CN111709773A - User management method, user management device and server - Google Patents
User management method, user management device and server Download PDFInfo
- Publication number
- CN111709773A CN111709773A CN202010443977.6A CN202010443977A CN111709773A CN 111709773 A CN111709773 A CN 111709773A CN 202010443977 A CN202010443977 A CN 202010443977A CN 111709773 A CN111709773 A CN 111709773A
- Authority
- CN
- China
- Prior art keywords
- user
- authority
- acquisition
- determining
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 56
- 238000000034 method Methods 0.000 claims abstract description 17
- 238000013475 authorization Methods 0.000 claims description 77
- 230000006399 behavior Effects 0.000 claims description 24
- 238000004590 computer program Methods 0.000 claims description 19
- 230000003247 decreasing effect Effects 0.000 claims description 9
- 230000008569 process Effects 0.000 description 5
- 101100273207 Dictyostelium discoideum carC gene Proteins 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0235—Discounts or incentives, e.g. coupons or rebates constrained by time limit or expiration date
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application is applicable to the technical field of information, and provides a user management method, a user management device, a server and a computer readable storage medium. The method comprises the following steps: determining acquisition data based on the acquisition behavior of the user on the specified resource; determining a target authority matched with the acquired data; and opening the target permission to the user aiming at the specified resource. According to the scheme, the personalized authority management of the user can be realized, and the intention of the user to acquire resources is improved.
Description
Technical Field
The present application belongs to the field of information technology, and in particular, relates to a user management method, a user management apparatus, a server, and a computer-readable storage medium.
Background
Currently, resource platforms such as online shopping malls and the like which can provide various resources often simply divide users based on the basic data of the users and perform unified authority management operation on the users based on the division results. Considering that the current resource platform cannot realize personalized authority management on each user, the user is easy to have lower intention to acquire resources.
Disclosure of Invention
The application provides a user management method, a user management device, a server and a computer readable storage medium, which can realize personalized authority management on a user and improve the acquisition intention of the user on resources.
In a first aspect, the present application provides a user management method, including:
determining acquisition data based on the acquisition behavior of the user on the specified resource;
determining a target authority matched with the acquired data;
and opening the target authority to the user aiming at the specified resource.
Optionally, the acquiring data includes acquiring times; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method further includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and updating the acquisition times of the user for the specified resources when the occurrence of the acquisition event of the user for the specified resources is monitored.
Optionally, the determining the target authority matched with the acquired data includes:
if the obtaining times are more than 0 and less than a preset first time threshold, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate;
if the obtaining times is not less than the second time threshold, determining a third authority as the target authority, wherein the third authority is associated with a preset third rate;
the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
Optionally, the acquiring data includes an acquiring frequency; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and counting the occurrence frequency of the acquisition events of the user for the specified resources within a preset period time, and updating the acquisition frequency of the user for the specified resources based on the occurrence frequency.
Optionally, the determining the target authority matched with the acquired data includes:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
Optionally, the user management method further includes:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target authority;
and if the timing duration of the timer exceeds the authorized duration associated with the target permission, releasing the target permission of the user for the specified resource.
Optionally, the determining the target authority matched with the acquired data includes:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than the second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
In a second aspect, the present application provides a user management apparatus, comprising:
the data determining unit is used for determining the acquired data based on the acquisition behavior of the user on the specified resource;
the authority determining unit is used for determining the target authority matched with the acquired data;
and the permission opening unit is used for opening the target permission to the user aiming at the specified resource.
Optionally, the acquiring data includes acquiring times; the user management apparatus further includes:
a frequency initialization unit, configured to initialize the acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
accordingly, the data determining unit is specifically configured to update the number of times of acquiring the specified resource by the user when it is monitored that the event of acquiring the specified resource by the user occurs.
Optionally, the permission determination unit includes:
a first determining subunit, configured to determine a first permission as the target permission if the obtaining number is greater than 0 and smaller than a preset first time threshold, where the first permission is associated with a preset first rate;
a second determining subunit, configured to determine a second permission as the target permission if the number of times of acquisition is not less than the first time threshold and is less than a preset second time threshold, where the second permission is associated with a preset second rate;
a third determining subunit, configured to determine a third permission as the target permission if the number of times of acquisition is not less than the second threshold, where the third permission is associated with a preset third rate;
the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
Optionally, the acquiring data includes an acquiring frequency; the user management apparatus further includes:
a frequency initialization unit, configured to initialize an acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
the data determining unit is specifically configured to count occurrence times of the event of acquiring the specified resource by the user within a preset period time, and update the frequency of acquiring the specified resource by the user based on the occurrence times.
Optionally, the permission determination unit includes:
a fourth determining subunit, configured to determine a fourth permission as the target permission if the obtaining frequency is smaller than a preset first frequency threshold, where the fourth permission is associated with a preset fourth rate and the fourth permission is associated with a preset first authorization duration;
a fifth determining subunit, configured to determine a fifth permission as the target permission if the obtaining frequency is not less than the first frequency threshold, where the fifth permission is associated with the fourth rate and is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
Optionally, the user management apparatus further includes:
a timing unit, configured to start a timer to start timing when the target authority is opened to the user;
a duration data determining unit, configured to obtain an authorized duration associated with the target permission;
and the permission removing unit is used for removing the target permission of the user for the specified resource if the timing duration of the timer exceeds the authorized duration associated with the target permission.
Optionally, the permission determination unit includes:
a sixth determining subunit, configured to determine a sixth permission as the target permission if the obtaining frequency is smaller than a preset second frequency threshold, where the sixth permission is associated with a preset fifth rate and the sixth permission is associated with a preset first authorization number;
a seventh determining subunit, configured to determine a seventh permission as the target permission if the obtaining frequency is not less than the second frequency threshold, where the seventh permission is associated with the fifth rate, the seventh permission is associated with a preset second authorization number, and the second authorization number is smaller than the first authorization number.
In a third aspect, the present application provides a server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method according to the first aspect when executing the computer program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the first aspect.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by one or more processors, performs the steps of the method of the first aspect as described above.
As can be seen from the above, in the present application, first, the acquisition data is determined based on the acquisition behavior of the user for the specified resource, then, the target permission matched with the acquisition data is determined, and finally, the target permission can be opened to the user for the specified resource. According to the scheme, the personalized authority management of the user can be realized based on the acquisition data of the user to the designated resource, so that the acquisition intention of the user to the resource is improved. It is understood that the beneficial effects of the second aspect to the fifth aspect can be referred to the related description of the first aspect, and are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of an implementation of a user management method provided in an embodiment of the present application;
fig. 2 is a block diagram of a user management device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
At present, most resource platforms, such as online shopping malls and the like, perform unified authority management on users, for example, uniformly distribute coupons to users on certain holidays, so that users have the authority to purchase specified goods by discounts; or simply classifying the users according to basic data input during user registration, and performing unified authority management on the users in the same category so that the users in a certain category have the same authority for discounting and purchasing the specified goods. The unified management mode of the user permission cannot take care of the personalized resource requirement of each user, so that the user has low intention of acquiring the resource. Based on this, the embodiment of the application provides a user management method, a user management device, a server and a computer-readable storage medium, which can realize personalized management on user rights according to the acquisition condition of the resources of the user, and improve the acquisition intention of the user on the resources to a certain extent. In order to explain the technical solutions proposed in the embodiments of the present application, the following description will be given by way of specific examples.
Example one
A user management method provided in an embodiment of the present application is described below. Referring to fig. 1, the user management method includes:
In the embodiment of the application, the resource platform can provide rich resources for the user, and the user can select the resources according to the self requirement. The server can record each resource acquisition operation of the user, so as to obtain the acquisition data of the user on each resource based on the acquisition behavior of the user on each resource.
In an application scenario, the specified resource is a single resource. For example, assuming that the resource platform can provide resources a1, a2, and A3, the resource a1 is used as the designated resource, and the acquired data of the resource a1 by the user 1 can be obtained; with the resource A2 as a designated resource, the acquired data of the resource A2 by the user 1 can be obtained; with resource A3 as the designated resource, user 1's acquired data for resource A3 may be obtained. Alternatively, any resource in the resource platform that meets the preset condition may be used as the designated resource, for example, if the resource platform can provide the resources a1, a2, and A3, and the backend personnel set the resource a1 and the resource A3 as the key resources, the resource a1 may be used as the designated resource, the resource A3 may be used as the designated resource, and the resource a2 may not be used as the designated resource.
Taking a resource platform as a car renting platform, the provided resource is car renting service as an example: assuming that the rental car platform is provided with the rental car service of vehicle car1, it can be written as rental car service 1; car rental service of car2, which may be denoted as car rental service 2; the car rental service of car3 can be written as car rental service 3. It may be that any of the rental car services 1, 2, and 3 may be the designated resource. Or, if the car rental platform is currently using the car rental service 2 as the main push service, the backend personnel can set the car rental service 2 as an important resource, that is, at this time, the car rental service 2 is a designated resource, and the car rental service 1 and the car rental service 3 cannot be used as the designated resource.
Taking a resource platform as a loan platform, and taking the provided resource as a loan service as an example: assuming that the loan platform provides a half-year loan service, it can be written as loan service 1; a year-old debit service, a debitable-credit service 2; the three year loan service may be written as the loan service 3. Any of the loan services 1, 2, and 3 may be designated resources. Alternatively, if the loan platform is currently using the loan service 2 as the main push service, the background personnel may set the loan service 2 as the key resource, that is, the loan service 2 is the designated resource, and the loan service 1 and the loan service 3 cannot be the designated resource.
In another application scenario, the specified resource is a resource set. In the embodiment of the application, resources belonging to the same category can be divided into one resource set to obtain at least one resource set. Any resource set can be used as the designated resource, for example, assuming that the resource platform can provide the resource sets A, B and C, the resource set a is used as the designated resource, and the acquired data of the user 1 on the resource set a can be obtained, specifically, the acquired data of the user on each resource in the resource set a is obtained and summarized; in a similar manner, the acquisition data of user 1 for resource set B and the acquisition data of user 1 for resource set C may be acquired. Alternatively, a resource set meeting a preset condition in the resource platform may be used as the designated resource, for example, if the resource platform can provide the resource sets A, B and C, and the backend personnel set the resource set a and the resource set C as the key resources, the resource set a may be used as a designated resource, the resource set C may also be used as a designated resource, and the resource set B may not be used as a designated resource. It should be noted that the above-mentioned specified resources may also be all resources in the resource platform, that is, all resources in the resource platform may be treated as a whole.
Taking a resource platform as a car renting platform, the provided resource is car renting service as an example: assuming that the rental car platform is provided with the rental car service of vehicle car1, it can be written as rental car service 1; car rental service of car2, which may be denoted as car rental service 2; car rental service of car3, which can be written as car rental service 3; the car rental service of car4 can be referred to as car rental service 4. Since car1 and car2 belong to 5 cars, the car rental platform can divide car rental service 1 and car rental service 2 into the same resource, and form a car rental service set of 5 cars; since car3 and car4 belong to 7 cars, the car rental platform can divide car rental service 3 and car rental service 4 into the same resource, and form a set of car rental services for 7 cars. The 5 car rental service set can be used as one specific resource, and the 7 car rental service set can be used as another specific resource. Or, if the car rental platform is currently using 7 car rental services as the main push service, the backend personnel can set the 7 car rental service sets as the key resources, that is, at this time, the 7 car rental service sets are the designated resources, and the 5 car rental service sets cannot be used as the designated resources.
Taking a resource platform as a loan platform, and taking the provided resource as a loan service as an example: the loan platform is assumed to provide a loan service of seven dates, which can be written as a loan service 1; a monthly debit service, a debit-credit service 2; a three-year-old debit service, which can be written as a debit service 3; the five year old debit service may be credited as debit service 4. Since the loan service 1 and the loan service 2 both belong to loan services with short duration, the loan platform can divide the loan service 1 and the loan service 2 into the same class of resources to form a short-term loan service set; since the loan service 3 and the loan service 4 both belong to loan services with longer duration, the loan service 3 and the loan service 4 can be divided into the same type of resources to form a long-term loan service set. One could be a short term loan service set as one specified resource and a long term loan service set as another specified resource. Or, if the car rental platform is currently using the short-term loan service as the main push service, the background personnel may set the short-term loan service set as the key resource, that is, the short-term loan service set is the designated resource, and the long-term loan service set cannot be the designated resource.
And 102, determining the target authority matched with the acquired data.
In the embodiment of the application, background personnel can preset the authority matched with different acquired data. Optionally, at least one data range may be set for the acquired data in advance, and each data range corresponds to one authority, so as to form an association relationship between the data range of the acquired data and the authority; in this step, the data range in which the acquired data of the specified resource by the user falls may be determined first, and then the authority associated with the data range is searched, where the searched authority is the target authority.
In the embodiment of the application, after the target authority is determined, the target authority can be opened to the user. It should be noted that the target privilege is only effective for the specified resource. For example, if the resource set a is a designated resource, and the matching target right is determined to be P1 according to the acquired data of the user on the resource set a, the scope of action of P1 of the target right is only within the resource set a.
Optionally, acquiring the data may include acquiring a number of times; before step 101, a user management method proposed in this embodiment of the present application includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
accordingly, step 101, comprises:
and updating the acquisition times of the user for the specified resources when the occurrence of the acquisition event of the user for the specified resources is monitored.
In the embodiment of the application, a user needs to register on a resource platform first, so that the resource platform can input basic information of the user. After the user registration is completed, the server may initialize the number of times the user acquires the specified resource, that is, set the number of times the user acquires the specified resource to 0. It should be noted that the data acquired by the user for the specified resource is updated at any time and stored in the database of the server, so that even if the user logs in the resource platform on a different terminal, the abnormal situation of data acquisition loss or zero clearing does not occur. Once the server monitors that an event of acquiring the specified resource by the user occurs, it may be determined that the user acquires the specified resource once, and at this time, the number of times of acquiring the specified resource by the user may be updated (that is, the number of times of acquiring the specified resource by the user is increased by 1), so that the server determines whether the target right needs to be updated according to the updated number of times of acquiring.
Optionally, step 102 comprises:
if the obtaining times are more than 0 and less than a preset first time threshold, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate, and the second rate is lower than the first rate;
if the obtaining times is not less than the second time threshold, determining a third authority as the target authority;
the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
In the embodiment of the present application, the obtaining times may be divided into three different ranges by using the first time threshold and the second time threshold, each range has a corresponding right, and each right is associated with a different rate.
In one application scenario, the rate may be used to represent a discount when resources are acquired. The following description will be made by taking the designated resource as the car rental service and presenting the increasing relationship with the first rate, the second rate and the third rate as an example:
assume that the first threshold is 3 times, the first rate is 80% (representing a discount of 8), the second threshold is 10 times, the second rate is 85% (representing a discount of 85), and the third rate is 90% (representing a discount of 9). If the detection shows that the user purchases the car renting service, the updating acquisition times are 1, at this time, the authority of the user on the car renting service is updated to be the first authority, and under the first authority, the user can rent the car at 8 folds (namely 80 percent of the rate) subsequently. Once it is detected that the user purchases the car rental service for a plurality of times, so that the number of acquisition times is updated to 3 (i.e., 3 car rents are performed), the authority of the user for the car rental service is updated to a second authority under which the user can subsequently purchase the car rental service at 85 folds (i.e., 85% of the rate). If the user continues to continuously purchase the car rental service, and the number of acquisition times is updated to 10 (namely, 10 car rents are performed), the authority of the user on the car rental service is updated to a third authority, and under the third authority, the user can subsequently purchase the car rental service at 9 folds (namely, 90% of the rate). The setting mode of the authority and the rate can promote the acquisition intention of the user to the resource in the prior period.
Similarly, in this application scenario, the first rate, the second rate, and the third rate may also be in a decreasing relationship. That is, at this time, the more the number of times the user rents the car, the lower the price the user can rent the car, and the later intention of the user to acquire the resource can be promoted.
In another application scenario, the rate may be used to represent an interest rate in acquiring the resource. The following description will be made by taking the specified resource as the loan service and presenting the increasing relationship with the first rate, the second rate and the third rate as an example:
assume that the first time threshold is 1, the first rate is 2%, the second time threshold is 5, the second rate is 4%, and the third rate is 10%. And if the detection shows that the user uses the loan service to make a loan, updating the acquisition times to be 1, updating the user's right to the loan service to be a first right at the moment, and making a loan by the user at a rate of interest of 2% subsequently under the first right. Once it is detected that the user makes loans multiple times so that the number of acquisitions is updated to 3 (i.e., when 3 loans are made), the user's right to the loan service is updated to a second right under which the user subsequently makes loans at a rate of 4%. If the user continues to make a loan until the number of acquisitions is updated to 10 (i.e., 10 loans are made), the user's right to the loan service is updated to a third right under which the user makes a subsequent loan at an interest rate of 10%. The setting mode of the authority and the rate can promote the acquisition intention of the user to the resource in the prior period.
Similarly, in this application scenario, the first rate, the second rate, and the third rate may also be in a decreasing relationship. That is, at this time, the more the user loans, the lower interest the user can borrow, and the intention of the user to acquire resources can be promoted at a later stage.
Optionally, acquiring the data may include acquiring a frequency; before step 101, a user management method proposed in this embodiment of the present application includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
accordingly, step 101 comprises:
and counting the occurrence frequency of the acquisition events of the user for the specified resources within a preset period time, and updating the acquisition frequency of the user for the specified resources based on the occurrence frequency.
In the embodiment of the application, a user needs to register on a resource platform first, so that the resource platform can input basic information of the user. After the user registration is completed, the server may initialize the acquisition frequency of the user for the specified resource, that is, set the acquisition frequency of the user for the specified resource to 0 times/cycle time. The cycle time may be set by the user or by the server, and may be, for example, a cycle time of one week or a cycle time of one month, which is not limited herein. The server may count the number of occurrences of the event of acquiring the specified resource by the user within a set cycle time, and update the frequency of acquiring the specified resource by the user based on the number of occurrences.
Optionally, step 102 comprises:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
In the embodiment of the present application, it may be understood that only the rough division is performed on the acquisition frequency, for example, the division is performed by a preset first frequency threshold to two frequency ranges, namely, a low frequency range and a high frequency range, where a frequency smaller than the frequency threshold is the low frequency range, and a frequency greater than or equal to the frequency threshold is the high frequency range. Each frequency range has a corresponding right, and each right is associated with a different authorization time.
The following description will be made by taking the designated resource as a car rental service as an example:
each associated with a different authorization time. Assuming that the first frequency threshold is 10 times/month, the fourth rate is 90%, the first authorization duration is 1 week, and the second authorization duration is 2 weeks. When it is detected that the frequency of purchasing the car rental service (i.e., the acquisition frequency) of the user does not reach 3 times/week, the authority of the user for the car rental service may be determined as a fourth authority under which the user can purchase the car rental service at 9 folds (i.e., 90% of the rate) in the next 1 week. Upon detecting that the user purchases the rental car service a plurality of times within the period time such that the acquisition frequency is updated to 3 times/week, the authority of the user for the rental car service may be updated to a fifth authority under which the user purchases the rental car service at 9 folds (i.e., 90% rate) within the next 2 weeks.
The following description will be made by taking the designated resource as the loan service as an example:
each associated with a different authorization time. Assuming that the first frequency threshold is 3 times/3 years, the fourth rate is 4%, the first authorization duration is 1 year, and the second authorization duration is 2 years. When it is detected that the frequency of using the loan service (i.e., making loans) by the user is less than 3 times/3 years, the user's right to the loan service may be determined as a fourth right under which the user can make loans with an interest rate of 4% in the next 1 year. Once it is detected that the user makes loans a number of times within the cycle time such that the acquisition frequency is updated to 3/3 years, the user's right to the loan service may be updated to a fifth right under which the user can make loans with an interest rate of 4% within the next 2 years.
Optionally, in order to timely recover the expired rights, the user management method further includes:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target authority;
and if the timing duration of the timer exceeds the authorized duration associated with the target permission, releasing the target permission of the user for the specified resource.
In the embodiment of the application, when the target authority is associated with the authorization duration, a timer can be started to start timing at the moment of opening the target authority to the user, and once the timing duration of the timer exceeds the authorization duration associated with the target authority, the target authority of the user for the specified resource is withdrawn. It should be noted that, if the timing duration does not reach the authorized duration when entering the new cycle time, the server still opens the target permission of the designated resource to the user; when the timing duration reaches the authorization duration and the target authority of the user for the specified resource is released, the server opens a new target authority for the user according to the acquisition frequency in the new cycle time so as to update the target authority.
Optionally, step 102 comprises:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than a preset second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
In the embodiment of the present application, the acquisition frequency is roughly divided by a preset second frequency threshold, where the second frequency threshold may be the same as the first frequency threshold or different from the first frequency threshold, and is not limited herein. Each frequency range obtained by the division through the second frequency threshold has a corresponding authority, and each authority is associated with different authorization times. That is, the user may only acquire the specified resource a limited number of times, set by the number of authorizations, using the rate associated with the target privilege at most.
The following description will be made by taking the designated resource as a car rental service as an example:
assuming that the second frequency threshold is 10 times/month, the fifth rate is 90%, the first authorization time is 3 times, and the second authorization time is 1 time. When it is detected that the frequency (i.e., the acquisition frequency) of purchasing the car rental service by the user does not reach 10 times/week, the authority of the user for the car rental service may be determined as a sixth authority under which the user can purchase the car rental service at 9 folds (i.e., 90% of the rate) when purchasing the car rental service 3 times later. Upon detecting that the user purchases the rental car service a plurality of times within the period time such that the acquisition frequency is updated to 10 times/month, the authority of the user for the rental car service may be updated to a seventh authority under which the user can purchase the rental car service at 9 discount (i.e., 90% rate) 1 time later when the user purchases the rental car service.
The following description will be made by taking the designated resource as the loan service as an example:
assume that the second frequency threshold is 5 times/year, the fifth rate is 5%, the first authorization number is 3 times, and the second authorization number is 1 time. When it is detected that the frequency of making loans by the user (i.e., the acquisition frequency) does not reach 5 times/year, the user's right for the loan service may be determined as a sixth right under which the user can make loans 3 times later with an interest rate of 5%. Once it is detected that the user makes loans a number of times within the cycle time such that the acquisition frequency is updated to 5 times/year, the user's right to the loan service may be updated to a seventh right under which the user may make loans 1 time later at an interest rate of 5%.
It should be noted that, the target authority of the user may be updated each time the acquisition frequency of the user for the specified resource changes; or, after the user acquires the specified resource under the target authority for the authorization number (that is, after the authorization number is used up), the target authority of the user may be updated, which is not limited herein.
Optionally, when the number of times of acquiring the specified resource by the user does not reach a preset third time threshold, determining the matched target permission based on the number of times of acquiring; and after the acquisition times of the user on the specified resources reach a preset third time threshold value, immediately converting to determine the matched target authority based on the acquisition frequency, wherein the third time threshold value is greater than the second time threshold value.
Optionally, in order to enable the user to timely acquire the target authority issued by the server for the specified resource, the server may push the target authority obtained by the user in the form of a coupon, or a notification message. The coupon is taken as an example for explanation: the coupon can list the designated resource for obtaining the target authority and the rate (i.e. discount) associated with the target authority; when the target authority is associated with the authorization duration, the authorization duration can be listed in the coupon, and at the moment, the coupon can be kept effective in the authorization duration and can be used repeatedly; when the target authority is associated with the authorization times, the authorization times can be represented by the number of the coupons, and at the moment, the used coupons are correspondingly eliminated every time one coupon is used, so that the user can know the remaining authorization times through the number of the remaining coupons.
Optionally, after obtaining the target permission for the specified resource, the user may also send permission sharing information to other users; after receiving the permission sharing information sent by the user, other users can also enjoy the same target permission as the user for the specified resource. To avoid abuse of rights, the server may set a share time limit to limit the number of times the user shares the target rights. The coupon is taken as an example for explanation: the user can share the obtained coupon to other users, so that other users can also obtain (purchase) the specified resource by using the coupon.
Therefore, in the embodiment of the application, the acquisition data of the user on the specified resource can be tracked based on the acquisition behavior of the user on the specified resource, the target authority of the user on the specified resource is updated in time according to the acquisition data, and the user can acquire the specified resource at a certain rate under the target authority. Through the process, the personalized authority management of the user is realized, and the acquisition intention of the user on the specified resources can be improved.
Example two
The second embodiment of the application provides a user management device. As shown in fig. 2, the user management apparatus 200 in the embodiment of the present application includes:
a data determination unit 201, configured to determine acquisition data based on an acquisition behavior of a user for a specified resource;
an authority determining unit 202, configured to determine a target authority that matches the acquired data;
an authority opening unit 203, configured to open the target authority to the user for the specified resource.
Optionally, the acquiring data includes acquiring times; the user management apparatus 200 further includes:
a frequency initialization unit, configured to initialize the acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
accordingly, the data determining unit 201 is specifically configured to update the number of times of acquiring the specified resource by the user when it is monitored that the event of acquiring the specified resource by the user occurs.
Optionally, the permission determination unit 202 includes:
a first determining subunit, configured to determine a first permission as the target permission if the obtaining number is greater than 0 and smaller than a preset first time threshold, where the first permission is associated with a preset first rate;
a second determining subunit, configured to determine a second permission as the target permission if the number of times of acquisition is not less than the first time threshold and is less than a preset second time threshold, where the second permission is associated with a preset second rate;
a third determining subunit, configured to determine a third permission as the target permission if the number of times of acquisition is not less than the second threshold, where the third permission is associated with a preset third rate;
wherein, the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
Optionally, the acquiring data includes an acquiring frequency; the user management apparatus 200 further includes:
a frequency initialization unit, configured to initialize an acquisition frequency of the specified resource by the user when receiving a registration instruction input by the user based on a resource platform;
the data determining unit 201 is specifically configured to count occurrence times of the event of acquiring the specified resource by the user within a preset period time, and update the frequency of acquiring the specified resource by the user based on the occurrence times.
Optionally, the permission determination unit 202 includes:
a fourth determining subunit, configured to determine a fourth permission as the target permission if the obtaining frequency is smaller than a preset first frequency threshold, where the fourth permission is associated with a preset fourth rate and the fourth permission is associated with a preset first authorization duration;
a fifth determining subunit, configured to determine a fifth permission as the target permission if the obtaining frequency is not less than the first frequency threshold, where the fifth permission is associated with the fourth rate and is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
Optionally, the user management apparatus further includes:
a timing unit, configured to start a timer to start timing when the target authority is opened to the user;
a duration data determining unit, configured to obtain an authorized duration associated with the target permission;
and the permission removing unit is used for removing the target permission of the user for the specified resource if the timing duration of the timer exceeds the authorized duration associated with the target permission.
Optionally, the permission determination unit 202 includes:
a sixth determining subunit, configured to determine a sixth permission as the target permission if the obtaining frequency is smaller than a preset second frequency threshold, where the sixth permission is associated with a preset fifth rate and the sixth permission is associated with a preset first authorization number;
a seventh determining subunit, configured to determine a seventh permission as the target permission if the obtaining frequency is not less than the second frequency threshold, where the seventh permission is associated with the fifth rate, the seventh permission is associated with a preset second authorization number, and the second authorization number is smaller than the first authorization number.
As can be seen from the above, in the embodiment of the present application, the user management apparatus may track the data acquired by the user for the specified resource based on the behavior of the user for acquiring the specified resource, and update the target authority of the user for the specified resource in time according to the data acquired, so that the user may acquire the specified resource at a certain rate under the target authority. Through the process, the personalized authority management of the user is realized, and the acquisition intention of the user on the specified resources can be improved.
EXAMPLE III
Referring to fig. 3, a server 3 in the embodiment of the present application includes: a memory 301, one or more processors 302 (only one shown in fig. 3), and a computer program stored on the memory 301 and executable on the processors. Wherein: the memory 301 is used for storing software programs and units, and the processor 302 executes various functional applications and data processing by running the software programs and units stored in the memory 301, so as to acquire resources corresponding to the preset events. Specifically, the processor 302 realizes the following steps by running the above-mentioned computer program stored in the memory 301:
determining acquisition data based on the acquisition behavior of the user on the specified resource;
determining a target authority matched with the acquired data;
and opening the target authority to the user aiming at the specified resource.
Assuming that the above is the first possible embodiment, in a second possible embodiment provided on the basis of the first possible embodiment, the acquisition data includes the number of acquisition times; before determining to acquire data based on the user's acquisition behavior of the specified resource, the processor 302, by executing the computer program stored in the memory 301, further implements the following steps:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and updating the acquisition times of the user for the specified resources when the occurrence of the acquisition event of the user for the specified resources is monitored.
In a third possible implementation manner provided on the basis of the second possible implementation manner, the determining the target authority matching the acquired data includes:
if the obtaining times are more than 0 and less than a preset first time threshold, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate;
if the obtaining times is not less than the second time threshold, determining a third authority as the target authority, wherein the third authority is associated with a preset third rate;
wherein, the first rate, the second rate and the third rate are in an increasing or decreasing relationship.
In a fourth possible embodiment provided on the basis of the one possible embodiment, the acquiring data includes an acquiring frequency; before determining to acquire data based on the user's acquisition behavior of the specified resource, the processor 302, by executing the computer program stored in the memory 301, further implements the following steps:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and counting the occurrence frequency of the acquisition events of the user for the specified resources within a preset period time, and updating the acquisition frequency of the user for the specified resources based on the occurrence frequency.
In a fifth possible implementation manner provided on the basis of the four possible implementation manners, the determining the target authority matching with the acquired data includes:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
In a sixth possible implementation manner provided on the basis of the fifth possible implementation manner, the processor 302, when executing the computer program stored in the memory 301, further implements the following steps:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target authority;
and if the timing duration of the timer exceeds the authorized duration associated with the target permission, releasing the target permission of the user for the specified resource.
In a seventh possible implementation manner provided on the basis of the fourth possible implementation manner, the determining the target authority matching the acquired data includes:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than the second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
It should be understood that, in the embodiment of the present Application, the Processor 302 may be a Central Processing Unit (CPU), and the Processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Therefore, in the embodiment of the application, the server can track the data acquired by the user for the specified resource based on the behavior of the user for acquiring the specified resource, and update the target authority of the user for the specified resource in time according to the data acquired, so that the user can acquire the specified resource at a certain rate under the target authority. Through the process, the personalized authority management of the user is realized, and the acquisition intention of the user on the specified resources can be improved.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to implement all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of external device software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the above-described modules or units is only one logical functional division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form. The computer-readable storage medium may include: any entity or device capable of carrying the above-described computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer readable Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signal, telecommunication signal, software distribution medium, etc. It should be noted that the computer readable storage medium may contain other contents which can be appropriately increased or decreased according to the requirements of the legislation and the patent practice in the jurisdiction, for example, in some jurisdictions, the computer readable storage medium does not include an electrical carrier signal and a telecommunication signal according to the legislation and the patent practice.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.
Claims (10)
1. A user management method, comprising:
determining acquisition data based on the acquisition behavior of the user on the specified resource;
determining a target authority matched with the acquired data;
and opening the target permission to the user aiming at the specified resource.
2. The user management method according to claim 1, wherein the acquisition data includes an acquisition number; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method further includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition times of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and updating the acquisition times of the user for the specified resources when the user acquisition event for the specified resources is monitored.
3. The user management method of claim 2, wherein said determining the target rights that match the captured data comprises:
if the obtaining times are more than 0 and less than a preset first time threshold value, determining a first authority as the target authority, wherein the first authority is associated with a preset first rate;
if the obtaining times are not less than the first time threshold and less than a preset second time threshold, determining a second authority as the target authority, wherein the second authority is associated with a preset second rate;
if the obtaining times are not smaller than the second time threshold value, determining a third authority as the target authority, wherein the third authority is associated with a preset third rate;
the first rate, the second rate, and the third rate are in an increasing or decreasing relationship.
4. The user management method of claim 1, wherein the acquiring data comprises an acquisition frequency; before determining to acquire data based on the user's acquisition behavior of the specified resource, the user management method includes:
when a registration instruction input by the user based on a resource platform is received, initializing the acquisition frequency of the user for the specified resource;
correspondingly, the determining the acquisition data based on the user's acquisition behavior of the specified resource includes:
and counting the occurrence times of the acquisition events of the specified resources by the user within a preset period time, and updating the acquisition frequency of the specified resources by the user based on the occurrence times.
5. The user management method of claim 4, wherein said determining the target rights that match the captured data comprises:
if the obtaining frequency is smaller than a preset first frequency threshold, determining a fourth authority as the target authority, wherein the fourth authority is associated with a preset fourth rate, and the fourth authority is associated with a preset first authorization duration;
and if the acquisition frequency is not less than the first frequency threshold, determining a fifth authority as the target authority, wherein the fifth authority is associated with the fourth rate, the fifth authority is associated with a preset second authorization duration, and the second authorization duration is longer than the first authorization duration.
6. The user management method according to claim 5, wherein the user management method further comprises:
starting a timer to start timing when the target authority is opened to the user;
obtaining an authorization duration associated with the target permission;
and if the timing duration of the timer exceeds the authorization duration associated with the target permission, releasing the target permission of the user for the specified resource.
7. The user management method of claim 4, wherein said determining the target rights that match the captured data comprises:
if the acquisition frequency is smaller than a preset second frequency threshold, determining a sixth authority as the target authority, wherein the sixth authority is associated with a preset fifth rate and the sixth authority is associated with a preset first authorization time;
and if the acquisition frequency is not less than the second frequency threshold, determining a seventh authority as the target authority, wherein the seventh authority is associated with the fifth rate, the seventh authority is associated with a preset second authorization frequency, and the second authorization frequency is less than the first authorization frequency.
8. A user management apparatus, comprising:
the data determining unit is used for determining the acquired data based on the acquisition behavior of the user on the specified resource;
the authority determining unit is used for determining target authority matched with the acquired data;
and the permission opening unit is used for opening the target permission to the user aiming at the specified resource.
9. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010443977.6A CN111709773A (en) | 2020-05-22 | 2020-05-22 | User management method, user management device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010443977.6A CN111709773A (en) | 2020-05-22 | 2020-05-22 | User management method, user management device and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111709773A true CN111709773A (en) | 2020-09-25 |
Family
ID=72537555
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010443977.6A Pending CN111709773A (en) | 2020-05-22 | 2020-05-22 | User management method, user management device and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111709773A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103098084A (en) * | 2010-05-10 | 2013-05-08 | 塞戈米特公司 | Targeted marketing with CPE buydown |
CN107730342A (en) * | 2017-09-06 | 2018-02-23 | 深圳市金立通信设备有限公司 | A kind of data processing method and server |
WO2019041280A1 (en) * | 2017-08-31 | 2019-03-07 | 深圳市云中飞网络科技有限公司 | Application resource recommendation method and related device |
-
2020
- 2020-05-22 CN CN202010443977.6A patent/CN111709773A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103098084A (en) * | 2010-05-10 | 2013-05-08 | 塞戈米特公司 | Targeted marketing with CPE buydown |
WO2019041280A1 (en) * | 2017-08-31 | 2019-03-07 | 深圳市云中飞网络科技有限公司 | Application resource recommendation method and related device |
CN107730342A (en) * | 2017-09-06 | 2018-02-23 | 深圳市金立通信设备有限公司 | A kind of data processing method and server |
Non-Patent Citations (1)
Title |
---|
外土司: "《向外土司学外贸 2 营销可以这样做》", 北京:中国海关出版社, pages: 137 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110827138B (en) | Push information determining method and device | |
CN106600275B (en) | Risk identification method and device | |
CN111309745A (en) | Virtual resource processing method and device, electronic equipment and storage medium | |
CN111652623A (en) | Frozen account unfreezing data processing method, device and equipment | |
CN112330355A (en) | Consumption ticket transaction data processing method, device, equipment and storage medium | |
CN112101939A (en) | Node management method and system based on block chain | |
CN112101745A (en) | Vehicle release prompting method and device, terminal device and storage medium | |
CN111709773A (en) | User management method, user management device and server | |
CN110060358B (en) | Information processing method and related device | |
CN110557394B (en) | Parallel chain management method, equipment and storage medium | |
CN110348983B (en) | Transaction information management method and device, electronic equipment and non-transitory storage medium | |
CN113327115A (en) | Rental business processing method, device, equipment and system | |
CN114862517A (en) | Automobile leasing method and device based on block chain | |
CN111709772A (en) | User management method, user management device and server | |
CN114417334A (en) | Blacklist management and control mechanism generation method, apparatus, device and storage medium | |
CN114693336A (en) | Resource delivery cost prediction method and device, electronic equipment and storage medium | |
CN110880042B (en) | Online game registration information processing method and device | |
CN113138871A (en) | Processing method and device of activity data and electronic equipment | |
CN114943569B (en) | Data processing method, device, equipment and medium | |
CN112669031A (en) | Recharging-free data processing method, device, equipment and system for payment card | |
CN112488825A (en) | Object transaction method and device based on block chain | |
CN116756117A (en) | Data processing method, device, equipment and storage medium | |
US11468537B2 (en) | Open market system, method for providing open market, and program | |
CN113191800B (en) | Method and device for counting advertisement click rate on APP | |
CN113886776A (en) | Authority control method, device, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200925 |
|
RJ01 | Rejection of invention patent application after publication |