CN111210248A - Resource configuration data acquisition method and device, electronic equipment and storage medium - Google Patents

Resource configuration data acquisition method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111210248A
CN111210248A CN201811400955.0A CN201811400955A CN111210248A CN 111210248 A CN111210248 A CN 111210248A CN 201811400955 A CN201811400955 A CN 201811400955A CN 111210248 A CN111210248 A CN 111210248A
Authority
CN
China
Prior art keywords
user
resource configuration
data
identity information
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811400955.0A
Other languages
Chinese (zh)
Other versions
CN111210248B (en
Inventor
甄志铭
刘昀
姜慧鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201811400955.0A priority Critical patent/CN111210248B/en
Publication of CN111210248A publication Critical patent/CN111210248A/en
Application granted granted Critical
Publication of CN111210248B publication Critical patent/CN111210248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0639Item locations

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Game Theory and Decision Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a resource configuration data acquisition method, belongs to the technical field of computers, and is used for solving the problem that resource configuration data is not accurately acquired in the prior art. The resource configuration data acquisition method comprises the following steps: acquiring associated data of a first user starting to execute a first preset operation by scanning an identification code of a second user; the associated data includes: a user identification of a first user and a user identification of a second user; acquiring identity information to be verified through identity information acquisition equipment bound with a second user; and giving up or executing resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database. According to the resource configuration data acquisition method, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, and the accuracy of acquiring the resource configuration data is improved.

Description

Resource configuration data acquisition method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for acquiring resource configuration data, an electronic device, and a storage medium.
Background
With the development of internet technology, electronic commerce platforms are more and more, users can obtain more information through the electronic commerce platforms, and offline merchants can obtain more customers through the electronic commerce platforms. Electronic commerce platforms will also often push out activities to attract customers and to evaluate the marketability of merchants. For example, the number of users is increased by issuing virtual resources for the users. Meanwhile, the marketing ability of the merchant is determined according to the promotion data of the merchant on the activity, or corresponding resources are distributed to the merchant. In the prior art, a common method for collecting merchant promotion data is as follows: generating a two-dimensional code for a merchant, after the user finishes an order on an e-commerce platform by scanning the two-dimensional code of the merchant, determining to collect promotion data of the merchant, and finally configuring corresponding resources for the merchant according to the collected promotion data of the merchant.
However, in order to generate more promotion data, some merchants can obtain more resources by registering a plurality of user accounts and simulating ordering behavior of real users through the registered user accounts to generate false promotion data.
Therefore, in the prior art, when the resource configuration data according to which the resources are configured is obtained, false data cannot be identified, and at least the defect that the obtained resource configuration data is inaccurate exists.
Disclosure of Invention
The application provides a resource configuration data acquisition method which is beneficial to the accuracy of resource configuration data according to when resources are configured.
In order to solve the above problem, in a first aspect, an embodiment of the present application provides a method for acquiring resource configuration data, including:
acquiring associated data of a first user starting to execute a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
acquiring identity information to be verified through identity information acquisition equipment bound with the second user;
and giving up or executing the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
In a second aspect, an embodiment of the present application provides an apparatus for acquiring resource configuration data, including:
the operation data acquisition module is used for acquiring associated data of a first user for starting execution of a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
the identity information acquisition module to be verified is used for acquiring identity information to be verified through the identity information acquisition equipment bound with the second user;
and the resource configuration data acquisition module is used for giving up or executing the step of acquiring the resource configuration data for configuring the resource of the second user according to the associated data in response to whether the corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
In a third aspect, an embodiment of the present application further discloses an electronic device, which includes a memory, a processor, and a computer program that is stored in the memory and is executable on the processor, and when the processor executes the computer program, the resource configuration data acquisition method according to the embodiment of the present application is implemented.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the resource configuration data acquisition method disclosed in the present application.
The resource configuration data acquisition method disclosed by the embodiment of the application starts to execute the associated data of the first preset operation by acquiring the identification code of the first user through scanning the identification code of the second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user; acquiring identity information to be verified through identity information acquisition equipment bound with the second user; and giving up or executing the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database, so that the problem that the acquired resource configuration data in the prior art is inaccurate is solved. According to the resource configuration data acquisition method disclosed by the embodiment of the application, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, so that the phenomenon that the second user executes the first preset operation through the false account to generate the resource configuration data, resources are improperly acquired is effectively avoided, and the accuracy of acquiring the resource configuration data is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of a resource allocation data acquisition method according to a first embodiment of the present application;
fig. 2 is a flowchart of a resource allocation data acquisition method according to a second embodiment of the present application;
fig. 3 is a schematic diagram of a specific application of the resource allocation data acquisition method according to the second embodiment of the present application;
fig. 4 is a schematic structural diagram of a resource allocation data acquisition apparatus according to a third embodiment of the present application;
fig. 5 is a second schematic structural diagram of a resource allocation data acquisition apparatus according to a third embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In some embodiments of the present application, the first user and the second user represent different users; the identification code can be in the form of a two-dimensional code, a bar code, a radio frequency tag and the like and can uniquely identify the identity. The first preset operation can be operations of entering a hotel, having a meal, watching a movie and the like. In order to facilitate readers to understand the technical solutions, in the embodiments of the present application, a first preset operation is taken as an example of entering a hotel, a first user is a common user, and a second user is a merchant (for example, a hotel merchant), so as to describe the technical solutions of the present application in detail.
Example one
As shown in fig. 1, a method for acquiring resource configuration data disclosed in this embodiment includes: step 101 to step 103.
Step 101, acquiring associated data of a first user starting to execute a first preset operation by scanning an identification code of a second user.
Wherein the associated data comprises: the user identification of the first user and the user identification of the second user.
When the method is specifically implemented, firstly, identity verification is carried out on a second user which proposes resource allocation, after the identity verification is passed, an identification code, such as a two-dimensional code, is generated for the second user according to the user identification of the second user, and the generated identification code is sent to the second user. And the second user displays the identification code, and the user carries out popularization operation to attract a new user.
For example, the e-commerce platform generates a two-dimensional code according to the user identifier of the hotel merchant a and the link of the platform promotion activity, and sends the two-dimensional code to the hotel merchant a. The hotel merchant A displays the two-dimensional code on the hotel reception desk, so that the user can scan the two-dimensional code to participate in popularization activities, for example, new users are registered to get coupons and pay the hotel room-entering fee.
When a user scans the two-dimensional code through a mobile phone in the foreground of a hotel merchant A, the code scanning application acquires a specific promotion activity page through information in the two-dimensional code, the electronic commerce platform acquires the positioning data of the mobile phone of the first user through the promotion activity page to determine the geographic position of the first user, and meanwhile, the electronic commerce platform can further acquire the user identification of the second user through the promotion activity page.
Further, before the first user participates in a promotion activity, such as getting a coupon, the first user needs to log in the e-commerce platform, so that the e-commerce platform can obtain the user identifier of the first user getting the coupon.
The first user may then pay the hotel merchant a for the room fee or purchase other products of the hotel merchant a using the received coupon. According to the operation that the first user pays the room cost of the hotel merchant A or purchases other products of the hotel merchant A, the e-commerce platform can acquire the associated data of the corresponding operation of the first user. Wherein the associated data includes, but is not limited to, any one or more of the following: the method comprises the following steps of obtaining information of a user identifier of a first user, a geographic position of the first user, time for scanning a two-dimensional code (namely time for acquiring a promotion activity page) by the first user, order placing time of the first user, order payment time of the first user, a user identifier of a second user, a geographic position of the second user and the like.
And 102, acquiring identity information to be verified through the identity information acquisition equipment bound with the second user.
After the first user uses the coupon, the first user needs to perform identity information verification on identity information acquisition equipment arranged at a foreground of the hotel merchant a, for example, identity card scanning is performed on the first user to perform identity information verification; or acquiring the identity information such as the fingerprint, the face and the like of the first user through the identity information acquisition equipment to verify the identity information. The identity information acquisition equipment is hardware equipment which is configured for the hotel merchant A by the electronic commerce platform in advance and is necessary for activity promotion and used for acquiring user identity information.
And the identity information acquisition equipment sends the acquired identity information of the first user to the electronic merchant platform so as to carry out user identity verification.
Step 103, in response to whether the preset database stores the corresponding relationship data between the identity information to be verified and the user identifier of the first user, giving up or executing resource configuration data for performing resource configuration on the second user according to the associated data.
And then, the electronic merchant platform matches the to-be-verified identity information of the first user acquired by the identity information with user data pre-stored by the platform, and determines whether a corresponding relationship is established between the to-be-verified identity information and the user identifier of the first user, namely whether corresponding relationship data between the to-be-verified identity information and the user identifier of the first user is stored in a preset database. For example, if the electronic commerce platform stores a first user identifier that a hotel was ordered on the electronic commerce platform by using the to-be-verified identity information, the electronic commerce platform is considered to store the corresponding relationship data between the to-be-verified identity information and the user identifier of the first user. If the first user is a new user and no other user registers or orders a product on the electronic commerce platform by using the identity information to be verified, the corresponding relation data of the identity information to be verified and the user identification of the first user cannot be stored in a preset database.
And if the corresponding relation is stored, the resource configuration data for performing resource configuration on the second user according to the associated data is abandoned.
If the preset database stores the corresponding relation data of the identity information to be verified and the user identification of the first user, it is indicated that the first user is not a real new user, the promotion of the hotel merchant A is invalid at this time, and the associated data of the first user executing the first preset operation is not taken as valid promotion data.
And if the corresponding relation is not stored, acquiring resource configuration data for performing resource configuration on the second user according to the associated data.
If the corresponding relation data of the identity information to be verified and the user identification of the first user is not stored in the preset database, the first user is a new user, the hotel merchant A is effective in the promotion at this time, and the associated data of the first user executing the first preset operation is taken as effective promotion data. And the e-commerce platform acquires resource configuration data for configuring the resources of the second user according to the associated data. For example, corresponding resources are configured for the second user according to the coupon information in the associated data, or a preset number of resources are configured for the second user. In a specific implementation, the resource may be a network bandwidth, a storage resource, a currency, and the like.
The resource configuration data acquisition method disclosed by the embodiment of the application starts to execute the associated data of the first preset operation by acquiring the identification code of the first user through scanning the identification code of the second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user; acquiring identity information to be verified through identity information acquisition equipment bound with the second user; and giving up or executing the resource configuration data for performing resource configuration on the second user according to the associated data in response to whether the corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database, and solving the problem that the resource configuration data acquired in the prior art is inaccurate. According to the resource configuration data acquisition method disclosed by the embodiment of the application, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, so that the phenomenon that the second user executes the first preset operation through the false account to generate the resource configuration data, resources are improperly acquired is effectively avoided, and the accuracy of acquiring the resource configuration data is effectively improved.
Example two
As shown in fig. 2, a method for acquiring resource configuration data disclosed in this embodiment includes: step 201 to step 214.
Step 201, obtaining a request for resource configuration applied by the second user.
In some embodiments of the present application, before the step of obtaining the geographic location of the first user and the user identifier of the second user according to the operation of scanning the identifier code of the second user by the first user, the method further includes: acquiring a request for resource configuration applied by the second user, wherein the request comprises a user identifier of the second user and an equipment identifier of the identity information acquisition equipment; and binding the user identifier of the second user and the equipment identifier of the identity information acquisition equipment. In other embodiments of the present application, the request further includes identity information of the second user, where the identity information at least includes a geographic location of the second user, and after the step of obtaining the request for resource configuration, the method further includes: verifying the identity information of the second user in the request according to the pre-stored identity information corresponding to the user identifier of the second user; and if the verification is passed, binding the user identification of the second user with the geographic position of the second user, generating an identification code corresponding to the user identification of the second user one by one, and sending the identification code to the second user.
In this embodiment, the specific technical solution for acquiring the resource configuration data is illustrated by the request including the user identifier of the second user, the device identifier of the identity information acquiring device, and the identity information of the second user. Wherein the identity information at least includes a geographic location of the second user, and may further include: store names, business licenses, etc.
In specific implementation, the second user may input necessary information for applying resource configuration through a client of the e-commerce platform, and then submit a request for resource configuration. And the client packs the user identification of the second user and the input necessary information to generate a request for applying resource configuration. The request includes a user identification of the second user and the necessary information. Wherein the necessary information includes: and acquiring the equipment identifier of the equipment by the identity information. In some embodiments of the present application, the necessary information includes: identity information of the second user. In some embodiments of the present application, the identity information comprises: the second user's geographic location, business license, store name, etc. The electronic commerce platform acquires a request for resource configuration through a preset client, wherein the request is submitted by a second user, and acquires a user identifier, identity information and an equipment identifier of identity information acquisition equipment of the second user, wherein the user identifier, the identity information and the equipment identifier are included in the request.
Step 202, verifying that the request includes the identity information of the second user according to the pre-stored identity information corresponding to the user identifier of the second user.
For example, the geographic location, business license, store name, etc. included in the request are compared and verified.
Step 203, determining whether the identity authentication is successful, if so, executing step 204, otherwise, jumping to step 214.
Step 204, binding the user identifier of the second user and the device identifier of the identity information acquiring device.
And the e-commerce platform stores the binding relationship between the user identifier of the second user and the equipment identifier of the identity information acquisition equipment.
Step 205, binding the user identifier of the second user and the geographic location of the second user, generating an identification code corresponding to the user identifier of the second user one to one, and sending the identification code to the second user.
And the e-commerce platform stores the binding relationship between the user identification of the second user and the geographic position of the second user. And then, generating an identification code corresponding to the user identification of the second user one by one according to the user identification of the second user, and sending the identification code to the second user. In specific implementation, the identification code corresponding to the user identifier of the second user one to one may be generated according to the user identifier of the second user and information (such as an activity page address) of the promotion activity involved in resource configuration.
Step 206, acquiring the geographic location of the first user and the user identifier of the second user according to the operation of scanning the identifier of the second user by the first user.
In some embodiments of the present application, before the step of acquiring the associated data that the first user initiates to perform the first preset operation by scanning the identification code of the second user, the method further includes: acquiring the geographic position of the first user and the user identification of the second user according to the operation of scanning the identification code of the second user by the first user; acquiring a geographical position bound with the second user according to the user identifier of the second user; and if the distance between the geographical position of the first user and the geographical position bound with the second user meets a preset distance threshold value and the first user meets a preset user condition, allocating a preset amount of first resources for the first user.
In specific implementation, the identification code can be in the form of a two-dimensional code, a bar code, a radio frequency tag and the like. And the second user displays the identification code to enable the first user to scan through a preset client so as to obtain a preset page of the electronic commerce platform. For example, the first user scans a two-dimensional code displayed by the second user through a preset client on a mobile phone; then, the preset client analyzes the two-dimension code to obtain and access a preset page of the electronic commerce platform; then, the assisting e-commerce platform may obtain, through the preset page, a time when the first user scans the two-dimensional code (i.e., a time when the preset page of the e-commerce platform is obtained and accessed), a user identifier of the second user, and a geographic location of the first user.
And step 207, acquiring the geographical position bound with the second user according to the user identifier of the second user.
Further, the e-commerce platform acquires the geographic position bound with the second user according to a pre-stored binding relationship between the user identifier of the second user and the geographic position.
Step 208, judging whether the distance between the geographical position of the first user and the geographical position bound with the second user and the first user respectively meet preset conditions; if yes, go to step 209; otherwise, jump to step 214.
And if the distance between the geographic position of the first user and the geographic position bound with the second user is smaller than a preset distance threshold, the first user is indicated to perform code scanning operation at a store of the second user. And then, further judging whether the first user meets preset user conditions according to the portrait information of the first user, so as to determine whether the first user is a target client of the electronic commerce platform.
And when the distance between the geographical position of the first user and the geographical position bound with the second user is smaller than a preset distance threshold value and the first user meets a preset user condition, allocating a preset amount of first resources to the first user.
Step 209, allocating a preset amount of first resources to the first user.
In some embodiments of the applications, the first resource may be a voucher, physical item, or the like; the preset number may be determined according to the portrait information of the first user, or may be a fixed value.
Step 210, acquiring associated data of the first user starting to execute the first preset operation by scanning the identification code of the second user.
Wherein the associated data comprises: the user identification of the first user and the user identification of the second user.
For a specific implementation that the first user starts to execute the associated data of the first preset operation by scanning the identification code of the second user, refer to the first embodiment, which is not described in detail in this embodiment.
And step 211, acquiring the identity information to be verified through the identity information acquiring device bound with the second user.
The specific implementation manner of obtaining the identity information to be verified through the identity information obtaining device bound to the second user is referred to in the first embodiment, and details are not described in this embodiment again.
Step 212, determining whether a preset database stores corresponding relationship data between the identity information to be verified and the user identifier of the first user; if yes, go to step 214; otherwise, go to step 213.
Determining whether a specific implementation manner of whether the corresponding relationship data between the identity information to be verified and the user identifier of the first user is stored in a preset database is described in the first embodiment, which is not described in detail in this embodiment.
Step 213, obtaining resource configuration data for performing resource configuration on the second user according to the association data.
In some embodiments of the present application, the association data further comprises: the geographic location of the first user, when acquiring resource configuration data for resource configuration of the second user according to the association data, further includes: acquiring a geographical position bound with the second user according to the user identifier of the second user; matching the geographic location of the first user with the geographic location bound to the second user; and responding to whether the geographic position of the first user is matched with the geographic position bound with the second user or not, and executing or abandoning the step of acquiring the resource configuration data for configuring the second user according to the association data. If the geographic position is successfully matched, acquiring resource configuration data for performing resource configuration on the second user according to the associated data; and if the geographic position is failed to be matched, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
After the real identity information of the user is determined, whether the first user is a store code scanning or not is further determined according to the real-time geographical positions of the first user and the second user, if the first user is a store code scanning, the behavior that the first user executes the first preset operation after the code scanning is considered to be a real behavior, and the associated data of the first user executing the first preset operation is valid data and can be used as a basis for resource configuration of the second user.
In other embodiments of the present application, the association data further comprises: the step of presetting the time of the node in the first preset operation executing process, and if the geographic position is successfully matched, acquiring resource configuration data for performing resource configuration on the second user according to the associated data includes: and in response to whether the interval between the times of the preset nodes in the execution process of the first preset operation meets a preset time threshold, executing or giving up executing resource configuration data for performing resource configuration on the second user according to the associated data. Namely: determining whether an interval between times of the preset nodes in the execution process of the first preset operation meets a preset time threshold; if the interval meets the preset time threshold, acquiring resource configuration data for performing resource configuration on the second user according to the associated data; and if the interval does not meet the preset time threshold, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
Furthermore, in order to improve the accuracy of the resource configuration data, the location and time of the first preset operation of the user are verified during specific implementation of the method. For example, after determining that the user belongs to a store code scanning of the hotel merchant a, a time interval between three time points of code scanning, order placing and check-in of the user is further determined, and if the time interval is too long (for example, more than 20 minutes), the associated data of the first user performing the first preset operation is considered as invalid data, and cannot be used as a basis for resource configuration of the second user. Otherwise, the associated data of the first user executing the first preset operation is valid data, and can be used as a basis for resource configuration of the second user.
In a specific implementation, the step of obtaining resource configuration data for performing resource configuration on the second user according to the associated data further includes: and determining the quantity of the second resources for configuring the resources of the second user according to the associated data. In some embodiments of the present application, the association data further comprises: when the first user executes a first preset operation, the number of first resources allocated to the first user is increased; the step of determining the number of second resources for resource configuration of the second user according to the association data further includes: and determining the number of second resources for resource configuration of the second user according to the number of the first resources.
When the associated data of the first user performing the preset operation is determined to be valid data after the real identity authentication and the geographic position authentication of the first user and the multiple authentication of the duration of the first user performing the first preset operation are performed, the resource configuration can be further performed for the second user according to the associated data. For example, a specified amount of resources is allocated to the second user, or the amount of resources allocated to the second user is determined according to the amount of the first resources allocated to the first user.
At this point, the acquisition of one piece of resource configuration data is completed.
In step 214, the current resource allocation data fails to be obtained.
In some embodiments of the present application, during the process of verifying the first user and the second user, if any one of the following occurs, the current resource data acquisition is considered to be failed. First, if the true identity authentication of the first user fails, for example, the corresponding relationship data is stored, the resource configuration data for performing resource configuration on the second user according to the associated data is abandoned, that is, the current resource configuration data acquisition fails. Secondly, if the geographic location verification fails, that is, the geographic location of the first user is not matched with the geographic location of the second user, the resource configuration data for resource configuration of the second user according to the association data is abandoned, that is, the current resource configuration data is failed to be acquired. Thirdly, if the first user fails to verify the duration of the first preset operation, that is, the interval between the times of the preset nodes in the execution process of the first preset operation does not meet a preset time threshold, the resource configuration data for resource configuration of the second user according to the associated data is abandoned, that is, the current resource configuration data fails to be acquired.
According to the resource configuration data acquisition method disclosed by the embodiment of the application, the second user is subjected to identity verification in advance, the geographic position and the identity information acquisition equipment are bound, and the identity information and the geographic position of the first user executing the first preset operation are subjected to double verification subsequently, so that the accuracy of the acquired resource configuration data can be further improved. Furthermore, the validity of the acquired resource configuration data is judged based on the authenticity of the ordering time through verification based on the interval between the time nodes of the first user executing the first preset operation, and the accuracy of the acquired resource configuration data is further improved.
In addition, before the first user starts to execute the first preset operation by scanning the identification code of the second user, the geographical positions of the first user and the second user are matched, so that reference data which cannot be used as the acquired resource configuration data can be filtered, and the data collection efficiency is improved.
The technical scheme of the resource configuration data acquisition method disclosed by the application is described in detail below in combination with an application scenario in which a hotel merchant A participates in a promotion activity B of a mei-gang platform to acquire corresponding resources. As shown in fig. 3, the method includes: step 301 to step 314.
Step 301, the marketing system of the mei-qu platform generates a promotional campaign B.
Step 302, the merchant-side client displays the promotion activity B.
Step 303, the hotel merchant a inputs the relevant information and registers to participate in the promotion activity B. Wherein, the information that hotel trade company A input includes: the device identification, the geographical location, the store location, the business license, etc. of the identity information acquisition device.
And step 304, the authentication system of the American group platform authenticates the identity of the hotel merchant A.
And if the verification is successful, binding the user identification of the hotel merchant A and the equipment identification of the identity information acquisition equipment, and generating an activity exclusive two-dimensional code of the hotel merchant A according to the user identification of the hotel merchant A and the related information of the promotion activity B.
And if the verification fails, the client at the merchant side prompts the failure of the verification.
Step 305, the hotel merchant A displays the activity-specific two-dimensional code.
Step 306, the user scans the activity-specific two-dimensional code.
After scanning the activity exclusive two-dimensional code through preset client software, a user calls an activity page through a link carried in the activity exclusive two-dimensional code, so that the marketing system is visited. The marketing system acquires the geographic position of the user and the time for scanning the activity-specific two-dimensional code.
Step 307, the marketing system of the beauty team determines whether the user meets the rules for participating in the campaign.
In specific implementation, the marketing system of the beauty party presets a corresponding marketing strategy and defines user rules. And if the user accords with the preset rule, the marketing system issues the coupon for the user.
The marketing system issues coupons for the users, step 308.
Step 309, the user places an order at hotel merchant a.
At step 310, the user completes the order payment using the coupon.
Step 311, the marketing system determines whether the order complies with a predetermined order rule.
The preset order rule is defined by the marketing system according to the business requirement in advance. And if the current order conforms to the preset order rule, the marketing system prompts the user to brush an identity card on the identity information acquisition equipment through a client side of the merchant or through the identity information acquisition equipment to carry out identity verification.
Step 312, the user swipes an identity card on the identity information acquiring device.
And the user swipes the identity card on the identity information acquisition equipment to finish check-in.
Step 313, the identity verification system obtains the check-in information of the user and the identity information obtaining device obtains the identity card information of the user.
And the identity authentication system carries out identity card information transcoding to obtain the identity card number of the user.
And step 314, the marketing system performs order data validity verification.
When the marketing system carries out order data validity verification, the order data validity verification can be carried out through three aspects of whether the identity card number is unique in the system, whether the geographic position of the user is matched with the geographic position of a hotel merchant, scanning the activity exclusive two-dimensional code by the user, and checking time authenticity. Alternatively, the order data may be validated by whether the identification number is unique within the system, and whether the user's geographic location matches the geographic location of the hotel merchant.
If the validity of the order data is successfully verified, the American group can configure corresponding resources for the hotel merchant A according to the order data (such as returning a profit to the hotel merchant A).
Therefore, the resource configuration data acquisition method disclosed by the application can acquire the identity card information through the intelligent hardware and compare the identity card information with the user information in the system to acquire the authenticity of the user, and the illegal merchants cannot copy the identity card, so that illegal arbitrage can be prevented, and the platform operation cost can be further saved.
On the other hand, store information is bound in the two-dimensional code, the intelligent device binds the store information, the current position of a user is obtained when the code and hardware are scanned and read, the current position is compared with the store position when a merchant signs, coupon resale can be avoided, the probability of arbitrage billing is reduced, and platform operation cost is saved. Through multi-dimensional comparison of node time polarities such as code scanning time, ordering time and hardware data reading time, whether the current behavior time of a user meets activity expectation is determined, marketing accuracy is improved, and marketing efficiency is improved. Through binding the geographical position of the merchant with the intelligent hardware and the two-dimensional code, the uniqueness of the merchant is determined through technical binding, the filtering cost of the merchant is saved, the participation identification efficiency of the merchant is improved, and the accuracy of the collected data is improved.
EXAMPLE III
As shown in fig. 4, the apparatus for acquiring resource configuration data disclosed in this embodiment includes:
an operation data obtaining module 401, configured to obtain associated data that a first user starts to execute a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
an identity information to be verified obtaining module 402, configured to obtain identity information to be verified through an identity information obtaining device bound to the second user;
a resource configuration data obtaining module 403, configured to give up or execute resource configuration data for performing resource configuration on the second user according to the association data in response to whether corresponding relationship data between the identity information to be verified and the user identifier of the first user is stored in a preset database.
Optionally, as shown in fig. 5, the association data further includes: the geographic location of the first user, the resource configuration data obtaining module 403 further includes:
the geographic position obtaining sub-module 4031 is configured to obtain, according to the user identifier of the second user, a geographic position bound to the second user;
a geographic location matching sub-module 4032, configured to match the geographic location of the first user with the geographic location bound to the second user;
a resource configuration data obtaining sub-module 4033, configured to execute or abandon execution of resource configuration data for performing resource configuration on the second user according to the association data in response to whether the geographic location of the first user matches the geographic location bound to the second user.
For example, if the geographic location is successfully matched, resource configuration data for performing resource configuration on the second user is obtained according to the associated data; and if the geographic position is failed to be matched, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
Optionally, the associated data further includes: the resource configuration data obtaining sub-module is further configured to:
and in response to whether the interval between the times of the preset nodes in the execution process of the first preset operation meets a preset time threshold, executing or giving up executing resource configuration data for performing resource configuration on the second user according to the associated data. For example, if the interval meets the preset time threshold, resource configuration data for performing resource configuration on the second user is obtained according to the associated data;
and if the interval does not meet the preset time threshold, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
Optionally, the step of obtaining resource configuration data for performing resource configuration on the second user according to the association data further includes:
and determining the quantity of the second resources for configuring the resources of the second user according to the associated data.
Optionally, as shown in fig. 5, the apparatus further includes:
a first user authentication module 404, configured to acquire a geographic location of the first user and a user identifier of the second user according to an operation of scanning the identifier of the second user by the first user; and the number of the first and second groups,
acquiring a geographical position bound with the second user according to the user identifier of the second user;
the first user verification module 404 is further configured to allocate a preset amount of first resources to the first user if a distance between the geographic location of the first user and the geographic location bound to the second user meets a preset distance threshold and the first user meets a preset user condition.
Optionally, as shown in fig. 5, the apparatus further includes:
a resource configuration request obtaining module 405, configured to obtain a request for applying for resource configuration by the second user, where the request includes a user identifier of the second user and an equipment identifier of the identity information obtaining device;
an identity information obtaining device binding module 406, configured to bind the user identifier of the second user and the device identifier of the identity information obtaining device.
Optionally, as shown in fig. 5, the request further includes identity information of the second user, where the identity information at least includes a geographic location of the second user, and the apparatus further includes:
the second user identity verification module 407 is configured to verify that the request includes the identity information of the second user according to identity information corresponding to a pre-stored user identifier of the second user;
and a geographic location binding and identification code generating module 408, configured to bind the user identifier of the second user and the geographic location of the second user if the verification is passed, generate an identification code corresponding to the user identifier of the second user one to one, and send the identification code to the second user.
The resource configuration data acquisition device disclosed by the embodiment of the application starts to execute the associated data of the first preset operation by acquiring the identification code of the first user through scanning the identification code of the second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user; acquiring identity information to be verified through identity information acquisition equipment bound with the second user; determining whether corresponding relation data of the identity information to be verified and the user identification of the first user is stored in a preset database; if the corresponding relation data is stored, the resource configuration data for performing resource configuration on the second user according to the associated data is abandoned; if the corresponding relation data is not stored, the resource configuration data for performing resource configuration on the second user is obtained according to the associated data, and the problem that the obtained resource configuration data in the prior art is inaccurate is solved. According to the resource configuration data acquisition device disclosed by the embodiment of the application, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, so that the second user is effectively prevented from executing a first preset operation through a false account to generate resource configuration data, the phenomenon of improper resource acquisition is avoided, and the accuracy of acquiring the resource configuration data is effectively improved.
On the other hand, the resource configuration data acquisition device disclosed in the embodiment of the present application performs identity authentication on the second user in advance, and binds the geographic position and the identity information acquisition device, so as to perform dual verification on the identity information and the geographic position of the first user performing the first preset operation, which can further improve the accuracy of the acquired resource configuration data. Furthermore, the validity of the acquired resource configuration data is judged based on the authenticity of the ordering time through verification based on the interval between the time nodes of the first user executing the first preset operation, and the accuracy of the acquired resource configuration data is further improved.
Correspondingly, the application also discloses an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the resource configuration data acquisition method according to the first embodiment of the application. The electronic device can be a PC, a mobile terminal, a personal digital assistant, a tablet computer and the like.
The present application also discloses a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the resource configuration data acquisition method according to the first embodiment of the present application.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The method and the device for acquiring resource configuration data provided by the present application are introduced in detail, and a specific example is applied in the description to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understanding the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.

Claims (10)

1. A resource allocation data acquisition method is characterized by comprising the following steps:
acquiring associated data of a first user starting to execute a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
acquiring identity information to be verified through identity information acquisition equipment bound with the second user;
and giving up or executing the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
2. The method of claim 1, wherein associating data further comprises: the step of obtaining resource configuration data for resource configuration of the second user according to the association data, which is based on the geographic location of the first user, includes:
acquiring a geographical position bound with the second user according to the user identifier of the second user;
and responding to whether the geographic position of the first user is matched with the geographic position bound with the second user or not, and executing or abandoning the step of acquiring the resource configuration data for configuring the second user according to the association data.
3. The method of claim 2, wherein the associating data further comprises: the step of presetting the node time in the first preset operation execution process, and acquiring resource configuration data for performing resource configuration on the second user according to the associated data, includes:
and executing or giving up execution of the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether the interval between the times of the preset nodes in the execution process of the first preset operation meets a preset time threshold.
4. The method according to any one of claims 1 to 3, wherein the step of obtaining resource configuration data for resource configuration of the second user according to the association data further comprises:
and determining the quantity of the second resources for configuring the resources of the second user according to the associated data.
5. The method according to any one of claims 1 to 3, wherein before the step of acquiring the associated data for the first user to initiate the execution of the first preset operation by scanning the identification code of the second user, the method further comprises:
acquiring the geographic position of the first user and the user identification of the second user according to the operation of scanning the identification code of the second user by the first user;
acquiring a geographical position bound with the second user according to the user identifier of the second user;
and if the distance between the geographical position of the first user and the geographical position bound with the second user meets a preset distance threshold value and the first user meets a preset user condition, allocating a preset amount of first resources for the first user.
6. The method of claim 5, wherein the step of obtaining the geographic location of the first user and the user identity of the second user according to the operation of the first user scanning the identification code of the second user is preceded by the step of:
acquiring a request for resource configuration applied by the second user, wherein the request comprises a user identifier of the second user and an equipment identifier of the identity information acquisition equipment;
and binding the user identifier of the second user and the equipment identifier of the identity information acquisition equipment.
7. The method according to claim 6, wherein the request further includes identity information of the second user, the identity information at least includes a geographical location of the second user, and after the step of obtaining the request for resource configuration applied by the second user, the method further includes:
verifying the identity information of the second user in the request according to the pre-stored identity information corresponding to the user identifier of the second user;
and if the verification is passed, binding the user identification of the second user with the geographic position of the second user, generating an identification code corresponding to the user identification of the second user one by one, and sending the identification code to the second user.
8. A resource allocation data acquisition apparatus, comprising:
the operation data acquisition module is used for acquiring associated data of a first user for starting execution of a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
the identity information acquisition module to be verified is used for acquiring identity information to be verified through the identity information acquisition equipment bound with the second user;
and the resource configuration data acquisition module is used for giving up or executing the step of acquiring the resource configuration data for configuring the resource of the second user according to the associated data in response to whether the corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the resource allocation data acquisition method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the resource configuration data acquisition method according to any one of claims 1 to 7.
CN201811400955.0A 2018-11-22 2018-11-22 Resource configuration data acquisition method and device, electronic equipment and storage medium Active CN111210248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811400955.0A CN111210248B (en) 2018-11-22 2018-11-22 Resource configuration data acquisition method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811400955.0A CN111210248B (en) 2018-11-22 2018-11-22 Resource configuration data acquisition method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111210248A true CN111210248A (en) 2020-05-29
CN111210248B CN111210248B (en) 2022-04-12

Family

ID=70788081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811400955.0A Active CN111210248B (en) 2018-11-22 2018-11-22 Resource configuration data acquisition method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111210248B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112085443A (en) * 2020-08-27 2020-12-15 拉扎斯网络科技(上海)有限公司 Distribution resource detection method, distribution resource detection device, distribution resource task execution method, distribution resource detection device, distribution task execution device and electronic equipment
CN112508607A (en) * 2020-12-02 2021-03-16 上海中商网络股份有限公司 Data pushing method and device, computer equipment and readable storage medium
CN114418572A (en) * 2020-10-21 2022-04-29 拉扎斯网络科技(上海)有限公司 Method and device for processing virtual payment information, storage medium and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187399A (en) * 2015-08-12 2015-12-23 南京钱宝信息传媒有限公司 Resource processing method and device
CN105354747A (en) * 2015-10-09 2016-02-24 徐蔚 Information processing network and method based on uniform code sending, and sensing access equipment
CN105719171A (en) * 2016-01-19 2016-06-29 南京图牛商城有限公司 Association management system and method used for electronic commerce
CN106874273A (en) * 2015-12-11 2017-06-20 广州市动景计算机科技有限公司 Channel information statistical method, device and system
CN107343027A (en) * 2017-06-13 2017-11-10 福建省天晴互动娱乐有限公司 APP sharing methods
CN108092871A (en) * 2016-11-22 2018-05-29 长沙海商网络技术有限公司 A kind of processing method to establishing 3 grades of binding relationships between user in shopping platform
CN108764971A (en) * 2018-05-07 2018-11-06 杭州优行科技有限公司 Device identification method, device, electronic equipment and readable storage medium storing program for executing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187399A (en) * 2015-08-12 2015-12-23 南京钱宝信息传媒有限公司 Resource processing method and device
CN105354747A (en) * 2015-10-09 2016-02-24 徐蔚 Information processing network and method based on uniform code sending, and sensing access equipment
CN106874273A (en) * 2015-12-11 2017-06-20 广州市动景计算机科技有限公司 Channel information statistical method, device and system
CN105719171A (en) * 2016-01-19 2016-06-29 南京图牛商城有限公司 Association management system and method used for electronic commerce
CN108092871A (en) * 2016-11-22 2018-05-29 长沙海商网络技术有限公司 A kind of processing method to establishing 3 grades of binding relationships between user in shopping platform
CN107343027A (en) * 2017-06-13 2017-11-10 福建省天晴互动娱乐有限公司 APP sharing methods
CN108764971A (en) * 2018-05-07 2018-11-06 杭州优行科技有限公司 Device identification method, device, electronic equipment and readable storage medium storing program for executing

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112085443A (en) * 2020-08-27 2020-12-15 拉扎斯网络科技(上海)有限公司 Distribution resource detection method, distribution resource detection device, distribution resource task execution method, distribution resource detection device, distribution task execution device and electronic equipment
CN114418572A (en) * 2020-10-21 2022-04-29 拉扎斯网络科技(上海)有限公司 Method and device for processing virtual payment information, storage medium and electronic equipment
CN112508607A (en) * 2020-12-02 2021-03-16 上海中商网络股份有限公司 Data pushing method and device, computer equipment and readable storage medium

Also Published As

Publication number Publication date
CN111210248B (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN108234505B (en) Account login method and system
CN110363666B (en) Information processing method, apparatus, computing device and storage medium
US20160132846A1 (en) Online payment processing method, apparatus and system
CN111210248B (en) Resource configuration data acquisition method and device, electronic equipment and storage medium
JP7162587B2 (en) Order information processing method, apparatus and system
US20150161613A1 (en) Methods and systems for authentications and online transactions
EP3958502A1 (en) Computer implemented method and system
CN104601712B (en) Resource supplying method and system
CN106600275B (en) Risk identification method and device
CN103996132A (en) Wedding celebration information service system based on mobile internet
CN108510310A (en) Rent method and device
CN111063050A (en) Sign-in method, device, server and storage medium
CN106779673B (en) Electronic payment method and system
CN110728520B (en) Processing method and device for refusal payment application and server
CN112819508B (en) Electronic resource allocation method and device
CN106022861B (en) Online transfer method and device for electronic ticket
CN105741119A (en) Business implementation method and device
US20130226698A1 (en) System, method and program for embedding in line advertisements during a multi-factor authentication session
CN110503470A (en) A kind of method for running and system of product sales promotion
KR101918749B1 (en) Payment gateway processing apparatus capable of automatically inputting personal information based on a two-dimensional code and operating method thereof
CN111932241B (en) Prepayment order processing method and device
CN110766415B (en) Transaction processing method based on payment code and payment code processing method
CN114219588B (en) Commodity marketing and transaction method, device and system based on AI technology
CN114626915A (en) Commodity recommendation activity processing method
CN107563844A (en) A kind of method and device for insuring transaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant