CN110969474B - Resource acquisition processing method, data processing system, storage medium and processor - Google Patents

Resource acquisition processing method, data processing system, storage medium and processor Download PDF

Info

Publication number
CN110969474B
CN110969474B CN201811163433.3A CN201811163433A CN110969474B CN 110969474 B CN110969474 B CN 110969474B CN 201811163433 A CN201811163433 A CN 201811163433A CN 110969474 B CN110969474 B CN 110969474B
Authority
CN
China
Prior art keywords
identifier
public number
target object
platform
acquisition request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811163433.3A
Other languages
Chinese (zh)
Other versions
CN110969474A (en
Inventor
李泽贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201811163433.3A priority Critical patent/CN110969474B/en
Publication of CN110969474A publication Critical patent/CN110969474A/en
Application granted granted Critical
Publication of CN110969474B publication Critical patent/CN110969474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0225Avoiding frauds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Abstract

The application discloses a resource acquisition processing method, a data processing system, a storage medium and a processor. Wherein the method comprises the following steps: receiving a first acquisition request from a first target object in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; and acquiring a verification result of the first identifier, wherein the verification result is used for determining whether the second public number is allowed to allocate the virtual resource to the first target object. The technical problem that the malicious robbing and brushing of the red packet cannot be effectively prevented in the related art is solved.

Description

Resource acquisition processing method, data processing system, storage medium and processor
Technical Field
The present invention relates to the field of security of network virtual resources, and in particular, to a resource acquisition processing method, a data processing system, a storage medium, and a processor.
Background
Red-envelope marketing is one way in which public numbers are currently used to attract attention. However, the red envelope marketing involves cash flow, and necessary security precautions are necessary if vulnerabilities are exploited by the gambling molecules to rob the red envelope maliciously.
The technical means for preventing malicious robbing red packets in the related art are as follows: limiting the number of daily acquisitions per person, however, the above-mentioned technical means have the following drawbacks: the limit of the daily picking times of each person cannot effectively prevent malicious brushing of the red packet, when the red packet activity starts, a person possibly robbing the red packet forwards the red packet inlet to other micro-letter groups, and then the other micro-letter groups are very likely to rob the red packet in the red packet pool.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the application provides a resource acquisition processing method, a data processing system, a storage medium and a processor, which are used for at least solving the technical problem that the malicious robbery of a red packet cannot be effectively prevented in the related technology.
According to an aspect of the embodiments of the present application, there is provided a method for processing resource acquisition, including: receiving a first acquisition request from a first target object in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; and acquiring a verification result of the first identifier, wherein the verification result is used for determining whether the second public number is allowed to allocate the virtual resource to the first target object.
Optionally, before receiving the first acquisition request from the first target object in the first interaction page of the first public number, the method further includes: receiving a second acquisition request from a second target object in a second interactive page of a second public number; acquiring a second identifier of a second target object in a second public number from a public number platform; acquiring a third identification of a second target object from a first link address generated by the public number platform; and comparing the second identifier with the third identifier, wherein when the second identifier is consistent with the third identifier, determining that the link address of the first interaction page is allowed to be sent to the first public number.
Optionally, obtaining the second identification of the second target object at the second public number from the public number platform includes: and acquiring the second identifier in a silent authorized mode.
Optionally, obtaining the verification result of the first identifier includes: and sending the first identifier to the third party platform, and receiving a verification result of the first identifier returned by the third party platform.
Optionally, when the first identifier is sent to the third party platform, the method further includes: transmitting the first identifier, the virtual resource identifier and the second identifier to a third party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
Optionally, obtaining the first identification of the first target object at the first public number from the public number platform includes: the first identification is acquired in a silent authorized mode.
Optionally, receiving the acquisition request from the first target object in the first interaction page of the first public number includes: and receiving an access request of the first target object to the link address set in the first interaction page, and taking the access request as an acquisition request.
Optionally, receiving the access request of the first target object to the link address set in the first interaction page includes: receiving a trigger instruction of a designated control set in a first interactive interface by a first target object; and under the triggering of the triggering instruction, generating an access request.
Optionally, the verification result is determined by: the third party platform judges whether a first identifier exists in a preset identifier set or not; and determining a verification result according to the judgment result, wherein verification is determined to be passed when the judgment result indicates that the first identifier exists in the preset identifier set.
According to another aspect of the embodiments of the present application, there is provided a method for processing resource acquisition, including: the third party platform receives a first identification of a first target object in a first public number; the third party platform verifies the first identifier; and the third party platform determines whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result, wherein the first public number and the second public number belong to the same public number platform.
Optionally, when the third party platform receives the first identification of the first target object at the first public number, the method further comprises: the third party platform receives the first identification, the virtual resource identification of the virtual resource and the second identification of the second target object in the second public number; and after the third party platform determines whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result, the method further comprises: and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
According to another aspect of an embodiment of the present application, there is provided a data processing system, including: the client device is used for sending a first acquisition request of a first target object under a first public number; the public number platform device is used for receiving a first acquisition request in a first interaction page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; acquiring a verification result of the first identifier; and the third party platform equipment is used for verifying the first identifier and determining whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result.
According to still another aspect of the embodiments of the present application, there is provided a method for processing resource acquisition, including: receiving a first acquisition request from a first target object in a first interaction page of a first application account, wherein the first acquisition request is used for requesting to acquire virtual resources distributed by a second application account; acquiring a first identifier of a first target object in a first application account from an application account platform, wherein the first application account and a second application account belong to the same operator platform; transmitting the first identifier to a third party platform; and receiving a verification result of the first identifier, which is fed back by the third-party platform.
According to another aspect of the embodiments of the present application, there is provided a storage medium including a stored program, where the device in which the storage medium is controlled to execute the above resource acquisition processing method when the program runs.
According to another aspect of the embodiments of the present application, there is provided a processor, configured to execute a program, where the program executes the above method for acquiring and processing resources.
In the embodiment of the application, after receiving the first obtaining request for requesting the virtual resource of the second public number, the method of verifying the first identifier of the first target object obtained from the public number platform in the first public number is adopted, so that the method of verifying the virtual resource is realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a schematic structural view of a computer terminal according to an embodiment of the present application;
FIG. 2 is a flow chart of a method of acquiring resources according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a red pack retrieval interface, according to an embodiment of the present application;
FIG. 4 is a flow chart of an alternative resource acquisition method according to an embodiment of the present application;
FIG. 5 is a flow chart of another resource acquisition method according to an embodiment of the present application;
FIG. 6 is a flow chart of another method of resource acquisition according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a data processing system according to an embodiment of the present application.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For a better understanding of the embodiments of the present application, the terms referred to in the embodiments of the present application are explained below:
virtual resources: may be an information resource on the network, such as information about the amount of funds, etc.
Public number: the carrier platform assigns an application account, e.g., a WeChat public number, to the user or merchant.
WeChat merchant platform-WeChat merchant platform is the merchant function set related to WeChat payment.
Service number: providing business and organization with more powerful business services and user management capabilities, mainly favors service class interactions (a type of public number).
Openid: the identity of the user in the public number is identified, and different public numbers have different openids.
The method embodiments provided by the embodiments of the present application may be performed in a mobile terminal, a computer terminal, or similar computing device. Fig. 1 shows a hardware block diagram of a computer terminal (or mobile device) for implementing a resource acquisition processing method. As shown in fig. 1, the computer terminal 10 (or mobile device 10) may include one or more (shown as 102a, 102b, … …,102 n) processors 102 (the processors 102 may include, but are not limited to, a microprocessor MCU, a programmable logic device FPGA, etc. processing means), a memory 104 for storing data, and a transmission means 106 for communication functions. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 1 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuits described above may be referred to generally herein as "data processing circuits. The data processing circuit may be embodied in whole or in part in software, hardware, firmware, or any other combination. Furthermore, the data processing circuitry may be a single stand-alone processing module, or incorporated, in whole or in part, into any of the other elements in the computer terminal 10 (or mobile device). As referred to in the embodiments of the present application, the data processing circuit acts as a processor control (e.g., selection of the path of the variable resistor termination to interface).
The memory 104 may be used to store software programs and modules of application software, such as a program instruction/data storage device corresponding to the () method in the embodiment of the present application, and the processor 102 executes the software programs and modules stored in the memory 104, thereby executing various functional applications and data processing, that is, implementing the above-mentioned vulnerability detection method of application program. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 106 is arranged to receive or transmit data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module for communicating with the internet wirelessly.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
In the above-described operating environment, the embodiments of the present application provide a method for acquiring resources, and it should be noted that the steps illustrated in the flowcharts of the drawings may be performed in a computer system such as a set of computer executable instructions, and although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different from that herein.
Fig. 2 is a method for acquiring resources according to an embodiment of the present application, as shown in fig. 2, including the following steps:
step S202, a first acquisition request from a first target object is received in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by a second public number; the first interactive page may be accessed via a link address, e.g., a red packet portal link:
http://xxxxx/paId=ghaoejoaneg&merchantId=ghaeoijeofaew&fromOpenid=onxjfoijeoageae
as shown in fig. 3, the first interactive page may be a red packet page, where a button "unpacking red packet" for picking up red packets and a public number name are provided.
Step S202 may determine the acquisition request by: and receiving an access request of the first target object to the link address set in the first interaction page, and taking the access request as an acquisition request.
In some embodiments of the present application, the access request may be generated by triggering a control set on the page, for example: receiving a trigger instruction of a designated control set in a first interactive interface by a first target object; and under the triggering of the triggering instruction, generating an access request.
Step S204, a first mark of a first target object in a first public number is obtained from a public number platform, wherein the first public number and the second public number belong to the same public number platform;
in some embodiments of the present application, the first identifier may be obtained through an authorization function of the public number platform, for example, may be obtained through a silent authorization and a web authorization, and in particular, in an optional embodiment, the first identifier is obtained through a silent authorization, so that the first identifier may be obtained without perception of a user, thereby improving user experience. Wherein, the silence authorization refers to: the silent authorization does not need user confirmation, only needs the user to access a certain webpage, belongs to an authorization form nested in a common webpage, but only can obtain a unique identifier openid of the user, and cannot obtain personal information of the user; webpage authorization refers to: and receiving a confirmation instruction of the user, and acquiring an interface return form of the user's openid, personal information, attention information and the like after the user confirms.
The first identifier includes, but is not limited to, identity information of the user, such as an openid.
Step S206, obtaining a verification result of the first identifier, where the verification result is used to determine whether to allow the second public number to allocate the virtual resource to the first target object.
The obtaining manner in step S206 is various, and the obtaining manner may be obtained by the public number platform, or may be obtained by the third party platform, where the first identifier is sent to the third party platform, and the verification result of the first identifier returned by the third party platform is received. The third party platform may be a platform that belongs to a different operator than the public number platform.
In some optional embodiments of the present application, the third party platform may have decision rights to the virtual resource in addition to verifying the identity of the target object (i.e. the user), specifically: when the first identifier is sent to the third party platform, the first identifier, the virtual resource identifier and the second identifier are sent to the third party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
In some optional embodiments of the present application, before receiving the first acquisition request from the first target object in the first interaction page of the first public number, the method further comprises: receiving a second acquisition request from a second target object in a second interactive page of a second public number; acquiring a second identifier of a second target object in a second public number from a public number platform; acquiring a third identification of a second target object from a first link address generated by the public number platform; and comparing the second identifier with the third identifier, wherein when the second identifier is consistent with the third identifier, determining that the link address of the first interaction page is allowed to be sent to the first public number.
Taking a red packet as an example, the public number is to implement logic of silence authorization on a red packet entry page (i.e. an interaction page), and the openid (corresponding to the second identifier) taken by the silence authorization is equal to the value of the free openid: onxjfosjeoageae (corresponding to the third identifier) in the issuing link. The step is a key step in the anti-brushing process, and can prevent the theft and the impersonation.
The second identifier may be obtained in the same manner as the first identifier, or may be obtained in a different manner, for example, in a silent authorization manner.
In some embodiments of the present application, the verification process may be implemented by a white list verification method, for example: the third party platform judges whether a first identifier exists in a preset identifier set or not; and determining a verification result according to the judgment result, wherein verification is determined to be passed when the judgment result indicates that the first identifier exists in the preset identifier set. Due to the first mark
And adding a non-merchant public number to the virtual pickup red packet to initiate comparison authorization of silence authorization to obtain openid and comparing the openid value in the issued link to perform client anti-brushing verification. And carrying out anti-brushing verification on the server side by matching the from opening and the red packet acquisition set when clicking to acquire the red packet. The client and the server can effectively prevent the micro-letter from being shared across public numbers and then being faked by the non-participating micro-credit users and other faked and stolen scenes.
As described in detail below in connection with the alternative embodiment shown in FIG. 4, in the following embodiment, it is desirable that public number A (type is a service number) be authorized to a third party platform and that a set of web service permissions be granted; the public number A opens payment authority and applies for the corresponding merchant number A; the public number B is required to authorize a third party platform and grant a webpage service authority set;
step S402, a WeChat user requests a red packet extraction page from a public number B;
step S404, obtaining openid under the public number B by the silence authorization of the public number B, comparing with the from openid in the red packet extraction page link, if the public number B is equal, continuing, otherwise informing the user that the link is illegal;
step S406, the public number A obtains the openid under the public number A through silence authorization;
step S408, after executing the external steps S402-S406, clicking a red packet retrieving button, triggering request ingdetails to carry the openid and the from openid of the user in the A in the request;
step S410, the platform checks the frompotent to judge whether the frompotent is tampered or not;
step S412, whether the red package is successfully obtained by the user is judged, if so, the red package is issued to the micro credit user by adopting the A merchant number corresponding to the A public number. The real identity of the retriever is checked through two micro-message authentication when the public number red packet is distributed across the red packet entrance to ensure that the retriever is a micro-credit user appointed by a merchant, and meanwhile, the server records the from open set of the red packet to prevent the possibility that the red packet link of the client is changed and retrieved by strings, thereby avoiding impossibility and other illegal retrieval.
Fig. 5 is a flowchart of another resource acquisition method according to an embodiment of the present application. As shown in fig. 5, the method includes:
step S502, a third party platform receives a first identification of a first target object in a first public number;
in some optional embodiments of the present application, when the third party platform receives the first identifier of the first target object in the first public number, the third party platform receives the first identifier, the virtual resource identifier of the virtual resource, and the second identifier of the second target object in the second public number; and after the third party platform determines whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result, the method further comprises: and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
Step S504, the third party platform verifies the first identifier;
in step S506, the third party platform determines whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result, wherein the first public number and the second public number belong to the same public number platform.
It should be noted that, the preferred implementation of the embodiment shown in fig. 5 may refer to the embodiments shown in fig. 1 to 4, and will not be described herein.
Fig. 6 is a flowchart of another resource acquisition method according to an embodiment of the present application. As shown in fig. 6, the method comprises the following processing steps:
step S602, a first acquisition request from a first target object is received in a first interaction page of a first application account, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by a second application account;
step S604, a first identification of a first target object in a first application account is obtained from an application account platform, wherein the first application account and a second application account belong to the same operator platform;
step S606, the first identification is sent to a third party platform; and receiving a verification result of the first identifier, which is fed back by the third-party platform. In some optional embodiments of the present application, the third party platform may have decision rights to the virtual resource in addition to verifying the identity of the target object (i.e. the user), specifically: when the first identifier is sent to the third party platform, the first identifier, the virtual resource identifier and the second identifier are sent to the third party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to a second target object corresponding to the second identifier.
Wherein the first application account and the second application account include, but are not limited to, public numbers. It should be noted that, the preferred implementation of the embodiment shown in fig. 6 may refer to the embodiments shown in fig. 1 to 4, and will not be described herein.
FIG. 7 is a schematic diagram of a data processing system according to an embodiment of the present application. As shown in fig. 7, the data processing system includes: a client device 70 for sending a first acquisition request of a first target object under a first public number; a public number platform device 72 (including but not limited to a server) for receiving a first acquisition request in a first interactive page of a first public number, the first acquisition request requesting acquisition of virtual resources allocated by a second public number; acquiring a first identifier of a first target object in a first public number from a public number platform, wherein the first public number and a second public number belong to the same public number platform; acquiring a verification result of the first identifier; a third party platform device 74, including but not limited to a server, is used to verify the first identification and determine whether to allow the second public number to assign virtual resources to the first target object based on the result of the verification.
It should be noted that the data processing system shown in fig. 7 may be used to implement the method embodiments shown in fig. 2-5, and will not be described herein.
According to another aspect of the embodiments of the present application, there is provided a storage medium including a stored program, where the device in which the storage medium is controlled to execute the above resource acquisition processing method when the program runs.
According to another aspect of the embodiments of the present application, there is provided a processor for running a program, wherein the program executes the above resource acquisition processing method when running
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology content may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application and are intended to be comprehended within the scope of the present application.

Claims (14)

1. The resource acquisition processing method is characterized by comprising the following steps:
receiving a first acquisition request from a first target object in a first interactive page of a first public number, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by a second public number;
acquiring a first identifier of the first target object in a first public number from a public number platform, wherein the first public number and the second public number belong to the same public number platform;
obtaining a verification result of the first identifier, wherein the verification result is used for determining whether the second public number is allowed to allocate the virtual resource to the first target object;
before obtaining the verification result of the first identifier, the method further includes: receiving a second acquisition request from a second target object in a second interaction page of the second public number; acquiring a second identification of the second target object at the second public number from the public number platform; the first identifier is checked at the server side, and the second identifier is checked at the client side;
before receiving the first acquisition request from the first target object in the first interactive page of the first public number, the method further comprises: acquiring a third identification of the second target object from a first link address generated by the public number platform; and comparing the second identifier with the third identifier, wherein when the second identifier is consistent with the third identifier, determining that the link address of the first interaction page is allowed to be sent to the first public number, and the link address of the first interaction page is used for accessing the first interaction page.
2. The method of claim 1, wherein obtaining a second identification of the second target object at the second public number from the public number platform comprises:
and acquiring the second identifier in a silent authorized mode.
3. The method of claim 1, wherein obtaining a verification result for the first identifier comprises: and sending the first identifier to a third party platform, and receiving a verification result of the first identifier returned by the third party platform.
4. A method according to claim 3, wherein when the first identity is sent to a third party platform, the method further comprises:
transmitting the first identifier, the virtual resource identifier and the second identifier to the third party platform; and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to the second target object corresponding to the second identifier.
5. The method of claim 1, wherein obtaining a first identification of the first target object at a first public number from a public number platform comprises:
and acquiring the first identifier in a silent authorized mode.
6. The method of claim 1, wherein receiving the acquisition request from the first target object in the first interaction page of the first public number comprises:
and receiving an access request of the first target object to the link address set in the first interaction page, and taking the access request as the acquisition request.
7. The method of claim 6, wherein receiving an access request from the first target object to a link address set in the first interaction page comprises:
receiving a trigger instruction of a designated control set in the first interaction page by the first target object;
and generating the access request under the triggering of the triggering instruction.
8. The method according to any one of claims 1 to 7, wherein the verification result is determined by:
the third party platform judges whether the first identifier exists in a preset identifier set or not; and determining the verification result according to a judgment result, wherein verification is determined to pass when the judgment result indicates that the first identifier exists in the preset identifier set.
9. The resource acquisition processing method is characterized by comprising the following steps:
the third party platform receives a first identification of a first target object in a first public number;
the third party platform verifies the first identifier at a server side;
the third party platform determines whether to allow a second public number to allocate virtual resources to the first target object according to the verification result, wherein the first public number and the second public number belong to the same public number platform;
the third party platform receives a first identification of a first target object at a first public number, the method further comprising: the third party platform receives the first identifier, the virtual resource identifier of the virtual resource and the second identifier of the second target object in the second public number, and the second identifier is checked at the client;
before receiving the first acquisition request from the first target object in the first interactive page of the first public number, the method further comprises: acquiring a third identification of the second target object from a first link address generated by the public number platform; and comparing the second identifier with the third identifier, wherein when the second identifier is consistent with the third identifier, determining that the link address of the first interaction page is allowed to be sent to the first public number, and the link address of the first interaction page is used for accessing the first interaction page.
10. The method of claim 9, wherein the step of determining the position of the substrate comprises,
after the third party platform determines whether to allow the second public number to allocate the virtual resource to the first target object according to the verification result, the method further comprises: and when the first identifier passes the verification, sending the virtual resource corresponding to the virtual resource identifier to the second target object corresponding to the second identifier.
11. The resource acquisition processing method is characterized by comprising the following steps:
receiving a first acquisition request from a first target object in a first interaction page of a first application account, wherein the first acquisition request is used for requesting to acquire virtual resources distributed by a second application account;
acquiring a first identifier of the first target object in a first application account from an application account platform, wherein the first application account and the second application account belong to the same operator platform;
transmitting the first identifier to a third party platform; and
receiving a verification result of the first identifier, which is fed back by the third party platform;
before receiving the verification result of the first identifier fed back by the third party platform, the method further comprises: receiving a second acquisition request from a second target object in a second interactive page of a second public number; acquiring a second identification of the second target object at the second public number from a public number platform; verifying the second identifier at the client;
before receiving the first acquisition request from the first target object in the first interactive page of the first public number, the method further comprises: acquiring a third identification of the second target object from a first link address generated by the public number platform; and comparing the second identifier with the third identifier, wherein when the second identifier is consistent with the third identifier, determining that the link address of the first interaction page is allowed to be sent to the first public number, and the link address of the first interaction page is used for accessing the first interaction page.
12. A data processing system, comprising:
the client device is used for sending a first acquisition request of a first target object under a first public number;
the public number platform device is used for receiving the first acquisition request in a first interaction page of the first public number, wherein the first acquisition request is used for requesting to acquire virtual resources allocated by the second public number; acquiring a first identifier of the first target object in a first public number from a public number platform, wherein the first public number and the second public number belong to the same public number platform; acquiring a verification result of the first identifier;
the third party platform equipment is used for verifying the first identifier at the server side and determining whether the second public number is allowed to allocate the virtual resource to the first target object according to the verification result;
the public number platform device is further configured to receive a second acquisition request from a second target object in a second interaction page of the second public number; acquiring a second identification of the second target object at the second public number from the public number platform;
the client device is further configured to verify the second identifier;
the data processing system is further configured to acquire, before receiving the first acquisition request in the first interaction page of the first public number, a third identifier of the second target object from a first link address generated by the public number platform; and comparing the second identifier with the third identifier, wherein when the second identifier is consistent with the third identifier, determining that the link address of the first interaction page is allowed to be sent to the first public number, and the link address of the first interaction page is used for accessing the first interaction page.
13. A storage medium comprising a stored program, wherein the program, when run, controls a device in which the storage medium is located to execute the resource acquisition processing method according to any one of claims 1 to 8.
14. A processor for executing a program, wherein the program executes the resource acquisition processing method according to any one of claims 1 to 8.
CN201811163433.3A 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor Active CN110969474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811163433.3A CN110969474B (en) 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811163433.3A CN110969474B (en) 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor

Publications (2)

Publication Number Publication Date
CN110969474A CN110969474A (en) 2020-04-07
CN110969474B true CN110969474B (en) 2023-12-26

Family

ID=70029406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811163433.3A Active CN110969474B (en) 2018-09-30 2018-09-30 Resource acquisition processing method, data processing system, storage medium and processor

Country Status (1)

Country Link
CN (1) CN110969474B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932290A (en) * 2020-06-30 2020-11-13 五八到家有限公司 Request processing method, device, equipment and storage medium
CN113781119B (en) * 2021-09-14 2024-03-08 腾讯数码(深圳)有限公司 Virtual resource sending method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
CN104618226A (en) * 2015-02-16 2015-05-13 腾讯科技(深圳)有限公司 Information processing method, client and server
CN105100223A (en) * 2015-07-01 2015-11-25 北京奇虎科技有限公司 File sharing method, device and system based on cloud storage
CN106156228A (en) * 2015-04-24 2016-11-23 腾讯科技(深圳)有限公司 Resource delivery system, resource payment method and resource get method
CN106960333A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 The method and system of shared resource
CN106959982A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 Obtain methods, devices and systems, monitoring method and the device of resource
CN108111568A (en) * 2017-11-03 2018-06-01 腾讯科技(上海)有限公司 Method of Get Remote Object and device, storage medium and electronic device
WO2018108035A1 (en) * 2016-12-13 2018-06-21 腾讯科技(深圳)有限公司 Information processing and virtual resource exchange method, apparatus, and device
CN108288152A (en) * 2018-01-02 2018-07-17 腾讯科技(深圳)有限公司 A kind of exchange method of sharing information, terminal and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9685012B2 (en) * 2014-08-20 2017-06-20 Gate Labs Inc. Access management and resource sharing platform based on biometric identity

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
CN104618226A (en) * 2015-02-16 2015-05-13 腾讯科技(深圳)有限公司 Information processing method, client and server
CN106156228A (en) * 2015-04-24 2016-11-23 腾讯科技(深圳)有限公司 Resource delivery system, resource payment method and resource get method
CN105100223A (en) * 2015-07-01 2015-11-25 北京奇虎科技有限公司 File sharing method, device and system based on cloud storage
CN106960333A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 The method and system of shared resource
CN106959982A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 Obtain methods, devices and systems, monitoring method and the device of resource
WO2018108035A1 (en) * 2016-12-13 2018-06-21 腾讯科技(深圳)有限公司 Information processing and virtual resource exchange method, apparatus, and device
CN108111568A (en) * 2017-11-03 2018-06-01 腾讯科技(上海)有限公司 Method of Get Remote Object and device, storage medium and electronic device
CN108288152A (en) * 2018-01-02 2018-07-17 腾讯科技(深圳)有限公司 A kind of exchange method of sharing information, terminal and storage medium

Also Published As

Publication number Publication date
CN110969474A (en) 2020-04-07

Similar Documents

Publication Publication Date Title
US11665200B2 (en) System and method for second factor authentication to perform services
US11276093B2 (en) Trusted remote attestation agent (TRAA)
AU2020316972B2 (en) First factor contactless card authentication system and method
US9741033B2 (en) System and method for point of sale payment data credentials management using out-of-band authentication
CN109510849A (en) The account number method for authenticating and device of cloud storage
EP3005648B1 (en) Terminal identification method, and method, system and apparatus of registering machine identification code
CN105554146B (en) A kind of remote access method and device
CN108418795A (en) Data access method, device, system and the computer-readable medium of transregional piece of chain
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
EP2751733B1 (en) Method and system for authorizing an action at a site
KR20210134816A (en) Processing electronic tokens
WO2010138359A1 (en) Interactive phishing detection (ipd)
US20170364838A1 (en) Service voucher processing method, device, and system, and storage medium
CN109861968A (en) Resource access control method, device, computer equipment and storage medium
CN106657032A (en) System and method for realizing identity identification and data authentication based on security medium confidential short message
CN110969474B (en) Resource acquisition processing method, data processing system, storage medium and processor
CN106559785A (en) Authentication method, equipment and system and access device and terminal
CN112543169A (en) Authentication method, device, terminal and computer readable storage medium
CN107396362A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN108337235A (en) A kind of method and system executing safety operation using safety equipment
US20220086164A1 (en) Edge-node authentication and security for functions as a service
CN109801059B (en) Mobile payment system and mobile payment method
KR102114032B1 (en) Controlling method and apparatus of credit authorization terminal using router
CN107846390A (en) The authentication method and device of application program
KR101879842B1 (en) User authentication method and system using one time password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant