CN111681019A - Resource allocation method and device and electronic equipment - Google Patents

Resource allocation method and device and electronic equipment Download PDF

Info

Publication number
CN111681019A
CN111681019A CN202010298418.0A CN202010298418A CN111681019A CN 111681019 A CN111681019 A CN 111681019A CN 202010298418 A CN202010298418 A CN 202010298418A CN 111681019 A CN111681019 A CN 111681019A
Authority
CN
China
Prior art keywords
user
sharing
behavior
shared
integrity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010298418.0A
Other languages
Chinese (zh)
Inventor
陈博
刘禹彤
张嘉伟
黎文杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qiyue Information Technology Co Ltd
Original Assignee
Shanghai Qiyue Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qiyue Information Technology Co Ltd filed Critical Shanghai Qiyue Information Technology Co Ltd
Priority to CN202010298418.0A priority Critical patent/CN111681019A/en
Publication of CN111681019A publication Critical patent/CN111681019A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0214Referral reward systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0224Discounts or incentives, e.g. coupons or rebates based on user history

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present specification provides a method for resource allocation, which sets constraint conditions for active resource allocation rules, so that the resource allocation is constrained, determining the behavior integrity of the shared user by monitoring the behavior information of the shared user, using the constraint condition and the behavior information of the shared user, executing the resource allocation rule based on the determination result, the resource allocation is determined not only by whether the shared user generates the behavior information, but also by whether the behavior of the shared user is complete, in this case, the user who performs the sharing operation may urge the shared user who does not participate in the service to participate in the service under the effect of the constraint condition, and, since the shared users who do not participate in the service originally are the key to improve the service participation rate, the method further improves the user participation rate of the service.

Description

Resource allocation method and device and electronic equipment
Technical Field
The present application relates to the field of internet, and in particular, to a method and an apparatus for resource allocation, and an electronic device.
Background
Sharing activities are commonly used together with resource allocation methods as common methods for promoting business and products. For example, in a scenario of increasing the number of users participating in a service, after a user who performs a sharing operation shares a service activity with a shared user, if the user who performs the sharing operation performs a participation action, a certain resource is configured for the user who performs the sharing operation, so that the user often has a strong desire to share under the drive of the resource.
The principle is that a user who generates sharing operation (also called sharing user) shares a service with a shared user, so that the shared user knows the service, and participates in the service under the drive of interest. Although the method can improve the sharing desire of the user to a certain extent, so as to prompt the shared user to participate in the service, if the user wants to further improve the service participation rate of the user, there is still room for improvement in this way.
Disclosure of Invention
The embodiment of the specification provides a resource allocation method, a resource allocation device and electronic equipment, which are used for improving the service participation rate of a user.
An embodiment of the present specification provides a method for resource allocation, including:
setting constraint conditions for active resource configuration rules in advance, wherein the constraint conditions have behavior integrity judgment rules and are used for judging the behavior integrity of a user;
sending sharing information to a shared user in response to a sharing operation performed by the user;
and monitoring the behavior information of the shared user, judging the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executing the resource configuration rule based on the judgment result.
Optionally, the method further comprises:
monitoring sharing behavior information of the user performing sharing operation, judging the integrity of the sharing behavior of the user performing sharing operation, and executing the resource configuration rule based on the integrity of the sharing behavior of the user.
Optionally, the method further comprises:
after a user carries out a first sharing operation, configuring a page for secondary sharing for the user, and configuring a resource obtaining permission for the user after the user carries out the sharing operation each time;
the executing the resource configuration rule based on the integrity of the sharing behavior of the user includes:
and configuring resource dynamic support authority for the user based on the integrity of the sharing behavior of the user.
Optionally, the determining integrity of the sharing behavior of the user performing the sharing operation includes:
if the user performs sharing operation on each preset date, the determination result is as follows: and the sharing behavior of the user is complete.
Optionally, the sending, to the shared user, shared information in response to the sharing operation performed by the user includes:
sending sharing information to a plurality of shared users in response to sharing operation performed by the users;
the determining the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user includes:
and judging whether the shared users all perform preset behaviors, and if so, executing the resource allocation rule.
Optionally, the determining whether the multiple shared users all perform a preset behavior includes:
and judging whether the plurality of shared users all perform the completion behavior.
Optionally, the method further comprises:
and sending the sharing information to the shared user who does not perform the preset action again in response to the secondary sharing operation performed by the user.
Optionally, the executing the resource configuration rule includes:
and configuring resources for the users performing the sharing operation.
Optionally, the sending, to the shared user, shared information in response to the sharing operation performed by the user includes:
sending an activity page with activity information and a sharing icon to a user;
and responding to the sharing operation of the user on the sharing icon to generate sharing information, wherein the sharing information carries a link pointing to an activity page, and sending the sharing information to a shared user corresponding to the sharing operation.
An embodiment of the present specification further provides an apparatus for resource allocation, including:
the rule setting module is used for setting constraint conditions for the active resource allocation rules in advance, wherein the constraint conditions are provided with behavior integrity judgment rules and are used for judging the behavior integrity of the user;
the sharing module is used for responding to the sharing operation performed by the user and sending sharing information to the shared user;
and the resource configuration constraint module is used for monitoring the behavior information of the shared user, judging the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executing the resource configuration rule based on the judgment result.
Optionally, the resource configuration constraint module is further configured to:
monitoring sharing behavior information of the user performing sharing operation, judging the integrity of the sharing behavior of the user performing sharing operation, and executing the resource configuration rule based on the integrity of the sharing behavior of the user.
Optionally, the resource configuration constraint module is further configured to:
after a user carries out a first sharing operation, configuring a page for secondary sharing for the user, and configuring a resource obtaining permission for the user after the user carries out the sharing operation each time;
the executing the resource configuration rule based on the integrity of the sharing behavior of the user includes:
and configuring resource dynamic support authority for the user based on the integrity of the sharing behavior of the user.
Optionally, the determining integrity of the sharing behavior of the user performing the sharing operation includes:
if the user performs sharing operation on each preset date, the determination result is as follows: and the sharing behavior of the user is complete.
Optionally, the sending, to the shared user, shared information in response to the sharing operation performed by the user includes:
sending sharing information to a plurality of shared users in response to sharing operation performed by the users;
the determining the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user includes:
and judging whether the shared users all perform preset behaviors, and if so, executing the resource allocation rule.
Optionally, the determining whether the multiple shared users all perform a preset behavior includes:
and judging whether the plurality of shared users all perform the completion behavior.
Optionally, the sharing module is further configured to:
and sending the sharing information to the shared user who does not perform the preset action again in response to the secondary sharing operation performed by the user.
Optionally, the executing the resource configuration rule includes:
and configuring resources for the users performing the sharing operation.
Optionally, the sending, to the shared user, shared information in response to the sharing operation performed by the user includes:
sending an activity page with activity information and a sharing icon to a user;
and responding to the sharing operation of the user on the sharing icon to generate sharing information, wherein the sharing information carries a link pointing to an activity page, and sending the sharing information to a shared user corresponding to the sharing operation.
An embodiment of the present specification further provides an electronic device, where the electronic device includes:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform any of the methods described above.
The present specification also provides a computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement any of the above methods.
The various technical solutions provided by the embodiments of the present specification enable resource allocation to be restricted by setting a constraint condition for an active resource allocation rule, determining the behavior integrity of the shared user by monitoring the behavior information of the shared user, using the constraint condition and the behavior information of the shared user, executing the resource allocation rule based on the determination result, the resource allocation is determined not only by whether the shared user generates the behavior information, but also by whether the behavior of the shared user is complete, in this case, the user who generates the sharing operation will urge the shared user who does not participate in the service to participate in the service under the action of the constraint condition, so as to improve the user participation rate of the service, and at the same time, since the shared users which do not participate in the service originally are the key for improving the participation rate, the method also fully mines the potential users.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic diagram illustrating a method for resource allocation according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an apparatus for resource allocation according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
Detailed Description
The analysis of the prior art shows that if a user to be shared is to be prompted to participate in a service, the user to be shared cannot rely on the initiative of the user to be shared, and the user to be shared needs to be driven in combination.
The inherent reason for this situation is that resources are allocated to the sharing user performing the sharing operation whenever the shared user performs the action of participating in the service, and therefore, even if some shared users are not participating in the service, the resources already allocated to the sharing user are not affected, and the sharing user can still obtain a part of resources.
Accordingly, an embodiment of the present specification provides a method for resource configuration, including:
setting constraint conditions for active resource configuration rules in advance, wherein the constraint conditions have behavior integrity judgment rules and are used for judging the behavior integrity of a user;
sending sharing information to a shared user in response to a sharing operation performed by the user;
and monitoring the behavior information of the shared user, judging the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executing the resource configuration rule based on the judgment result.
The resource configuration is restricted by setting a restriction condition for an active resource configuration rule, the behavior integrity of a shared user is judged by monitoring the behavior information of the shared user and utilizing the restriction condition and the behavior information of the shared user, and the resource configuration rule is executed based on a judgment result, so that the resource configuration basis depends on whether the shared user generates the behavior information or not and whether the behavior of the shared user is complete or not.
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals denote the same or similar elements, components, or parts in the drawings, and thus their repetitive description will be omitted.
Features, structures, characteristics or other details described in a particular embodiment do not preclude the fact that the features, structures, characteristics or other details may be combined in a suitable manner in one or more other embodiments in accordance with the technical idea of the invention.
In describing particular embodiments, the present invention has been described with reference to features, structures, characteristics or other details that are within the purview of one skilled in the art to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific features, structures, characteristics, or other details.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The term "and/or" and/or "includes all combinations of any one or more of the associated listed items.
Fig. 1 is a schematic diagram of a method for resource allocation provided in an embodiment of the present specification, where the method may include:
s101: and setting constraint conditions for the active resource configuration rules in advance, wherein the constraint conditions have behavior integrity judgment rules for judging the behavior integrity of the user.
In this embodiment of the present specification, the resource allocation rule refers to a rule for allocating resources according to a promotion effect of a user on a to-be-promoted activity, and allocating resources may refer to allocating resources that can be dynamically supported for use.
The resource configuration is restricted by setting a constraint condition for the active resource configuration rule, and the constraint condition has a judgment rule for judging the behavior completeness of the user, so that whether the resource configuration is carried out can be determined according to whether the behavior of the user is complete.
The behavior completeness refers to whether a plurality of preset user behaviors related to the sharing event are generated.
The plurality of preset behaviors may be a plurality of preset behaviors for one user, that is, preset behaviors of a plurality of users.
For example, whether the user who generates the sharing operation shares everyday, or whether a plurality of shared users of the shared activity participate in the activity.
In the embodiment of the present specification, the constraint condition may be one of a pickup right and an action/support right of the resource.
In an embodiment of the present disclosure, after the sharing event is generated, the behavior integrity determination rule may be to determine whether a behavior of the shared user in the sharing event is complete.
In one embodiment, the constraint condition is a limit on the dynamic support right, and then, a resource obtaining right may be configured for the shared user based on the behavior of the shared user, and whether the shared user has the dynamic support right is determined based on the behavior integrity of the shared user.
Specifically, the behavior integrity of the shared user can be determined according to whether the proportion of the shared users corresponding to the sharing event generating the business behavior information reaches a preset threshold value, or even according to whether all the shared users generate the business behavior information.
The service behavior information may refer to behavior information generated when the shared user participates in the service, such as: registration, completion of the part, information of the application resource, and the like.
In this embodiment of the present specification, the behavior integrity determination rule may also be a rule for determining the behavior integrity of a user who generates a sharing operation.
Specifically, it may be determined whether the number of times of actions of the user generating the sharing operation reaches a preset condition.
For example, after the user (the user who generates the sharing operation) shares for the first time, whether to share again with the shared user who does not generate the business behavior information, or whether to share every day.
Therefore, the determining of the behavior integrity of the user may include determining whether multiple sharing behaviors of the user generating the sharing operation satisfy a condition, or may also include determining the integrity of the business participation behaviors of multiple shared users.
S102: and sending the sharing information to the shared user in response to the sharing operation performed by the user.
The sharing event is initiated from the sharing operation of the sharing user, and is formed by sending sharing information to the shared user.
Specifically, in an embodiment of this specification, the sending, to the shared user, shared information in response to the sharing operation performed by the user may include:
sending an activity page with activity information and a sharing icon to a user;
and responding to the sharing operation of the user on the sharing icon to generate sharing information, wherein the sharing information carries a link pointing to an activity page, and sending the sharing information to a shared user corresponding to the sharing operation.
In an embodiment of this specification, the sending, to the shared user, shared information in response to a sharing operation performed by the user may include:
and sending the sharing information to a plurality of shared users in response to the sharing operation performed by the users.
The sharing operation corresponds to a plurality of shared users, and the integrity determination rule can be used for determining the behavior integrity of the plurality of shared users.
In the embodiment of the specification, after the sharing information is sent to the shared user, the shared user may or may not participate in the service, and for the shared user who does not participate in the service, in order to facilitate the sharing user to follow up the shared user, a page for secondary sharing can be provided for the user who generates the first sharing operation.
Accordingly, the method may further comprise:
and after the user carries out the first sharing operation, configuring a page for secondary sharing for the user, and configuring resource obtaining permission for the user after the user carries out the sharing operation each time.
Therefore, the willingness of the user to carry out secondary sharing can be improved, and the user participation rate of the service is indirectly improved.
In order to improve sharing accuracy, shared users who do not participate in a service in a plurality of shared users corresponding to a first sharing operation can be screened in a background, and sharing information is sent to the shared users who do not participate in the service according to a second sharing operation of the users.
In this way, the shared users who have participated in the service will not be disturbed.
Therefore, in the embodiment of the present specification, the method may further include:
and sending the sharing information to the shared user who does not perform the preset action again in response to the secondary sharing operation performed by the user.
The secondary sharing refers to a sharing behavior other than the first sharing behavior, and is not limited to the second sharing behavior, for example, the user may share the secondary sharing every day.
S103: and monitoring the behavior information of the shared user, judging the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executing the resource configuration rule based on the judgment result.
The resource configuration is restricted by setting a restriction condition for an active resource configuration rule, the behavior integrity of a shared user is judged by monitoring the behavior information of the shared user and utilizing the restriction condition and the behavior information of the shared user, and the resource configuration rule is executed based on a judgment result, so that the resource configuration basis depends on whether the shared user generates the behavior information or not and whether the behavior of the shared user is complete or not.
Optionally, if the sharing operation performed in response to the user in S102 sends shared information to the shared user, the method includes:
sending sharing information to a plurality of shared users in response to sharing operation performed by the users;
then, the determining the integrity of the behavior of the shared user by using the constraint condition and the behavior information of the shared user may include:
and judging whether the number of users generating preset behaviors in the plurality of shared users exceeds a threshold value, and if so, judging that the behaviors of the shared users are complete.
Preferably, the determining the integrity of the behavior of the shared user by using the constraint condition and the behavior information of the shared user includes:
and judging whether the shared users all perform preset behaviors, and if so, executing the resource allocation rule.
Wherein, the determining whether the plurality of shared users all perform the preset behavior may include:
and judging whether the plurality of shared users all perform the completion behavior.
Optionally, the executing the resource configuration rule includes:
and configuring resources for the users performing the sharing operation.
The resource allocation for the user performing the sharing operation may be that the user performing the sharing operation configures a dynamic support authority, or that the user configures a resource without dynamic support authority limitation, so that the user can directly use the configured resource, thereby removing the constraint under the original constraint condition.
Considering that some shared users always do not participate in the service in an actual scenario, if only the behavior completeness of the shared user is used to determine whether to allocate resources for the user generating the sharing operation, the user generating the sharing operation may feel difficult.
Therefore, whether the resource is configured for the user who generates the sharing operation can be judged according to the behavior completeness of the user.
Therefore, in the embodiment of the present specification, the method may further include:
monitoring sharing behavior information of the user performing sharing operation, judging the integrity of the sharing behavior of the user performing sharing operation, and executing the resource configuration rule based on the integrity of the sharing behavior of the user.
Specifically, if the user performs the first sharing operation in S102, a page for secondary sharing is configured for the user, and a resource obtaining right is configured for the user after the user performs the sharing operation each time;
then, the executing the resource configuration rule based on the integrity of the sharing behavior of the user may include:
and configuring resource dynamic support authority for the user based on the integrity of the sharing behavior of the user.
Specifically, the determining the integrity of the sharing behavior of the user performing the sharing operation may include:
if the user performs sharing operation on each preset date, the determination result is as follows: and the sharing behavior of the user is complete.
In addition, additional resources can be configured for the sharing users after the sharing users perform secondary sharing, and if the behaviors of the sharing users are complete, the dynamic support authority of the additional resources can be configured for the sharing users.
In a practical application scenario, after a sharing user shares a service to multiple shared users for the first time, it is found that the integrity of the behavior of the shared users does not meet the condition (for example, a part of the shared users participate in the service, and another part of the shared users do not participate in the service, or the participation rate does not reach a threshold), and then, when a shared user participating in the service (for example, a finished piece) is generated, a resource acquisition permission is configured for the sharing user, and at the same time, a dynamic support permission limitation is also configured for the acquired resource.
And after knowing that the sharing user does not have the dynamic support authority, the sharing user shares the shared user which does not participate in the business again through the secondary sharing page, and urges the sharing user to participate in the business.
Then, judging by using an integrity judgment rule, and if the shared user is found to be complete in behavior, configuring a dynamic support authority to the sharing user; if the judgment shows that the business participation rate of the shared user does not reach the threshold value, but the behavior integrity of the user generating the sharing operation is complete (for example, the sharing user performs the secondary sharing operation every day), which indicates that the sharing user tries on the link of supervising the shared user to participate in the business, at this time, the sharing user can also be configured with the dynamic support authority.
Of course, this is only one of the application scenarios, and the application scenarios obtained by combining or transforming the above various embodiments of the present application are not described herein.
Fig. 2 is a schematic structural diagram of an apparatus for resource allocation provided in an embodiment of this specification, where the apparatus may include:
a rule setting module 201, which sets constraint conditions for the active resource allocation rules in advance, where the constraint conditions have behavior integrity determination rules for determining the behavior integrity of the user;
the sharing module 202 is used for sending sharing information to the shared user in response to the sharing operation performed by the user;
the resource allocation constraint module 203 monitors the behavior information of the shared user, determines the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executes the resource allocation rule based on the determination result.
Optionally, the resource configuration constraint module 203 is further configured to:
monitoring sharing behavior information of the user performing sharing operation, judging the integrity of the sharing behavior of the user performing sharing operation, and executing the resource configuration rule based on the integrity of the sharing behavior of the user.
Optionally, the resource configuration constraint module 203 is further configured to:
after a user carries out a first sharing operation, configuring a page for secondary sharing for the user, and configuring a resource obtaining permission for the user after the user carries out the sharing operation each time;
the executing the resource configuration rule based on the integrity of the sharing behavior of the user includes:
and configuring resource dynamic support authority for the user based on the integrity of the sharing behavior of the user.
Optionally, the determining integrity of the sharing behavior of the user performing the sharing operation includes:
if the user performs sharing operation on each preset date, the determination result is as follows: and the sharing behavior of the user is complete.
Optionally, the sending, to the shared user, shared information in response to the sharing operation performed by the user includes:
sending sharing information to a plurality of shared users in response to sharing operation performed by the users;
the determining the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user includes:
and judging whether the shared users all perform preset behaviors, and if so, executing the resource allocation rule.
Optionally, the determining whether the multiple shared users all perform a preset behavior includes:
and judging whether the plurality of shared users all perform the completion behavior.
Optionally, the sharing module 202 is further configured to:
and sending the sharing information to the shared user who does not perform the preset action again in response to the secondary sharing operation performed by the user.
Optionally, the executing the resource configuration rule includes:
and configuring resources for the users performing the sharing operation.
Optionally, the sending, to the shared user, shared information in response to the sharing operation performed by the user includes:
sending an activity page with activity information and a sharing icon to a user;
and responding to the sharing operation of the user on the sharing icon to generate sharing information, wherein the sharing information carries a link pointing to an activity page, and sending the sharing information to a shared user corresponding to the sharing operation.
The device sets a constraint condition for an active resource configuration rule to make resource configuration constrained, monitors behavior information of a shared user, judges behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executes the resource configuration rule based on a judgment result, so that the resource configuration basis depends on whether the shared user generates the behavior information or not and whether the behavior of the shared user is complete or not.
In a practical application scenario, after a sharing user shares a service to multiple shared users for the first time, it is found that the integrity of the behavior of the shared users does not meet the condition (for example, a part of the shared users participate in the service, and another part of the shared users do not participate in the service, or the participation rate does not reach a threshold), and then, when a shared user participating in the service (for example, a finished piece) is generated, a resource acquisition permission is configured for the sharing user, and at the same time, a dynamic support permission limitation is also configured for the acquired resource.
And after knowing that the sharing user does not have the dynamic support authority, the sharing user shares the shared user which does not participate in the business again through the secondary sharing page, and urges the sharing user to participate in the business.
Then, judging by using an integrity judgment rule, and if the shared user is found to be complete in behavior, configuring a dynamic support authority to the sharing user; if the judgment shows that the business participation rate of the shared user does not reach the threshold value, but the behavior integrity of the user generating the sharing operation is complete (for example, the sharing user performs the secondary sharing operation every day), which indicates that the sharing user tries on the link of supervising the shared user to participate in the business, at this time, the sharing user can also be configured with the dynamic support authority.
Based on the same inventive concept, the embodiment of the specification further provides the electronic equipment.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as specific physical implementations for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure. An electronic device 300 according to this embodiment of the invention is described below with reference to fig. 3. The electronic device 300 shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 3, electronic device 300 is embodied in the form of a general purpose computing device. The components of electronic device 300 may include, but are not limited to: at least one processing unit 310, at least one memory unit 320, a bus 330 connecting the various system components (including the memory unit 320 and the processing unit 310), a display unit 340, and the like.
Wherein the storage unit stores program code executable by the processing unit 310 to cause the processing unit 310 to perform the steps according to various exemplary embodiments of the present invention described in the above-mentioned processing method section of the present specification. For example, the processing unit 310 may perform the steps as shown in fig. 1.
The storage unit 320 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)3201 and/or a cache storage unit 3202, and may further include a read only memory unit (ROM) 3203.
The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 400 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 300, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 300 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 350. Also, the electronic device 300 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 360. Network adapter 360 may communicate with other modules of electronic device 300 via bus 330. It should be appreciated that although not shown in FIG. 3, other hardware and/or software modules may be used in conjunction with electronic device 300, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention. The computer program, when executed by a data processing apparatus, enables the computer readable medium to implement the above-described method of the invention, namely: such as the method shown in fig. 1.
Fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
A computer program implementing the method shown in fig. 1 may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in embodiments in accordance with the invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP). The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method of resource allocation, comprising:
setting constraint conditions for active resource configuration rules in advance, wherein the constraint conditions have behavior integrity judgment rules and are used for judging the behavior integrity of a user;
sending sharing information to a shared user in response to a sharing operation performed by the user;
and monitoring the behavior information of the shared user, judging the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executing the resource configuration rule based on the judgment result.
2. The method of claim 1, further comprising:
monitoring sharing behavior information of the user performing sharing operation, judging the integrity of the sharing behavior of the user performing sharing operation, and executing the resource configuration rule based on the integrity of the sharing behavior of the user.
3. The method according to any one of claims 1-2, further comprising:
after a user carries out a first sharing operation, configuring a page for secondary sharing for the user, and configuring a resource obtaining permission for the user after the user carries out the sharing operation each time;
the executing the resource configuration rule based on the integrity of the sharing behavior of the user includes:
and configuring resource dynamic support authority for the user based on the integrity of the sharing behavior of the user.
4. The method according to any one of claims 1-3, wherein the determining integrity of the sharing behavior of the user performing the sharing operation comprises:
if the user performs sharing operation on each preset date, the determination result is as follows: and the sharing behavior of the user is complete.
5. The method according to any one of claims 1-4, wherein the sending the shared information to the shared user in response to the sharing operation performed by the user comprises:
sending sharing information to a plurality of shared users in response to sharing operation performed by the users;
the determining the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user includes:
and judging whether the shared users all perform preset behaviors, and if so, executing the resource allocation rule.
6. The method according to any one of claims 1-5, wherein the determining whether the plurality of shared users each perform a predetermined action comprises:
and judging whether the plurality of shared users all perform the completion behavior.
7. The method according to any one of claims 1-6, further comprising:
and sending the sharing information to the shared user who does not perform the preset action again in response to the secondary sharing operation performed by the user.
8. An apparatus for resource allocation, comprising:
the rule setting module is used for setting constraint conditions for the active resource allocation rules in advance, wherein the constraint conditions are provided with behavior integrity judgment rules and are used for judging the behavior integrity of the user;
the sharing module is used for responding to the sharing operation performed by the user and sending sharing information to the shared user;
and the resource configuration constraint module is used for monitoring the behavior information of the shared user, judging the behavior integrity of the shared user by using the constraint condition and the behavior information of the shared user, and executing the resource configuration rule based on the judgment result.
9. An electronic device, wherein the electronic device comprises:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-7.
10. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-7.
CN202010298418.0A 2020-04-16 2020-04-16 Resource allocation method and device and electronic equipment Pending CN111681019A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010298418.0A CN111681019A (en) 2020-04-16 2020-04-16 Resource allocation method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010298418.0A CN111681019A (en) 2020-04-16 2020-04-16 Resource allocation method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN111681019A true CN111681019A (en) 2020-09-18

Family

ID=72451487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010298418.0A Pending CN111681019A (en) 2020-04-16 2020-04-16 Resource allocation method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111681019A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020888A (en) * 2019-03-11 2019-07-16 阿里巴巴集团控股有限公司 The sharing method and device of goal task
CN110766446A (en) * 2019-09-26 2020-02-07 北京淇瑀信息科技有限公司 Method and device for sharing invitation activity of financial product
CN110807649A (en) * 2019-09-26 2020-02-18 北京淇瑀信息科技有限公司 Invitation reward method and system for financial products

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020888A (en) * 2019-03-11 2019-07-16 阿里巴巴集团控股有限公司 The sharing method and device of goal task
CN110766446A (en) * 2019-09-26 2020-02-07 北京淇瑀信息科技有限公司 Method and device for sharing invitation activity of financial product
CN110807649A (en) * 2019-09-26 2020-02-18 北京淇瑀信息科技有限公司 Invitation reward method and system for financial products

Similar Documents

Publication Publication Date Title
CN111176505B (en) Page display method and device based on third-party task linkage and electronic equipment
US9207913B2 (en) API publication on a gateway using a developer portal
CN111190673A (en) Page display method and device based on operation monitoring and electronic equipment
CN111681020A (en) Resource configuration method and device based on task event of relationship person and electronic equipment
CN111612504A (en) Information sending method and device for task completion user and electronic equipment
CN111221449A (en) Method and device for establishing and displaying sharing type activity and electronic equipment
CN113138898B (en) Method and device for identifying and early warning business system abnormity and electronic equipment
CN111935092B (en) Information interaction method and device based on third-party application and electronic equipment
CN111211998A (en) Resource allocation method and device capable of elastically expanding capacity and electronic equipment
CN111681032B (en) Method and device for configuring additional resources and electronic equipment
CN111681019A (en) Resource allocation method and device and electronic equipment
CN111680215B (en) Information pushing method and device and electronic equipment
CN111949862B (en) Method and device for managing business task flow and electronic equipment
CN110740172B (en) Routing management method, device and system based on micro-service architecture
CN113806225A (en) Method and device for identifying service abnormal node and electronic equipment
CN111680245A (en) Page display method and device based on business event and electronic equipment
CN111680867B (en) Resource allocation method and device and electronic equipment
CN110659982A (en) Method and device for large-volume business credit granting and electronic equipment
CN112860422A (en) Method, apparatus and computer program product for job processing
US11016874B2 (en) Updating taint tags based on runtime behavior profiles
CN113938422B (en) Flow distribution method and device and electronic equipment
US10389795B2 (en) Distributed extension execution in computing systems
GB2528949A (en) Providing dynamic latency in an integration flow
CN116860796A (en) Data matching method and device, storage medium and electronic equipment
CN112231614A (en) Combined type activity page display method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination