CN110213169A - Resource lock method, apparatus and electronic equipment - Google Patents

Resource lock method, apparatus and electronic equipment Download PDF

Info

Publication number
CN110213169A
CN110213169A CN201810169089.2A CN201810169089A CN110213169A CN 110213169 A CN110213169 A CN 110213169A CN 201810169089 A CN201810169089 A CN 201810169089A CN 110213169 A CN110213169 A CN 110213169A
Authority
CN
China
Prior art keywords
resource
user
target
data
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810169089.2A
Other languages
Chinese (zh)
Inventor
王冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD
Original Assignee
BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD filed Critical BEIJING HONGMA MEDIA CULTURE DEVELOPMENT CO LTD
Priority to CN201810169089.2A priority Critical patent/CN110213169A/en
Publication of CN110213169A publication Critical patent/CN110213169A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • G06Q30/0637Approvals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Abstract

The invention discloses a kind of resource lock method, apparatus and electronic equipments.This method comprises: providing resource selection interface, for selection by the user target resource;When receiving selection operation of the user to target resource by the resource selection interface, determine whether corresponding user has resource lock permission;When the user has resource lock permission, the target resource is locked, so that the target resource cannot be used by other users.According to the present invention, the efficiency that resource uses is improved, the resource usage experience of user is promoted.Meanwhile the resource lock of malice is avoided, it promotes resource and uses the availability of service.

Description

Resource lock method, apparatus and electronic equipment
Technical field
The present invention relates to field of computer technology, set more particularly, to a kind of resource lock method, apparatus and electronics It is standby.
Background technique
With the rapid development of computer technology, by network online booking perform seat, film seat, restaurant seat, The mode of the resources such as itinerary, it is greatly convenient for people's lives.For example, for performing project, Most current performs project all Seat selection can be provided the user in such a way that some network applications (such as APP) are by line selection seat.But often perform project When comparing popular, different user probably conflicts to the selection at seat, causes user clash will be to seat It is chosen over, submitted repeatedly, the experience on the one hand bringing interactive operation repeatedly to make user is very bad, on the other hand also leads It causes corresponding network application constantly to load seating maps to be selected in for user, very big flow attack is brought to corresponding system.
In view of the above-mentioned problems, the current network application provided in line selection seat service, mainly uses two kinds of settling modes:
One is when the seat clicked in seating maps in user, relevant background module is called to verify the seat selected Whether locked due to placing an order for other users, if be not locked out, order can be popped up fill in page and be filled in for user, submit and order It is single, actual lock just is carried out to seat when submitting order;Although selecting between alleviating user to a certain extent in this way seat Conflict, but the probability clashed when high flow capacity selects seat is also very high, still there is 90% or more in real process from the point of view of data User's selection can clash;And once select to clash, choosing seat again and lower single process will be triggered, still may be used also There can be conflict with other user's selections, also, to reload seating maps in gravity treatment seat process, flow pressure is also into Increase again, therefore, the user experience and stability of the program are not so good;
Another kind directly removes lock when being the seat in user's click seating maps, but the problem is that if it is malice User and control is improper may continuously attempt to lock, will ultimately result in normal users can not lock, it is final to influence whole clothes Business availability.
Summary of the invention
It is an object of the present invention to provide a kind of new solutions for lock resource.
According to the first aspect of the invention, a kind of resource lock method is provided, wherein include:
Resource selection interface is provided, for selection by the user target resource;
When receiving selection operation of the user to target resource by the resource selection interface, determine that corresponding user is It is no that there is resource lock permission;
When the user has resource lock permission, the target resource is locked, so that the target resource cannot It is used by other users.
Optionally, the step of whether determination user has resource lock permission include:
The resource for obtaining the user uses scoring;
When the resource of the user is greater than preset scoring threshold value using scoring, the user is set with resource lock Permission.
Optionally, the resource for obtaining the user includes: using the step of scoring
The resource for obtaining the user uses data;
Data are used according to the resource of the user, the resource for calculating the user uses scoring.
Optionally, the resource of the user using data include at least user resource browsing data, resource access data, Resource history uses data and user behavior data;
It is described calculate user resource using scoring step include:
Data and the user are used to resource browsing data, resource access data, the resource history Behavioral data is summed after being handled respectively using corresponding preset weight factor, is obtained the corresponding resource use and is commented Point.
Optionally,
The resource browsing data include at least whether user browsed the target resource, user browses the target money One of both frequencies in source;
The resource access data include at least whether user subscribes to the target resource, whether user provides the target Whether the network access path that source access using registration, user the target resource is normal, user's access target provides Whether the network address in source changes one of this;
Whether the resource history is included at least user and used using data belongs to same type with the target resource One of both distribution situations of resource that resource, user have used;
The user behavior data includes at least whether user uses real-name authentication account, user whether by abnormal account Whether selection target resource, user behavior belong to machine behavior, whether user behavior exists actually with the target resource is used It is associated with one of this.
Optionally, the resource lock method further include:
When the user prescribes a time limit with resources use right, according to the corresponding resource of the resource of user use scoring setting Locking time;
After locking the target resource, within the corresponding resource lock time, the user is not received to described When the use operation of target resource, cancel the locking of the target resource.
Optionally, the resource lock method further include:
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding The resource uses scoring.
Optionally, the method also includes:
After locking the target resource, within the corresponding resource lock time, the user is not received to described When the use operation of target resource, cancel the locking of the target resource;
And/or
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding The resources use right limit.
According to the second aspect of the invention, a kind of resource lock device is provided, comprising:
Interface providing unit, for providing resource selection interface, corresponding target resource for selection by the user;
Permission determination unit, for when being received by the resource selection interface to the selection operation of target resource, really Whether the user for implementing selection operation surely has resource lock permission;
Resource lock unit, for locking corresponding target resource when the user has resource lock permission.
According to the third aspect of the invention we, a kind of electronic equipment is provided, comprising:
Display device, for showing human-computer interaction interface;
Memory, for storing executable instruction;
Processor runs the electronic equipment and executes such as of the invention for the control according to the executable instruction Any one resource lock method described in one side.
According to one embodiment of the disclosure, the target for meeting demand by providing the selection of resource selection interface for users Resource when determining that user has resource lock permission, locks the target resource that it is selected after user's selection target resource It is fixed, so that other users are not available the target resource, the user is enabled preferentially can to carry out relevant use to the target resource Operation is avoided conflicting with other users generation resource use, resource is avoided to be selected using user's reverse cyclic loadings resource in conflict process It selects interface bring flow attack and user experience is bad, improve the treatment effeciency that resource uses, the resource for promoting user uses Experience.Meanwhile resource can be locked to avoid malicious user, it avoids resource abnormal using occurring, promotes service availability.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its Advantage will become apparent.
Detailed description of the invention
It is combined in the description and the attached drawing for constituting part of specification shows the embodiment of the present invention, and even With its explanation together principle for explaining the present invention.
Fig. 1 is the block diagram for showing the example of hardware configuration for the electronic equipment that can be used for realizing the embodiment of the present invention.
Fig. 2 shows the flow charts of the resource lock method of the embodiment of the present invention.
Fig. 3 shows the another flow chart of the resource lock method of the embodiment of the present invention.
Fig. 4 is the schematic diagram of the example of the resource lock method of the embodiment of the present invention.
Fig. 5 shows the block diagram of the resource lock device of the resource lock method of the embodiment of the present invention.
Fig. 6 shows the block diagram of the electronic equipment of the resource lock method of the embodiment of the present invention.
Specific embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should also be noted that unless in addition having Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The range of invention.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the present invention And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
<hardware configuration>
Fig. 1 is the block diagram for showing the hardware configuration for the electronic equipment 1000 that the embodiment of the present invention may be implemented.
Electronic equipment 1000 can be portable computer, desktop computer, mobile phone, tablet computer etc..As shown in Figure 1, electric Sub- equipment 1000 may include processor 1100, memory 1200, interface arrangement 1300, communication device 1400, display device 1500, input unit 1600, loudspeaker 1700, microphone 1800 etc..Wherein, processor 1100 can be central processing unit CPU, Micro-processor MCV etc..Memory 1200 is for example including ROM (read-only memory), RAM (random access memory), such as The nonvolatile memory etc. of hard disk.Interface arrangement 1300 is for example including USB interface, earphone interface etc..Communication device 1400 It is such as able to carry out wired or wireless communication, specifically may include Wifi communication, Bluetooth communication, 2G/3G/4G/5G communication etc..It is aobvious Showing device 1500 is, for example, liquid crystal display, touch display screen etc..Input unit 1600 for example may include touch screen, keyboard, Body-sensing input etc..User can pass through 1800 inputting/outputting voice information of loudspeaker 1700 and microphone.
Electronic equipment shown in FIG. 1 is merely illustrative and is in no way intended to the invention, its application, or uses Any restrictions.Using in an embodiment of the present invention, the memory 1200 of electronic equipment 1000 is for storing instruction, described Instruction is operated for controlling the processor 1100 to execute any one resource lock side provided in an embodiment of the present invention Method.It will be appreciated by those skilled in the art that although showing multiple devices to electronic equipment 1000 in Fig. 1, the present invention Partial devices therein can be only related to, for example, electronic equipment 1000 pertains only to processor 1100 and storage device 1200.Technology Personnel can disclosed conceptual design instruction according to the present invention.How control processor is operated for instruction, this is this field public affairs Know, therefore is not described in detail herein.
<embodiment>
<method>
In the present embodiment, a kind of resource lock method is provided, which was that network is supplied to user's selection progress in advance Fixed application resource can be provided by resource provider by corresponding network application (such as APP).The resource may include drilling The auditorium seat of the performance project such as meeting, musical drama, modern drama, film is sung, can also include the traffic works such as aircraft, train, automobile Travelling resource such as the passenger-seat of tool or hotel room etc..
The resource lock method provided in the present embodiment, as shown in Figure 2, comprising: step S2100-S2300.
Step S2100 provides resource selection interface, for selection by the user target resource.
In the present embodiment, the resource selection interface is to interact acquisition by the operations such as clicking, choosing for user The human-computer interaction interface of corresponding application service.The resource selection interface can show multiple moneys for making a reservation for or using for user Source the selection operations such as clicks, chooses by implementing by user, and selection selection meets the target money of its demand from multiple resources Source.
For example, the resource can be the spectators seat of performance project, which is exactly corresponding seat selection The page can show all alternative spectators by providing the application rollouts of the services such as predetermined, purchase performance project Seat meets the corresponding spectators seat of self-demand, that is, target resource for selection by the user.
Step S2200 is determined corresponding when receiving selection operation of the user to target resource by resource selection interface Whether user has resource lock permission.
In the present embodiment, user can provided by implementing such as to click to resource selection interface, choosing selection operation Multiple resource selections that source selection interface is shown meet the target resource of its demand.
When resource selection interface receives the selection operation that user implements some resource, it can determine that user implements selection operation Resource be user selection target resource, determine user whether have resource lock permission,
Resource lock permission is locked out the permission of corresponding target resource.When user has resource lock permission, when its choosing When selecting corresponding target resource, which will be locked, and be set as to be used by other users.
In the present embodiment, the step of whether above-mentioned determination user has resource lock permission may include: S2210- S2220。
Step S2210, the resource for obtaining the user use scoring.
In the present embodiment, resource is assessment score of the corresponding user of characterization using resource situation using scoring.The money Source can be preset using the historical data of resource according to user and be stored local for acquisition using scoring;Alternatively, It can be stored after calculating in real time local for acquisition according to user using the variation of resource situation.
In one example, the resource of the above-mentioned acquisition user includes: step S2211-S2212 using the step of scoring.
Step S2211, the resource for obtaining the user use data.
In this example, resource is relevant data the case where using resource to user using data.
In one example, the resource of user browses data, resource access number using the resource that data include at least user Data and user behavior data are used according to, resource history.
Resource browsing data are historical datas relevant to user's browsing resource situation.
In one example, resource browsing data include at least whether user browsed the target resource, user's browsing One of both frequencies of the target resource.For example, resource browses data extremely when resource is the seat of some performance project The performance project whether was browsed including user less and user browses the frequency of the performance project.
It is historical data relevant to user access resources situation that resource, which accesses data,.
In one example, resource access data include at least user whether subscribe to the target resource, user right Whether the network access path that the target resource access using registration, user the target resource is normal, user accesses the mesh Whether the network address of mark resource changes one of this.For example, resource is visited when resource is the seat of some performance project Ask that data include whether user has subscribed the performance project, whether user carries out purchase registration to the performance project, user accesses The network access path of the performance project (for example is not just directly entered seat by project details page and selects page with the presence or absence of abnormal Face), whether IP address changes in the network access path of user.
Resource history is corresponding target resource by the relevant historical data of service condition using data.
In one example, resource, the user for belonging to same type with the target resource whether were used including at least user One of both resource distributions using other resources.For example, when resource is the seat of some performance project, resource history It the use of data include that whether user once bought similar performance project, user buys the region point of similar performance project Cloth.
User behavior data is the historical data that user is the corelation behaviour implemented using resource.
In one example, the user behavior data include at least user whether use real-name authentication account, user whether Whether belong to machine behavior, that whether user exists with the target resource is real by abnormal account selection target resource, user behavior Border is associated with one of this.For example, user behavior data includes: that user uses when resource is the seat of some performance project Whether the account in the seat for buying the performance project passes through real-name authentication;The seat that user is used to buy the performance project is made Whether account is small size (for example, using the usually non-real real user of account that network mobile phone card is registered, belonging to trumpet); Whether the user behaviors such as registration, login, purchase, the payment of user belong to machine behavior;User buys the seat of the performance project The address of mailing seat bill whether belong to true address;With performance the distance between project location location whether it is default away from From in threshold value etc..The address of seat bill is posted if not true address or posts the address of seat bill apart from performance item Mesh farther out when, it can be determined that actual association is not present in the seat ticket (use target resource) of user behavior and purchase performance project.
In the present embodiment, the resource of above-mentioned user uses data, can use the application journey of service by providing resource Sequence is stored in local for acquisition when resource behavior occurs for user by log recording.For example, resource is performance project When seat, the client of the application program of seat booking service can be to provide, record user buys seat using the client Behavioral data and be stored in being locally stored of client device.The record can exist by log form, pass through statistics The available corresponding user behavior data of the log.By taking " frequency of user's browsing objective resource " as an example, remembered by client It employs the browsing behavior that family occurs in a predetermined period (such as in one day), is formed during log is stored in and is locally stored, and The post analysis log, statistics obtain the frequency of user's browsing objective resource, and similarly, other data can also pass through the above method It obtains, no longer enumerated here.
Step S2212 uses data according to the resource of the user, and the resource for calculating the user uses scoring.
The resource of user is calculated based on the resource using data using the resource service condition of data reflection user Resource can be used for assessing the resource usage behavior of user using scoring.
In one example, the resource of the user is accessed using resource browsing data, the resource that data include at least user Data, resource history use data and user behavior data, and the resource of above-mentioned calculating user includes: using scoring step
Data and user behavior data are used to resource browsing data, resource access data, resource history, used respectively Corresponding preset weight factor is summed after being handled, and is obtained the corresponding resource and is used scoring.
For example, it is assumed that resource browsing data include that whether user browsed the resource, user browses the frequency of the resource;With Whether family, which browsed the resource, is assumed that value is W, when user browsed the resource, W 1, otherwise, and W 0, corresponding weight The factor is a1;It is n times in each measurement period that the frequency that user browses the resource, which is assumed to be, and corresponding weight factor is a2;It is right Ying Di is W*a1+N*a2 using the result that weight factor process resource browser data obtains.
Data and user behavior data are used using corresponding weight factor process resource access data, resource history Step is also similar, numerous to list herein.
Data are being used to resource browsing data, resource access data, resource history using corresponding weight factor respectively And after user behavior data processing, obtained result is summed, uses scoring as corresponding resource.
The weight factor can be set according to specific application scenarios or application demand for different data in advance It sets, no longer citing repeats herein.
Step S2220, when the resource of the user is greater than preset scoring threshold value using scoring, the user, which is arranged, has money Source locked authority.
Resource can be used for assessing the resource usage behavior of corresponding user using scoring.
In the present embodiment, the resource of user is higher using scoring, it is meant that the resource usage behavior performance of user is better.
By preset scoring threshold value, the user with the performance of good resource usage behavior can be filtered out.The scoring Threshold value is that have good resource using the corresponding resource of user of performance using scoring, can be according to specific application demand Or application scenarios setting.For example, it is 0-100, corresponding scoring that the resource that user can be set, which uses the fraction range of scoring, Threshold value is set as 60 points, and user of the resource using scoring greater than 60 points has resource lock permission.
To the user with good resource service condition, setting has resource lock permission, this part can be made to use Family locks the target resource of selection, more preferential than other users to use the target resource, avoids providing with other users Source is avoided resource using user's reverse cyclic loadings resource selection interface bring flow attack in conflict process, is improved using conflict The treatment effeciency that resource uses promotes the resource usage experience of user.Meanwhile resource can be locked to avoid malicious user It is fixed, it avoids resource abnormal using occurring, promotes service availability.
Step S2300 locks the target resource, so that the target resource when the user has resource lock permission It cannot be used by other users.
In the present embodiment, target resource is locked, can be modified by the state to target resource, is arranged The target resource is invisible to other users or does not allow to operate, so that other users are not available the target resource.
For example, when target resource is the seat of some performance project, it can be in resource selection circle provided other users Do not shown in face the seat perhaps the seat is set as not allowing to select prevent the seat from by other users selection or Purchase.
In the present embodiment, whether there is resource lock permission for user setting, for resource lock permission User locks the target resource that it is selected, so that other users are not available the target resource, enables the user excellent Relevant use first is carried out to the target resource to operate, and avoids conflicting with other users generation resource use, resource is avoided to use User's reverse cyclic loadings resource selection interface bring flow attack and user experience are bad in conflict process, improve what resource used Treatment effeciency promotes the resource usage experience of user.Meanwhile resource can be locked to avoid malicious user, avoid resource It is abnormal using occurring, promote service availability.
In application scenes, based on above-mentioned steps be user's lock onto target resource with resource lock permission after, The user may not carry out target resource further to cause locked target to provide using operation due to various reasons Source is vacant to be used, and resource utilization is influenced.Therefore, in one example, the resource lock method provided, such as Fig. 3 It is shown, further includes:
Step S2400 within the corresponding resource lock time, does not receive user to mesh after lock onto target resource When marking the use operation of resource, cancel the locking of the target resource.
It should be understood that the use operation of target resource is corresponding with according to the resource type of target resource.For example, target When resource is the seat of some performance project, the use operation of target resource includes purchase operation, delivery operation to the seat Deng.
Is arranged to the target resource of locking, within the resource lock time, if user does not use mesh the resource lock time Resource is marked, then cancels the locking to target resource and avoids target resource from being grown so that the target resource can be used in other users Phase occupies, and improves resource utilization.
In the present embodiment, the resource lock time can be arranged according to specific application scenarios or application demand.
In one example, the resource lock time can be showed according to the resource usage behavior of user to be arranged, and user makes It is better with the behavior expression of resource, the resource lock time can be set it is longer, to embody corresponding user's use priority, promoted User uses the experience of resource, and guidance user more reasonably uses resource.The resource lock method of offer in this, is also wrapped It includes: step S2410-S2420.
Step S2410, when the user prescribes a time limit with resources use right, according to the resource of user use scoring setting correspondence The resource lock time.
For example, being 60 points in the case of above-mentioned resource scoring threshold value, user of the resource using scoring greater than 60 points has resource Accordingly the resource lock time can be arranged using the score value of scoring with the resource, for example, resource uses scoring in locked authority It is 70 timesharing, the corresponding resource lock time is 70 seconds, and resource is 80 timesharing using scoring, and the corresponding resource lock time is 80 Second, etc..
Step S2420 within the corresponding resource lock time, does not receive the user after locking the target resource When operating to the use of target resource, cancel the locking of target resource.
In practical applications, the performance of the resource usage behavior of user might not be consistent, can be with the time Passage changes, therefore, if the resource lock permission non-respective needle being correspondingly arranged shows the resource usage behavior of user It is updated, the setting of resource lock permission can be made deviation occur, influence the treatment effeciency that resource uses.
In one example, the resource lock method provided in the present embodiment, can be as shown in Figure 3, comprising:
Step S2500, according to this user to the service condition of target resource, is updated and is corresponded to after lock onto target resource The resources use right limit.
It should be understood that service condition of the user to target resource, corresponding with the resource type of target resource.For example, When target resource is the seat of certain performance project, the service condition of target resource may include that user carries out purchase behaviour to the seat Make, whether delivery operation, the duration that seat is locked etc. carried out to the seat.
According to this user to the service condition of target resource, the resources use right limit of corresponding user is updated, so that money Source access right shows variation based on usage behavior of the user to target resource, improves the treatment effeciency that resource uses.For example, mesh When mark resource is the seat of certain performance project, the locked duration in the seat is more than after preset time thresholding, and there are no right by user The seat is bought or is paid, then the user can be set without resource lock permission.
By taking the above-mentioned use scoring setting user resources locked authority according to resource as an example, step S2500 may include:
After lock onto target resource, according to this user to the service condition of target resource, updates corresponding resource and use Scoring.
The service condition of the target resource may include that the resource in above-mentioned example such as uses data, use in more new resources After data, it can recalculate resource according to the resource that above-mentioned example is enumerated using the calculation method of scoring and be carried out using scoring It updates, details are not described herein.
<example>
Below with reference to Fig. 4, the resource lock method provided in the present embodiment is further illustrated.
In this example, it is the seat of some popular performance project for the resource of locking, is installed on mobile phone by corresponding On the APP of offer ticket service corresponding seat selection interface is provided.
The resource lock method, as shown in Figure 4, comprising: step S201-S212.
Step S201 provides seat selection interface, and the targeted seat of expectation purchase is selected for user.
Step S202 receives user in seat selection interface and chooses operation to targeted seat.
Step S203, determines whether the targeted seat allows to lock, if the targeted seat is locked by other users in advance It is fixed, then do not allow to lock, enter step S204, otherwise, enters step S205.
Step S204 prompts user's targeted seat not allow to lock, separately selects other seats.
In this example, targeted seat may be in the state for being locked or being bought by other users, not allow to be locked again It is fixed.
Step S205 determines that user chooses targeted seat.
Step S206, determines whether user has resource lock permission, if user does not have resource lock permission, enters Otherwise step S207 enters step S208.
Determine user whether have the step of resource lock permission in abovementioned steps S2200 specifically away from for example, Details are not described herein.
Step S207 does not execute lock operation to targeted seat.
Step S208, user have resource lock permission, lock corresponding targeted seat.
Step S209 monitors whether to receive purchase or delivery operation that user is used as target, if receiving use Purchase or delivery operation of the family to targeted seat, enter step S209, otherwise, enter step S211.
Step S210 jumps the purchase for showing corresponding targeted seat or the payment page.
Step S211, judges whether the time at lock onto target seat is greater than seat locking time, if so, entering step Otherwise S212 goes back to step S209.
Step S212 cancels the locking to targeted seat.
Based on the resource lock method in this example, seat can be set for the behavior expression preferable user of seat purchase Position locked authority can be to the seat of user's selection admired when buying the seat of more popular performance project in this kind of user Position is locked in advance, is avoided by other users simultaneous selection, bring flow attack and user when seat selection being avoided to conflict The treatment effeciency bad, raising resource uses is experienced, the resource usage experience of user is promoted.Meanwhile it can be to avoid malicious user Seat is locked, avoids purchase seat from occurring abnormal, promotes the availability of ticket service.
<device>
In the present embodiment, a kind of resource lock device 3000 is also provided, as shown in Figure 5, comprising: interface providing unit 3100, permission determination unit 3200 and resource lock unit 3300, any one money for implementing to provide in the present embodiment Source locking means, details are not described herein.
The resource lock device 3000, comprising:
Interface providing unit 3100, for providing resource selection interface, corresponding target resource for selection by the user.
Permission determination unit 3200, for when the selection operation by resource selection interface reception to target resource When, determine whether the user for implementing selection operation has resource lock permission.
In one example, which is also used to:
The resource for obtaining the user uses scoring;
When the resource of the user is greater than preset scoring threshold value using scoring, the user is set with resource lock Permission.
Optionally, in the above example, which is also used to:
The resource for obtaining the user uses data;
Data are used according to the resource of the user, the resource for calculating the user uses scoring.
Optionally, in the above example, the resource of the user using data include at least user resource browsing data, Resource accesses data, resource history uses data and user behavior data;
The permission determination unit 3200 is also used to:
Data and the user are used to resource browsing data, resource access data, the resource history Behavioral data is summed after being handled respectively using corresponding preset weight factor, is obtained the corresponding resource use and is commented Point.
Optionally, in the above example,
The resource browsing data include at least whether user browsed the target resource, user browses the target money One of both frequencies in source;
The resource access data include at least whether user subscribes to the target resource, whether user provides the target Whether the network access path that source access using registration, user the target resource is normal, user's access target provides Whether the network address in source changes one of this;
Whether the resource history is included at least user and used using data belongs to same type with the target resource One of both distribution situations of resource that resource, user have used;
The user behavior data includes at least whether user uses real-name authentication account, user whether by abnormal account Whether selection target resource, user behavior belong to machine behavior, whether user behavior exists actually with the target resource is used It is associated with one of this.
Optionally, in the above example, the resource lock device 3000, is also used to:
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding The resource uses scoring.
Optionally, in the above example, the resource lock device 3000, is also used to:
When the user prescribes a time limit with resources use right, according to the corresponding resource of the resource of user use scoring setting Locking time;
After locking the target resource, within the corresponding resource lock time, the user is not received to described When the use operation of target resource, cancel the locking of the target resource.
Resource lock unit 3300, for locking corresponding target resource when the user has resource lock permission.
Optionally, the resource lock device 3000, is also used to:
After locking the target resource, within the corresponding resource lock time, the user is not received to described When the use operation of target resource, cancel the locking of the target resource;
And/or
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding The resources use right limit.
It will be appreciated by those skilled in the art that resource lock device 3000 can be realized by various modes.For example, can To realize resource lock device 3000 by instruction configuration processor.For example, instruction can be stored in the ROM, and work as When starting device, instruction is read in programming device from ROM and realizes resource lock device 3000.For example, can will provide Source locking device 3000 is cured in dedicated devices (such as ASIC).Resource lock device 3000 can be divided into mutually independent Unit, or they can be merged to realization.Resource lock device 3000 can be by above-mentioned various implementations One kind realize, or can be realized by the combination of two or more modes in above-mentioned various implementations.
<electronic equipment>
In the present embodiment, a kind of electronic equipment 4000 is also provided, as shown in Figure 6, comprising:
Display device 4100, for showing human-computer interaction interface;
Memory 4200, for storing executable instruction;
Processor 4300 runs the electronic equipment 4000 and executes this reality for the control according to the executable instruction Any one resource lock method provided in example is provided.
In the present embodiment, which can be mobile phone, tablet computer, desktop computer, laptop Deng the electronic equipment with display device.For example, electronic equipment 1000 that can be as shown in Figure 1.
In another example electronic equipment 4000, which can be, is equipped with ticketing service application software when resource is the seat of performance project Mobile phone is implemented the resource lock method provided in the present embodiment by running corresponding ticketing service application software, is not arranged one by one herein It lifts.
Attached drawing is had been combined above and example describes the embodiment of the present invention, according to the present embodiment, provides a kind of resource Locking means, device and electronic equipment meet the target resource of demand by providing the selection of resource selection interface for users, with After the selection target resource of family, when determining that user has resource lock permission, the target resource that it is selected is locked, so that its His user is not available the target resource, enables the user that can preferentially carry out to the target resource relevant using operating, avoids Resource use occurs with other users to conflict, resource is avoided to come using user's reverse cyclic loadings resource selection interface zone in conflict process Flow attack and user experience it is bad, improve the treatment effeciency that uses of resource, promote the resource usage experience of user.Meanwhile Resource can be locked to avoid malicious user, avoid resource abnormal using occurring, promote service availability.
The present invention can be system, method and/or computer program product.Computer program product may include computer Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/ Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs, Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the invention Face.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/ Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/ Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation One module of table, program segment or a part of instruction, the module, program segment or a part of instruction include one or more use The executable instruction of the logic function as defined in realizing.In some implementations as replacements, function marked in the box It can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be held substantially in parallel Row, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or The combination of each box in flow chart and the box in block diagram and or flow chart, can the function as defined in executing or dynamic The dedicated hardware based system made is realized, or can be realized using a combination of dedicated hardware and computer instructions.It is right For those skilled in the art it is well known that, by hardware mode realize, by software mode realize and pass through software and It is all of equal value that the mode of combination of hardware, which is realized,.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport In principle, the practical application or to the technological improvement in market for best explaining each embodiment, or make the art its Its those of ordinary skill can understand each embodiment disclosed herein.The scope of the present invention is defined by the appended claims.

Claims (10)

1. a kind of resource lock method, wherein include:
Resource selection interface is provided, for selection by the user target resource;
When receiving selection operation of the user to target resource by the resource selection interface, determine whether corresponding user has There is resource lock permission;
When the user has resource lock permission, the target resource is locked, so that the target resource cannot be by it His user uses.
2. according to the method described in claim 1, wherein, whether the determination user has the step of resource lock permission Include:
The resource for obtaining the user uses scoring;
When the resource of the user is greater than preset scoring threshold value using scoring, the user is set and is weighed with resource lock Limit.
3. according to the method described in claim 2, wherein, the resource for obtaining the user includes: using the step of scoring
The resource for obtaining the user uses data;
Data are used according to the resource of the user, the resource for calculating the user uses scoring.
4. according to the method described in claim 3, wherein,
The resource of the user is made using the resource browsing data, resource access data, resource history that data include at least user With data and user behavior data;
It is described calculate user resource using scoring step include:
Data and the user behavior are used to resource browsing data, resource access data, the resource history Data are summed after being handled respectively using corresponding preset weight factor, are obtained the corresponding resource and are used scoring.
5. according to the method described in claim 4, wherein,
The resource browsing data include at least whether user browsed the target resource, user browses the target resource One of both frequencies;
Resource access data include at least user whether subscribe to the target resource, user whether to the target resource into Exercise registration, user access the target resource network access path whether normally, user access the target resource Whether network address changes one of this;
The resource history using data include at least user whether used with the target resource belong to same type resource, One of both distribution situations of resource that user has used;
The user behavior data includes at least whether user uses whether real-name authentication account, user are selected by abnormal account Target resource, user behavior whether belong to machine behavior, user behavior whether with the target resource is used there are actual associations One of this.
6. according to the method described in claim 2, wherein, further includes:
When the user prescribes a time limit with resources use right, according to the corresponding resource lock of the resource of user use scoring setting Time;
After locking the target resource, within the corresponding resource lock time, the user is not received to the target When the use operation of resource, cancel the locking of the target resource.
7. according to the method described in claim 2, wherein, further includes:
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding described Resource uses scoring.
8. according to the method described in claim 1, wherein, further includes:
After locking the target resource, within the corresponding resource lock time, the user is not received to the target When the use operation of resource, cancel the locking of the target resource;
And/or
After locking the target resource, according to user described in this to the service condition of target resource, update corresponding described Resources use right limit.
9. a kind of resource lock device, wherein include:
Interface providing unit, for providing resource selection interface, corresponding target resource for selection by the user;
Permission determination unit, for determining real when receiving the selection operation to target resource by the resource selection interface Whether the user for applying selection operation has resource lock permission;
Resource lock unit, for locking corresponding target resource when the user has resource lock permission.
10. a kind of electronic equipment, wherein include:
Display device, for showing human-computer interaction interface;
Memory, for storing executable instruction;
Processor runs the electronic equipment and executes as described in claim 1-8 for the control according to the executable instruction Any one resource lock method.
CN201810169089.2A 2018-02-28 2018-02-28 Resource lock method, apparatus and electronic equipment Withdrawn CN110213169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810169089.2A CN110213169A (en) 2018-02-28 2018-02-28 Resource lock method, apparatus and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810169089.2A CN110213169A (en) 2018-02-28 2018-02-28 Resource lock method, apparatus and electronic equipment

Publications (1)

Publication Number Publication Date
CN110213169A true CN110213169A (en) 2019-09-06

Family

ID=67778712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810169089.2A Withdrawn CN110213169A (en) 2018-02-28 2018-02-28 Resource lock method, apparatus and electronic equipment

Country Status (1)

Country Link
CN (1) CN110213169A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3032418A1 (en) * 2013-09-27 2016-06-15 Huawei Device Co., Ltd. Permission control method and device
CN106408096A (en) * 2015-07-30 2017-02-15 腾讯科技(深圳)有限公司 Data processing method in online ticketing system and online ticketing system
CN106453357A (en) * 2016-11-01 2017-02-22 北京红马传媒文化发展有限公司 Network ticket buying abnormal behavior recognition method and system and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3032418A1 (en) * 2013-09-27 2016-06-15 Huawei Device Co., Ltd. Permission control method and device
CN106408096A (en) * 2015-07-30 2017-02-15 腾讯科技(深圳)有限公司 Data processing method in online ticketing system and online ticketing system
CN106453357A (en) * 2016-11-01 2017-02-22 北京红马传媒文化发展有限公司 Network ticket buying abnormal behavior recognition method and system and equipment

Similar Documents

Publication Publication Date Title
US20240029071A1 (en) Index of usability for a replacement payment card
US10938823B2 (en) Authenticating a request for an electronic transaction
AU2018298059A1 (en) Data reconciliation based on computer analysis of data
BR112016017972B1 (en) METHOD FOR MODIFICATION OF COMMUNICATION FLOW
US20160057019A1 (en) Integrated cloud data center management
US10044837B2 (en) Generation and distribution of named, definable, serialized tokens
US20190318219A1 (en) Personalized artificial intelligence interactions and customized responses of a computer system
CN109213486A (en) Method and apparatus for generating customized visualization component
US20160267411A1 (en) Creating sustainable innovation platforms based on service first and service now approach
CN116783868A (en) Limiting scope in token-based authorization systems
CN108259547A (en) Information push method, equipment and programmable device
US20180018656A1 (en) Dispensing payment cards via a vending facility
CN110322029A (en) Resource recommendation method, device and electronic equipment
US20170168870A1 (en) Task status tracking and update system
CN110213169A (en) Resource lock method, apparatus and electronic equipment
US20190385251A1 (en) Cognitive alternate vacation booking
US9455879B1 (en) Validating changes to attributes for computing resources
KR102276230B1 (en) Method for generating finite state machine, method for operating finite state machine, server and computer program for performing the same
US11640421B2 (en) Coverage analysis with event clustering
CN105493065B (en) Subscriber&#39;s option is provided
CN107615242A (en) Obtained for the user via bid of connection equipment application installation
US11558337B1 (en) Activity-based message management
CN114341918B (en) Peer-to-peer authentication of unauthorized transactions
US10771414B2 (en) Authentication in messaging platforms for web content
US20230394135A1 (en) Automatic compliant password generation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190906

WW01 Invention patent application withdrawn after publication