Detailed description of the invention
Fig. 1 is the scene schematic diagram in business realizing.The embodiment of the present application technical scheme can be used in difference
Realize related service between family, such as to realize " red packet " distributing service, " reward voucher " distributing service etc.,
Wherein red packet transmission business specifically may refer to, and user is by by oneself fund or other is virtual
Article etc., give other user by the way of providing red packet.Prior art is when realizing related service, logical
Often it is to be appreciated that Business Initiator user knows business recipient user ability initiation business accurately, and,
Need to generate a URL address often, or the mode generating the Quick Response Code including URL notifies
Business recipient user, is achieved in that process is extremely complex.Such as, scene shown in Fig. 1, if user is A
If wish to realize data interaction with user B, user C etc., such as to realize the granting industry of " red packet "
As a example by business, user A must specify user B, user C etc. for destination object one by one, then number of users is more
The plenty of time resource of user A can be expended time many.Meanwhile, user A is for user B, user C etc.
Specify, need premised on user B, user C etc. are for the association user of user A, such as user B,
User C etc. need with forms such as " good friends ", are recorded in advance in the address list of user A;Meanwhile,
In the process, business recipient user, as user B, user C also need to initiate according to user A
The service chaining of business, such as URL or Quick Response Code, access and complete corresponding business, business realizing
Process is complex.
In consideration of it, the application provides a kind of service implementation method and device, come real in the way of relatively simple
Existing related service, such as red packet business, or other business that can be realized by network etc..
In the embodiment of the present application, related service can be realized based on password, specifically, as in figure 2 it is shown,
During this business realizing, with pass word as intermediary, or business interface can be referred to as, it is achieved
Mutual between user A and user B.Specifically, by user A after service end is asked, service end
The password being associated for needing mutual object to generate, and this password is issued to user A;User A can
By directly transmitting, sharing to the any-mode such as social network-i i-platform or oral account, password is showed use
Family B;So, when user B initiates, to service end, the request comprising this password, can obtain and be associated
Interactive object.
Visible, during business realizing based on password form, interaction is the simplest, flexible, but
Owing to only being performed password transmission by user A self, it is restricted in some cases, such as, for needing
Wanting the business that more users participate in, rely solely on user A to transmit password, mode is relatively simple, must connect
The number of users receiving this password increasess slowly, and is unfavorable for business realizing.Therefore, industry is realized based on password
During business, the service implementation method of the application offer and device, can be further by secondary password
Mode, promotes expansion speed and the scope of business object.
Fig. 3 shows the flow chart of a kind of service implementation method according to the application one exemplary embodiment,
As it is shown on figure 3, the method is applied to service end, may comprise steps of:
Step 302, when receiving the first extraction request comprising one-level password that first user is initiated, obtains
Take the object set corresponding with described one-level password, and the partial objects in described object set is distributed extremely
Described first user.
In the present embodiment, object can be any form of interaction data.As an exemplary embodiment,
Object can be virtual objects, such as reward voucher, e-greeting card, the cash gift etc.;Correspondingly, object set
It can be the set of virtual objects.Being appreciated that for different business realizing, virtual objects is corresponding
In corresponding business, such as payment transaction, object can be fund, the commercial activities that businessman initiates
During business, object can be reward voucher, etc..
In the present embodiment, service end can receive any time before or after one-level password,
Object set is divided into multiple object subset, such as all objects in object set is averagely divided to
Each object subset, or the division of object is realized according to other ratios, this is not limited by the application
System.
So after receiving one-level password, can be from the described object set being divided into multiple object subset
In conjunction, the object subset of predetermined number or ratio is distributed to first user.Correspondingly, in step 306
In, remaining object subset can be distributed one by one to each second user.Pre-by object set
First divide, contribute to shortening service end response time after receiving one-level password and secondary password.
In the present embodiment, one-level password or secondary password can be character string forms, and this character string is permissible
Comprise one or more character, and every character can be the arbitrary shapes such as numeral, letter, Chinese character, symbol
Formula;According to the actual requirements or allocation plan can determine the number of characters that one-level password or secondary password comprise
Compound mode between amount and every character.
Step 304, generates and the secondary password that object is associated that remains in described object set, and to
Described first user returns the request response comprising described secondary password, in order to described first user is by described
Secondary password is shown to other users, and described right based on described secondary password extraction by other users
As the residue object in set.
As an exemplary embodiment, request response can directly comprise secondary password, then first user
Directly can obtain the character string constituting secondary password from request response.
As another exemplary embodiment, request response could be included for obtaining the chain of this secondary password
Connect, be now equivalent to secondary password be indirectly contained in request response;So, first user can lead to
Cross access this link can obtain correspondence secondary password, obtain constitute secondary password character string.
As further example embodiment, the exhibiting pictures comprising secondary password can be generated, and by this exhibition
Diagram sheet is contained in request response.Certainly, character string based on the secondary password obtained, first user
Corresponding exhibiting pictures can also be generated voluntarily, be shown for other users.
In the above-described embodiments, it is also possible to the information of the provider user of described object set is back to institute
State first user, in order to described first user by the information of described secondary password and described provider user to
Other users are associated showing.For example, the commercial activities business such as businessman initiated, can
So that Business Information and secondary password are associated showing, thus realize the popularizing action to businessman.
Optionally, can also include after the step 304: according to the second Client-initiated bag received
The second extraction request containing described secondary password, distributes in described object set for described second user
Residue object.
In the present embodiment, the second user refers to all " other users " being different from first user, can
To represent one or more " other users ".
In the present embodiment, as an exemplary embodiment, can initiate receiving each second user
Second extraction request time, check and whether described object set exist residue object;When existing, residue is right
As time, therefrom extract predetermined number or the object of ratio, and distribute to corresponding second user.
In the present embodiment, as another exemplary embodiment, can send out receiving each second user
During the second extraction request risen, the quantity of the second extraction request that statistics has been received by;When statistical magnitude reaches
During to predetermined number, please to the second extraction having been received by by the residue object distribution in described object set
Ask the second corresponding user.
Below in conjunction with Fig. 4, to being in many ways described in detail involved by technical scheme based on the application.
Wherein, Fig. 4 shows the flow process of the another kind of service implementation method according to the application one exemplary embodiment
Figure, as shown in Figure 4, the method may comprise steps of:
Step 402, carries out service negotiation between platform and service end.
In the present embodiment, " platform " for providing any account of object set, it can be
People's account, such as user x;Or, it is also possible to for enterprise account, such as " XX television station " etc..
In the present embodiment, when holding consultation between platform and service end, consult content and can include following
Content: the object subset quantity that the quantity of object set, each object set comprise, each object subset
The number of objects comprised, and the allocation rule etc. of object set, object subset or object;Platform is permissible
By foregoing is added to negotiation message, and send to service end, to realize informing.
Step 404, service end, according to negotiation result, determines object set and is associated with this object set
One-level password.
In the present embodiment, as a example by " red packet " is provided, then object set is " red packet group ", object
Subset is " red packet " comprised in each " red packet group ", and object is the cash gift in each " red packet ".
In the present embodiment, realizing object set and when associating of one-level password, one-level password can close
It is coupled to part or all of object set;Interrelational form can be defined by negotiation result.
Step 406, one-level password is back to platform by service end.
Step 408, one-level password is shown by platform to user, it is assumed that user A obtains one-level mouth
Order.
In the present embodiment, platform can pass through the canals such as TV programme, program of radio station, video website program
Road, uses the various ways such as video playback, sound report, host's oral account, shows one-level mouth to user
Order;Or, platform can also by sending note to user, the mode such as share in social network-i i-platform,
One-level password is shown to user.
In the present embodiment, can there is certain life cycle in one-level password, such as 5 minutes, then surpass
After going out this life cycle, service end can delete the incidence relation between this one-level password and object set,
And this one-level password can be reclaimed;Wherein, in the one-level password set that service end can will reclaim
In data collection storehouse, then directly can choose from data collection storehouse and use next time, and save
Generation process to one-level password.
Step 410, user A sends the first extraction request to service end, comprises in this first extraction request
One-level password.
Step 412, service end obtains the object set corresponding to one-level password, and determines this object set
It is divided the object subset obtained, and the rule to user's A distribution object subset.
In the present embodiment, when one-level password is corresponding to multiple object sets, or an object of correspondence
When set comprises multiple object subset, can therefrom choose one or many according to predefined allocation rule
Individual object subset, to be tied to user A;Such as, " allocation rule " can be predefined distribution ratio
Example or quantity allotted.
Step 414, according to predefined allocation rule, by corresponding object subset distribution to user A.
Step 416, for the residue object subset in the object set that one-level password is corresponding, generates relevant
The secondary password of connection.
Step 418, service end returns the request response comprising secondary password to user A.
In the present embodiment, secondary password can be character string, and this character string can comprise one or more
Character, and every character can be the arbitrary forms such as numeral, letter, Chinese character, symbol;Certainly, two grades
Password should be different from one-level password, to guarantee password uniqueness.So, service end can directly will be somebody's turn to do
The character string of secondary password is contained in request response, and sends to user A;Or, service end is permissible
Generate the exhibiting pictures comprising this secondary password, and this exhibiting pictures is sent to user A.
When generating exhibiting pictures, service end can be based on predefined fixed form, and static generation is shown
Picture;Or, various template can be predefined, then service end can generate corresponding to two grades of current mouths
Template ID of order, and obtain the picture attribute template corresponding to described template ID, thus according to this picture
Attribute templates dynamically generates exhibiting pictures.Wherein, picture attribute template may include that background picture,
Combination in any between each attribute such as background color, text color, word size, stylistic category, can
To guarantee the style varied of exhibiting pictures, it is difficult to be caught in corresponding rule.
Certainly, the client that user A uses is when receiving the secondary password that service end returns, it is also possible to
Being locally generated exhibiting pictures, its generating mode is similar with service end (if this locality does not has required picture
Attribute templates, then need to download from service end), here is omitted.
Step 420, user A shows secondary password to other users, it is assumed that user B obtains secondary password.
In the present embodiment, as a example by " exhibiting pictures ".Exhibiting pictures can be preserved to this by user A
Ground, and shared to social network-i i-platform by social networking application so that user B can be at social networks
The secondary password in the exhibiting pictures that user A shares is viewed on platform.
Certainly, user A can also realize the displaying of secondary password by other means.Such as, user
Exhibiting pictures can directly be sent to user B by A, such as realizes by the way of instant messaging.Or
Person, secondary password can also be informed user B by any-modes such as oral account, broadcast by user A.
Wherein, service end can also be in such as step 418, by the information of the provider user of object set
Send to user A, then when user A by visual form to user's B show secondary password time, can be by
The information of provider user and secondary password are associated showing, such as comprise two in exhibiting pictures simultaneously
Level password and the information of provider user, thus realize the popularization to provider user.
Step 422, user B sends the second extraction request to service end, comprises in this second extraction request
Secondary password.
Step 424, service end judges the most whether meet the default distributive condition to residue object subset.
In the present embodiment, based on different default distributive conditions, can be to the second transmission extracting request
Side user (such as user B) performs corresponding object batch operation.As an exemplary embodiment, if
" object batch operation " is: after receiving the second extraction request, distribute surplus for corresponding user immediately
Remaining object, then " presetting distributive condition " is: receive the second extraction request.So, terminate as user
After receiving the second extraction request that user B sends, can be according to the secondary password wherein comprised, by correspondence
The residue object distribution of object set to user B.
When the residue object of object set is distributed to user B, if object set is already divided into many
The form of individual object subset, then can therefrom extract needs distribution to user B's according to default extraction rule
Object subset, this default rule of extracting can be: extraction or random extraction etc. successively;Certainly, in this Shen
In technical scheme please, " being divided into object subset " is only an illustrative embodiments the most no matter
It is to user A (corresponding to one-level password) or user B (corresponding to secondary password), all can be according to
Default value or ratio, directly extract corresponding object from object set and realize distribution, and without inciting somebody to action
Object set is divided into multiple object subset in advance.
As another exemplary embodiment, if " object batch operation " is: when receiving sufficient amount
The second extraction request after, just distribute residue object to corresponding user, then " presetting distributive condition " is:
Receive the second extraction request of predetermined number.
In the present embodiment, if object set is divided into multiple object subset, then " present count in advance
Amount " should be less than or equal to the quantity of residue object subset, in order to and the use of request is extracted in all transmissions second
At least one object subset can be distributed per family;If object set is not divided into multiple object in advance
Collection, then " predetermined number " can be any amount, is such as manually arranged by user A, then exists
The user of this predetermined number distributes in (such as mean allocation, by random pro rate etc.) object set
Residue object.
Certainly, can there is certain life cycle in secondary password, such as 20 minutes, then exceed this life
Week after date, service end can delete the incidence relation between this secondary password and object set, and permissible
This secondary password is reclaimed;Wherein, the secondary password of recovery can be concentrated on recovery number by service end
According in storehouse, then directly can choose from data collection storehouse and use next time, and eliminate two grades
The generation process of password.
Step 426, pre-conditioned meet after, the residue object in user's B distribution object set.
From above-described embodiment, the application is based on one-level password and the combination of secondary password, it is achieved that flat
Multi-layer business transmission between platform-user An-user Bn.As it is shown in figure 5, platform is by one-level mouth
Order, can directly extending user A1 to n users such as user An, and each user Ai (1≤i≤n)
Can be further expanded by secondary password again, such as user A1 extension obtains user B1 to user Bn,
Business object quantity exponentially type is increased.
It should be understood that
In one exemplary embodiment, " one-level password " and " secondary password " can be understood as in the narrow sense
" one-level " and " two grades " relation, i.e. two layer service structures shown in Fig. 5.And in another exemplary
In embodiment, " one-level password " and " secondary password " can be understood as sensu lato " higher level " and " under
Level " relation, such that it is able to use user and the password structure of more level, to realize in quantity and efficiency
Growth;As shown in Figure 6, as a example by user B1, on the basis of structure shown in Fig. 5, it is also possible to
Generate three grades of corresponding passwords for user B1, and by the user B1 displaying to three grades of passwords, used
" secondary password " and " three grades of passwords ", to users such as user B1n, can be considered as extensively by family B11 herein
" one-level password " and " secondary password " in justice.
Fig. 7 shows the schematic configuration diagram of the electronic equipment of the exemplary embodiment according to the application.Please
With reference to Fig. 7, at hardware view, this electronic equipment includes processor, internal bus, network interface, interior
Deposit and nonvolatile memory, be certainly also possible that the hardware required for other business.Processor from
Then the computer program reading correspondence in nonvolatile memory runs, in internal memory on logic level
Form business realizing device.Certainly, in addition to software realization mode, it is real that the application is not precluded from other
Mode of existing mode, such as logical device or software and hardware combining etc., say, that following handling process
Executive agent be not limited to each logical block, it is also possible to be hardware or logical device.
Refer to Fig. 8, in Software Implementation, this business realizing device can include the first distribution list
Unit, request-response unit and the second allocation unit.Wherein:
First allocation unit, when receiving the first extraction request comprising one-level password that first user is initiated,
Obtain the object set corresponding with described one-level password, and the partial objects in described object set is distributed
To described first user;
Request-response unit, generates the secondary password being associated with the residue object in described object set,
And the request response comprising described secondary password is returned to described first user, in order to described first user will
Described secondary password is shown to other users, and is extracted institute by other users based on described secondary password
State the residue object in object set.
Optionally, also including: the second allocation unit, the second Client-initiated according to receiving comprises institute
State the second extraction request of secondary password, distribute the residue in described object set for described second user
Object.
Optionally, described first allocation unit specifically for:
From the described object set being divided into multiple object subset, by predetermined number or the object of ratio
Subset allocation is to described first user.
Optionally, described second allocation unit specifically for:
Remaining object subset is distributed one by one to each second user.
Optionally, described second allocation unit specifically for:
Receive each second Client-initiated second when extracting request, whether check in described object set
There is residue object;
When there is residue object, therefrom extracting predetermined number or the object of ratio, and distributing to accordingly
Second user.
Optionally, described second allocation unit specifically for:
When receiving each second Client-initiated the second extraction request, the second extraction that statistics has been received by
The quantity of request;
When statistical magnitude reaches predetermined number, the residue object in described object set is distributed to connecing
Second user of the second extraction request correspondence received.
Optionally, also include:
Association display unit, is back to the information of the provider user of described object set described first and uses
Family, in order to described first user by the information of described secondary password and described provider user to other users
It is associated showing.
Therefore, the application realizes business by password mode, can simplify business realizing process;Meanwhile,
The user of each use one-level password, all can be activated business object by secondary password, thus help
In increasing data interaction amount, promoting interactive efficiency.
In a typical configuration, calculating equipment include one or more processor (CPU), input/
Output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
(RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flash
RAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by
Any method or technology realize information storage.Information can be computer-readable instruction, data structure,
The module of program or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory
(PRAM), static RAM (SRAM), dynamic random access memory (DRAM),
Other kinds of random access memory (RAM), read only memory (ROM), electrically erasable
Read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory
(CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic
Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be counted
The information that calculation equipment accesses.According to defining herein, computer-readable medium does not include that temporary computer can
Read media (transitory media), such as data signal and the carrier wave of modulation.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non-
Comprising of exclusiveness, so that include the process of a series of key element, method, commodity or equipment not only
Including those key elements, but also include other key elements being not expressly set out, or also include for this
The key element that process, method, commodity or equipment are intrinsic.In the case of there is no more restriction, by language
The key element that sentence " including ... " limits, it is not excluded that including the process of described key element, method, business
Product or equipment there is also other identical element.
The foregoing is only the preferred embodiment of the application, not in order to limit the application, all at this
Within the spirit of application and principle, any modification, equivalent substitution and improvement etc. done, should be included in
Within the scope of the application protection.