CN111681034A - Method and device for distributing resource information - Google Patents

Method and device for distributing resource information Download PDF

Info

Publication number
CN111681034A
CN111681034A CN202010358467.9A CN202010358467A CN111681034A CN 111681034 A CN111681034 A CN 111681034A CN 202010358467 A CN202010358467 A CN 202010358467A CN 111681034 A CN111681034 A CN 111681034A
Authority
CN
China
Prior art keywords
inviter
invitee
account
resource information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010358467.9A
Other languages
Chinese (zh)
Inventor
满金贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuba Co Ltd
Original Assignee
Wuba Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuba Co Ltd filed Critical Wuba Co Ltd
Priority to CN202010358467.9A priority Critical patent/CN111681034A/en
Publication of CN111681034A publication Critical patent/CN111681034A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0214Referral reward systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0225Avoiding frauds

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method and a device for distributing resource information. In the application, only in the case that the inviter is a normal user, the network platform allocates the resource information to the account of the inviter and/or allocates the resource information to the account of the invitee. And in the case that the inviter is an abnormal user, the network platform may not allocate the resource information to the account of the inviter and/or may not allocate the resource information to the account of the invitee. Therefore, abnormal load brought to the network platform can be avoided, and the safety risk of the network platform can be further reduced.

Description

Method and device for distributing resource information
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for allocating resource information.
Background
With the rapid development of the internet, the marketing activities of the network platform have a tendency of shifting from off-line to on-line, and the goals of brand marketing, customer service, customer acquisition and the like are realized by means of the internet and social circles.
The network platform typically adopts the modes of gift red packages, coupons and head orders to promote the products so as to attract new customers to enter into the fence and consolidate the existing customers.
For example, an old user who has registered an account on the network platform may invite a new user to register an account on the network platform, so that the network platform may have the new user enter, thereby increasing the profit margin. In order to incentivize older users who have registered accounts on the network platform to invite more new users, the network platform rewards the older users and the new users after each of the older users invites a new user.
However, once benefits such as red envelope and benefit are involved, there are naturally profit-making people, and especially when the internet is provided with a low cost, only the action of registering an account can obtain the benefits, so that a lawbreaker may continuously perform illegal invitation registration for the benefits in a short time, but this may bring abnormal load to the network platform, resulting in a high security risk of the network platform.
Disclosure of Invention
In order to solve the above technical problem, the present application shows a method and an apparatus for allocating resource information.
In a first aspect, the present application shows a method for allocating resource information, the method comprising:
acquiring a registration event of an invitee registering an account of the invitee based on an invitation link, wherein the invitation link is sent to the invitee by the invitee in advance;
acquiring a binding relationship among the identity identifiers of the inviter, the invitee and the inviter according to the registration event, wherein the binding relationship is generated after the inviter sends the invitation link to the invitee in advance and the invitee triggers the invitation link;
determining whether the inviter is a normal user based on the binding relationship;
and if the inviter is a normal user, executing a process of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
In an optional implementation, the method further includes:
and if the inviter is an abnormal user, intercepting a flow of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
In an optional implementation, the method further includes:
determining whether the invitee is a normal user in the case that the inviter is a normal user;
and under the condition that the invitee is a normal user, executing a process of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
In an optional implementation, the method further includes:
and if the invitee is an abnormal user, intercepting a flow of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
In an optional implementation manner, before the acquiring a registration event that the invitee registers the account of the invitee based on the invitation link, the method further includes:
obtaining a user representation of the inviter after the inviter sends the invitation link to the invitee and the invitee triggers the invitation link;
determining an identity of the inviter based on the user representation, the identity including a normal user and an abnormal user;
storing the binding relation among the identity identifications of the inviter, the invitee and the inviter.
In an optional implementation, the method further includes:
deleting the binding after performing a process of rewarding the inviter and/or the invitee.
In an optional implementation, the method further includes:
deleting the binding relationship after intercepting a flow of rewarding for the inviter and/or the invitee.
In a second aspect, the present application illustrates an apparatus for allocating resource information, the apparatus comprising:
a first obtaining module, configured to obtain a registration event for an invitee to register an account of the invitee based on an invitation link, where the invitation link is sent by the inviter to the invitee in advance;
a second obtaining module, configured to obtain, according to the registration event, a binding relationship between the identities of the inviter, the invitee, and the inviter, where the binding relationship is generated after the inviter sends the invitation link to the invitee in advance and the invitee triggers the invitation link;
a first determining module, configured to determine whether the inviter is a normal user based on the binding relationship;
and the execution module is used for executing the process of allocating the resource information in the account of the inviter and/or allocating the resource information in the account of the invitee under the condition that the inviter is a normal user.
In an optional implementation, the apparatus further comprises:
and the intercepting module is used for intercepting the flow of allocating the resource information in the account of the inviter and/or allocating the resource information in the account of the invitee under the condition that the inviter is an abnormal user.
In an optional implementation, the apparatus further comprises:
a second determining module, configured to determine whether the invitee is a normal user when the inviter is a normal user;
the execution module is further configured to execute a process of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee, when the invitee is a normal user.
In an optional implementation, the apparatus further comprises:
the interception module is further configured to: and if the invitee is an abnormal user, intercepting a flow of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
In an optional implementation, the apparatus further comprises:
a third obtaining module, configured to obtain a user portrait of the inviter after the inviter sends the invitation link to the invitee and the invitee triggers the invitation link;
a third determining module, configured to determine an identity of the inviter based on the user representation, where the identity includes a normal user and an abnormal user;
and the storage module is used for storing the binding relationship among the identity identifications of the inviter, the invitee and the inviter.
In an optional implementation, the apparatus further comprises:
and the first deleting module is used for deleting the binding relationship after executing the process of rewarding the inviter and/or the invitee.
In an optional implementation, the apparatus further comprises:
and the second deleting module is used for deleting the binding relationship after intercepting a process of rewarding the inviter and/or the invitee.
In a third aspect, the present application shows an electronic device comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of allocating resource information as described in the first aspect.
In a fourth aspect, the present application illustrates a non-transitory computer-readable storage medium having instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the method of allocating resource information as described in the first aspect.
In a fifth aspect, the present application shows a computer program product, in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the method of allocating resource information according to the first aspect.
The technical scheme provided by the application can comprise the following beneficial effects:
in the application, a registration event that an invitee registers an account of the invitee based on an invitation link is acquired, wherein the invitation link is sent to the invitee by the invitee in advance; acquiring the binding relationship among the identity identifications of an inviter, an invited inviter and the inviter according to the registration event; determining whether the inviter is a normal user based on the binding relationship; and in the case that the inviter is a normal user, executing the flow of allocating the resource information to the account of the inviter and/or allocating the resource information to the account of the invitee.
In this application, the network platform may allocate resource information to the account of the inviter and/or allocate resource information to the account of the invitee only when the inviter is a normal user, and may not allocate resource information to the account of the inviter and/or may not allocate resource information to the account of the invitee when the inviter is an abnormal user, for example, when the inviter is a lawless person.
Therefore, lawbreakers cannot make illegal profit by illegal invitation registration, and the power of the lawbreakers for the illegal invitation registration is reduced, so that the behavior of the lawbreakers for the illegal invitation registration can be reduced, the lawbreakers can be prevented from continuously making the illegal invitation registration in a short time for the benefit, the abnormal load on the network platform can be avoided, and the safety risk of the network platform can be reduced.
In addition, in the prior art, when an invitee triggers the invitation link sent by the inviter and registers an account on the network platform based on the invitation link, the network platform will obtain the user representation of the inviter, and then determine the identity of the inviter according to the user representation of the inviter. However, the process of obtaining the user representation of the inviter and the process of determining the id of the inviter according to the user representation of the inviter take a long time, which results in that the invitee needs to wait for a long time to obtain the reward result fed back by the network platform after registering the account, and thus the user experience is low.
The method supports that after an invitee triggers an invitation link sent by the inviter, a network platform starts to acquire a user portrait of the inviter, determines an identity of the inviter according to the user portrait of the inviter, then records the identity of the inviter, and when the invitee registers an account on the network platform based on the invitation link later, the network platform can directly search the recorded identity of the inviter, and then determines whether resource information needs to be allocated to the account of the inviter and/or resource information needs to be allocated to the account of the invitee according to the identity of the inviter.
That is, in the prior art, after the invitee triggers the invitation link sent by the inviter and registers an account on the network platform based on the invitation link, the network platform will start to determine the identity information of the inviter;
in the application, after the invitee triggers the invitation link sent by the inviter, the network platform starts to determine the identity information of the inviter; therefore, when the invitee registers the account on the network platform based on the invitation link, the network platform may already determine and record the identity information of the inviter, so that the network platform can directly use the recorded identity of the inviter without performing a complete process of acquiring the user portrait of the inviter and determining the identity of the inviter according to the user portrait of the inviter.
Therefore, the invitee does not need to wait for the process of acquiring the user portrait of the inviter and the process of determining the identity of the inviter according to the user portrait of the inviter, so that the invitee can obtain the reward result fed back by the network platform without waiting for a long time after registering the account, and the user experience is improved.
Drawings
Fig. 1 is a flowchart illustrating steps of a method for allocating resource information according to the present application.
FIG. 2 is a flow chart of steps of a method of allocating resource information according to the present application.
Fig. 3 is a block diagram of an apparatus for allocating resource information according to the present application.
Fig. 4 is a block diagram of an electronic device shown in the present application.
Fig. 5 is a block diagram of an electronic device shown in the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating steps of a method for allocating resource information according to the present application is shown, where the method is applied to a network platform, and the method specifically may include the following steps:
in step S101, a registration event in which an invitee registers an account of the invitee based on an invitation link that the invitee previously sent to the invitee is acquired;
in the present application, a user who has registered an account on a network platform may invite others to register an account on the network platform when he wants to get the rewards of the network platform. The user is the inviter and the others are the invitees.
The inviter may generate an invitation link on its account and then send the invitation link to the invitee, which may trigger the invitation link to enter a details page corresponding to the invitation link, where a registration window is included for registering the account.
After the inviter sends the invitation link to the invitee and the invitee triggers the invitation link, the network platform may obtain a user representation of the inviter.
The network platform can bind the invitation link with an account number of an account of an inviter when the inviter has the account number of the inviter on the network platform and generates the invitation link in the account of the inviter, so that after the invitee triggers the invitation link, the network platform can obtain a triggering event that the invitee triggers the invitation link, then determine the account number of the inviter bound with the invitation link, then obtain a user portrait of the inviter according to the account number of the inviter, then determine an identity of the inviter based on the user portrait, wherein the identity comprises a normal user and an abnormal user, and store the binding relationship among the identity of the inviter, the invitee and the inviter.
In one embodiment, the inviter may send the invitation link to the invitee on the social platform, the invitee receives the invitation link on the social platform, the invitee has a platform ID (identity document) of the social platform, after the invitee triggers the invitation link on the social platform, the invitee sends a trigger event and the platform ID of the invitee on the social platform to the network platform, and the network platform combines an account number of an account of the inviter on the network platform, the platform ID of the invitee on the social platform, and the identity of the inviter into a corresponding entry and stores the corresponding entry, thereby implementing storage of the binding relationship between the identities of the inviter, the invitee, and the inviter.
The network platform can acquire information such as historical behavior data of an inviter, an IP address of the inviter, a platform ID, a mobile phone number, a micro signal and a QQ number of the inviter, then calculate an identity value of the inviter according to a specific algorithm based on the information such as the historical behavior data of the inviter, the IP (Internet Protocol) address of the inviter, the platform ID, the mobile phone number, the micro signal and the QQ number of the inviter, determine that the inviter is an abnormal user when the identity value of the inviter is higher than a preset threshold value, and determine that the inviter is a normal user when the identity value of the inviter is lower than the preset threshold value. The identity of the inviter may also be determined in other ways, and the specific determination way is not limited in the present application.
In the application, the normal user is a common user, the abnormal user is a user illegally obtaining rewards through malicious invitation behaviors, the malicious invitation behaviors violate reward rules of the network platform, and the network platform rewards the normal user only and does not reward malicious users.
After the invitee enters the detail page corresponding to the invitation link on the social platform, personal information can be input on a registration window of the detail page, and then a registration button is clicked to submit a registration event to the network platform, wherein the registration event comprises an account number of the inviter on the network platform and a platform ID of the invitee on the social platform, and the network platform receives the registration event that the invitee registers the account of the invitee based on the invitation link. Then, step S102 is executed.
In step S102, acquiring a binding relationship between identities of an inviter, an invitee, and an inviter according to the registration event;
the binding relationship is generated after the inviter sends the invitation link to the invitee in advance, and the invitee triggers the invitation link, which can be specifically referred to in the related description of step S101.
The network platform can determine the invitation link based on the registration event, then can determine an account number of an account of the inviter on the network platform bound with the invitation link, and then the invitation link is sent to the social platform of the invitee, therefore, the network platform can also determine a platform ID of the invitee on the social platform based on the registration event of the invitation link, then can determine the binding relationship based on the account number of the inviter on the network platform and the platform ID of the invitee on the social platform, and then determine whether the inviter is a normal user based on the binding relationship.
In step S103, it is determined whether the inviter is a normal user based on the binding relationship;
the identity identifier in the binding relationship can be checked to indicate whether the user identity is an abnormal user or a normal user.
In the case where the inviter is a normal user, in step S104, a process of allocating resource information to the account of the inviter and/or allocating resource information to the account of the invitee is performed.
In the case where the inviter is a normal user, then resource information may be allocated to the account of the inviter and/or resource information may be allocated to the account of the invitee in order to comply with the reward commitment of the network platform.
Wherein the allocating resource information for the account of the inviter includes: allocating a red packet, a voucher, a full reduction voucher and the like to the account of the inviter, wherein the inviter can consume the red packet, the voucher and the full reduction voucher in the account on the network platform; alternatively, the method may further include: the method includes the steps of allocating miracle and other virtual ore assets to the account of the inviter, for example, determining a value to be allocated corresponding to the invitation behavior, then calculating a sum value between the value to be allocated and a value already existing in the account of the inviter, then replacing the value already existing in the account of the inviter based on the sum value, and the like.
The allocation of the resource information to the account of the invitee may refer to the manner in which the resource information is allocated to the account of the inviter, and will not be described in detail herein.
In the case that the inviter is an abnormal user, in step S105, a flow of allocating resource information to the account of the inviter and/or allocating resource information to the account of the invitee is intercepted.
If the inviter is an abnormal user, it indicates that the inviter wants to illegally obtain the reward through a malicious invitation behavior, and thus the abnormal user may continuously perform illegal invitation registration in a short time for benefit, but this may bring an abnormal load to the network platform, resulting in a higher security risk of the network platform, and therefore, a process of allocating resource information to an account of the inviter and/or allocating resource information to an account of the invitee may be intercepted, that is, allocating resource information to an account of the inviter and/or allocating resource information to an account of the invitee is not performed.
In the application, a registration event that an invitee registers an account of the invitee based on an invitation link is acquired, wherein the invitation link is sent to the invitee by the invitee in advance; acquiring the binding relationship among the identity identifications of an inviter, an invited inviter and the inviter according to the registration event; determining whether the inviter is a normal user based on the binding relationship; and in the case that the inviter is a normal user, executing the flow of allocating the resource information to the account of the inviter and/or allocating the resource information to the account of the invitee.
In this application, the network platform may allocate resource information to the account of the inviter and/or allocate resource information to the account of the invitee only when the inviter is a normal user, and may not allocate resource information to the account of the inviter and/or may not allocate resource information to the account of the invitee when the inviter is an abnormal user, for example, when the inviter is a lawless person.
Therefore, lawbreakers cannot make illegal profit by illegal invitation registration, and the power of the lawbreakers for the illegal invitation registration is reduced, so that the behavior of the lawbreakers for the illegal invitation registration can be reduced, the lawbreakers can be prevented from continuously making the illegal invitation registration in a short time for the benefit, the abnormal load on the network platform can be avoided, and the safety risk of the network platform can be reduced.
In addition, in the prior art, when an invitee triggers the invitation link sent by the inviter and registers an account on the network platform based on the invitation link, the network platform will obtain the user representation of the inviter, and then determine the identity of the inviter according to the user representation of the inviter. However, the process of obtaining the user representation of the inviter and the process of determining the id of the inviter according to the user representation of the inviter take a long time, which results in that the invitee needs to wait for a long time to obtain the reward result fed back by the network platform after registering the account, and thus the user experience is low.
The method supports that after an invitee triggers an invitation link sent by the inviter, a network platform starts to acquire a user portrait of the inviter, determines an identity of the inviter according to the user portrait of the inviter, then records the identity of the inviter, and when the invitee registers an account on the network platform based on the invitation link later, the network platform can directly search the recorded identity of the inviter, and then determines whether resource information needs to be allocated to the account of the inviter and/or resource information needs to be allocated to the account of the invitee according to the identity of the inviter.
That is, in the prior art, after the invitee triggers the invitation link sent by the inviter and registers an account on the network platform based on the invitation link, the network platform will start to determine the identity information of the inviter;
in the application, after the invitee triggers the invitation link sent by the inviter, the network platform starts to determine the identity information of the inviter; therefore, when the invitee registers the account on the network platform based on the invitation link, the network platform may already determine and record the identity information of the inviter, so that the network platform can directly use the recorded identity of the inviter without performing a complete process of acquiring the user portrait of the inviter and determining the identity of the inviter according to the user portrait of the inviter.
Therefore, the invitee does not need to wait for the process of acquiring the user portrait of the inviter and the process of determining the identity of the inviter according to the user portrait of the inviter, so that the invitee can obtain the reward result fed back by the network platform without waiting for a long time after registering the account, and the user experience is improved.
In this embodiment of the present application, in a scenario where an inviter invites an invitee to register an account based on the invitation link, it may be that the inviter is a normal user, but the invitee is an abnormal user, in this case, in order to avoid that an lawless person continuously performs an illegal invitation registration in a short time for the benefit, thereby avoiding bringing an abnormal load to a network platform, and further reducing the security risk of the network platform, in another embodiment of the present application, referring to fig. 2, in a case where the inviter is a normal user, in step S201, it is determined whether the invitee is a normal user;
in this step, reference may be specifically made to a determination process of determining whether the inviter is a normal user in step S101, which is not described in detail herein.
If the invitee is a normal user, the step S104 is executed again: and executing the flow of allocating the resource information to the account of the inviter and/or allocating the resource information to the account of the invitee.
If the invitee is an abnormal user, step S105 is executed again: and intercepting a flow of allocating resource information to the account of the inviter and/or allocating resource information to the account of the invitee.
Further, the binding may not be used after the process of rewarding the inviter and/or invitee is performed, and thus, the binding may be deleted in order to save the storage space of the network platform.
Further, the binding relationship is not used after intercepting the process of rewarding the inviter and/or invitee, and therefore, the binding relationship may be deleted in order to save the storage space of the network platform.
It is noted that, for simplicity of explanation, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will appreciate that the present application is not limited by the order of acts, as some steps may, in accordance with the present application, occur in other orders and concurrently. Further, those skilled in the art will also appreciate that the embodiments described in the specification are exemplary and that no action is necessarily required in this application.
Referring to fig. 3, a block diagram of a device for allocating resource information according to the present application is shown, where the device may specifically include the following modules:
a first obtaining module 11, configured to obtain a registration event for an invitee to register an account of the invitee based on an invitation link, where the invitation link is sent by the inviter to the invitee in advance;
a second obtaining module 12, configured to obtain, according to the registration event, a binding relationship among the identities of the inviter, the invitee, and the inviter, where the binding relationship is generated after the inviter sends the invitation link to the invitee in advance and the invitee triggers the invitation link;
a first determining module 13, configured to determine whether the inviter is a normal user based on the binding relationship;
and the execution module 14 is configured to execute a process of allocating resource information in an account of the inviter and/or allocating resource information in an account of the invitee, if the inviter is a normal user.
In an optional implementation, the apparatus further comprises:
and the intercepting module is used for intercepting the flow of allocating the resource information in the account of the inviter and/or allocating the resource information in the account of the invitee under the condition that the inviter is an abnormal user.
In an optional implementation, the apparatus further comprises:
a second determining module, configured to determine whether the invitee is a normal user when the inviter is a normal user;
the execution module is further configured to execute a process of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee, when the invitee is a normal user.
In an optional implementation, the apparatus further comprises:
the interception module is further configured to: and if the invitee is an abnormal user, intercepting a flow of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
In an optional implementation, the apparatus further comprises:
a third obtaining module, configured to obtain a user portrait of the inviter after the inviter sends the invitation link to the invitee and the invitee triggers the invitation link;
a third determining module, configured to determine an identity of the inviter based on the user representation, where the identity includes a normal user and an abnormal user;
and the storage module is used for storing the binding relationship among the identity identifications of the inviter, the invitee and the inviter.
In an optional implementation, the apparatus further comprises:
and the first deleting module is used for deleting the binding relationship after executing the process of rewarding the inviter and/or the invitee.
In an optional implementation, the apparatus further comprises:
and the second deleting module is used for deleting the binding relationship after intercepting a process of rewarding the inviter and/or the invitee.
In the application, a registration event that an invitee registers an account of the invitee based on an invitation link is acquired, wherein the invitation link is sent to the invitee by the invitee in advance; acquiring the binding relationship among the identity identifications of an inviter, an invited inviter and the inviter according to the registration event; determining whether the inviter is a normal user based on the binding relationship; and in the case that the inviter is a normal user, executing the flow of allocating the resource information to the account of the inviter and/or allocating the resource information to the account of the invitee.
In this application, the network platform may allocate resource information to the account of the inviter and/or allocate resource information to the account of the invitee only when the inviter is a normal user, and may not allocate resource information to the account of the inviter and/or may not allocate resource information to the account of the invitee when the inviter is an abnormal user, for example, when the inviter is a lawless person.
Therefore, lawbreakers cannot make illegal profit by illegal invitation registration, and the power of the lawbreakers for the illegal invitation registration is reduced, so that the behavior of the lawbreakers for the illegal invitation registration can be reduced, the lawbreakers can be prevented from continuously making the illegal invitation registration in a short time for the benefit, the abnormal load on the network platform can be avoided, and the safety risk of the network platform can be reduced.
In addition, in the prior art, when an invitee triggers the invitation link sent by the inviter and registers an account on the network platform based on the invitation link, the network platform will obtain the user representation of the inviter, and then determine the identity of the inviter according to the user representation of the inviter. However, the process of obtaining the user representation of the inviter and the process of determining the id of the inviter according to the user representation of the inviter take a long time, which results in that the invitee needs to wait for a long time to obtain the reward result fed back by the network platform after registering the account, and thus the user experience is low.
The method supports that after an invitee triggers an invitation link sent by the inviter, a network platform starts to acquire a user portrait of the inviter, determines an identity of the inviter according to the user portrait of the inviter, then records the identity of the inviter, and when the invitee registers an account on the network platform based on the invitation link later, the network platform can directly search the recorded identity of the inviter, and then determines whether resource information needs to be allocated to the account of the inviter and/or resource information needs to be allocated to the account of the invitee according to the identity of the inviter.
That is, in the prior art, after the invitee triggers the invitation link sent by the inviter and registers an account on the network platform based on the invitation link, the network platform will start to determine the identity information of the inviter;
in the application, after the invitee triggers the invitation link sent by the inviter, the network platform starts to determine the identity information of the inviter; therefore, when the invitee registers the account on the network platform based on the invitation link, the network platform may already determine and record the identity information of the inviter, so that the network platform can directly use the recorded identity of the inviter without performing a complete process of acquiring the user portrait of the inviter and determining the identity of the inviter according to the user portrait of the inviter.
Therefore, the invitee does not need to wait for the process of acquiring the user portrait of the inviter and the process of determining the identity of the inviter according to the user portrait of the inviter, so that the invitee can obtain the reward result fed back by the network platform without waiting for a long time after registering the account, and the user experience is improved.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 4 is a block diagram of an electronic device 800 shown in the present application. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 4, electronic device 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operation at the device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, images, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as WiFi, a carrier network (such as 2G, 3G, 4G, or 5G), or a combination thereof. In an exemplary embodiment, the communication component 816 receives broadcast signals or broadcast operation information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the electronic device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Fig. 5 is a block diagram of an electronic device 1900 shown in the present application. For example, the electronic device 1900 may be provided as a server.
Referring to fig. 5, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. The electronic device 1900 may operate based on an operating system stored in memory 1932, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method and the apparatus for allocating resource information provided by the present application are introduced in detail, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (16)

1. A method for allocating resource information, the method comprising:
acquiring a registration event of an invitee registering an account of the invitee based on an invitation link, wherein the invitation link is sent to the invitee by the invitee in advance;
acquiring a binding relationship among the identity identifiers of the inviter, the invitee and the inviter according to the registration event, wherein the binding relationship is generated after the inviter sends the invitation link to the invitee in advance and the invitee triggers the invitation link;
determining whether the inviter is a normal user based on the binding relationship;
and if the inviter is a normal user, executing a process of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
2. The method of claim 1, further comprising:
and if the inviter is an abnormal user, intercepting a flow of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
3. The method of claim 1, further comprising:
determining whether the invitee is a normal user in the case that the inviter is a normal user;
and under the condition that the invitee is a normal user, executing a process of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
4. The method of claim 3, further comprising:
and if the invitee is an abnormal user, intercepting a flow of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
5. The method of claim 1, wherein obtaining the registration event that invitees register accounts for the invitees based on invitation links is preceded by:
obtaining a user representation of the inviter after the inviter sends the invitation link to the invitee and the invitee triggers the invitation link;
determining an identity of the inviter based on the user representation, the identity including a normal user and an abnormal user;
storing the binding relation among the identity identifications of the inviter, the invitee and the inviter.
6. The method according to any one of claims 1-5, further comprising:
deleting the binding after performing a process of rewarding the inviter and/or the invitee.
7. The method according to claim 2 or 4, characterized in that the method further comprises:
deleting the binding relationship after intercepting a flow of rewarding for the inviter and/or the invitee.
8. An apparatus for allocating resource information, the apparatus comprising:
a first obtaining module, configured to obtain a registration event for an invitee to register an account of the invitee based on an invitation link, where the invitation link is sent by the inviter to the invitee in advance;
a second obtaining module, configured to obtain, according to the registration event, a binding relationship between the identities of the inviter, the invitee, and the inviter, where the binding relationship is generated after the inviter sends the invitation link to the invitee in advance and the invitee triggers the invitation link;
a first determining module, configured to determine whether the inviter is a normal user based on the binding relationship;
and the execution module is used for executing the process of allocating the resource information in the account of the inviter and/or allocating the resource information in the account of the invitee under the condition that the inviter is a normal user.
9. The apparatus of claim 8, further comprising:
and the intercepting module is used for intercepting the flow of allocating the resource information in the account of the inviter and/or allocating the resource information in the account of the invitee under the condition that the inviter is an abnormal user.
10. The apparatus of claim 8, further comprising:
a second determining module, configured to determine whether the invitee is a normal user when the inviter is a normal user;
the execution module is further configured to execute a process of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee, when the invitee is a normal user.
11. The apparatus of claim 10, further comprising:
the interception module is further configured to: and if the invitee is an abnormal user, intercepting a flow of allocating resource information in the account of the inviter and/or allocating resource information in the account of the invitee.
12. The apparatus of claim 8, further comprising:
a third obtaining module, configured to obtain a user portrait of the inviter after the inviter sends the invitation link to the invitee and the invitee triggers the invitation link;
a third determining module, configured to determine an identity of the inviter based on the user representation, where the identity includes a normal user and an abnormal user;
and the storage module is used for storing the binding relationship among the identity identifications of the inviter, the invitee and the inviter.
13. The apparatus of any one of claims 8-12, further comprising:
and the first deleting module is used for deleting the binding relationship after executing the process of rewarding the inviter and/or the invitee.
14. The apparatus of claim 9 or 11, further comprising:
and the second deleting module is used for deleting the binding relationship after intercepting a process of rewarding the inviter and/or the invitee.
15. An electronic device, characterized in that the electronic device comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of allocating resource information according to any one of claims 1-7.
16. A non-transitory computer readable storage medium, instructions in which, when executed by a processor of an electronic device, enable the electronic device to perform the method of allocating resource information of any one of claims 1-7.
CN202010358467.9A 2020-04-29 2020-04-29 Method and device for distributing resource information Pending CN111681034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010358467.9A CN111681034A (en) 2020-04-29 2020-04-29 Method and device for distributing resource information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010358467.9A CN111681034A (en) 2020-04-29 2020-04-29 Method and device for distributing resource information

Publications (1)

Publication Number Publication Date
CN111681034A true CN111681034A (en) 2020-09-18

Family

ID=72433940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010358467.9A Pending CN111681034A (en) 2020-04-29 2020-04-29 Method and device for distributing resource information

Country Status (1)

Country Link
CN (1) CN111681034A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113781080A (en) * 2020-11-03 2021-12-10 北京沃东天骏信息技术有限公司 Method, device, equipment and storage medium for allocating resources

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135195A (en) * 2017-02-20 2017-09-05 平安科技(深圳)有限公司 The detection method and device of abnormal user account
CN108718342A (en) * 2018-05-31 2018-10-30 康键信息技术(深圳)有限公司 The foundation and management method of application platform customer relationship, server and storage medium
CN109150894A (en) * 2018-09-12 2019-01-04 珠海豆饭科技有限公司 A kind of method and system for identifying malicious user
CN110222280A (en) * 2019-05-31 2019-09-10 上海易点时空网络有限公司 Data processing method and device for sharing
CN110430292A (en) * 2019-08-05 2019-11-08 北京字节跳动网络技术有限公司 Invite method, apparatus, electronic equipment and the readable medium of logging in network platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135195A (en) * 2017-02-20 2017-09-05 平安科技(深圳)有限公司 The detection method and device of abnormal user account
CN108718342A (en) * 2018-05-31 2018-10-30 康键信息技术(深圳)有限公司 The foundation and management method of application platform customer relationship, server and storage medium
CN109150894A (en) * 2018-09-12 2019-01-04 珠海豆饭科技有限公司 A kind of method and system for identifying malicious user
CN110222280A (en) * 2019-05-31 2019-09-10 上海易点时空网络有限公司 Data processing method and device for sharing
CN110430292A (en) * 2019-08-05 2019-11-08 北京字节跳动网络技术有限公司 Invite method, apparatus, electronic equipment and the readable medium of logging in network platform

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113781080A (en) * 2020-11-03 2021-12-10 北京沃东天骏信息技术有限公司 Method, device, equipment and storage medium for allocating resources

Similar Documents

Publication Publication Date Title
CN108064373B (en) Resource transfer method and device
EP3276910A1 (en) Bluetooth-based identity recognition method and device
CN107888965B (en) Image gift display method and device, terminal, system and storage medium
CN112464110B (en) Method, device, server, client, terminal and storage medium for conducting vein promotion in application with social function
CN109814942B (en) Parameter processing method and device
CN112785344A (en) Advertisement putting method and device, electronic equipment and storage medium
CN111724233B (en) Vehicle order processing method, device, electronic equipment and storage medium
CN110690979B (en) Group message processing method, device, server, client and storage medium
CN111681034A (en) Method and device for distributing resource information
US20170201479A1 (en) Group message display method, device and medium
EP3032487A1 (en) Methods for granting qualification, method for acquiring qualification, and devices thereof
CN111221593A (en) Dynamic loading method and device
CN107070816B (en) Application identification method and device and mobile terminal
CN110764847A (en) User information processing method and device, electronic equipment and storage medium
CN111723353A (en) Identity authentication method, device, terminal and storage medium based on face recognition
CN112651012B (en) Information processing method and device
CN110457084B (en) Loading method and device
CN108762944B (en) Processing method, device, equipment and medium of business system
CN112102009A (en) Advertisement display method, device, equipment and storage medium
CN108737523B (en) Method and device for associating application module with account, hardware device and medium
CN109246322B (en) Information processing method and system
CN109409097B (en) Information management method, device and computer readable storage medium
CN112035246A (en) Method, device and system for acquiring virtual resources, electronic equipment and storage medium
CN111061633A (en) Method, device, terminal and medium for detecting first screen time of webpage
CN111681033A (en) Method and device for compensating resource information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200918

RJ01 Rejection of invention patent application after publication