CN110213169A - Resource lock method, apparatus and electronic equipment - Google Patents
Resource lock method, apparatus and electronic equipment Download PDFInfo
- Publication number
- CN110213169A CN110213169A CN201810169089.2A CN201810169089A CN110213169A CN 110213169 A CN110213169 A CN 110213169A CN 201810169089 A CN201810169089 A CN 201810169089A CN 110213169 A CN110213169 A CN 110213169A
- Authority
- CN
- China
- Prior art keywords
- resource
- user
- target
- data
- lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
- G06Q30/0637—Approvals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
Abstract
The invention discloses a kind of resource lock method, apparatus and electronic equipments.This method comprises: providing resource selection interface, for selection by the user target resource;When receiving selection operation of the user to target resource by the resource selection interface, determine whether corresponding user has resource lock permission;When the user has resource lock permission, the target resource is locked, so that the target resource cannot be used by other users.According to the present invention, the efficiency that resource uses is improved, the resource usage experience of user is promoted.Meanwhile the resource lock of malice is avoided, it promotes resource and uses the availability of service.
Description
Technical field
The present invention relates to field of computer technology, set more particularly, to a kind of resource lock method, apparatus and electronics
It is standby.
Background technique
With the rapid development of computer technology, by network online booking perform seat, film seat, restaurant seat,
The mode of the resources such as itinerary, it is greatly convenient for people's lives.For example, for performing project, Most current performs project all
Seat selection can be provided the user in such a way that some network applications (such as APP) are by line selection seat.But often perform project
When comparing popular, different user probably conflicts to the selection at seat, causes user clash will be to seat
It is chosen over, submitted repeatedly, the experience on the one hand bringing interactive operation repeatedly to make user is very bad, on the other hand also leads
It causes corresponding network application constantly to load seating maps to be selected in for user, very big flow attack is brought to corresponding system.
In view of the above-mentioned problems, the current network application provided in line selection seat service, mainly uses two kinds of settling modes:
One is when the seat clicked in seating maps in user, relevant background module is called to verify the seat selected
Whether locked due to placing an order for other users, if be not locked out, order can be popped up fill in page and be filled in for user, submit and order
It is single, actual lock just is carried out to seat when submitting order;Although selecting between alleviating user to a certain extent in this way seat
Conflict, but the probability clashed when high flow capacity selects seat is also very high, still there is 90% or more in real process from the point of view of data
User's selection can clash;And once select to clash, choosing seat again and lower single process will be triggered, still may be used also
There can be conflict with other user's selections, also, to reload seating maps in gravity treatment seat process, flow pressure is also into
Increase again, therefore, the user experience and stability of the program are not so good;
Another kind directly removes lock when being the seat in user's click seating maps, but the problem is that if it is malice
User and control is improper may continuously attempt to lock, will ultimately result in normal users can not lock, it is final to influence whole clothes
Business availability.
Summary of the invention
It is an object of the present invention to provide a kind of new solutions for lock resource.
According to the first aspect of the invention, a kind of resource lock method is provided, wherein include:
Resource selection interface is provided, for selection by the user target resource;
When receiving selection operation of the user to target resource by the resource selection interface, determine that corresponding user is
It is no that there is resource lock permission;
When the user has resource lock permission, the target resource is locked, so that the target resource cannot
It is used by other users.
Optionally, the step of whether determination user has resource lock permission include:
The resource for obtaining the user uses scoring;
When the resource of the user is greater than preset scoring threshold value using scoring, the user is set with resource lock
Permission.
Optionally, the resource for obtaining the user includes: using the step of scoring
The resource for obtaining the user uses data;
Data are used according to the resource of the user, the resource for calculating the user uses scoring.
Optionally, the resource of the user using data include at least user resource browsing data, resource access data,
Resource history uses data and user behavior data;
It is described calculate user resource using scoring step include:
Data and the user are used to resource browsing data, resource access data, the resource history
Behavioral data is summed after being handled respectively using corresponding preset weight factor, is obtained the corresponding resource use and is commented
Point.
Optionally,
The resource browsing data include at least whether user browsed the target resource, user browses the target money
One of both frequencies in source;
The resource access data include at least whether user subscribes to the target resource, whether user provides the target
Whether the network access path that source access using registration, user the target resource is normal, user's access target provides
Whether the network address in source changes one of this;
Whether the resource history is included at least user and used using data belongs to same type with the target resource
One of both distribution situations of resource that resource, user have used;
The user behavior data includes at least whether user uses real-name authentication account, user whether by abnormal account
Whether selection target resource, user behavior belong to machine behavior, whether user behavior exists actually with the target resource is used
It is associated with one of this.
Optionally, the resource lock method further include:
When the user prescribes a time limit with resources use right, according to the corresponding resource of the resource of user use scoring setting
Locking time;
After locking the target resource, within the corresponding resource lock time, the user is not received to described
When the use operation of target resource, cancel the locking of the target resource.
Optionally, the resource lock method further include:
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding
The resource uses scoring.
Optionally, the method also includes:
After locking the target resource, within the corresponding resource lock time, the user is not received to described
When the use operation of target resource, cancel the locking of the target resource;
And/or
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding
The resources use right limit.
According to the second aspect of the invention, a kind of resource lock device is provided, comprising:
Interface providing unit, for providing resource selection interface, corresponding target resource for selection by the user;
Permission determination unit, for when being received by the resource selection interface to the selection operation of target resource, really
Whether the user for implementing selection operation surely has resource lock permission;
Resource lock unit, for locking corresponding target resource when the user has resource lock permission.
According to the third aspect of the invention we, a kind of electronic equipment is provided, comprising:
Display device, for showing human-computer interaction interface;
Memory, for storing executable instruction;
Processor runs the electronic equipment and executes such as of the invention for the control according to the executable instruction
Any one resource lock method described in one side.
According to one embodiment of the disclosure, the target for meeting demand by providing the selection of resource selection interface for users
Resource when determining that user has resource lock permission, locks the target resource that it is selected after user's selection target resource
It is fixed, so that other users are not available the target resource, the user is enabled preferentially can to carry out relevant use to the target resource
Operation is avoided conflicting with other users generation resource use, resource is avoided to be selected using user's reverse cyclic loadings resource in conflict process
It selects interface bring flow attack and user experience is bad, improve the treatment effeciency that resource uses, the resource for promoting user uses
Experience.Meanwhile resource can be locked to avoid malicious user, it avoids resource abnormal using occurring, promotes service availability.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its
Advantage will become apparent.
Detailed description of the invention
It is combined in the description and the attached drawing for constituting part of specification shows the embodiment of the present invention, and even
With its explanation together principle for explaining the present invention.
Fig. 1 is the block diagram for showing the example of hardware configuration for the electronic equipment that can be used for realizing the embodiment of the present invention.
Fig. 2 shows the flow charts of the resource lock method of the embodiment of the present invention.
Fig. 3 shows the another flow chart of the resource lock method of the embodiment of the present invention.
Fig. 4 is the schematic diagram of the example of the resource lock method of the embodiment of the present invention.
Fig. 5 shows the block diagram of the resource lock device of the resource lock method of the embodiment of the present invention.
Fig. 6 shows the block diagram of the electronic equipment of the resource lock method of the embodiment of the present invention.
Specific embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should also be noted that unless in addition having
Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
The range of invention.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the present invention
And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without
It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
<hardware configuration>
Fig. 1 is the block diagram for showing the hardware configuration for the electronic equipment 1000 that the embodiment of the present invention may be implemented.
Electronic equipment 1000 can be portable computer, desktop computer, mobile phone, tablet computer etc..As shown in Figure 1, electric
Sub- equipment 1000 may include processor 1100, memory 1200, interface arrangement 1300, communication device 1400, display device
1500, input unit 1600, loudspeaker 1700, microphone 1800 etc..Wherein, processor 1100 can be central processing unit
CPU, Micro-processor MCV etc..Memory 1200 is for example including ROM (read-only memory), RAM (random access memory), such as
The nonvolatile memory etc. of hard disk.Interface arrangement 1300 is for example including USB interface, earphone interface etc..Communication device 1400
It is such as able to carry out wired or wireless communication, specifically may include Wifi communication, Bluetooth communication, 2G/3G/4G/5G communication etc..It is aobvious
Showing device 1500 is, for example, liquid crystal display, touch display screen etc..Input unit 1600 for example may include touch screen, keyboard,
Body-sensing input etc..User can pass through 1800 inputting/outputting voice information of loudspeaker 1700 and microphone.
Electronic equipment shown in FIG. 1 is merely illustrative and is in no way intended to the invention, its application, or uses
Any restrictions.Using in an embodiment of the present invention, the memory 1200 of electronic equipment 1000 is for storing instruction, described
Instruction is operated for controlling the processor 1100 to execute any one resource lock side provided in an embodiment of the present invention
Method.It will be appreciated by those skilled in the art that although showing multiple devices to electronic equipment 1000 in Fig. 1, the present invention
Partial devices therein can be only related to, for example, electronic equipment 1000 pertains only to processor 1100 and storage device 1200.Technology
Personnel can disclosed conceptual design instruction according to the present invention.How control processor is operated for instruction, this is this field public affairs
Know, therefore is not described in detail herein.
<embodiment>
<method>
In the present embodiment, a kind of resource lock method is provided, which was that network is supplied to user's selection progress in advance
Fixed application resource can be provided by resource provider by corresponding network application (such as APP).The resource may include drilling
The auditorium seat of the performance project such as meeting, musical drama, modern drama, film is sung, can also include the traffic works such as aircraft, train, automobile
Travelling resource such as the passenger-seat of tool or hotel room etc..
The resource lock method provided in the present embodiment, as shown in Figure 2, comprising: step S2100-S2300.
Step S2100 provides resource selection interface, for selection by the user target resource.
In the present embodiment, the resource selection interface is to interact acquisition by the operations such as clicking, choosing for user
The human-computer interaction interface of corresponding application service.The resource selection interface can show multiple moneys for making a reservation for or using for user
Source the selection operations such as clicks, chooses by implementing by user, and selection selection meets the target money of its demand from multiple resources
Source.
For example, the resource can be the spectators seat of performance project, which is exactly corresponding seat selection
The page can show all alternative spectators by providing the application rollouts of the services such as predetermined, purchase performance project
Seat meets the corresponding spectators seat of self-demand, that is, target resource for selection by the user.
Step S2200 is determined corresponding when receiving selection operation of the user to target resource by resource selection interface
Whether user has resource lock permission.
In the present embodiment, user can provided by implementing such as to click to resource selection interface, choosing selection operation
Multiple resource selections that source selection interface is shown meet the target resource of its demand.
When resource selection interface receives the selection operation that user implements some resource, it can determine that user implements selection operation
Resource be user selection target resource, determine user whether have resource lock permission,
Resource lock permission is locked out the permission of corresponding target resource.When user has resource lock permission, when its choosing
When selecting corresponding target resource, which will be locked, and be set as to be used by other users.
In the present embodiment, the step of whether above-mentioned determination user has resource lock permission may include: S2210-
S2220。
Step S2210, the resource for obtaining the user use scoring.
In the present embodiment, resource is assessment score of the corresponding user of characterization using resource situation using scoring.The money
Source can be preset using the historical data of resource according to user and be stored local for acquisition using scoring;Alternatively,
It can be stored after calculating in real time local for acquisition according to user using the variation of resource situation.
In one example, the resource of the above-mentioned acquisition user includes: step S2211-S2212 using the step of scoring.
Step S2211, the resource for obtaining the user use data.
In this example, resource is relevant data the case where using resource to user using data.
In one example, the resource of user browses data, resource access number using the resource that data include at least user
Data and user behavior data are used according to, resource history.
Resource browsing data are historical datas relevant to user's browsing resource situation.
In one example, resource browsing data include at least whether user browsed the target resource, user's browsing
One of both frequencies of the target resource.For example, resource browses data extremely when resource is the seat of some performance project
The performance project whether was browsed including user less and user browses the frequency of the performance project.
It is historical data relevant to user access resources situation that resource, which accesses data,.
In one example, resource access data include at least user whether subscribe to the target resource, user right
Whether the network access path that the target resource access using registration, user the target resource is normal, user accesses the mesh
Whether the network address of mark resource changes one of this.For example, resource is visited when resource is the seat of some performance project
Ask that data include whether user has subscribed the performance project, whether user carries out purchase registration to the performance project, user accesses
The network access path of the performance project (for example is not just directly entered seat by project details page and selects page with the presence or absence of abnormal
Face), whether IP address changes in the network access path of user.
Resource history is corresponding target resource by the relevant historical data of service condition using data.
In one example, resource, the user for belonging to same type with the target resource whether were used including at least user
One of both resource distributions using other resources.For example, when resource is the seat of some performance project, resource history
It the use of data include that whether user once bought similar performance project, user buys the region point of similar performance project
Cloth.
User behavior data is the historical data that user is the corelation behaviour implemented using resource.
In one example, the user behavior data include at least user whether use real-name authentication account, user whether
Whether belong to machine behavior, that whether user exists with the target resource is real by abnormal account selection target resource, user behavior
Border is associated with one of this.For example, user behavior data includes: that user uses when resource is the seat of some performance project
Whether the account in the seat for buying the performance project passes through real-name authentication;The seat that user is used to buy the performance project is made
Whether account is small size (for example, using the usually non-real real user of account that network mobile phone card is registered, belonging to trumpet);
Whether the user behaviors such as registration, login, purchase, the payment of user belong to machine behavior;User buys the seat of the performance project
The address of mailing seat bill whether belong to true address;With performance the distance between project location location whether it is default away from
From in threshold value etc..The address of seat bill is posted if not true address or posts the address of seat bill apart from performance item
Mesh farther out when, it can be determined that actual association is not present in the seat ticket (use target resource) of user behavior and purchase performance project.
In the present embodiment, the resource of above-mentioned user uses data, can use the application journey of service by providing resource
Sequence is stored in local for acquisition when resource behavior occurs for user by log recording.For example, resource is performance project
When seat, the client of the application program of seat booking service can be to provide, record user buys seat using the client
Behavioral data and be stored in being locally stored of client device.The record can exist by log form, pass through statistics
The available corresponding user behavior data of the log.By taking " frequency of user's browsing objective resource " as an example, remembered by client
It employs the browsing behavior that family occurs in a predetermined period (such as in one day), is formed during log is stored in and is locally stored, and
The post analysis log, statistics obtain the frequency of user's browsing objective resource, and similarly, other data can also pass through the above method
It obtains, no longer enumerated here.
Step S2212 uses data according to the resource of the user, and the resource for calculating the user uses scoring.
The resource of user is calculated based on the resource using data using the resource service condition of data reflection user
Resource can be used for assessing the resource usage behavior of user using scoring.
In one example, the resource of the user is accessed using resource browsing data, the resource that data include at least user
Data, resource history use data and user behavior data, and the resource of above-mentioned calculating user includes: using scoring step
Data and user behavior data are used to resource browsing data, resource access data, resource history, used respectively
Corresponding preset weight factor is summed after being handled, and is obtained the corresponding resource and is used scoring.
For example, it is assumed that resource browsing data include that whether user browsed the resource, user browses the frequency of the resource;With
Whether family, which browsed the resource, is assumed that value is W, when user browsed the resource, W 1, otherwise, and W 0, corresponding weight
The factor is a1;It is n times in each measurement period that the frequency that user browses the resource, which is assumed to be, and corresponding weight factor is a2;It is right
Ying Di is W*a1+N*a2 using the result that weight factor process resource browser data obtains.
Data and user behavior data are used using corresponding weight factor process resource access data, resource history
Step is also similar, numerous to list herein.
Data are being used to resource browsing data, resource access data, resource history using corresponding weight factor respectively
And after user behavior data processing, obtained result is summed, uses scoring as corresponding resource.
The weight factor can be set according to specific application scenarios or application demand for different data in advance
It sets, no longer citing repeats herein.
Step S2220, when the resource of the user is greater than preset scoring threshold value using scoring, the user, which is arranged, has money
Source locked authority.
Resource can be used for assessing the resource usage behavior of corresponding user using scoring.
In the present embodiment, the resource of user is higher using scoring, it is meant that the resource usage behavior performance of user is better.
By preset scoring threshold value, the user with the performance of good resource usage behavior can be filtered out.The scoring
Threshold value is that have good resource using the corresponding resource of user of performance using scoring, can be according to specific application demand
Or application scenarios setting.For example, it is 0-100, corresponding scoring that the resource that user can be set, which uses the fraction range of scoring,
Threshold value is set as 60 points, and user of the resource using scoring greater than 60 points has resource lock permission.
To the user with good resource service condition, setting has resource lock permission, this part can be made to use
Family locks the target resource of selection, more preferential than other users to use the target resource, avoids providing with other users
Source is avoided resource using user's reverse cyclic loadings resource selection interface bring flow attack in conflict process, is improved using conflict
The treatment effeciency that resource uses promotes the resource usage experience of user.Meanwhile resource can be locked to avoid malicious user
It is fixed, it avoids resource abnormal using occurring, promotes service availability.
Step S2300 locks the target resource, so that the target resource when the user has resource lock permission
It cannot be used by other users.
In the present embodiment, target resource is locked, can be modified by the state to target resource, is arranged
The target resource is invisible to other users or does not allow to operate, so that other users are not available the target resource.
For example, when target resource is the seat of some performance project, it can be in resource selection circle provided other users
Do not shown in face the seat perhaps the seat is set as not allowing to select prevent the seat from by other users selection or
Purchase.
In the present embodiment, whether there is resource lock permission for user setting, for resource lock permission
User locks the target resource that it is selected, so that other users are not available the target resource, enables the user excellent
Relevant use first is carried out to the target resource to operate, and avoids conflicting with other users generation resource use, resource is avoided to use
User's reverse cyclic loadings resource selection interface bring flow attack and user experience are bad in conflict process, improve what resource used
Treatment effeciency promotes the resource usage experience of user.Meanwhile resource can be locked to avoid malicious user, avoid resource
It is abnormal using occurring, promote service availability.
In application scenes, based on above-mentioned steps be user's lock onto target resource with resource lock permission after,
The user may not carry out target resource further to cause locked target to provide using operation due to various reasons
Source is vacant to be used, and resource utilization is influenced.Therefore, in one example, the resource lock method provided, such as Fig. 3
It is shown, further includes:
Step S2400 within the corresponding resource lock time, does not receive user to mesh after lock onto target resource
When marking the use operation of resource, cancel the locking of the target resource.
It should be understood that the use operation of target resource is corresponding with according to the resource type of target resource.For example, target
When resource is the seat of some performance project, the use operation of target resource includes purchase operation, delivery operation to the seat
Deng.
Is arranged to the target resource of locking, within the resource lock time, if user does not use mesh the resource lock time
Resource is marked, then cancels the locking to target resource and avoids target resource from being grown so that the target resource can be used in other users
Phase occupies, and improves resource utilization.
In the present embodiment, the resource lock time can be arranged according to specific application scenarios or application demand.
In one example, the resource lock time can be showed according to the resource usage behavior of user to be arranged, and user makes
It is better with the behavior expression of resource, the resource lock time can be set it is longer, to embody corresponding user's use priority, promoted
User uses the experience of resource, and guidance user more reasonably uses resource.The resource lock method of offer in this, is also wrapped
It includes: step S2410-S2420.
Step S2410, when the user prescribes a time limit with resources use right, according to the resource of user use scoring setting correspondence
The resource lock time.
For example, being 60 points in the case of above-mentioned resource scoring threshold value, user of the resource using scoring greater than 60 points has resource
Accordingly the resource lock time can be arranged using the score value of scoring with the resource, for example, resource uses scoring in locked authority
It is 70 timesharing, the corresponding resource lock time is 70 seconds, and resource is 80 timesharing using scoring, and the corresponding resource lock time is 80
Second, etc..
Step S2420 within the corresponding resource lock time, does not receive the user after locking the target resource
When operating to the use of target resource, cancel the locking of target resource.
In practical applications, the performance of the resource usage behavior of user might not be consistent, can be with the time
Passage changes, therefore, if the resource lock permission non-respective needle being correspondingly arranged shows the resource usage behavior of user
It is updated, the setting of resource lock permission can be made deviation occur, influence the treatment effeciency that resource uses.
In one example, the resource lock method provided in the present embodiment, can be as shown in Figure 3, comprising:
Step S2500, according to this user to the service condition of target resource, is updated and is corresponded to after lock onto target resource
The resources use right limit.
It should be understood that service condition of the user to target resource, corresponding with the resource type of target resource.For example,
When target resource is the seat of certain performance project, the service condition of target resource may include that user carries out purchase behaviour to the seat
Make, whether delivery operation, the duration that seat is locked etc. carried out to the seat.
According to this user to the service condition of target resource, the resources use right limit of corresponding user is updated, so that money
Source access right shows variation based on usage behavior of the user to target resource, improves the treatment effeciency that resource uses.For example, mesh
When mark resource is the seat of certain performance project, the locked duration in the seat is more than after preset time thresholding, and there are no right by user
The seat is bought or is paid, then the user can be set without resource lock permission.
By taking the above-mentioned use scoring setting user resources locked authority according to resource as an example, step S2500 may include:
After lock onto target resource, according to this user to the service condition of target resource, updates corresponding resource and use
Scoring.
The service condition of the target resource may include that the resource in above-mentioned example such as uses data, use in more new resources
After data, it can recalculate resource according to the resource that above-mentioned example is enumerated using the calculation method of scoring and be carried out using scoring
It updates, details are not described herein.
<example>
Below with reference to Fig. 4, the resource lock method provided in the present embodiment is further illustrated.
In this example, it is the seat of some popular performance project for the resource of locking, is installed on mobile phone by corresponding
On the APP of offer ticket service corresponding seat selection interface is provided.
The resource lock method, as shown in Figure 4, comprising: step S201-S212.
Step S201 provides seat selection interface, and the targeted seat of expectation purchase is selected for user.
Step S202 receives user in seat selection interface and chooses operation to targeted seat.
Step S203, determines whether the targeted seat allows to lock, if the targeted seat is locked by other users in advance
It is fixed, then do not allow to lock, enter step S204, otherwise, enters step S205.
Step S204 prompts user's targeted seat not allow to lock, separately selects other seats.
In this example, targeted seat may be in the state for being locked or being bought by other users, not allow to be locked again
It is fixed.
Step S205 determines that user chooses targeted seat.
Step S206, determines whether user has resource lock permission, if user does not have resource lock permission, enters
Otherwise step S207 enters step S208.
Determine user whether have the step of resource lock permission in abovementioned steps S2200 specifically away from for example,
Details are not described herein.
Step S207 does not execute lock operation to targeted seat.
Step S208, user have resource lock permission, lock corresponding targeted seat.
Step S209 monitors whether to receive purchase or delivery operation that user is used as target, if receiving use
Purchase or delivery operation of the family to targeted seat, enter step S209, otherwise, enter step S211.
Step S210 jumps the purchase for showing corresponding targeted seat or the payment page.
Step S211, judges whether the time at lock onto target seat is greater than seat locking time, if so, entering step
Otherwise S212 goes back to step S209.
Step S212 cancels the locking to targeted seat.
Based on the resource lock method in this example, seat can be set for the behavior expression preferable user of seat purchase
Position locked authority can be to the seat of user's selection admired when buying the seat of more popular performance project in this kind of user
Position is locked in advance, is avoided by other users simultaneous selection, bring flow attack and user when seat selection being avoided to conflict
The treatment effeciency bad, raising resource uses is experienced, the resource usage experience of user is promoted.Meanwhile it can be to avoid malicious user
Seat is locked, avoids purchase seat from occurring abnormal, promotes the availability of ticket service.
<device>
In the present embodiment, a kind of resource lock device 3000 is also provided, as shown in Figure 5, comprising: interface providing unit
3100, permission determination unit 3200 and resource lock unit 3300, any one money for implementing to provide in the present embodiment
Source locking means, details are not described herein.
The resource lock device 3000, comprising:
Interface providing unit 3100, for providing resource selection interface, corresponding target resource for selection by the user.
Permission determination unit 3200, for when the selection operation by resource selection interface reception to target resource
When, determine whether the user for implementing selection operation has resource lock permission.
In one example, which is also used to:
The resource for obtaining the user uses scoring;
When the resource of the user is greater than preset scoring threshold value using scoring, the user is set with resource lock
Permission.
Optionally, in the above example, which is also used to:
The resource for obtaining the user uses data;
Data are used according to the resource of the user, the resource for calculating the user uses scoring.
Optionally, in the above example, the resource of the user using data include at least user resource browsing data,
Resource accesses data, resource history uses data and user behavior data;
The permission determination unit 3200 is also used to:
Data and the user are used to resource browsing data, resource access data, the resource history
Behavioral data is summed after being handled respectively using corresponding preset weight factor, is obtained the corresponding resource use and is commented
Point.
Optionally, in the above example,
The resource browsing data include at least whether user browsed the target resource, user browses the target money
One of both frequencies in source;
The resource access data include at least whether user subscribes to the target resource, whether user provides the target
Whether the network access path that source access using registration, user the target resource is normal, user's access target provides
Whether the network address in source changes one of this;
Whether the resource history is included at least user and used using data belongs to same type with the target resource
One of both distribution situations of resource that resource, user have used;
The user behavior data includes at least whether user uses real-name authentication account, user whether by abnormal account
Whether selection target resource, user behavior belong to machine behavior, whether user behavior exists actually with the target resource is used
It is associated with one of this.
Optionally, in the above example, the resource lock device 3000, is also used to:
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding
The resource uses scoring.
Optionally, in the above example, the resource lock device 3000, is also used to:
When the user prescribes a time limit with resources use right, according to the corresponding resource of the resource of user use scoring setting
Locking time;
After locking the target resource, within the corresponding resource lock time, the user is not received to described
When the use operation of target resource, cancel the locking of the target resource.
Resource lock unit 3300, for locking corresponding target resource when the user has resource lock permission.
Optionally, the resource lock device 3000, is also used to:
After locking the target resource, within the corresponding resource lock time, the user is not received to described
When the use operation of target resource, cancel the locking of the target resource;
And/or
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding
The resources use right limit.
It will be appreciated by those skilled in the art that resource lock device 3000 can be realized by various modes.For example, can
To realize resource lock device 3000 by instruction configuration processor.For example, instruction can be stored in the ROM, and work as
When starting device, instruction is read in programming device from ROM and realizes resource lock device 3000.For example, can will provide
Source locking device 3000 is cured in dedicated devices (such as ASIC).Resource lock device 3000 can be divided into mutually independent
Unit, or they can be merged to realization.Resource lock device 3000 can be by above-mentioned various implementations
One kind realize, or can be realized by the combination of two or more modes in above-mentioned various implementations.
<electronic equipment>
In the present embodiment, a kind of electronic equipment 4000 is also provided, as shown in Figure 6, comprising:
Display device 4100, for showing human-computer interaction interface;
Memory 4200, for storing executable instruction;
Processor 4300 runs the electronic equipment 4000 and executes this reality for the control according to the executable instruction
Any one resource lock method provided in example is provided.
In the present embodiment, which can be mobile phone, tablet computer, desktop computer, laptop
Deng the electronic equipment with display device.For example, electronic equipment 1000 that can be as shown in Figure 1.
In another example electronic equipment 4000, which can be, is equipped with ticketing service application software when resource is the seat of performance project
Mobile phone is implemented the resource lock method provided in the present embodiment by running corresponding ticketing service application software, is not arranged one by one herein
It lifts.
Attached drawing is had been combined above and example describes the embodiment of the present invention, according to the present embodiment, provides a kind of resource
Locking means, device and electronic equipment meet the target resource of demand by providing the selection of resource selection interface for users, with
After the selection target resource of family, when determining that user has resource lock permission, the target resource that it is selected is locked, so that its
His user is not available the target resource, enables the user that can preferentially carry out to the target resource relevant using operating, avoids
Resource use occurs with other users to conflict, resource is avoided to come using user's reverse cyclic loadings resource selection interface zone in conflict process
Flow attack and user experience it is bad, improve the treatment effeciency that uses of resource, promote the resource usage experience of user.Meanwhile
Resource can be locked to avoid malicious user, avoid resource abnormal using occurring, promote service availability.
The present invention can be system, method and/or computer program product.Computer program product may include computer
Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment
Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage
Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium
More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits
It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable
Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon
It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above
Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to
It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire
Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/
Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network
Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway
Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted
Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment
In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs,
Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages
The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as
Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer
Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one
Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part
Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind
It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit
It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions
Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can
Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the invention
Face.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/
Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/
Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas
The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas
When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced
The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to
It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction
Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram
The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other
In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce
Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment
Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
One module of table, program segment or a part of instruction, the module, program segment or a part of instruction include one or more use
The executable instruction of the logic function as defined in realizing.In some implementations as replacements, function marked in the box
It can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be held substantially in parallel
Row, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or
The combination of each box in flow chart and the box in block diagram and or flow chart, can the function as defined in executing or dynamic
The dedicated hardware based system made is realized, or can be realized using a combination of dedicated hardware and computer instructions.It is right
For those skilled in the art it is well known that, by hardware mode realize, by software mode realize and pass through software and
It is all of equal value that the mode of combination of hardware, which is realized,.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and
It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill
Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport
In principle, the practical application or to the technological improvement in market for best explaining each embodiment, or make the art its
Its those of ordinary skill can understand each embodiment disclosed herein.The scope of the present invention is defined by the appended claims.
Claims (10)
1. a kind of resource lock method, wherein include:
Resource selection interface is provided, for selection by the user target resource;
When receiving selection operation of the user to target resource by the resource selection interface, determine whether corresponding user has
There is resource lock permission;
When the user has resource lock permission, the target resource is locked, so that the target resource cannot be by it
His user uses.
2. according to the method described in claim 1, wherein, whether the determination user has the step of resource lock permission
Include:
The resource for obtaining the user uses scoring;
When the resource of the user is greater than preset scoring threshold value using scoring, the user is set and is weighed with resource lock
Limit.
3. according to the method described in claim 2, wherein, the resource for obtaining the user includes: using the step of scoring
The resource for obtaining the user uses data;
Data are used according to the resource of the user, the resource for calculating the user uses scoring.
4. according to the method described in claim 3, wherein,
The resource of the user is made using the resource browsing data, resource access data, resource history that data include at least user
With data and user behavior data;
It is described calculate user resource using scoring step include:
Data and the user behavior are used to resource browsing data, resource access data, the resource history
Data are summed after being handled respectively using corresponding preset weight factor, are obtained the corresponding resource and are used scoring.
5. according to the method described in claim 4, wherein,
The resource browsing data include at least whether user browsed the target resource, user browses the target resource
One of both frequencies;
Resource access data include at least user whether subscribe to the target resource, user whether to the target resource into
Exercise registration, user access the target resource network access path whether normally, user access the target resource
Whether network address changes one of this;
The resource history using data include at least user whether used with the target resource belong to same type resource,
One of both distribution situations of resource that user has used;
The user behavior data includes at least whether user uses whether real-name authentication account, user are selected by abnormal account
Target resource, user behavior whether belong to machine behavior, user behavior whether with the target resource is used there are actual associations
One of this.
6. according to the method described in claim 2, wherein, further includes:
When the user prescribes a time limit with resources use right, according to the corresponding resource lock of the resource of user use scoring setting
Time;
After locking the target resource, within the corresponding resource lock time, the user is not received to the target
When the use operation of resource, cancel the locking of the target resource.
7. according to the method described in claim 2, wherein, further includes:
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding described
Resource uses scoring.
8. according to the method described in claim 1, wherein, further includes:
After locking the target resource, within the corresponding resource lock time, the user is not received to the target
When the use operation of resource, cancel the locking of the target resource;
And/or
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding described
Resources use right limit.
9. a kind of resource lock device, wherein include:
Interface providing unit, for providing resource selection interface, corresponding target resource for selection by the user;
Permission determination unit, for determining real when receiving the selection operation to target resource by the resource selection interface
Whether the user for applying selection operation has resource lock permission;
Resource lock unit, for locking corresponding target resource when the user has resource lock permission.
10. a kind of electronic equipment, wherein include:
Display device, for showing human-computer interaction interface;
Memory, for storing executable instruction;
Processor runs the electronic equipment and executes as described in claim 1-8 for the control according to the executable instruction
Any one resource lock method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810169089.2A CN110213169A (en) | 2018-02-28 | 2018-02-28 | Resource lock method, apparatus and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810169089.2A CN110213169A (en) | 2018-02-28 | 2018-02-28 | Resource lock method, apparatus and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110213169A true CN110213169A (en) | 2019-09-06 |
Family
ID=67778712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810169089.2A Withdrawn CN110213169A (en) | 2018-02-28 | 2018-02-28 | Resource lock method, apparatus and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110213169A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3032418A1 (en) * | 2013-09-27 | 2016-06-15 | Huawei Device Co., Ltd. | Permission control method and device |
CN106408096A (en) * | 2015-07-30 | 2017-02-15 | 腾讯科技(深圳)有限公司 | Data processing method in online ticketing system and online ticketing system |
CN106453357A (en) * | 2016-11-01 | 2017-02-22 | 北京红马传媒文化发展有限公司 | Network ticket buying abnormal behavior recognition method and system and equipment |
-
2018
- 2018-02-28 CN CN201810169089.2A patent/CN110213169A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3032418A1 (en) * | 2013-09-27 | 2016-06-15 | Huawei Device Co., Ltd. | Permission control method and device |
CN106408096A (en) * | 2015-07-30 | 2017-02-15 | 腾讯科技(深圳)有限公司 | Data processing method in online ticketing system and online ticketing system |
CN106453357A (en) * | 2016-11-01 | 2017-02-22 | 北京红马传媒文化发展有限公司 | Network ticket buying abnormal behavior recognition method and system and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240029071A1 (en) | Index of usability for a replacement payment card | |
US10938823B2 (en) | Authenticating a request for an electronic transaction | |
AU2018298059A1 (en) | Data reconciliation based on computer analysis of data | |
BR112016017972B1 (en) | METHOD FOR MODIFICATION OF COMMUNICATION FLOW | |
US20160057019A1 (en) | Integrated cloud data center management | |
US10044837B2 (en) | Generation and distribution of named, definable, serialized tokens | |
US20190318219A1 (en) | Personalized artificial intelligence interactions and customized responses of a computer system | |
CN109213486A (en) | Method and apparatus for generating customized visualization component | |
US20160267411A1 (en) | Creating sustainable innovation platforms based on service first and service now approach | |
CN116783868A (en) | Limiting scope in token-based authorization systems | |
CN108259547A (en) | Information push method, equipment and programmable device | |
US20180018656A1 (en) | Dispensing payment cards via a vending facility | |
CN110322029A (en) | Resource recommendation method, device and electronic equipment | |
US20170168870A1 (en) | Task status tracking and update system | |
CN110213169A (en) | Resource lock method, apparatus and electronic equipment | |
US20190385251A1 (en) | Cognitive alternate vacation booking | |
US9455879B1 (en) | Validating changes to attributes for computing resources | |
KR102276230B1 (en) | Method for generating finite state machine, method for operating finite state machine, server and computer program for performing the same | |
US11640421B2 (en) | Coverage analysis with event clustering | |
CN105493065B (en) | Subscriber's option is provided | |
CN107615242A (en) | Obtained for the user via bid of connection equipment application installation | |
US11558337B1 (en) | Activity-based message management | |
CN114341918B (en) | Peer-to-peer authentication of unauthorized transactions | |
US10771414B2 (en) | Authentication in messaging platforms for web content | |
US20230394135A1 (en) | Automatic compliant password generation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190906 |
|
WW01 | Invention patent application withdrawn after publication |