CN111709773A - User management method, user management device and server - Google Patents

User management method, user management device and server Download PDF

Info

Publication number
CN111709773A
CN111709773A CN202010443977.6A CN202010443977A CN111709773A CN 111709773 A CN111709773 A CN 111709773A CN 202010443977 A CN202010443977 A CN 202010443977A CN 111709773 A CN111709773 A CN 111709773A
Authority
CN
China
Prior art keywords
user
authority
acquisition
determining
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010443977.6A
Other languages
Chinese (zh)
Inventor
刘新
沈涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN202010443977.6A priority Critical patent/CN111709773A/en
Publication of CN111709773A publication Critical patent/CN111709773A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0235Discounts or incentives, e.g. coupons or rebates constrained by time limit or expiration date
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application is applicable to the technical field of information, and provides a user management method, a user management device, a server and a computer readable storage medium. The method comprises the following steps: determining acquisition data based on the acquisition behavior of the user on the specified resource; determining a target authority matched with the acquired data; and opening the target permission to the user aiming at the specified resource. According to the scheme, the personalized authority management of the user can be realized, and the intention of the user to acquire resources is improved.

Description

User management method, user management device and server
Technical Field
The present application belongs to the field of information technology, and in particular, relates to a user management method, a user management apparatus, a server, and a computer-readable storage medium.
Background
Currently, resource platforms such as online shopping malls and the like which can provide various resources often simply divide users based on the basic data of the users and perform unified authority management operation on the users based on the division results. Considering that the current resource platform cannot realize personalized authority management on each user, the user is easy to have lower intention to acquire resources.
Disclosure of Invention
The application provides a user management method, a user management device, a server and a computer readable storage medium, which can realize personalized authority management on a user and improve the acquisition intention of the user on resources.
In a first aspect, the present application provides a user management method, including:
determining acquisition data based on the acquisition behavior of the user on the specified resource;
determining a target authority matched with the acquired data;
and opening the target authority to the user aiming at the specified resource.
Optionally, the acquiring data includes acquiring times; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method further includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and updating the acquisition times of the user for the specified resources when the occurrence of the acquisition event of the user for the specified resources is monitored.
Optionally, the determining the target authority matched with the acquired data includes:
if the obtaining times are more than 0 and less than a preset first time threshold, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate;
if the obtaining times is not less than the second time threshold, determining a third authority as the target authority, wherein the third authority is associated with a preset third rate;
the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
Optionally, the acquiring data includes an acquiring frequency; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and counting the occurrence frequency of the acquisition events of the user for the specified resources within a preset period time, and updating the acquisition frequency of the user for the specified resources based on the occurrence frequency.
Optionally, the determining the target authority matched with the acquired data includes:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
Optionally, the user management method further includes:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target authority;
and if the timing duration of the timer exceeds the authorized duration associated with the target permission, releasing the target permission of the user for the specified resource.
Optionally, the determining the target authority matched with the acquired data includes:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than the second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
In a second aspect, the present application provides a user management apparatus, comprising:
the data determining unit is used for determining the acquired data based on the acquisition behavior of the user on the specified resource;
the authority determining unit is used for determining the target authority matched with the acquired data;
and the permission opening unit is used for opening the target permission to the user aiming at the specified resource.
Optionally, the acquiring data includes acquiring times; the user management apparatus further includes:
a frequency initialization unit, configured to initialize the acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
accordingly, the data determining unit is specifically configured to update the number of times of acquiring the specified resource by the user when it is monitored that the event of acquiring the specified resource by the user occurs.
Optionally, the permission determination unit includes:
a first determining subunit, configured to determine a first permission as the target permission if the obtaining number is greater than 0 and smaller than a preset first time threshold, where the first permission is associated with a preset first rate;
a second determining subunit, configured to determine a second permission as the target permission if the number of times of acquisition is not less than the first time threshold and is less than a preset second time threshold, where the second permission is associated with a preset second rate;
a third determining subunit, configured to determine a third permission as the target permission if the number of times of acquisition is not less than the second threshold, where the third permission is associated with a preset third rate;
the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
Optionally, the acquiring data includes an acquiring frequency; the user management apparatus further includes:
a frequency initialization unit, configured to initialize an acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
the data determining unit is specifically configured to count occurrence times of the event of acquiring the specified resource by the user within a preset period time, and update the frequency of acquiring the specified resource by the user based on the occurrence times.
Optionally, the permission determination unit includes:
a fourth determining subunit, configured to determine a fourth permission as the target permission if the obtaining frequency is smaller than a preset first frequency threshold, where the fourth permission is associated with a preset fourth rate and the fourth permission is associated with a preset first authorization duration;
a fifth determining subunit, configured to determine a fifth permission as the target permission if the obtaining frequency is not less than the first frequency threshold, where the fifth permission is associated with the fourth rate and is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
Optionally, the user management apparatus further includes:
a timing unit, configured to start a timer to start timing when the target authority is opened to the user;
a duration data determining unit, configured to obtain an authorized duration associated with the target permission;
and the permission removing unit is used for removing the target permission of the user for the specified resource if the timing duration of the timer exceeds the authorized duration associated with the target permission.
Optionally, the permission determination unit includes:
a sixth determining subunit, configured to determine a sixth permission as the target permission if the obtaining frequency is smaller than a preset second frequency threshold, where the sixth permission is associated with a preset fifth rate and the sixth permission is associated with a preset first authorization number;
a seventh determining subunit, configured to determine a seventh permission as the target permission if the obtaining frequency is not less than the second frequency threshold, where the seventh permission is associated with the fifth rate, the seventh permission is associated with a preset second authorization number, and the second authorization number is smaller than the first authorization number.
In a third aspect, the present application provides a server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method according to the first aspect when executing the computer program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the first aspect.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by one or more processors, performs the steps of the method of the first aspect as described above.
As can be seen from the above, in the present application, first, the acquisition data is determined based on the acquisition behavior of the user for the specified resource, then, the target permission matched with the acquisition data is determined, and finally, the target permission can be opened to the user for the specified resource. According to the scheme, the personalized authority management of the user can be realized based on the acquisition data of the user to the designated resource, so that the acquisition intention of the user to the resource is improved. It is understood that the beneficial effects of the second aspect to the fifth aspect can be referred to the related description of the first aspect, and are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of an implementation of a user management method provided in an embodiment of the present application;
fig. 2 is a block diagram of a user management device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
At present, most resource platforms, such as online shopping malls and the like, perform unified authority management on users, for example, uniformly distribute coupons to users on certain holidays, so that users have the authority to purchase specified goods by discounts; or simply classifying the users according to basic data input during user registration, and performing unified authority management on the users in the same category so that the users in a certain category have the same authority for discounting and purchasing the specified goods. The unified management mode of the user permission cannot take care of the personalized resource requirement of each user, so that the user has low intention of acquiring the resource. Based on this, the embodiment of the application provides a user management method, a user management device, a server and a computer-readable storage medium, which can realize personalized management on user rights according to the acquisition condition of the resources of the user, and improve the acquisition intention of the user on the resources to a certain extent. In order to explain the technical solutions proposed in the embodiments of the present application, the following description will be given by way of specific examples.
Example one
A user management method provided in an embodiment of the present application is described below. Referring to fig. 1, the user management method includes:
step 101, determining acquisition data based on the acquisition behavior of the user on the specified resource.
In the embodiment of the application, the resource platform can provide rich resources for the user, and the user can select the resources according to the self requirement. The server can record each resource acquisition operation of the user, so as to obtain the acquisition data of the user on each resource based on the acquisition behavior of the user on each resource.
In an application scenario, the specified resource is a single resource. For example, assuming that the resource platform can provide resources a1, a2, and A3, the resource a1 is used as the designated resource, and the acquired data of the resource a1 by the user 1 can be obtained; with the resource A2 as a designated resource, the acquired data of the resource A2 by the user 1 can be obtained; with resource A3 as the designated resource, user 1's acquired data for resource A3 may be obtained. Alternatively, any resource in the resource platform that meets the preset condition may be used as the designated resource, for example, if the resource platform can provide the resources a1, a2, and A3, and the backend personnel set the resource a1 and the resource A3 as the key resources, the resource a1 may be used as the designated resource, the resource A3 may be used as the designated resource, and the resource a2 may not be used as the designated resource.
Taking a resource platform as a car renting platform, the provided resource is car renting service as an example: assuming that the rental car platform is provided with the rental car service of vehicle car1, it can be written as rental car service 1; car rental service of car2, which may be denoted as car rental service 2; the car rental service of car3 can be written as car rental service 3. It may be that any of the rental car services 1, 2, and 3 may be the designated resource. Or, if the car rental platform is currently using the car rental service 2 as the main push service, the backend personnel can set the car rental service 2 as an important resource, that is, at this time, the car rental service 2 is a designated resource, and the car rental service 1 and the car rental service 3 cannot be used as the designated resource.
Taking a resource platform as a loan platform, and taking the provided resource as a loan service as an example: assuming that the loan platform provides a half-year loan service, it can be written as loan service 1; a year-old debit service, a debitable-credit service 2; the three year loan service may be written as the loan service 3. Any of the loan services 1, 2, and 3 may be designated resources. Alternatively, if the loan platform is currently using the loan service 2 as the main push service, the background personnel may set the loan service 2 as the key resource, that is, the loan service 2 is the designated resource, and the loan service 1 and the loan service 3 cannot be the designated resource.
In another application scenario, the specified resource is a resource set. In the embodiment of the application, resources belonging to the same category can be divided into one resource set to obtain at least one resource set. Any resource set can be used as the designated resource, for example, assuming that the resource platform can provide the resource sets A, B and C, the resource set a is used as the designated resource, and the acquired data of the user 1 on the resource set a can be obtained, specifically, the acquired data of the user on each resource in the resource set a is obtained and summarized; in a similar manner, the acquisition data of user 1 for resource set B and the acquisition data of user 1 for resource set C may be acquired. Alternatively, a resource set meeting a preset condition in the resource platform may be used as the designated resource, for example, if the resource platform can provide the resource sets A, B and C, and the backend personnel set the resource set a and the resource set C as the key resources, the resource set a may be used as a designated resource, the resource set C may also be used as a designated resource, and the resource set B may not be used as a designated resource. It should be noted that the above-mentioned specified resources may also be all resources in the resource platform, that is, all resources in the resource platform may be treated as a whole.
Taking a resource platform as a car renting platform, the provided resource is car renting service as an example: assuming that the rental car platform is provided with the rental car service of vehicle car1, it can be written as rental car service 1; car rental service of car2, which may be denoted as car rental service 2; car rental service of car3, which can be written as car rental service 3; the car rental service of car4 can be referred to as car rental service 4. Since car1 and car2 belong to 5 cars, the car rental platform can divide car rental service 1 and car rental service 2 into the same resource, and form a car rental service set of 5 cars; since car3 and car4 belong to 7 cars, the car rental platform can divide car rental service 3 and car rental service 4 into the same resource, and form a set of car rental services for 7 cars. The 5 car rental service set can be used as one specific resource, and the 7 car rental service set can be used as another specific resource. Or, if the car rental platform is currently using 7 car rental services as the main push service, the backend personnel can set the 7 car rental service sets as the key resources, that is, at this time, the 7 car rental service sets are the designated resources, and the 5 car rental service sets cannot be used as the designated resources.
Taking a resource platform as a loan platform, and taking the provided resource as a loan service as an example: the loan platform is assumed to provide a loan service of seven dates, which can be written as a loan service 1; a monthly debit service, a debit-credit service 2; a three-year-old debit service, which can be written as a debit service 3; the five year old debit service may be credited as debit service 4. Since the loan service 1 and the loan service 2 both belong to loan services with short duration, the loan platform can divide the loan service 1 and the loan service 2 into the same class of resources to form a short-term loan service set; since the loan service 3 and the loan service 4 both belong to loan services with longer duration, the loan service 3 and the loan service 4 can be divided into the same type of resources to form a long-term loan service set. One could be a short term loan service set as one specified resource and a long term loan service set as another specified resource. Or, if the car rental platform is currently using the short-term loan service as the main push service, the background personnel may set the short-term loan service set as the key resource, that is, the short-term loan service set is the designated resource, and the long-term loan service set cannot be the designated resource.
And 102, determining the target authority matched with the acquired data.
In the embodiment of the application, background personnel can preset the authority matched with different acquired data. Optionally, at least one data range may be set for the acquired data in advance, and each data range corresponds to one authority, so as to form an association relationship between the data range of the acquired data and the authority; in this step, the data range in which the acquired data of the specified resource by the user falls may be determined first, and then the authority associated with the data range is searched, where the searched authority is the target authority.
Step 103, opening the target authority to the user aiming at the specified resource.
In the embodiment of the application, after the target authority is determined, the target authority can be opened to the user. It should be noted that the target privilege is only effective for the specified resource. For example, if the resource set a is a designated resource, and the matching target right is determined to be P1 according to the acquired data of the user on the resource set a, the scope of action of P1 of the target right is only within the resource set a.
Optionally, acquiring the data may include acquiring a number of times; before step 101, a user management method proposed in this embodiment of the present application includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
accordingly, step 101, comprises:
and updating the acquisition times of the user for the specified resources when the occurrence of the acquisition event of the user for the specified resources is monitored.
In the embodiment of the application, a user needs to register on a resource platform first, so that the resource platform can input basic information of the user. After the user registration is completed, the server may initialize the number of times the user acquires the specified resource, that is, set the number of times the user acquires the specified resource to 0. It should be noted that the data acquired by the user for the specified resource is updated at any time and stored in the database of the server, so that even if the user logs in the resource platform on a different terminal, the abnormal situation of data acquisition loss or zero clearing does not occur. Once the server monitors that an event of acquiring the specified resource by the user occurs, it may be determined that the user acquires the specified resource once, and at this time, the number of times of acquiring the specified resource by the user may be updated (that is, the number of times of acquiring the specified resource by the user is increased by 1), so that the server determines whether the target right needs to be updated according to the updated number of times of acquiring.
Optionally, step 102 comprises:
if the obtaining times are more than 0 and less than a preset first time threshold, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate, and the second rate is lower than the first rate;
if the obtaining times is not less than the second time threshold, determining a third authority as the target authority;
the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
In the embodiment of the present application, the obtaining times may be divided into three different ranges by using the first time threshold and the second time threshold, each range has a corresponding right, and each right is associated with a different rate.
In one application scenario, the rate may be used to represent a discount when resources are acquired. The following description will be made by taking the designated resource as the car rental service and presenting the increasing relationship with the first rate, the second rate and the third rate as an example:
assume that the first threshold is 3 times, the first rate is 80% (representing a discount of 8), the second threshold is 10 times, the second rate is 85% (representing a discount of 85), and the third rate is 90% (representing a discount of 9). If the detection shows that the user purchases the car renting service, the updating acquisition times are 1, at this time, the authority of the user on the car renting service is updated to be the first authority, and under the first authority, the user can rent the car at 8 folds (namely 80 percent of the rate) subsequently. Once it is detected that the user purchases the car rental service for a plurality of times, so that the number of acquisition times is updated to 3 (i.e., 3 car rents are performed), the authority of the user for the car rental service is updated to a second authority under which the user can subsequently purchase the car rental service at 85 folds (i.e., 85% of the rate). If the user continues to continuously purchase the car rental service, and the number of acquisition times is updated to 10 (namely, 10 car rents are performed), the authority of the user on the car rental service is updated to a third authority, and under the third authority, the user can subsequently purchase the car rental service at 9 folds (namely, 90% of the rate). The setting mode of the authority and the rate can promote the acquisition intention of the user to the resource in the prior period.
Similarly, in this application scenario, the first rate, the second rate, and the third rate may also be in a decreasing relationship. That is, at this time, the more the number of times the user rents the car, the lower the price the user can rent the car, and the later intention of the user to acquire the resource can be promoted.
In another application scenario, the rate may be used to represent an interest rate in acquiring the resource. The following description will be made by taking the specified resource as the loan service and presenting the increasing relationship with the first rate, the second rate and the third rate as an example:
assume that the first time threshold is 1, the first rate is 2%, the second time threshold is 5, the second rate is 4%, and the third rate is 10%. And if the detection shows that the user uses the loan service to make a loan, updating the acquisition times to be 1, updating the user's right to the loan service to be a first right at the moment, and making a loan by the user at a rate of interest of 2% subsequently under the first right. Once it is detected that the user makes loans multiple times so that the number of acquisitions is updated to 3 (i.e., when 3 loans are made), the user's right to the loan service is updated to a second right under which the user subsequently makes loans at a rate of 4%. If the user continues to make a loan until the number of acquisitions is updated to 10 (i.e., 10 loans are made), the user's right to the loan service is updated to a third right under which the user makes a subsequent loan at an interest rate of 10%. The setting mode of the authority and the rate can promote the acquisition intention of the user to the resource in the prior period.
Similarly, in this application scenario, the first rate, the second rate, and the third rate may also be in a decreasing relationship. That is, at this time, the more the user loans, the lower interest the user can borrow, and the intention of the user to acquire resources can be promoted at a later stage.
Optionally, acquiring the data may include acquiring a frequency; before step 101, a user management method proposed in this embodiment of the present application includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
accordingly, step 101 comprises:
and counting the occurrence frequency of the acquisition events of the user for the specified resources within a preset period time, and updating the acquisition frequency of the user for the specified resources based on the occurrence frequency.
In the embodiment of the application, a user needs to register on a resource platform first, so that the resource platform can input basic information of the user. After the user registration is completed, the server may initialize the acquisition frequency of the user for the specified resource, that is, set the acquisition frequency of the user for the specified resource to 0 times/cycle time. The cycle time may be set by the user or by the server, and may be, for example, a cycle time of one week or a cycle time of one month, which is not limited herein. The server may count the number of occurrences of the event of acquiring the specified resource by the user within a set cycle time, and update the frequency of acquiring the specified resource by the user based on the number of occurrences.
Optionally, step 102 comprises:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
In the embodiment of the present application, it may be understood that only the rough division is performed on the acquisition frequency, for example, the division is performed by a preset first frequency threshold to two frequency ranges, namely, a low frequency range and a high frequency range, where a frequency smaller than the frequency threshold is the low frequency range, and a frequency greater than or equal to the frequency threshold is the high frequency range. Each frequency range has a corresponding right, and each right is associated with a different authorization time.
The following description will be made by taking the designated resource as a car rental service as an example:
each associated with a different authorization time. Assuming that the first frequency threshold is 10 times/month, the fourth rate is 90%, the first authorization duration is 1 week, and the second authorization duration is 2 weeks. When it is detected that the frequency of purchasing the car rental service (i.e., the acquisition frequency) of the user does not reach 3 times/week, the authority of the user for the car rental service may be determined as a fourth authority under which the user can purchase the car rental service at 9 folds (i.e., 90% of the rate) in the next 1 week. Upon detecting that the user purchases the rental car service a plurality of times within the period time such that the acquisition frequency is updated to 3 times/week, the authority of the user for the rental car service may be updated to a fifth authority under which the user purchases the rental car service at 9 folds (i.e., 90% rate) within the next 2 weeks.
The following description will be made by taking the designated resource as the loan service as an example:
each associated with a different authorization time. Assuming that the first frequency threshold is 3 times/3 years, the fourth rate is 4%, the first authorization duration is 1 year, and the second authorization duration is 2 years. When it is detected that the frequency of using the loan service (i.e., making loans) by the user is less than 3 times/3 years, the user's right to the loan service may be determined as a fourth right under which the user can make loans with an interest rate of 4% in the next 1 year. Once it is detected that the user makes loans a number of times within the cycle time such that the acquisition frequency is updated to 3/3 years, the user's right to the loan service may be updated to a fifth right under which the user can make loans with an interest rate of 4% within the next 2 years.
Optionally, in order to timely recover the expired rights, the user management method further includes:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target authority;
and if the timing duration of the timer exceeds the authorized duration associated with the target permission, releasing the target permission of the user for the specified resource.
In the embodiment of the application, when the target authority is associated with the authorization duration, a timer can be started to start timing at the moment of opening the target authority to the user, and once the timing duration of the timer exceeds the authorization duration associated with the target authority, the target authority of the user for the specified resource is withdrawn. It should be noted that, if the timing duration does not reach the authorized duration when entering the new cycle time, the server still opens the target permission of the designated resource to the user; when the timing duration reaches the authorization duration and the target authority of the user for the specified resource is released, the server opens a new target authority for the user according to the acquisition frequency in the new cycle time so as to update the target authority.
Optionally, step 102 comprises:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than a preset second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
In the embodiment of the present application, the acquisition frequency is roughly divided by a preset second frequency threshold, where the second frequency threshold may be the same as the first frequency threshold or different from the first frequency threshold, and is not limited herein. Each frequency range obtained by the division through the second frequency threshold has a corresponding authority, and each authority is associated with different authorization times. That is, the user may only acquire the specified resource a limited number of times, set by the number of authorizations, using the rate associated with the target privilege at most.
The following description will be made by taking the designated resource as a car rental service as an example:
assuming that the second frequency threshold is 10 times/month, the fifth rate is 90%, the first authorization time is 3 times, and the second authorization time is 1 time. When it is detected that the frequency (i.e., the acquisition frequency) of purchasing the car rental service by the user does not reach 10 times/week, the authority of the user for the car rental service may be determined as a sixth authority under which the user can purchase the car rental service at 9 folds (i.e., 90% of the rate) when purchasing the car rental service 3 times later. Upon detecting that the user purchases the rental car service a plurality of times within the period time such that the acquisition frequency is updated to 10 times/month, the authority of the user for the rental car service may be updated to a seventh authority under which the user can purchase the rental car service at 9 discount (i.e., 90% rate) 1 time later when the user purchases the rental car service.
The following description will be made by taking the designated resource as the loan service as an example:
assume that the second frequency threshold is 5 times/year, the fifth rate is 5%, the first authorization number is 3 times, and the second authorization number is 1 time. When it is detected that the frequency of making loans by the user (i.e., the acquisition frequency) does not reach 5 times/year, the user's right for the loan service may be determined as a sixth right under which the user can make loans 3 times later with an interest rate of 5%. Once it is detected that the user makes loans a number of times within the cycle time such that the acquisition frequency is updated to 5 times/year, the user's right to the loan service may be updated to a seventh right under which the user may make loans 1 time later at an interest rate of 5%.
It should be noted that, the target authority of the user may be updated each time the acquisition frequency of the user for the specified resource changes; or, after the user acquires the specified resource under the target authority for the authorization number (that is, after the authorization number is used up), the target authority of the user may be updated, which is not limited herein.
Optionally, when the number of times of acquiring the specified resource by the user does not reach a preset third time threshold, determining the matched target permission based on the number of times of acquiring; and after the acquisition times of the user on the specified resources reach a preset third time threshold value, immediately converting to determine the matched target authority based on the acquisition frequency, wherein the third time threshold value is greater than the second time threshold value.
Optionally, in order to enable the user to timely acquire the target authority issued by the server for the specified resource, the server may push the target authority obtained by the user in the form of a coupon, or a notification message. The coupon is taken as an example for explanation: the coupon can list the designated resource for obtaining the target authority and the rate (i.e. discount) associated with the target authority; when the target authority is associated with the authorization duration, the authorization duration can be listed in the coupon, and at the moment, the coupon can be kept effective in the authorization duration and can be used repeatedly; when the target authority is associated with the authorization times, the authorization times can be represented by the number of the coupons, and at the moment, the used coupons are correspondingly eliminated every time one coupon is used, so that the user can know the remaining authorization times through the number of the remaining coupons.
Optionally, after obtaining the target permission for the specified resource, the user may also send permission sharing information to other users; after receiving the permission sharing information sent by the user, other users can also enjoy the same target permission as the user for the specified resource. To avoid abuse of rights, the server may set a share time limit to limit the number of times the user shares the target rights. The coupon is taken as an example for explanation: the user can share the obtained coupon to other users, so that other users can also obtain (purchase) the specified resource by using the coupon.
Therefore, in the embodiment of the application, the acquisition data of the user on the specified resource can be tracked based on the acquisition behavior of the user on the specified resource, the target authority of the user on the specified resource is updated in time according to the acquisition data, and the user can acquire the specified resource at a certain rate under the target authority. Through the process, the personalized authority management of the user is realized, and the acquisition intention of the user on the specified resources can be improved.
Example two
The second embodiment of the application provides a user management device. As shown in fig. 2, the user management apparatus 200 in the embodiment of the present application includes:
a data determination unit 201, configured to determine acquisition data based on an acquisition behavior of a user for a specified resource;
an authority determining unit 202, configured to determine a target authority that matches the acquired data;
an authority opening unit 203, configured to open the target authority to the user for the specified resource.
Optionally, the acquiring data includes acquiring times; the user management apparatus 200 further includes:
a frequency initialization unit, configured to initialize the acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
accordingly, the data determining unit 201 is specifically configured to update the number of times of acquiring the specified resource by the user when it is monitored that the event of acquiring the specified resource by the user occurs.
Optionally, the permission determination unit 202 includes:
a first determining subunit, configured to determine a first permission as the target permission if the obtaining number is greater than 0 and smaller than a preset first time threshold, where the first permission is associated with a preset first rate;
a second determining subunit, configured to determine a second permission as the target permission if the number of times of acquisition is not less than the first time threshold and is less than a preset second time threshold, where the second permission is associated with a preset second rate;
a third determining subunit, configured to determine a third permission as the target permission if the number of times of acquisition is not less than the second threshold, where the third permission is associated with a preset third rate;
wherein, the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
Optionally, the acquiring data includes an acquiring frequency; the user management apparatus 200 further includes:
a frequency initialization unit, configured to initialize an acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
the data determining unit 201 is specifically configured to count occurrence times of the event of acquiring the specified resource by the user within a preset period time, and update the frequency of acquiring the specified resource by the user based on the occurrence times.
Optionally, the permission determination unit 202 includes:
a fourth determining subunit, configured to determine a fourth permission as the target permission if the obtaining frequency is smaller than a preset first frequency threshold, where the fourth permission is associated with a preset fourth rate and the fourth permission is associated with a preset first authorization duration;
a fifth determining subunit, configured to determine a fifth permission as the target permission if the obtaining frequency is not less than the first frequency threshold, where the fifth permission is associated with the fourth rate and is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
Optionally, the user management apparatus further includes:
a timing unit, configured to start a timer to start timing when the target authority is opened to the user;
a duration data determining unit, configured to obtain an authorized duration associated with the target permission;
and the permission removing unit is used for removing the target permission of the user for the specified resource if the timing duration of the timer exceeds the authorized duration associated with the target permission.
Optionally, the permission determination unit 202 includes:
a sixth determining subunit, configured to determine a sixth permission as the target permission if the obtaining frequency is smaller than a preset second frequency threshold, where the sixth permission is associated with a preset fifth rate and the sixth permission is associated with a preset first authorization number;
a seventh determining subunit, configured to determine a seventh permission as the target permission if the obtaining frequency is not less than the second frequency threshold, where the seventh permission is associated with the fifth rate, the seventh permission is associated with a preset second authorization number, and the second authorization number is smaller than the first authorization number.
As can be seen from the above, in the embodiment of the present application, the user management apparatus may track the data acquired by the user for the specified resource based on the behavior of the user for acquiring the specified resource, and update the target authority of the user for the specified resource in time according to the data acquired, so that the user may acquire the specified resource at a certain rate under the target authority. Through the process, the personalized authority management of the user is realized, and the acquisition intention of the user on the specified resources can be improved.
EXAMPLE III
Referring to fig. 3, a server 3 in the embodiment of the present application includes: a memory 301, one or more processors 302 (only one shown in fig. 3), and a computer program stored on the memory 301 and executable on the processors. Wherein: the memory 301 is used for storing software programs and units, and the processor 302 executes various functional applications and data processing by running the software programs and units stored in the memory 301, so as to acquire resources corresponding to the preset events. Specifically, the processor 302 realizes the following steps by running the above-mentioned computer program stored in the memory 301:
determining acquisition data based on the acquisition behavior of the user on the specified resource;
determining a target authority matched with the acquired data;
and opening the target authority to the user aiming at the specified resource.
Assuming that the above is the first possible embodiment, in a second possible embodiment provided on the basis of the first possible embodiment, the acquisition data includes the number of acquisition times; before determining to acquire data based on the user's acquisition behavior of the specified resource, the processor 302, by executing the computer program stored in the memory 301, further implements the following steps:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and updating the acquisition times of the user for the specified resources when the occurrence of the acquisition event of the user for the specified resources is monitored.
In a third possible implementation manner provided on the basis of the second possible implementation manner, the determining the target authority matching the acquired data includes:
if the obtaining times are more than 0 and less than a preset first time threshold, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate;
if the obtaining times is not less than the second time threshold, determining a third authority as the target authority, wherein the third authority is associated with a preset third rate;
wherein, the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
In a fourth possible embodiment provided on the basis of the one possible embodiment, the acquiring data includes an acquiring frequency; before determining to acquire data based on the user's acquisition behavior of the specified resource, the processor 302, by executing the computer program stored in the memory 301, further implements the following steps:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and counting the occurrence frequency of the acquisition events of the user for the specified resources within a preset period time, and updating the acquisition frequency of the user for the specified resources based on the occurrence frequency.
In a fifth possible implementation manner provided on the basis of the four possible implementation manners, the determining the target authority matching with the acquired data includes:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
In a sixth possible implementation manner provided on the basis of the fifth possible implementation manner, the processor 302, when executing the computer program stored in the memory 301, further implements the following steps:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target authority;
and if the timing duration of the timer exceeds the authorized duration associated with the target permission, releasing the target permission of the user for the specified resource.
In a seventh possible implementation manner provided on the basis of the fourth possible implementation manner, the determining the target authority matching the acquired data includes:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than the second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
It should be understood that, in the embodiment of the present Application, the Processor 302 may be a Central Processing Unit (CPU), and the Processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Memory 301 may include both read-only memory and random access memory and provides instructions and data to processor 302. Some or all of memory 301 may also include non-volatile random access memory. For example, the memory 301 may also store device class information.
Therefore, in the embodiment of the application, the server can track the data acquired by the user for the specified resource based on the behavior of the user for acquiring the specified resource, and update the target authority of the user for the specified resource in time according to the data acquired, so that the user can acquire the specified resource at a certain rate under the target authority. Through the process, the personalized authority management of the user is realized, and the acquisition intention of the user on the specified resources can be improved.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to implement all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of external device software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the above-described modules or units is only one logical functional division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form. The computer-readable storage medium may include: any entity or device capable of carrying the above-described computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer readable Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signal, telecommunication signal, software distribution medium, etc. It should be noted that the computer readable storage medium may contain other contents which can be appropriately increased or decreased according to the requirements of the legislation and the patent practice in the jurisdiction, for example, in some jurisdictions, the computer readable storage medium does not include an electrical carrier signal and a telecommunication signal according to the legislation and the patent practice.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A user management method, comprising:
determining acquisition data based on the acquisition behavior of the user on the specified resource;
determining a target authority matched with the acquired data;
and opening the target permission to the user aiming at the specified resource.
2. The user management method according to claim 1, wherein the acquisition data includes an acquisition number; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method further includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and updating the acquisition times of the user for the specified resources when the user acquisition event for the specified resources is monitored.
3. The user management method of claim 2, wherein said determining the target rights that match the captured data comprises:
if the obtaining times are more than 0 and less than a preset first time threshold value, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate;
if the obtaining times are not smaller than the second time threshold value, determining a third authority as the target authority, wherein the third authority is associated with a preset third rate;
the first rate, the second rate, and the third rate are in an increasing or decreasing relationship.
4. The user management method of claim 1, wherein the acquiring data comprises an acquisition frequency; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and counting the occurrence times of the acquisition events of the specified resources by the user within a preset period time, and updating the acquisition frequency of the specified resources by the user based on the occurrence times.
5. The user management method of claim 4, wherein said determining the target rights that match the captured data comprises:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
6. The user management method according to claim 5, wherein the user management method further comprises:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target permission;
and if the timing duration of the timer exceeds the authorization duration associated with the target permission, releasing the target permission of the user for the specified resource.
7. The user management method of claim 4, wherein said determining the target rights that match the captured data comprises:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than the second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
8. A user management apparatus, comprising:
the data determining unit is used for determining the acquired data based on the acquisition behavior of the user on the specified resource;
the authority determining unit is used for determining target authority matched with the acquired data;
and the permission opening unit is used for opening the target permission to the user aiming at the specified resource.
9. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202010443977.6A 2020-05-22 2020-05-22 User management method, user management device and server Pending CN111709773A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010443977.6A CN111709773A (en) 2020-05-22 2020-05-22 User management method, user management device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010443977.6A CN111709773A (en) 2020-05-22 2020-05-22 User management method, user management device and server

Publications (1)

Publication Number Publication Date
CN111709773A true CN111709773A (en) 2020-09-25

Family

ID=72537555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010443977.6A Pending CN111709773A (en) 2020-05-22 2020-05-22 User management method, user management device and server

Country Status (1)

Country Link
CN (1) CN111709773A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103098084A (en) * 2010-05-10 2013-05-08 塞戈米特公司 Targeted marketing with CPE buydown
CN107730342A (en) * 2017-09-06 2018-02-23 深圳市金立通信设备有限公司 A kind of data processing method and server
WO2019041280A1 (en) * 2017-08-31 2019-03-07 深圳市云中飞网络科技有限公司 Application resource recommendation method and related device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103098084A (en) * 2010-05-10 2013-05-08 塞戈米特公司 Targeted marketing with CPE buydown
WO2019041280A1 (en) * 2017-08-31 2019-03-07 深圳市云中飞网络科技有限公司 Application resource recommendation method and related device
CN107730342A (en) * 2017-09-06 2018-02-23 深圳市金立通信设备有限公司 A kind of data processing method and server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
外土司: "《向外土司学外贸 2 营销可以这样做》", 北京:中国海关出版社, pages: 137 *

Similar Documents

Publication Publication Date Title
CN108764870B (en) Transaction processing method and device based on block chain and electronic equipment
CN106600275B (en) Risk identification method and device
CN104836781A (en) Method distinguishing identities of access users, and device
CN110827138A (en) Push information determining method and device
CN111652623A (en) Frozen account unfreezing data processing method, device and equipment
CN112101939A (en) Node management method and system based on block chain
CN112330355A (en) Consumption ticket transaction data processing method, device, equipment and storage medium
CN112101745A (en) Vehicle release prompting method and device, terminal device and storage medium
CN111709773A (en) User management method, user management device and server
CN110060358B (en) Information processing method and related device
US20170144066A1 (en) Distribution system and method
CN110348983B (en) Transaction information management method and device, electronic equipment and non-transitory storage medium
CN110134837B (en) Information management method and device
CN112070646A (en) Suggestion engine for secondary market agent wagering
CN110557394A (en) Parallel chain management method, equipment and storage medium
KR20200061263A (en) Method and server for paying cards based on blockchain network
CN114862517A (en) Automobile leasing method and device based on block chain
CN113421127A (en) Garbage classification integral excitation method and equipment based on block chain and storage medium
WO2017059298A1 (en) A system and method for a media platform
CN111709772A (en) User management method, user management device and server
CN112907395A (en) Client type identification method, device and equipment
CN112488825A (en) Object transaction method and device based on block chain
CN110334351B (en) Method and device for recommending network credit based on short message reading
CN116756117A (en) Data processing method, device, equipment and storage medium
CN114495301B (en) Subway ticket business processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200925

RJ01 Rejection of invention patent application after publication