CN115052174B - Resource transfer method, device, electronic equipment and storage medium - Google Patents

Resource transfer method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115052174B
CN115052174B CN202210663445.2A CN202210663445A CN115052174B CN 115052174 B CN115052174 B CN 115052174B CN 202210663445 A CN202210663445 A CN 202210663445A CN 115052174 B CN115052174 B CN 115052174B
Authority
CN
China
Prior art keywords
interactive object
resource transfer
interactive
credibility
interaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210663445.2A
Other languages
Chinese (zh)
Other versions
CN115052174A (en
Inventor
王明亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN202210663445.2A priority Critical patent/CN115052174B/en
Publication of CN115052174A publication Critical patent/CN115052174A/en
Application granted granted Critical
Publication of CN115052174B publication Critical patent/CN115052174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/262Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists
    • H04N21/26208Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists the scheduling operation being performed under constraints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/475End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
    • H04N21/4753End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for user identification, e.g. by entering a PIN or password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure relates to a resource transfer method, apparatus, electronic device, storage medium and computer program product. The method comprises the following steps: responding to a resource transfer request of an interactive object in a virtual space, and acquiring credibility information predetermined for the interactive object; if the credibility information indicates that the interactive object is an unreliable interactive object, acquiring an object identification result corresponding to the interactive object; the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not; and responding to the resource transfer request according to the object identification result. In the scheme of the disclosure, whether the interactive object is abnormal or not can be quickly and primarily judged based on the credibility information, so that timeliness of resource transfer is ensured, meanwhile, when the credibility information only indicates that the interactive object is an unreliable interactive object, a reliable object recognition result can be further obtained, whether the interactive object is abnormal or not is accurately judged, and timeliness and accuracy of abnormal recognition during virtual space resource transfer are effectively considered.

Description

Resource transfer method, device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technology, and in particular, to a resource transfer method, apparatus, electronic device, storage medium, and computer program product.
Background
With the popularization of internet technology and live broadcast applications, live video broadcast or live video viewing through a virtual space is becoming more common. In the live broadcast process, a live broadcast host can issue limited resources through a virtual space, and a spectator can timely acquire related requests through a terminal to realize interaction between the two parties. But there are cases where the terminal transfers resources using an abnormal method in this process.
In the related art, in order to monitor the transfer condition of the resource in the virtual space, it is ensured that the resource is transferred according to a preset mode, the trusted condition of the object requesting to acquire the resource in the virtual space can be identified, and then whether the resource can be transferred to the object is determined according to the identification result. However, in the related art, it is often difficult to combine timeliness and accuracy of the recognition result when the trusted condition of the object is recognized.
Disclosure of Invention
The disclosure provides a resource transfer method, a device, an electronic apparatus, a storage medium and a computer program product, so as to at least solve the problem that it is difficult to achieve both timeliness and accuracy of a recognition result when virtual space resources are transferred in the related art. The technical scheme of the present disclosure is as follows:
according to a first aspect of an embodiment of the present disclosure, a resource transfer method includes:
Responding to a resource transfer request of an interactive object in a virtual space, and acquiring credibility information predetermined for the interactive object;
if the credibility information indicates that the interactive object is an unreliable interactive object, acquiring an object identification result corresponding to the interactive object; the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not;
and responding to the resource transfer request according to the object identification result.
In an exemplary embodiment, before the obtaining, in response to the resource transfer request of the interactive object in the virtual space, the predetermined confidence level information for the interactive object further includes:
before resource allocation interaction of a virtual space begins, responding to an interaction participation request sent by an interaction object in the virtual space aiming at the resource allocation interaction, and acquiring the credibility information of the interaction object;
if the credibility information indicates that the interactive object is an unreliable interactive object, storing an interactive object identifier of the unreliable interactive object into a target object set;
and under the condition that the preset triggering condition is met, acquiring an object identification result corresponding to each interactive object identifier in the target object set through an offline computing node.
In an exemplary embodiment, the obtaining, by an offline computing node, an object recognition result corresponding to each interactive object identifier in the target object set when the preset trigger condition is satisfied includes:
and under the condition that the preset triggering condition is met, respectively sending the multiple interactive object identifiers in the target object set to multiple offline computing nodes so as to trigger each offline computing node to determine an object recognition result of the corresponding interactive object based on the object attribute information corresponding to the interactive object identifiers.
In an exemplary embodiment, said responding to said resource transfer request according to said object recognition result comprises:
if the object identification result represents that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule;
and sending the resource transfer result to the client corresponding to the interactive object.
In an exemplary embodiment, said responding to said resource transfer request according to said object recognition result comprises:
if the object identification result represents that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt;
And sending the resource transfer failure prompt to the client corresponding to the interactive object.
In an exemplary embodiment, after the obtaining the confidence level information predetermined for the interactive object, the method further includes:
if the credibility information indicates that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt, and sending the resource transfer failure prompt to a client corresponding to the interactive object;
if the credibility information indicates that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule, and sending the resource transfer result to a client corresponding to the interactive object.
In an exemplary embodiment, the resource transfer request includes a token corresponding to the interactive object, and the obtaining the information about the degree of trust predetermined for the interactive object includes:
obtaining a token in the resource transfer request, and reading a trusted level in the token;
and obtaining the credibility information of the interactive object based on the credibility level.
In an exemplary embodiment, before the obtaining, in response to the resource transfer request of the interactive object in the virtual space, the predetermined confidence level information for the interactive object further includes:
Acquiring the credibility level of the interactive object;
generating a token corresponding to the interactive object based on the trust level, and sending the token to a client of the interactive object;
the client is used for reading the credibility level in the token when responding to the resource transfer operation instruction, sending a resource transfer request carrying the credibility level under the condition that the credibility level indicates that the interactive object is a normal interactive object or a non-credible interactive object, and refusing to send the resource transfer request under the condition that the credibility level indicates that the interactive object is an abnormal interactive object.
According to a second aspect of embodiments of the present disclosure, there is provided a resource transfer device, including:
the system comprises a credibility information reading unit, a credibility information processing unit and a control unit, wherein the credibility information reading unit is configured to respond to a resource transfer request of an interactive object in a virtual space and acquire credibility information predetermined for the interactive object;
the object recognition result obtaining unit is configured to obtain an object recognition result corresponding to the interactive object if the credibility information indicates that the interactive object is an untrusted interactive object; the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not;
And a request response unit configured to perform responding to the resource transfer request according to the object recognition result.
In an exemplary embodiment, the apparatus further comprises:
the system comprises a credibility information acquisition unit, a control unit and a control unit, wherein the credibility information acquisition unit is configured to respond to an interaction participation request sent by an interaction object in a virtual space for resource allocation interaction before resource allocation interaction of the virtual space begins, and acquire credibility information of the interaction object;
an interactive object identifier storage unit configured to perform storing an interactive object identifier of an untrusted interactive object to a target object set if the confidence level information indicates that the interactive object is an untrusted interactive object;
and the object recognition result calculation unit is configured to acquire the object recognition result corresponding to each interactive object identifier in the target object set through an offline computing node under the condition that the preset trigger condition is met.
In an exemplary embodiment, the object recognition result calculation unit is configured to perform:
and under the condition that the preset triggering condition is met, respectively sending the multiple interactive object identifiers in the target object set to multiple offline computing nodes so as to trigger each offline computing node to determine an object recognition result of the corresponding interactive object based on the object attribute information corresponding to the interactive object identifier.
In an exemplary embodiment, the request response unit is configured to perform:
if the object identification result represents that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule;
and sending the resource transfer result to the client corresponding to the interactive object.
In an exemplary embodiment, the request response unit is configured to perform:
if the object identification result represents that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt;
and sending the resource transfer failure prompt to the client corresponding to the interactive object.
In an exemplary embodiment, the apparatus further comprises:
the failure prompt sending unit is configured to generate a resource transfer failure prompt if the credibility information indicates that the interactive object is an abnormal interactive object, and send the resource transfer failure prompt to a client corresponding to the interactive object;
and the transfer result sending unit is configured to determine a resource transfer result corresponding to the resource transfer request based on a resource transfer rule if the credibility information indicates that the interactive object is a normal interactive object, and send the resource transfer result to a client corresponding to the interactive object.
In an exemplary embodiment, the resource transfer request includes a token corresponding to the interactive object, and the trusted degree information reading unit is configured to execute:
obtaining a token in the resource transfer request, and reading a trusted level in the token;
and obtaining the credibility information of the interactive object based on the credibility level.
In an exemplary embodiment, the apparatus further comprises:
a trust level acquisition unit configured to perform acquisition of a trust level of the interactive object;
a token transmitting unit configured to perform generation of a token corresponding to the interactive object based on the trust level, and transmit the token to a client of the interactive object;
the client is used for reading the credibility level in the token when responding to the resource transfer operation instruction, sending a resource transfer request carrying the credibility level under the condition that the credibility level indicates that the interactive object is a normal interactive object or a non-credible interactive object, and refusing to send the resource transfer request under the condition that the credibility level reaches a credibility level threshold.
According to a third aspect of embodiments of the present disclosure, there is provided a server comprising:
A processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement a resource transfer method as claimed in any one of the preceding claims.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium, which when executed by a processor of a server, causes the server to perform a resource transfer method as described in any one of the above.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product comprising instructions therein, which when executed by a processor of a server, enable the server to perform a resource transfer method as described in any one of the above.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
in response to a resource transfer request of an interactive object in a virtual space, the credibility information predetermined for the interactive object can be obtained, if the credibility information indicates that the interactive object is an unreliable interactive object, an object recognition result corresponding to the interactive object is obtained, wherein the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not, and further the resource transfer request can be responded according to the object recognition result. In the scheme of the disclosure, whether the interactive object is abnormal or not can be quickly and primarily judged based on the credibility information, so that timeliness of virtual space resource transfer is ensured, meanwhile, when the credibility information only indicates that the interactive object is an unreliable interactive object and whether the interactive object is abnormal or not is difficult to determine, a reliable object recognition result can be further obtained, whether the interactive object is abnormal or not is accurately judged, and timeliness and accuracy of abnormal recognition during virtual space resource transfer are effectively considered.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure and do not constitute an undue limitation on the disclosure.
FIG. 1 is an application environment diagram illustrating a resource transfer method according to an example embodiment.
FIG. 2 is a flow chart illustrating a method of resource transfer in accordance with an exemplary embodiment.
FIG. 3 is a flowchart illustrating a method of determining confidence level information, according to an example embodiment.
FIG. 4 is a schematic diagram illustrating the acquisition of confidence level information by an offline computing node, according to an example embodiment.
FIG. 5 is a flowchart illustrating another resource transfer method according to an example embodiment.
Fig. 6 is a block diagram illustrating a resource transfer device according to an example embodiment.
Fig. 7 is a block diagram of a server, according to an example embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
It should be further noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for presentation, analyzed data, etc.) related to the present disclosure are information and data authorized by the user or sufficiently authorized by each party.
The resource transfer method provided by the disclosure can be applied to an application environment as shown in fig. 1. In this application environment, a terminal may communicate with a server through a network. The server may have a corresponding data storage system, where the data storage system may store data that needs to be processed by the server, and in practical applications, the data storage system may be integrated on the server, or may be placed on a cloud or other network servers.
In a specific implementation, the terminal may generate a resource transfer request of the interactive object and send the resource transfer request to the server. In response to the received resource transfer request, the server may acquire the trust degree information predetermined for the interactive object, and if the trust degree information indicates that the interactive object is an untrusted interactive object, may further acquire an object recognition result corresponding to the interactive object, and respond to the resource transfer request of the terminal in a corresponding manner according to the object recognition result.
The terminal can be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things equipment and portable wearable equipment, and the internet of things equipment can be smart speakers, smart televisions, smart air conditioners, smart vehicle-mounted equipment and the like. The portable wearable device can be a smart watch, a smart bracelet, a headset, or the like; a client for creating or accessing a virtual space may be deployed on a terminal. The server may be implemented as a stand-alone server or as a server cluster composed of a plurality of servers.
Fig. 2 is a flow chart illustrating a resource transfer method, as shown in fig. 2, for use in a server, according to an exemplary embodiment, including the following steps.
In step 210, in response to a resource transfer request of an interactive object in the virtual space, reliability information predetermined for the interactive object is obtained.
As an example, the virtual space may also be referred to as a live room, and is a group for watching or listening to media resources in real time, where the virtual space may include a first object corresponding to a viewer (using a viewer identity login client) and a second object corresponding to a host (using a host identity login client); different objects may share media resources through the virtual space, such as sharing real-time video, real-time audio, recorded video, recorded audio, etc.
The interactive object may be an object participating in resource allocation interaction in the virtual space and may include at least one of a first object and a second object; the resource transfer request may be a request to acquire a virtual resource issued in the virtual space.
The credibility information can be used for representing the credibility of the interactive objects, in other words, the credibility information can also represent the possibility that the interactive objects are abnormal interactive objects, wherein the abnormal interactive objects are abnormal interactive objects, such as objects for transferring resources from a virtual space in an abnormal mode; the confidence level information may be predetermined prior to the beginning of the resource allocation interaction. In an example, the confidence level information may be a confidence level, where the confidence level is inversely related to the probability that the interactive object is an abnormal interactive object, and the higher the confidence level, the lower the probability that the interactive object is an abnormal interactive object, and the higher the confidence level, and when the confidence level of the interactive object is the highest level or the lowest level, the directly determining that the interactive object is a normal interactive object or an abnormal interactive object.
In practical application, resource allocation interaction can be performed in a virtual space, wherein the resource allocation interaction can be to issue limited virtual resources in the virtual space, such as issuing virtual red packets with the number lower than a threshold value, and each object in the virtual space can apply for obtaining the virtual resources in time to realize interaction.
When the resource allocation interaction is performed, the terminal can be triggered to generate a resource transfer request and send the resource transfer request to the server by sending the resource transfer request through the terminal, for example, clicking a designated button on the terminal. In response to a resource transfer request of an interactive object in the virtual space, the server may obtain trust level information predetermined for the interactive object.
In step 220, if the confidence level information indicates that the interactive object is an untrusted interactive object, obtaining an object recognition result corresponding to the interactive object; the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not.
In particular, the confidence level information may be information for characterizing the possibility that the interactive object is an abnormal interactive object, and may have uncertainty due to the possibility that it characterizes the possibility. Specifically, for example, if the trust level includes trust level 1, trust level 2, trust level 3 and trust level 4, for the lowest trust level 1 and the highest trust level 4, the interactive object may be determined to be an abnormal interactive object and a normal interactive object, respectively, in other words, the uncertainty of the trust level 1 and the trust level 4 is less than or equal to a preset threshold, and whether the interactive object is an abnormal interactive object may be directly determined based on the trust level 1 and the trust level 4; when the trust level is 2 or 3, it is difficult to directly determine that the interactive object is abnormal or normal, which can characterize that the interactive object is an untrusted interactive object, that is, a normal interactive object which is not completely trusted, but it is also difficult to directly determine that the interactive object is an abnormal interactive object.
When the confidence level information indicates that the interactive object is an unreliable interactive object, for example, when the uncertainty represented by the confidence level information is greater than a preset threshold, if it is determined whether the interactive object is an abnormal interactive object based on the confidence level information, because the uncertainty of the occurrence of the abnormality of the interactive object is greater (for example, the uncertainty is greater than the preset threshold), the judgment result obtained based on the confidence level information may have errors.
For example, if the confidence level information is confidence level 2, the interactive object is characterized as being biased abnormally, and if the confidence level information is confidence level 3, the interactive object is characterized as being biased normally. It can be seen that the confidence level 2 and the confidence level 3 may provide a preliminary anomaly determination for the interactive object, but the confidence level information does not directly indicate whether the interactive object is an abnormal interactive object when the uncertainty is greater than a preset threshold.
Therefore, when the credibility information indicates that the interactive object is an unreliable interactive object, the method can further trigger to acquire the object identification result of the interactive object. The accuracy and the definition of the object recognition result can be higher than those of the credibility information, namely, the object recognition result can accurately and directly indicate whether the interactive object is an abnormal interactive object.
In step 230, the resource transfer request is responded to based on the object identification result.
After the object recognition result is obtained, the server may respond to the resource transfer request according to the object recognition result. Specifically, if the object recognition result indicates that the interactive object is a normal interactive object, the server may respond to the resource transfer request according to a normal resource transfer policy; if the object recognition result indicates that the interactive object is an abnormal interactive object, the server can acquire a strategy corresponding to the abnormal interactive object and respond to the resource transfer request based on the strategy corresponding to the abnormal interactive object.
In the resource transfer method, in response to a resource transfer request of an interactive object in a virtual space, the predetermined credibility information of the interactive object can be obtained, if the credibility information indicates that the interactive object is an unreliable interactive object, an object recognition result corresponding to the interactive object is obtained, wherein the object recognition result is used for representing whether the interactive object is an abnormal interactive object, and further the resource transfer request can be responded according to the object recognition result. In the scheme of the disclosure, whether the interactive object is abnormal or not can be quickly and primarily judged based on the credibility information, so that timeliness of virtual space resource transfer is ensured, meanwhile, when the credibility information only indicates that the interactive object is an unreliable interactive object and whether the interactive object is abnormal or not is difficult to determine, a reliable object recognition result can be further obtained, whether the interactive object is abnormal or not is accurately judged, and timeliness and accuracy of abnormal recognition during virtual space resource transfer are effectively considered.
In an exemplary embodiment, as shown in fig. 3, the method may further include the following steps, prior to step 210:
in step 310, before the resource allocation interaction of the virtual space starts, the credibility information of the interactive objects is obtained in response to the interaction participation request sent by the interactive objects in the virtual space for the resource allocation interaction.
In practical application, before the resource allocation interaction of the virtual space starts, the server may send an interaction prompt to the terminal of each interaction object, and prompt that the virtual space will allocate virtual resources when a preset time arrives in the future, and ask whether the interaction object participates in the resource allocation interaction.
If the resource allocation interaction of the virtual space in the future preset time is determined, the user can click a preset key, and the terminal responds to the detected triggering operation, can generate an interaction participation request of the interaction object for the current virtual space resource allocation interaction and sends the interaction participation request to the server.
After receiving the interactive participation request of the interactive object, the server may acquire the credibility information of the interactive object, where the credibility information may be the credibility level of the interactive object. In a specific implementation, the credibility information of the interactive object can be determined through a real-time identification service.
In step 320, if the confidence level information indicates that the interactive object is an untrusted interactive object, the interactive object identifier of the untrusted interactive object is stored in the target object set.
In step 330, under the condition that the preset trigger condition is satisfied, an object recognition result corresponding to each interactive object identifier in the target object set is obtained through an offline computing node.
As an example, the offline computing node may refer to a computing node that the time for feeding back the computing result exceeds a preset time threshold, and the accuracy of the computing result is higher than the accuracy threshold, for example, it takes several minutes to feed back the computing result, in other words, the offline computing node feeds back the computing result slowly, but the accuracy of the computing result is high; in practice, an offline identification service may be deployed, which may have one or more offline computing nodes. The other recognition service different from the offline recognition service is a real-time recognition service, the time for feeding back the calculation result by the real-time recognition service is often smaller than a preset time threshold, the calculation speed is higher than that of the offline recognition service, the credibility information can be obtained in millisecond-level time, but the accuracy of the calculation result is lower than that of the offline wind control service, such as lower than an accuracy threshold. When the accuracy required by the calculation result is lower than the accuracy threshold, the offline recognition service or the real-time recognition service can be selected for interactive object recognition and monitoring according to the feedback speed requirement or the idle degree corresponding to the service.
In a specific implementation, for a part of interactive objects, whether the interactive objects are abnormal interactive objects or normal interactive objects can be quickly determined based on historical interactive data (such as data of past participation in resource allocation interaction), for example, in the multi-time participation in resource allocation interaction, the number of times of acquiring virtual resources by adopting an abnormal method is far different from the number of times of acquiring virtual resources according to a preset method, for example, the virtual resources are acquired abnormally for a plurality of times or are acquired only according to the preset method, the required calculation basis of the identification method is less, and the credibility information with uncertainty lower than a preset threshold can be quickly acquired. And whether the part of the interactive objects are abnormal interactive objects or normal interactive objects or not is difficult to quickly identify, and the uncertainty of the credibility information is higher than a preset threshold value.
In the case that the confidence level information indicates that the interactive object is an untrusted interactive object, for example, the uncertainty corresponding to the confidence level information is greater than a preset threshold, the server may store the identifier of the interactive object of the untrusted interactive object in the target object set. By way of example, the set of target objects may be a set stored in a cache, e.g., the interactive object identification may be stored in a set of redis caches.
When the preset triggering condition is detected to be met, the server can further acquire object recognition results associated with the interactive object identifiers in the target object set through the offline computing node, and the acquired object recognition results are stored in the database.
Specifically, when the credibility information indicates that the interactive object is an unreliable interactive object, the offline computing node can be used for judging whether the interactive object is an abnormal interactive object, and as the accuracy of the computing result obtained by the offline computing node is higher than the accuracy threshold, the offline computing node is used for further identifying the interactive object and obtaining the object identification result, so that the accuracy and the reliability of the object identification result can be effectively ensured. Therefore, when the resource allocation interaction is performed, if the credibility information of the interaction object indicates that the interaction object is an unreliable interaction object, a prestored reliable object identification result can be quickly obtained, and timeliness and accuracy of abnormal identification of the interaction object in the resource transfer process are effectively considered.
For example, in a virtual space with the number of interactive objects reaching a million level, if the credibility information or the object recognition result is calculated one by one after the resource transfer request is received at the beginning of the resource allocation interaction, it is difficult to quickly and timely respond to the millions of resource transfer requests.
In an exemplary embodiment, the virtual space may include one or more interactive objects that participate in the resource allocation interaction, and when there are fewer interactive objects, for example, the number of interactive objects is less than the threshold number of objects of a single offline node, the server may obtain, through one offline computing node, the object recognition results of a plurality of interactive objects. When the interactive objects are more, the processing can be performed through a plurality of off-line computing nodes.
In step 330, when the preset trigger condition is met, the offline computing node obtains the object recognition result corresponding to each interactive object identifier in the target object set, which may include the following steps:
and under the condition that the preset triggering condition is met, respectively sending the multiple interactive object identifiers in the target object set to multiple offline computing nodes so as to trigger each offline computing node to determine an object recognition result of the corresponding interactive object based on the object attribute information corresponding to the interactive object identifiers.
As an example, the object attribute information may be information for characterizing characteristics of the object, such as historical behavior data of the interactive object, age of the interactive object, sex of the interactive object, etc., and the object attribute information for identifying whether the interactive object is abnormal may be set according to actual situations.
In a specific application, when a preset trigger condition is met, for example, the waiting time reaches the preset waiting time or the number of the object identifiers currently stored in the target object set reaches a number threshold, a plurality of interactive object identifiers in the target object set can be respectively sent to a plurality of offline computing nodes, so that each offline computing node is triggered to acquire object attribute information corresponding to the interactive object identifiers, and an object recognition result of the interactive object is determined based on the object attribute information.
For example, as shown in fig. 4, the anchor may initiate a resource allocation interaction, send a virtual resource to the server, and set after n minutes, each interaction object may initiate a resource transfer request for the virtual resource. After receiving the interaction initiation request of the first object for the resource allocation interaction, the server can send an interaction prompt to each interaction object. The second object may send an interactive participation request as an interactive object to the server. After receiving the interaction participation request, the server can initially acquire the credibility level of the interaction object to obtain credibility information, and store the object identifier corresponding to the interaction object, wherein the credibility information indicates that the interaction object is an untrusted interaction object. When the preset triggering condition is met, the offline identification service can acquire the pre-stored object identification, distribute the interactive object identification to each offline computing node, and store the object identification result acquired by the offline computing node.
In the method, when the preset triggering condition is met, the server can respectively send the multiple interactive object identifiers in the target object set to the multiple distributed offline computing nodes so as to trigger each offline computing node to determine the object recognition result of the corresponding interactive object based on the object attribute information corresponding to the interactive object identifiers, the object identifiers can be used as latitude, the multiple offline computing nodes can be used for carrying out fragment settlement, the problem of calculation performance bottleneck of offline recognition service is solved, the calculation performance of batch processing of the offline computing nodes is improved, the acquisition time of the object recognition result is effectively shortened, and long-time waiting is avoided under the condition that the recognition accuracy is improved.
In an exemplary embodiment, in step 230, the responding to the resource transfer request according to the object identification result may include the following steps:
if the object identification result represents that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule; and sending a resource transfer result to the client corresponding to the interactive object.
As an example, a resource transfer rule is a rule that transfers virtual resources. For example, the resource transfer rule may be determined based on the transmission time of the resource transfer request and the allocation manner (such as random allocation or equal allocation) of the virtual resource.
In a specific implementation, if the object recognition result indicates that the interactive object is a normal interactive object, the server may acquire a preset resource transfer rule, and correctly determine a resource transfer result corresponding to the resource transfer request based on the resource transfer rule, for example, the resource transfer result may be a resource transfer number, and the resource transfer number may be a numerical value greater than or equal to zero. After the resource transfer result is obtained, the server can send the resource transfer result to the client corresponding to the interactive object.
In the method, the server can determine the resource transfer result corresponding to the resource transfer request based on the resource transfer rule under the condition that the object identification result represents that the interactive object is a normal interactive object, and send the resource transfer result to the client corresponding to the interactive object, so that the resource transfer request in the virtual space can be rapidly and accurately identified, the resource transfer result can be timely returned when the interactive object is determined to be the normal interactive object, efficient and accurate resource allocation in the virtual space is realized, and the interactive effect of resource allocation interaction is optimized.
In an exemplary embodiment, in step 230, the responding to the resource transfer request according to the object identification result may include the following steps:
If the object identification result represents that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt; and sending a resource transfer failure prompt to the client corresponding to the interactive object.
As an example, the resource transfer failure prompt may be information representing a resource transfer failure, and is used to prompt the user corresponding to the terminal that the virtual resource is not acquired in the current resource allocation interaction or that the allocation of the virtual resource is refused.
In practical application, if the object recognition result indicates that the interactive object is an abnormal interactive object, the server may generate a resource transfer failure prompt, and send the resource transfer failure prompt to the client corresponding to the interactive object.
In the method, when the object recognition result represents that the interactive object is an abnormal interactive object, the server can generate a resource transfer failure prompt and send the resource transfer failure prompt to the client corresponding to the interactive object, so that efficient and accurate resource allocation in the virtual space is realized, the possibility that the interactive object obtains virtual resources through an abnormal method is reduced, timeliness and accuracy of the interactive object recognition are considered, and meanwhile, the allocation mode of the virtual resources is optimized.
In an exemplary embodiment, after step 210, the method may further include the steps of:
If the credibility information indicates that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt, and sending the resource transfer failure prompt to a client corresponding to the interactive object; if the credibility information indicates that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on the resource transfer rule, and sending the resource transfer result to a client corresponding to the interactive object.
In a specific implementation, if the confidence level information indicates that the interactive object is an abnormal interactive object, for example, when the confidence level information is a confidence level, if the confidence level is a lowest level, it is determined that the confidence level information indicates that the interactive object is an abnormal interactive object, and if the confidence level is a highest level, it indicates that the interactive object is a normal interactive object.
If the interactive object type is an abnormal interactive object, the server can generate a resource transfer failure prompt and send the resource transfer failure prompt to the client of the interactive object. If the interactive object type is a normal interactive object, a preset resource transfer rule can be obtained, a resource transfer result corresponding to the resource transfer request is correctly determined based on the resource transfer rule, and the resource transfer result is sent to a client corresponding to the interactive object.
In the disclosure, if the type of the interactive object is an abnormal interactive object, a resource transfer failure prompt is generated, and the resource transfer failure prompt is sent to a client corresponding to the interactive object, if the type of the interactive object is a normal interactive object, a resource transfer result corresponding to a resource transfer request is determined based on a resource transfer rule, and the resource transfer result is sent to the client corresponding to the interactive object, so that a real-time interactive object evaluation result can be obtained based on the credibility information, the resource transfer request is responded quickly, and the processing speed of the resource transfer request is considered under the condition that the accuracy of the interactive object evaluation result is ensured.
In an exemplary embodiment, the resource transfer request may include a token corresponding to the interactive object, and in step 210, the obtaining the information about the degree of confidence predetermined for the interactive object may include the following steps:
obtaining a token in the resource transfer request, and reading a trusted level in the token; and obtaining the credibility information of the interactive object based on the credibility level.
In a specific implementation, the terminal may acquire a token (token) recorded with a trust level of the interactive object, and when a resource transfer request is generated, add the token to the resource transfer request, and then send the resource transfer request carrying the token to the server. Specifically, after the terminal obtains the token, when the resource transfer operation instruction is detected, the terminal can directly generate a resource transfer request carrying the token, and the trust level carried by the token in the resource transfer request can be any trust level corresponding to the interactive object, namely, the trust level in the resource transfer request can be the highest trust level, the lowest trust level or other trust levels between the highest trust level and the lowest trust level.
After receiving the resource transfer request, the server can acquire the token in the resource transfer request, and read the credibility level recorded in the token, so that the read credibility level can be used as credibility information of the interaction object.
In the method, the token with the credibility level recorded is added in the resource transfer request, so that the server can quickly obtain the credibility information of the interactive object based on the credibility level recorded in the token in the process of resource allocation interaction, and the real-time interactive object evaluation speed in the process of virtual space resource transfer is improved.
In an exemplary embodiment, before step 210, the method may further include the steps of:
acquiring the credibility level of the interactive object; the method comprises the steps of generating a token corresponding to an interactive object based on a trusted grade, sending the token to a client of the interactive object, wherein the client is used for reading the trusted grade in the token when responding to a resource transfer operation instruction, sending a resource transfer request carrying the trusted grade under the condition that the trusted grade indicates that the interactive object is a normal interactive object, and refusing to send the resource transfer request under the condition that the trusted grade indicates that the interactive object is an abnormal interactive object.
In a specific implementation, before the resource allocation interaction starts, if an interaction participation request from an interaction object is received, the server may acquire a trust level of the interaction object, and generate a token with the trust level recorded for the interaction object, for example, may encrypt the trust level of the interaction object, and generate a token including an encryption result.
After generating the token, the server may send the token to the client of the interactive object, so that the client may obtain the token carrying the trust level of the interactive object.
When the client detects the resource transfer operation instruction, the trusted level in the token can be read first, and when the trusted level is greater than or equal to the trusted level threshold, for example, when the trusted level is greater than the lowest trusted level, the current trusted level can be determined to indicate that the interactive object is a normal interactive object or a non-trusted interactive object, so that a resource transfer request carrying the trusted level can be sent, and specifically, for example, the client can add the token sent by the server to the resource transfer request.
If the client determines that the trust level is smaller than the trust level threshold, the current interactive object can be determined to be an abnormal interactive object, and then the resource transfer request is refused to be sent. For example, when the client identifies that the trust level in the token is the lowest trust level, then the resource transfer request is denied and a prompt may be generated that the resource transfer request failed to be sent.
In the method, the server can generate the token corresponding to the interactive object based on the trusted grade, and send the token to the client of the interactive object, so that the client can read the trusted grade in the token when responding to the resource transfer operation instruction, determine whether to send the resource transfer request based on the trusted grade, and reject to send the resource transfer request when the trusted grade indicates that the interactive object is an abnormal interactive object, thereby preventing the abnormal interactive object from sending the resource transfer request and participating in the resource allocation when the resource allocation interaction starts, avoiding the server from evaluating the interactive object again aiming at the abnormal interactive object, and reducing the data processing pressure of the server.
In order that those skilled in the art may better understand the above steps, the embodiments of the present disclosure will be exemplified below by way of one example, but it should be understood that the embodiments of the present disclosure are not limited thereto.
As shown in fig. 5, the anchor may initiate a resource allocation interaction, send a virtual resource to the server, and set after n minutes, each interaction object may initiate a resource transfer request for the virtual resource. After receiving the interaction initiation request of the first object for the resource allocation interaction, the server can send an interaction prompt to each interaction object. The second object may send an interactive participation request as an interactive object to the server. After receiving the interaction participation request, the server can preliminarily judge the credibility level of the interaction object to obtain credibility information, and store the object identification indicated as the non-credible interaction object. When the preset triggering condition is met, the offline identification service can acquire the pre-stored object identification, distribute the interactive object identification to each offline computing node, and store the object identification result acquired by the offline computing node.
After the resource allocation interaction starts, the audience terminal can send a resource transfer request to the server, and the server can analyze the token in the resource transfer request to obtain the credibility level.
If the trust level indicates that the interactive object is an abnormal interactive object or a normal interactive object, the resource transfer request can be directly processed. Specifically, for a trust level of 4 (e.g., risklevl=4), a resource transfer result may be determined according to a preset resource transfer rule, and the result may be returned to the viewer side. For the interactive object with the credibility level of 1, a resource transfer failure prompt can be directly returned.
If the uncertainty corresponding to the trust level is greater than the preset threshold, indicating that the interactive object is an untrusted interactive object, for example, the trust level 2 and the trust level 3, the pre-obtained object recognition result can be further obtained from the cache. When the object recognition result represents that the interactive object is an abnormal interactive object, a resource transfer failure prompt is directly returned; when the object identification result represents that the interactive object is a normal interactive object, a corresponding resource transfer result is obtained based on a resource transfer rule, and the corresponding resource transfer result is returned to the audience terminal. By combining real-time identification with offline identification, the interactive object identification efficiency of resource transfer in the virtual space can be improved.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
It should be understood that the same/similar parts of the embodiments of the method described above in this specification may be referred to each other, and each embodiment focuses on differences from other embodiments, and references to descriptions of other method embodiments are only needed.
Based on the same inventive concept, the embodiments of the present disclosure also provide a resource transfer device for implementing the above-mentioned related resource transfer method.
Fig. 6 is a block diagram illustrating a resource transfer device 600 in accordance with an exemplary embodiment. Referring to fig. 6, the apparatus includes a confidence level information reading unit 601, an object recognition result acquisition unit 602, and a request response unit 603.
A reliability information reading unit 601 configured to perform a resource transfer request in response to an interactive object in a virtual space, and obtain reliability information predetermined for the interactive object;
an object recognition result obtaining unit 602, configured to perform obtaining an object recognition result corresponding to the interactive object if the confidence level information indicates that the interactive object is an untrusted interactive object; the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not;
a request response unit 603 configured to perform responding to the resource transfer request according to the object identification result.
In an exemplary embodiment, the apparatus further comprises:
the system comprises a credibility information acquisition unit, a control unit and a control unit, wherein the credibility information acquisition unit is configured to respond to an interaction participation request sent by an interaction object in a virtual space for resource allocation interaction before resource allocation interaction of the virtual space begins, and acquire credibility information of the interaction object;
An interactive object identifier storage unit configured to perform storing an interactive object identifier of an untrusted interactive object to a target object set if the confidence level information indicates that the interactive object is an untrusted interactive object;
and the object recognition result calculation unit is configured to acquire the object recognition result corresponding to each interactive object identifier in the target object set through an offline computing node under the condition that the preset trigger condition is met.
In an exemplary embodiment, the object recognition result calculation unit is configured to perform:
and under the condition that the preset triggering condition is met, respectively sending the multiple interactive object identifiers in the target object set to multiple offline computing nodes so as to trigger each offline computing node to determine an object recognition result of the corresponding interactive object based on the object attribute information corresponding to the interactive object identifiers.
In an exemplary embodiment, the request response unit 603 is configured to perform:
if the object identification result represents that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule;
And sending the resource transfer result to the client corresponding to the interactive object.
In an exemplary embodiment, the request response unit 603 is configured to perform:
if the object identification result represents that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt;
and sending the resource transfer failure prompt to the client corresponding to the interactive object.
The failure prompt sending unit is configured to execute the steps of generating a resource transfer failure prompt if the credibility information indicates that the interactive object is an abnormal interactive object, and sending the resource transfer failure prompt to a client corresponding to the interactive object;
and the transfer result sending unit is configured to execute the steps of determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule if the credibility information indicates that the interactive object is a normal interactive object, and sending the resource transfer result to a client corresponding to the interactive object.
In an exemplary embodiment, the resource transfer request includes a token corresponding to the interactive object, and the trusted degree information reading unit 601 is configured to execute:
Obtaining a token in the resource transfer request, and reading a trusted level in the token;
and obtaining the credibility information of the interactive object based on the credibility level.
In an exemplary embodiment, the apparatus further comprises:
a trust level acquisition unit configured to perform acquisition of a trust level of the interactive object;
the token sending unit is configured to execute a token corresponding to the interactive object based on the trust level, and send the token to a client of the interactive object, wherein the client is used for reading the trust level in the token when responding to a resource transfer operation instruction, sending a resource transfer request carrying the trust level when the trust level indicates that the interactive object is a normal interactive object or a non-trusted interactive object, and refusing to send the resource transfer request when the trust level indicates that the interactive object is an abnormal interactive object.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The various modules in the resource transfer device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
Fig. 7 is a block diagram illustrating an electronic device 700 for implementing a resource transfer method, according to an example embodiment. For example, the electronic device 700 may be a server. Referring to fig. 7, the electronic device 700 includes a processing component 720 that further includes one or more processors, and memory resources represented by a memory 722, for storing instructions, such as applications, executable by the processing component 720. The application program stored in memory 722 may include one or more modules that each correspond to a set of instructions. Further, the processing component 720 is configured to execute instructions to perform the above-described methods.
The electronic device 700 may further include: the power component 724 is configured to perform power management of the electronic device 700, the wired or wireless network interface 726 is configured to connect the electronic device 700 to a network, and the input output (I/O) interface 728. The electronic device 700 may operate based on an operating system stored in memory 722, such as Windows Server, mac OS X, unix, linux, freeBSD, or the like.
In an exemplary embodiment, a computer-readable storage medium is also provided, such as memory 722, including instructions executable by a processor of electronic device 700 to perform the above-described method. The storage medium may be a computer readable storage medium, which may be, for example, ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In an exemplary embodiment, a computer program product is also provided, comprising instructions therein, executable by a processor of the electronic device 700 to perform the above-described method.
It should be noted that the descriptions of the foregoing apparatus, the electronic device, the computer readable storage medium, the computer program product, and the like according to the method embodiments may further include other implementations, and the specific implementation may refer to the descriptions of the related method embodiments and are not described herein in detail.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (18)

1. A method of resource transfer, comprising:
before resource allocation interaction of a virtual space starts, obtaining credibility information of an interaction object requesting to participate in the interaction in the virtual space, and if the credibility information indicates that the interaction object is an unreliable interaction object, obtaining an object recognition result corresponding to the interaction object through an offline computing node under the condition that a preset triggering condition is met;
responding to a resource transfer request of an interactive object in a virtual space, and acquiring credibility information predetermined for the interactive object;
if the credibility information indicates that the interactive object is an unreliable interactive object, acquiring an object identification result corresponding to the interactive object; the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not;
and responding to the resource transfer request according to the object identification result.
2. The method according to claim 1, wherein if the confidence level information indicates that the interactive object is an untrusted interactive object, obtaining, by an offline computing node, an object recognition result corresponding to the interactive object if a preset trigger condition is satisfied, includes:
If the credibility information indicates that the interactive object is an unreliable interactive object, storing an interactive object identifier of the unreliable interactive object into a target object set;
and under the condition that the preset triggering condition is met, acquiring an object identification result corresponding to each interactive object identifier in the target object set through an offline computing node.
3. The method according to claim 2, wherein the obtaining, by the offline computing node, the object recognition result corresponding to each interactive object identifier in the target object set if the preset trigger condition is satisfied includes:
and under the condition that the preset triggering condition is met, respectively sending the multiple interactive object identifiers in the target object set to multiple offline computing nodes so as to trigger each offline computing node to determine an object recognition result of the corresponding interactive object based on the object attribute information corresponding to the interactive object identifiers.
4. The method of claim 1, wherein responding to the resource transfer request based on the object recognition result comprises:
if the object identification result represents that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule;
And sending the resource transfer result to the client corresponding to the interactive object.
5. The method of claim 1, wherein responding to the resource transfer request based on the object recognition result comprises:
if the object identification result represents that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt;
and sending the resource transfer failure prompt to the client corresponding to the interactive object.
6. The method of claim 1, further comprising, after the obtaining the predetermined confidence level information for the interactive object:
if the credibility information indicates that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt, and sending the resource transfer failure prompt to a client corresponding to the interactive object;
if the credibility information indicates that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule, and sending the resource transfer result to a client corresponding to the interactive object.
7. The method according to any one of claims 1-6, wherein the resource transfer request includes a token corresponding to the interactive object, and the obtaining the trust level information predetermined for the interactive object includes:
Obtaining a token in the resource transfer request, and reading a trusted level in the token;
and obtaining the credibility information of the interactive object based on the credibility level.
8. The method of claim 7, further comprising, prior to the obtaining the predetermined confidence level information for the interactive object in response to the resource transfer request for the interactive object in the virtual space:
acquiring the credibility level of the interactive object;
generating a token corresponding to the interactive object based on the trust level, and sending the token to a client of the interactive object;
the client is used for reading the credibility level in the token when responding to the resource transfer operation instruction, sending a resource transfer request carrying the credibility level under the condition that the credibility level indicates that the interactive object is a normal interactive object or a non-credible interactive object, and refusing to send the resource transfer request under the condition that the credibility level indicates that the interactive object is an abnormal interactive object.
9. A resource transfer device, comprising:
the system comprises a credibility information reading unit, a credibility information processing unit and a control unit, wherein the credibility information reading unit is configured to respond to a resource transfer request of an interactive object in a virtual space and acquire credibility information predetermined for the interactive object;
The object recognition result obtaining unit is configured to obtain an object recognition result corresponding to the interactive object if the credibility information indicates that the interactive object is an untrusted interactive object; the object recognition result is used for representing whether the interactive object is an abnormal interactive object or not;
a request response unit configured to perform a response to the resource transfer request according to the object recognition result;
the apparatus is further configured to perform:
before resource allocation interaction of the virtual space starts, obtaining credibility information of an interaction object requesting interaction in the virtual space, and if the credibility information indicates that the interaction object is an unreliable interaction object, obtaining an object recognition result corresponding to the interaction object through an offline computing node under the condition that a preset triggering condition is met.
10. The apparatus of claim 9, wherein the apparatus further comprises:
the system comprises a credibility information acquisition unit, a control unit and a control unit, wherein the credibility information acquisition unit is configured to respond to an interaction participation request sent by an interaction object in a virtual space for resource allocation interaction before resource allocation interaction of the virtual space begins, and acquire credibility information of the interaction object;
An interactive object identifier storage unit configured to perform storing an interactive object identifier of an untrusted interactive object to a target object set if the confidence level information indicates that the interactive object is an untrusted interactive object;
and the object recognition result calculation unit is configured to acquire the object recognition result corresponding to each interactive object identifier in the target object set through an offline computing node under the condition that the preset trigger condition is met.
11. The apparatus according to claim 10, wherein the object recognition result calculation unit is configured to perform:
and under the condition that the preset triggering condition is met, respectively sending the multiple interactive object identifiers in the target object set to multiple offline computing nodes so as to trigger each offline computing node to determine an object recognition result of the corresponding interactive object based on the object attribute information corresponding to the interactive object identifier.
12. The apparatus of claim 9, wherein the request response unit is configured to perform:
if the object identification result represents that the interactive object is a normal interactive object, determining a resource transfer result corresponding to the resource transfer request based on a resource transfer rule;
And sending the resource transfer result to the client corresponding to the interactive object.
13. The apparatus of claim 9, wherein the request response unit is configured to perform:
if the object identification result represents that the interactive object is an abnormal interactive object, generating a resource transfer failure prompt;
and sending the resource transfer failure prompt to the client corresponding to the interactive object.
14. The apparatus of claim 9, wherein the apparatus further comprises:
the failure prompt sending unit is configured to generate a resource transfer failure prompt if the credibility information indicates that the interactive object is an abnormal interactive object, and send the resource transfer failure prompt to a client corresponding to the interactive object;
and the transfer result sending unit is configured to determine a resource transfer result corresponding to the resource transfer request based on a resource transfer rule if the credibility information indicates that the interactive object is a normal interactive object, and send the resource transfer result to a client corresponding to the interactive object.
15. The apparatus according to any one of claims 9-14, wherein the resource transfer request includes a token corresponding to the interactive object, and the trusted degree information reading unit is configured to perform:
Obtaining a token in the resource transfer request, and reading a trusted level in the token;
and obtaining the credibility information of the interactive object based on the credibility level.
16. The apparatus of claim 15, wherein the apparatus further comprises:
a trust level acquisition unit configured to perform acquisition of a trust level of the interactive object;
a token transmitting unit configured to perform generation of a token corresponding to the interactive object based on the trust level, and transmit the token to a client of the interactive object;
the client is used for reading the credibility level in the token when responding to the resource transfer operation instruction, sending a resource transfer request carrying the credibility level under the condition that the credibility level indicates that the interactive object is a normal interactive object or a non-credible interactive object, and refusing to send the resource transfer request under the condition that the credibility level reaches a credibility level threshold.
17. A server, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the resource transfer method of any of claims 1 to 8.
18. A computer readable storage medium, characterized in that instructions in the computer readable storage medium, when executed by a processor of a server, enable the server to perform the resource transfer method of any one of claims 1 to 8.
CN202210663445.2A 2022-06-13 2022-06-13 Resource transfer method, device, electronic equipment and storage medium Active CN115052174B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210663445.2A CN115052174B (en) 2022-06-13 2022-06-13 Resource transfer method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210663445.2A CN115052174B (en) 2022-06-13 2022-06-13 Resource transfer method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115052174A CN115052174A (en) 2022-09-13
CN115052174B true CN115052174B (en) 2023-12-19

Family

ID=83162443

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210663445.2A Active CN115052174B (en) 2022-06-13 2022-06-13 Resource transfer method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115052174B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109544165A (en) * 2017-09-21 2019-03-29 腾讯科技(深圳)有限公司 Resource transfers processing method, device, computer equipment and storage medium
WO2019062855A1 (en) * 2017-09-29 2019-04-04 腾讯科技(深圳)有限公司 Virtual resource data processing method, computer device and storage medium
CN111556109A (en) * 2020-04-17 2020-08-18 北京达佳互联信息技术有限公司 Request processing method and device, electronic equipment and storage medium
CN111681098A (en) * 2020-06-01 2020-09-18 北京三快在线科技有限公司 Resource transfer method, device, server and computer readable storage medium
CN112308585A (en) * 2019-07-26 2021-02-02 腾讯科技(深圳)有限公司 Method, device and storage medium for realizing virtual resource distribution
CN112468833A (en) * 2020-10-26 2021-03-09 北京达佳互联信息技术有限公司 Live broadcast interactive information processing method, device, terminal, server and storage medium
CN113822129A (en) * 2021-07-02 2021-12-21 腾讯科技(深圳)有限公司 Image recognition method and device, computer equipment and storage medium
CN114272617A (en) * 2021-11-18 2022-04-05 腾讯科技(深圳)有限公司 Virtual resource processing method, device, equipment and storage medium in virtual scene
CN114362965A (en) * 2022-02-28 2022-04-15 北京达佳互联信息技术有限公司 Resource processing method and device, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11113370B2 (en) * 2018-12-05 2021-09-07 Bank Of America Corporation Processing authentication requests to secured information systems using machine-learned user-account behavior profiles

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109544165A (en) * 2017-09-21 2019-03-29 腾讯科技(深圳)有限公司 Resource transfers processing method, device, computer equipment and storage medium
WO2019062855A1 (en) * 2017-09-29 2019-04-04 腾讯科技(深圳)有限公司 Virtual resource data processing method, computer device and storage medium
CN112308585A (en) * 2019-07-26 2021-02-02 腾讯科技(深圳)有限公司 Method, device and storage medium for realizing virtual resource distribution
CN111556109A (en) * 2020-04-17 2020-08-18 北京达佳互联信息技术有限公司 Request processing method and device, electronic equipment and storage medium
CN111681098A (en) * 2020-06-01 2020-09-18 北京三快在线科技有限公司 Resource transfer method, device, server and computer readable storage medium
CN112468833A (en) * 2020-10-26 2021-03-09 北京达佳互联信息技术有限公司 Live broadcast interactive information processing method, device, terminal, server and storage medium
CN113822129A (en) * 2021-07-02 2021-12-21 腾讯科技(深圳)有限公司 Image recognition method and device, computer equipment and storage medium
CN114272617A (en) * 2021-11-18 2022-04-05 腾讯科技(深圳)有限公司 Virtual resource processing method, device, equipment and storage medium in virtual scene
CN114362965A (en) * 2022-02-28 2022-04-15 北京达佳互联信息技术有限公司 Resource processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115052174A (en) 2022-09-13

Similar Documents

Publication Publication Date Title
TW201712581A (en) Method, apparatus and system for preventing cross-site request forgery
CN105991412A (en) Method and device for pushing message
CN111614548A (en) Message pushing method and device, computer equipment and storage medium
CN111555920B (en) Intelligent operation and maintenance method, system, equipment and user side
CN104796406A (en) Method and device for identifying application
CN110928880A (en) Data processing method, device, terminal and medium based on block chain
CN114024972A (en) Long connection communication method, system, device, equipment and storage medium
CN113315943A (en) Conference information transmission method, system, computer equipment and storage medium
CN112261427B (en) Malicious node identification method and device and electronic equipment
CN115052174B (en) Resource transfer method, device, electronic equipment and storage medium
CN113067802A (en) User identification method, device, equipment and computer readable storage medium
CN112651044A (en) Business transaction method, system and storage medium based on block chain technology
JP2006065639A (en) Client terminal, service providing apparatus and method for detecting service
CN114679627B (en) Block chain-based on-demand data processing method and system
CN114650231B (en) Visual containerized union link point deployment method and system
CN113778709A (en) Interface calling method, device, server and storage medium
CN113590352A (en) Data calling method, device, equipment and readable storage medium
CN112671636A (en) Group message pushing method and device, computer equipment and storage medium
CN114760362B (en) Method, system, electronic device and storage medium for scheduling network access request
CN110995756A (en) Method and device for calling service
CN111679988B (en) Face recognition system testing method and device and related equipment
CN113949508B (en) Process data processing method and device based on random number consensus mechanism
CN115694843B (en) Camera access management method, system, device and medium for avoiding counterfeiting
US10237143B2 (en) Management apparatus and control method of management apparatus
CN115037521B (en) Service data verification method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant