CN106157085A - Service implementation method and device - Google Patents

Service implementation method and device Download PDF

Info

Publication number
CN106157085A
CN106157085A CN201510191825.0A CN201510191825A CN106157085A CN 106157085 A CN106157085 A CN 106157085A CN 201510191825 A CN201510191825 A CN 201510191825A CN 106157085 A CN106157085 A CN 106157085A
Authority
CN
China
Prior art keywords
user
object set
password
residue
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510191825.0A
Other languages
Chinese (zh)
Inventor
李扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510191825.0A priority Critical patent/CN106157085A/en
Publication of CN106157085A publication Critical patent/CN106157085A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The application provides a kind of service implementation method and device, the method includes: when receiving the first extraction request comprising one-level password that first user is initiated, obtain the object set corresponding with described one-level password, and the partial objects in described object set is distributed to described first user;Generate the secondary password being associated with the residue object in described object set, and the request response comprising described secondary password is returned to described first user, so that described secondary password is shown by described first user to other users, and extracted the residue object in described object set by other users based on described secondary password.By the technical scheme of the application, it is possible to achieve Business Processing based on multi-layer password.

Description

Service implementation method and device
Technical field
The application relates to Internet technical field, particularly relates to service implementation method and device.
Background technology
Along with the development of network technology, occur in that diversified business realizing mode.With " red packet " shape As a example by the virtual objects of formula is mutual, e-greeting card, the cash gift etc. can be put in " red packet ", so by user Rear appointment each granting object, it is achieved the granting of " red packet ".
But, during existing business realizes, it is normally based on services addresses between business object (such as Or the mode of the 2 D code information that comprises services addresses connects to carry out Business Initiator with business URL), Contact between debit so that business realizing process is relatively complicated.
Summary of the invention
In view of this, the application provides a kind of service implementation method and device, can simplify business realizing mistake Journey.
For achieving the above object, the application provides technical scheme as follows:
First aspect according to the application, it is proposed that a kind of service implementation method, including:
When receiving the first extraction request comprising one-level password that first user is initiated, obtain and described one The object set that level password is corresponding, and the partial objects in described object set is distributed to described first use Family;
Generate the secondary password being associated with the residue object in described object set, and use to described first Family return comprise described secondary password request response, in order to described first user by described secondary password to Other users are shown, and are extracted in described object set based on described secondary password by other users Residue object.
Second aspect according to the application, it is proposed that a kind of business realizing device, including:
First allocation unit, when receiving the first extraction request comprising one-level password that first user is initiated, Obtain the object set corresponding with described one-level password, and the partial objects in described object set is distributed To described first user;
Request-response unit, generates the secondary password being associated with the residue object in described object set, And the request response comprising described secondary password is returned to described first user, in order to described first user will Described secondary password is shown to other users, and is extracted institute by other users based on described secondary password State the residue object in object set.
From above technical scheme, the application realizes business by password mode, can simplify business Realize process;Meanwhile, the user of each use one-level password, all can extend industry by secondary password Business object, thus contribute to increasing data interaction amount, promoting interactive efficiency.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of a kind of application scenarios in correlation technique;
Fig. 2 is the schematic diagram of a kind of business realizing in correlation technique;
Fig. 3 shows the flow chart of a kind of service implementation method according to the application one exemplary embodiment;
Fig. 4 shows the flow chart of the another kind of service implementation method according to the application one exemplary embodiment;
Fig. 5 shows the schematic diagram of a kind of business object extension according to the application one exemplary embodiment;
Fig. 6 shows the schematic diagram of the another kind of business object extension according to the application one exemplary embodiment;
Fig. 7 shows the structural representation of a kind of electronic equipment according to the application one exemplary embodiment;
Fig. 8 shows the block diagram of a kind of business realizing device according to the application one exemplary embodiment.
Detailed description of the invention
Fig. 1 is the scene schematic diagram in business realizing.The embodiment of the present application technical scheme can be used in difference Realize related service between family, such as to realize " red packet " distributing service, " reward voucher " distributing service etc., Wherein red packet transmission business specifically may refer to, and user is by by oneself fund or other is virtual Article etc., give other user by the way of providing red packet.Prior art is when realizing related service, logical Often it is to be appreciated that Business Initiator user knows business recipient user ability initiation business accurately, and, Need to generate a URL address often, or the mode generating the Quick Response Code including URL notifies Business recipient user, is achieved in that process is extremely complex.Such as, scene shown in Fig. 1, if user is A If wish to realize data interaction with user B, user C etc., such as to realize the granting industry of " red packet " As a example by business, user A must specify user B, user C etc. for destination object one by one, then number of users is more The plenty of time resource of user A can be expended time many.Meanwhile, user A is for user B, user C etc. Specify, need premised on user B, user C etc. are for the association user of user A, such as user B, User C etc. need with forms such as " good friends ", are recorded in advance in the address list of user A;Meanwhile, In the process, business recipient user, as user B, user C also need to initiate according to user A The service chaining of business, such as URL or Quick Response Code, access and complete corresponding business, business realizing Process is complex.
In consideration of it, the application provides a kind of service implementation method and device, come real in the way of relatively simple Existing related service, such as red packet business, or other business that can be realized by network etc..
In the embodiment of the present application, related service can be realized based on password, specifically, as in figure 2 it is shown, During this business realizing, with pass word as intermediary, or business interface can be referred to as, it is achieved Mutual between user A and user B.Specifically, by user A after service end is asked, service end The password being associated for needing mutual object to generate, and this password is issued to user A;User A can By directly transmitting, sharing to the any-mode such as social network-i i-platform or oral account, password is showed use Family B;So, when user B initiates, to service end, the request comprising this password, can obtain and be associated Interactive object.
Visible, during business realizing based on password form, interaction is the simplest, flexible, but Owing to only being performed password transmission by user A self, it is restricted in some cases, such as, for needing Wanting the business that more users participate in, rely solely on user A to transmit password, mode is relatively simple, must connect The number of users receiving this password increasess slowly, and is unfavorable for business realizing.Therefore, industry is realized based on password During business, the service implementation method of the application offer and device, can be further by secondary password Mode, promotes expansion speed and the scope of business object.
Fig. 3 shows the flow chart of a kind of service implementation method according to the application one exemplary embodiment, As it is shown on figure 3, the method is applied to service end, may comprise steps of:
Step 302, when receiving the first extraction request comprising one-level password that first user is initiated, obtains Take the object set corresponding with described one-level password, and the partial objects in described object set is distributed extremely Described first user.
In the present embodiment, object can be any form of interaction data.As an exemplary embodiment, Object can be virtual objects, such as reward voucher, e-greeting card, the cash gift etc.;Correspondingly, object set It can be the set of virtual objects.Being appreciated that for different business realizing, virtual objects is corresponding In corresponding business, such as payment transaction, object can be fund, the commercial activities that businessman initiates During business, object can be reward voucher, etc..
In the present embodiment, service end can receive any time before or after one-level password, Object set is divided into multiple object subset, such as all objects in object set is averagely divided to Each object subset, or the division of object is realized according to other ratios, this is not limited by the application System.
So after receiving one-level password, can be from the described object set being divided into multiple object subset In conjunction, the object subset of predetermined number or ratio is distributed to first user.Correspondingly, in step 306 In, remaining object subset can be distributed one by one to each second user.Pre-by object set First divide, contribute to shortening service end response time after receiving one-level password and secondary password.
In the present embodiment, one-level password or secondary password can be character string forms, and this character string is permissible Comprise one or more character, and every character can be the arbitrary shapes such as numeral, letter, Chinese character, symbol Formula;According to the actual requirements or allocation plan can determine the number of characters that one-level password or secondary password comprise Compound mode between amount and every character.
Step 304, generates and the secondary password that object is associated that remains in described object set, and to Described first user returns the request response comprising described secondary password, in order to described first user is by described Secondary password is shown to other users, and described right based on described secondary password extraction by other users As the residue object in set.
As an exemplary embodiment, request response can directly comprise secondary password, then first user Directly can obtain the character string constituting secondary password from request response.
As another exemplary embodiment, request response could be included for obtaining the chain of this secondary password Connect, be now equivalent to secondary password be indirectly contained in request response;So, first user can lead to Cross access this link can obtain correspondence secondary password, obtain constitute secondary password character string.
As further example embodiment, the exhibiting pictures comprising secondary password can be generated, and by this exhibition Diagram sheet is contained in request response.Certainly, character string based on the secondary password obtained, first user Corresponding exhibiting pictures can also be generated voluntarily, be shown for other users.
In the above-described embodiments, it is also possible to the information of the provider user of described object set is back to institute State first user, in order to described first user by the information of described secondary password and described provider user to Other users are associated showing.For example, the commercial activities business such as businessman initiated, can So that Business Information and secondary password are associated showing, thus realize the popularizing action to businessman.
Optionally, can also include after the step 304: according to the second Client-initiated bag received The second extraction request containing described secondary password, distributes in described object set for described second user Residue object.
In the present embodiment, the second user refers to all " other users " being different from first user, can To represent one or more " other users ".
In the present embodiment, as an exemplary embodiment, can initiate receiving each second user Second extraction request time, check and whether described object set exist residue object;When existing, residue is right As time, therefrom extract predetermined number or the object of ratio, and distribute to corresponding second user.
In the present embodiment, as another exemplary embodiment, can send out receiving each second user During the second extraction request risen, the quantity of the second extraction request that statistics has been received by;When statistical magnitude reaches During to predetermined number, please to the second extraction having been received by by the residue object distribution in described object set Ask the second corresponding user.
Below in conjunction with Fig. 4, to being in many ways described in detail involved by technical scheme based on the application. Wherein, Fig. 4 shows the flow process of the another kind of service implementation method according to the application one exemplary embodiment Figure, as shown in Figure 4, the method may comprise steps of:
Step 402, carries out service negotiation between platform and service end.
In the present embodiment, " platform " for providing any account of object set, it can be People's account, such as user x;Or, it is also possible to for enterprise account, such as " XX television station " etc..
In the present embodiment, when holding consultation between platform and service end, consult content and can include following Content: the object subset quantity that the quantity of object set, each object set comprise, each object subset The number of objects comprised, and the allocation rule etc. of object set, object subset or object;Platform is permissible By foregoing is added to negotiation message, and send to service end, to realize informing.
Step 404, service end, according to negotiation result, determines object set and is associated with this object set One-level password.
In the present embodiment, as a example by " red packet " is provided, then object set is " red packet group ", object Subset is " red packet " comprised in each " red packet group ", and object is the cash gift in each " red packet ".
In the present embodiment, realizing object set and when associating of one-level password, one-level password can close It is coupled to part or all of object set;Interrelational form can be defined by negotiation result.
Step 406, one-level password is back to platform by service end.
Step 408, one-level password is shown by platform to user, it is assumed that user A obtains one-level mouth Order.
In the present embodiment, platform can pass through the canals such as TV programme, program of radio station, video website program Road, uses the various ways such as video playback, sound report, host's oral account, shows one-level mouth to user Order;Or, platform can also by sending note to user, the mode such as share in social network-i i-platform, One-level password is shown to user.
In the present embodiment, can there is certain life cycle in one-level password, such as 5 minutes, then surpass After going out this life cycle, service end can delete the incidence relation between this one-level password and object set, And this one-level password can be reclaimed;Wherein, in the one-level password set that service end can will reclaim In data collection storehouse, then directly can choose from data collection storehouse and use next time, and save Generation process to one-level password.
Step 410, user A sends the first extraction request to service end, comprises in this first extraction request One-level password.
Step 412, service end obtains the object set corresponding to one-level password, and determines this object set It is divided the object subset obtained, and the rule to user's A distribution object subset.
In the present embodiment, when one-level password is corresponding to multiple object sets, or an object of correspondence When set comprises multiple object subset, can therefrom choose one or many according to predefined allocation rule Individual object subset, to be tied to user A;Such as, " allocation rule " can be predefined distribution ratio Example or quantity allotted.
Step 414, according to predefined allocation rule, by corresponding object subset distribution to user A.
Step 416, for the residue object subset in the object set that one-level password is corresponding, generates relevant The secondary password of connection.
Step 418, service end returns the request response comprising secondary password to user A.
In the present embodiment, secondary password can be character string, and this character string can comprise one or more Character, and every character can be the arbitrary forms such as numeral, letter, Chinese character, symbol;Certainly, two grades Password should be different from one-level password, to guarantee password uniqueness.So, service end can directly will be somebody's turn to do The character string of secondary password is contained in request response, and sends to user A;Or, service end is permissible Generate the exhibiting pictures comprising this secondary password, and this exhibiting pictures is sent to user A.
When generating exhibiting pictures, service end can be based on predefined fixed form, and static generation is shown Picture;Or, various template can be predefined, then service end can generate corresponding to two grades of current mouths Template ID of order, and obtain the picture attribute template corresponding to described template ID, thus according to this picture Attribute templates dynamically generates exhibiting pictures.Wherein, picture attribute template may include that background picture, Combination in any between each attribute such as background color, text color, word size, stylistic category, can To guarantee the style varied of exhibiting pictures, it is difficult to be caught in corresponding rule.
Certainly, the client that user A uses is when receiving the secondary password that service end returns, it is also possible to Being locally generated exhibiting pictures, its generating mode is similar with service end (if this locality does not has required picture Attribute templates, then need to download from service end), here is omitted.
Step 420, user A shows secondary password to other users, it is assumed that user B obtains secondary password.
In the present embodiment, as a example by " exhibiting pictures ".Exhibiting pictures can be preserved to this by user A Ground, and shared to social network-i i-platform by social networking application so that user B can be at social networks The secondary password in the exhibiting pictures that user A shares is viewed on platform.
Certainly, user A can also realize the displaying of secondary password by other means.Such as, user Exhibiting pictures can directly be sent to user B by A, such as realizes by the way of instant messaging.Or Person, secondary password can also be informed user B by any-modes such as oral account, broadcast by user A.
Wherein, service end can also be in such as step 418, by the information of the provider user of object set Send to user A, then when user A by visual form to user's B show secondary password time, can be by The information of provider user and secondary password are associated showing, such as comprise two in exhibiting pictures simultaneously Level password and the information of provider user, thus realize the popularization to provider user.
Step 422, user B sends the second extraction request to service end, comprises in this second extraction request Secondary password.
Step 424, service end judges the most whether meet the default distributive condition to residue object subset.
In the present embodiment, based on different default distributive conditions, can be to the second transmission extracting request Side user (such as user B) performs corresponding object batch operation.As an exemplary embodiment, if " object batch operation " is: after receiving the second extraction request, distribute surplus for corresponding user immediately Remaining object, then " presetting distributive condition " is: receive the second extraction request.So, terminate as user After receiving the second extraction request that user B sends, can be according to the secondary password wherein comprised, by correspondence The residue object distribution of object set to user B.
When the residue object of object set is distributed to user B, if object set is already divided into many The form of individual object subset, then can therefrom extract needs distribution to user B's according to default extraction rule Object subset, this default rule of extracting can be: extraction or random extraction etc. successively;Certainly, in this Shen In technical scheme please, " being divided into object subset " is only an illustrative embodiments the most no matter It is to user A (corresponding to one-level password) or user B (corresponding to secondary password), all can be according to Default value or ratio, directly extract corresponding object from object set and realize distribution, and without inciting somebody to action Object set is divided into multiple object subset in advance.
As another exemplary embodiment, if " object batch operation " is: when receiving sufficient amount The second extraction request after, just distribute residue object to corresponding user, then " presetting distributive condition " is: Receive the second extraction request of predetermined number.
In the present embodiment, if object set is divided into multiple object subset, then " present count in advance Amount " should be less than or equal to the quantity of residue object subset, in order to and the use of request is extracted in all transmissions second At least one object subset can be distributed per family;If object set is not divided into multiple object in advance Collection, then " predetermined number " can be any amount, is such as manually arranged by user A, then exists The user of this predetermined number distributes in (such as mean allocation, by random pro rate etc.) object set Residue object.
Certainly, can there is certain life cycle in secondary password, such as 20 minutes, then exceed this life Week after date, service end can delete the incidence relation between this secondary password and object set, and permissible This secondary password is reclaimed;Wherein, the secondary password of recovery can be concentrated on recovery number by service end According in storehouse, then directly can choose from data collection storehouse and use next time, and eliminate two grades The generation process of password.
Step 426, pre-conditioned meet after, the residue object in user's B distribution object set.
From above-described embodiment, the application is based on one-level password and the combination of secondary password, it is achieved that flat Multi-layer business transmission between platform-user An-user Bn.As it is shown in figure 5, platform is by one-level mouth Order, can directly extending user A1 to n users such as user An, and each user Ai (1≤i≤n) Can be further expanded by secondary password again, such as user A1 extension obtains user B1 to user Bn, Business object quantity exponentially type is increased.
It should be understood that
In one exemplary embodiment, " one-level password " and " secondary password " can be understood as in the narrow sense " one-level " and " two grades " relation, i.e. two layer service structures shown in Fig. 5.And in another exemplary In embodiment, " one-level password " and " secondary password " can be understood as sensu lato " higher level " and " under Level " relation, such that it is able to use user and the password structure of more level, to realize in quantity and efficiency Growth;As shown in Figure 6, as a example by user B1, on the basis of structure shown in Fig. 5, it is also possible to Generate three grades of corresponding passwords for user B1, and by the user B1 displaying to three grades of passwords, used " secondary password " and " three grades of passwords ", to users such as user B1n, can be considered as extensively by family B11 herein " one-level password " and " secondary password " in justice.
Fig. 7 shows the schematic configuration diagram of the electronic equipment of the exemplary embodiment according to the application.Please With reference to Fig. 7, at hardware view, this electronic equipment includes processor, internal bus, network interface, interior Deposit and nonvolatile memory, be certainly also possible that the hardware required for other business.Processor from Then the computer program reading correspondence in nonvolatile memory runs, in internal memory on logic level Form business realizing device.Certainly, in addition to software realization mode, it is real that the application is not precluded from other Mode of existing mode, such as logical device or software and hardware combining etc., say, that following handling process Executive agent be not limited to each logical block, it is also possible to be hardware or logical device.
Refer to Fig. 8, in Software Implementation, this business realizing device can include the first distribution list Unit, request-response unit and the second allocation unit.Wherein:
First allocation unit, when receiving the first extraction request comprising one-level password that first user is initiated, Obtain the object set corresponding with described one-level password, and the partial objects in described object set is distributed To described first user;
Request-response unit, generates the secondary password being associated with the residue object in described object set, And the request response comprising described secondary password is returned to described first user, in order to described first user will Described secondary password is shown to other users, and is extracted institute by other users based on described secondary password State the residue object in object set.
Optionally, also including: the second allocation unit, the second Client-initiated according to receiving comprises institute State the second extraction request of secondary password, distribute the residue in described object set for described second user Object.
Optionally, described first allocation unit specifically for:
From the described object set being divided into multiple object subset, by predetermined number or the object of ratio Subset allocation is to described first user.
Optionally, described second allocation unit specifically for:
Remaining object subset is distributed one by one to each second user.
Optionally, described second allocation unit specifically for:
Receive each second Client-initiated second when extracting request, whether check in described object set There is residue object;
When there is residue object, therefrom extracting predetermined number or the object of ratio, and distributing to accordingly Second user.
Optionally, described second allocation unit specifically for:
When receiving each second Client-initiated the second extraction request, the second extraction that statistics has been received by The quantity of request;
When statistical magnitude reaches predetermined number, the residue object in described object set is distributed to connecing Second user of the second extraction request correspondence received.
Optionally, also include:
Association display unit, is back to the information of the provider user of described object set described first and uses Family, in order to described first user by the information of described secondary password and described provider user to other users It is associated showing.
Therefore, the application realizes business by password mode, can simplify business realizing process;Meanwhile, The user of each use one-level password, all can be activated business object by secondary password, thus help In increasing data interaction amount, promoting interactive efficiency.
In a typical configuration, calculating equipment include one or more processor (CPU), input/ Output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flash RAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by Any method or technology realize information storage.Information can be computer-readable instruction, data structure, The module of program or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), Other kinds of random access memory (RAM), read only memory (ROM), electrically erasable Read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be counted The information that calculation equipment accesses.According to defining herein, computer-readable medium does not include that temporary computer can Read media (transitory media), such as data signal and the carrier wave of modulation.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non- Comprising of exclusiveness, so that include the process of a series of key element, method, commodity or equipment not only Including those key elements, but also include other key elements being not expressly set out, or also include for this The key element that process, method, commodity or equipment are intrinsic.In the case of there is no more restriction, by language The key element that sentence " including ... " limits, it is not excluded that including the process of described key element, method, business Product or equipment there is also other identical element.
The foregoing is only the preferred embodiment of the application, not in order to limit the application, all at this Within the spirit of application and principle, any modification, equivalent substitution and improvement etc. done, should be included in Within the scope of the application protection.

Claims (14)

1. a service implementation method, it is characterised in that including:
When receiving the first extraction request comprising one-level password that first user is initiated, obtain and described one The object set that level password is corresponding, and the partial objects in described object set is distributed to described first use Family;
Generate the secondary password being associated with the residue object in described object set, and use to described first Family return comprise described secondary password request response, in order to described first user by described secondary password to Other users are shown, and are extracted in described object set based on described secondary password by other users Residue object.
Method the most according to claim 1, it is characterised in that described method also includes:
The second extraction request of described secondary password is comprised according to the second Client-initiated received, for Described second user distributes the residue object in described object set.
Method the most according to claim 1 and 2, it is characterised in that described by described object set In partial objects distribution to described first user, including:
From the described object set being divided into multiple object subset, by predetermined number or the object of ratio Subset allocation is to described first user.
Method the most according to claim 2, it is characterised in that described divide for described second user Join the residue object in described object set, including:
Remaining object subset is distributed one by one to each second user.
Method the most according to claim 2, it is characterised in that described divide for described second user Join the residue object in described object set, including:
Receive each second Client-initiated second when extracting request, whether check in described object set There is residue object;
When there is residue object, therefrom extracting predetermined number or the object of ratio, and distributing to accordingly Second user.
Method the most according to claim 2, it is characterised in that described divide for described second user Join the residue object in described object set, including:
When receiving each second Client-initiated the second extraction request, the second extraction that statistics has been received by The quantity of request;
When statistical magnitude reaches predetermined number, the residue object in described object set is distributed to connecing Second user of the second extraction request correspondence received.
Method the most according to claim 1, it is characterised in that also include:
The information of the provider user of described object set is back to described first user, in order to described The information of described secondary password and described provider user is associated showing by one user to other users.
8. a business realizing device, it is characterised in that including:
First allocation unit, when receiving the first extraction request comprising one-level password that first user is initiated, Obtain the object set corresponding with described one-level password, and the partial objects in described object set is distributed To described first user;
Request-response unit, generates the secondary password being associated with the residue object in described object set, And the request response comprising described secondary password is returned to described first user, in order to described first user will Described secondary password is shown to other users, and is extracted institute by other users based on described secondary password State the residue object in object set.
Device the most according to claim 8, it is characterised in that also include:
Second allocation unit, the second Client-initiated according to receiving comprises the second of described secondary password Extract request, distribute the residue object in described object set for described second user.
Device the most according to claim 8 or claim 9, it is characterised in that described first allocation unit Specifically for:
From the described object set being divided into multiple object subset, by predetermined number or the object of ratio Subset allocation is to described first user.
11. devices according to claim 9, it is characterised in that described second allocation unit is concrete For:
Remaining object subset is distributed one by one to each second user.
12. devices according to claim 9, it is characterised in that described second allocation unit is concrete For:
Receive each second Client-initiated second when extracting request, whether check in described object set There is residue object;
When there is residue object, therefrom extracting predetermined number or the object of ratio, and distributing to accordingly Second user.
13. devices according to claim 9, it is characterised in that described second allocation unit is concrete For:
When receiving each second Client-initiated the second extraction request, the second extraction that statistics has been received by The quantity of request;
When statistical magnitude reaches predetermined number, the residue object in described object set is distributed to connecing Second user of the second extraction request correspondence received.
14. devices according to claim 8, it is characterised in that also include:
Association display unit, is back to the information of the provider user of described object set described first and uses Family, in order to described first user by the information of described secondary password and described provider user to other users It is associated showing.
CN201510191825.0A 2015-04-21 2015-04-21 Service implementation method and device Pending CN106157085A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510191825.0A CN106157085A (en) 2015-04-21 2015-04-21 Service implementation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510191825.0A CN106157085A (en) 2015-04-21 2015-04-21 Service implementation method and device

Publications (1)

Publication Number Publication Date
CN106157085A true CN106157085A (en) 2016-11-23

Family

ID=58057922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510191825.0A Pending CN106157085A (en) 2015-04-21 2015-04-21 Service implementation method and device

Country Status (1)

Country Link
CN (1) CN106157085A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101655865A (en) * 2009-09-10 2010-02-24 金蝶软件(中国)有限公司 Method for providing object information, object platform and application system
CN103177370A (en) * 2011-12-20 2013-06-26 国民技术股份有限公司 Electronic coupon sharing and using method and system
CN103810616A (en) * 2012-11-02 2014-05-21 周世雄 Method and system for electronic and mobile marketing using unique code means

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101655865A (en) * 2009-09-10 2010-02-24 金蝶软件(中国)有限公司 Method for providing object information, object platform and application system
CN103177370A (en) * 2011-12-20 2013-06-26 国民技术股份有限公司 Electronic coupon sharing and using method and system
CN103810616A (en) * 2012-11-02 2014-05-21 周世雄 Method and system for electronic and mobile marketing using unique code means

Similar Documents

Publication Publication Date Title
CN105989511A (en) Service realization method and device
WO2017114207A1 (en) Method and apparatus for implementing electronic gift packet
WO2018107994A1 (en) Method and device for allocating augmented reality-based virtual objects
WO2017129083A1 (en) Method, device, and system for message processing and computer storage medium
CN111612461B (en) Interaction method and device based on electronic certificates and electronic equipment
CN105989483A (en) Service realizing method and device and payment method and device
CN111192053B (en) Interaction method and device based on electronic certificate and electronic equipment
CN110148014B (en) Information processing method, information processing device, blockchain node equipment and storage medium
WO2019034161A1 (en) Information processing method and system
CN109660594A (en) Orientation method for pushing, methods of exhibiting, device and the equipment of service processing result
CN105338066A (en) Information sharing method and client
CN105450641A (en) Verification method, verification device and verification system
CN106415637A (en) Commission allocation method and system
CN113850575A (en) Resource processing method and device
WO2016193811A1 (en) Systems and methods for publicly verifiable authorization
CN110120908B (en) Group message processing method and device and server
CN111311146B (en) Information transmission method and system, communication system, computer readable storage medium
US20180165685A1 (en) Method, Terminal, and Related Server for Providing Transaction Object
CN106157085A (en) Service implementation method and device
KR101241365B1 (en) Push service system and method
JP2007156534A (en) Communication apparatus
US20190102763A1 (en) System and method for self-publication and distribution of digital content via the internet
KR20000024118A (en) Method to provide Electronic Mail service using functions of Segmentation and Reassembly of the Mail data
CN112612401A (en) Prompt message processing method, device, system, equipment and storage medium
CN111612527A (en) Fission red packet issuing method, device, equipment and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1230325

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123