CN110969474A - Resource acquisition processing method, data processing system, storage medium and processor - Google Patents

Resource acquisition processing method, data processing system, storage medium and processor Download PDF

Info

Publication number
CN110969474A
CN110969474A CN201811163433.3A CN201811163433A CN110969474A CN 110969474 A CN110969474 A CN 110969474A CN 201811163433 A CN201811163433 A CN 201811163433A CN 110969474 A CN110969474 A CN 110969474A
Authority
CN
China
Prior art keywords
public number
identifier
target object
platform
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811163433.3A
Other languages
Chinese (zh)
Other versions
CN110969474B (en
Inventor
李泽贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201811163433.3A priority Critical patent/CN110969474B/en
Publication of CN110969474A publication Critical patent/CN110969474A/en
Application granted granted Critical
Publication of CN110969474B publication Critical patent/CN110969474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0225Avoiding frauds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Abstract

The application discloses a resource acquisition processing method, a data processing system, a storage medium and a processor. Wherein, the method comprises the following steps: receiving a first acquisition request from a first target object in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources distributed by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; and obtaining a verification result of the first identifier, wherein the verification result is used for determining whether the second public number is allowed to allocate the virtual resource to the first target object. The technical problem that the brushing cannot be prevented maliciously by the red packet in the related technology is solved.

Description

Resource acquisition processing method, data processing system, storage medium and processor
Technical Field
The present application relates to the field of security of network virtual resources, and in particular, to a resource acquisition processing method, a data processing system, a storage medium, and a processor.
Background
Red envelope marketing is one way that public numbers are now used to attract concerns. However, the marketing of the red envelope involves cash flow, necessary safety precaution is necessary, and if a leak exists, the leak can be utilized by a speculative branch to maliciously rob the red envelope.
The technical means for preventing malicious red packet robbery in the related technology is as follows: the number of times of getting for each person every day is limited, however, the above technical means have the following disadvantages: the number of times of getting by each person every day is limited, malicious red packet brushing cannot be effectively prevented, when red packet activities begin, people who possibly get to the red packet forward the red packet entrance to other wechat groups, and then the other wechat groups have great possibility of getting the red packet in the red packet pool empty.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a resource acquisition processing method, a data processing system, a storage medium and a processor, so as to at least solve the technical problem that malicious red packet rush brushing cannot be effectively prevented in the related technology.
According to an aspect of an embodiment of the present application, a method for acquiring and processing a resource is provided, including: receiving a first acquisition request from a first target object in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources distributed by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; and obtaining a verification result of the first identifier, wherein the verification result is used for determining whether the second public number is allowed to allocate the virtual resource to the first target object.
Optionally, before receiving the first obtaining request from the first target object in the first interactive page of the first public number, the method further includes: receiving a second acquisition request from a second target object in a second interactive page of a second public number; acquiring a second identifier of a second target object at a second public number from the public number platform; acquiring a third identification of a second target object from a first link address generated by the public number platform; and comparing the second identification with the third identification, wherein when the second identification is consistent with the third identification, the link address of the first interactive page is determined to be allowed to be sent to the first public number.
Optionally, obtaining a second identifier of the second target object at the second public number from the public number platform includes: and acquiring the second identifier in a silent authorization mode.
Optionally, obtaining a verification result of the first identifier includes: and sending the first identifier to a third-party platform, and receiving a verification result of the first identifier returned by the third-party platform.
Optionally, when the first identifier is sent to the third party platform, the method further includes: sending the first identifier, the virtual resource identifier and the second identifier to a third-party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
Optionally, obtaining a first identifier of the first target object at the first public number from the public number platform includes: and acquiring the first identifier in a silent authorization mode.
Optionally, receiving an acquisition request from a first target object in a first interactive page of a first public number, includes: and receiving an access request of the first target object to the link address set in the first interactive page, and taking the access request as an acquisition request.
Optionally, the receiving an access request of the first target object to the link address set in the first interactive page includes: receiving a trigger instruction of a designated control set in a first interactive interface by a first target object; and generating an access request under the triggering of the triggering instruction.
Optionally, the verification result is determined by: the third-party platform judges whether a first identifier exists in a preset identifier set or not; and determining a verification result according to the judgment result, wherein verification is determined to be passed when the judgment result indicates that the first identifier exists in the preset identifier set.
According to another aspect of the embodiments of the present application, a method for acquiring and processing resources is provided, including: the third party platform receives a first identification of a first target object in a first public number; the third party platform verifies the first identifier; and the third party platform determines whether to allow a second public number to distribute the virtual resource to the first target object according to the verification result, wherein the first public number and the second public number belong to the same public number platform.
Optionally, when the third party platform receives the first identifier of the first target object at the first public number, the method further includes: the third party platform receives the first identification, the virtual resource identification of the virtual resource and a second identification of a second target object in a second public number; and after the third party platform determines whether the second public number is allowed to allocate the virtual resource to the first target object according to the verification result, the method further comprises the following steps: and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
According to another aspect of the embodiments of the present application, there is provided a data processing system including: the client device is used for sending a first acquisition request of a first target object under a first public number; the system comprises a public number platform device, a first interaction page and a second interaction page, wherein the public number platform device is used for receiving a first acquisition request in a first interaction page of a first public number, and the first acquisition request is used for requesting to acquire virtual resources distributed by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; obtaining a verification result of the first identifier; and the third party platform equipment is used for verifying the first identifier and determining whether to allow the second public number to allocate the virtual resource to the first target object according to a verification result.
According to another aspect of the embodiments of the present application, there is provided a method for acquiring and processing resources, including: receiving a first acquisition request from a first target object in a first interactive page of a first application account, wherein the first acquisition request is used for requesting to acquire virtual resources allocated to a second application account; acquiring a first identifier of a first target object in a first application account from an application account platform, wherein the first application account and a second application account belong to the same operator platform; sending the first identifier to a third party platform; and receiving a verification result of the first identifier fed back by the third-party platform.
According to another aspect of the embodiments of the present application, there is provided a storage medium including a stored program, wherein when the program runs, a device on which the storage medium is located is controlled to execute the above method for acquiring and processing resources.
According to another aspect of the embodiments of the present application, there is provided a processor configured to execute a program, where the program executes the above method for acquiring and processing resources.
In the embodiment of the application, after a first acquisition request for requesting the virtual resource of the second public number is received, the first identification of the first target object obtained from the public number platform in the first public number is verified, so that the virtual resource verification mode is realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic diagram of a computer terminal according to an embodiment of the present application;
FIG. 2 is a flow chart of a resource acquisition method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a red envelope pickup interface according to an embodiment of the present application;
FIG. 4 is a flow chart of an alternative resource acquisition method according to an embodiment of the present application;
FIG. 5 is a flow chart of another resource acquisition method according to an embodiment of the application;
FIG. 6 is a flow chart of another resource acquisition method according to an embodiment of the application;
FIG. 7 is a block diagram of a data processing system according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For a better understanding of the embodiments of the present application, the terms referred to in the embodiments of the present application are explained below:
virtual resources: may be an information resource on the network, such as information on the amount of funds.
Public number: the carrier platform allocates an application account number, such as a wechat public number, to the user or the merchant.
And the WeChat merchant platform is a merchant function set related to WeChat payment.
Service number: providing enterprises and organizations with greater business service and user management capabilities, primarily biased towards service-class interactions (a type of public number).
Openid: the identity of the user in the public number is identified, and different public numbers have different openids.
The method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal or a similar operation device. Fig. 1 shows a hardware configuration block diagram of a computer terminal (or mobile device) for implementing the acquisition processing method of resources. As shown in fig. 1, the computer terminal 10 (or mobile device 10) may include one or more (shown as 102a, 102b, … …, 102 n) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission device 106 for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuit may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the computer terminal 10 (or mobile device). As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the () method in the embodiment of the present application, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, that is, implementing the vulnerability detection method of the application program. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 can be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
In the above operating environment, the embodiments of the present application provide a resource acquisition method, it should be noted that the steps shown in the flowchart of the drawings can be executed in a computer system such as a set of computer executable instructions, and although a logical order is shown in the flowchart, in some cases, the steps shown or described can be executed in an order different from the order shown.
Fig. 2 is a resource obtaining method according to an embodiment of the present application, and as shown in fig. 2, the method includes the following steps:
step S202, a first acquisition request from a first target object is received in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources distributed by a second public number; the first interactive page may be accessed via a link address, for example, a red packet entry link:
http://xxxxx/paId=ghaoejoaneg&merchantId=ghaeoijeofaew&fromOpenid=onxjfoijeoageae
as shown in fig. 3, the first interactive page may be a red packet page, and a button "tear down red packet" for getting the red packet and a public name are disposed in the red packet page.
Step S202 may determine the acquisition request by: and receiving an access request of the first target object to the link address set in the first interactive page, and taking the access request as an acquisition request.
In some embodiments of the present application, the access request may be generated by triggering a control set on the page, for example: receiving a trigger instruction of a designated control set in a first interactive interface by a first target object; and generating an access request under the triggering of the triggering instruction.
Step S204, a first identification of a first target object in a first public number is obtained from a public number platform, wherein the first public number and a second public number belong to the same public number platform;
in some embodiments of the present application, the first identifier may be obtained through an authorization function of a public number platform, for example, the first identifier may be obtained through a silent authorization and a web page authorization, and particularly, in an optional embodiment, the first identifier is obtained through the silent authorization, so that the first identifier may be obtained without perception of a user, and user experience is improved. Wherein, the silent authorization means: the silent authorization does not need user confirmation, only needs a certain webpage accessed by a user, belongs to an authorization form nested in a common webpage, but only can acquire the unique identifier openid of the user and cannot acquire the personal information of the user; the webpage authorization means that: and receiving a confirmation instruction of the user, and acquiring interface return forms of openid, personal information, attention information and the like of the user after the user confirms.
The first identifier includes, but is not limited to, identity information of the user, such as openid.
Step S206, obtaining a verification result of the first identifier, wherein the verification result is used to determine whether the second public account is allowed to allocate the virtual resource to the first target object.
The obtaining manner of step S206 is various, and it may be obtained by the public platform, or obtained by the third party platform, and send the first identifier to the third party platform, and receive the verification result of the first identifier returned by the third party platform. The third party platform may be a platform belonging to a different operator than the public platform.
In some optional embodiments of the present application, the third party platform may have a decision right for the virtual resource besides verifying the identity of the target object (i.e. the user), specifically: when the first identifier is sent to the third-party platform, the first identifier, the virtual resource identifier and the second identifier are sent to the third-party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
In some optional embodiments of the present application, before receiving the first get request from the first target object in the first interaction page of the first public number, the method further comprises: receiving a second acquisition request from a second target object in a second interactive page of a second public number; acquiring a second identifier of a second target object at a second public number from the public number platform; acquiring a third identification of a second target object from a first link address generated by the public number platform; and comparing the second identification with the third identification, wherein when the second identification is consistent with the third identification, the link address of the first interactive page is determined to be allowed to be sent to the first public number.
Taking a red packet as an example, the public number implements logic of silent authorization on a red packet entry page (i.e. an interactive page) and openid (equivalent to the second identifier) taken by the silent authorization is equal to frompoentid: onxfoijeageae (equivalent to the third identifier) in a downlink. The step is a more key step in the brushing prevention, and can prevent the collar from being stolen and faked.
The second identifier may be obtained in the same manner as the first identifier, or may be obtained in a different manner, for example, the second identifier is obtained by means of a silent authorization.
In some embodiments of the present application, the verification process may be implemented by a white list verification method, for example: the third-party platform judges whether a first identifier exists in a preset identifier set or not; and determining a verification result according to the judgment result, wherein verification is determined to be passed when the judgment result indicates that the first identifier exists in the preset identifier set. Due to the first mark
And adding a non-merchant public number in the virtual earning red packet to initiate comparison between openid obtained by silent authorization comparison authorization and fromOpenid value in the issued link for client anti-brush verification. And when the red packet is clicked to be taken, performing anti-brushing verification on the server side through matching of fromOpentid and the red packet taking set. The two anti-brushing of the client and the server can effectively prevent the wechat from being falsely claimed by the un-participated wechat user and other falsely claimed and stolen scenes after the wechat is forwarded and shared across public numbers.
In the following embodiments, public number a (type is service number) is required to be authorized to the third party platform and to grant the web page service permission set; the public number A opens the payment authority and applies for a corresponding merchant number A; requiring a public number B to authorize a third-party platform and granting a webpage service permission set;
step S402, the WeChat user requests a red packet extraction page from the public number B;
step S404, the silent authorization of the public number B is carried out to obtain openid under the public number B, the openid is compared with fromopentid in the link of the red packet extraction page, if the openid is equal, the operation is continued, otherwise, the user is informed that the link is illegal;
step S406, the public number A acquires openid under the public number A through silent authorization;
step S408, after the steps S402-S406 are executed, clicking a get red packet button, and triggering a request ingredients to carry the openid and fromopopenid of the user in the A in the request;
step S410, the platform checks fromopenid and judges whether the fromopenid is tampered;
and step S412, judging whether the user successfully accepts the red envelope, and if so, giving the red envelope to the wechat user by adopting the merchant number A corresponding to the public number A. When a red packet entrance is issued across public numbers, the real identity of a retriever is verified through two times of WeChat authentication so as to ensure that the retriever is a wechat user appointed by a merchant, and meanwhile, the server records a fromOpentid set of red packets to prevent the possibility that the red packet link of the client is changed to be retrieved, so that imposition and other illegal retrieval are avoided.
Fig. 5 is a flowchart of another resource acquisition method according to an embodiment of the present application. As shown in fig. 5, the method includes:
step S502, a third party platform receives a first identification of a first target object in a first public number;
in some optional embodiments of the present application, when the third party platform receives the first identifier of the first target object in the first public number, the third party platform receives the first identifier, the virtual resource identifier of the virtual resource, and the second identifier of the second target object in the second public number; and after the third party platform determines whether the second public number is allowed to allocate the virtual resource to the first target object according to the verification result, the method further comprises the following steps: and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
Step S504, the third party platform verifies the first identification;
step S506, the third party platform determines whether to allow a second public number to distribute the virtual resource to the first target object according to the verification result, wherein the first public number and the second public number belong to the same public number platform.
It should be noted that, reference may be made to the embodiments shown in fig. 1 to 4 for a preferred implementation of the embodiment shown in fig. 5, which is not described herein again.
Fig. 6 is a flowchart of another resource acquisition method according to an embodiment of the present application. As shown in fig. 6, the method includes the following processing steps:
step S602, a first acquisition request from a first target object is received in a first interactive page of a first application account, wherein the first acquisition request is used for requesting to acquire virtual resources allocated to a second application account;
step S604, acquiring a first identifier of a first target object in a first application account from an application account platform, wherein the first application account and a second application account belong to the same operator platform;
step S606, the first identification is sent to a third party platform; and receiving a verification result of the first identifier fed back by the third-party platform. In some optional embodiments of the present application, the third party platform may have a decision right for the virtual resource besides verifying the identity of the target object (i.e. the user), specifically: when the first identifier is sent to the third-party platform, the first identifier, the virtual resource identifier and the second identifier are sent to the third-party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
The first application account and the second application account include, but are not limited to, a public number. It should be noted that, reference may be made to the embodiments shown in fig. 1 to 4 for a preferred implementation of the embodiment shown in fig. 6, and details are not described here again.
FIG. 7 is a block diagram of a data processing system according to an embodiment of the present application. As shown in fig. 7, the data processing system includes: the client device 70 is used for sending a first acquisition request of a first target object under a first public number; a public number platform device 72 (including but not limited to a server) for receiving a first acquisition request in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; obtaining a verification result of the first identifier; the third party platform device 74 (including but not limited to a server) is configured to verify the first identifier and determine whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result.
It should be noted that the data processing system shown in fig. 7 may be used to implement the method embodiments shown in fig. 2 to 5, and details are not described here again.
According to another aspect of the embodiments of the present application, there is provided a storage medium including a stored program, wherein when the program runs, a device on which the storage medium is located is controlled to execute the above method for acquiring and processing resources.
According to another aspect of the embodiments of the present application, there is provided a processor for executing a program, where the program executes the above method for acquiring and processing resources when running
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (15)

1. A resource acquisition processing method is characterized by comprising the following steps:
receiving a first acquisition request from a first target object in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources distributed by a second public number;
acquiring a first identifier of the first target object at a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform;
and obtaining a verification result of the first identifier, wherein the verification result is used for determining whether the second public number is allowed to allocate the virtual resource to the first target object.
2. The method of claim 1, prior to receiving the first get request from the first target object in the first interactive page of the first public number, the method further comprising:
receiving a second acquisition request from a second target object in a second interactive page of the second public number;
acquiring a second identification of the second target object at the second public number from the public number platform;
acquiring a third identification of the second target object from a first link address generated by the public number platform;
and comparing the second identification with a third identification, wherein when the second identification is consistent with the third identification, the link address of the first interactive page is determined to be allowed to be sent to the first public number.
3. The method of claim 2, wherein obtaining a second identification of the second target object at the second public number from the public number platform comprises:
and acquiring the second identifier in a silent authorization mode.
4. The method of claim 2, wherein obtaining a verification result of the first identifier comprises: and sending the first identifier to a third-party platform, and receiving a verification result of the first identifier returned by the third-party platform.
5. The method of claim 4, wherein when sending the first identifier to a third party platform, the method further comprises:
sending the first identifier, the virtual resource identifier and the second identifier to the third party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to the second target object corresponding to the second identifier.
6. The method of claim 1, wherein obtaining the first identification of the first target object at the first public number from a public number platform comprises:
and acquiring the first identifier in a silent authorization mode.
7. The method of claim 1, wherein receiving a get request from a first target object in a first interactive page of a first public number comprises:
and receiving an access request of the first target object to the link address set in the first interactive page, and taking the access request as the acquisition request.
8. The method of claim 7, wherein receiving the access request of the first target object to the link address set in the first interactive page comprises:
receiving a trigger instruction of a designated control set in the first interactive interface by the first target object;
and generating the access request under the triggering of the triggering instruction.
9. The method according to any one of claims 1 to 8, wherein the verification result is determined by:
the third-party platform judges whether the first identification exists in a preset identification set or not; and determining the verification result according to the judgment result, wherein verification is determined to be passed when the judgment result indicates that the first identifier exists in the preset identifier set.
10. A resource acquisition processing method is characterized by comprising the following steps:
the third party platform receives a first identification of a first target object in a first public number;
the third party platform verifies the first identification;
and the third party platform determines whether to allow a second public number to distribute the virtual resource to the first target object according to the verification result, wherein the first public number and the second public number belong to the same public number platform.
11. The method of claim 10,
when the third party platform receives the first identification of the first target object at the first public number, the method further comprises the following steps: the third party platform receives the first identification, the virtual resource identification of the virtual resource and a second identification of a second target object in the second public number; and
after the third party platform determines whether to allow a second public number to allocate virtual resources to the first target object according to the verification result, the method further comprises: and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to the second target object corresponding to the second identifier.
12. A resource acquisition processing method is characterized by comprising the following steps:
receiving a first acquisition request from a first target object in a first interactive page of a first application account, wherein the first acquisition request is used for requesting to acquire virtual resources allocated to a second application account;
acquiring a first identifier of the first target object in a first application account from an application account platform, wherein the first application account and a second application account belong to the same operator platform;
sending the first identifier to a third party platform; and
and receiving a verification result of the first identifier fed back by the third-party platform.
13. A data processing system, comprising:
the client device is used for sending a first acquisition request of a first target object under a first public number;
the public account platform equipment is used for receiving the first acquisition request in a first interactive page of the first public account, and the first acquisition request is used for requesting to acquire virtual resources distributed by a second public account; acquiring a first identifier of the first target object at a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; obtaining a verification result of the first identifier;
and the third-party platform equipment is used for verifying the first identifier and determining whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result.
14. A storage medium, characterized in that the storage medium comprises a stored program, wherein when the program runs, a device where the storage medium is located is controlled to execute the resource acquisition processing method according to any one of claims 1 to 9.
15. A processor, configured to execute a program, wherein the program executes to perform the resource acquisition processing method according to any one of claims 1 to 9.
CN201811163433.3A 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor Active CN110969474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811163433.3A CN110969474B (en) 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811163433.3A CN110969474B (en) 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor

Publications (2)

Publication Number Publication Date
CN110969474A true CN110969474A (en) 2020-04-07
CN110969474B CN110969474B (en) 2023-12-26

Family

ID=70029406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811163433.3A Active CN110969474B (en) 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor

Country Status (1)

Country Link
CN (1) CN110969474B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932290A (en) * 2020-06-30 2020-11-13 五八到家有限公司 Request processing method, device, equipment and storage medium
CN113781119A (en) * 2021-09-14 2021-12-10 腾讯数码(深圳)有限公司 Virtual resource sending method and device, electronic equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
CN104618226A (en) * 2015-02-16 2015-05-13 腾讯科技(深圳)有限公司 Information processing method, client and server
CN105100223A (en) * 2015-07-01 2015-11-25 北京奇虎科技有限公司 File sharing method, device and system based on cloud storage
US20160055695A1 (en) * 2014-08-20 2016-02-25 Gate Labs Inc. Access management and resource sharing platform based on biometric identity
CN106156228A (en) * 2015-04-24 2016-11-23 腾讯科技(深圳)有限公司 Resource delivery system, resource payment method and resource get method
CN106960333A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 The method and system of shared resource
CN106959982A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 Obtain methods, devices and systems, monitoring method and the device of resource
CN108111568A (en) * 2017-11-03 2018-06-01 腾讯科技(上海)有限公司 Method of Get Remote Object and device, storage medium and electronic device
WO2018108035A1 (en) * 2016-12-13 2018-06-21 腾讯科技(深圳)有限公司 Information processing and virtual resource exchange method, apparatus, and device
CN108288152A (en) * 2018-01-02 2018-07-17 腾讯科技(深圳)有限公司 A kind of exchange method of sharing information, terminal and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
US20160055695A1 (en) * 2014-08-20 2016-02-25 Gate Labs Inc. Access management and resource sharing platform based on biometric identity
CN104618226A (en) * 2015-02-16 2015-05-13 腾讯科技(深圳)有限公司 Information processing method, client and server
CN106156228A (en) * 2015-04-24 2016-11-23 腾讯科技(深圳)有限公司 Resource delivery system, resource payment method and resource get method
CN105100223A (en) * 2015-07-01 2015-11-25 北京奇虎科技有限公司 File sharing method, device and system based on cloud storage
CN106960333A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 The method and system of shared resource
CN106959982A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 Obtain methods, devices and systems, monitoring method and the device of resource
WO2018108035A1 (en) * 2016-12-13 2018-06-21 腾讯科技(深圳)有限公司 Information processing and virtual resource exchange method, apparatus, and device
CN108111568A (en) * 2017-11-03 2018-06-01 腾讯科技(上海)有限公司 Method of Get Remote Object and device, storage medium and electronic device
CN108288152A (en) * 2018-01-02 2018-07-17 腾讯科技(深圳)有限公司 A kind of exchange method of sharing information, terminal and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932290A (en) * 2020-06-30 2020-11-13 五八到家有限公司 Request processing method, device, equipment and storage medium
CN113781119A (en) * 2021-09-14 2021-12-10 腾讯数码(深圳)有限公司 Virtual resource sending method and device, electronic equipment and storage medium
CN113781119B (en) * 2021-09-14 2024-03-08 腾讯数码(深圳)有限公司 Virtual resource sending method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110969474B (en) 2023-12-26

Similar Documents

Publication Publication Date Title
KR101821511B1 (en) Data processing method based on instant messaging or social applications, and device thereof
KR102466166B1 (en) Processing electronic tokens
CN105282126B (en) Login authentication method, terminal and server
CN111447133B (en) Message transmission method and device, storage medium and electronic device
CN109510849A (en) The account number method for authenticating and device of cloud storage
US8825006B2 (en) Authentication request management
CN107347049B (en) Account authentication method and server
CN110276000B (en) Method and device for acquiring media resources, storage medium and electronic device
US20210176234A1 (en) Cooperative communication validation
CN106302332B (en) Access control method, the apparatus and system of user data
CN105721412A (en) Method and device for authenticating identity between multiple systems
US20170364838A1 (en) Service voucher processing method, device, and system, and storage medium
CN108737080A (en) Storage method, device, system and the equipment of password
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN106559785A (en) Authentication method, equipment and system and access device and terminal
KR101263423B1 (en) Log in confirmation service implementation method for mobile terminal
CN110458507B (en) Authorization method and device for public number business hosting
US10826901B2 (en) Systems and method for cross-channel device binding
CN110969474A (en) Resource acquisition processing method, data processing system, storage medium and processor
CN110692072A (en) NFC initiated proxy communication
CN110266686B (en) Data sharing method, device, equipment and computer readable storage medium
CN111367993A (en) Data service method and device based on end-to-end
CN111049787B (en) Information association method, device, system and computer readable storage medium
CN111193694B (en) Application authorization management method, terminal and medium based on dual-system operating environment
CN112350982B (en) Resource authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant