CN113570328B - Resource quota reallocation method and device and electronic equipment - Google Patents

Resource quota reallocation method and device and electronic equipment Download PDF

Info

Publication number
CN113570328B
CN113570328B CN202110766258.2A CN202110766258A CN113570328B CN 113570328 B CN113570328 B CN 113570328B CN 202110766258 A CN202110766258 A CN 202110766258A CN 113570328 B CN113570328 B CN 113570328B
Authority
CN
China
Prior art keywords
resource
user
quota
resource quota
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110766258.2A
Other languages
Chinese (zh)
Other versions
CN113570328A (en
Inventor
汪正阳
张潮华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qilu Information Technology Co Ltd
Original Assignee
Beijing Qilu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qilu Information Technology Co Ltd filed Critical Beijing Qilu Information Technology Co Ltd
Priority to CN202110766258.2A priority Critical patent/CN113570328B/en
Publication of CN113570328A publication Critical patent/CN113570328A/en
Application granted granted Critical
Publication of CN113570328B publication Critical patent/CN113570328B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06312Adjustment or analysis of established resource schedule, e.g. resource or task levelling, or dynamic rescheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Abstract

The invention discloses a resource quota reallocation method, a device and electronic equipment, wherein the method comprises the following steps: marking the users with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota as appointed users; receiving a current resource application of a designated user, and approving the current resource application according to the risk level of the designated user; if the current resource application of the appointed user is refused, displaying the resource quota reallocation information, and not displaying the refused resource application information; and receiving a first operation of the user on the resource quota reallocation information, calling the third-party data to reallocate the resource quota of the user, and displaying the reallocated resource quota. According to the invention, while controlling risks, the third party data is combined to reallocate the resource quota for the user with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota, so that the loss of income, loss of users and the like caused by directly rejecting the appointed user are avoided.

Description

Resource quota reallocation method and device and electronic equipment
Technical Field
The present invention relates to the field of computer information processing technologies, and in particular, to a method, an apparatus, an electronic device, and a computer readable medium for reallocating a resource quota.
Background
In internet-based application technology, it is often necessary to exchange resources between different parties. The resource referred to herein refers to any substance, information, money, time, etc. that can be utilized. Information resources include computing resources and various types of data resources. The data resources include various dedicated data in various fields. In the process of allocating resources, it is often necessary to authenticate the resource allocation rights of users and allocate different resource quotas to different users, where the resource allocation rights refer to an authentication of whether a user has rights to acquire resources, and the authentication may be performed by a specific resource management mechanism or all parties of the resources. By resource quota is meant the highest amount of resources that the user can obtain in a particular time.
The authentication of the resource allocation rights to the users is essentially to set a strategy and a rule for evaluating the users according to indexes possibly influencing the resource return performance of the users, estimate the resource return performance of the users by evaluating whether the users meet preset indexes, further select how to grant the resource quota to the users, and grant the corresponding resource quota to the users if the users pass the evaluation of the strategy.
However, in practice, a part of clients with higher resource quota may make multiple resource requests, and as the resource exchange time goes on, the situation that the resources not returned by the clients are gradually increased, the resource return ability is reduced, and the risk of the clients is increased. However, because the resource quota of the clients is high, and the average resource quota of the checked clients is also high, if the resource request is directly refused, the enterprise income can be influenced, and the clients can be lost. Therefore, it is necessary to deeply mine the value of clients whose resource quota is high and who are denied a resource request while controlling risk.
Disclosure of Invention
Accordingly, the present invention is directed to a method, an apparatus, an electronic device, and a computer readable medium for reallocating resource quota, which are designed to at least partially solve at least one of the above-mentioned problems.
In order to solve the above technical problem, a first aspect of the present invention provides a resource quota reallocation method, where the method includes:
marking the users with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota as appointed users;
receiving a current resource application of a designated user, and approving the current resource application according to the risk level of the designated user;
if the current resource application of the appointed user is refused, displaying the resource quota reallocation information, and not displaying the refused resource application information;
receiving a first operation of a user on the resource quota reallocation information, calling a third-party data to reallocate the resource quota of the user, and displaying the reallocated resource quota;
the average resource amount of the checked and approved=the total resource amount of the checked and approved/the total number of checked and approved.
According to a preferred embodiment of the invention, the method further comprises:
and receiving a re-resource application of the appointed user, and approving the re-resource application of the appointed user according to the re-allocated resource quota.
According to a preferred embodiment of the present invention, before the approving the current resource application according to the risk level of the specified user, the method further includes:
acquiring risk data of a designated user;
inputting the risk data into a pre-trained risk model to obtain a risk grade of a specified user;
optionally, the risk data includes: at least one of historical resource return, remaining return period number, and accumulated unreturned resource data.
According to a preferred embodiment of the present invention, before the approving the current resource application according to the risk level of the specified user, the method further includes:
acquiring risk data of a designated user;
determining the risk level of the appointed user according to a preset risk level judging rule and the risk data;
optionally, the risk data includes: at least one of historical resource return conditions, remaining return period numbers, and accumulated unreturned resource data; the preset risk level judging rule is a corresponding relation table of at least one of historical resource return requests, residual return period numbers and accumulated unreturned resource data and risk levels.
According to a preferred embodiment of the present invention, if the current resource application of the specified user is rejected, the method further comprises:
configuring a threshold value of the reallocation resource quota of the user according to the designated user risk level;
the exposing the reallocated resource quota includes:
comparing a threshold value of the assigned user reallocation resource quota with a resource quota of the third party data reallocation is invoked;
if the threshold value of the reallocated resource quota is larger than the resource quota for calling the reallocated third-party data, displaying the resource quota for calling the reallocated third-party data;
and if the threshold value of the reallocated resource quota is smaller than the threshold value of the reallocated resource quota for calling the third-party data to be reallocated, displaying the threshold value of the reallocated resource quota.
According to a preferred embodiment of the invention, the method further comprises:
if the resource application of the appointed user passes the approval again, acquiring risk data of the appointed user at the appointed time or at the interval of the appointed time;
and updating the risk level of the appointed user according to the risk data.
In order to solve the above technical problem, a second aspect of the present invention provides a resource quota reallocating apparatus, including:
the marking module is used for marking the users with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota as appointed users;
the first approval module is used for receiving the current resource application of the appointed user and approving the current resource application according to the risk level of the appointed user;
the display module is used for displaying the resource quota reallocation information and not displaying the refused resource application information if the current resource application of the appointed user is refused;
the reallocation module is used for receiving a first operation of the user on the resource quota reallocation information, calling the third-party data to reallocate the resource quota of the user, and displaying the reallocated resource quota;
the average resource amount of the checked and approved=the total resource amount of the checked and approved/the total number of checked and approved.
According to a preferred embodiment of the present invention, if the current resource application of the designated user is denied, the apparatus further comprises:
the configuration module is used for configuring a threshold value of the reallocation resource quota of the user according to the designated user risk level;
the reassignment module includes:
the comparison module is used for comparing the threshold value of the reassigned resource quota of the appointed user with the resource quota of the reassigned calling third party data;
the first sub-display module is used for displaying the resource quota which is redistributed by the calling third party data if the threshold value of the redistributed resource quota is larger than the resource quota which is redistributed by the calling third party data;
and the second sub-display module is used for displaying the threshold value of the reallocated resource quota if the threshold value of the reallocated resource quota is smaller than the threshold value of the resource quota for calling the third-party data to be reallocated.
To solve the above technical problem, a third aspect of the present invention provides an electronic device, including:
a processor; and
a memory storing computer executable instructions that, when executed, cause the processor to perform the method described above.
To solve the above technical problem, a fourth aspect of the present invention provides a computer-readable storage medium storing one or more programs, which when executed by a processor, implement the above method.
After the current resource application of a designated user is refused, displaying resource quota reallocation information, calling third-party data to reallocate the resource quota of the user according to a first operation of the user on the resource quota reallocation information, and displaying the reallocated resource quota; and reallocating the resource quota for the user with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota by combining the third party data while controlling the risk, so that the loss of income, the loss of users and the like caused by directly rejecting the appointed user are avoided. Meanwhile, after the resource application is refused, the resource quota is allocated to the user again, so that data can be accumulated for the wind control system, and the wind control accuracy is improved.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects achieved more clear, specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted, however, that the drawings described below are merely illustrative of exemplary embodiments of the present invention and that other embodiments of the drawings may be derived from these drawings by those skilled in the art without undue effort.
FIG. 1 is a flow chart of a method for reallocating a resource quota according to an embodiment of the invention;
FIG. 2 is a schematic diagram of a structural framework of a resource quota reallocating apparatus according to an embodiment of the invention;
FIG. 3 is a block diagram of an exemplary embodiment of an electronic device in accordance with the present invention;
FIG. 4 is a schematic diagram of one embodiment of a computer readable medium of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown, although the exemplary embodiments may be practiced in various specific ways. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, capabilities, effects, or other features described in a particular embodiment may be incorporated in one or more other embodiments in any suitable manner without departing from the spirit of the present invention.
In describing particular embodiments, specific details of construction, performance, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by those skilled in the art. It is not excluded, however, that one skilled in the art may implement the present invention in a particular situation in a solution that does not include the structures, properties, effects, or other characteristics described above.
The flow diagrams in the figures are merely exemplary flow illustrations and do not represent that all of the elements, operations, and steps in the flow diagrams must be included in the aspects of the present invention, nor that the steps must be performed in the order shown in the figures. For example, some operations/steps in the flowcharts may be decomposed, some operations/steps may be combined or partially combined, etc., and the order of execution shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The same reference numerals in the drawings denote the same or similar elements, components or portions, and thus repeated descriptions of the same or similar elements, components or portions may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various devices, elements, components or portions, these devices, elements, components or portions should not be limited by these terms. That is, these phrases are merely intended to distinguish one from the other. For example, a first device may also be referred to as a second device without departing from the spirit of the invention. Furthermore, the term "and/or," "and/or" is meant to include all combinations of any one or more of the items listed.
Referring to fig. 1, fig. 1 is a flowchart of a resource quota reallocation method provided by the present invention. As shown in fig. 1, the method includes:
s1, marking the users with the resource quota larger than a preset quota and the average resource amount of the checked batch larger than the preset resource amount as appointed users;
in the embodiment of the invention, the resource quota refers to the highest resource amount which can be obtained by the user within a specific time and is allocated to the user in advance according to the user index. The user index may be different according to the resource, for example, for the computing resource, the user index may be the memory of the user computer; for data resources, the user index may be a contribution of the user to the data-related work; for money related resources, the user indicator may be the user's return amount for the resource; etc.
In practice, the user may apply for the resource multiple times as required and obtain approval, and the average resource amount of approved=total resource amount already approved/total number of approved times. The amount of exchangeable resources of the user can be reflected by the resource quota, and the actual amount of exchangeable resources of the user can be reflected by the average resource quota which is already approved. The users with high resource quota and high average resource quota are master users participating in resource exchange, and risk loss caused by overdue risk of resource return of the users is large, so that users with resource quota larger than a preset quota and average resource quota larger than the preset resource quota are required to be marked as appointed users, and the value of the appointed users is deeply mined while controlling the risk.
The preset quota and the preset resource amount can be preconfigured according to actual needs. For example, the preset field may be preconfigured to mark the specified user, such as when the preset field is a specified value, character, or combination of value and character.
S2, receiving a current resource application of a specified user, and approving the current resource application according to the risk level of the specified user;
when receiving the resource application of the user, the user judges whether the user is the appointed user according to a preset field, if the user is the appointed user, the risk grade of the appointed user can be obtained first, and then the current resource application is approved according to the risk grade of the appointed user.
In one example, the risk level for a given user may be obtained by:
s11, acquiring risk data of a specified user;
optionally, the risk data includes: at least one of historical resource return, remaining return period number, and accumulated unreturned resource data. From this data, the risk of the user returning the resource, such as the expected risk, fraud risk, etc., can be predicted.
S12, inputting the risk data into a pre-trained risk model to obtain a risk grade of a specified user;
the risk model may include a risk prediction module for predicting risk probability of the user according to the risk data, and a ranking module for determining risk ranking of the user according to the risk probability of the user and a preset risk ranking criterion. The risk model can be trained in advance according to the risk data and the risk labels of the historical appointed users, and the trained risk model can estimate the risk grade of the users according to the risk data. The risk prediction module may adopt an xgboost model, a decision tree model, a random forest model, and the like, and the preset risk level classification standard may divide different risk probability intervals into corresponding risk levels according to needs.
In another example, the risk level of a given user may be obtained by:
s101, acquiring risk data of a specified user;
step S101 is the same as step S11, and will not be described here again.
S102, determining the risk level of the appointed user according to a preset risk level judging rule and the risk data;
optionally, the preset risk level determination rule is a corresponding relation table of at least one of historical resource return request, residual return period number and accumulated unreturned resource data and risk level.
In this embodiment, the risk data corresponding to the correspondence table corresponds to the risk data acquired in step S101; exemplary, if the risk data includes: the historical resource returning condition is that a risk level judging rule is preset as a corresponding relation table of a historical resource returning request and a risk level; if the risk data includes: historical resource returning conditions and accumulated unreturned resource data; and presetting a risk level judgment rule as a corresponding relation table of historical resource return requests, accumulated unreturned resource data and risk levels. If the risk data includes: historical resource returning conditions, residual returning period numbers and accumulated unreturned resource data; and presetting a risk level judgment rule as a corresponding relation table of historical resource return requests, residual return period numbers and accumulated unreturned resource data and risk levels.
For example, in the correspondence table containing a plurality of risk data, different value intervals of each risk data may be configured, and a combination of different value intervals of each risk data may correspond to a risk level, where one risk level may correspond to a plurality of the combinations.
After the risk level of the appointed user is obtained, the risk level of the appointed user can be compared with a risk level threshold, when the risk level of the appointed user is larger than the risk level threshold, the resource application of the appointed user is refused, and when the risk level of the appointed user is smaller than the risk level threshold, the resource application of the appointed user is approved. The risk level threshold can be configured according to actual needs.
S3, if the current resource application of the appointed user is refused, displaying the resource quota reallocation information, and not displaying the refused resource application information;
in this embodiment, after the current resource application of the designated user is refused, the information of refused resource application is not displayed, so that the user loss caused by refused resource application can be avoided.
For example, after the current resource application of the specified user is denied, it may be shown that the user resource quota has expired, and a button or icon for reallocating the resource quota or not for the user to select is displayed.
Further, the current resource application of the designated user is refused, and the threshold value of the reallocated resource quota of the user can be configured according to the risk level of the designated user, so that the reallocated resource quota of the designated user is ensured to be within risk control.
S4, receiving a first operation of the user on the resource quota reallocation information, calling the third-party data to reallocate the resource quota of the user, and displaying the reallocated resource quota;
the first operation may be, for example, a user selection operation of a button/icon for reallocating a resource quota. The third party data may be data capable of reflecting a user's existing resources, which may be user's existing assets, liabilities, etc., and/or a user's ability to acquire resources, which may be user's academy, etc. The third party data may be obtained via a data platform capable of providing the third party data.
In one example, the exposing the reallocated resource quota includes: comparing a threshold value of the assigned user reallocation resource quota with a resource quota of the third party data reallocation is invoked; if the threshold value of the reallocated resource quota is larger than the resource quota for calling the reallocated third-party data, displaying the resource quota for calling the reallocated third-party data; and if the threshold value of the reallocated resource quota is smaller than the threshold value of the reallocated resource quota for calling the third-party data to be reallocated, displaying the threshold value of the reallocated resource quota.
Further, the method further comprises:
and receiving a re-resource application of the appointed user, and approving the re-resource application of the appointed user according to the re-allocated resource quota. For example, if the re-resource application amount of the designated user is greater than the re-allocated resource quota, the designated user is refused to apply for the re-resource, otherwise, the designated user is approved to apply for the re-resource.
Further, if the resource application of the appointed user passes the approval again, the risk data of the appointed user can be obtained at the appointed time or at the interval of the appointed time; obviously, the risk data comprises first risk data generated by all resource applications before the resource application of the appointed user is refused and second risk data generated by the resource application of the appointed user after the resource application of the appointed user is refused and the resource quota is reassigned, and the risk grade of the appointed user is updated through the first risk data and the second risk data, so that the accuracy of risk assessment of the appointed user is improved.
Fig. 2 is a schematic architecture diagram of a resource quota reallocating apparatus according to the present invention, as shown in fig. 2, where the apparatus includes:
a marking module 21, configured to mark, as a designated user, a user whose resource quota is greater than a predetermined quota and whose average resource quota of the checked batch is greater than the predetermined resource quota;
the first approval module 22 is configured to receive a current resource application of a specified user, and approve the current resource application according to a risk level of the specified user;
the display module 23 is configured to display the resource quota reallocation information if the current resource application of the specified user is refused, and not display the refused resource application information;
a reassignment module 24, configured to receive a first operation of the user on the resource quota reassignment information, invoke the third party data to reassign the resource quota of the user, and display the reassigned resource quota;
the average resource amount of the checked and approved=the total resource amount of the checked and approved/the total number of checked and approved.
Further, the device further comprises:
and the second approval module is used for receiving the user re-resource application and approving the user re-resource application according to the re-allocated resource quota.
In an alternative example, the apparatus further comprises:
the first acquisition module is used for acquiring risk data of the appointed user;
the first estimating module is used for inputting the risk data into a pre-trained risk model to obtain the risk grade of the appointed user;
optionally, the risk data includes: at least one of historical resource return, remaining return period number, and accumulated unreturned resource data.
In another alternative example, the apparatus further comprises:
the second acquisition module is used for acquiring risk data of the appointed user;
the determining module is used for determining the risk level of the appointed user according to a preset risk level judging rule and the risk data;
optionally, the risk data includes: at least one of historical resource return conditions, remaining return period numbers, and accumulated unreturned resource data; the preset risk level judging rule is a corresponding relation table of at least one of historical resource return requests, residual return period numbers and accumulated unreturned resource data and risk levels.
Further, if the current resource application of the designated user is rejected, the apparatus further includes:
the configuration module is used for configuring a threshold value of the reallocation resource quota of the user according to the designated user risk level;
the reassignment module 24 includes:
the comparison module is used for comparing the threshold value of the reassigned resource quota of the appointed user with the resource quota of the reassigned calling third party data;
the first sub-display module is used for displaying the resource quota which is redistributed by the calling third party data if the threshold value of the redistributed resource quota is larger than the resource quota which is redistributed by the calling third party data;
and the second sub-display module is used for displaying the threshold value of the reallocated resource quota if the threshold value of the reallocated resource quota is smaller than the threshold value of the resource quota for calling the third-party data to be reallocated.
Further, the device further comprises:
the third acquisition module is used for acquiring risk data of the appointed user at the appointed time or at the interval of the appointed time if the appointed user applies for resources again and passes approval;
and the updating module is used for updating the risk level of the appointed user according to the risk data.
It will be appreciated by those skilled in the art that the modules in the embodiments of the apparatus described above may be distributed in an apparatus as described, or may be distributed in one or more apparatuses different from the embodiments described above with corresponding changes. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
The following describes an embodiment of an electronic device of the present invention, which may be regarded as a physical form of implementation for the above-described embodiment of the method and apparatus of the present invention. Details described in relation to the embodiments of the electronic device of the present invention should be considered as additions to the embodiments of the method or apparatus described above; for details not disclosed in the embodiments of the electronic device of the present invention, reference may be made to the above-described method or apparatus embodiments.
Fig. 3 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. The electronic device shown in fig. 3 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present invention.
As shown in fig. 3, the electronic device 300 of the exemplary embodiment is in the form of a general-purpose data processing device. Components of electronic device 300 may include, but are not limited to: at least one processing unit 310, at least one memory unit 320, a bus 330 connecting different electronic device components (including memory unit 320 and processing unit 310), a display unit 340, and the like.
The storage unit 320 stores a computer readable program, which may be a source program or code of a read only program. The program may be executed by the processing unit 310 such that the processing unit 310 performs the steps of various embodiments of the present invention. For example, the processing unit 310 may perform the steps shown in fig. 1.
The memory unit 320 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 3201 and/or cache memory 3202, and may further include Read Only Memory (ROM) 3203. The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to: an operating electronic device, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also be in communication with one or more external devices 100 (e.g., keyboard, display, network device, bluetooth device, etc.), such that a user can interact with the electronic device 300 via the external devices 300, and/or such that the electronic device 300 can communicate with one or more other data processing devices (e.g., routers, modems, etc.). Such communication may occur through an input/output (I/O) interface 350, and may also occur through a network adapter 360 to one or more networks, such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet. The network adapter 360 may communicate with other modules of the electronic device 300 via the bus 330. It should be appreciated that although not shown in fig. 3, other hardware and/or software modules may be used in electronic device 300, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID electronics, tape drives, data backup storage electronics, and the like.
FIG. 4 is a schematic diagram of one embodiment of a computer readable medium of the present invention. As shown in fig. 4, the computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but not limited to, an electronic device, apparatus, or means of electronic, magnetic, optical, electromagnetic, infrared, or semiconductor, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. The computer program, when executed by one or more data processing devices, enables the computer readable medium to carry out the above-described method of the present invention, namely: marking the users with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota as appointed users; receiving a current resource application of a designated user, and approving the current resource application according to the risk level of the designated user; if the current resource application of the appointed user is refused, displaying the resource quota reallocation information, and not displaying the refused resource application information; and receiving a first operation of the user on the resource quota reallocation information, calling the third-party data to reallocate the resource quota of the user, and displaying the reallocated resource quota.
From the above description of embodiments, those skilled in the art will readily appreciate that the exemplary embodiments described herein may be implemented in software, or may be implemented in software in combination with necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer readable storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, comprising several instructions to cause a data processing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described method according to the present invention.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution electronic device, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In summary, the present invention may be implemented in a method, apparatus, electronic device, or computer readable medium that executes a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or Digital Signal Processor (DSP).
The above-described specific embodiments further describe the objects, technical solutions and advantageous effects of the present invention in detail, and it should be understood that the present invention is not inherently related to any particular computer, virtual device or electronic apparatus, and various general-purpose devices may also implement the present invention. The foregoing description of the embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (10)

1. A method for reallocating a resource quota, the method comprising:
marking the users with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota as appointed users;
receiving a current resource application of a designated user, and approving the current resource application according to the risk level of the designated user;
if the current resource application of the appointed user is refused, displaying the resource quota reallocation information, and not displaying the refused resource application information;
receiving a first operation of a user on the resource quota reallocation information, calling a third-party data to reallocate the resource quota of the user, and displaying the reallocated resource quota;
the average resource amount of the checked and approved=the total resource amount of the checked and approved/the total number of checked and approved.
2. The method according to claim 1, wherein the method further comprises:
and receiving a re-resource application of the appointed user, and approving the re-resource application of the appointed user according to the re-allocated resource quota.
3. The method according to claim 1 or 2, wherein prior to said approving a current resource application according to the risk level of said specified user, the method further comprises:
acquiring risk data of a designated user;
inputting the risk data into a pre-trained risk model to obtain a risk grade of a specified user;
optionally, the risk data includes: at least one of historical resource return, remaining return period number, and accumulated unreturned resource data.
4. The method according to claim 1 or 2, wherein prior to said approving a current resource application according to the risk level of said specified user, the method further comprises:
acquiring risk data of a designated user;
determining the risk level of the appointed user according to a preset risk level judging rule and the risk data;
optionally, the risk data includes: at least one of historical resource return conditions, remaining return period numbers, and accumulated unreturned resource data; the preset risk level judging rule is a corresponding relation table of at least one of historical resource return requests, residual return period numbers and accumulated unreturned resource data and risk levels.
5. The method according to claim 1 or 2, wherein if the current resource application of the specified user is denied, the method further comprises:
configuring a threshold value of the reallocation resource quota of the user according to the designated user risk level;
the exposing the reallocated resource quota includes:
comparing a threshold value of the assigned user reallocation resource quota with a resource quota of the third party data reallocation is invoked;
if the threshold value of the reallocated resource quota is larger than the resource quota for calling the reallocated third-party data, displaying the resource quota for calling the reallocated third-party data;
and if the threshold value of the reallocated resource quota is smaller than the threshold value of the reallocated resource quota for calling the third-party data to be reallocated, displaying the threshold value of the reallocated resource quota.
6. The method according to claim 1 or 2, characterized in that the method further comprises:
if the resource application of the appointed user passes the approval again, acquiring risk data of the appointed user at the appointed time or at the interval of the appointed time;
and updating the risk level of the appointed user according to the risk data.
7. A resource quota reallocation apparatus, the apparatus comprising:
the marking module is used for marking the users with the resource quota larger than the preset quota and the average resource quota of the checked batch larger than the preset resource quota as appointed users;
the first approval module is used for receiving the current resource application of the appointed user and approving the current resource application according to the risk level of the appointed user;
the display module is used for displaying the resource quota reallocation information and not displaying the refused resource application information if the current resource application of the appointed user is refused;
the reallocation module is used for receiving a first operation of the user on the resource quota reallocation information, calling the third-party data to reallocate the resource quota of the user, and displaying the reallocated resource quota;
the average resource amount of the checked and approved=the total resource amount of the checked and approved/the total number of checked and approved.
8. The apparatus of claim 7, wherein if the current resource application of the specified user is denied, the apparatus further comprises:
the configuration module is used for configuring a threshold value of the reallocation resource quota of the user according to the designated user risk level;
the reassignment module includes:
the comparison module is used for comparing the threshold value of the reassigned resource quota of the appointed user with the resource quota of the reassigned calling third party data;
the first sub-display module is used for displaying the resource quota which is redistributed by the calling third party data if the threshold value of the redistributed resource quota is larger than the resource quota which is redistributed by the calling third party data;
and the second sub-display module is used for displaying the threshold value of the reallocated resource quota if the threshold value of the reallocated resource quota is smaller than the threshold value of the resource quota for calling the third-party data to be reallocated.
9. An electronic device, comprising:
a processor; and
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-6.
10. A computer readable storage medium storing one or more programs, which when executed by a processor, implement the method of any of claims 1-6.
CN202110766258.2A 2021-07-07 2021-07-07 Resource quota reallocation method and device and electronic equipment Active CN113570328B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110766258.2A CN113570328B (en) 2021-07-07 2021-07-07 Resource quota reallocation method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110766258.2A CN113570328B (en) 2021-07-07 2021-07-07 Resource quota reallocation method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113570328A CN113570328A (en) 2021-10-29
CN113570328B true CN113570328B (en) 2024-02-02

Family

ID=78163879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110766258.2A Active CN113570328B (en) 2021-07-07 2021-07-07 Resource quota reallocation method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113570328B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146659A (en) * 2017-06-16 2019-01-04 阿里巴巴集团控股有限公司 Resource allocation methods and device, system
CN110061852A (en) * 2013-03-15 2019-07-26 英特尔公司 Budget formulation and quotas administered system for data consumption
WO2020088802A1 (en) * 2018-11-02 2020-05-07 Nokia Solutions And Networks Oy Methods and apparatuses for network slice minimum and maximum resource quotas
CN111626528A (en) * 2020-07-27 2020-09-04 北京淇瑀信息科技有限公司 Bezier curve-based resource quota determining method and device and electronic equipment
CN112016794A (en) * 2020-07-15 2020-12-01 北京淇瑀信息科技有限公司 Resource quota management method and device and electronic equipment
CN112017023A (en) * 2020-07-15 2020-12-01 北京淇瑀信息科技有限公司 Method and device for determining resource limit of small and micro enterprise and electronic equipment
CN112950003A (en) * 2021-02-07 2021-06-11 北京淇瑀信息科技有限公司 User resource quota adjusting method and device and electronic equipment
CN112991046A (en) * 2021-03-25 2021-06-18 腾讯科技(深圳)有限公司 Electronic resource limit control method, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070185724A1 (en) * 2006-02-06 2007-08-09 Robert Moel System and method for managing quota groups in a metered service enterprise
US10269456B2 (en) * 2017-05-05 2019-04-23 Bank Of America Corporation System for identification of treatment and resource deployment based on treatment interaction

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061852A (en) * 2013-03-15 2019-07-26 英特尔公司 Budget formulation and quotas administered system for data consumption
CN109146659A (en) * 2017-06-16 2019-01-04 阿里巴巴集团控股有限公司 Resource allocation methods and device, system
WO2020088802A1 (en) * 2018-11-02 2020-05-07 Nokia Solutions And Networks Oy Methods and apparatuses for network slice minimum and maximum resource quotas
CN112016794A (en) * 2020-07-15 2020-12-01 北京淇瑀信息科技有限公司 Resource quota management method and device and electronic equipment
CN112017023A (en) * 2020-07-15 2020-12-01 北京淇瑀信息科技有限公司 Method and device for determining resource limit of small and micro enterprise and electronic equipment
CN111626528A (en) * 2020-07-27 2020-09-04 北京淇瑀信息科技有限公司 Bezier curve-based resource quota determining method and device and electronic equipment
CN112950003A (en) * 2021-02-07 2021-06-11 北京淇瑀信息科技有限公司 User resource quota adjusting method and device and electronic equipment
CN112991046A (en) * 2021-03-25 2021-06-18 腾讯科技(深圳)有限公司 Electronic resource limit control method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于数字有机体存储系统配额机制的设计与实现;赵燕;刘心松;邱元杰;周正娟;;成都信息工程学院学报(第01期);全文 *

Also Published As

Publication number Publication date
CN113570328A (en) 2021-10-29

Similar Documents

Publication Publication Date Title
US20080306806A1 (en) Methods and apparatus for dynamically allocating tasks
CN111373372B (en) Assigning priorities to applications for diagonal scaling in a distributed computing environment
CN112348659B (en) User identification policy distribution method and device and electronic equipment
CN104364758A (en) API redirection for limited capability operating systems
US10956541B2 (en) Dynamic optimization of software license allocation using machine learning-based user clustering
CN112017042A (en) Resource quota determining method and device based on tweed distribution and electronic equipment
CN112529481A (en) User fishing-back method and device and electronic equipment
WO2011015441A1 (en) A method and system for optimising license use
CN111598360A (en) Service policy determination method and device and electronic equipment
CN115617511A (en) Resource data processing method and device, electronic equipment and storage medium
CN111464331A (en) Control method and system for thread creation and terminal equipment
CN110689425A (en) Method and device for pricing quota based on income and electronic equipment
CN113570328B (en) Resource quota reallocation method and device and electronic equipment
CN111008767B (en) Internet financial technology architecture evaluation method, device, electronic equipment and medium
US11308428B2 (en) Machine learning-based resource customization to increase user satisfaction
CN117076280A (en) Policy generation method and device, electronic equipment and computer readable storage medium
CN112347386A (en) Resource allocation method and device adopting restriction rules and electronic equipment
CN111179057A (en) Resource allocation method and device and electronic equipment
CN113282890B (en) Resource authorization method, device, electronic equipment and storage medium
Mashayekhy et al. A framework for data protection in cloud federations
CN112131257B (en) Data query method and device
CN114091815A (en) Resource request processing method, device and system and electronic equipment
CN113298353A (en) Resource adjusting method, device and system based on user survival model
CN112508631A (en) User policy distribution method and device and electronic equipment
CN111680867B (en) Resource allocation method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant