CN111191894A - Method and device for processing resource demand based on user classification and electronic equipment - Google Patents

Method and device for processing resource demand based on user classification and electronic equipment Download PDF

Info

Publication number
CN111191894A
CN111191894A CN201911331104.XA CN201911331104A CN111191894A CN 111191894 A CN111191894 A CN 111191894A CN 201911331104 A CN201911331104 A CN 201911331104A CN 111191894 A CN111191894 A CN 111191894A
Authority
CN
China
Prior art keywords
resource provider
information
resource
full
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911331104.XA
Other languages
Chinese (zh)
Inventor
杜岳欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qiyue Information Technology Co Ltd
Original Assignee
Shanghai Qiyue Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qiyue Information Technology Co Ltd filed Critical Shanghai Qiyue Information Technology Co Ltd
Priority to CN201911331104.XA priority Critical patent/CN111191894A/en
Publication of CN111191894A publication Critical patent/CN111191894A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06312Adjustment or analysis of established resource schedule, e.g. resource or task levelling, or dynamic rescheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a resource demand processing method based on user classification, risk evaluation is carried out on all users by building a user risk evaluation model, all users are divided into different customer groups according to risk values and are respectively endowed with customer group labels, the customer group labels correspond to the risk values, meanwhile, resource provider priorities are set, docking rules of the different customer groups and the priorities are built, a resource provider is docked with the customer group labels corresponding to the risk values, current user demand information is sent to the resource provider with the corresponding priority for processing according to the docking rules reflecting the priorities, the overall service achievement rate is improved, and user loss is reduced.

Description

Method and device for processing resource demand based on user classification and electronic equipment
Technical Field
The present application relates to the field of internet, and in particular, to a method and an apparatus for processing resource requirements based on user classification, and an electronic device.
Background
The service platform matches the resource provider with the service resource demander to carry out service transaction in a service providing mode, wherein the service platform and the service provider can evaluate the service demander so as to screen out the resource demander meeting the requirements.
In order to make the evaluation result approximately coincide with the requirement of the service provider, the service platform needs to consider the attention of the service provider.
The existing service platform often provides a resource demand for a certain service provider for a service demander, and the service platform evaluates whether the service demander (user) meets the requirements of the service provider, so as to process the service.
However, for a service platform and a service provider, profit patterns of the service platform and the service provider are different, so that points of interest are different, the service platform usually interfaces with a plurality of resource providers, and requirements of different resource providers are different, and if an optimal resource demander demands a resource provider with the lowest requirement (as an example which is easy to understand), since resources provided by the resource provider are limited, a lot of low-quality resource demands are demanded by the resource provider with a high requirement, and in this case, probability of achieving a service is reduced, so that overall, a service achievement rate is reduced, and further, a service platform has many lost customers (which can be understood by virtue of a principle of field-oriented horse racing).
Therefore, for the service platform, a new method for processing the resource requirement needs to be provided.
Disclosure of Invention
The embodiment of the specification provides a method, a device and electronic equipment for processing resource requirements based on user classification, which are used for improving the service achievement rate of a service platform.
An embodiment of the present specification provides a method for processing resource requirements based on user classification, including:
acquiring full-amount user information, wherein the full-amount user information comprises attribute information, behavior information and financial information of a full-amount user;
constructing a user risk evaluation model, carrying out risk evaluation on the full-scale user based on the full-scale user information, dividing the full-scale user into different guest groups according to risk values, and respectively giving guest group labels;
setting the priority of a resource provider, and constructing a docking rule of the different guest groups and the priority;
acquiring current user demand information, wherein the current user demand information comprises a guest group tag of a current user;
and sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule.
Optionally, the setting resource provider priority includes:
predicting the wind control threshold of each resource provider;
and setting the priority of the resource providers according to the sequence of the wind control threshold values of the plurality of resource providers from low to high.
Optionally, the docking rule further includes a bottom-pocketed forwarding rule, and the sending the current user requirement information to the resource provider with the corresponding priority according to the docking rule for processing includes:
sending the current user requirement information to a first resource provider for processing according to the docking rule;
further comprising:
and if the first resource provider refuses to process the current user requirement information, sending the current user requirement information to a second resource provider for processing, wherein the priority of the first resource provider is higher than that of the second resource provider.
Optionally, the sending the current user requirement information to the first resource provider according to the docking rule for processing includes:
and if the risk value corresponding to the current user demand information is higher than the wind control threshold of a second resource provider, determining a first resource provider with higher priority according to the docking rule.
Optionally, the sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule further includes:
and if the risk value corresponding to the current user demand information is lower than the wind control threshold value of a second resource provider, sending the current user demand information to the second resource provider for processing.
Optionally, the docking rule is configured to dock the current user demand information with the priority through a risk value corresponding to the guest group tag and a wind control threshold of the resource provider.
Optionally, the dividing the full amount of users into different guest groups according to the risk values and respectively giving guest group labels includes:
predicting the resource amount provided by each resource provider, and respectively determining the total amount of the resources provided by each priority resource provider;
predicting the total resource demand of all users;
and dividing the full users into different customer groups according to the risk values of the full users, the total amount of resources provided by the resource providers of all priorities and the total amount of resource demands of the full users.
Optionally, the dividing the full users into different customer groups according to the risk value of the full users, the total amount of resources provided by the resource providers of each priority, and the total amount of resource demands of the full users includes:
determining a guest group boundary risk value in the risk values of the full-volume users according to the total amount of resources provided by each priority resource provider and the total amount of resource demands of the full-volume users;
and dividing the full amount of users into different guest groups by utilizing the guest group boundary risk value.
An embodiment of the present specification further provides a device for processing resource requirements based on user classification, including:
the information acquisition module is used for acquiring full-amount user information, wherein the full-amount user information comprises attribute information, behavior information and financial information of a full-amount user;
the evaluation module is used for constructing a user risk evaluation model, carrying out risk evaluation on the full-scale user based on the full-scale user information, dividing the full-scale user into different guest groups according to risk values and respectively endowing the guest groups with tags;
the docking module is used for setting the priority of the resource provider and constructing the docking rules of the different guest groups and the priority;
the information acquisition module is also used for acquiring current user demand information, and the current user demand information comprises a guest group label of a current user;
and the docking module is also used for sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule.
Optionally, the setting resource provider priority includes:
predicting the wind control threshold of each resource provider;
and setting the priority of the resource providers according to the sequence of the wind control threshold values of the plurality of resource providers from low to high.
Optionally, the docking rule further includes a bottom-pocketed forwarding rule, and the sending the current user requirement information to the resource provider with the corresponding priority according to the docking rule for processing includes:
sending the current user requirement information to a first resource provider for processing according to the docking rule;
further comprising:
and if the first resource provider refuses to process the current user requirement information, sending the current user requirement information to a second resource provider for processing, wherein the priority of the first resource provider is higher than that of the second resource provider.
Optionally, the sending the current user requirement information to the first resource provider according to the docking rule for processing includes:
and if the risk value corresponding to the current user demand information is higher than the wind control threshold of a second resource provider, determining a first resource provider with higher priority according to the docking rule.
Optionally, the sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule further includes:
and if the risk value corresponding to the current user demand information is lower than the wind control threshold value of a second resource provider, sending the current user demand information to the second resource provider for processing.
Optionally, the docking rule is configured to dock the current user demand information with the priority through a risk value corresponding to the guest group tag and a wind control threshold of the resource provider.
Optionally, the dividing the full amount of users into different guest groups according to the risk values and respectively giving guest group labels includes:
predicting the resource amount provided by each resource provider, and respectively determining the total amount of the resources provided by each priority resource provider;
predicting the total resource demand of all users;
and dividing the full users into different customer groups according to the risk values of the full users, the total amount of resources provided by the resource providers of all priorities and the total amount of resource demands of the full users.
Optionally, the dividing the full users into different customer groups according to the risk value of the full users, the total amount of resources provided by the resource providers of each priority, and the total amount of resource demands of the full users includes:
determining a guest group boundary risk value in the risk values of the full-volume users according to the total amount of resources provided by each priority resource provider and the total amount of resource demands of the full-volume users;
and dividing the full amount of users into different guest groups by utilizing the guest group boundary risk value.
The present application further provides an electronic device, wherein the electronic device includes:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform any of the methods described above.
The present application also provides a computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement any of the methods described above.
According to various technical schemes provided by the embodiment of the specification, risk evaluation is performed on the full-scale users by constructing a user risk evaluation model, the full-scale users are divided into different guest groups according to risk values and are respectively given guest group labels, the guest group labels correspond to the risk values, meanwhile, priorities of resource providers are set, docking rules of the different guest groups and the priorities are constructed, the resource providers are docked with the guest group labels corresponding to the risk values, and current user demand information is sent to the resource providers with the corresponding priorities to be processed according to the docking rules reflecting the priorities, so that the overall service achievement rate is improved, and user loss is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic diagram illustrating a method for processing resource requirements based on user classification according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an apparatus for processing resource demand based on user classification according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals denote the same or similar elements, components, or parts in the drawings, and thus their repetitive description will be omitted.
Features, structures, characteristics or other details described in a particular embodiment do not preclude the fact that the features, structures, characteristics or other details may be combined in a suitable manner in one or more other embodiments in accordance with the technical idea of the invention.
In describing particular embodiments, the present invention has been described with reference to features, structures, characteristics or other details that are within the purview of one skilled in the art to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific features, structures, characteristics, or other details.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The term "and/or" and/or "includes all combinations of any one or more of the associated listed items.
Fig. 1 is a schematic diagram of a method for processing resource demand based on user classification according to an embodiment of the present disclosure, where the method may include:
s101, acquiring full-amount user information, wherein the full-amount user information comprises attribute information, behavior information and financial information of a full-amount user.
In the embodiment of the specification, by acquiring the information of the full amount of users, the subsequent division of the guest group by the dimensionality of the full amount of users can be performed, and thus, as the priority is set for the resource provider subsequently, the resource provider and the resource provider can be connected to each other to the greatest extent, the service achievement rate is improved, and the loss of users is reduced.
In this embodiment, the attribute information may be self attribute information of the user, and may include: the first-level attribute information such as age, gender, and academic calendar may also be second-level attribute information set by integrating the own attribute information, and the new indexes may describe the characteristics of the user in new dimensions, which are not specifically described herein.
In embodiments of the present specification, the behavior information may include collected user online operations, such as: station of interest, blogger screening, etc., and may also include real-world activities. The financial information may be assets, liabilities, income, and the like.
S102: and constructing a user risk evaluation model, carrying out risk evaluation on the full-scale user based on the full-scale user information, dividing the full-scale user into different guest groups according to risk values, and respectively giving guest group labels.
In the embodiment of the present specification, a user risk assessment model may be constructed to perform risk assessment on a total number of users, and further, a guest group is divided for users with different risk values according to the obtained risk values, and the risk of the user is described in a form of a guest group tag.
In the embodiment of the present specification, the building of the user risk assessment model may include building and training the user risk assessment model by using a machine learning manner.
In an embodiment of this specification, the dividing the total users into different guest groups according to the risk values and respectively assigning guest group labels includes:
predicting the resource amount provided by each resource provider, and respectively determining the total amount of the resources provided by each priority resource provider;
predicting the total resource demand of all users;
and dividing the full users into different customer groups according to the risk values of the full users, the total amount of resources provided by the resource providers of all priorities and the total amount of resource demands of the full users.
Therefore, the resource amount provided by each resource provider and the total resource demand amount of the full amount of users are predicted, so that the supply and demand performance of resources can be reflected by the division of the guest group, the balance point of resource supply and demand can be reached more easily by the connection between the current user (resource provider) and the resource provider, and the service achievement rate is increased.
In a realistic scenario, this may prevent a low-quality user who applies for a resource first from being supplied with the resource, while a high-quality user who applies for a later is denied access to the resource due to a reduction in the total amount of resources.
In this embodiment of the present specification, the dividing the full users into different customer groups according to the risk value of the full user, the total amount of resources provided by each priority resource provider, and the total amount of resource demand of the full user may include:
determining a guest group boundary risk value in the risk values of the full-volume users according to the total amount of resources provided by each priority resource provider and the total amount of resource demands of the full-volume users;
and dividing the full amount of users into different guest groups by utilizing the guest group boundary risk value.
Therefore, the customer group boundary risk value in the risk values of the full-volume users is determined according to the total amount of the resources provided by the resource providers with the priority levels and the total amount of the resource demands of the full-volume users, so that the docking success rate can be improved, and the service achievement rate can be improved.
S103: and setting the priority of the resource provider, and constructing a docking rule of the different guest groups and the priority.
In this embodiment, the setting of the resource provider priority may include:
predicting the wind control threshold of each resource provider;
and setting the priority of the resource providers according to the sequence of the wind control threshold values of the plurality of resource providers from low to high.
In an actual scene, a resource provider with a high wind control threshold value can often butt a user with a higher risk value, so that the inclusion is stronger, and if a resource provider with a high wind control threshold value is directly used for setting a higher priority, the waste of available space of the wind control threshold value is equivalent to the waste, which can reflect the difference of the attention points of a service platform and the resource provider: the service platform pays attention to the service achievement rate, each resource provider hopes to obtain high-quality customers so as to reduce the risk of each resource provider, and the priority of the resource providers is set according to the sequence from low to high of the wind control threshold values of the plurality of resource providers, so that the requirement of the service achievement rate can be embodied, and the service achievement rate of each resource provider is balanced.
In an embodiment of the present specification, the docking rule is configured to dock the current user demand information with the priority through a risk value corresponding to a guest group tag and a wind control threshold of a resource provider.
Further, in this embodiment, the docking rules may further include a bottom-of-pocket forwarding rule. Therefore, even if the resource provider with the lower wind control threshold refuses to provide resources for the current user, the resource provider with the lower wind control threshold can be used for serving the business, and the business achievement rate is improved.
S104: acquiring current user demand information, wherein the current user demand information comprises a guest group tag of a current user.
S105: and sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule.
The risk assessment is carried out on the full-scale users by constructing a user risk assessment model, the full-scale users are divided into different customer groups according to risk values and are respectively endowed with customer group labels, the customer group labels correspond to the risk values, meanwhile, the priority of a resource provider is set, the docking rules of the different customer groups and the priority are constructed, the resource provider is docked with the customer group labels corresponding to the risk values, the current user demand information is sent to the resource provider with the corresponding priority for processing according to the docking rules embodying the priority, the overall service achievement rate is improved, and the user loss is reduced.
In this embodiment of the present specification, the docking rule may further include a bottom-of-pocket forwarding rule, and the sending the current user requirement information to the resource provider with the corresponding priority according to the docking rule for processing may include:
sending the current user requirement information to a first resource provider for processing according to the docking rule;
the method can also comprise the following steps:
and if the first resource provider refuses to process the current user requirement information, sending the current user requirement information to a second resource provider for processing, wherein the priority of the first resource provider is higher than that of the second resource provider.
In this way, according to the bottom-pocketed forwarding rule, when the resource providers are docked, even if the second resource provider with a lower wind control threshold (which provides the resource for the user only when the user risk value is lower than the threshold, which can be understood as having a higher requirement for the user risk) refuses to provide the resource for the current user, the first resource provider with a lower wind control threshold can be continuously used for the bottom-pocketing of the service, so as to improve the service achievement rate.
In a practical application scenario, the cooperation mode of the current business platform and the card-holding financial institution such as a bank on the assets comprises a loan-aid mode and a divided mode. The difference between the loan-aid mode and the differentiated-moistening mode is that the loan-aid mode is used for charging a fixed capital cost and attaching risks and profits to a service platform for a resource provider, and the profit-aid mode is used for bearing the risks for the resource provider and differentiating the collected fees and the service platform according to a certain proportion. The two modes have respective advantages and disadvantages for the service platform, and the asset scale covered by the divided mode is gradually enlarged by combining the future development direction of the service platform.
In this mode, the distribution institution is equivalent to a first resource provider and the lending institution is equivalent to a second resource provider.
For all users, the high-risk users can be preferentially docked with the distribution mechanism, and when the distribution mechanism refuses to deposit money, the high-risk users can be docked with the loan aid mechanism.
In this embodiment of the present specification, the sending, to the first resource provider, the current user requirement information according to the docking rule for processing may include:
and if the risk value corresponding to the current user demand information is higher than the wind control threshold of a second resource provider, determining a first resource provider with higher priority according to the docking rule.
In this way, the risk value corresponding to the current user demand information is higher than the wind control threshold of the second resource provider, which is equivalent to that the user is estimated to be refused to provide resources by the second resource provider in advance, and is equivalent to a user with potential transaction refused, at this time, the first resource provider with higher priority is determined according to the docking rule, which is beneficial to fishing back the potential services, and the service achievement rate is improved.
In this embodiment of the present specification, the sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule may further include:
and if the risk value corresponding to the current user demand information is lower than the wind control threshold value of a second resource provider, sending the current user demand information to the second resource provider for processing.
In this embodiment of the present specification, after the processing is performed by using the above docking rule, behavior data of the user may also be collected as a sample, and the user risk assessment model is modified.
Fig. 2 is a schematic structural diagram of an apparatus for performing resource requirement processing based on user classification according to an embodiment of the present specification, where the apparatus may include:
the information acquisition module 201 is used for acquiring all-quantity user information, wherein the all-quantity user information comprises attribute information, behavior information and financial information of all-quantity users;
the evaluation module 202 is used for constructing a user risk evaluation model, carrying out risk evaluation on the full-scale user based on the full-scale user information, dividing the full-scale user into different guest groups according to risk values and respectively giving guest group labels;
the docking module 203 sets the priority of the resource provider and constructs the docking rules of the different guest groups and the priority;
the information obtaining module 201 is further configured to obtain current user requirement information, where the current user requirement information includes a guest group tag of a current user;
the docking module 203 is further configured to send the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule.
In an embodiment of the present specification, the setting resource provider priority includes:
predicting the wind control threshold of each resource provider;
and setting the priority of the resource providers according to the sequence of the wind control threshold values of the plurality of resource providers from low to high.
In this embodiment of the present specification, the docking rule further includes a bottom-pocketed forwarding rule, and the sending the current user requirement information to the resource provider with the corresponding priority according to the docking rule for processing includes:
sending the current user requirement information to a first resource provider for processing according to the docking rule;
further comprising:
and if the first resource provider refuses to process the current user requirement information, sending the current user requirement information to a second resource provider for processing, wherein the priority of the first resource provider is higher than that of the second resource provider.
In this embodiment of the present specification, the sending, according to the docking rule, the current user requirement information to the first resource provider for processing includes:
and if the risk value corresponding to the current user demand information is higher than the wind control threshold of a second resource provider, determining a first resource provider with higher priority according to the docking rule.
In this embodiment of the present specification, the sending, according to the docking rule, the current user requirement information to the resource provider with the corresponding priority for processing further includes:
and if the risk value corresponding to the current user demand information is lower than the wind control threshold value of a second resource provider, sending the current user demand information to the second resource provider for processing.
In an embodiment of the present specification, the docking rule is configured to dock the current user demand information with the priority through a risk value corresponding to a guest group tag and a wind control threshold of a resource provider.
In an embodiment of this specification, the dividing the total users into different guest groups according to the risk values and respectively assigning guest group labels includes:
predicting the resource amount provided by each resource provider, and respectively determining the total amount of the resources provided by each priority resource provider;
predicting the total resource demand of all users;
and dividing the full users into different customer groups according to the risk values of the full users, the total amount of resources provided by the resource providers of all priorities and the total amount of resource demands of the full users.
In this embodiment of the present specification, the dividing the full users into different customer groups according to the risk value of the full user, the total amount of resources provided by the resource providers of each priority, and the total amount of resource demands of the full user includes:
determining a guest group boundary risk value in the risk values of the full-volume users according to the total amount of resources provided by each priority resource provider and the total amount of resource demands of the full-volume users;
and dividing the full amount of users into different guest groups by utilizing the guest group boundary risk value.
According to the device, a user risk evaluation model is built, risk evaluation is carried out on all users, all users are divided into different customer groups according to risk values and are respectively endowed with customer group labels, the customer group labels correspond to the risk values, meanwhile, the priority of a resource provider is set, the docking rules of the different customer groups and the priority are built, the resource provider is docked with the customer group labels corresponding to the risk values, the current user demand information is sent to the resource provider with the corresponding priority to be processed according to the docking rules reflecting the priority, the service achievement rate on the whole is improved, and user loss is reduced.
Based on the same inventive concept, the embodiment of the specification further provides the electronic equipment.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as specific physical implementations for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure. An electronic device 300 according to this embodiment of the invention is described below with reference to fig. 3. The electronic device 300 shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 3, electronic device 300 is embodied in the form of a general purpose computing device. The components of electronic device 300 may include, but are not limited to: at least one processing unit 310, at least one memory unit 320, a bus 330 connecting the various system components (including the memory unit 320 and the processing unit 310), a display unit 340, and the like.
Wherein the storage unit stores program code executable by the processing unit 310 to cause the processing unit 310 to perform the steps according to various exemplary embodiments of the present invention described in the above-mentioned processing method section of the present specification. For example, the processing unit 310 may perform the steps as shown in fig. 1.
The storage unit 320 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)3201 and/or a cache storage unit 3202, and may further include a read only memory unit (ROM) 3203.
The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 400 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 300, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 300 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 350. Also, the electronic device 300 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 360. Network adapter 360 may communicate with other modules of electronic device 300 via bus 330. It should be appreciated that although not shown in FIG. 3, other hardware and/or software modules may be used in conjunction with electronic device 300, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention. The computer program, when executed by a data processing apparatus, enables the computer readable medium to implement the above-described method of the invention, namely: such as the method shown in fig. 1.
Fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
A computer program implementing the method shown in fig. 1 may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in embodiments in accordance with the invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP). The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for processing resource demand based on user classification is characterized by comprising the following steps:
acquiring full-amount user information, wherein the full-amount user information comprises attribute information, behavior information and financial information of a full-amount user;
constructing a user risk evaluation model, carrying out risk evaluation on the full-scale user based on the full-scale user information, dividing the full-scale user into different guest groups according to risk values, and respectively giving guest group labels;
setting the priority of a resource provider, and constructing a docking rule of the different guest groups and the priority;
acquiring current user demand information, wherein the current user demand information comprises a guest group tag of a current user;
and sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule.
2. The method of claim 1, wherein setting resource provider priority comprises:
predicting the wind control threshold of each resource provider;
and setting the priority of the resource providers according to the sequence of the wind control threshold values of the plurality of resource providers from low to high.
3. The method according to any one of claims 1-2, wherein the docking rules further include a bibliographic forwarding rule, and the sending the current user requirement information to the resource provider of the corresponding priority according to the docking rules comprises:
sending the current user requirement information to a first resource provider for processing according to the docking rule;
further comprising:
and if the first resource provider refuses to process the current user requirement information, sending the current user requirement information to a second resource provider for processing, wherein the priority of the first resource provider is higher than that of the second resource provider.
4. The method according to any one of claims 1-3, wherein said sending current user requirement information to a first resource provider process according to said docking rules comprises:
and if the risk value corresponding to the current user demand information is higher than the wind control threshold of a second resource provider, determining a first resource provider with higher priority according to the docking rule.
5. The method according to any one of claims 1 to 4, wherein the sending the current user requirement information to the resource provider of the corresponding priority according to the docking rule further comprises:
and if the risk value corresponding to the current user demand information is lower than the wind control threshold value of a second resource provider, sending the current user demand information to the second resource provider for processing.
6. The method according to any of claims 1-5, wherein the docking rules are configured to dock the current user demand information with the priority via a risk value corresponding to a guest group tag and a resource provider's wind threshold.
7. The method according to any one of claims 1-6, wherein said dividing said full number of users into different guest groups according to risk values and labeling guest groups separately comprises:
predicting the resource amount provided by each resource provider, and respectively determining the total amount of the resources provided by each priority resource provider;
predicting the total resource demand of all users;
and dividing the full users into different customer groups according to the risk values of the full users, the total amount of resources provided by the resource providers of all priorities and the total amount of resource demands of the full users.
8. An apparatus for resource requirement handling based on user classification, comprising:
the information acquisition module is used for acquiring full-amount user information, wherein the full-amount user information comprises attribute information, behavior information and financial information of a full-amount user;
the evaluation module is used for constructing a user risk evaluation model, carrying out risk evaluation on the full-scale user based on the full-scale user information, dividing the full-scale user into different guest groups according to risk values and respectively endowing the guest groups with tags;
the docking module is used for setting the priority of the resource provider and constructing the docking rules of the different guest groups and the priority;
the information acquisition module is also used for acquiring current user demand information, and the current user demand information comprises a guest group label of a current user;
and the docking module is also used for sending the current user requirement information to the resource provider with the corresponding priority for processing according to the docking rule.
9. An electronic device, wherein the electronic device comprises:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-7.
10. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-7.
CN201911331104.XA 2019-12-20 2019-12-20 Method and device for processing resource demand based on user classification and electronic equipment Pending CN111191894A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911331104.XA CN111191894A (en) 2019-12-20 2019-12-20 Method and device for processing resource demand based on user classification and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911331104.XA CN111191894A (en) 2019-12-20 2019-12-20 Method and device for processing resource demand based on user classification and electronic equipment

Publications (1)

Publication Number Publication Date
CN111191894A true CN111191894A (en) 2020-05-22

Family

ID=70709247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911331104.XA Pending CN111191894A (en) 2019-12-20 2019-12-20 Method and device for processing resource demand based on user classification and electronic equipment

Country Status (1)

Country Link
CN (1) CN111191894A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111985765A (en) * 2020-07-06 2020-11-24 招联消费金融有限公司 Resource provider determining method, device, equipment and storage medium
CN112529481A (en) * 2021-02-08 2021-03-19 北京淇瑀信息科技有限公司 User fishing-back method and device and electronic equipment
CN113591064A (en) * 2021-07-13 2021-11-02 北京淇瑀信息科技有限公司 User re-authentication method, system and computer equipment for internet service
CN113935780A (en) * 2021-10-28 2022-01-14 平安银行股份有限公司 Client loss risk prediction method based on survival analysis and related equipment thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9807094B1 (en) * 2015-06-25 2017-10-31 Symantec Corporation Systems and methods for dynamic access control over shared resources
CN110335138A (en) * 2019-06-21 2019-10-15 上海淇馥信息技术有限公司 A kind of method for prewarning risk, device and electronic equipment for predicting objective group's qualification variation
CN110348991A (en) * 2019-06-21 2019-10-18 上海淇馥信息技术有限公司 Assess the method, apparatus and electronic equipment of user's accrediting amount upper limit
CN110348852A (en) * 2019-06-28 2019-10-18 北京淇瑀信息科技有限公司 A kind of credit evaluation model modification method, device, electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9807094B1 (en) * 2015-06-25 2017-10-31 Symantec Corporation Systems and methods for dynamic access control over shared resources
CN110335138A (en) * 2019-06-21 2019-10-15 上海淇馥信息技术有限公司 A kind of method for prewarning risk, device and electronic equipment for predicting objective group's qualification variation
CN110348991A (en) * 2019-06-21 2019-10-18 上海淇馥信息技术有限公司 Assess the method, apparatus and electronic equipment of user's accrediting amount upper limit
CN110348852A (en) * 2019-06-28 2019-10-18 北京淇瑀信息科技有限公司 A kind of credit evaluation model modification method, device, electronic equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111985765A (en) * 2020-07-06 2020-11-24 招联消费金融有限公司 Resource provider determining method, device, equipment and storage medium
CN111985765B (en) * 2020-07-06 2024-04-05 招联消费金融股份有限公司 Method, device, equipment and storage medium for determining resource provider
CN112529481A (en) * 2021-02-08 2021-03-19 北京淇瑀信息科技有限公司 User fishing-back method and device and electronic equipment
CN113591064A (en) * 2021-07-13 2021-11-02 北京淇瑀信息科技有限公司 User re-authentication method, system and computer equipment for internet service
CN113591064B (en) * 2021-07-13 2024-03-29 北京淇瑀信息科技有限公司 User reauthentication method, system and computer equipment for internet service
CN113935780A (en) * 2021-10-28 2022-01-14 平安银行股份有限公司 Client loss risk prediction method based on survival analysis and related equipment thereof
CN113935780B (en) * 2021-10-28 2024-05-17 平安银行股份有限公司 Customer loss risk prediction method based on survival analysis and related equipment thereof

Similar Documents

Publication Publication Date Title
CN111191894A (en) Method and device for processing resource demand based on user classification and electronic equipment
US20190251626A1 (en) Utilizing artificial intelligence to make a prediction about an entity based on user sentiment and transaction history
US10949828B2 (en) Transaction processing based on statistical classification and contextual analysis
US10678821B2 (en) Evaluating theses using tree structures
CN111612512A (en) Resource allocation method and device and electronic equipment
AU2021286505B2 (en) Automating an adoption of cloud services
CN111583018A (en) Credit granting strategy management method and device based on user financial performance analysis and electronic equipment
CN110659984A (en) Credit limit management method and device based on user life cycle prediction and electronic equipment
CN110363583B (en) Method and device for creating user consumption behavior label based on position information and electronic equipment
CN112346625A (en) Resource management method and device and electronic equipment
CN110335070B (en) WIFI-based user group extension method and device and electronic equipment
CN115578138A (en) Marketing method, marketing device, marketing medium and computing equipment
US10769691B2 (en) Method and computer program product for automated generation and assembly of proposal elements
CN111353872A (en) Credit granting processing method and device based on financial performance value and electronic equipment
US11257108B2 (en) Systems and methods for dynamic product offerings
CN112288475A (en) Product recommendation method and device and electronic equipment
CN114742645B (en) User security level identification method and device based on multi-stage time sequence multitask
US20230136972A1 (en) Egocentric network entity robustness prediction
CN113850611B (en) Marketing task execution method and device based on response surface and electronic equipment
CN112016790B (en) User policy allocation method and device and electronic equipment
CN113298637B (en) User diversion method, device and system of service platform
US11880765B2 (en) State-augmented reinforcement learning
CN114372849A (en) Internet resource service product pushing method and device and computer equipment
CN117391405B (en) Method, system and electronic device for intelligent matching of clients and business personnel
CN111178535A (en) Method and device for realizing automatic machine learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200522