
Optionally, the user tag may be pre-stored in the database by the operation and maintenance personnel, or pre-established and stored by the display device of the virtual article, that is, the processor 401 may further run the application program stored in the memory 402 to implement the following functions:
the method comprises the steps of obtaining a user identification, collecting information such as a login place, login equipment, virtual resource account setting information and virtual resource account use information of a user according to the user identification, establishing a user label according to the collected information, and storing a corresponding relation between the user identification and the user label.
Therefore, when the virtual resource information meeting the preset condition is determined to exist, the user label corresponding to the user identifier of the requesting user can be obtained according to the stored corresponding relation.
Optionally, there may be multiple ways of determining whether the requesting user is a malicious user, for example, the information such as a common login location, a common login device, virtual resource account setup information, and virtual resource account usage information of the requesting user may be determined according to the user tag, and then, whether the requesting user is a malicious user is determined according to the information such as the common login location, the common login device, the virtual resource account setup information, and the virtual resource account usage information, which may specifically be as follows:
and determining whether the requesting user meets a preset strategy or not according to the information such as the common login place, the common login equipment, the virtual resource account setup information, the virtual resource account use information and the like, if so, determining that the requesting user is a malicious user, otherwise, determining that the requesting user is a non-malicious user.
The preset policy may be determined according to a requirement of an actual application, for example, the preset policy includes the following:
the times of setting up the virtual resource account at the common login place exceed a preset first threshold;
and/or the times of setting up the virtual resource account by using the common login equipment exceed a preset second threshold;
and/or the frequency of opening the preset service by using the common login equipment exceeds a preset third threshold within a preset first time;
and/or within the preset second time, the times of opening the preset service by using the same virtual resource account exceed a preset fourth threshold.
The first threshold, the second threshold, the third threshold, the fourth threshold, the first time and the first time may be set according to the requirements of the practical application, and are not described herein again.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
As can be seen from the above, after receiving a virtual article display request carrying a user identifier of a requesting user, a server of this embodiment may obtain an original virtual article list according to the virtual article display request, where the original virtual article list includes at least one virtual article, each virtual article includes at least one interface for requesting transfer of virtual resources and virtual resource information corresponding to each interface, and then, when it is determined that virtual resource information meeting preset conditions exists, obtain a user tag of the requesting user according to the user identifier of the requesting user, and determine whether the requesting user is a malicious user according to the user tag, if so, shield an interface corresponding to the virtual resource information meeting the preset conditions, provide the shielded virtual article list to the requesting user, and otherwise, provide the original virtual article list to the requesting user; according to the scheme, the malicious user can be identified according to the user tag, the interface corresponding to the virtual resource information meeting the preset conditions in the virtual object list requested by the malicious user is shielded, so that the requesting user is limited to perform further operation based on the interface, for example, virtual resource transfer is performed, and normal display is performed on the non-malicious user.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions, or by instructions controlling associated hardware, which may be stored in a computer-readable storage medium and loaded and executed by a processor.
To this end, the present invention further provides a storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to execute the steps in any one of the methods for displaying a virtual article provided by the embodiments of the present invention.
For example, the instructions may perform the steps of:
receiving a virtual article display request carrying a user identifier of a requesting user; acquiring an original virtual article list according to the virtual article display request, wherein the original virtual article list comprises at least one virtual article, and each virtual article comprises at least one interface for requesting to transfer virtual resources and virtual resource information corresponding to each interface; when virtual resource information meeting preset conditions is determined to exist, a user tag of a requesting user is obtained according to a user identifier of the requesting user, whether the requesting user is a malicious user is determined according to the user tag, if yes, an interface corresponding to the virtual resource information meeting the preset conditions is shielded, a shielded virtual article list is obtained, and the shielded virtual article list is provided for the requesting user; if not, the original virtual item list is provided to the requesting user.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the storage medium may include: read Only Memory (ROM), random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium may execute the steps in any of the methods for displaying a virtual article provided in the embodiments of the present invention, the beneficial effects that can be achieved by any of the methods for displaying a virtual article provided in the embodiments of the present invention can be achieved, which are detailed in the foregoing embodiments and will not be described again here.
The method, the apparatus, and the storage medium for displaying a virtual article according to the embodiments of the present invention are described in detail above, and a specific example is applied in the description to explain the principle and the implementation of the present invention, and the description of the above embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (13)

1. A method for displaying a virtual article, comprising:
receiving a virtual article display request, wherein the virtual article display request carries a user identifier of a requesting user;
acquiring an original virtual article list according to the virtual article display request, wherein the original virtual article list comprises at least one virtual article, and each virtual article comprises at least one interface for requesting to transfer virtual resources and virtual resource information corresponding to each interface;
when the virtual resource information meeting the preset conditions is determined to exist, acquiring a user tag of a requesting user according to the user identification of the requesting user;
determining whether the requesting user is a malicious user or not according to the user tag;
if so, shielding an interface corresponding to the virtual resource information meeting the preset conditions to obtain a shielded virtual article list, and providing the shielded virtual article list to the requesting user;
and if not, providing the original virtual article list to the requesting user.
2. The method of claim 1, wherein determining whether the requesting user is a malicious user based on the user tag comprises:
determining a common login place, common login equipment, virtual resource account setting information and virtual resource account use information of a requesting user according to the user tag;
and determining whether the requesting user is a malicious user according to the common login place, the common login equipment, the virtual resource account setup information and the virtual resource account use information.
3. The method of claim 2, wherein determining the common login location, common login device, virtual resource account setup information, and virtual resource account usage information of the requesting user from the user tag comprises:
determining a login place, login equipment, virtual resource account setup information and virtual resource account use information of a requesting user within a past preset time limit according to the user tag;
the login point with the login number exceeding the set first value is determined as a common login point, and the login device with the login number exceeding the set second value is determined as a common login device.
4. The method of claim 2, wherein determining whether a requesting user is a malicious user based on the common login location, common login device, virtual resource account setup information, and virtual resource account usage information comprises:
determining whether the requesting user meets a preset strategy or not according to the common login place, the common login equipment, the virtual resource account setup information and the virtual resource account use information; the preset strategy comprises the following steps: the frequency of setting up a virtual resource account at the common login location exceeds a preset first threshold, and/or the frequency of setting up a virtual resource account by using the common login equipment exceeds a preset second threshold, and/or the frequency of opening a preset service by using the common login equipment exceeds a preset third threshold within a preset first time, and/or the frequency of opening a preset service by using the same virtual resource account exceeds a preset fourth threshold within a preset second time;
if so, determining that the requesting user is a malicious user;
if not, determining that the requesting user is a non-malicious user.
5. The method according to any one of claims 1 to 4, wherein determining whether the virtual resource information satisfies a preset condition comprises:
determining the amount of the virtual resources to be transferred according to the virtual resource information;
if the required transfer amount is less than a preset amount, determining that the virtual resource information meets a preset condition;
and if the required transfer amount is larger than or equal to the preset amount, determining that the virtual resource information does not meet the preset condition.
6. The method according to any one of claims 1 to 4, wherein before obtaining the user tag of the requesting user according to the identifier of the requesting user, the method further comprises:
acquiring a user identifier;
collecting the login place, the login equipment, the virtual resource account setting information and the virtual resource account use information of the user according to the user identification;
establishing a user label according to the acquired information, and storing the corresponding relation between the user identification and the user label;
the obtaining of the user tag of the requesting user according to the user identifier of the requesting user includes: and acquiring a user label corresponding to the user identifier of the requesting user according to the stored corresponding relation.
7. A display device for a virtual article, comprising:
the virtual article display system comprises a receiving unit, a display unit and a display unit, wherein the receiving unit is used for receiving a virtual article display request which carries a user identifier of a requesting user;
a list obtaining unit, configured to obtain an original virtual item list according to the virtual item display request, where the original virtual item list includes at least one virtual item, and each virtual item includes at least one interface for requesting transfer of a virtual resource and virtual resource information corresponding to each interface;
the portrait acquisition unit is used for acquiring a user tag of a requesting user according to a user identifier of the requesting user when the virtual resource information meeting the preset condition is determined to exist;
and the processing unit is used for determining whether the requesting user is a malicious user according to the user tag, if so, shielding an interface corresponding to the virtual resource information meeting preset conditions to obtain a shielded virtual article list, and providing the shielded virtual article list to the requesting user, and if not, providing the original virtual article list to the requesting user.
8. The apparatus of claim 7, wherein the processing unit comprises a determining subunit, a discriminating subunit, and an operating subunit;
the determining subunit is specifically configured to determine, according to the user tag, a common login location, common login equipment, virtual resource account setup information, and virtual resource account usage information of the requesting user;
the judging subunit is configured to determine whether the requesting user is a malicious user according to the common login location, the common login device, the virtual resource account setup information, and the virtual resource account usage information;
the operation subunit is configured to, when the judgment subunit determines that the requesting user is a malicious user, shield an interface corresponding to the virtual resource information that meets a preset condition to obtain a shielded virtual item list, provide the shielded virtual item list to the requesting user, and when the judgment subunit determines that the requesting user is a non-malicious user, provide the original virtual item list to the requesting user.
9. The apparatus of claim 8,
the determining subunit is specifically configured to determine, according to the user tag, a login location, login equipment, virtual resource account setup information, and virtual resource account usage information of the requesting user within a past preset time limit; a login point where the number of times of login exceeds a set first value is determined as a common login point, and a login device where the number of times of login exceeds a set second value is determined as a common login device.
10. The apparatus according to claim 8, wherein the determining subunit is specifically configured to:
determining whether the requesting user meets a preset strategy or not according to the common login place, the common login equipment, the virtual resource account setup information and the virtual resource account use information; the preset strategy comprises the following steps: the frequency of setting up a virtual resource account at the common login location exceeds a preset first threshold, and/or the frequency of setting up a virtual resource account by using the common login equipment exceeds a preset second threshold, and/or the frequency of opening a preset service by using the common login equipment exceeds a preset third threshold within a preset first time, and/or the frequency of opening a preset service by using the same virtual resource account exceeds a preset fourth threshold within a preset second time;
if so, determining that the requesting user is a malicious user;
if not, determining that the requesting user is a non-malicious user.
11. The apparatus according to any one of claims 7 to 10, further comprising a judging unit;
the judging unit is used for determining the required transfer-out amount of the virtual resources according to the virtual resource information, if the required transfer-out amount is smaller than a preset amount, the virtual resource information is determined to meet a preset condition, and if the required transfer-out amount is larger than or equal to the preset amount, the virtual resource information is determined not to meet the preset condition;
the portrait acquiring unit is specifically configured to acquire a user tag of the requesting user according to the user identifier of the requesting user when the judging unit determines that the virtual resource information meets a preset condition.
12. The apparatus of claim 11, further comprising a setup unit;
the establishing unit is used for acquiring a user identifier, acquiring login location, login equipment, virtual resource account setting information and virtual resource account use information of a user according to the user identifier, establishing a user tag according to the acquired information, and storing the corresponding relation between the user identifier and the user tag
The portrait acquiring unit is specifically configured to, when the judging unit determines that the virtual resource information satisfies a preset condition, acquire, according to the correspondence relationship stored by the establishing unit, a user tag corresponding to the user identifier of the requesting user.
13. A storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps of the method for displaying a virtual article according to any one of claims 1 to 6.
CN201710804677.4A 2017-09-08 2017-09-08 Virtual article display method and device and storage medium Active CN109472656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710804677.4A CN109472656B (en) 2017-09-08 2017-09-08 Virtual article display method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710804677.4A CN109472656B (en) 2017-09-08 2017-09-08 Virtual article display method and device and storage medium

Publications (2)

Publication Number Publication Date
CN109472656A CN109472656A (en) 2019-03-15
CN109472656B true CN109472656B (en) 2022-11-29

Family

ID=65657792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710804677.4A Active CN109472656B (en) 2017-09-08 2017-09-08 Virtual article display method and device and storage medium

Country Status (1)

Country Link
CN (1) CN109472656B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111144859A (en) * 2019-12-27 2020-05-12 腾讯科技(深圳)有限公司 Virtual resource transfer method and device, computer equipment and storage medium
CN112348626A (en) * 2020-09-29 2021-02-09 北京沃东天骏信息技术有限公司 Article information processing method and device
CN112365319A (en) * 2020-11-20 2021-02-12 北京沃东天骏信息技术有限公司 Method and device for displaying articles in virtual resources
CN114884720B (en) * 2022-04-29 2023-12-12 北京达佳互联信息技术有限公司 Resource request processing method, device, electronic equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079139A (en) * 2007-03-27 2007-11-28 腾讯科技(深圳)有限公司 Dummy article transaction system and method
CN103854191A (en) * 2012-12-06 2014-06-11 腾讯科技(深圳)有限公司 Online application virtual resource automatic transaction method and device
US9258312B1 (en) * 2010-12-06 2016-02-09 Amazon Technologies, Inc. Distributed policy enforcement with verification mode
CN105528726A (en) * 2015-07-30 2016-04-27 广州交易猫信息技术有限公司 Virtual article transaction assistant method and device and virtual article transaction system
CN105897715A (en) * 2016-04-12 2016-08-24 成都景博信息技术有限公司 Method of intelligently processing Internet of Vehicles data
CN106302122A (en) * 2016-08-16 2017-01-04 腾讯科技(深圳)有限公司 Virtual objects management method and device
CN106408379A (en) * 2016-09-07 2017-02-15 广州华多网络科技有限公司 Virtual item configuration method, device and mobile terminal
CN106803168A (en) * 2016-12-30 2017-06-06 中国银联股份有限公司 A kind of abnormal transfer accounts method for detecting and device
CN106851426A (en) * 2017-03-29 2017-06-13 福建中金在线信息科技有限公司 The generation method and device of a kind of virtual objects
CN106941410A (en) * 2017-01-24 2017-07-11 苏宁云商集团股份有限公司 The quick methods of exhibiting and device of a kind of virtual objects

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1858794A (en) * 2006-03-27 2006-11-08 华为技术有限公司 Virtual article leasing processing system and method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079139A (en) * 2007-03-27 2007-11-28 腾讯科技(深圳)有限公司 Dummy article transaction system and method
US9258312B1 (en) * 2010-12-06 2016-02-09 Amazon Technologies, Inc. Distributed policy enforcement with verification mode
CN103854191A (en) * 2012-12-06 2014-06-11 腾讯科技(深圳)有限公司 Online application virtual resource automatic transaction method and device
CN105528726A (en) * 2015-07-30 2016-04-27 广州交易猫信息技术有限公司 Virtual article transaction assistant method and device and virtual article transaction system
CN105897715A (en) * 2016-04-12 2016-08-24 成都景博信息技术有限公司 Method of intelligently processing Internet of Vehicles data
CN106302122A (en) * 2016-08-16 2017-01-04 腾讯科技(深圳)有限公司 Virtual objects management method and device
CN106408379A (en) * 2016-09-07 2017-02-15 广州华多网络科技有限公司 Virtual item configuration method, device and mobile terminal
CN106803168A (en) * 2016-12-30 2017-06-06 中国银联股份有限公司 A kind of abnormal transfer accounts method for detecting and device
CN106941410A (en) * 2017-01-24 2017-07-11 苏宁云商集团股份有限公司 The quick methods of exhibiting and device of a kind of virtual objects
CN106851426A (en) * 2017-03-29 2017-06-13 福建中金在线信息科技有限公司 The generation method and device of a kind of virtual objects

Also Published As

Publication number Publication date
CN109472656A (en) 2019-03-15

Similar Documents

Publication Publication Date Title
US11182844B2 (en) Virtual resource transfer method, client device, application server, and system
CN109472656B (en) Virtual article display method and device and storage medium
CN110442712B (en) Risk determination method, risk determination device, server and text examination system
CN108112038B (en) Method and device for controlling access flow
CN102214334B (en) A kind of online payment method, Apparatus and system
CN109166027A (en) A kind of loaning bill contract processing method and processing device
CN104980403B (en) The processing method and processing device of service request
CN104618101A (en) Data processing method, intermediate server and data processing system
CN106296154A (en) Transaction methods and system
CN107358426A (en) The method and apparatus for capturing malice reimbursement user
CN109426961B (en) Card binding risk control method and device
CN109785107B (en) Method for flexibly configuring fund duty ratio and related products
CN105512208B (en) Information publishing method, device and system
CN102568125A (en) System and method for performing credit card consumption through fingerprint identification
CN107301236A (en) Application searches method, mobile terminal, server and computer-readable recording medium
CN115983907A (en) Data recommendation method and device, electronic equipment and computer readable medium
CN109658083A (en) Memory, broadband fee payment method, device and equipment based on wechat small routine
CN112861140B (en) Service data processing method and device and readable storage medium
CN109919767B (en) Transaction risk management method, device and equipment
CN111445325B (en) Credit card information processing method, device, system and storage medium
CN104899727A (en) Data transfer method and related device and system
CN112348661B (en) Service policy distribution method and device based on user behavior track and electronic equipment
CN110263044B (en) Data storage method, device, equipment and computer readable storage medium
CN111047341B (en) Information processing method, device, server and terminal equipment
CN112200396B (en) Resource transfer and allocation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant