Resource acquisition processing method, data processing system, storage medium and processor

A processing method and resource technology, applied in the security field of network virtual resources, can solve problems such as inability to effectively prevent malicious swiping of red envelopes, and achieve the effect of preventing malicious snatch of virtual resources and solving malicious swiping of red envelopes.

Pending Publication Date: 2020-04-07
BEIJING GRIDSUM TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a resource acquisition and processing method, a data processing system, a storage medium, and a processor, so as to at least solve the technical problem in the related art that cannot effectively prevent malicious swiping of red envelopes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource acquisition processing method, data processing system, storage medium and processor
  • Resource acquisition processing method, data processing system, storage medium and processor
  • Resource acquisition processing method, data processing system, storage medium and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of the present application.

[0031] It should be noted that the terms "first", "second", etc. in the description and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that data so used may be interchanged under ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resource acquisition processing method, a data processing system, a storage medium and a processor. The method comprises the steps of receiving a first obtaining request froma first target object in a first interaction page of a first official account, wherein the first obtaining request is used for requesting to obtain virtual resources allocated by a second official account; obtaining a first identifier of the first target object in the first official account from an official account platform, with the first official account and the second official account belonging to the same official account platform; and obtaining a verification result of the first identifier, with the verification result being used for determining whether the second official account is allowed to allocate the virtual resources to the first target object. According to the invention, the technical problem that red envelopes cannot be effectively prevented from being maliciously swiped inrelated technologies is solved.

Description

technical field [0001] The present application relates to the security field of network virtual resources, and in particular, to a resource acquisition and processing method, a data processing system, a storage medium and a processor. Background technique [0002] Red envelope marketing is a way for public accounts to attract followers. However, red envelope marketing involves cash flow, and necessary security precautions are essential. If there are loopholes, they will be used by speculators to maliciously grab red envelopes. [0003] In the related art, the technical means used to prevent malicious grabbing of red envelopes are: limiting the number of red envelopes received per person per day. However, the above technical means have the following disadvantages: the limitation of the number of red envelopes received per person per day cannot be very effective in preventing malicious brushing of red envelopes. After the start, the person who is likely to grab the red envelo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/02G06Q30/06
CPCG06Q30/0225G06Q30/0609
Inventor 李泽贤
Owner BEIJING GRIDSUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products