CN111210248A - Resource configuration data acquisition method and device, electronic equipment and storage medium - Google Patents
Resource configuration data acquisition method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN111210248A CN111210248A CN201811400955.0A CN201811400955A CN111210248A CN 111210248 A CN111210248 A CN 111210248A CN 201811400955 A CN201811400955 A CN 201811400955A CN 111210248 A CN111210248 A CN 111210248A
- Authority
- CN
- China
- Prior art keywords
- user
- resource configuration
- data
- identity information
- acquiring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0639—Item locations
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Data Mining & Analysis (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a resource configuration data acquisition method, belongs to the technical field of computers, and is used for solving the problem that resource configuration data is not accurately acquired in the prior art. The resource configuration data acquisition method comprises the following steps: acquiring associated data of a first user starting to execute a first preset operation by scanning an identification code of a second user; the associated data includes: a user identification of a first user and a user identification of a second user; acquiring identity information to be verified through identity information acquisition equipment bound with a second user; and giving up or executing resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database. According to the resource configuration data acquisition method, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, and the accuracy of acquiring the resource configuration data is improved.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for acquiring resource configuration data, an electronic device, and a storage medium.
Background
With the development of internet technology, electronic commerce platforms are more and more, users can obtain more information through the electronic commerce platforms, and offline merchants can obtain more customers through the electronic commerce platforms. Electronic commerce platforms will also often push out activities to attract customers and to evaluate the marketability of merchants. For example, the number of users is increased by issuing virtual resources for the users. Meanwhile, the marketing ability of the merchant is determined according to the promotion data of the merchant on the activity, or corresponding resources are distributed to the merchant. In the prior art, a common method for collecting merchant promotion data is as follows: generating a two-dimensional code for a merchant, after the user finishes an order on an e-commerce platform by scanning the two-dimensional code of the merchant, determining to collect promotion data of the merchant, and finally configuring corresponding resources for the merchant according to the collected promotion data of the merchant.
However, in order to generate more promotion data, some merchants can obtain more resources by registering a plurality of user accounts and simulating ordering behavior of real users through the registered user accounts to generate false promotion data.
Therefore, in the prior art, when the resource configuration data according to which the resources are configured is obtained, false data cannot be identified, and at least the defect that the obtained resource configuration data is inaccurate exists.
Disclosure of Invention
The application provides a resource configuration data acquisition method which is beneficial to the accuracy of resource configuration data according to when resources are configured.
In order to solve the above problem, in a first aspect, an embodiment of the present application provides a method for acquiring resource configuration data, including:
acquiring associated data of a first user starting to execute a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
acquiring identity information to be verified through identity information acquisition equipment bound with the second user;
and giving up or executing the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
In a second aspect, an embodiment of the present application provides an apparatus for acquiring resource configuration data, including:
the operation data acquisition module is used for acquiring associated data of a first user for starting execution of a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
the identity information acquisition module to be verified is used for acquiring identity information to be verified through the identity information acquisition equipment bound with the second user;
and the resource configuration data acquisition module is used for giving up or executing the step of acquiring the resource configuration data for configuring the resource of the second user according to the associated data in response to whether the corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
In a third aspect, an embodiment of the present application further discloses an electronic device, which includes a memory, a processor, and a computer program that is stored in the memory and is executable on the processor, and when the processor executes the computer program, the resource configuration data acquisition method according to the embodiment of the present application is implemented.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the resource configuration data acquisition method disclosed in the present application.
The resource configuration data acquisition method disclosed by the embodiment of the application starts to execute the associated data of the first preset operation by acquiring the identification code of the first user through scanning the identification code of the second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user; acquiring identity information to be verified through identity information acquisition equipment bound with the second user; and giving up or executing the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database, so that the problem that the acquired resource configuration data in the prior art is inaccurate is solved. According to the resource configuration data acquisition method disclosed by the embodiment of the application, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, so that the phenomenon that the second user executes the first preset operation through the false account to generate the resource configuration data, resources are improperly acquired is effectively avoided, and the accuracy of acquiring the resource configuration data is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of a resource allocation data acquisition method according to a first embodiment of the present application;
fig. 2 is a flowchart of a resource allocation data acquisition method according to a second embodiment of the present application;
fig. 3 is a schematic diagram of a specific application of the resource allocation data acquisition method according to the second embodiment of the present application;
fig. 4 is a schematic structural diagram of a resource allocation data acquisition apparatus according to a third embodiment of the present application;
fig. 5 is a second schematic structural diagram of a resource allocation data acquisition apparatus according to a third embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In some embodiments of the present application, the first user and the second user represent different users; the identification code can be in the form of a two-dimensional code, a bar code, a radio frequency tag and the like and can uniquely identify the identity. The first preset operation can be operations of entering a hotel, having a meal, watching a movie and the like. In order to facilitate readers to understand the technical solutions, in the embodiments of the present application, a first preset operation is taken as an example of entering a hotel, a first user is a common user, and a second user is a merchant (for example, a hotel merchant), so as to describe the technical solutions of the present application in detail.
Example one
As shown in fig. 1, a method for acquiring resource configuration data disclosed in this embodiment includes: step 101 to step 103.
Wherein the associated data comprises: the user identification of the first user and the user identification of the second user.
When the method is specifically implemented, firstly, identity verification is carried out on a second user which proposes resource allocation, after the identity verification is passed, an identification code, such as a two-dimensional code, is generated for the second user according to the user identification of the second user, and the generated identification code is sent to the second user. And the second user displays the identification code, and the user carries out popularization operation to attract a new user.
For example, the e-commerce platform generates a two-dimensional code according to the user identifier of the hotel merchant a and the link of the platform promotion activity, and sends the two-dimensional code to the hotel merchant a. The hotel merchant A displays the two-dimensional code on the hotel reception desk, so that the user can scan the two-dimensional code to participate in popularization activities, for example, new users are registered to get coupons and pay the hotel room-entering fee.
When a user scans the two-dimensional code through a mobile phone in the foreground of a hotel merchant A, the code scanning application acquires a specific promotion activity page through information in the two-dimensional code, the electronic commerce platform acquires the positioning data of the mobile phone of the first user through the promotion activity page to determine the geographic position of the first user, and meanwhile, the electronic commerce platform can further acquire the user identification of the second user through the promotion activity page.
Further, before the first user participates in a promotion activity, such as getting a coupon, the first user needs to log in the e-commerce platform, so that the e-commerce platform can obtain the user identifier of the first user getting the coupon.
The first user may then pay the hotel merchant a for the room fee or purchase other products of the hotel merchant a using the received coupon. According to the operation that the first user pays the room cost of the hotel merchant A or purchases other products of the hotel merchant A, the e-commerce platform can acquire the associated data of the corresponding operation of the first user. Wherein the associated data includes, but is not limited to, any one or more of the following: the method comprises the following steps of obtaining information of a user identifier of a first user, a geographic position of the first user, time for scanning a two-dimensional code (namely time for acquiring a promotion activity page) by the first user, order placing time of the first user, order payment time of the first user, a user identifier of a second user, a geographic position of the second user and the like.
And 102, acquiring identity information to be verified through the identity information acquisition equipment bound with the second user.
After the first user uses the coupon, the first user needs to perform identity information verification on identity information acquisition equipment arranged at a foreground of the hotel merchant a, for example, identity card scanning is performed on the first user to perform identity information verification; or acquiring the identity information such as the fingerprint, the face and the like of the first user through the identity information acquisition equipment to verify the identity information. The identity information acquisition equipment is hardware equipment which is configured for the hotel merchant A by the electronic commerce platform in advance and is necessary for activity promotion and used for acquiring user identity information.
And the identity information acquisition equipment sends the acquired identity information of the first user to the electronic merchant platform so as to carry out user identity verification.
And then, the electronic merchant platform matches the to-be-verified identity information of the first user acquired by the identity information with user data pre-stored by the platform, and determines whether a corresponding relationship is established between the to-be-verified identity information and the user identifier of the first user, namely whether corresponding relationship data between the to-be-verified identity information and the user identifier of the first user is stored in a preset database. For example, if the electronic commerce platform stores a first user identifier that a hotel was ordered on the electronic commerce platform by using the to-be-verified identity information, the electronic commerce platform is considered to store the corresponding relationship data between the to-be-verified identity information and the user identifier of the first user. If the first user is a new user and no other user registers or orders a product on the electronic commerce platform by using the identity information to be verified, the corresponding relation data of the identity information to be verified and the user identification of the first user cannot be stored in a preset database.
And if the corresponding relation is stored, the resource configuration data for performing resource configuration on the second user according to the associated data is abandoned.
If the preset database stores the corresponding relation data of the identity information to be verified and the user identification of the first user, it is indicated that the first user is not a real new user, the promotion of the hotel merchant A is invalid at this time, and the associated data of the first user executing the first preset operation is not taken as valid promotion data.
And if the corresponding relation is not stored, acquiring resource configuration data for performing resource configuration on the second user according to the associated data.
If the corresponding relation data of the identity information to be verified and the user identification of the first user is not stored in the preset database, the first user is a new user, the hotel merchant A is effective in the promotion at this time, and the associated data of the first user executing the first preset operation is taken as effective promotion data. And the e-commerce platform acquires resource configuration data for configuring the resources of the second user according to the associated data. For example, corresponding resources are configured for the second user according to the coupon information in the associated data, or a preset number of resources are configured for the second user. In a specific implementation, the resource may be a network bandwidth, a storage resource, a currency, and the like.
The resource configuration data acquisition method disclosed by the embodiment of the application starts to execute the associated data of the first preset operation by acquiring the identification code of the first user through scanning the identification code of the second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user; acquiring identity information to be verified through identity information acquisition equipment bound with the second user; and giving up or executing the resource configuration data for performing resource configuration on the second user according to the associated data in response to whether the corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database, and solving the problem that the resource configuration data acquired in the prior art is inaccurate. According to the resource configuration data acquisition method disclosed by the embodiment of the application, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, so that the phenomenon that the second user executes the first preset operation through the false account to generate the resource configuration data, resources are improperly acquired is effectively avoided, and the accuracy of acquiring the resource configuration data is effectively improved.
Example two
As shown in fig. 2, a method for acquiring resource configuration data disclosed in this embodiment includes: step 201 to step 214.
In some embodiments of the present application, before the step of obtaining the geographic location of the first user and the user identifier of the second user according to the operation of scanning the identifier code of the second user by the first user, the method further includes: acquiring a request for resource configuration applied by the second user, wherein the request comprises a user identifier of the second user and an equipment identifier of the identity information acquisition equipment; and binding the user identifier of the second user and the equipment identifier of the identity information acquisition equipment. In other embodiments of the present application, the request further includes identity information of the second user, where the identity information at least includes a geographic location of the second user, and after the step of obtaining the request for resource configuration, the method further includes: verifying the identity information of the second user in the request according to the pre-stored identity information corresponding to the user identifier of the second user; and if the verification is passed, binding the user identification of the second user with the geographic position of the second user, generating an identification code corresponding to the user identification of the second user one by one, and sending the identification code to the second user.
In this embodiment, the specific technical solution for acquiring the resource configuration data is illustrated by the request including the user identifier of the second user, the device identifier of the identity information acquiring device, and the identity information of the second user. Wherein the identity information at least includes a geographic location of the second user, and may further include: store names, business licenses, etc.
In specific implementation, the second user may input necessary information for applying resource configuration through a client of the e-commerce platform, and then submit a request for resource configuration. And the client packs the user identification of the second user and the input necessary information to generate a request for applying resource configuration. The request includes a user identification of the second user and the necessary information. Wherein the necessary information includes: and acquiring the equipment identifier of the equipment by the identity information. In some embodiments of the present application, the necessary information includes: identity information of the second user. In some embodiments of the present application, the identity information comprises: the second user's geographic location, business license, store name, etc. The electronic commerce platform acquires a request for resource configuration through a preset client, wherein the request is submitted by a second user, and acquires a user identifier, identity information and an equipment identifier of identity information acquisition equipment of the second user, wherein the user identifier, the identity information and the equipment identifier are included in the request.
For example, the geographic location, business license, store name, etc. included in the request are compared and verified.
And the e-commerce platform stores the binding relationship between the user identifier of the second user and the equipment identifier of the identity information acquisition equipment.
And the e-commerce platform stores the binding relationship between the user identification of the second user and the geographic position of the second user. And then, generating an identification code corresponding to the user identification of the second user one by one according to the user identification of the second user, and sending the identification code to the second user. In specific implementation, the identification code corresponding to the user identifier of the second user one to one may be generated according to the user identifier of the second user and information (such as an activity page address) of the promotion activity involved in resource configuration.
In some embodiments of the present application, before the step of acquiring the associated data that the first user initiates to perform the first preset operation by scanning the identification code of the second user, the method further includes: acquiring the geographic position of the first user and the user identification of the second user according to the operation of scanning the identification code of the second user by the first user; acquiring a geographical position bound with the second user according to the user identifier of the second user; and if the distance between the geographical position of the first user and the geographical position bound with the second user meets a preset distance threshold value and the first user meets a preset user condition, allocating a preset amount of first resources for the first user.
In specific implementation, the identification code can be in the form of a two-dimensional code, a bar code, a radio frequency tag and the like. And the second user displays the identification code to enable the first user to scan through a preset client so as to obtain a preset page of the electronic commerce platform. For example, the first user scans a two-dimensional code displayed by the second user through a preset client on a mobile phone; then, the preset client analyzes the two-dimension code to obtain and access a preset page of the electronic commerce platform; then, the assisting e-commerce platform may obtain, through the preset page, a time when the first user scans the two-dimensional code (i.e., a time when the preset page of the e-commerce platform is obtained and accessed), a user identifier of the second user, and a geographic location of the first user.
And step 207, acquiring the geographical position bound with the second user according to the user identifier of the second user.
Further, the e-commerce platform acquires the geographic position bound with the second user according to a pre-stored binding relationship between the user identifier of the second user and the geographic position.
And if the distance between the geographic position of the first user and the geographic position bound with the second user is smaller than a preset distance threshold, the first user is indicated to perform code scanning operation at a store of the second user. And then, further judging whether the first user meets preset user conditions according to the portrait information of the first user, so as to determine whether the first user is a target client of the electronic commerce platform.
And when the distance between the geographical position of the first user and the geographical position bound with the second user is smaller than a preset distance threshold value and the first user meets a preset user condition, allocating a preset amount of first resources to the first user.
In some embodiments of the applications, the first resource may be a voucher, physical item, or the like; the preset number may be determined according to the portrait information of the first user, or may be a fixed value.
Wherein the associated data comprises: the user identification of the first user and the user identification of the second user.
For a specific implementation that the first user starts to execute the associated data of the first preset operation by scanning the identification code of the second user, refer to the first embodiment, which is not described in detail in this embodiment.
And step 211, acquiring the identity information to be verified through the identity information acquiring device bound with the second user.
The specific implementation manner of obtaining the identity information to be verified through the identity information obtaining device bound to the second user is referred to in the first embodiment, and details are not described in this embodiment again.
Determining whether a specific implementation manner of whether the corresponding relationship data between the identity information to be verified and the user identifier of the first user is stored in a preset database is described in the first embodiment, which is not described in detail in this embodiment.
In some embodiments of the present application, the association data further comprises: the geographic location of the first user, when acquiring resource configuration data for resource configuration of the second user according to the association data, further includes: acquiring a geographical position bound with the second user according to the user identifier of the second user; matching the geographic location of the first user with the geographic location bound to the second user; and responding to whether the geographic position of the first user is matched with the geographic position bound with the second user or not, and executing or abandoning the step of acquiring the resource configuration data for configuring the second user according to the association data. If the geographic position is successfully matched, acquiring resource configuration data for performing resource configuration on the second user according to the associated data; and if the geographic position is failed to be matched, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
After the real identity information of the user is determined, whether the first user is a store code scanning or not is further determined according to the real-time geographical positions of the first user and the second user, if the first user is a store code scanning, the behavior that the first user executes the first preset operation after the code scanning is considered to be a real behavior, and the associated data of the first user executing the first preset operation is valid data and can be used as a basis for resource configuration of the second user.
In other embodiments of the present application, the association data further comprises: the step of presetting the time of the node in the first preset operation executing process, and if the geographic position is successfully matched, acquiring resource configuration data for performing resource configuration on the second user according to the associated data includes: and in response to whether the interval between the times of the preset nodes in the execution process of the first preset operation meets a preset time threshold, executing or giving up executing resource configuration data for performing resource configuration on the second user according to the associated data. Namely: determining whether an interval between times of the preset nodes in the execution process of the first preset operation meets a preset time threshold; if the interval meets the preset time threshold, acquiring resource configuration data for performing resource configuration on the second user according to the associated data; and if the interval does not meet the preset time threshold, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
Furthermore, in order to improve the accuracy of the resource configuration data, the location and time of the first preset operation of the user are verified during specific implementation of the method. For example, after determining that the user belongs to a store code scanning of the hotel merchant a, a time interval between three time points of code scanning, order placing and check-in of the user is further determined, and if the time interval is too long (for example, more than 20 minutes), the associated data of the first user performing the first preset operation is considered as invalid data, and cannot be used as a basis for resource configuration of the second user. Otherwise, the associated data of the first user executing the first preset operation is valid data, and can be used as a basis for resource configuration of the second user.
In a specific implementation, the step of obtaining resource configuration data for performing resource configuration on the second user according to the associated data further includes: and determining the quantity of the second resources for configuring the resources of the second user according to the associated data. In some embodiments of the present application, the association data further comprises: when the first user executes a first preset operation, the number of first resources allocated to the first user is increased; the step of determining the number of second resources for resource configuration of the second user according to the association data further includes: and determining the number of second resources for resource configuration of the second user according to the number of the first resources.
When the associated data of the first user performing the preset operation is determined to be valid data after the real identity authentication and the geographic position authentication of the first user and the multiple authentication of the duration of the first user performing the first preset operation are performed, the resource configuration can be further performed for the second user according to the associated data. For example, a specified amount of resources is allocated to the second user, or the amount of resources allocated to the second user is determined according to the amount of the first resources allocated to the first user.
At this point, the acquisition of one piece of resource configuration data is completed.
In step 214, the current resource allocation data fails to be obtained.
In some embodiments of the present application, during the process of verifying the first user and the second user, if any one of the following occurs, the current resource data acquisition is considered to be failed. First, if the true identity authentication of the first user fails, for example, the corresponding relationship data is stored, the resource configuration data for performing resource configuration on the second user according to the associated data is abandoned, that is, the current resource configuration data acquisition fails. Secondly, if the geographic location verification fails, that is, the geographic location of the first user is not matched with the geographic location of the second user, the resource configuration data for resource configuration of the second user according to the association data is abandoned, that is, the current resource configuration data is failed to be acquired. Thirdly, if the first user fails to verify the duration of the first preset operation, that is, the interval between the times of the preset nodes in the execution process of the first preset operation does not meet a preset time threshold, the resource configuration data for resource configuration of the second user according to the associated data is abandoned, that is, the current resource configuration data fails to be acquired.
According to the resource configuration data acquisition method disclosed by the embodiment of the application, the second user is subjected to identity verification in advance, the geographic position and the identity information acquisition equipment are bound, and the identity information and the geographic position of the first user executing the first preset operation are subjected to double verification subsequently, so that the accuracy of the acquired resource configuration data can be further improved. Furthermore, the validity of the acquired resource configuration data is judged based on the authenticity of the ordering time through verification based on the interval between the time nodes of the first user executing the first preset operation, and the accuracy of the acquired resource configuration data is further improved.
In addition, before the first user starts to execute the first preset operation by scanning the identification code of the second user, the geographical positions of the first user and the second user are matched, so that reference data which cannot be used as the acquired resource configuration data can be filtered, and the data collection efficiency is improved.
The technical scheme of the resource configuration data acquisition method disclosed by the application is described in detail below in combination with an application scenario in which a hotel merchant A participates in a promotion activity B of a mei-gang platform to acquire corresponding resources. As shown in fig. 3, the method includes: step 301 to step 314.
And step 304, the authentication system of the American group platform authenticates the identity of the hotel merchant A.
And if the verification is successful, binding the user identification of the hotel merchant A and the equipment identification of the identity information acquisition equipment, and generating an activity exclusive two-dimensional code of the hotel merchant A according to the user identification of the hotel merchant A and the related information of the promotion activity B.
And if the verification fails, the client at the merchant side prompts the failure of the verification.
After scanning the activity exclusive two-dimensional code through preset client software, a user calls an activity page through a link carried in the activity exclusive two-dimensional code, so that the marketing system is visited. The marketing system acquires the geographic position of the user and the time for scanning the activity-specific two-dimensional code.
In specific implementation, the marketing system of the beauty party presets a corresponding marketing strategy and defines user rules. And if the user accords with the preset rule, the marketing system issues the coupon for the user.
The marketing system issues coupons for the users, step 308.
At step 310, the user completes the order payment using the coupon.
The preset order rule is defined by the marketing system according to the business requirement in advance. And if the current order conforms to the preset order rule, the marketing system prompts the user to brush an identity card on the identity information acquisition equipment through a client side of the merchant or through the identity information acquisition equipment to carry out identity verification.
And the user swipes the identity card on the identity information acquisition equipment to finish check-in.
And the identity authentication system carries out identity card information transcoding to obtain the identity card number of the user.
And step 314, the marketing system performs order data validity verification.
When the marketing system carries out order data validity verification, the order data validity verification can be carried out through three aspects of whether the identity card number is unique in the system, whether the geographic position of the user is matched with the geographic position of a hotel merchant, scanning the activity exclusive two-dimensional code by the user, and checking time authenticity. Alternatively, the order data may be validated by whether the identification number is unique within the system, and whether the user's geographic location matches the geographic location of the hotel merchant.
If the validity of the order data is successfully verified, the American group can configure corresponding resources for the hotel merchant A according to the order data (such as returning a profit to the hotel merchant A).
Therefore, the resource configuration data acquisition method disclosed by the application can acquire the identity card information through the intelligent hardware and compare the identity card information with the user information in the system to acquire the authenticity of the user, and the illegal merchants cannot copy the identity card, so that illegal arbitrage can be prevented, and the platform operation cost can be further saved.
On the other hand, store information is bound in the two-dimensional code, the intelligent device binds the store information, the current position of a user is obtained when the code and hardware are scanned and read, the current position is compared with the store position when a merchant signs, coupon resale can be avoided, the probability of arbitrage billing is reduced, and platform operation cost is saved. Through multi-dimensional comparison of node time polarities such as code scanning time, ordering time and hardware data reading time, whether the current behavior time of a user meets activity expectation is determined, marketing accuracy is improved, and marketing efficiency is improved. Through binding the geographical position of the merchant with the intelligent hardware and the two-dimensional code, the uniqueness of the merchant is determined through technical binding, the filtering cost of the merchant is saved, the participation identification efficiency of the merchant is improved, and the accuracy of the collected data is improved.
EXAMPLE III
As shown in fig. 4, the apparatus for acquiring resource configuration data disclosed in this embodiment includes:
an operation data obtaining module 401, configured to obtain associated data that a first user starts to execute a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
an identity information to be verified obtaining module 402, configured to obtain identity information to be verified through an identity information obtaining device bound to the second user;
a resource configuration data obtaining module 403, configured to give up or execute resource configuration data for performing resource configuration on the second user according to the association data in response to whether corresponding relationship data between the identity information to be verified and the user identifier of the first user is stored in a preset database.
Optionally, as shown in fig. 5, the association data further includes: the geographic location of the first user, the resource configuration data obtaining module 403 further includes:
the geographic position obtaining sub-module 4031 is configured to obtain, according to the user identifier of the second user, a geographic position bound to the second user;
a geographic location matching sub-module 4032, configured to match the geographic location of the first user with the geographic location bound to the second user;
a resource configuration data obtaining sub-module 4033, configured to execute or abandon execution of resource configuration data for performing resource configuration on the second user according to the association data in response to whether the geographic location of the first user matches the geographic location bound to the second user.
For example, if the geographic location is successfully matched, resource configuration data for performing resource configuration on the second user is obtained according to the associated data; and if the geographic position is failed to be matched, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
Optionally, the associated data further includes: the resource configuration data obtaining sub-module is further configured to:
and in response to whether the interval between the times of the preset nodes in the execution process of the first preset operation meets a preset time threshold, executing or giving up executing resource configuration data for performing resource configuration on the second user according to the associated data. For example, if the interval meets the preset time threshold, resource configuration data for performing resource configuration on the second user is obtained according to the associated data;
and if the interval does not meet the preset time threshold, giving up the resource configuration data for performing resource configuration on the second user according to the associated data.
Optionally, the step of obtaining resource configuration data for performing resource configuration on the second user according to the association data further includes:
and determining the quantity of the second resources for configuring the resources of the second user according to the associated data.
Optionally, as shown in fig. 5, the apparatus further includes:
a first user authentication module 404, configured to acquire a geographic location of the first user and a user identifier of the second user according to an operation of scanning the identifier of the second user by the first user; and the number of the first and second groups,
acquiring a geographical position bound with the second user according to the user identifier of the second user;
the first user verification module 404 is further configured to allocate a preset amount of first resources to the first user if a distance between the geographic location of the first user and the geographic location bound to the second user meets a preset distance threshold and the first user meets a preset user condition.
Optionally, as shown in fig. 5, the apparatus further includes:
a resource configuration request obtaining module 405, configured to obtain a request for applying for resource configuration by the second user, where the request includes a user identifier of the second user and an equipment identifier of the identity information obtaining device;
an identity information obtaining device binding module 406, configured to bind the user identifier of the second user and the device identifier of the identity information obtaining device.
Optionally, as shown in fig. 5, the request further includes identity information of the second user, where the identity information at least includes a geographic location of the second user, and the apparatus further includes:
the second user identity verification module 407 is configured to verify that the request includes the identity information of the second user according to identity information corresponding to a pre-stored user identifier of the second user;
and a geographic location binding and identification code generating module 408, configured to bind the user identifier of the second user and the geographic location of the second user if the verification is passed, generate an identification code corresponding to the user identifier of the second user one to one, and send the identification code to the second user.
The resource configuration data acquisition device disclosed by the embodiment of the application starts to execute the associated data of the first preset operation by acquiring the identification code of the first user through scanning the identification code of the second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user; acquiring identity information to be verified through identity information acquisition equipment bound with the second user; determining whether corresponding relation data of the identity information to be verified and the user identification of the first user is stored in a preset database; if the corresponding relation data is stored, the resource configuration data for performing resource configuration on the second user according to the associated data is abandoned; if the corresponding relation data is not stored, the resource configuration data for performing resource configuration on the second user is obtained according to the associated data, and the problem that the obtained resource configuration data in the prior art is inaccurate is solved. According to the resource configuration data acquisition device disclosed by the embodiment of the application, the first user is subjected to identity verification through the identity information acquisition equipment based on the pre-binding, so that the second user is effectively prevented from executing a first preset operation through a false account to generate resource configuration data, the phenomenon of improper resource acquisition is avoided, and the accuracy of acquiring the resource configuration data is effectively improved.
On the other hand, the resource configuration data acquisition device disclosed in the embodiment of the present application performs identity authentication on the second user in advance, and binds the geographic position and the identity information acquisition device, so as to perform dual verification on the identity information and the geographic position of the first user performing the first preset operation, which can further improve the accuracy of the acquired resource configuration data. Furthermore, the validity of the acquired resource configuration data is judged based on the authenticity of the ordering time through verification based on the interval between the time nodes of the first user executing the first preset operation, and the accuracy of the acquired resource configuration data is further improved.
Correspondingly, the application also discloses an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the resource configuration data acquisition method according to the first embodiment of the application. The electronic device can be a PC, a mobile terminal, a personal digital assistant, a tablet computer and the like.
The present application also discloses a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the resource configuration data acquisition method according to the first embodiment of the present application.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The method and the device for acquiring resource configuration data provided by the present application are introduced in detail, and a specific example is applied in the description to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understanding the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Claims (10)
1. A resource allocation data acquisition method is characterized by comprising the following steps:
acquiring associated data of a first user starting to execute a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
acquiring identity information to be verified through identity information acquisition equipment bound with the second user;
and giving up or executing the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
2. The method of claim 1, wherein associating data further comprises: the step of obtaining resource configuration data for resource configuration of the second user according to the association data, which is based on the geographic location of the first user, includes:
acquiring a geographical position bound with the second user according to the user identifier of the second user;
and responding to whether the geographic position of the first user is matched with the geographic position bound with the second user or not, and executing or abandoning the step of acquiring the resource configuration data for configuring the second user according to the association data.
3. The method of claim 2, wherein the associating data further comprises: the step of presetting the node time in the first preset operation execution process, and acquiring resource configuration data for performing resource configuration on the second user according to the associated data, includes:
and executing or giving up execution of the step of acquiring resource configuration data for performing resource configuration on the second user according to the associated data in response to whether the interval between the times of the preset nodes in the execution process of the first preset operation meets a preset time threshold.
4. The method according to any one of claims 1 to 3, wherein the step of obtaining resource configuration data for resource configuration of the second user according to the association data further comprises:
and determining the quantity of the second resources for configuring the resources of the second user according to the associated data.
5. The method according to any one of claims 1 to 3, wherein before the step of acquiring the associated data for the first user to initiate the execution of the first preset operation by scanning the identification code of the second user, the method further comprises:
acquiring the geographic position of the first user and the user identification of the second user according to the operation of scanning the identification code of the second user by the first user;
acquiring a geographical position bound with the second user according to the user identifier of the second user;
and if the distance between the geographical position of the first user and the geographical position bound with the second user meets a preset distance threshold value and the first user meets a preset user condition, allocating a preset amount of first resources for the first user.
6. The method of claim 5, wherein the step of obtaining the geographic location of the first user and the user identity of the second user according to the operation of the first user scanning the identification code of the second user is preceded by the step of:
acquiring a request for resource configuration applied by the second user, wherein the request comprises a user identifier of the second user and an equipment identifier of the identity information acquisition equipment;
and binding the user identifier of the second user and the equipment identifier of the identity information acquisition equipment.
7. The method according to claim 6, wherein the request further includes identity information of the second user, the identity information at least includes a geographical location of the second user, and after the step of obtaining the request for resource configuration applied by the second user, the method further includes:
verifying the identity information of the second user in the request according to the pre-stored identity information corresponding to the user identifier of the second user;
and if the verification is passed, binding the user identification of the second user with the geographic position of the second user, generating an identification code corresponding to the user identification of the second user one by one, and sending the identification code to the second user.
8. A resource allocation data acquisition apparatus, comprising:
the operation data acquisition module is used for acquiring associated data of a first user for starting execution of a first preset operation by scanning an identification code of a second user; wherein the associated data comprises: the user identification of the first user and the user identification of the second user;
the identity information acquisition module to be verified is used for acquiring identity information to be verified through the identity information acquisition equipment bound with the second user;
and the resource configuration data acquisition module is used for giving up or executing the step of acquiring the resource configuration data for configuring the resource of the second user according to the associated data in response to whether the corresponding relation data of the identity information to be verified and the user identifier of the first user is stored in a preset database.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the resource allocation data acquisition method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the resource configuration data acquisition method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811400955.0A CN111210248B (en) | 2018-11-22 | 2018-11-22 | Resource configuration data acquisition method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811400955.0A CN111210248B (en) | 2018-11-22 | 2018-11-22 | Resource configuration data acquisition method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111210248A true CN111210248A (en) | 2020-05-29 |
CN111210248B CN111210248B (en) | 2022-04-12 |
Family
ID=70788081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811400955.0A Active CN111210248B (en) | 2018-11-22 | 2018-11-22 | Resource configuration data acquisition method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111210248B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112085443A (en) * | 2020-08-27 | 2020-12-15 | 拉扎斯网络科技(上海)有限公司 | Distribution resource detection method, distribution resource detection device, distribution resource task execution method, distribution resource detection device, distribution task execution device and electronic equipment |
CN112508607A (en) * | 2020-12-02 | 2021-03-16 | 上海中商网络股份有限公司 | Data pushing method and device, computer equipment and readable storage medium |
CN114418572A (en) * | 2020-10-21 | 2022-04-29 | 拉扎斯网络科技(上海)有限公司 | Method and device for processing virtual payment information, storage medium and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187399A (en) * | 2015-08-12 | 2015-12-23 | 南京钱宝信息传媒有限公司 | Resource processing method and device |
CN105354747A (en) * | 2015-10-09 | 2016-02-24 | 徐蔚 | Information processing network and method based on uniform code sending, and sensing access equipment |
CN105719171A (en) * | 2016-01-19 | 2016-06-29 | 南京图牛商城有限公司 | Association management system and method used for electronic commerce |
CN106874273A (en) * | 2015-12-11 | 2017-06-20 | 广州市动景计算机科技有限公司 | Channel information statistical method, device and system |
CN107343027A (en) * | 2017-06-13 | 2017-11-10 | 福建省天晴互动娱乐有限公司 | APP sharing methods |
CN108092871A (en) * | 2016-11-22 | 2018-05-29 | 长沙海商网络技术有限公司 | A kind of processing method to establishing 3 grades of binding relationships between user in shopping platform |
CN108764971A (en) * | 2018-05-07 | 2018-11-06 | 杭州优行科技有限公司 | Device identification method, device, electronic equipment and readable storage medium storing program for executing |
-
2018
- 2018-11-22 CN CN201811400955.0A patent/CN111210248B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187399A (en) * | 2015-08-12 | 2015-12-23 | 南京钱宝信息传媒有限公司 | Resource processing method and device |
CN105354747A (en) * | 2015-10-09 | 2016-02-24 | 徐蔚 | Information processing network and method based on uniform code sending, and sensing access equipment |
CN106874273A (en) * | 2015-12-11 | 2017-06-20 | 广州市动景计算机科技有限公司 | Channel information statistical method, device and system |
CN105719171A (en) * | 2016-01-19 | 2016-06-29 | 南京图牛商城有限公司 | Association management system and method used for electronic commerce |
CN108092871A (en) * | 2016-11-22 | 2018-05-29 | 长沙海商网络技术有限公司 | A kind of processing method to establishing 3 grades of binding relationships between user in shopping platform |
CN107343027A (en) * | 2017-06-13 | 2017-11-10 | 福建省天晴互动娱乐有限公司 | APP sharing methods |
CN108764971A (en) * | 2018-05-07 | 2018-11-06 | 杭州优行科技有限公司 | Device identification method, device, electronic equipment and readable storage medium storing program for executing |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112085443A (en) * | 2020-08-27 | 2020-12-15 | 拉扎斯网络科技(上海)有限公司 | Distribution resource detection method, distribution resource detection device, distribution resource task execution method, distribution resource detection device, distribution task execution device and electronic equipment |
CN114418572A (en) * | 2020-10-21 | 2022-04-29 | 拉扎斯网络科技(上海)有限公司 | Method and device for processing virtual payment information, storage medium and electronic equipment |
CN112508607A (en) * | 2020-12-02 | 2021-03-16 | 上海中商网络股份有限公司 | Data pushing method and device, computer equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111210248B (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108234505B (en) | Account login method and system | |
CN110363666B (en) | Information processing method, apparatus, computing device and storage medium | |
US20160132846A1 (en) | Online payment processing method, apparatus and system | |
CN111210248B (en) | Resource configuration data acquisition method and device, electronic equipment and storage medium | |
JP7162587B2 (en) | Order information processing method, apparatus and system | |
US20150161613A1 (en) | Methods and systems for authentications and online transactions | |
EP3958502A1 (en) | Computer implemented method and system | |
CN104601712B (en) | Resource supplying method and system | |
CN106600275B (en) | Risk identification method and device | |
CN103996132A (en) | Wedding celebration information service system based on mobile internet | |
CN108510310A (en) | Rent method and device | |
CN111063050A (en) | Sign-in method, device, server and storage medium | |
CN106779673B (en) | Electronic payment method and system | |
CN110728520B (en) | Processing method and device for refusal payment application and server | |
CN112819508B (en) | Electronic resource allocation method and device | |
CN106022861B (en) | Online transfer method and device for electronic ticket | |
CN105741119A (en) | Business implementation method and device | |
US20130226698A1 (en) | System, method and program for embedding in line advertisements during a multi-factor authentication session | |
CN110503470A (en) | A kind of method for running and system of product sales promotion | |
KR101918749B1 (en) | Payment gateway processing apparatus capable of automatically inputting personal information based on a two-dimensional code and operating method thereof | |
CN111932241B (en) | Prepayment order processing method and device | |
CN110766415B (en) | Transaction processing method based on payment code and payment code processing method | |
CN114219588B (en) | Commodity marketing and transaction method, device and system based on AI technology | |
CN114626915A (en) | Commodity recommendation activity processing method | |
CN107563844A (en) | A kind of method and device for insuring transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |