CN108280692A - Reward distribution method, device, computer readable storage medium and terminal - Google Patents

Reward distribution method, device, computer readable storage medium and terminal Download PDF

Info

Publication number
CN108280692A
CN108280692A CN201810110108.4A CN201810110108A CN108280692A CN 108280692 A CN108280692 A CN 108280692A CN 201810110108 A CN201810110108 A CN 201810110108A CN 108280692 A CN108280692 A CN 108280692A
Authority
CN
China
Prior art keywords
participator
information
reward
user
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810110108.4A
Other languages
Chinese (zh)
Inventor
曾衍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Cubesili Information Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN201810110108.4A priority Critical patent/CN108280692A/en
Publication of CN108280692A publication Critical patent/CN108280692A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0214Referral reward systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of reward distribution method of present invention offer, device, computer readable storage medium and terminal, to solve the problems, such as that the effect of the product promotion existing in the prior art caused by the link of same user's repeated accesses does not reach expected.One of described method includes step:Receive the parameter information by participator that client uploads when the link that participator shares is accessed by participator;Whether according to the parameter information verification by participator by participator is malicious user;Determined whether to provide reward according to the result of verification.The embodiment of the present invention can screen user, to get high quality user, substantially increase the effect of product promotion.

Description

Reward distribution method, device, computer readable storage medium and terminal
Technical field
The present invention relates to Internet technical fields, specifically, the present invention relates to a kind of reward distribution method, device, meters Calculation machine readable storage medium storing program for executing and terminal.
Background technology
Epoch in internet invite user to obtain reward, share promotion link acquisition reward and often promote product A kind of important means.The reward extension process of the prior art, issues often by server and is linked to client, and client is logical It crosses and shares channel and share in wechat good friend, wechat circle of friends, microblogging or QQ etc., user is by thumbing up number, or checks point The mode for enjoying the number of link, to obtain corresponding reward.
But the statistical result of aforesaid way, the molecule for often allowing some illegal have an opportunity to take advantage of, by more machines (such as Mobile phone is with simulator) or the modes repeated accesses link such as multiple accounts, reach swipe reward even obtain sudden huge profits as a result, because Although having put into many costs during this product promotion, that get is some false users, these users' Retention ratio is extremely low, and the effect of product promotion is caused not reach expected.
Invention content
The present invention is directed to the shortcomings that existing way, propose a kind of reward distribution method, computer readable storage medium and Terminal, the effect to solve the product promotion existing in the prior art caused by the link of same user's repeated accesses do not have Reach expected problem, to improve the effect of product promotion.
The embodiment of the present invention provides a kind of reward distribution method, including step according to the first aspect:
The parameter by participator that client uploads when the link that participator shares is accessed by participator is received to believe Breath;
Whether according to the parameter information verification by participator by participator is malicious user;
Determined whether to provide reward according to the result of verification.
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator, By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion Fruit.
In one embodiment, described to link the parameter information for including the participator, the client is additionally operable to upload The parameter information for linking the participator for including;Before the result according to verification determines whether to provide reward, also Including:
Verify whether the participator is malicious user according to the parameter information of the participator.
For the present embodiment when accessing the link that participator shares by participator, client not only will be in the information by participator Pass, also upload the information of participator, by being verified by the information of the information of participator and participator so that it is determined that Whether granting is rewarded, compared to the prior art in directly provide the mode of reward, which further screens user, from And that get is high quality user, further improves the effect of product promotion.
In one embodiment, before the result according to verification determines whether to provide reward, further include:
Obtain the user account by participator in the first platform for accessing the link;
Blacklist account library based on preset first platform verify the user account by participator whether be Blacklist account;
If so, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users.
The parameter information that the present embodiment not only uploads client verifies, and channel is being accessed herein in connection with by participator User account in (the first platform) by participator to further being verified, by further being screened to user, to That get is high quality user, further improves the effect of product promotion.
In one embodiment, before the result according to verification determines whether to provide reward, further include:
Obtain user account of the participator in the second platform for sharing the link;
Whether the user account that the blacklist account library based on preset second platform verifies the participator is black List account;
If so, determining that the participator is malicious user, otherwise determine that the participator is normal users.
The parameter information that the present embodiment not only uploads client verifies, and is sharing channel (the herein in connection with participator Two platforms) in user account participator is further verified, by further being screened to user, to get Be high quality user, further improve the effect of product promotion.
In one embodiment, described by the parameter information of participator includes subscriber identity information, facility information, geographical position Confidence ceases and IP address;Whether the described parameter information verification according to described by participator by participator is that malice is used Family, including:First number that the subscriber identity information accesses the link is counted, if first number is more than setting most The threshold value of big access times, uses subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise uses It is normal users identity information that second value, which characterizes the subscriber identity information,;It counts the facility information and accesses the link Second number uses third value to characterize the facility information and believes for rogue device if second number is more than the threshold value Breath, otherwise uses facility information described in the 4th numerical representation method for normal device information;It counts the geographical location information and accesses institute The third number of link is stated, if the third number is more than the threshold value, using geographical location information described in the 5th numerical representation method For malice geographical location information, otherwise use geographical location information described in the 6th numerical representation method for normal geographical location information;System The 4th number that the IP address accesses the link is counted, if the 4th number is more than the threshold value, using the 7th numerical tabular It is malicious IP addresses to levy the IP address, otherwise uses IP address described in the 8th numerical representation method for normal IP address;To the use The corresponding numerical value of family identity information, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information and institute It sums after stating the corresponding numeric weights of IP address, obtains the total value by participator;If the total value is more than setting number Value, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users;
And/or
In one embodiment, the parameter information of the participator includes subscriber identity information, facility information, geographical location Information and IP address;It is described to verify whether the participator is malicious user according to the parameter information of the participator, including: First number that the subscriber identity information shares the link is counted, if the maximum that first number is more than setting is shared time Several threshold values uses subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise uses second value It is normal users identity information to characterize the subscriber identity information;It counts second that the facility information shares the link Number uses third value to characterize the facility information for rogue device information, otherwise if second number is more than the threshold value Use facility information described in the 4th numerical representation method for normal device information;It counts the geographical location information and shares the link Third number uses geographical location information described in the 5th numerical representation method for maliciously if the third number is more than the threshold value Location information is managed, otherwise uses geographical location information described in the 6th numerical representation method for normal geographical location information;Count the IP The 4th number of the link is shared in address, if the 4th number is more than the threshold value, using IP described in the 7th numerical representation method Address is malicious IP addresses, otherwise uses IP address described in the 8th numerical representation method for normal IP address;The user identity is believed Cease corresponding numerical value, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information and the IP address It sums after corresponding numeric weights, obtains the total value of the participator;If the total value, which is more than, sets numerical value, described in determination Participator is malicious user, otherwise determines that the participator is normal users.
The present embodiment considers subscriber identity information, equipment identity information, geographical location information and IP address, can More fully accurately judge by participator and/or participator whether to be malicious user.
In one embodiment, the result according to verification determines whether to provide reward, including:If described by participator For normal users, determines and provide reward;If it is described by participator be malicious user, determine the malice degree of the malicious user, If malice degree is less than preset first threshold, determines and provide reward, if malice degree is more than or equal to first threshold and is less than second Threshold value determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if malice degree is big Reward is not provided in equal to second threshold, determining and to the progress title processing of the user account of the malicious user;
And/or
The result according to verification, which determines whether to provide, rewards, including:If the participator and described equal by participator For normal users, determines and provide reward;If the participator or it is described by participator be malicious user, determine the malicious user Malice degree, if malice degree be less than preset first threshold, determine provide reward, if malice degree be more than or equal to the first threshold Value is less than second threshold, determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if Malice degree is more than or equal to second threshold, determines and does not provide reward and carried out at title to the user account of the malicious user Reason;If the participator and it is described by participator be malicious user, reward is not provided in determination, and to the user of the participator Account and the user account by participator carry out title processing.
The embodiment of the present invention additionally provides another reward distribution method, including step according to the second aspect:
Receive the access instruction for the link shared to participator by participator;
The access instruction is responded, server is uploaded to by the parameter information of participator by described, so that the server Whether according to the parameter information verification by participator by participator is malicious user, and is determined according to the result of verification Whether granting is rewarded.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product The effect of popularization.
In one embodiment, the link includes the parameter information of the participator;The response access instruction Later, further include:
The parameter information for linking the participator for including is uploaded to server, so that the server is according to institute The parameter information for stating participator verifies whether the participator is malicious user, and determines whether to provide according to the result of verification and encourage It encourages.
The present embodiment not only will be uploaded to clothes when accessing the link that participator shares by participator by the information of participator Business device, is also uploaded to server, server passes through to by the information of the information of participator and participator by the information of participator Verification is carried out to determine whether to provide reward, compared to the prior art in directly provide the mode of reward, which is further User is screened, that get is high quality user, further improves the effect of product promotion.
The embodiment of the present invention additionally provides a kind of reward dispensing apparatus according in terms of third, including:
Parameter information receiving module, for receiving client upload when the link that participator shares is accessed by participator The parameter information by participator;
Correction verification module, for it is according to the parameter information verification by participator by participator whether be that malice is used Family;
Module is provided in reward, and reward is provided for determining whether according to the result of verification.
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator, By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion Fruit.
The embodiment of the present invention additionally provides another reward dispensing apparatus according to the 4th aspect, including:
Access instruction receiving module, the access instruction for receiving the link shared to participator by participator;
Parameter information uploading module is uploaded to described by the parameter information of participator for responding the access instruction Server, so that whether it by participator is that malice is used that the server is according to the parameter information verification by participator Family, and determine whether to provide according to the result of verification and reward.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product The effect of popularization.
The embodiment of the present invention additionally provides a kind of computer readable storage medium, stores thereon according to the 5th aspect There is computer program, which realizes the reward distribution method described in above-mentioned any one when being executed by processor.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product The effect of popularization.
The embodiment of the present invention additionally provides a kind of terminal, the terminal includes according to the 6th aspect:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processing Device realizes the reward distribution method described in above-mentioned any one.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product The effect of popularization.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein:
Fig. 1 is the flow diagram of the reward distribution method of one embodiment of the invention;
Fig. 2 is the structural schematic diagram of the reward dispensing apparatus of one embodiment of the invention;
Fig. 3 is the flow diagram of the reward distribution method of another embodiment of the present invention;
Fig. 4 is the structural schematic diagram of the reward dispensing apparatus of another embodiment of the present invention;
Fig. 5 is the flow diagram of the reward distribution method of one specific embodiment of the present invention;
Fig. 6 is the structural schematic diagram of the terminal of a specific embodiment of the invention.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that is used in the specification of the present invention arranges It refers to there are the feature, integer, step, operation, element and/or component, but it is not excluded that presence or addition to take leave " comprising " Other one or more features, integer, step, operation, element, component and/or their group.Wording used herein " and/ Or " include that the whole of one or more associated list items or any cell are combined with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), there is meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless by specific definitions as here, the meaning of idealization or too formal otherwise will not be used To explain.
It includes wireless communication that those skilled in the art of the present technique, which are appreciated that " terminal " used herein above, " terminal device " both, The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and includes receiving and transmitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment May include:Honeycomb or other communication equipments are shown with single line display or multi-line display or without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal device " they can be portable, can transport, be mounted on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or mobile phone with music/video playing function, can also be the equipment such as smart television, set-top box.
Those skilled in the art of the present technique are appreciated that server used herein above, high in the clouds, remote network devices etc. are general It reads, there is effects equivalent comprising but it is not limited to computer, network host, single network server, multiple network server collection Or the cloud that multiple servers are constituted.Here, cloud is taken by a large amount of computers or network for being based on cloud computing (Cloud Computing) Device of being engaged in is constituted, wherein cloud computing is one kind of Distributed Calculation, and one be made of the computer collection of a group loose couplings is super Virtual machine.It, can be by any logical between remote network devices, terminal device and WNS servers in the embodiment of the present invention Letter mode realizes communication, including but not limited to, mobile communication based on 3GPP, LTE, WIMAX, based on TCP/IP, udp protocol Computer network communication and low coverage wireless transmission method based on bluetooth, Infrared Transmission standard.
Below in conjunction with the accompanying drawings and embodiment, from the angle of server, the angle of client to reward provided by the invention Distribution method, computer readable storage medium and terminal describe in detail.
First, it describes in detail from the angle of server to the embodiment of the present invention.
As shown in Figure 1, the flow diagram of the reward distribution method for an embodiment, the method comprising the steps of:
S110, the ginseng by participator that client uploads when the link that participator shares is accessed by participator is received Number information.
Participator is the user for sharing link, is the user for accessing link by participator, is linked as promoting set by product Link.When user generates a splitting glass opaque, a parameter shared link and needed can be asked to server, such as Mobile phone Y Y live streaming is shared, and parameter generally comprises channel number, the content shared and the picture etc. shared, meanwhile, optionally, production Client used in the user of raw splitting glass opaque, i.e. client used in participator, can obtain the parameter information of participator, such as Subscriber identity information, facility information, geographical location information and IP (Internet Protocol, the association interconnected between network View) address etc., the parameter information of the participator obtained by the parameter and client asked to server generates a link, Therefore, described to link the parameter information for including the participator.Wherein, subscriber identity information shares the link institute for participator The subscriber identity information of use is not limited to User ID (identification, identity number);Facility information is participator The information for sharing equipment used by the link is not limited to MAC Address (the Media Access Control of equipment Location, media access control address), IMEI (International Mobile Equipment Identity, the world movement sets Standby identity code) and IMSI (International Mobile Subscriber Identification Number, it is international Mobile identification number) etc. information;Geographical location information is the information in the geographical location where when participator shares the link, It is not limited to the longitude and latitude got by GPS (Global Positioning System, global positioning system) etc.;IP Location is that participator shares the IP address used in the link.In addition, optional, client can believe the parameter of these participators Breath is put into a fixed position after encryption, directly reads the parameter letter of participator from the fixed position when generating link Then breath generates a link by the parameter information of the participator of the parameter and reading asked to server.
It should be appreciated that the present invention is not to the specific of the parameter information of the relevant parameter and participator asked from server Form is defined.In addition, when user generates a splitting glass opaque, can also relevant parameter only be asked from server, The parameter information of participator is not read, then the link generated only includes the relevant parameter information asked from server.
Generate promote product used in link after, participator by share channel share wechat good friend, wechat circle of friends, In microblogging or QQ etc., when being accessed to the link by modes such as clicks by participator, client, which can pass through to call, to be serviced The interface of device will be uploaded to server by the parameter information of participator.Wherein, optionally, include by the parameter information of participator It is not limited to subscriber identity information, facility information, geographical location information and IP address etc..Wherein, subscriber identity information is quilt Participator accesses subscriber identity information used by the link, is not limited to User ID;Facility information is to be accessed by participator The information of equipment used by the link, is not limited to the information such as the MAC Address, IMEI and IMSI of equipment;Geographical location Information is the information in the geographical location where when accessing the link by participator, is not limited to the warp got by GPS etc. Latitude;IP address is the IP address accessed by participator used in the link.In addition, it is optional, it uploads by the parameter of participator The client of information can be by the client used in participator, but the present invention makes restriction not to this, for example, linking When accessed, other clients, Qi Take can will be sent to by the parameter information of participator by the client used in participator Family end will be uploaded by the parameter information of participator.
S120, it is according to the parameter information verification by participator by participator whether be malicious user.
Whether it is that malicious user refers to whether carrying out malicious access to link by participator by participator.Server obtains Whether to after the parameter information by participator, it is malicious user to be verified by participator by these parameter informations.If it is sharing The new mode for obtaining reward is drawn, when by participator by being linked into application, server also needs to verification and used by participator Whether family is new user.
S130, determined whether to provide reward according to the result of verification.
According to being determined whether to provide reward by the check results of participator, the object of granting reward herein can basis Actual needs is configured, for example, obtaining the mode rewarded if link is shared, then can be determined whether according to the result of verification Participator is provided and is rewarded, in another example, the new mode for obtaining reward is drawn if sharing, then can be determined according to the result of verification is It is no to provide reward to participator and by participator.The concrete form of reward can also be configured according to actual needs, such as be encouraged Encourage virtual gold coin or discount coupon etc..
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator, By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion Fruit.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further right to link User screens, and improves the effect of product promotion, and in one embodiment, the client is additionally operable to upload the link packet The parameter information of the participator contained;Before the result according to verification determines whether to provide reward, further include:According to institute The parameter information for stating participator verifies whether the participator is malicious user.
In the present embodiment, when being accessed to link by modes such as clicks by participator, client will not only be shared The parameter information of person is uploaded to server, and the parameter information of participator is also uploaded to server.Optionally, it uploads by participator The client of parameter information and the client of participator can be by the client used in participator, but the present invention is not Restriction is made to this.Whether participator is that malicious user refers to that participator shares to whether link carries out malice.Server obtains Get by after the parameter information of participator and the parameter information of participator, by the verification of these parameter informations by participator with share Whether person is malicious user, then according to being determined whether to provide reward by the check results synthesis of participator and participator.
It is in one embodiment, described to be according to the determination of the result of verification in order to further increase the effect of product promotion Before no granting reward, further include:Obtain user's account by participator in the first platform for accessing the link Number;Blacklist account library based on preset first platform verifies whether the user account by participator is blacklist Account;If so, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users.
In the present embodiment, the first platform be access link platform, for example, by participator if it is by wechat, QQ or The channels such as person's Sina weibo access to link, then the first platform refers to wechat, QQ or Sina weibo etc..User account To be logged in the account used in the first platform, such as cell-phone number etc. by participator.After getting the user account by participator, in conjunction with Whether it is blacklist account that the pre-set blacklist account of the first platform institute verifies the user account, for example, server can be tied Operator is closed, such as some of Tencent or Ali blacklist accounts library go whether verification user account is blacklist account.Such as Fruit is blacklist account, can give the label of malice account, determines by participator it is malicious user, if not blacklist account Number, it is determined that by participator be normal users.
It is in one embodiment, described to be according to the determination of the result of verification in order to further increase the effect of product promotion Before no granting reward, further include:Obtain user account of the participator in the second platform for sharing the link; Whether the user account that the blacklist account library based on preset second platform verifies the participator is blacklist account; If so, determining that the participator is malicious user, otherwise determine that the participator is normal users.
In the present embodiment, the second platform is the platform for sharing link, for example, participator if it is by wechat, QQ or The channels such as Sina weibo share link, then the second platform refers to wechat, QQ or Sina weibo etc..User account is Participator logs in the account used in the second platform, such as cell-phone number etc..It is flat in conjunction with second after getting the user account of participator Whether it is blacklist account that the pre-set blacklist account of platform institute verifies the user account, for example, server can be in conjunction with operation Quotient, such as some of Tencent or Ali blacklist accounts library go whether verification user account is blacklist account.If it is black List account can give the label of malice account, determine that participator is malicious user, if not blacklist account, then really It is normal users to determine participator.
In one embodiment, whether it by participator is evil that the parameter information verification according to described by participator is described Anticipate user, including:First number that the subscriber identity information accesses the link is counted, if first number is more than setting Maximum access times threshold value, use subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise Second value is used to characterize the subscriber identity information as normal users identity information;It counts the facility information and accesses the chain Second number connect uses third value to characterize the facility information and is set for malice if second number is more than the threshold value Standby information, otherwise uses facility information described in the 4th numerical representation method for normal device information;The geographical location information is counted to visit The third number of the link is asked, if the third number is more than the threshold value, using geographical location described in the 5th numerical representation method Information is malice geographical location information, and geographical location information described in the 6th numerical representation method is otherwise used to believe for normal geographical location Breath;The 4th number that the IP address accesses the link is counted, if the 4th number is more than the threshold value, using the 7th number It is malicious IP addresses that value, which characterizes the IP address, otherwise uses IP address described in the 8th numerical representation method for normal IP address;To institute State the corresponding numerical value of subscriber identity information, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information with And sum after the corresponding numeric weights of the IP address, obtain the total value by participator;It is set if the total value is more than Fixed number value, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users.
In the present embodiment, consider by the subscriber identity information of participator, facility information, geographical location information and IP Address, counting user identity information, facility information, geographical location information and the number of IP address access link, will unite respectively Each number threshold value comparison with the maximum access times of setting respectively of meter, so that it is determined that subscriber identity information, facility information, Geographical location information and the respective numerical value of IP address.In addition in view of subscriber identity information repeatedly accesses link, facility information Repeatedly access link, geographical location information repeatedly accesses link and IP address repeatedly accesses link characterize by participator whether It is different for the probability of malicious user, therefore also pre-set respective weight.For example, same subscriber identity information repeatedly accesses chain The maximum probability by participator for malicious user of characterization is connect, what same facility information repeatedly accessed link characterization is by participator The probability time of malicious user is big, and same geographical location information repeatedly accesses the probability by participator for malicious user of link characterization Secondary small, same IP address repeatedly accesses the probability minimum by participator for malicious user of link characterization, then the user's body being arranged Part information, facility information, geographical location information and IP address weight be sequentially reduced.To subscriber identity information, facility information, Geographical location information and the respective numerical value of IP address seek weighted sum, you can to obtain by the total value of participator, by the sum Value is relatively assured that with setting numerical value by whether participator is malicious user.If being a malicious user by participator, Server can be the label that this is stamped a malicious user by participator.Optionally, threshold value can be lived by some previous Dynamic or some big datas analyses obtain.It more fully can accurately judge whether by participator be evil by this kind of mode Anticipate user.
In one embodiment, described to verify whether the participator is that malice is used according to the parameter information of the participator Family, including:First number that the subscriber identity information shares the link is counted, if first number is more than setting most The big threshold value for sharing number, uses subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise uses It is normal users identity information that second value, which characterizes the subscriber identity information,;It counts the facility information and shares the link Second number uses third value to characterize the facility information and believes for rogue device if second number is more than the threshold value Breath, otherwise uses facility information described in the 4th numerical representation method for normal device information;It counts the geographical location information and shares institute The third number of link is stated, if the third number is more than the threshold value, using geographical location information described in the 5th numerical representation method For malice geographical location information, otherwise use geographical location information described in the 6th numerical representation method for normal geographical location information;System The 4th number that the IP address shares the link is counted, if the 4th number is more than the threshold value, using the 7th numerical tabular It is malicious IP addresses to levy the IP address, otherwise uses IP address described in the 8th numerical representation method for normal IP address;To the use The corresponding numerical value of family identity information, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information and institute It sums after stating the corresponding numeric weights of IP address, obtains the total value of the participator;If the total value is more than setting numerical value, It determines that the participator is malicious user, otherwise determines that the participator is normal users.
In the present embodiment, with considering subscriber identity information, facility information, geographical location information and the IP of participator Location, respectively counting user identity information, facility information, geographical location information and IP address share the number of link, will count Each number share the threshold value comparison of number with the maximum of setting respectively, so that it is determined that subscriber identity information, facility information, Manage location information and the respective numerical value of IP address.In addition in view of repeatedly to share link, facility information more for subscriber identity information It is secondary share link, geographical location information repeatedly share link and IP address repeatedly share link characterization participator whether be evil The probability of meaning user is different, therefore also pre-sets respective weight.For example, same subscriber identity information repeatedly shares chained list The participator of sign is the maximum probability of malicious user, and the participator that same facility information repeatedly shares link characterization is malicious user Probability time it is big, the participator that same geographical location information repeatedly shares link characterization is that the probability time of malicious user is small, same The participator that IP address repeatedly shares link characterization is the probability minimum of malicious user, the then subscriber identity information being arranged, equipment The weight of information, geographical location information and IP address is sequentially reduced.To subscriber identity information, facility information, geographical location letter Breath and the respective numerical value of IP address seek weighted sum, you can to obtain the total value of participator, by the total value and setting numerical value Compare and is assured that whether participator is malicious user.If participator is a malicious user, server can be this point The person of enjoying stamps the label of a malicious user.Optionally, threshold value can be movable or some big datas by some previous Analysis obtains.It more fully can accurately judge whether participator is malicious user by this kind of mode.
It should be appreciated that the present invention is not limited to determine by participator and/or participator whether be evil above by number The mode of meaning user, whether it is malice that user can also be arranged as required to other modes judgement by participator and/or participator User.
Based on parameter information, longitude and latitude of the server to the login user ID for the malice judged, the login IP of malice, malice Degree, the user account of malice and repeat logon time etc. information give certain malice degree marking, assess what user It is the title, what user is to cancel reward etc., to assess later malicious user.With reference to only uploading By the parameter information of participator, and upload by two kinds of situations of parameter information of participator and participator to whether providing reward Embodiment is introduced.
In one embodiment, the result according to verification determines whether to provide reward, including:If described by participator For normal users, determines and provide reward;If it is described by participator be malicious user, determine the malice degree of the malicious user, If malice degree is less than preset first threshold, determines and provide reward, if malice degree is more than or equal to first threshold and is less than second Threshold value determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if malice degree is big Reward is not provided in equal to second threshold, determining and to the progress title processing of the user account of the malicious user.
In the present embodiment, if being normal users by participator, it is determined that can be participator and/or this sent out by participator Put reward;If being malicious user by participator, the malice degree for judging the malicious user is needed, is according to the determination of malice degree Whether no granting reward even carries out title etc., wherein first threshold and second threshold can be according to realities to malicious user Border needs to be configured.It determines that the mode of malice degree has very much, is disliked for example, being determined according to the frequency of malicious user clickthrough Meaning degree, frequency is bigger, and malice degree is bigger;In another example determining malice degree, number according to the total number of clicks of malicious user Bigger, malice degree is bigger;In another example when parameter information has multiple, according to the number determination malice for being determined as malice parameter Degree, number is more, and malice degree is bigger.It should be appreciated that the present invention is not defined the method for determination of malice degree.
In another embodiment, the result according to verification determines whether to provide reward, including:If the participator With it is described by participator be normal users, determine and provide reward;If the participator or it is described by participator be malicious user, It determines the malice degree of the malicious user, if malice degree is less than preset first threshold, determines and provide reward, if malice journey Degree is more than or equal to first threshold and is less than second threshold, determines and does not provide reward and the user account of the malicious user is kept to be in Normal operating condition determines if malice degree is more than or equal to second threshold and does not provide reward and to the user of the malicious user Account carries out title processing;If the participator and it is described by participator be malicious user, reward is not provided in determination, and to institute The user account and the user account by participator for stating participator carry out title processing.
In the present embodiment, if participator and be normal users by participator, it is determined that can be participator and/or the quilt Participator provides reward;If participator and there are one being malicious user, being needed the evil for judging the malicious user in participator Whether meaning degree determines whether to provide reward according to malice degree, even to malicious user progress title etc., wherein first Threshold value and second threshold can be configured according to actual needs;If participator and be malicious user by participator, It determines and does not provide reward and title processing is carried out to the two.Equally, determine that the mode of malice degree has very much, for example, according to evil The frequency of meaning user clicks on links determines malice degree, and frequency is bigger, and malice degree is bigger;In another example total according to malicious user Number of clicks determine malice degree, number is bigger, and malice degree is bigger;In another example when parameter information has multiple, according to sentencing The number for being set to malice parameter determines malice degree, and number is more, and malice degree is bigger.It should be appreciated that the present invention is not to disliking The method of determination of meaning degree is defined.
It should be noted that the present invention according to check results to not determining whether that the concrete mode for providing reward limits Fixed, user can also take other manner, can also ought be wherein for example, when to participator and when all being verified by participator One user provides reward when being malicious user.In addition, meeting preset value or like time if it is by sharing number Meet the modes such as preset value to determine whether to provide the situation of reward, normal users click can be denoted as according to preset time period internal standard Whether the number of link meets preset value determination.
It is above-mentioned to be directed to upload by the parameter information of participator, and by the ginseng of the parameter information of participator and participator Number two kinds of situations of information, it should be understood that, can also be only by the ginseng of participator when accessing the link that participator shares by participator Number information uploads, and is determined whether to provide reward according to the parameter information of participator.
Based on same inventive concept, the present invention also provides a kind of reward dispensing apparatus, below in conjunction with the accompanying drawings to the present invention's Specific implementation mode describes in detail.
As shown in Fig. 2, in one embodiment, a kind of reward dispensing apparatus, including:
Parameter information receiving module 110, for receiving client when the link that participator shares is accessed by participator The parameter information by participator passed;
Correction verification module 120, for it is according to the parameter information verification by participator by participator whether be malice User;
Module 130 is provided in reward, and reward is provided for determining whether according to the result of verification.
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator, By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion Fruit.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further right to link User screens, and improves the effect of product promotion, and in one embodiment, the client is additionally operable to upload the link packet The parameter information of the participator contained;The correction verification module 120 is additionally operable to verify institute according to the parameter information of the participator State whether participator is malicious user.
In order to further increase the effect of product promotion, in one embodiment, the correction verification module 120 is additionally operable to execute It operates below:Obtain the user account by participator in the first platform for accessing the link;Based on preset The blacklist account library of first platform verifies whether the user account by participator is blacklist account;If so, really It is fixed it is described by participator be malicious user, otherwise determine that described by participator is normal users.
In order to further increase the effect of product promotion, in one embodiment, the correction verification module 120 is additionally operable to execute It operates below:Obtain user account of the participator in the second platform for sharing the link;Based on preset institute The blacklist account library for stating the second platform verifies whether the user account of the participator is blacklist account;If so, determining institute It is malicious user to state participator, otherwise determines that the participator is normal users.
In one embodiment, described by the parameter information of participator includes subscriber identity information, facility information, geographical position Confidence breath and IP address etc.;The correction verification module 120 is additionally operable to execute following operation:The subscriber identity information is counted to access First number of the link, if first number is more than the threshold value of the maximum access times of setting, using the first numerical tabular It is malicious user identity information to levy the subscriber identity information, and second value is otherwise used to characterize the subscriber identity information as just Normal subscriber identity information;Second number that the facility information accesses the link is counted, if second number is more than described Threshold value uses third value to characterize the facility information as rogue device information, otherwise uses equipment described in the 4th numerical representation method Information is normal device information;The third number that the geographical location information accesses the link is counted, if the third number It more than the threshold value, uses geographical location information described in the 5th numerical representation method for malice geographical location information, otherwise uses the 6th Geographical location information described in numerical representation method is normal geographical location information;It counts the 4th time that the IP address accesses the link Number uses IP address described in the 7th numerical representation method otherwise to be used for malicious IP addresses if the 4th number is more than the threshold value IP address described in 8th numerical representation method is normal IP address;To the corresponding numerical value of the subscriber identity information, the facility information It sums, obtains after corresponding numerical value, the corresponding numerical value of the geographical location information and the corresponding numeric weights of the IP address The total value by participator;If the total value be more than setting numerical value, determine it is described by participator be malicious user, otherwise Determine it is described by participator be normal users.
In one embodiment, the parameter information of the participator includes subscriber identity information, facility information, geographical location Information and IP address etc.;The correction verification module 120 is additionally operable to execute following operation:It counts the subscriber identity information and shares institute First number of link is stated, if first number is more than the threshold value that the maximum being arranged shares number, using the first numerical representation method The subscriber identity information is malicious user identity information, and it is normal otherwise to use second value to characterize the subscriber identity information Subscriber identity information;Second number that the facility information shares the link is counted, if second number is more than the threshold Value uses third value to characterize the facility information as rogue device information, otherwise uses equipment letter described in the 4th numerical representation method Breath is normal device information;The third number that the geographical location information shares the link is counted, if the third number is big It in the threshold value, uses geographical location information described in the 5th numerical representation method for malice geographical location information, otherwise uses the 6th number It is normal geographical location information that value, which characterizes the geographical location information,;It counts the 4th time that the IP address shares the link Number uses IP address described in the 7th numerical representation method otherwise to be used for malicious IP addresses if the 4th number is more than the threshold value IP address described in 8th numerical representation method is normal IP address;To the corresponding numerical value of the subscriber identity information, the facility information It sums, obtains after corresponding numerical value, the corresponding numerical value of the geographical location information and the corresponding numeric weights of the IP address The total value of the participator;If the total value is more than setting numerical value, determines that the participator is malicious user, otherwise determine The participator is normal users.
It should be appreciated that the present invention is not limited to determine by participator and/or participator whether be evil above by number The mode of meaning user, whether it is malice that user can also be arranged as required to other modes judgement by participator and/or participator User.
Based on parameter information, longitude and latitude of the server to the login user ID for the malice judged, the login IP of malice, malice Degree, the user account of malice and repeat logon time etc. information give certain malice degree marking, assess what user It is the title, what user is to cancel reward etc., to assess later malicious user.With reference to only uploading By the parameter information of participator, and upload by two kinds of situations of parameter information of participator and participator to whether providing reward Embodiment is introduced.
In one embodiment, the reward provides module 130 for performing the following operations:If it is described by participator be just Common family, determines and provides reward;If it is described by participator be malicious user, determine the malice degree of the malicious user, if dislike Meaning degree is less than preset first threshold, determines and provides reward, if malice degree is more than or equal to first threshold and is less than second threshold, It determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if malice degree is more than or equal to Second threshold determines and does not provide reward and carry out title processing to the user account of the malicious user.
In another embodiment, the reward provides module 130 and is additionally operable to execute following operation:If the participator and Described by participator is normal users, determines and provides reward;If the participator or it is described by participator be malicious user, really The malice degree of the fixed malicious user determines if malice degree is less than preset first threshold and provides reward, if malice degree It is less than second threshold more than or equal to first threshold, determines and do not provide reward and the user account of the malicious user is kept to be in just It is often used state, if malice degree is more than or equal to second threshold, determines and does not provide reward and to user's account of the malicious user Number carry out title processing;If the participator and it is described by participator be malicious user, reward is not provided in determination, and to described The user account of participator and the user account by participator carry out title processing.
It should be noted that the present invention according to check results to not determining whether that the concrete mode for providing reward limits Fixed, user can also take other manner, can also ought be wherein for example, when to participator and when all being verified by participator One user provides reward when being malicious user.In addition, meeting preset value or like time if it is by sharing number Meet the modes such as preset value to determine whether to provide the situation of reward, normal users click can be denoted as according to preset time period internal standard Whether the number of link meets preset value determination.
It is above-mentioned to be directed to upload by the parameter information of participator, and by the ginseng of the parameter information of participator and participator Number two kinds of situations of information, it should be understood that, can also be only by the ginseng of participator when accessing the link that participator shares by participator Number information uploads, and is determined whether to provide reward according to the parameter information of participator.
Other technical characteristics of the above-mentioned reward dispensing apparatus described from server end and the reward described from server end The technical characteristic of distribution method is identical, and it will not be described here.
It describes in detail below from the angle of client to the embodiment of the present invention.
As shown in figure 3, the flow diagram of the reward distribution method for another embodiment, the method comprising the steps of:
The access instruction for the link that S210, reception share participator by participator.
Participator is the user for sharing link, is the user for accessing link by participator, is linked as promoting set by product Link.When user generates a splitting glass opaque, a parameter shared link and needed can be asked to server, such as Mobile phone Y Y live streaming is shared, and parameter generally comprises channel number, the content shared and the picture etc. shared, meanwhile, optionally, production Client used in the user of raw splitting glass opaque, i.e. client used in participator, can obtain the parameter information of participator, such as Subscriber identity information, facility information, geographical location information and IP address etc. pass through the parameter asked to server and client The parameter information of the participator obtained is held to generate a link, it is therefore, described to link the parameter information for including the participator.Its In, these facility informations are not limited to the information such as the MAC Address, IMEI and IMSI of equipment.In addition, optional, client can The parameter information of these participators is put into a fixed position after encryption, when generating link directly from the fixed bit The parameter information for reading participator is set, is then given birth to by the parameter information of the participator of the parameter and reading asked to server It is linked at one.
It should be appreciated that the present invention is not to the specific of the parameter information of the relevant parameter and participator asked from server Form is defined.In addition, when user generates a splitting glass opaque, can also relevant parameter only be asked from server, The parameter information of participator is not read, then the link generated only includes the relevant parameter information asked from server.
Generate promote product used in link after, participator by share channel share wechat good friend, wechat circle of friends, In microblogging or QQ etc., which is clicked by modes such as clicks by participator, just generates the access instruction to the link.
S220, the response access instruction, are uploaded to server, so that the clothes by described by the parameter information of participator Be engaged in device it is according to the parameter information verification by participator by participator whether be malicious user, and according to the result of verification Determine whether to provide reward.
When being accessed to the link by modes such as clicks by participator, client can connecing by invoking server Mouthful, will server be uploaded to by the parameter information of participator.Wherein, optionally, include and unlimited by the parameter information of participator In subscriber identity information, facility information, geographical location information and IP address etc..Server is according to by the parameter information of participator Determine whether to provide reward.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product The effect of popularization.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further carry to link The effect that high product is promoted, in one embodiment, the link include the parameter information of the participator;Described in the response After access instruction, further include:The parameter information for linking the participator for including is uploaded to server, so that described Server verifies whether the participator is malicious user according to the parameter information of the participator, and true according to the result of verification It is fixed whether to provide reward.
In the present embodiment, when being accessed to link by modes such as clicks by participator, client will not only be shared The parameter information of person is uploaded to server, and the parameter information of participator is also uploaded to server.Whether participator is that malice is used Family refers to that participator shares to whether link carries out malice.Server is got by the parameter information of participator and participator Whether after parameter information, it is malicious user to be verified by participator and participator by these parameter informations, then according to being divided The check results of the person of enjoying and participator synthesis determine whether to provide reward.
Other technical characteristics of the above-mentioned reward distribution method described from client are sent out with the reward described from server end The technical characteristic for putting method is identical, and it will not be described here.
Based on same inventive concept, the present invention also provides another kinds to reward dispensing apparatus, below in conjunction with the accompanying drawings to the present invention The specific implementation mode of device describes in detail.
As shown in figure 4, in one embodiment, a kind of reward dispensing apparatus, including:
Access instruction receiving module 210, the access instruction for receiving the link shared to participator by participator;
Parameter information uploading module 220 uploads the parameter information by participator for responding the access instruction To server, so that whether it by participator is that malice is used that the server is according to the parameter information verification by participator Family, and determine whether to provide according to the result of verification and reward.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product The effect of popularization.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further carry to link The effect that high product is promoted, in one embodiment, the link include the parameter information of the participator;The parameter information Uploading module 220 is additionally operable to after responding the access instruction by the parameter information for linking the participator for including It is uploaded to server, so that the server verifies whether the participator is that malice is used according to the parameter information of the participator Family, and determine whether to provide according to the result of verification and reward.
Other technical characteristics of the above-mentioned reward dispensing apparatus described from client and the reward granting described from client The technical characteristic of method is identical, and it will not be described here.
In order to better understand the present invention, the angle interacted below from client and server is situated between in detail to the present invention It continues.
As shown in figure 5, the flow diagram of the reward distribution method for a specific embodiment, the method comprising the steps of:
S310, when participator generate splitting glass opaque when, where participator user end to server request share link need The parameter wanted, while User ID is obtained, the parameter information of the participators such as facility information, longitude and latitude and IP address, according to request Parameter and the parameter information of participator generate a link, and share into platform;
S320, when logging in the platform by participator and clicking this link, will be shared by the client where participator The User ID of the User ID of person, the parameter informations such as facility information, longitude and latitude and IP address and participator, facility information, warp The parameter informations such as latitude and IP address are uploaded to server;
S330, server are combined by participator by by the parameter information of the parameter information of participator and participator The user account of user account and participator in platform in platform, it is determined whether provide reward.
If it is by way of sharing and drawing new acquisitions reward, then server also needs to verify and is shared in step S330 Whether person is new user.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program The reward distribution method described in above-mentioned any one is realized when being executed by processor.The storage medium is including but not limited to any The disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk) of type, ROM (Read-Only Memory, read-only storage Device), RAM (Random AcceSS Memory, immediately memory), EPROM (EraSable Programmable Read- Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically EraSable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory), flash memory, magnetic card or light card.It is, storage Medium includes by any medium of equipment (for example, computer) storage or transmission information in the form of it can read.Can be read-only Memory, disk or CD etc..
The embodiment of the present invention also provides a kind of terminal, and the terminal includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processing Device realizes the reward distribution method described in above-mentioned any one.
As shown in fig. 6, for convenience of description, illustrating only and the relevant part of the embodiment of the present invention, particular technique details It does not disclose, please refers to present invention method part.The terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle mounted electric The arbitrary terminal device such as brain, server, by taking terminal is mobile phone as an example:
Fig. 6 shows the block diagram with the part-structure of the relevant mobile phone of terminal provided in an embodiment of the present invention.Reference chart 6, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input unit 1530, display unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, Wi-Fi) module 1570, processor The components such as 1580 and power supply 1590.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair The restriction of mobile phone may include either combining certain components or different component cloth than illustrating more or fewer components It sets.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 1510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 1580;In addition, the data for designing uplink are sent to base station.In general, RF circuits 1510 include but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 1510 can also be logical with network and other equipment by radio communication Letter.Above-mentioned wireless communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in memory by operation 1520 software program and module, to execute various function application and the data processing of mobile phone.Memory 1520 can be led To include storing program area and storage data field, wherein storing program area can storage program area, needed at least one function Application program (for example function etc. is provided in reward) etc.;Storage data field can be stored uses created data (ratio according to mobile phone Such as by the parameter information of participator) etc..In addition, memory 1520 may include high-speed random access memory, can also wrap Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Input unit 1530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 1530 may include touch panel 1531 and other inputs Equipment 1532.Touch panel 1531, also referred to as touch screen collect user on it or neighbouring touch operation (such as user Use the behaviour of any suitable object or attachment such as finger, stylus on touch panel 1531 or near touch panel 1531 Make), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 1531 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 1580, and order that processor 1580 is sent can be received and executed.In addition, The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize touch panel 1531.In addition to touch surface Plate 1531, input unit 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 may include But in being not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc. It is one or more.
Display unit 1540 can be used for showing information input by user or be supplied to user information and mobile phone it is each Kind menu.Display unit 1540 may include display panel 1541, optionally, liquid crystal display (Liquid may be used Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 1541.Further, touch panel 1531 can cover display panel 1541, when touch panel 1531 detects To processor 1580 on it or after neighbouring touch operation, is sent to determine the type of touch event, it is followed by subsequent processing device 1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in figure 6, touch panel 1531 be to realize input and the input function of mobile phone as two independent components with display panel 1541, but in certain realities Apply in example, can be integrated by touch panel 1531 and display panel 1541 and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 1541, proximity sensor can close display panel when mobile phone is moved in one's ear 1541 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Also as mobile phone The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 1560, loud speaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Audio The transformed electric signal of the audio data received can be transferred to loud speaker 1561, is converted by loud speaker 1561 by circuit 1560 It is exported for vocal print signal;On the other hand, the vocal print signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560 Audio data is converted to after reception, then by after the processing of audio data output processor 1580, through RF circuits 1510 to be sent to ratio Such as another mobile phone, or audio data is exported to memory 1520 to be further processed.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics by Wi-Fi module 1570 Mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 6 is shown Wi-Fi module 1570, but it is understood that, and it is not belonging to must be configured into for mobile phone, completely it can exist as needed Do not change in the range of the essence of invention and omits.
Processor 1580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, By running or execute the software program and/or module that are stored in memory 1520, and calls and be stored in memory 1520 Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 1580 may include one or more processing units;Preferably, processor 1580 can integrate application processor and modulation /demodulation processing Device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone further includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply Management system and processor 1580 are logically contiguous, to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
Above-mentioned reward distribution method, device, computer readable storage medium and terminal is shared being accessed by participator When the link that person shares, by rewarding being determined whether to provide by the result of participator and/or participator's verification, compared to existing The mode of reward is directly provided in technology, which screens user, and that get is high quality user, is carried significantly The high effect of product promotion.
It should be understood that although each step in the flow chart of attached drawing is shown successively according to the instruction of arrow, These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence is also not necessarily to be carried out successively, but can be with other Either the sub-step of other steps or at least part in stage execute step in turn or alternately.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (12)

1. a kind of reward distribution method, which is characterized in that including step:
Receive the parameter information by participator that client uploads when the link that participator shares is accessed by participator;
Whether according to the parameter information verification by participator by participator is malicious user;
Determined whether to provide reward according to the result of verification.
2. the method that reward according to claim 1 is provided, which is characterized in that described to link the ginseng for including the participator Number information, the client are additionally operable to upload the parameter information for linking the participator for including;It is described according to verification As a result before determining whether to provide reward, further include:
Verify whether the participator is malicious user according to the parameter information of the participator.
3. the method that reward according to claim 2 is provided, which is characterized in that described to be determined whether according to the result of verification Before providing reward, further include:
Obtain the user account by participator in the first platform for accessing the link;
Blacklist account library based on preset first platform verifies whether the user account by participator is black name Single account;
If so, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users.
4. reward distribution method according to claim 3, which is characterized in that the result according to verification determines whether to send out Before putting reward, further include:
Obtain user account of the participator in the second platform for sharing the link;
Whether the user account that the blacklist account library based on preset second platform verifies the participator is blacklist Account;
If so, determining that the participator is malicious user, otherwise determine that the participator is normal users.
5. reward distribution method according to claim 2, which is characterized in that
Described by the parameter information of participator includes subscriber identity information, facility information, geographical location information and IP address;Institute Whether it by participator is malicious user that it is described to state parameter information verification according to described by participator, including:Count the user Identity information accesses first number of the link, if first number is more than the threshold value of the maximum access times of setting, adopts The subscriber identity information described in the first numerical representation method is malicious user identity information, otherwise second value is used to characterize the user Identity information is normal users identity information;Second number that the facility information accesses the link is counted, if described second Number is more than the threshold value, uses third value to characterize the facility information as rogue device information, otherwise uses the 4th numerical value It is normal device information to characterize the facility information;The third number that the geographical location information accesses the link is counted, if The third number is more than the threshold value, uses geographical location information described in the 5th numerical representation method for malice geographical location information, Otherwise use geographical location information described in the 6th numerical representation method for normal geographical location information;It counts described in the IP address access 4th number of link uses IP address described in the 7th numerical representation method for malice IP if the 4th number is more than the threshold value Otherwise address uses IP address described in the 8th numerical representation method for normal IP address;To the corresponding numerical value of the subscriber identity information, The corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information and the corresponding numeric weights of the IP address After sum, obtain the total value by participator;If the total value be more than setting numerical value, determine it is described by participator be dislike Anticipate user, otherwise determine it is described by participator be normal users;
And/or
The parameter information of the participator includes subscriber identity information, facility information, geographical location information and IP address;It is described Verify whether the participator is malicious user according to the parameter information of the participator, including:Count the user identity letter Breath shares first number of the link, if first number is more than the threshold value that the maximum being arranged shares number, using first Subscriber identity information described in numerical representation method is malicious user identity information, and second value is otherwise used to characterize the user identity letter Breath is normal users identity information;Second number that the facility information shares the link is counted, if second number is big In the threshold value, uses third value to characterize the facility information as rogue device information, otherwise use the 4th numerical representation method institute It is normal device information to state facility information;The third number that the geographical location information shares the link is counted, if described Three times number is more than the threshold value, and geographical location information described in the 5th numerical representation method is used otherwise to be adopted for malice geographical location information The geographical location information described in the 6th numerical representation method is normal geographical location information;It counts the IP address and shares the link 4th number uses IP address described in the 7th numerical representation method no for malicious IP addresses if the 4th number is more than the threshold value Then use IP address described in the 8th numerical representation method for normal IP address;To the corresponding numerical value of the subscriber identity information, described set It is asked after the corresponding numerical value of standby information, the corresponding numerical value of the geographical location information and the corresponding numeric weights of the IP address With obtain the total value of the participator;If the total value is more than setting numerical value, determine that the participator is malicious user, Otherwise determine that the participator is normal users.
6. reward distribution method according to claim 4, which is characterized in that
The result according to verification, which determines whether to provide, rewards, including:If it is described by participator be normal users, determine provide Reward;If it is described by participator be malicious user, determine the malice degree of the malicious user, if malice degree be less than it is preset First threshold, determine provide reward, if malice degree be more than or equal to first threshold be less than second threshold, determine do not provide reward and It keeps the user account of the malicious user to be in normal operating condition, if malice degree is more than or equal to second threshold, determines not It provides reward and title processing is carried out to the user account of the malicious user;
And/or
The result according to verification, which determines whether to provide, rewards, including:If the participator and it is described by participator be just Common family, determines and provides reward;If the participator or it is described by participator be malicious user, determine the evil of the malicious user Meaning degree determines if malice degree is less than preset first threshold and provides reward, if malice degree is small more than or equal to first threshold It in second threshold, determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if malice Degree is more than or equal to second threshold, determines and does not provide reward and carry out title processing to the user account of the malicious user;If The participator and it is described by participator be malicious user, reward is not provided in determination, and to the user account of the participator Title processing is carried out with the user account by participator.
7. a kind of reward distribution method, which is characterized in that including step:
Receive the access instruction for the link shared to participator by participator;
Respond the access instruction, server be uploaded to by the parameter information of participator by described so that the server according to Whether the described parameter information verification by participator by participator is malicious user, and is determined whether according to the result of verification Provide reward.
8. reward distribution method according to claim 7, which is characterized in that the link includes the parameter of the participator Information;After the response access instruction, further include:
The parameter information for linking the participator for including is uploaded to server, so that the server is according to described point The parameter information for the person of enjoying verifies whether the participator is malicious user, and determines whether to provide according to the result of verification and reward.
9. a kind of reward dispensing apparatus, which is characterized in that including:
Parameter information receiving module, for receiving when the link that participator shares is accessed by participator described in client upload By the parameter information of participator;
Correction verification module, for it is according to the parameter information verification by participator by participator whether be malicious user;
Module is provided in reward, and reward is provided for determining whether according to the result of verification.
10. a kind of reward dispensing apparatus, which is characterized in that including:
Access instruction receiving module, the access instruction for receiving the link shared to participator by participator;
Parameter information uploading module is uploaded to service by described for responding the access instruction by the parameter information of participator Device, so that whether it by participator is malicious user that the server is according to the parameter information verification by participator, and Determined whether to provide reward according to the result of verification.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor Reward distribution method as claimed in any of claims 1 to 8 in one of claims is realized when execution.
12. a kind of terminal, which is characterized in that the terminal includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors are real Distribution method is now rewarded as claimed in any of claims 1 to 8 in one of claims.
CN201810110108.4A 2018-02-05 2018-02-05 Reward distribution method, device, computer readable storage medium and terminal Pending CN108280692A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810110108.4A CN108280692A (en) 2018-02-05 2018-02-05 Reward distribution method, device, computer readable storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810110108.4A CN108280692A (en) 2018-02-05 2018-02-05 Reward distribution method, device, computer readable storage medium and terminal

Publications (1)

Publication Number Publication Date
CN108280692A true CN108280692A (en) 2018-07-13

Family

ID=62807521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810110108.4A Pending CN108280692A (en) 2018-02-05 2018-02-05 Reward distribution method, device, computer readable storage medium and terminal

Country Status (1)

Country Link
CN (1) CN108280692A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067889A (en) * 2018-08-18 2018-12-21 北京旺马科技有限公司 Live broadcasting method, onboard system, server and storage medium based on geographical location
CN109598403A (en) * 2018-10-23 2019-04-09 阿里巴巴集团控股有限公司 A kind of resource allocation methods, device, equipment and medium
CN110033153A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 A kind of pair of information recommendation carries out resource bonusing method, device and equipment
CN110889124A (en) * 2019-11-14 2020-03-17 百度在线网络技术(北京)有限公司 Information sharing method and device, electronic equipment and storage medium
CN111127108A (en) * 2019-12-27 2020-05-08 北京奇艺世纪科技有限公司 Article distribution method, device, electronic equipment and computer readable storage medium
CN111598632A (en) * 2020-07-17 2020-08-28 支付宝(杭州)信息技术有限公司 Method and device for determining equity shares and equity share sequence
CN111666121A (en) * 2019-03-08 2020-09-15 上海拉扎斯信息科技有限公司 Task execution method and device, electronic equipment and computer readable storage medium
CN111914170A (en) * 2020-07-17 2020-11-10 中国联合网络通信集团有限公司 Method, system, terminal device and computer readable storage medium for issuing preferential
CN112738545A (en) * 2020-12-28 2021-04-30 北京蜜莱坞网络科技有限公司 Live broadcast room sharing detection method and device, electronic equipment and storage medium
CN112907293A (en) * 2021-03-15 2021-06-04 拉扎斯网络科技(上海)有限公司 Reward information providing method and device, electronic equipment and storage medium
CN112950294A (en) * 2021-04-09 2021-06-11 腾讯科技(深圳)有限公司 Information sharing method and device, electronic equipment and storage medium
CN113449202A (en) * 2021-06-30 2021-09-28 未鲲(上海)科技服务有限公司 Information matching method, device, equipment and medium
CN114779936A (en) * 2022-04-26 2022-07-22 北京达佳互联信息技术有限公司 Information display method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915364A (en) * 2015-12-08 2016-08-31 乐视网信息技术(北京)股份有限公司 Method for preventing malicious sharing of user identity and device thereof
CN107508744A (en) * 2017-08-10 2017-12-22 北京本邦科技股份有限公司 A kind of network address promotion method and system based on wechat electronics red packet
US20180011942A1 (en) * 2013-03-15 2018-01-11 Snips Media, Llc Url shortening computer-processed platform for processing internet traffic

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180011942A1 (en) * 2013-03-15 2018-01-11 Snips Media, Llc Url shortening computer-processed platform for processing internet traffic
CN105915364A (en) * 2015-12-08 2016-08-31 乐视网信息技术(北京)股份有限公司 Method for preventing malicious sharing of user identity and device thereof
CN107508744A (en) * 2017-08-10 2017-12-22 北京本邦科技股份有限公司 A kind of network address promotion method and system based on wechat electronics red packet

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067889A (en) * 2018-08-18 2018-12-21 北京旺马科技有限公司 Live broadcasting method, onboard system, server and storage medium based on geographical location
CN109598403A (en) * 2018-10-23 2019-04-09 阿里巴巴集团控股有限公司 A kind of resource allocation methods, device, equipment and medium
CN109598403B (en) * 2018-10-23 2023-10-03 创新先进技术有限公司 Resource allocation method, device, equipment and medium
CN110033153A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 A kind of pair of information recommendation carries out resource bonusing method, device and equipment
CN111666121B (en) * 2019-03-08 2024-04-26 上海拉扎斯信息科技有限公司 Task execution method, device, electronic equipment and computer readable storage medium
CN111666121A (en) * 2019-03-08 2020-09-15 上海拉扎斯信息科技有限公司 Task execution method and device, electronic equipment and computer readable storage medium
CN110889124B (en) * 2019-11-14 2022-08-12 百度在线网络技术(北京)有限公司 Information sharing method and device, electronic equipment and storage medium
CN110889124A (en) * 2019-11-14 2020-03-17 百度在线网络技术(北京)有限公司 Information sharing method and device, electronic equipment and storage medium
CN111127108A (en) * 2019-12-27 2020-05-08 北京奇艺世纪科技有限公司 Article distribution method, device, electronic equipment and computer readable storage medium
CN111914170A (en) * 2020-07-17 2020-11-10 中国联合网络通信集团有限公司 Method, system, terminal device and computer readable storage medium for issuing preferential
CN111914170B (en) * 2020-07-17 2023-06-20 中国联合网络通信集团有限公司 Coupon issuing method, coupon issuing system, terminal device and computer readable storage medium
CN111598632B (en) * 2020-07-17 2020-10-27 支付宝(杭州)信息技术有限公司 Method and device for determining equity shares and equity share sequence
CN111598632A (en) * 2020-07-17 2020-08-28 支付宝(杭州)信息技术有限公司 Method and device for determining equity shares and equity share sequence
CN112738545A (en) * 2020-12-28 2021-04-30 北京蜜莱坞网络科技有限公司 Live broadcast room sharing detection method and device, electronic equipment and storage medium
CN112907293A (en) * 2021-03-15 2021-06-04 拉扎斯网络科技(上海)有限公司 Reward information providing method and device, electronic equipment and storage medium
CN112950294A (en) * 2021-04-09 2021-06-11 腾讯科技(深圳)有限公司 Information sharing method and device, electronic equipment and storage medium
CN112950294B (en) * 2021-04-09 2023-09-22 腾讯科技(深圳)有限公司 Information sharing method and device, electronic equipment and storage medium
CN113449202A (en) * 2021-06-30 2021-09-28 未鲲(上海)科技服务有限公司 Information matching method, device, equipment and medium
CN114779936A (en) * 2022-04-26 2022-07-22 北京达佳互联信息技术有限公司 Information display method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108280692A (en) Reward distribution method, device, computer readable storage medium and terminal
AU2017272236B2 (en) Predicted-location notification
CN104243517B (en) Content share method and device between different terminals
CN106528745B (en) Method and device for recommending resources on mobile terminal and mobile terminal
KR101579866B1 (en) Sensing proximity utilizing a wireless radio subsystem
CN104219617B (en) Service acquisition method and device
US10242412B2 (en) Ambient-location-push notification
CN105103105B (en) Social cover feed interface
JP2018042247A (en) Detecting carriers for mobile devices
CN108197224A (en) User group sorting technique, storage medium and terminal
KR20150103179A (en) Re-ranking story content
CN108156508B (en) Barrage information processing method and device, mobile terminal, server and system
KR20150103178A (en) Conserving battery and data usage
CN108322780A (en) Prediction technique, storage medium and the terminal of platform user behavior
CN109741115A (en) Link promotion method, terminal and computer readable storage medium based on red packet
AU2014216394B2 (en) Launching friends
CA2900400A1 (en) Social context for applications
CN107562539A (en) Applied program processing method and device, computer equipment, storage medium
CN108573064A (en) Information recommendation method, mobile terminal, server and computer readable storage medium
CN107391518A (en) Count system, the method and device of page load performance information
CN108848273A (en) A kind of new information processing method, mobile terminal and storage medium
CN104965831B (en) A kind of network address error correction method, server, terminal and system
CN108288171A (en) Advertisement insertion, server and computer readable storage medium
CN106790915B (en) Number Reorganization control method, device and corresponding server and mobile terminal
CN104750722B (en) A kind of acquisition of information and methods of exhibiting and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210118

Address after: 511442 3108, 79 Wanbo 2nd Road, Nancun Town, Panyu District, Guangzhou City, Guangdong Province

Applicant after: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 511442 29 floor, block B-1, Wanda Plaza, Huambo business district, Panyu District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180713

Assignee: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000054

Denomination of invention: Reward distribution method, device, computer readable storage medium and terminal

License type: Common License

Record date: 20210208

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180713