CN108537621B - Data operation method and device - Google Patents

Data operation method and device Download PDF

Info

Publication number
CN108537621B
CN108537621B CN201810181935.2A CN201810181935A CN108537621B CN 108537621 B CN108537621 B CN 108537621B CN 201810181935 A CN201810181935 A CN 201810181935A CN 108537621 B CN108537621 B CN 108537621B
Authority
CN
China
Prior art keywords
data
resource set
data resource
shopping cart
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810181935.2A
Other languages
Chinese (zh)
Other versions
CN108537621A (en
Inventor
刘清地
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810181935.2A priority Critical patent/CN108537621B/en
Publication of CN108537621A publication Critical patent/CN108537621A/en
Application granted granted Critical
Publication of CN108537621B publication Critical patent/CN108537621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a data operation method and device, and relates to the technical field of computers. One embodiment of the method comprises: locking the first set of data resources created by the first device such that only the first device can operate the first set of data resources; performing a first operation on a first set of data resources; when a second operation is needed, selecting data from the first data resource set to perform the second operation; or, combining data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting data from the combined data resource set to perform the second operation. The method and the system can avoid the error ordering or abnormal ordering caused by the change of the articles in the shopping cart when multiple users operate one account at the same time, effectively reduce the order return rate, improve the ordering success rate and reduce the workload of an order system.

Description

Data operation method and device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for data operation.
Background
With the explosion of the e-commerce industry, more and more people choose to shop online. When a user purchases goods on the internet, the selected goods are generally added into a shopping cart, and then the selected goods are uniformly placed for purchase.
In the process of online shopping, due to the limitation of preferential promotion resources in accounts, the same account is frequently shared among family and friends, and especially during the promotion activity, a plurality of users can operate the same account at the same time. When the same account number is shared among multiple users, the server side of the system can synchronize the data of the articles in the shopping cart.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
because the system server side can synchronize the data of the articles in the shopping cart, when multiple users operate one account at the same time, the conditions of returning the order or abnormal purchase caused by mistaken order placing can be caused, the experience of the users is seriously influenced, and meanwhile, the workload of an order system is increased.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for data operation, which can avoid an incorrect order placement or an abnormal order placement caused by a change of an item in a shopping cart when multiple users operate one account at the same time, effectively reduce an order return rate, improve an order placement success rate, and reduce a workload of an order system; meanwhile, the ordering failure caused by the fact that the articles cannot be ordered simultaneously can be avoided, so that the ordering settlement time of a user is saved, the ordering success rate is improved, and the user experience is improved.
To achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a method of data manipulation.
A method of data manipulation, comprising: for at least one login device of the same account, each device can create at least one data resource set, and each device has operation authority over the created data resource set, wherein the operation authority includes: locking the set of data resources such that only the device can operate the locked set of data resources, and unlocking the set of data resources such that a second device, which is one or more devices of the at least one login device of the same account other than the device, can operate the locked set of data resources.
Optionally, the locking and unlocking of the data resource set is realized by setting the attribute of the data resource set.
Optionally, the set of data resources operable by the device comprises: no less than one set of data resources created by the device, a set of data resources created by the second device that is operational with the device; and when the device selects data from a plurality of data resource sets for operation, merging the data selected from the plurality of data resource sets into one data resource set, and selecting the data from the merged data resource set for operation.
Optionally, at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of a current process, a timestamp of a current operation and a random number.
According to another aspect of the embodiments of the present invention, a method of data manipulation is provided.
A method of data manipulation, comprising: locking a first data resource set created by a first device so that only the first device can operate the first data resource set, wherein the first device is one of no less than one login device of the same account, and the first data resource set is one of no less than one data resource set created by the first device; performing a first operation on the first set of data resources; when a second operation is needed, selecting data from the first data resource set to perform the second operation; or, merging data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting the data from the merged data resource set to perform the second operation.
Optionally, the method further comprises: and setting the attribute of the first data resource set as that a second device is operable to unlock the first data resource set, so that the second device can operate the first data resource set, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
Optionally, the set of data resources operable by the first device comprises: the data resource set which is created by the first device and is operable by the first device is created by at least one login device of the same account, and the data resource set which is created by other devices except the first device in the login device is operable by the first device.
Optionally, at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of a current process, a timestamp of a current operation and a random number.
According to another aspect of the embodiments of the present invention, there is provided an apparatus for data manipulation.
An apparatus for data manipulation, comprising: the locking module is used for locking a first data resource set created by first equipment so that only the first equipment can operate the first data resource set, the first equipment is one of no less than one login equipment of the same account, and the first data resource set is one of no less than one data resource set created by the first equipment; the first operation module is used for carrying out first operation on the first data resource set; the second operation module is used for selecting data from the first data resource set to perform second operation when the second operation is required to be performed; or, merging data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting the data from the merged data resource set to perform the second operation.
Optionally, the system further comprises an unlocking module, configured to: and setting the attribute of the first data resource set as that a second device is operable to unlock the first data resource set, so that the second device can operate the first data resource set, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
Optionally, the set of data resources operable by the first device comprises: the data resource set which is created by the first device and is operable by the first device is created by at least one login device of the same account, and the data resource set which is created by other devices except the first device in the login device is operable by the first device.
Optionally, at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of a current process, a timestamp of a current operation and a random number.
According to yet another aspect of an embodiment of the present invention, a method of data manipulation is provided.
A method of data manipulation, comprising: locking a first sub-shopping cart created by a first device so that only the first device can operate the first sub-shopping cart and add a selected item to the first sub-shopping cart, wherein the first device is one of no less than one login device of the same account number, and the first sub-shopping cart is one of no less than one sub-shopping carts created by the first device; when an article settlement operation is required, selecting an article from the first sub shopping cart for settlement; alternatively, items selected from a plurality of sub-shopping carts operable by the first device are combined into one sub-shopping cart, and the items are selected from the combined sub-shopping cart for settlement.
Optionally, the method further comprises: and setting the attribute of the first sub-shopping cart to be operable by a second device to unlock the first sub-shopping cart, so that the second device can operate the first sub-shopping cart, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
Optionally, the first device operable child shopping cart comprises: the shopping cart comprises at least one sub shopping cart created by the first device, and at least one sub shopping cart which is operated by the first device and created by other devices except the first device in the login device of the same account.
Optionally, at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of a current process, a timestamp of a current operation and a random number.
According to another aspect of the embodiments of the present invention, there is provided an apparatus for data manipulation.
An apparatus for data manipulation, comprising: the item adding module is used for locking a first sub-shopping cart created by a first device so that only the first device can operate the first sub-shopping cart and adding a selected item into the first sub-shopping cart, wherein the first device is one of at least one login device of the same account number, and the first sub-shopping cart is one of at least one sub-shopping cart created by the first device; the article settlement module is used for selecting articles from the first sub shopping cart to settle when article settlement operation is required; alternatively, items selected from a plurality of sub-shopping carts operable by the first device are combined into one sub-shopping cart, and the items are selected from the combined sub-shopping cart for settlement.
Optionally, the system further comprises an attribute setting module, configured to: and setting the attribute of the first sub-shopping cart to be operable by a second device to unlock the first sub-shopping cart, so that the second device can operate the first sub-shopping cart, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
According to another aspect of the embodiments of the present invention, there is provided an electronic device for data manipulation.
An electronic device for data manipulation, comprising: one or more processors; the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors realize the method for data operation provided by the embodiment of the invention.
According to yet another aspect of embodiments of the present invention, a computer-readable medium is provided.
A computer readable medium, on which a computer program is stored, which when executed by a processor implements a method of data manipulation provided by embodiments of the present invention.
One embodiment of the above invention has the following advantages or benefits: by locking the first data resource set created by the first device and performing the first operation on the locked first data resource set, other devices logging in the same account can be prevented from operating the first data resource set, so that better data protection is realized, and the situation of data operation errors caused by data synchronization is avoided; when the second operation of the data is performed, the first data resource set or the data in the plurality of data resource sets can be selected from the plurality of operable data resource sets to perform the second operation, so that flexible data operation can be performed based on the plurality of data resource sets, and data sharing among the plurality of data resource sets is realized. In a specific embodiment of the invention, by locking the sub-shopping cart created by the current equipment and adding the selected article into the locked sub-shopping cart, the wrong or abnormal order placing caused by the change of the article in the shopping cart when multiple users operate one account at the same time can be avoided, the rate of returning orders is effectively reduced, the success rate of placing orders is improved, and the workload of an order system is reduced; when the item settlement is carried out, the items are selected from the plurality of shopping carts which can be operated to carry out the settlement, so that the flexible item settlement based on the plurality of shopping carts is realized; a plurality of shopping carts can be created through each device, so that articles which cannot be placed at the same time are added into different shopping carts respectively, the number of times of order placing failure caused by the fact that the articles cannot be placed at the same time can be reduced, the time for settlement of orders by a user is saved, the success rate of the order placing is improved, and the user experience degree is improved. The privacy and data security of the user can be better protected by setting the sub shopping cart created by the current device to be invisible to other devices. In addition, the unique identification of the current process, the timestamp of the current operation and the random number are spliced and encrypted to obtain the equipment identification, and the generated equipment identification is high in safety, difficult to crack and better guaranteed to benefit of users.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of the main steps of a method of data manipulation according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of the main steps of a method of data manipulation according to one embodiment of the present invention;
FIG. 3 is a flow chart illustrating the implementation of one embodiment of the present invention;
FIG. 4 is a schematic diagram of the main modules of a data-manipulating device according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of the main blocks of a data-manipulating device of one embodiment of the present invention;
FIG. 6 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 7 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
In order to solve the problem of wrong or abnormal order placing caused by the fact that objects in shopping carts change when multiple users operate one account at the same time in the prior art, the invention provides a data operation method. Meanwhile, the data operation method provided by the invention can better protect the privacy of the user and the data security.
According to an embodiment of the invention, a method of data manipulation of the invention comprises: for at least one login device of the same account, each device can create at least one data resource set, and each device has operation authority over the created data resource set, wherein the operation authority comprises: locking the data resource set so that only the device can operate the locked data resource set, and unlocking the data resource set so that a second device can operate the locked data resource set, wherein the second device is one or more devices except the device in not less than one login device of the same account.
Specifically, in the embodiment of the present invention, the locking and unlocking of the data resource set are realized by setting the attribute of the data resource set. The set of data resources operable by each device includes: no less than one data resource set created by the device, a data resource set created by a second device operable by the device; and, when the device selects data from a plurality of data resource sets for operation, merging the data selected from the plurality of data resource sets into one data resource set, and selecting data from the merged data resource set for operation.
In addition, according to the technical scheme of the embodiment of the invention, at least one login device of the same account is distinguished by a device identifier, and the device identifier is obtained by splicing and encrypting the unique identifier of the current process, the timestamp of the current operation and the random number.
FIG. 1 is a schematic diagram of the main steps of a method of data manipulation according to an embodiment of the present invention. As shown in fig. 1, the method of data manipulation according to the embodiment of the present invention mainly includes the following steps S101 to S103.
Step S101: locking a first data resource set created by first equipment so that only the first equipment can operate the first data resource set, wherein the first equipment is one of not less than one login equipment of the same account, and the first data resource set is one of not less than one data resource set created by the first equipment;
step S102: performing a first operation on a first set of data resources;
step S103: when a second operation is needed, selecting data from the first data resource set to perform the second operation; or, combining data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting data from the combined data resource set to perform the second operation.
According to an embodiment of the invention, the first operation is for example for adding or deleting data to or from the first set of data resources; the second operation may include, for example, merging, modifying, etc., the selected data.
According to the technical scheme of the embodiment of the invention, the attribute of the first data resource set is set to be operable by the second device so as to unlock the first data resource set, so that the second device can operate the first data resource set, and the second device is one or more of devices except the first device in at least one login device of the same account. Each data resource set has operable attribute options after being created, and whether the data resource set can be operated by other devices or not is realized by setting the operable attributes of the data resource set. The creator of the data resource set has the highest operating authority for the data resource set, and the data resource set can be operated without setting. If the attribute of the first data resource set is set to be operable by the second device, the second device may perform all operations, such as the first operation and the second operation, on the first data resource set. In addition, in specific implementation, the operational authority of each device can be set in more detail by dividing the operational authority of the device on the data resource set into different levels, for example: the second device may be arranged to view only data in the first set of data resources, the third device may view and modify data in the first set of data resources, respectively, and so on.
After the user adds data to the first data resource set or deletes part of the data in the first data resource set through the first device, the second operation may be further performed on the data in the first data resource set through the first device, or may be performed through other login devices of the same account. When the second operation is performed by the second device, the second operation on the data in the first data resource set by the second device may be achieved by setting the attribute of the first data resource set to be operable by the second device to unlock the first data resource set so that the second device may operate the first data resource set. Here, the second operation of the present invention refers to another operation different from the first operation. The second operation of the present invention includes modifying the selected data, specifically, performing detail checking, copying, editing, and the like on the selected data, and the content referred by the second operation is different according to different application scenarios. Specifically, the second operation may be, for example, an operation of sharing, forwarding, or the like of a file selected in the WeChat favorite by the user, or an operation of settling, modifying the number of items, or the like of an item selected in the shopping cart by the user.
In an embodiment of the invention, the set of data resources operable by the first device comprises: the data resource set which is created by the first device and is operable by the first device is not less than one data resource set which is created by the first device and is created by not less than one other device except the first device in the login device of the same account. In addition, the data resource sets operable by the first device may also include common data resource sets created by the system or data resource sets existing by default by the system, and the like.
According to the technical scheme of the embodiment of the invention, at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting the unique identifier of the current process, the timestamp of the current operation and the random number.
The following describes an implementation process of the technical scheme of the invention when multiple users operate the same account through different devices, taking online shopping by the users as an example. The first device is a current device operated by a current user, and the first data resource set is one of a plurality of sub shopping carts created by the current device. The second device is one or more of the other devices with the same login account number as the first device. In the context of an embodiment of the present invention, the second operation is, for example, item settlement.
FIG. 2 is a schematic diagram of the main steps of a method of data manipulation according to one embodiment of the present invention. As shown in fig. 2, the method of data operation in this embodiment may mainly include the following two steps:
step S201: locking a first sub-shopping cart created by a first device so that only the first device can operate the first sub-shopping cart and adding a selected item to the first sub-shopping cart, wherein the first device is one of at least one login device of the same account number, and the first sub-shopping cart is one of at least one sub-shopping cart created by the first device;
step S202: when the item settlement operation is needed, selecting the item from the first sub shopping cart for settlement; alternatively, items selected from a plurality of sub-shopping carts operable with the first device are combined into one sub-shopping cart, and items are selected from the combined sub-shopping cart for settlement.
In addition, in the embodiment, the attribute of the first sub-shopping cart is set as that the second device is operable to unlock the first sub-shopping cart, so that the second device can operate the first sub-shopping cart, and the second device is one or more of devices except the first device in not less than one login device of the same account. And, the child shopping cart operable by the first device includes: the shopping cart comprises at least one sub shopping cart created by the first device, and at least one sub shopping cart which is operated by the first device and created by other devices except the first device in the login device of the same account.
The following describes in detail the implementation process of the user adding the items to the shopping cart and performing item settlement operation when the user operates the same account through different devices.
A user logs in an account through a current device (namely, a first device), and before a selected item is added into a shopping cart, a sub shopping cart (namely, a first data resource set) can be created as required. When the user creates the sub shopping cart or after the user creates the sub shopping cart, the modification of the operation authority of the sub shopping cart to other devices can be realized by setting the attribute of the sub shopping cart created by the current device, namely: whether the sub shopping cart is visible and operable to other devices is achieved. If the attribute of the sub-shopping cart is set to be 'other equipment can operate' by the user, the server synchronizes the data of the sub-shopping cart to a shopping cart database of all equipment using the account, and at the moment, all the equipment using the account can see and operate the sub-shopping cart; if the attribute of the sub-shopping cart is set as 'other equipment is visible but not operable' by the user, the server synchronizes the data of the sub-shopping cart to the shopping cart database of all the equipment using the account, but at the moment, the other equipment using the account can only see the sub-shopping cart but cannot operate the sub-shopping cart; if the attribute of the sub-shopping cart is set to be invisible by the user, the server does not need to synchronize the data of the sub-shopping cart into the shopping cart database of the other device using the account, and at this time, the other device using the account cannot see the sub-shopping cart, so that the sub-shopping cart cannot be operated. That is: the operation authority set in this embodiment includes 3 levels: operable, visible but not operable, invisible.
When the attribute of the sub-shopping cart created by the current device is set by the user, the attribute can be set for each other device, and the operation authority of each other device for the sub-shopping cart can be different. In the introduction of the present invention, the current device and the other devices are different login devices of the same account. For example: the device using account 1 includes device a, device B, device C, and device D, and when device a creates a child shopping cart, the child shopping cart may be selected to be visible but not operable to device B, may be set to be invisible to device C, and may be set to be operable to device D. Obviously, the child shopping cart created by device A is operational for device A itself and its attributes cannot be changed.
Thus, it is possible to obtain that for a device F, the shopping cart of its currently registered account may include several of: the system creates a public shopping cart (generally, the system defaults to create a public shopping cart for an account), a child shopping cart created by the device F, a child shopping cart created by other devices and operable by the device F, a child shopping cart created by other devices and visible but inoperable by the device F, and a child shopping cart created by other devices and invisible by the device F. Wherein the shopping cart in which the device F is operable comprises: a public shopping cart created by the system, a child shopping cart created by device F, and a child shopping cart operable by device F created by another device. The shopping cart in which the device F is not operable comprises: a child shopping cart that is visible but not operable by device F created by the other device and a child shopping cart that is not visible by device F created by the other device.
When a user logs in an account through the device F to shop, the attribute of the sub-shopping cart F created by the device F can be set to be "other devices are not operable" (specifically, the attribute includes two settings of "other devices are not visible" and "other devices are visible but not operable") to lock the sub-shopping cart F created by the current device F, and at the moment, the other devices cannot operate the sub-shopping cart F. When a user needs to add an article to a shopping cart, the sub-shopping cart F can be selected from the shopping carts operated by the device F as the shopping cart to be added with the article, and the article is added into the locked sub-shopping cart F, so that the problem that when other devices operate the account at the same time, the order is wrongly or abnormally placed due to the change of the article in the shopping cart can be avoided, the order placing success rate is improved, and the order returning rate is effectively reduced. In addition, when the attribute of the sub-shopping cart F created by the device F is set to be invisible to other devices, the other devices cannot see the items in the shopping cart of the device F, and the privacy and data security of the user can be well protected.
In addition, there may be a plurality of sub shopping carts created by the user through the device F, so that items of different categories that cannot be ordered simultaneously can be added to different sub shopping carts respectively, for example: put into a sub-shopping cart with living fresh class article, put into another sub-shopping cart with dress class article, when the user places an order, only need to go on respectively to the article in every sub-shopping cart to the number of times that the order fails because article can not place an order simultaneously has been reduced, time of placing an order when saving the user settlement improves the success rate of placing an order, promotes user experience degree.
When the user logs in the account through the device F and adds the selected item to the child shopping cart F, item settlement can be performed by the device F, or item settlement can be performed by another device. If settlement is required by another device, the user sets the attribute of the sub shopping cart to which the item is added to "other device operable" to unlock the sub shopping cart f.
When the user settles the items through the device F, two cases may be included: selecting items in a shopping cart from shopping carts operable by the current device for settlement; alternatively, items in multiple shopping carts are selected for settlement from the shopping carts operable with the current device.
When the user selects an item in one shopping cart for settlement from the shopping carts operable by the current device F, the settled item may be any one of the shopping carts operable by the current device F, and is not limited to the child shopping cart F created by the user through the device F.
When the user selects a plurality of items in the shopping cart for settlement from the shopping carts which can be operated by the current device through the device F, the specific implementation process is as follows: items in a plurality of shopping carts selected from shopping carts operable by the present device are combined into one shopping cart, and the items are selected from the combined shopping cart for settlement. Wherein the plurality of shopping carts can be any plurality of shopping carts operable by device F, namely: the system creates any plurality of the public shopping cart, the no less than one child shopping cart created by the device F, and the no less than one child shopping cart operable by the device F created by the other device. Also, items located in multiple shopping carts may be combined into any one operative shopping cart when combined. Finally, the items to be settled are selected from the combined shopping carts for settlement. For example: assume that for the current account number, the shopping cart operable by device F includes: when items to be settled selected by a user are respectively located in the sub-shopping cart F and the sub-shopping cart G, the items located in the sub-shopping cart F and the sub-shopping cart G need to be merged and settled, specifically, the items in the sub-shopping cart F are merged into the sub-shopping cart G and the items to be settled are selected from the merged sub-shopping cart G for settlement, or the items in the sub-shopping cart G are merged into the sub-shopping cart F and the items to be settled are selected from the merged sub-shopping cart F for settlement.
According to the implementation process of the embodiment, the sub-shopping cart created by the current equipment is locked, and the selected articles are added into the locked sub-shopping cart, so that the wrong or abnormal order placing caused by the change of the articles in the shopping cart when multiple users operate one account at the same time can be avoided, the order return rate is effectively reduced, the order placing success rate is improved, and the workload of an order system is reduced; when the item settlement is carried out, the items are selected from the plurality of shopping carts which can be operated to carry out the settlement, so that the flexible item settlement based on the plurality of shopping carts is realized; a plurality of shopping carts can be created through each device, so that articles which cannot be placed at the same time are added into different shopping carts respectively, the number of times of order placing failure caused by the fact that the articles cannot be placed at the same time can be reduced, the time for settlement of orders by a user is saved, the success rate of the order placing is improved, and the user experience degree is improved.
In addition, the technical scheme of the invention can also be applied to other scenes. For example: when a user records privacy files such as diaries or thoughts of insides through network interaction platforms such as WeChats and microblogs, the privacy files (namely, privacy file sets) are set to be visible only by current equipment so as to be locked, and even if the microblog account of the user is stolen, the stolen user cannot see the privacy files of the user due to the fact that the user cannot log in the equipment of the user, so that the privacy of the user can be better protected, and the data management safety is higher.
Fig. 3 is a schematic flow chart of implementation of an embodiment of the present invention. As shown in fig. 3, taking the user shopping online as an example, an embodiment of the present invention mainly includes the following steps:
step S301: a user logs in an account;
step S302: a user creates a sub shopping cart according to the equipment identifier of the current equipment;
step S303: the sub shopping cart is locked by setting the sub shopping cart invisible to other equipment or visible but inoperable to other equipment, so that the other equipment of the account can not operate the sub shopping cart;
step S304: the user selects the sub shopping cart as a shopping cart to be added with the articles, and adds the articles into the sub shopping cart;
step S305: after the item is added into the sub shopping cart, the data operation is carried out. This step may include several cases as follows:
step S3051: the sub shopping cart is set to be operable to other equipment so as to unlock the sub shopping cart, and the other equipment of the account number operates the sub shopping cart and performs data operation;
step S3052: the user selects the items from the sub shopping cart and settles accounts;
step S3053: the user merges the items in the other operable shopping cart into the child shopping cart and settles.
FIG. 3 illustrates an implementation of the present invention, in which the number of sub shopping carts created by a user according to a device identifier of a current device may be multiple; when the user selects the items from the created sub shopping carts and settles the accounts, the items in each sub shopping cart can be settled separately, or the items in a plurality of shopping carts which can be simultaneously ordered and settled can be merged and settled together; the items that the user settles may be items that the current device adds to the shopping cart, items that other devices of the account add to the shopping cart, and so on. The specific implementation manner is flexible and is not limited to the implementation manner described in the embodiments of the present invention.
In addition, the embodiment of the invention also provides a method for generating the equipment identifier. Generally, devices can be distinguished by having a unique device identification. In general, for a device configured with an operating system such as a windows system or an android system, a physical address MAC (Media Access Control) address of the device, a universally Unique identifier uuid (universally Unique identifier) of the device, or the like may be relatively easily obtained and used as a device identifier. But for some devices it is not possible to use this information as a device identification if it is prohibited from being read. For this reason, a unique device identifier needs to be generated to identify the login of the same account on different devices, distinguish the operation of the shopping carts with the same account on different devices, and ensure that the sub-shopping carts are still available after the user logs in again, the system is restarted, and the application is uninstalled and reinstalled.
In the embodiment of the invention, the equipment identifier is obtained by splicing and encrypting the unique identifier of the current process, the timestamp of the current operation and the random number. Specifically, when generating a device identifier, first, obtaining a unique identifier of a current process and a timestamp of a current operation through system information; then, generating a random number through a random number algorithm provided by the system, wherein the random number is a string of random data; then, splice the unique identification of the current process, the timestamp of the current operation and the random number, and when splicing, the splicing rule can be flexibly set, for example: the splicing can be carried out in sequence, can also be carried out in a random sequence, and the like; and finally, encrypting the spliced character strings to obtain the equipment identification, wherein common encryption algorithms can be used for realizing the functions of the invention. When the device identifier is generated, the random number is added, so that the encrypted character string can be prevented from being maliciously cracked to cause loss, and the benefit of a user can be better ensured.
The system information is all data managed by the operating system at runtime, and includes, for example, information of programs currently running in the system, a process number of each program, runtime of the system where the process is located, a physical memory and a number of processors occupied by each program, and the like. The method for acquiring the process identifier from the system information includes, for example: NSLog (@ "process identifier:% d", [ proInfo processIdentifier ]).
After the device identification is generated, the device identification is saved in a designated system file for direct retrieval next time. For example, the generated device identification may be saved using the uipasteur sticky board class in the iOS system. The UIPasteBoard class stores a 160-bit random string by using an application-specific bulletin board app-specific pasttables, accessed in a manner similar to the dictionary key-value pair key-value. The app-specific passkeys can persistently store character strings and cannot be deleted even if the application is turned on or off and uninstalled. When the device identification needs to be acquired, whether the corresponding key value (for example, the generated device identification) exists in the UIPasteBoard sticker according to the key name (for example, the application A-identification) can be searched, and if the corresponding key value does not exist, the device identification is generated and stored in the UIPasteBoard sticker so as to be directly acquired next time without regenerating a new device identification.
Fig. 4 is a schematic diagram of main blocks of a data-operated apparatus according to an embodiment of the present invention. As shown in fig. 4, the apparatus 400 for data manipulation according to the embodiment of the present invention mainly includes a locking module 401, a first manipulation module 402, and a second manipulation module 403.
The locking module 401 is configured to lock a first data resource set created by a first device so that only the first device may operate the first data resource set, where the first device is one of at least one login device of the same account, and the first data resource set is one of at least one data resource set created by the first device;
the first operation module 402 is used for performing a first operation on a first data resource set;
the second operation module 403 is configured to, when a second operation needs to be performed, select data from the first data resource set to perform the second operation; or, combining data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting data from the combined data resource set to perform the second operation.
The data manipulation apparatus 400 according to the embodiment of the present invention may further include an unlocking module (not shown in the figure) configured to:
and setting the attribute of the first data resource set as that the second device is operable to unlock the first data resource set, so that the second device can operate the first data resource set, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
According to an embodiment of the invention, the set of data resources operable by the first device comprises: the data resource set which is created by the first device and is operable by the first device is not less than one data resource set which is created by the first device and is created by not less than one other device except the first device in the login device of the same account.
According to the embodiment of the invention, at least one login device of the same account is distinguished through the device identification, and the device identification is obtained by splicing and encrypting the unique identification of the current process, the timestamp of the current operation and the random number.
FIG. 5 is a schematic diagram of the main blocks of a data manipulation device according to one embodiment of the present invention. As shown in fig. 5, in combination with an embodiment of a user performing online shopping, in a scenario where multiple users respectively operate the same account through different devices, and the user adds an item to a shopping cart and performs an item settlement operation, the data operation apparatus 500 of the present invention may include, for example, an item adding module 501 and an item settlement module 502, where:
an item adding module 501, configured to lock a first sub-shopping cart created by a first device so that only the first device may operate the first sub-shopping cart, and add a selected item to the first sub-shopping cart, where the first device is one of at least one login device of the same account, and the first sub-shopping cart is one of at least one sub-shopping cart created by the first device;
an item settlement module 502, configured to select an item from the first sub-shopping cart for settlement when an item settlement operation needs to be performed; alternatively, items selected from a plurality of sub-shopping carts operable with the first device are combined into one sub-shopping cart, and items are selected from the combined sub-shopping cart for settlement.
Also, according to the implementation of this embodiment, the apparatus 500 for data manipulation may further include an attribute setting module (not shown in the figure) configured to:
and setting the attribute of the first sub-shopping cart to be operable by the second device to unlock the first sub-shopping cart, so that the second device can operate the first sub-shopping cart, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
According to the technical scheme of the embodiment of the invention, the first data resource set created by the first equipment is locked, and the first operation is carried out on the locked first data resource set, so that other equipment logging in the same account can be prevented from operating the first data resource set, better data protection is realized, and the condition of data operation errors caused by data synchronization is avoided; when the second operation of the data is performed, the first data resource set or the data in the plurality of data resource sets can be selected from the plurality of operable data resource sets to perform the second operation, so that flexible data operation can be performed based on the plurality of data resource sets, and data sharing among the plurality of data resource sets is realized. In a specific embodiment of the invention, by locking the sub-shopping cart created by the current equipment and adding the selected article into the locked sub-shopping cart, the wrong or abnormal order placing caused by the change of the article in the shopping cart when multiple users operate one account at the same time can be avoided, the rate of returning orders is effectively reduced, the success rate of placing orders is improved, and the workload of an order system is reduced; when the item settlement is carried out, the items are selected from the plurality of shopping carts which can be operated to carry out the settlement, so that the flexible item settlement based on the plurality of shopping carts is realized; a plurality of shopping carts can be created through each device, so that articles which cannot be placed at the same time are added into different shopping carts respectively, the number of times of order placing failure caused by the fact that the articles cannot be placed at the same time can be reduced, the time for settlement of orders by a user is saved, the success rate of the order placing is improved, and the user experience degree is improved. The privacy and data security of the user can be better protected by setting the sub shopping cart created by the current device to be invisible to other devices. In addition, the unique identification of the current process, the timestamp of the current operation and the random number are spliced and encrypted to obtain the equipment identification, and the generated equipment identification is high in safety, difficult to crack and better guaranteed to benefit of users.
Fig. 6 illustrates an exemplary system architecture 600 of a data manipulation method or data manipulation apparatus to which embodiments of the present invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 601, 602, 603. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, target push information, product information — just an example) to the terminal device.
It should be noted that the method for data manipulation provided by the embodiment of the present invention is generally executed by the server 605, and accordingly, the apparatus for data manipulation is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, a block diagram of a computer system 700 suitable for use with a terminal device or server implementing an embodiment of the invention is shown. The terminal device or the server shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present invention may be implemented by software, or may be implemented by hardware. The described units or modules may also be provided in a processor, and may be described as: a processor includes a locking module, a first operational module, and a second operational module. Where the names of such units or modules do not in some cases constitute a limitation of the unit or module itself, for example, a locking module may also be described as a "module for locking a first set of data resources created by a first device such that only the first device may operate the first set of data resources".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: locking a first data resource set created by a first device so that only the first device can operate the first data resource set, wherein the first device is one of no less than one login device of the same account, and the first data resource set is one of no less than one data resource set created by the first device; performing a first operation on the first set of data resources; when a second operation is needed, selecting data from the first data resource set to perform the second operation; or, merging data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting the data from the merged data resource set to perform the second operation.
According to the technical scheme of the embodiment of the invention, the first data resource set created by the first equipment is locked, and the first operation is carried out on the locked first data resource set, so that other equipment logging in the same account can be prevented from operating the first data resource set, better data protection is realized, and the condition of data operation errors caused by data synchronization is avoided; when the second operation of the data is performed, the first data resource set or the data in the plurality of data resource sets can be selected from the plurality of operable data resource sets to perform the second operation, so that flexible data operation can be performed based on the plurality of data resource sets, and data sharing among the plurality of data resource sets is realized. In a specific embodiment of the invention, by locking the sub-shopping cart created by the current equipment and adding the selected article into the locked sub-shopping cart, the wrong or abnormal order placing caused by the change of the article in the shopping cart when multiple users operate one account at the same time can be avoided, the rate of returning orders is effectively reduced, the success rate of placing orders is improved, and the workload of an order system is reduced; when the item settlement is carried out, the items are selected from the plurality of shopping carts which can be operated to carry out the settlement, so that the flexible item settlement based on the plurality of shopping carts is realized; a plurality of shopping carts can be created through each device, so that articles which cannot be placed at the same time are added into different shopping carts respectively, the number of times of order placing failure caused by the fact that the articles cannot be placed at the same time can be reduced, the time for settlement of orders by a user is saved, the success rate of the order placing is improved, and the user experience degree is improved. The privacy and data security of the user can be better protected by setting the sub shopping cart created by the current device to be invisible to other devices. In addition, the unique identification of the current process, the timestamp of the current operation and the random number are spliced and encrypted to obtain the equipment identification, and the generated equipment identification is high in safety, difficult to crack and better guaranteed to benefit of users.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (16)

1. A method of data manipulation, comprising:
for at least one login device of the same account, each device can create at least one data resource set, and each device has operation authority over the created data resource set, wherein the operation authority includes: locking a data resource set so that only the device can operate the locked data resource set, and unlocking the data resource set so that a second device can operate the locked data resource set, wherein the second device is one or more devices except the device in not less than one login device of the same account;
when the equipment selects data from a plurality of data resource sets for operation, merging the data selected from the plurality of data resource sets into one data resource set, and selecting the data from the merged data resource set for operation;
at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of the current process, a timestamp of the current operation and a random number.
2. The method of claim 1, wherein the locking and unlocking of the data resource set is achieved by setting attributes of the data resource set.
3. The method of claim 1 or 2, wherein the set of data resources operable by the device comprises: no less than one set of data resources created by the device, a set of data resources created by the second device that is operational with the device.
4. A method of data manipulation, comprising:
locking a first data resource set created by a first device so that only the first device can operate the first data resource set, wherein the first device is one of no less than one login device of the same account, and the first data resource set is one of no less than one data resource set created by the first device;
performing a first operation on the first set of data resources;
when a second operation is needed, selecting data from the first data resource set to perform the second operation; or, merging data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting the data from the merged data resource set to perform the second operation;
at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of the current process, a timestamp of the current operation and a random number.
5. The method of claim 4, further comprising:
and setting the attribute of the first data resource set as that a second device is operable to unlock the first data resource set, so that the second device can operate the first data resource set, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
6. The method of claim 4 or 5, wherein the set of data resources operable by the first device comprises: the data resource set which is created by the first device and is operable by the first device is created by at least one login device of the same account, and the data resource set which is created by other devices except the first device in the login device is operable by the first device.
7. An apparatus for data manipulation, comprising:
the locking module is used for locking a first data resource set created by first equipment so that only the first equipment can operate the first data resource set, the first equipment is one of no less than one login equipment of the same account, and the first data resource set is one of no less than one data resource set created by the first equipment; at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of the current process, a timestamp of the current operation and a random number;
the first operation module is used for carrying out first operation on the first data resource set;
the second operation module is used for selecting data from the first data resource set to perform second operation when the second operation is required to be performed; or, merging data selected from a plurality of data resource sets operable by the first device into one data resource set, and selecting the data from the merged data resource set to perform the second operation.
8. The apparatus of claim 7, further comprising an unlocking module to:
and setting the attribute of the first data resource set as that a second device is operable to unlock the first data resource set, so that the second device can operate the first data resource set, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
9. The apparatus of claim 7 or 8, wherein the set of data resources operable by the first device comprises: the data resource set which is created by the first device and is operable by the first device is created by at least one login device of the same account, and the data resource set which is created by other devices except the first device in the login device is operable by the first device.
10. A method of data manipulation, comprising:
locking a first sub-shopping cart created by a first device so that only the first device can operate the first sub-shopping cart and add a selected item to the first sub-shopping cart, wherein the first device is one of no less than one login device of the same account number, and the first sub-shopping cart is one of no less than one sub-shopping carts created by the first device;
when an article settlement operation is required, selecting an article from the first sub shopping cart for settlement; or, merging items selected from a plurality of sub-shopping carts operable by the first device into one sub-shopping cart, and selecting the items from the merged sub-shopping cart for settlement;
at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of the current process, a timestamp of the current operation and a random number.
11. The method of claim 10, further comprising:
and setting the attribute of the first sub-shopping cart to be operable by a second device to unlock the first sub-shopping cart, so that the second device can operate the first sub-shopping cart, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
12. The method of claim 10 or 11, wherein the child shopping cart operable by the first device comprises: the shopping cart comprises at least one sub shopping cart created by the first device, and at least one sub shopping cart which is operated by the first device and created by other devices except the first device in the login device of the same account.
13. An apparatus for data manipulation, comprising:
the item adding module is used for locking a first sub-shopping cart created by a first device so that only the first device can operate the first sub-shopping cart and adding a selected item into the first sub-shopping cart, wherein the first device is one of at least one login device of the same account number, and the first sub-shopping cart is one of at least one sub-shopping cart created by the first device; at least one login device of the same account is distinguished through a device identifier, and the device identifier is obtained by splicing and encrypting a unique identifier of the current process, a timestamp of the current operation and a random number;
the article settlement module is used for selecting articles from the first sub shopping cart to settle when article settlement operation is required; alternatively, items selected from a plurality of sub-shopping carts operable by the first device are combined into one sub-shopping cart, and the items are selected from the combined sub-shopping cart for settlement.
14. The apparatus of claim 13, further comprising an attribute setting module to:
and setting the attribute of the first sub-shopping cart to be operable by a second device to unlock the first sub-shopping cart, so that the second device can operate the first sub-shopping cart, wherein the second device is one or more of devices except the first device in not less than one login device of the same account.
15. An electronic device for data manipulation, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-6 and/or 10-12.
16. A computer-readable medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of any one of claims 1-6 and/or 10-12.
CN201810181935.2A 2018-03-06 2018-03-06 Data operation method and device Active CN108537621B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810181935.2A CN108537621B (en) 2018-03-06 2018-03-06 Data operation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810181935.2A CN108537621B (en) 2018-03-06 2018-03-06 Data operation method and device

Publications (2)

Publication Number Publication Date
CN108537621A CN108537621A (en) 2018-09-14
CN108537621B true CN108537621B (en) 2022-02-01

Family

ID=63485566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810181935.2A Active CN108537621B (en) 2018-03-06 2018-03-06 Data operation method and device

Country Status (1)

Country Link
CN (1) CN108537621B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114222288B (en) * 2021-11-30 2024-04-30 中国建设银行股份有限公司 Equipment identifier generation method, equipment identifier verification method and device

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6317722B1 (en) * 1998-09-18 2001-11-13 Amazon.Com, Inc. Use of electronic shopping carts to generate personal recommendations
US20050108104A1 (en) * 2003-11-14 2005-05-19 Katherine Woo Integrating third party shopping cart applications with an online payment service
US7647247B2 (en) * 2004-12-06 2010-01-12 International Business Machines Corporation Method and system to enhance web-based shopping collaborations
US7640193B2 (en) * 2005-12-09 2009-12-29 Google Inc. Distributed electronic commerce system with centralized virtual shopping carts
US20120072304A1 (en) * 2010-09-17 2012-03-22 Homan Sven Method of Shopping Online with Real-Time Data Sharing Between Multiple Clients
CN102467729A (en) * 2010-11-09 2012-05-23 学思行数位行销股份有限公司 On-line shopping system and method
US20130133056A1 (en) * 2011-11-21 2013-05-23 Matthew Christian Taylor Single login Identifier Used Across Multiple Shopping Sites
US9607330B2 (en) * 2012-06-21 2017-03-28 Cinsay, Inc. Peer-assisted shopping
CN102821109B (en) * 2012-08-28 2015-06-03 腾讯科技(深圳)有限公司 Method, associated equipment and system for realizing data sharing in instant communication application
US10127599B2 (en) * 2013-02-22 2018-11-13 Mastercard Initernational Incorporated System and method for assembling a shared shopping cart
CA2922059A1 (en) * 2013-10-10 2015-04-16 Cinsay, Inc. Apparatus and method for peer-assisted e-commerce shopping
CN104601721A (en) * 2015-01-31 2015-05-06 华为技术有限公司 Multi-terminal information processing method and device
CN104867044A (en) * 2015-04-28 2015-08-26 广西智通节能环保科技有限公司 Method for sharing electronic shopping cart
CN105978947A (en) * 2016-04-27 2016-09-28 努比亚技术有限公司 Same account number login equipment number control method and mobile terminal
CN106709785B (en) * 2016-12-29 2021-05-18 华为机器有限公司 Display method and device
CN107679955A (en) * 2017-10-11 2018-02-09 掌合天下(北京)信息技术有限公司 Order Processing Method and System
CN107730371A (en) * 2017-11-27 2018-02-23 北京小米移动软件有限公司 Create the method, apparatus and storage medium of order

Also Published As

Publication number Publication date
CN108537621A (en) 2018-09-14

Similar Documents

Publication Publication Date Title
US10268835B2 (en) Hosted application gateway architecture with multi-level security policy and rule promulgations
US9961053B2 (en) Detecting compromised credentials
CN108780465B (en) Attribute-based dependency identification for operation ordering
US10824756B2 (en) Hosted application gateway architecture with multi-level security policy and rule promulgations
CN109522751B (en) Access right control method and device, electronic equipment and computer readable medium
US9930063B2 (en) Random identifier generation for offline database
CN113495921A (en) Routing method and device of database cluster
US11366821B2 (en) Epsilon-closure for frequent pattern analysis
EP3494470A1 (en) Retain locally deleted content at storage service
US9519648B2 (en) Software detection
US20150163326A1 (en) Approaches for remotely unzipping content
CN108537621B (en) Data operation method and device
CN113361236A (en) Method and device for editing document
CN113541987A (en) Method and device for updating configuration data
CN111797424A (en) Method and device for processing request
CN112099841A (en) Method and system for generating configuration file
CN111984686A (en) Data processing method and device
US9961132B2 (en) Placing a user account in escrow
CN112965946B (en) Method, device, equipment and computer readable medium for processing document
US11159515B2 (en) Systems and methods for integrating systems over untrusted networks
US11403258B2 (en) Generating hexadecimal trees to compare file sets
US20210306317A1 (en) Systems and methods for integrating systems over untrusted networks
WO2021169553A1 (en) Method and apparatus for processing order
CN113760921A (en) Method and device for creating dictionary value
CN113778503A (en) Software maintenance method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant