Invention content
The present invention is directed to the shortcomings that existing way, propose a kind of reward distribution method, computer readable storage medium and
Terminal, the effect to solve the product promotion existing in the prior art caused by the link of same user's repeated accesses do not have
Reach expected problem, to improve the effect of product promotion.
The embodiment of the present invention provides a kind of reward distribution method, including step according to the first aspect:
The parameter by participator that client uploads when the link that participator shares is accessed by participator is received to believe
Breath;
Whether according to the parameter information verification by participator by participator is malicious user;
Determined whether to provide reward according to the result of verification.
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator,
By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward
Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion
Fruit.
In one embodiment, described to link the parameter information for including the participator, the client is additionally operable to upload
The parameter information for linking the participator for including;Before the result according to verification determines whether to provide reward, also
Including:
Verify whether the participator is malicious user according to the parameter information of the participator.
For the present embodiment when accessing the link that participator shares by participator, client not only will be in the information by participator
Pass, also upload the information of participator, by being verified by the information of the information of participator and participator so that it is determined that
Whether granting is rewarded, compared to the prior art in directly provide the mode of reward, which further screens user, from
And that get is high quality user, further improves the effect of product promotion.
In one embodiment, before the result according to verification determines whether to provide reward, further include:
Obtain the user account by participator in the first platform for accessing the link;
Blacklist account library based on preset first platform verify the user account by participator whether be
Blacklist account;
If so, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users.
The parameter information that the present embodiment not only uploads client verifies, and channel is being accessed herein in connection with by participator
User account in (the first platform) by participator to further being verified, by further being screened to user, to
That get is high quality user, further improves the effect of product promotion.
In one embodiment, before the result according to verification determines whether to provide reward, further include:
Obtain user account of the participator in the second platform for sharing the link;
Whether the user account that the blacklist account library based on preset second platform verifies the participator is black
List account;
If so, determining that the participator is malicious user, otherwise determine that the participator is normal users.
The parameter information that the present embodiment not only uploads client verifies, and is sharing channel (the herein in connection with participator
Two platforms) in user account participator is further verified, by further being screened to user, to get
Be high quality user, further improve the effect of product promotion.
In one embodiment, described by the parameter information of participator includes subscriber identity information, facility information, geographical position
Confidence ceases and IP address;Whether the described parameter information verification according to described by participator by participator is that malice is used
Family, including:First number that the subscriber identity information accesses the link is counted, if first number is more than setting most
The threshold value of big access times, uses subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise uses
It is normal users identity information that second value, which characterizes the subscriber identity information,;It counts the facility information and accesses the link
Second number uses third value to characterize the facility information and believes for rogue device if second number is more than the threshold value
Breath, otherwise uses facility information described in the 4th numerical representation method for normal device information;It counts the geographical location information and accesses institute
The third number of link is stated, if the third number is more than the threshold value, using geographical location information described in the 5th numerical representation method
For malice geographical location information, otherwise use geographical location information described in the 6th numerical representation method for normal geographical location information;System
The 4th number that the IP address accesses the link is counted, if the 4th number is more than the threshold value, using the 7th numerical tabular
It is malicious IP addresses to levy the IP address, otherwise uses IP address described in the 8th numerical representation method for normal IP address;To the use
The corresponding numerical value of family identity information, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information and institute
It sums after stating the corresponding numeric weights of IP address, obtains the total value by participator;If the total value is more than setting number
Value, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users;
And/or
In one embodiment, the parameter information of the participator includes subscriber identity information, facility information, geographical location
Information and IP address;It is described to verify whether the participator is malicious user according to the parameter information of the participator, including:
First number that the subscriber identity information shares the link is counted, if the maximum that first number is more than setting is shared time
Several threshold values uses subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise uses second value
It is normal users identity information to characterize the subscriber identity information;It counts second that the facility information shares the link
Number uses third value to characterize the facility information for rogue device information, otherwise if second number is more than the threshold value
Use facility information described in the 4th numerical representation method for normal device information;It counts the geographical location information and shares the link
Third number uses geographical location information described in the 5th numerical representation method for maliciously if the third number is more than the threshold value
Location information is managed, otherwise uses geographical location information described in the 6th numerical representation method for normal geographical location information;Count the IP
The 4th number of the link is shared in address, if the 4th number is more than the threshold value, using IP described in the 7th numerical representation method
Address is malicious IP addresses, otherwise uses IP address described in the 8th numerical representation method for normal IP address;The user identity is believed
Cease corresponding numerical value, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information and the IP address
It sums after corresponding numeric weights, obtains the total value of the participator;If the total value, which is more than, sets numerical value, described in determination
Participator is malicious user, otherwise determines that the participator is normal users.
The present embodiment considers subscriber identity information, equipment identity information, geographical location information and IP address, can
More fully accurately judge by participator and/or participator whether to be malicious user.
In one embodiment, the result according to verification determines whether to provide reward, including:If described by participator
For normal users, determines and provide reward;If it is described by participator be malicious user, determine the malice degree of the malicious user,
If malice degree is less than preset first threshold, determines and provide reward, if malice degree is more than or equal to first threshold and is less than second
Threshold value determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if malice degree is big
Reward is not provided in equal to second threshold, determining and to the progress title processing of the user account of the malicious user;
And/or
The result according to verification, which determines whether to provide, rewards, including:If the participator and described equal by participator
For normal users, determines and provide reward;If the participator or it is described by participator be malicious user, determine the malicious user
Malice degree, if malice degree be less than preset first threshold, determine provide reward, if malice degree be more than or equal to the first threshold
Value is less than second threshold, determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if
Malice degree is more than or equal to second threshold, determines and does not provide reward and carried out at title to the user account of the malicious user
Reason;If the participator and it is described by participator be malicious user, reward is not provided in determination, and to the user of the participator
Account and the user account by participator carry out title processing.
The embodiment of the present invention additionally provides another reward distribution method, including step according to the second aspect:
Receive the access instruction for the link shared to participator by participator;
The access instruction is responded, server is uploaded to by the parameter information of participator by described, so that the server
Whether according to the parameter information verification by participator by participator is malicious user, and is determined according to the result of verification
Whether granting is rewarded.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator
Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight
The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product
The effect of popularization.
In one embodiment, the link includes the parameter information of the participator;The response access instruction
Later, further include:
The parameter information for linking the participator for including is uploaded to server, so that the server is according to institute
The parameter information for stating participator verifies whether the participator is malicious user, and determines whether to provide according to the result of verification and encourage
It encourages.
The present embodiment not only will be uploaded to clothes when accessing the link that participator shares by participator by the information of participator
Business device, is also uploaded to server, server passes through to by the information of the information of participator and participator by the information of participator
Verification is carried out to determine whether to provide reward, compared to the prior art in directly provide the mode of reward, which is further
User is screened, that get is high quality user, further improves the effect of product promotion.
The embodiment of the present invention additionally provides a kind of reward dispensing apparatus according in terms of third, including:
Parameter information receiving module, for receiving client upload when the link that participator shares is accessed by participator
The parameter information by participator;
Correction verification module, for it is according to the parameter information verification by participator by participator whether be that malice is used
Family;
Module is provided in reward, and reward is provided for determining whether according to the result of verification.
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator,
By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward
Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion
Fruit.
The embodiment of the present invention additionally provides another reward dispensing apparatus according to the 4th aspect, including:
Access instruction receiving module, the access instruction for receiving the link shared to participator by participator;
Parameter information uploading module is uploaded to described by the parameter information of participator for responding the access instruction
Server, so that whether it by participator is that malice is used that the server is according to the parameter information verification by participator
Family, and determine whether to provide according to the result of verification and reward.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator
Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight
The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product
The effect of popularization.
The embodiment of the present invention additionally provides a kind of computer readable storage medium, stores thereon according to the 5th aspect
There is computer program, which realizes the reward distribution method described in above-mentioned any one when being executed by processor.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator
Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight
The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product
The effect of popularization.
The embodiment of the present invention additionally provides a kind of terminal, the terminal includes according to the 6th aspect:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processing
Device realizes the reward distribution method described in above-mentioned any one.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator
Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight
The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product
The effect of popularization.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that is used in the specification of the present invention arranges
It refers to there are the feature, integer, step, operation, element and/or component, but it is not excluded that presence or addition to take leave " comprising "
Other one or more features, integer, step, operation, element, component and/or their group.Wording used herein " and/
Or " include that the whole of one or more associated list items or any cell are combined with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology), there is meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless by specific definitions as here, the meaning of idealization or too formal otherwise will not be used
To explain.
It includes wireless communication that those skilled in the art of the present technique, which are appreciated that " terminal " used herein above, " terminal device " both,
The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and includes receiving and transmitting hardware
Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment
May include:Honeycomb or other communication equipments are shown with single line display or multi-line display or without multi-line
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can
With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal
Digital assistants), may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day
It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm
Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its
His equipment." terminal " used herein above, " terminal device " they can be portable, can transport, be mounted on the vehicles (aviation,
Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth
And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on
Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet
Equipment) and/or mobile phone with music/video playing function, can also be the equipment such as smart television, set-top box.
Those skilled in the art of the present technique are appreciated that server used herein above, high in the clouds, remote network devices etc. are general
It reads, there is effects equivalent comprising but it is not limited to computer, network host, single network server, multiple network server collection
Or the cloud that multiple servers are constituted.Here, cloud is taken by a large amount of computers or network for being based on cloud computing (Cloud Computing)
Device of being engaged in is constituted, wherein cloud computing is one kind of Distributed Calculation, and one be made of the computer collection of a group loose couplings is super
Virtual machine.It, can be by any logical between remote network devices, terminal device and WNS servers in the embodiment of the present invention
Letter mode realizes communication, including but not limited to, mobile communication based on 3GPP, LTE, WIMAX, based on TCP/IP, udp protocol
Computer network communication and low coverage wireless transmission method based on bluetooth, Infrared Transmission standard.
Below in conjunction with the accompanying drawings and embodiment, from the angle of server, the angle of client to reward provided by the invention
Distribution method, computer readable storage medium and terminal describe in detail.
First, it describes in detail from the angle of server to the embodiment of the present invention.
As shown in Figure 1, the flow diagram of the reward distribution method for an embodiment, the method comprising the steps of:
S110, the ginseng by participator that client uploads when the link that participator shares is accessed by participator is received
Number information.
Participator is the user for sharing link, is the user for accessing link by participator, is linked as promoting set by product
Link.When user generates a splitting glass opaque, a parameter shared link and needed can be asked to server, such as
Mobile phone Y Y live streaming is shared, and parameter generally comprises channel number, the content shared and the picture etc. shared, meanwhile, optionally, production
Client used in the user of raw splitting glass opaque, i.e. client used in participator, can obtain the parameter information of participator, such as
Subscriber identity information, facility information, geographical location information and IP (Internet Protocol, the association interconnected between network
View) address etc., the parameter information of the participator obtained by the parameter and client asked to server generates a link,
Therefore, described to link the parameter information for including the participator.Wherein, subscriber identity information shares the link institute for participator
The subscriber identity information of use is not limited to User ID (identification, identity number);Facility information is participator
The information for sharing equipment used by the link is not limited to MAC Address (the Media Access Control of equipment
Location, media access control address), IMEI (International Mobile Equipment Identity, the world movement sets
Standby identity code) and IMSI (International Mobile Subscriber Identification Number, it is international
Mobile identification number) etc. information;Geographical location information is the information in the geographical location where when participator shares the link,
It is not limited to the longitude and latitude got by GPS (Global Positioning System, global positioning system) etc.;IP
Location is that participator shares the IP address used in the link.In addition, optional, client can believe the parameter of these participators
Breath is put into a fixed position after encryption, directly reads the parameter letter of participator from the fixed position when generating link
Then breath generates a link by the parameter information of the participator of the parameter and reading asked to server.
It should be appreciated that the present invention is not to the specific of the parameter information of the relevant parameter and participator asked from server
Form is defined.In addition, when user generates a splitting glass opaque, can also relevant parameter only be asked from server,
The parameter information of participator is not read, then the link generated only includes the relevant parameter information asked from server.
Generate promote product used in link after, participator by share channel share wechat good friend, wechat circle of friends,
In microblogging or QQ etc., when being accessed to the link by modes such as clicks by participator, client, which can pass through to call, to be serviced
The interface of device will be uploaded to server by the parameter information of participator.Wherein, optionally, include by the parameter information of participator
It is not limited to subscriber identity information, facility information, geographical location information and IP address etc..Wherein, subscriber identity information is quilt
Participator accesses subscriber identity information used by the link, is not limited to User ID;Facility information is to be accessed by participator
The information of equipment used by the link, is not limited to the information such as the MAC Address, IMEI and IMSI of equipment;Geographical location
Information is the information in the geographical location where when accessing the link by participator, is not limited to the warp got by GPS etc.
Latitude;IP address is the IP address accessed by participator used in the link.In addition, it is optional, it uploads by the parameter of participator
The client of information can be by the client used in participator, but the present invention makes restriction not to this, for example, linking
When accessed, other clients, Qi Take can will be sent to by the parameter information of participator by the client used in participator
Family end will be uploaded by the parameter information of participator.
S120, it is according to the parameter information verification by participator by participator whether be malicious user.
Whether it is that malicious user refers to whether carrying out malicious access to link by participator by participator.Server obtains
Whether to after the parameter information by participator, it is malicious user to be verified by participator by these parameter informations.If it is sharing
The new mode for obtaining reward is drawn, when by participator by being linked into application, server also needs to verification and used by participator
Whether family is new user.
S130, determined whether to provide reward according to the result of verification.
According to being determined whether to provide reward by the check results of participator, the object of granting reward herein can basis
Actual needs is configured, for example, obtaining the mode rewarded if link is shared, then can be determined whether according to the result of verification
Participator is provided and is rewarded, in another example, the new mode for obtaining reward is drawn if sharing, then can be determined according to the result of verification is
It is no to provide reward to participator and by participator.The concrete form of reward can also be configured according to actual needs, such as be encouraged
Encourage virtual gold coin or discount coupon etc..
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator,
By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward
Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion
Fruit.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further right to link
User screens, and improves the effect of product promotion, and in one embodiment, the client is additionally operable to upload the link packet
The parameter information of the participator contained;Before the result according to verification determines whether to provide reward, further include:According to institute
The parameter information for stating participator verifies whether the participator is malicious user.
In the present embodiment, when being accessed to link by modes such as clicks by participator, client will not only be shared
The parameter information of person is uploaded to server, and the parameter information of participator is also uploaded to server.Optionally, it uploads by participator
The client of parameter information and the client of participator can be by the client used in participator, but the present invention is not
Restriction is made to this.Whether participator is that malicious user refers to that participator shares to whether link carries out malice.Server obtains
Get by after the parameter information of participator and the parameter information of participator, by the verification of these parameter informations by participator with share
Whether person is malicious user, then according to being determined whether to provide reward by the check results synthesis of participator and participator.
It is in one embodiment, described to be according to the determination of the result of verification in order to further increase the effect of product promotion
Before no granting reward, further include:Obtain user's account by participator in the first platform for accessing the link
Number;Blacklist account library based on preset first platform verifies whether the user account by participator is blacklist
Account;If so, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users.
In the present embodiment, the first platform be access link platform, for example, by participator if it is by wechat, QQ or
The channels such as person's Sina weibo access to link, then the first platform refers to wechat, QQ or Sina weibo etc..User account
To be logged in the account used in the first platform, such as cell-phone number etc. by participator.After getting the user account by participator, in conjunction with
Whether it is blacklist account that the pre-set blacklist account of the first platform institute verifies the user account, for example, server can be tied
Operator is closed, such as some of Tencent or Ali blacklist accounts library go whether verification user account is blacklist account.Such as
Fruit is blacklist account, can give the label of malice account, determines by participator it is malicious user, if not blacklist account
Number, it is determined that by participator be normal users.
It is in one embodiment, described to be according to the determination of the result of verification in order to further increase the effect of product promotion
Before no granting reward, further include:Obtain user account of the participator in the second platform for sharing the link;
Whether the user account that the blacklist account library based on preset second platform verifies the participator is blacklist account;
If so, determining that the participator is malicious user, otherwise determine that the participator is normal users.
In the present embodiment, the second platform is the platform for sharing link, for example, participator if it is by wechat, QQ or
The channels such as Sina weibo share link, then the second platform refers to wechat, QQ or Sina weibo etc..User account is
Participator logs in the account used in the second platform, such as cell-phone number etc..It is flat in conjunction with second after getting the user account of participator
Whether it is blacklist account that the pre-set blacklist account of platform institute verifies the user account, for example, server can be in conjunction with operation
Quotient, such as some of Tencent or Ali blacklist accounts library go whether verification user account is blacklist account.If it is black
List account can give the label of malice account, determine that participator is malicious user, if not blacklist account, then really
It is normal users to determine participator.
In one embodiment, whether it by participator is evil that the parameter information verification according to described by participator is described
Anticipate user, including:First number that the subscriber identity information accesses the link is counted, if first number is more than setting
Maximum access times threshold value, use subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise
Second value is used to characterize the subscriber identity information as normal users identity information;It counts the facility information and accesses the chain
Second number connect uses third value to characterize the facility information and is set for malice if second number is more than the threshold value
Standby information, otherwise uses facility information described in the 4th numerical representation method for normal device information;The geographical location information is counted to visit
The third number of the link is asked, if the third number is more than the threshold value, using geographical location described in the 5th numerical representation method
Information is malice geographical location information, and geographical location information described in the 6th numerical representation method is otherwise used to believe for normal geographical location
Breath;The 4th number that the IP address accesses the link is counted, if the 4th number is more than the threshold value, using the 7th number
It is malicious IP addresses that value, which characterizes the IP address, otherwise uses IP address described in the 8th numerical representation method for normal IP address;To institute
State the corresponding numerical value of subscriber identity information, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information with
And sum after the corresponding numeric weights of the IP address, obtain the total value by participator;It is set if the total value is more than
Fixed number value, determine it is described by participator be malicious user, otherwise determine it is described by participator be normal users.
In the present embodiment, consider by the subscriber identity information of participator, facility information, geographical location information and IP
Address, counting user identity information, facility information, geographical location information and the number of IP address access link, will unite respectively
Each number threshold value comparison with the maximum access times of setting respectively of meter, so that it is determined that subscriber identity information, facility information,
Geographical location information and the respective numerical value of IP address.In addition in view of subscriber identity information repeatedly accesses link, facility information
Repeatedly access link, geographical location information repeatedly accesses link and IP address repeatedly accesses link characterize by participator whether
It is different for the probability of malicious user, therefore also pre-set respective weight.For example, same subscriber identity information repeatedly accesses chain
The maximum probability by participator for malicious user of characterization is connect, what same facility information repeatedly accessed link characterization is by participator
The probability time of malicious user is big, and same geographical location information repeatedly accesses the probability by participator for malicious user of link characterization
Secondary small, same IP address repeatedly accesses the probability minimum by participator for malicious user of link characterization, then the user's body being arranged
Part information, facility information, geographical location information and IP address weight be sequentially reduced.To subscriber identity information, facility information,
Geographical location information and the respective numerical value of IP address seek weighted sum, you can to obtain by the total value of participator, by the sum
Value is relatively assured that with setting numerical value by whether participator is malicious user.If being a malicious user by participator,
Server can be the label that this is stamped a malicious user by participator.Optionally, threshold value can be lived by some previous
Dynamic or some big datas analyses obtain.It more fully can accurately judge whether by participator be evil by this kind of mode
Anticipate user.
In one embodiment, described to verify whether the participator is that malice is used according to the parameter information of the participator
Family, including:First number that the subscriber identity information shares the link is counted, if first number is more than setting most
The big threshold value for sharing number, uses subscriber identity information described in the first numerical representation method for malicious user identity information, otherwise uses
It is normal users identity information that second value, which characterizes the subscriber identity information,;It counts the facility information and shares the link
Second number uses third value to characterize the facility information and believes for rogue device if second number is more than the threshold value
Breath, otherwise uses facility information described in the 4th numerical representation method for normal device information;It counts the geographical location information and shares institute
The third number of link is stated, if the third number is more than the threshold value, using geographical location information described in the 5th numerical representation method
For malice geographical location information, otherwise use geographical location information described in the 6th numerical representation method for normal geographical location information;System
The 4th number that the IP address shares the link is counted, if the 4th number is more than the threshold value, using the 7th numerical tabular
It is malicious IP addresses to levy the IP address, otherwise uses IP address described in the 8th numerical representation method for normal IP address;To the use
The corresponding numerical value of family identity information, the corresponding numerical value of the facility information, the corresponding numerical value of the geographical location information and institute
It sums after stating the corresponding numeric weights of IP address, obtains the total value of the participator;If the total value is more than setting numerical value,
It determines that the participator is malicious user, otherwise determines that the participator is normal users.
In the present embodiment, with considering subscriber identity information, facility information, geographical location information and the IP of participator
Location, respectively counting user identity information, facility information, geographical location information and IP address share the number of link, will count
Each number share the threshold value comparison of number with the maximum of setting respectively, so that it is determined that subscriber identity information, facility information,
Manage location information and the respective numerical value of IP address.In addition in view of repeatedly to share link, facility information more for subscriber identity information
It is secondary share link, geographical location information repeatedly share link and IP address repeatedly share link characterization participator whether be evil
The probability of meaning user is different, therefore also pre-sets respective weight.For example, same subscriber identity information repeatedly shares chained list
The participator of sign is the maximum probability of malicious user, and the participator that same facility information repeatedly shares link characterization is malicious user
Probability time it is big, the participator that same geographical location information repeatedly shares link characterization is that the probability time of malicious user is small, same
The participator that IP address repeatedly shares link characterization is the probability minimum of malicious user, the then subscriber identity information being arranged, equipment
The weight of information, geographical location information and IP address is sequentially reduced.To subscriber identity information, facility information, geographical location letter
Breath and the respective numerical value of IP address seek weighted sum, you can to obtain the total value of participator, by the total value and setting numerical value
Compare and is assured that whether participator is malicious user.If participator is a malicious user, server can be this point
The person of enjoying stamps the label of a malicious user.Optionally, threshold value can be movable or some big datas by some previous
Analysis obtains.It more fully can accurately judge whether participator is malicious user by this kind of mode.
It should be appreciated that the present invention is not limited to determine by participator and/or participator whether be evil above by number
The mode of meaning user, whether it is malice that user can also be arranged as required to other modes judgement by participator and/or participator
User.
Based on parameter information, longitude and latitude of the server to the login user ID for the malice judged, the login IP of malice, malice
Degree, the user account of malice and repeat logon time etc. information give certain malice degree marking, assess what user
It is the title, what user is to cancel reward etc., to assess later malicious user.With reference to only uploading
By the parameter information of participator, and upload by two kinds of situations of parameter information of participator and participator to whether providing reward
Embodiment is introduced.
In one embodiment, the result according to verification determines whether to provide reward, including:If described by participator
For normal users, determines and provide reward;If it is described by participator be malicious user, determine the malice degree of the malicious user,
If malice degree is less than preset first threshold, determines and provide reward, if malice degree is more than or equal to first threshold and is less than second
Threshold value determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if malice degree is big
Reward is not provided in equal to second threshold, determining and to the progress title processing of the user account of the malicious user.
In the present embodiment, if being normal users by participator, it is determined that can be participator and/or this sent out by participator
Put reward;If being malicious user by participator, the malice degree for judging the malicious user is needed, is according to the determination of malice degree
Whether no granting reward even carries out title etc., wherein first threshold and second threshold can be according to realities to malicious user
Border needs to be configured.It determines that the mode of malice degree has very much, is disliked for example, being determined according to the frequency of malicious user clickthrough
Meaning degree, frequency is bigger, and malice degree is bigger;In another example determining malice degree, number according to the total number of clicks of malicious user
Bigger, malice degree is bigger;In another example when parameter information has multiple, according to the number determination malice for being determined as malice parameter
Degree, number is more, and malice degree is bigger.It should be appreciated that the present invention is not defined the method for determination of malice degree.
In another embodiment, the result according to verification determines whether to provide reward, including:If the participator
With it is described by participator be normal users, determine and provide reward;If the participator or it is described by participator be malicious user,
It determines the malice degree of the malicious user, if malice degree is less than preset first threshold, determines and provide reward, if malice journey
Degree is more than or equal to first threshold and is less than second threshold, determines and does not provide reward and the user account of the malicious user is kept to be in
Normal operating condition determines if malice degree is more than or equal to second threshold and does not provide reward and to the user of the malicious user
Account carries out title processing;If the participator and it is described by participator be malicious user, reward is not provided in determination, and to institute
The user account and the user account by participator for stating participator carry out title processing.
In the present embodiment, if participator and be normal users by participator, it is determined that can be participator and/or the quilt
Participator provides reward;If participator and there are one being malicious user, being needed the evil for judging the malicious user in participator
Whether meaning degree determines whether to provide reward according to malice degree, even to malicious user progress title etc., wherein first
Threshold value and second threshold can be configured according to actual needs;If participator and be malicious user by participator,
It determines and does not provide reward and title processing is carried out to the two.Equally, determine that the mode of malice degree has very much, for example, according to evil
The frequency of meaning user clicks on links determines malice degree, and frequency is bigger, and malice degree is bigger;In another example total according to malicious user
Number of clicks determine malice degree, number is bigger, and malice degree is bigger;In another example when parameter information has multiple, according to sentencing
The number for being set to malice parameter determines malice degree, and number is more, and malice degree is bigger.It should be appreciated that the present invention is not to disliking
The method of determination of meaning degree is defined.
It should be noted that the present invention according to check results to not determining whether that the concrete mode for providing reward limits
Fixed, user can also take other manner, can also ought be wherein for example, when to participator and when all being verified by participator
One user provides reward when being malicious user.In addition, meeting preset value or like time if it is by sharing number
Meet the modes such as preset value to determine whether to provide the situation of reward, normal users click can be denoted as according to preset time period internal standard
Whether the number of link meets preset value determination.
It is above-mentioned to be directed to upload by the parameter information of participator, and by the ginseng of the parameter information of participator and participator
Number two kinds of situations of information, it should be understood that, can also be only by the ginseng of participator when accessing the link that participator shares by participator
Number information uploads, and is determined whether to provide reward according to the parameter information of participator.
Based on same inventive concept, the present invention also provides a kind of reward dispensing apparatus, below in conjunction with the accompanying drawings to the present invention's
Specific implementation mode describes in detail.
As shown in Fig. 2, in one embodiment, a kind of reward dispensing apparatus, including:
Parameter information receiving module 110, for receiving client when the link that participator shares is accessed by participator
The parameter information by participator passed;
Correction verification module 120, for it is according to the parameter information verification by participator by participator whether be malice
User;
Module 130 is provided in reward, and reward is provided for determining whether according to the result of verification.
When accessing the link that participator shares by participator, client will be uploaded the present embodiment by the information of participator,
By to by the information of participator carry out verification determine whether provide reward, compared to the prior art in directly provide reward
Mode, which screens user, and that get is high quality user, substantially increases the effect of product promotion
Fruit.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further right to link
User screens, and improves the effect of product promotion, and in one embodiment, the client is additionally operable to upload the link packet
The parameter information of the participator contained;The correction verification module 120 is additionally operable to verify institute according to the parameter information of the participator
State whether participator is malicious user.
In order to further increase the effect of product promotion, in one embodiment, the correction verification module 120 is additionally operable to execute
It operates below:Obtain the user account by participator in the first platform for accessing the link;Based on preset
The blacklist account library of first platform verifies whether the user account by participator is blacklist account;If so, really
It is fixed it is described by participator be malicious user, otherwise determine that described by participator is normal users.
In order to further increase the effect of product promotion, in one embodiment, the correction verification module 120 is additionally operable to execute
It operates below:Obtain user account of the participator in the second platform for sharing the link;Based on preset institute
The blacklist account library for stating the second platform verifies whether the user account of the participator is blacklist account;If so, determining institute
It is malicious user to state participator, otherwise determines that the participator is normal users.
In one embodiment, described by the parameter information of participator includes subscriber identity information, facility information, geographical position
Confidence breath and IP address etc.;The correction verification module 120 is additionally operable to execute following operation:The subscriber identity information is counted to access
First number of the link, if first number is more than the threshold value of the maximum access times of setting, using the first numerical tabular
It is malicious user identity information to levy the subscriber identity information, and second value is otherwise used to characterize the subscriber identity information as just
Normal subscriber identity information;Second number that the facility information accesses the link is counted, if second number is more than described
Threshold value uses third value to characterize the facility information as rogue device information, otherwise uses equipment described in the 4th numerical representation method
Information is normal device information;The third number that the geographical location information accesses the link is counted, if the third number
It more than the threshold value, uses geographical location information described in the 5th numerical representation method for malice geographical location information, otherwise uses the 6th
Geographical location information described in numerical representation method is normal geographical location information;It counts the 4th time that the IP address accesses the link
Number uses IP address described in the 7th numerical representation method otherwise to be used for malicious IP addresses if the 4th number is more than the threshold value
IP address described in 8th numerical representation method is normal IP address;To the corresponding numerical value of the subscriber identity information, the facility information
It sums, obtains after corresponding numerical value, the corresponding numerical value of the geographical location information and the corresponding numeric weights of the IP address
The total value by participator;If the total value be more than setting numerical value, determine it is described by participator be malicious user, otherwise
Determine it is described by participator be normal users.
In one embodiment, the parameter information of the participator includes subscriber identity information, facility information, geographical location
Information and IP address etc.;The correction verification module 120 is additionally operable to execute following operation:It counts the subscriber identity information and shares institute
First number of link is stated, if first number is more than the threshold value that the maximum being arranged shares number, using the first numerical representation method
The subscriber identity information is malicious user identity information, and it is normal otherwise to use second value to characterize the subscriber identity information
Subscriber identity information;Second number that the facility information shares the link is counted, if second number is more than the threshold
Value uses third value to characterize the facility information as rogue device information, otherwise uses equipment letter described in the 4th numerical representation method
Breath is normal device information;The third number that the geographical location information shares the link is counted, if the third number is big
It in the threshold value, uses geographical location information described in the 5th numerical representation method for malice geographical location information, otherwise uses the 6th number
It is normal geographical location information that value, which characterizes the geographical location information,;It counts the 4th time that the IP address shares the link
Number uses IP address described in the 7th numerical representation method otherwise to be used for malicious IP addresses if the 4th number is more than the threshold value
IP address described in 8th numerical representation method is normal IP address;To the corresponding numerical value of the subscriber identity information, the facility information
It sums, obtains after corresponding numerical value, the corresponding numerical value of the geographical location information and the corresponding numeric weights of the IP address
The total value of the participator;If the total value is more than setting numerical value, determines that the participator is malicious user, otherwise determine
The participator is normal users.
It should be appreciated that the present invention is not limited to determine by participator and/or participator whether be evil above by number
The mode of meaning user, whether it is malice that user can also be arranged as required to other modes judgement by participator and/or participator
User.
Based on parameter information, longitude and latitude of the server to the login user ID for the malice judged, the login IP of malice, malice
Degree, the user account of malice and repeat logon time etc. information give certain malice degree marking, assess what user
It is the title, what user is to cancel reward etc., to assess later malicious user.With reference to only uploading
By the parameter information of participator, and upload by two kinds of situations of parameter information of participator and participator to whether providing reward
Embodiment is introduced.
In one embodiment, the reward provides module 130 for performing the following operations:If it is described by participator be just
Common family, determines and provides reward;If it is described by participator be malicious user, determine the malice degree of the malicious user, if dislike
Meaning degree is less than preset first threshold, determines and provides reward, if malice degree is more than or equal to first threshold and is less than second threshold,
It determines and does not provide reward and the user account of the malicious user is kept to be in normal operating condition, if malice degree is more than or equal to
Second threshold determines and does not provide reward and carry out title processing to the user account of the malicious user.
In another embodiment, the reward provides module 130 and is additionally operable to execute following operation:If the participator and
Described by participator is normal users, determines and provides reward;If the participator or it is described by participator be malicious user, really
The malice degree of the fixed malicious user determines if malice degree is less than preset first threshold and provides reward, if malice degree
It is less than second threshold more than or equal to first threshold, determines and do not provide reward and the user account of the malicious user is kept to be in just
It is often used state, if malice degree is more than or equal to second threshold, determines and does not provide reward and to user's account of the malicious user
Number carry out title processing;If the participator and it is described by participator be malicious user, reward is not provided in determination, and to described
The user account of participator and the user account by participator carry out title processing.
It should be noted that the present invention according to check results to not determining whether that the concrete mode for providing reward limits
Fixed, user can also take other manner, can also ought be wherein for example, when to participator and when all being verified by participator
One user provides reward when being malicious user.In addition, meeting preset value or like time if it is by sharing number
Meet the modes such as preset value to determine whether to provide the situation of reward, normal users click can be denoted as according to preset time period internal standard
Whether the number of link meets preset value determination.
It is above-mentioned to be directed to upload by the parameter information of participator, and by the ginseng of the parameter information of participator and participator
Number two kinds of situations of information, it should be understood that, can also be only by the ginseng of participator when accessing the link that participator shares by participator
Number information uploads, and is determined whether to provide reward according to the parameter information of participator.
Other technical characteristics of the above-mentioned reward dispensing apparatus described from server end and the reward described from server end
The technical characteristic of distribution method is identical, and it will not be described here.
It describes in detail below from the angle of client to the embodiment of the present invention.
As shown in figure 3, the flow diagram of the reward distribution method for another embodiment, the method comprising the steps of:
The access instruction for the link that S210, reception share participator by participator.
Participator is the user for sharing link, is the user for accessing link by participator, is linked as promoting set by product
Link.When user generates a splitting glass opaque, a parameter shared link and needed can be asked to server, such as
Mobile phone Y Y live streaming is shared, and parameter generally comprises channel number, the content shared and the picture etc. shared, meanwhile, optionally, production
Client used in the user of raw splitting glass opaque, i.e. client used in participator, can obtain the parameter information of participator, such as
Subscriber identity information, facility information, geographical location information and IP address etc. pass through the parameter asked to server and client
The parameter information of the participator obtained is held to generate a link, it is therefore, described to link the parameter information for including the participator.Its
In, these facility informations are not limited to the information such as the MAC Address, IMEI and IMSI of equipment.In addition, optional, client can
The parameter information of these participators is put into a fixed position after encryption, when generating link directly from the fixed bit
The parameter information for reading participator is set, is then given birth to by the parameter information of the participator of the parameter and reading asked to server
It is linked at one.
It should be appreciated that the present invention is not to the specific of the parameter information of the relevant parameter and participator asked from server
Form is defined.In addition, when user generates a splitting glass opaque, can also relevant parameter only be asked from server,
The parameter information of participator is not read, then the link generated only includes the relevant parameter information asked from server.
Generate promote product used in link after, participator by share channel share wechat good friend, wechat circle of friends,
In microblogging or QQ etc., which is clicked by modes such as clicks by participator, just generates the access instruction to the link.
S220, the response access instruction, are uploaded to server, so that the clothes by described by the parameter information of participator
Be engaged in device it is according to the parameter information verification by participator by participator whether be malicious user, and according to the result of verification
Determine whether to provide reward.
When being accessed to the link by modes such as clicks by participator, client can connecing by invoking server
Mouthful, will server be uploaded to by the parameter information of participator.Wherein, optionally, include and unlimited by the parameter information of participator
In subscriber identity information, facility information, geographical location information and IP address etc..Server is according to by the parameter information of participator
Determine whether to provide reward.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator
Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight
The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product
The effect of popularization.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further carry to link
The effect that high product is promoted, in one embodiment, the link include the parameter information of the participator;Described in the response
After access instruction, further include:The parameter information for linking the participator for including is uploaded to server, so that described
Server verifies whether the participator is malicious user according to the parameter information of the participator, and true according to the result of verification
It is fixed whether to provide reward.
In the present embodiment, when being accessed to link by modes such as clicks by participator, client will not only be shared
The parameter information of person is uploaded to server, and the parameter information of participator is also uploaded to server.Whether participator is that malice is used
Family refers to that participator shares to whether link carries out malice.Server is got by the parameter information of participator and participator
Whether after parameter information, it is malicious user to be verified by participator and participator by these parameter informations, then according to being divided
The check results of the person of enjoying and participator synthesis determine whether to provide reward.
Other technical characteristics of the above-mentioned reward distribution method described from client are sent out with the reward described from server end
The technical characteristic for putting method is identical, and it will not be described here.
Based on same inventive concept, the present invention also provides another kinds to reward dispensing apparatus, below in conjunction with the accompanying drawings to the present invention
The specific implementation mode of device describes in detail.
As shown in figure 4, in one embodiment, a kind of reward dispensing apparatus, including:
Access instruction receiving module 210, the access instruction for receiving the link shared to participator by participator;
Parameter information uploading module 220 uploads the parameter information by participator for responding the access instruction
To server, so that whether it by participator is that malice is used that the server is according to the parameter information verification by participator
Family, and determine whether to provide according to the result of verification and reward.
The present embodiment will be uploaded to service when accessing the link that participator shares by participator by the information of participator
Device, server by determining whether to provide reward to carrying out verification by the information of participator, compared to the prior art in it is straight
The mode of reward is put in sending and receiving, and which screens user, and that get is high quality user, substantially increases product
The effect of popularization.
In view of participator is possible to carry out repeating to share to illegally obtain reward, therefore in order to further carry to link
The effect that high product is promoted, in one embodiment, the link include the parameter information of the participator;The parameter information
Uploading module 220 is additionally operable to after responding the access instruction by the parameter information for linking the participator for including
It is uploaded to server, so that the server verifies whether the participator is that malice is used according to the parameter information of the participator
Family, and determine whether to provide according to the result of verification and reward.
Other technical characteristics of the above-mentioned reward dispensing apparatus described from client and the reward granting described from client
The technical characteristic of method is identical, and it will not be described here.
In order to better understand the present invention, the angle interacted below from client and server is situated between in detail to the present invention
It continues.
As shown in figure 5, the flow diagram of the reward distribution method for a specific embodiment, the method comprising the steps of:
S310, when participator generate splitting glass opaque when, where participator user end to server request share link need
The parameter wanted, while User ID is obtained, the parameter information of the participators such as facility information, longitude and latitude and IP address, according to request
Parameter and the parameter information of participator generate a link, and share into platform;
S320, when logging in the platform by participator and clicking this link, will be shared by the client where participator
The User ID of the User ID of person, the parameter informations such as facility information, longitude and latitude and IP address and participator, facility information, warp
The parameter informations such as latitude and IP address are uploaded to server;
S330, server are combined by participator by by the parameter information of the parameter information of participator and participator
The user account of user account and participator in platform in platform, it is determined whether provide reward.
If it is by way of sharing and drawing new acquisitions reward, then server also needs to verify and is shared in step S330
Whether person is new user.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program
The reward distribution method described in above-mentioned any one is realized when being executed by processor.The storage medium is including but not limited to any
The disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk) of type, ROM (Read-Only Memory, read-only storage
Device), RAM (Random AcceSS Memory, immediately memory), EPROM (EraSable Programmable Read-
Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically EraSable Programmable
Read-Only Memory, Electrically Erasable Programmable Read-Only Memory), flash memory, magnetic card or light card.It is, storage
Medium includes by any medium of equipment (for example, computer) storage or transmission information in the form of it can read.Can be read-only
Memory, disk or CD etc..
The embodiment of the present invention also provides a kind of terminal, and the terminal includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processing
Device realizes the reward distribution method described in above-mentioned any one.
As shown in fig. 6, for convenience of description, illustrating only and the relevant part of the embodiment of the present invention, particular technique details
It does not disclose, please refers to present invention method part.The terminal can be include mobile phone, tablet computer, PDA
(Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle mounted electric
The arbitrary terminal device such as brain, server, by taking terminal is mobile phone as an example:
Fig. 6 shows the block diagram with the part-structure of the relevant mobile phone of terminal provided in an embodiment of the present invention.Reference chart
6, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input unit 1530, display unit
1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, Wi-Fi) module 1570, processor
The components such as 1580 and power supply 1590.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair
The restriction of mobile phone may include either combining certain components or different component cloth than illustrating more or fewer components
It sets.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 1510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 1580;In addition, the data for designing uplink are sent to base station.In general, RF circuits
1510 include but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuits 1510 can also be logical with network and other equipment by radio communication
Letter.Above-mentioned wireless communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access
(Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution,
LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in memory by operation
1520 software program and module, to execute various function application and the data processing of mobile phone.Memory 1520 can be led
To include storing program area and storage data field, wherein storing program area can storage program area, needed at least one function
Application program (for example function etc. is provided in reward) etc.;Storage data field can be stored uses created data (ratio according to mobile phone
Such as by the parameter information of participator) etc..In addition, memory 1520 may include high-speed random access memory, can also wrap
Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Input unit 1530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 1530 may include touch panel 1531 and other inputs
Equipment 1532.Touch panel 1531, also referred to as touch screen collect user on it or neighbouring touch operation (such as user
Use the behaviour of any suitable object or attachment such as finger, stylus on touch panel 1531 or near touch panel 1531
Make), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 1531 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 1580, and order that processor 1580 is sent can be received and executed.In addition,
The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize touch panel 1531.In addition to touch surface
Plate 1531, input unit 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 may include
But in being not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc.
It is one or more.
Display unit 1540 can be used for showing information input by user or be supplied to user information and mobile phone it is each
Kind menu.Display unit 1540 may include display panel 1541, optionally, liquid crystal display (Liquid may be used
Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
To configure display panel 1541.Further, touch panel 1531 can cover display panel 1541, when touch panel 1531 detects
To processor 1580 on it or after neighbouring touch operation, is sent to determine the type of touch event, it is followed by subsequent processing device
1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in figure 6, touch panel
1531 be to realize input and the input function of mobile phone as two independent components with display panel 1541, but in certain realities
Apply in example, can be integrated by touch panel 1531 and display panel 1541 and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 1541, proximity sensor can close display panel when mobile phone is moved in one's ear
1541 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Also as mobile phone
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 1560, loud speaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Audio
The transformed electric signal of the audio data received can be transferred to loud speaker 1561, is converted by loud speaker 1561 by circuit 1560
It is exported for vocal print signal;On the other hand, the vocal print signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560
Audio data is converted to after reception, then by after the processing of audio data output processor 1580, through RF circuits 1510 to be sent to ratio
Such as another mobile phone, or audio data is exported to memory 1520 to be further processed.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics by Wi-Fi module 1570
Mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 6 is shown
Wi-Fi module 1570, but it is understood that, and it is not belonging to must be configured into for mobile phone, completely it can exist as needed
Do not change in the range of the essence of invention and omits.
Processor 1580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone,
By running or execute the software program and/or module that are stored in memory 1520, and calls and be stored in memory 1520
Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor
1580 may include one or more processing units;Preferably, processor 1580 can integrate application processor and modulation /demodulation processing
Device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located
Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone further includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply
Management system and processor 1580 are logically contiguous, to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
Above-mentioned reward distribution method, device, computer readable storage medium and terminal is shared being accessed by participator
When the link that person shares, by rewarding being determined whether to provide by the result of participator and/or participator's verification, compared to existing
The mode of reward is directly provided in technology, which screens user, and that get is high quality user, is carried significantly
The high effect of product promotion.
It should be understood that although each step in the flow chart of attached drawing is shown successively according to the instruction of arrow,
These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing
Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, execution sequence is also not necessarily to be carried out successively, but can be with other
Either the sub-step of other steps or at least part in stage execute step in turn or alternately.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.