CN111681024A - Risk management method and device in information popularization, electronic equipment and storage medium - Google Patents

Risk management method and device in information popularization, electronic equipment and storage medium Download PDF

Info

Publication number
CN111681024A
CN111681024A CN202010301150.1A CN202010301150A CN111681024A CN 111681024 A CN111681024 A CN 111681024A CN 202010301150 A CN202010301150 A CN 202010301150A CN 111681024 A CN111681024 A CN 111681024A
Authority
CN
China
Prior art keywords
verification
terminal
risk
preset
invitation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010301150.1A
Other languages
Chinese (zh)
Inventor
陈博
刘禹彤
张嘉伟
黎文杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qiyue Information Technology Co Ltd
Original Assignee
Shanghai Qiyue Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qiyue Information Technology Co Ltd filed Critical Shanghai Qiyue Information Technology Co Ltd
Priority to CN202010301150.1A priority Critical patent/CN111681024A/en
Publication of CN111681024A publication Critical patent/CN111681024A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0225Avoiding frauds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0236Incentive or reward received by requiring registration or ID from user

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a risk management method in information popularization, which comprises the following steps: responding to a sharing request which is sent by a first terminal and related to a target page/target application, generating an invitation link, and feeding back the invitation link to the first terminal so as to send the invitation link to at least one target user through an invitation channel appointed by a user; feeding back a target page content/target application downloading inlet to at least one second terminal in response to an access request/downloading request sent by the at least one second terminal; responding to a registration request sent by at least one second terminal, and acquiring registration data of at least one target user corresponding to each second terminal; and carrying out risk identification based on the registration data, and carrying out risk control according to preset risk control measures when the current risk is identified. The method can identify risks and manage and control the risks, and reduces information popularization cost. Correspondingly, the invention further provides a risk management device, electronic equipment and a computer-readable storage medium in the information popularization.

Description

Risk management method and device in information popularization, electronic equipment and storage medium
Technical Field
The present invention relates to the field of computers, and in particular, to a risk management method and apparatus in information popularization, an electronic device, and a computer-readable storage medium.
Background
With the development of computer technology, advertisement delivery on the internet becomes one of the mainstream means of information popularization. In addition to placing advertisement information on a webpage, a behavior of sharing information manually initiated by a user is also a common way of information promotion. The sharing behavior of the shared information generally refers to that a user automatically releases a webpage link of the popularization information, for example, the webpage link or an invitation code corresponding to the webpage link is shared to other users through a social platform to invite a new user to view and click the webpage link, and subsequent operations are performed on an internet resource (such as an APP application or a promotion activity) to which the webpage link points, such as downloading and registering, or generating a transaction order, or forwarding and sharing the internet resource again.
To achieve better promotion, users are usually stimulated to share their enthusiasm by providing various reward mechanisms, such as issuing corresponding virtual point rewards, monetary rewards, and other resources to the users, and then distributing the corresponding rewards according to the number of new users invited by the users through the sharing. However, there are more and more merchants promoting information in this way, and increasingly many cheating methods are emerging to cheat the rewards. Particularly, in the mode of issuing the invitation code, the user shares out the invitation link of the user, and then extracts the invitation code parameter of the user from the invitation link. And then putting the mobile phone into cheating software, wherein the cheating software can be switched with cheating telephone card merchants, equipment and IP, so that the effect of assisting the user in making a large number by multiple numbers is achieved. Therefore, if such a risk cannot be avoided, the promotion cost of the merchant will be greatly increased.
Based on this, how to identify risks in the information popularization process is a problem which needs to be solved urgently at present.
The above information disclosed in this background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of the above, the present specification has been made to provide a risk management method in information dissemination, an apparatus thereof, an electronic device, and a computer-readable storage medium that overcome or at least partially solve the above problems.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or may be learned by practice of the disclosure.
In a first aspect, the present invention discloses a risk management method in information promotion, including:
responding to a sharing request which is sent by a first terminal and related to a target page/target application, generating an invitation link, and feeding back the invitation link to the first terminal so as to send the invitation link to at least one target user through an invitation channel appointed by a user; the invitation link points to the target page/the target application;
responding to an access request/download request sent by at least one second terminal, and feeding back target page content/the target application download entrance to at least one second terminal; the access request/download request is generated when the second terminal corresponds to a target user to access the invitation link, and comprises a unique identification code for uniquely identifying the target user;
responding to a registration request sent by at least one second terminal, and acquiring registration data of at least one target user corresponding to each second terminal;
and performing risk identification based on at least one verification parameter in the registration data, and performing risk control according to preset risk control measures when the current risk is identified.
In an exemplary embodiment of the present disclosure, the step of performing risk identification specifically includes:
verifying the second terminal used by the target user during registration based on the equipment identifier in the registration data; and/or the presence of a gas in the gas,
verifying the network environment when the target user is registered based on the network environment parameters in the registration data; and/or the presence of a gas in the gas,
checking the registration interval time among the target users based on the registration time in the registration data; and/or the presence of a gas in the gas,
checking an invitation channel of the second terminal for receiving the invitation link based on the invitation channel identification in the registration data;
and if the verification result is that the verification is passed, judging that the risk exists currently. .
In an exemplary embodiment of the present disclosure, each verification parameter corresponds to a preset verification operation, and accordingly, the step of performing risk identification specifically includes:
performing at least one preset check based on at least one check parameter, and judging that the risk exists currently when the check result of any preset check operation is that the check is passed; alternatively, the first and second electrodes may be,
and checking step by step based on the priority of each preset checking operation, and judging that the current risk exists when the checking result of the preset checking operation of any priority passes the checking.
In an exemplary embodiment of the present disclosure, the step of performing a step-by-step verification based on a priority of each preset verification operation specifically includes:
performing preset checking operation of a first priority order based on a first checking parameter in the registration data; if the risk passes the verification, judging that the risk exists at present;
if the verification is not passed, performing preset verification operation of a second priority based on a second verification parameter in the registration data, and if the verification is passed, judging that the risk exists currently;
if the verification is not passed, performing third-priority preset verification operation based on a third verification parameter in the registration data, and if the verification is passed, judging that the risk exists currently;
and if the verification fails, performing preset verification operation of a fourth priority based on a fourth verification parameter in the registered data, if the verification passes, judging that the risk exists currently, and if the verification fails, judging that the risk does not exist currently.
In an exemplary embodiment of the present disclosure, the first verification parameter is a device identifier of the second terminal used when the target user is registered; and/or the second check-up parameter is a network environment parameter of the network environment registered by the target user; and/or the third verification parameter is the registration time of the target user; and/or the fourth verification parameter is an invitation channel identifier of an invitation channel of the invitation link received by the second terminal.
In an exemplary embodiment of the present disclosure, the step of performing verification based on the device identifier specifically includes:
identifying each target user registered by the same second terminal according to the equipment identifier uniquely identifying the second terminal in the registration data;
and judging whether the number of the target users registered through the same second terminal on the same day is larger than a first preset threshold number of people, and if so, judging that the verification is passed.
In an exemplary embodiment of the present disclosure, the step of performing verification based on the network environment parameter specifically includes:
identifying each target user registered in the same network environment according to the network environment parameters in the registration data;
and judging whether the number of the target users registered in the same network environment on the same day is greater than a first preset threshold number of people, and if so, judging that the verification is passed.
In an exemplary embodiment of the present disclosure, the step of performing verification based on the invitation channel identifier specifically includes:
identifying each target user invited through the same invitation channel and completing registration according to the invitation channel identification in the registration data;
and judging whether the number of target users who are invited through the same invitation channel and finish the registration on the same day is larger than a first preset threshold value, if so, judging that the verification is passed.
In an exemplary embodiment of the present disclosure, the step of performing verification based on the registration time specifically includes:
identifying each target user with the registration interval time smaller than or equal to a preset interval time threshold according to the registration time of each target user in the registration data;
and judging whether the number of target users with the registration interval time smaller than the preset interval time threshold is larger than the number of users with a second preset threshold, and if so, judging that the verification is passed.
In an exemplary embodiment of the present disclosure, the risk management measures include: and reducing the total number of the rewarded users to a third preset number threshold.
In a second aspect, the present invention provides a risk management device in information promotion, including:
the first response module is used for responding to a sharing request which is sent by the first terminal and related to a target page/target application, generating an invitation link, feeding the invitation link back to the first terminal and sending the invitation link to at least one target user through an invitation channel specified by a user; the invitation code is used for uniquely identifying the user corresponding to the first terminal, and the invitation link points to the target page/the target application;
the second response module is used for responding to an access request/download request sent by at least one second terminal and feeding back target page content/the target application download entrance to the at least one second terminal; the access request/download request is generated when the second terminal accesses the invitation link and comprises a unique identification code for uniquely identifying a target user corresponding to the second terminal;
a third response module, configured to respond to a registration request sent by at least one second terminal, and acquire registration data of at least one target user corresponding to each second terminal;
the risk identification module is used for carrying out risk identification based on at least one verification parameter in the registration data;
and the risk management and control module is used for managing and controlling the risk according to preset risk management and control measures when the risk identification module identifies that the current risk exists.
In an exemplary embodiment of the present disclosure, each verification parameter corresponds to a preset verification operation, and accordingly,
the risk identification module is specifically configured to perform at least one preset check operation based on at least one check parameter, and determine that a risk exists at present when a check result of any preset check operation is verified.
In an exemplary embodiment of the present disclosure, each verification parameter corresponds to one preset verification operation, and each preset verification operation is provided with a corresponding priority level, and accordingly, the risk management module is specifically configured to perform a step-by-step verification based on the priority level of each preset verification operation, and determine that a risk currently exists when a verification result of a preset verification operation of any previous priority level is that the verification passes.
In an exemplary embodiment of the present disclosure, the risk identification module specifically includes:
a data obtaining unit, configured to obtain at least one verification parameter from the registration data;
the first checking unit is used for carrying out preset checking operation of a priority first order based on a first checking parameter in the registration data; if the risk passes the verification, judging that the risk exists at present;
the second checking unit is used for performing preset checking operation of a second priority based on a second checking parameter in the registered data when the checking result of the first checking unit is that the checking is not passed, and judging that the risk exists at present if the checking is passed;
the third verification unit is used for performing preset verification operation of a third priority order based on a third verification parameter in the registered data when the verification result of the second verification unit is that the verification is not passed, and judging that the risk exists at present if the verification is passed;
and the fourth checking unit is used for performing preset checking operation of a fourth priority based on a fourth checking parameter in the registered data when the checking result of the third checking unit is that the checking is not passed, judging that the risk exists currently if the checking is passed, and judging that the risk does not exist currently if the checking is not passed.
In an exemplary embodiment of the present disclosure, the first verification parameter is a device identifier of the second terminal used when the target user is registered; and/or the second check-up parameter is a network environment parameter of the network environment registered by the target user; and/or the third verification parameter is the registration time of the target user; and/or the fourth verification parameter is an invitation channel identifier of an invitation channel of the invitation link received by the second terminal.
In an exemplary embodiment of the present disclosure, the first checking unit is specifically configured to identify, according to the device identifier, each target user registered through the same second terminal, and determine whether the number of the target users registered through the same second terminal on the same day is greater than a first preset threshold number of users, and if yes, determine that the checking is passed;
the second checking unit is specifically configured to, when the checking result of the first checking unit is that the checking is not passed, identify each target user registered in the same network environment according to the network environment parameter, and determine whether the number of the target users registered in the same network environment on the same day is greater than a first preset threshold number of people, and if so, determine that the checking is passed;
the third verifying unit is specifically configured to, when the verification result of the second verifying unit is failed, identify, according to the invitation channel identifier, each target user who receives the invitation link through the same invitation channel and completes registration, and determine whether the number of target users who receive the invitation link through the same invitation channel on the same day and complete registration is greater than a first preset threshold, and if yes, determine that the verification is passed;
the fourth checking unit is specifically configured to identify each target user invited and registered through the same invitation channel according to the invitation channel identifier when the checking result of the third checking unit is not passed through checking, and determine whether the number of target users invited and registered through the same invitation channel on the same day is greater than a first preset threshold value, and if so, determine that the checking is passed.
In a third aspect, the present specification provides an electronic device comprising a processor and a memory: the memory is used for storing a program of any one of the methods; the processor is configured to execute the program stored in the memory to implement the steps of any of the methods described above.
In a fourth aspect, the present specification provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of any of the above methods.
The invention has the beneficial effects that:
according to the invention, risk identification is carried out based on the registration data of each target user, and when the current risk is identified, risk control is carried out according to the preset risk control measure, so that the problem of information popularization cost increase caused by cheating behavior is avoided.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow diagram illustrating a method of risk management in information dissemination in accordance with an example embodiment;
FIG. 2 is a block diagram illustrating a risk management device in an information dissemination in accordance with another exemplary embodiment;
FIG. 3 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
The example embodiments described below may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another. Thus, a first component discussed below may be termed a second component without departing from the teachings of the disclosed concept. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It is to be understood by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present disclosure and are, therefore, not intended to limit the scope of the present disclosure.
The invention provides a risk management method in information popularization, which is used for solving the problem that the popularization cost is increased due to the risk of cheating behaviors in the prior art, and in order to solve the problem, the general idea of the invention is as follows:
responding to a sharing request which is sent by a first terminal and related to a target page/target application, generating an invitation link containing an invitation code, and feeding back the invitation link to the first intelligent terminal so as to send the invitation link to at least one target user through an invitation channel appointed by a user; wherein the invitation code is for uniquely identifying the user associated with the first terminal, the invitation link pointing to the target page/the target application; responding to an access request/download request sent by at least one second terminal, and feeding back target page information/the target application download entrance to at least one second terminal; wherein the access request/download request is generated when the second terminal accesses the invitation link, and includes a unique identification code for uniquely identifying the target user associated with the second terminal; and responding to a registration request sent by at least one second terminal, acquiring registration data of at least one target user associated with the second terminal, then performing risk identification based on the registration data, and performing risk control according to preset risk control measures when the current risk exists.
In the embodiments of the present invention, the terms referred to are:
the term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The technical solution of the present invention will be described and explained in detail by means of several specific examples.
Referring to fig. 1, the risk management method in information popularization of this embodiment includes:
s101, responding to a sharing request related to a target page/a target application sent by a first terminal, generating an invitation link, and feeding back the invitation link to the first terminal so as to send the invitation link to at least one target user through an invitation channel appointed by a user.
In a specific embodiment, the invitation link includes an invitation code for identifying the user, and the invitation code is generated by the server according to the user information of the user corresponding to the first terminal and the device information of the first terminal device; the invitation link points to the target page/target application, and the information in the target page or the target application is a promotion object of the information promotion.
In this embodiment, when the user triggers the sharing operation instruction, the first terminal displays an invitation page including a plurality of invitation channels (such as QQ, WeChat, friend circle, and copy link), and when the user selects an invitation channel on the invitation page, the server generates an invitation link including an invitation code and feeds the invitation link back to the first terminal, so that the first terminal copies the invitation link.
And S103, responding to the access request/download request sent by the at least one second terminal, and feeding back the target page content/target application download entry to the at least one second terminal.
In this embodiment, the access request/download request is generated when the target user corresponding to the second terminal clicks the invitation link, and includes a unique identification code for uniquely identifying the target user;
and S105, responding to the registration request sent by at least one second terminal, and acquiring the registration data of at least one target user corresponding to each second terminal.
In this embodiment, the registration request is generated by triggering the second terminal through the registration/login page after the target user downloads the target application through the target page or the download portal. Specifically, the registration request includes registration data such as account information of the target user, an identifier of the second terminal device, registration time, a network environment where the target user is registered, and an invitation channel for receiving an invitation link.
And S107, performing risk identification based on at least one verification parameter in the registration data acquired in the step S105.
In this embodiment, each verification parameter corresponds to a preset verification operation, and specifically, the step S105 specifically includes: and performing at least one preset check based on at least one check parameter, and judging that the current risk exists when the check result of any preset check operation is that the check is passed.
In a specific embodiment, the registration data includes four verification parameters, which are respectively device identifiers of the second terminal used for uniquely identifying the target user during registration; network environment parameters of a network environment in which the target user is registered; registration time of the target user; and the second terminal receives the invitation channel identification of the invitation channel of the invitation link.
In a specific embodiment, the corresponding preset verification operations may be performed based on the four verification parameters, and when a verification result of the preset verification operation corresponding to any one of the verification parameters is that the verification is passed, it is determined that the risk exists currently. For example, the following may be:
performing corresponding preset verification operation based on the equipment identification, namely identifying each target user registered through the same second terminal based on the equipment identification, and then judging whether the number of the target users registered through the same second terminal on the same day is larger than a first preset threshold number of people;
performing corresponding preset verification operation based on the network environment parameters, namely identifying each target user registered in the same network environment based on the network environment parameters; then judging whether the number of target users registered in the same network environment on the same day is larger than a first preset threshold number of people or not;
performing corresponding preset verification operation based on the invitation channel identification, namely identifying each target user invited and registered through the same invitation channel based on the invitation channel identification; then judging whether the number of target users who are invited through the same invitation channel and finish the registration on the same day is larger than a first preset threshold value;
performing corresponding preset verification operation based on the registration time, namely identifying each target user with the registration interval time smaller than or equal to a preset interval time threshold value based on the registration time of each target user; and then judging whether the number of target users with the registration interval time smaller than the preset interval time threshold is larger than the number of people with a second preset threshold.
And if any one of the four preset checking operations is passed, judging that the risk exists currently. Of course, it is also possible to perform corresponding verification operations only based on one or two or three of the verification parameters, and determine that the risk exists currently when any one of the verification results passes the verification.
Certainly, a preset verification operation may also be performed based on a verification parameter, for example, the second terminal used in the target user registration is verified based on the device identifier of the second terminal in the registration data, and when the verification result is that the verification is passed, it is determined that the risk exists currently; or two or more than two verification parameters are subjected to corresponding preset verification operation; or, performing progressive verification based on the priority of each preset verification operation, and judging that the current risk exists when the verification result of the preset verification operation of any priority passes the verification.
In another specific embodiment, the step of performing a step-by-step verification based on the priority of the preset verification operation corresponding to each of the four verification parameters specifically includes:
performing preset checking operation of a first priority order based on a first checking parameter in the registered data; if the risk passes the verification, judging that the risk exists at present; if the verification is not passed, performing preset verification operation of a second priority based on a second verification parameter in the registration data, and if the verification is passed, judging that the risk exists currently; if the verification is not passed, performing third-priority preset verification operation based on a third verification parameter in the registered data, and if the verification is passed, judging that the risk exists currently; and if the verification fails, performing preset verification operation of a fourth priority based on a fourth verification parameter in the registered data, if the verification passes, judging that the risk exists currently, and if the verification fails, judging that the risk does not exist currently.
The first verification parameter is an equipment identifier of a second terminal used when the target user is registered, correspondingly, the preset verification operation of the priority first order is to verify the second terminal used when the target user is registered based on the equipment identifier, namely, each target user registered by the same second terminal is identified according to the equipment identifier; then judging whether the number of the target users registered through the same second terminal on the same day is larger than a first preset threshold number of people, and if so, judging that the verification is passed;
the second check parameter is a network environment parameter of a network environment registered by the target user; correspondingly, the preset verification operation of the second priority order is to verify the network environment when the target users are registered based on the network environment parameters, namely to identify each target user registered in the same network environment according to the network environment parameters; then judging whether the number of the target users registered in the same network environment on the same day is larger than a first preset threshold number, and if so, judging that the verification is passed;
the third verification parameter is the registration time of the target user; correspondingly, the preset verification operation of the third priority level is to verify the registration interval time among all target users based on the registration time, namely, all target users with the registration interval time smaller than or equal to a preset interval time threshold are identified according to the registration time of each target user; then judging whether the number of target users with the registration interval time smaller than a preset interval time threshold is larger than a second preset threshold number of people, if so, judging that the verification is passed;
the fourth verification parameter is an invitation channel identifier of an invitation channel for receiving the invitation link by the second terminal; correspondingly, the preset verification operation of the fourth priority is to perform invitation channel verification based on the invitation channel identifier, namely, identify each target user invited and completing registration through the same invitation channel according to the invitation channel identifier; and then judging whether the number of target users who are invited through the same invitation channel and finish the registration is larger than a first preset threshold value or not, and if so, judging that the verification is passed.
Of course, the priority order among the four preset checking operations may be adjusted according to actual needs, and accordingly, the first to fourth checking parameters are also changed accordingly, for example, if the priority of the network environment checking based on the network environment parameters is the first order, then, correspondingly, the first checking parameter is the network environment parameter.
In this embodiment, the number of people is 3 at the first preset threshold, 30s at the preset interval time threshold, and 5 at the second preset threshold.
And S109, when the current risk is identified in the step S107, carrying out risk control according to preset risk control measures.
In this embodiment, the risk management and control measure specifically includes reducing the total number of rewarded users to a third preset number threshold. Specifically, the third preset number threshold is 5 persons; of course, the adjustment can be carried out according to actual needs.
In the embodiment, risk identification is performed based on the registration data of each target user, and when the current risk is identified, risk management and control are performed according to preset risk management and control measures, so that the problem that information popularization cost is increased due to cheating is solved.
Based on the same inventive concept as the risk management method in information popularization in the foregoing embodiments, the present invention also provides a risk management apparatus in information popularization, on which a computer program is stored, which when executed by a processor implements the steps of any one of the foregoing risk management methods.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the methods of the present invention. For details not disclosed in the embodiment of the apparatus of the present embodiment, please refer to the embodiment of the method disclosed herein.
Referring to fig. 2, the risk management apparatus in the information popularization of this embodiment specifically includes:
the first response module 21 is configured to generate an invitation link in response to a sharing request related to a target page/target application and sent by a first terminal, and feed the invitation link back to the first terminal so as to send the invitation link to at least one target user through an invitation channel specified by a user; the invitation code is used for uniquely identifying a user corresponding to the first terminal, and the invitation link points to a target page/target application;
a second response module 22, configured to respond to the access request/download request sent by the at least one second terminal, and feed back a target page content/target application download entry to the at least one second terminal; the access request/download request is generated when the second terminal accesses the invitation link sent by the user and comprises a unique identification code for uniquely identifying a target user corresponding to the second terminal;
a third response module 23, configured to respond to a registration request sent by at least one second terminal, and obtain registration data of at least one target user corresponding to each second terminal;
a risk identification module 24, configured to perform risk identification based on at least one verification parameter in the registration data acquired by the third response module;
and the risk management and control module 25 is configured to perform risk management and control according to a preset risk management and control measure when the risk identification module identifies that a risk currently exists.
In this embodiment, each verification parameter corresponds to one preset verification operation, and correspondingly, the risk identification module 24 is specifically configured to perform at least one preset verification operation based on at least one verification parameter, and determine that a risk exists currently when a verification result of any preset verification operation is that verification is passed.
In a specific embodiment, the registration data includes four verification parameters, which are respectively device identifiers of the second terminal used for uniquely identifying the target user during registration; network environment parameters of a network environment in which the target user is registered; registration time of the target user; and the second terminal receives the invitation channel identification of the invitation channel of the invitation link. Correspondingly, the risk identification module 24 is specifically configured to perform corresponding preset verification operations based on the four verification parameters, and determine that a risk exists at present when a verification result of the preset verification operation corresponding to any one of the verification parameters is that the verification passes. For example, the following may be:
performing corresponding preset verification operation based on the equipment identification, namely identifying each target user registered through the same second terminal based on the equipment identification, and then judging whether the number of the target users registered through the same second terminal on the same day is larger than a first preset threshold number of people;
performing corresponding preset verification operation based on the network environment parameters, namely identifying each target user registered in the same network environment based on the network environment parameters; then judging whether the number of target users registered in the same network environment on the same day is larger than a first preset threshold number of people or not;
performing corresponding preset verification operation based on the invitation channel identification, namely identifying each target user invited and registered through the same invitation channel based on the invitation channel identification; then judging whether the number of target users who are invited through the same invitation channel and finish the registration on the same day is larger than a first preset threshold value;
performing corresponding preset verification operation based on the registration time, namely identifying each target user with the registration interval time smaller than or equal to a preset interval time threshold value based on the registration time of each target user; and then judging whether the number of target users with the registration interval time smaller than the preset interval time threshold is larger than the number of people with a second preset threshold.
And if any one of the four preset checking operations is passed, judging that the risk exists currently. Of course, it is also possible to perform corresponding verification operations only based on one or two or three of the verification parameters, and determine that the risk exists currently when any one of the verification results passes the verification.
Of course, the risk identification module 24 may also perform a preset verification operation based on a verification parameter, for example, verify the second terminal used in the target user registration based on the device identifier of the second terminal in the registration data, and determine that the risk exists currently when the verification result is verification pass; or two or more than two verification parameters are subjected to corresponding preset verification operation; or, performing progressive verification based on the priority of each preset verification operation, and judging that the current risk exists when the verification result of the preset verification operation of any priority passes the verification.
In another embodiment, the risk identification module 2 is specifically configured to perform a step-by-step verification based on the priority of each preset verification operation, and determine that a risk exists currently when a verification result of a preset verification operation of any previous priority passes the verification; specifically, the risk identification module specifically includes:
a data acquisition unit for acquiring at least one verification parameter from the registration data;
the first verification unit is used for performing preset verification operation of a priority first order based on a first verification parameter in the registration data; if the risk passes the verification, judging that the risk exists at present;
the second checking unit is used for performing preset checking operation of a second priority based on a second checking parameter in the registration data when the checking result of the first checking unit is that the checking is not passed, and judging that the risk exists at present if the checking result is passed;
the third verification unit is used for performing preset verification operation of a third priority based on a third verification parameter in the registered data when the verification result of the second verification unit is that the verification is not passed, and judging that the risk exists at present if the verification is passed;
and the fourth checking unit is used for performing preset checking operation of a fourth priority based on a fourth checking parameter in the registered data when the checking result of the third checking unit is that the checking is not passed, judging that the risk exists currently if the checking is passed, and judging that the risk does not exist currently if the checking is not passed.
The first verification parameter is an equipment identifier of a second terminal used when the target user is registered; correspondingly, the first checking unit identifies each target user registered through the same second terminal according to the equipment identifier, judges whether the number of the target users registered through the same second terminal on the same day is larger than a first preset threshold number of people, and judges that the checking is passed if the number of the target users registered through the same second terminal on the same day is larger than the first preset threshold number of people;
the second check parameter is a network environment parameter of a network environment registered by the target user; correspondingly, the second checking unit is specifically configured to, when the checking result of the first checking unit is that the checking is not passed, identify each target user registered in the same network environment according to the network environment parameters, and determine whether the number of target users registered in the same network environment on the same day is greater than a first preset threshold number of users, and if so, determine that the checking is passed;
the third verification parameter is the registration time of the target user; correspondingly, the third verifying unit is specifically configured to, when the verification result of the second verifying unit is failed, identify, according to the invitation channel identifier, each target user who receives the invitation link through the same invitation channel and completes registration, and determine whether the number of target users who receive the invitation link through the same invitation channel on the same day and complete registration is greater than a first preset threshold, and if so, determine that the verification is passed;
the fourth verification parameter is an invitation channel identifier of an invitation channel for receiving the invitation link by the second terminal; correspondingly, the fourth checking unit is specifically configured to, when the checking result of the third checking unit is that the checking is not passed, identify each target user invited through the same invitation channel and completing the registration according to the invitation channel identifier, and determine whether the number of target users invited through the same invitation channel and completing the registration is greater than a first preset threshold value on the same day, if so, determine that the checking is passed, otherwise, determine that the checking is not passed.
As can be seen from the above, in this embodiment, the risk identification module may simultaneously perform verification on the second terminal, the network environment, the registration interval time, and the invitation channel, or perform four verification operations according to a priority order of preset verification operations; of course, the priority order among the four preset checking operations may be adjusted according to actual needs, and accordingly, the first to fourth checking parameters are also changed accordingly, for example, if the priority of the network environment checking based on the network environment parameters is the first order, then, correspondingly, the first checking parameter is the network environment parameter.
In this embodiment, the number of people is 3 at the first preset threshold, 30s at the preset interval time threshold, and 5 at the second preset threshold.
The third embodiment of the present specification further provides a server, which includes a memory 302, a processor 301, and a computer program stored on the memory 302 and executable on the processor 301, wherein the processor 301 implements the steps of the method described above when executing the program. For convenience of explanation, only the parts related to the embodiments of the present specification are shown, and specific technical details are not disclosed, so that reference is made to the method parts of the embodiments of the present specification. The server may be a server device formed by various electronic devices, a PC computer, a network cloud server, or a server function provided on any electronic device such as a mobile phone, a tablet computer, a PDA (Personal digital assistant), a POS (Point of Sales), a vehicle-mounted computer, or a desktop computer.
In particular, the server shown in fig. 3 in connection with the solution provided by the embodiments of the present description constitutes a block diagram, the bus 300 may comprise any number of interconnected buses and bridges linking together various circuits including one or more processors represented by a processor 301 and a memory represented by a memory 302. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The communication interface 303 provides an interface between the bus 300 and the receiver and/or transmitter 304. the receiver and/or transmitter 304 may be a separate and independent receiver or transmitter or may be the same element, such as a transceiver, providing a means for communicating with various other apparatus over a transmission medium. The processor 301 is responsible for managing the bus 300 and general processing, and the memory 302 may be used for storing data used by the processor 301 in performing operations.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a computer-readable storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiments of the present disclosure.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions of: responding to a sharing request which is sent by a first terminal and related to a target page/target application, generating an invitation link, and feeding back the invitation link to the first terminal so as to send the invitation link to at least one target user through an invitation channel appointed by a user; wherein the invitation code is for uniquely identifying the user associated with the first terminal, the invitation link pointing to the target page/the target application; responding to an access request/download request sent by at least one second terminal, and feeding back target page content/the target application download entrance to at least one second terminal; the access request/download request is generated when the second terminal corresponds to a target user to access the invitation link, and comprises a unique identification code for uniquely identifying the target user; responding to a registration request sent by at least one second terminal, and acquiring registration data of at least one target user corresponding to each second terminal; and performing risk identification based on the registration data, and performing risk control according to preset risk control measures when the current risk is identified.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
While preferred embodiments of the present specification have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all changes and modifications that fall within the scope of the specification.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. In addition, the structures, the proportions, the sizes, and the like shown in the drawings of the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used for limiting the limit conditions which the present disclosure can implement, so that the present disclosure has no technical essence, and any modification of the structures, the change of the proportion relation, or the adjustment of the sizes, should still fall within the scope which the technical contents disclosed in the present disclosure can cover without affecting the technical effects which the present disclosure can produce and the purposes which can be achieved. In addition, the terms "above", "first", "second" and "a" as used in the present specification are for the sake of clarity only, and are not intended to limit the scope of the present disclosure, and changes or modifications of the relative relationship may be made without substantial changes in the technical content.

Claims (10)

1. A risk management method in information promotion is characterized by comprising the following steps:
responding to a sharing request which is sent by a first terminal and related to a target page/target application, generating an invitation link, and feeding back the invitation link to the first terminal so as to send the invitation link to at least one target user through an invitation channel appointed by a user; the invitation link points to the target page/the target application;
responding to an access request/download request sent by at least one second terminal, and feeding back target page content/the target application download entrance to at least one second terminal; the access request/download request is generated when the target user corresponding to the second terminal accesses the invitation link;
responding to a registration request sent by at least one second terminal, and acquiring registration data of at least one target user corresponding to each second terminal;
and performing risk identification based on at least one verification parameter in the registration data, and performing risk control according to preset risk control measures when the current risk is identified.
2. The risk management method according to claim 1, wherein each verification parameter corresponds to a preset verification operation, and accordingly, the step of performing risk identification specifically comprises:
performing at least one preset check based on at least one check parameter, and judging that the risk exists currently when the check result of any preset check operation is that the check is passed; alternatively, the first and second electrodes may be,
and checking step by step based on the priority of each preset checking operation, and judging that the current risk exists when the checking result of the preset checking operation of any priority passes the checking.
3. The risk management method according to claim 1 or 2, wherein the step of performing a stepwise check based on the priority of each of the predetermined check operations specifically comprises:
performing preset checking operation of a first priority order based on a first checking parameter in the registration data; if the risk passes the verification, judging that the risk exists at present;
if the verification is not passed, performing preset verification operation of a second priority based on a second verification parameter in the registration data, and if the verification is passed, judging that the risk exists currently;
if the verification is not passed, performing third-priority preset verification operation based on a third verification parameter in the registration data, and if the verification is passed, judging that the risk exists currently;
and if the verification fails, performing preset verification operation of a fourth priority based on a fourth verification parameter in the registered data, if the verification passes, judging that the risk exists currently, and if the verification fails, judging that the risk does not exist currently.
4. The risk management method according to any one of claims 1 to 3, wherein the first verification parameter is a device identifier of the second terminal used when the target user registers; and/or the second check-up parameter is a network environment parameter of the network environment registered by the target user; and/or the third verification parameter is the registration time of the target user; and/or the fourth verification parameter is an invitation channel identifier of an invitation channel of the invitation link received by the second terminal.
5. The risk management method according to any one of claims 1 to 4, wherein the step of verifying based on the device identifier specifically comprises:
identifying each target user registered by the same second terminal according to the equipment identifier uniquely identifying the second terminal in the registration data;
and judging whether the number of the target users registered through the same second terminal on the same day is larger than a first preset threshold number of people, and if so, judging that the verification is passed.
6. The risk management method according to any one of claims 1 to 5, wherein the step of verifying based on the network environment parameter specifically comprises:
identifying each target user registered in the same network environment according to the network environment parameters in the registration data;
and judging whether the number of the target users registered in the same network environment on the same day is greater than a first preset threshold number of people, and if so, judging that the verification is passed.
7. The risk management method according to any one of claims 1 to 6, wherein the step of verifying based on the invitation channel identifier specifically comprises:
identifying each target user invited through the same invitation channel and completing registration according to the invitation channel identification in the registration data;
judging whether the number of target users who are invited through the same invitation channel and finish the registration on the same day is larger than a first preset threshold value, if so, judging that the verification is passed; and/or the presence of a gas in the gas,
the step of verifying based on the registration time specifically includes:
identifying each target user with the registration interval time smaller than or equal to a preset interval time threshold according to the registration time of each target user in the registration data;
and judging whether the number of target users with the registration interval time smaller than the preset interval time threshold is larger than the number of users with a second preset threshold, and if so, judging that the verification is passed.
8. A risk management device in information dissemination, comprising:
the first response module is used for responding to a sharing request which is sent by the first terminal and related to a target page/target application, generating an invitation link, feeding the invitation link back to the first terminal and sending the invitation link to at least one target user through an invitation channel specified by a user; the invitation code is used for uniquely identifying the user corresponding to the first terminal, and the invitation link points to the target page/the target application;
the second response module is used for responding to an access request/download request sent by at least one second terminal and feeding back target page content/the target application download entrance to the at least one second terminal; the access request/download request is generated when the second terminal accesses the invitation link and comprises a unique identification code for uniquely identifying a target user corresponding to the second terminal;
a third response module, configured to respond to a registration request sent by at least one second terminal, and acquire registration data of at least one target user corresponding to each second terminal;
the risk identification module is used for carrying out risk identification based on at least one verification parameter in the registration data;
and the risk management and control module is used for managing and controlling the risk according to preset risk management and control measures when the risk identification module identifies that the current risk exists.
9. An electronic device comprising at least one processor, at least one memory, a communication interface, and a bus; wherein the content of the first and second substances,
the processor, the memory and the communication interface complete mutual communication through the bus;
the memory is used for storing a program for executing the method of any one of claims 1 to 7;
the processor is configured to execute programs stored in the memory.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202010301150.1A 2020-04-16 2020-04-16 Risk management method and device in information popularization, electronic equipment and storage medium Pending CN111681024A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010301150.1A CN111681024A (en) 2020-04-16 2020-04-16 Risk management method and device in information popularization, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010301150.1A CN111681024A (en) 2020-04-16 2020-04-16 Risk management method and device in information popularization, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111681024A true CN111681024A (en) 2020-09-18

Family

ID=72451608

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010301150.1A Pending CN111681024A (en) 2020-04-16 2020-04-16 Risk management method and device in information popularization, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111681024A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112215661A (en) * 2020-10-21 2021-01-12 杭州闪援车管家汽车服务有限公司 Internet-based vehicle maintenance sharing method, server and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911645A (en) * 2015-12-23 2017-06-30 阿里巴巴集团控股有限公司 Server access method and relevant device
CN109246093A (en) * 2018-08-23 2019-01-18 阿里巴巴集团控股有限公司 Risk links recognition methods and device
CN109409918A (en) * 2018-08-24 2019-03-01 深圳壹账通智能科技有限公司 The recognition methods of wool party, device, equipment and storage medium based on user behavior
CN109997344A (en) * 2017-11-02 2019-07-09 腾讯科技(深圳)有限公司 A kind of information processing method and device, server, storage medium
CN110033153A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 A kind of pair of information recommendation carries out resource bonusing method, device and equipment
CN110807710A (en) * 2019-09-26 2020-02-18 北京淇瑀信息科技有限公司 Method and system for managing invitation data of user inviting friends
CN110852761A (en) * 2019-10-11 2020-02-28 支付宝(杭州)信息技术有限公司 Method and device for formulating anti-cheating strategy and electronic equipment
CN110889124A (en) * 2019-11-14 2020-03-17 百度在线网络技术(北京)有限公司 Information sharing method and device, electronic equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911645A (en) * 2015-12-23 2017-06-30 阿里巴巴集团控股有限公司 Server access method and relevant device
CN109997344A (en) * 2017-11-02 2019-07-09 腾讯科技(深圳)有限公司 A kind of information processing method and device, server, storage medium
CN109246093A (en) * 2018-08-23 2019-01-18 阿里巴巴集团控股有限公司 Risk links recognition methods and device
CN109409918A (en) * 2018-08-24 2019-03-01 深圳壹账通智能科技有限公司 The recognition methods of wool party, device, equipment and storage medium based on user behavior
CN110033153A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 A kind of pair of information recommendation carries out resource bonusing method, device and equipment
CN110807710A (en) * 2019-09-26 2020-02-18 北京淇瑀信息科技有限公司 Method and system for managing invitation data of user inviting friends
CN110852761A (en) * 2019-10-11 2020-02-28 支付宝(杭州)信息技术有限公司 Method and device for formulating anti-cheating strategy and electronic equipment
CN110889124A (en) * 2019-11-14 2020-03-17 百度在线网络技术(北京)有限公司 Information sharing method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112215661A (en) * 2020-10-21 2021-01-12 杭州闪援车管家汽车服务有限公司 Internet-based vehicle maintenance sharing method, server and system
CN112215661B (en) * 2020-10-21 2024-02-02 杭州闪援车管家汽车服务有限公司 Internet-based vehicle-maintenance sharing method, server and system

Similar Documents

Publication Publication Date Title
US10887311B2 (en) Method and apparatus for requesting usage permission, and method and apparatus for acquiring usage permission
US8234692B2 (en) System and method for processing an upload of a program with export compliance information
CN108762803A (en) A kind of configuring management method, device, terminal device and storage medium
EP3038038A1 (en) Mobile card sharing service method and system with enhanced security
CN111681028A (en) Resource allocation method and device, electronic equipment and computer readable storage medium
CN108537576A (en) Community's advertisement placement method, device, terminal device and storage medium
CN112148582B (en) Policy testing method and device, computer readable medium and electronic equipment
CN111681025A (en) Resource distribution method and device, electronic equipment and computer readable storage medium
CN111091439B (en) Order-related marketing campaign realization method, system, equipment and storage medium
CN111612509B (en) Method and device for pushing information product through active task and electronic equipment
CN108924036A (en) Method and apparatus for distributing resource, getting resource
CN111198736A (en) Page display method based on user state characteristics, and device, system, server and storage medium thereof
CN110223179B (en) Data processing method, device, system and medium for fund
CN111681026A (en) Resource allocation method and device, electronic equipment and computer readable storage medium
CN110555681A (en) Bank card signing method, device, server and medium
CN111681024A (en) Risk management method and device in information popularization, electronic equipment and storage medium
KR101735287B1 (en) The method, server and system for providing application funding service
CN111951040A (en) Information sending method and device, electronic equipment and storage medium
WO2023093224A1 (en) Target object reporting method and apparatus, and device
CN111198737A (en) Page display method based on user state characteristics, and device, system, server and storage medium thereof
CN109815106B (en) Interactive function testing method and device of information delivery platform
CN105225153A (en) Data processing method and device
US20130191265A1 (en) Cloud-based system for performing online trading
CN111445284B (en) Determination method and device of orientation label, computing equipment and storage medium
CN110751455B (en) Method and device for processing joint service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200918