CN112347386A - Resource allocation method and device adopting restriction rules and electronic equipment - Google Patents
Resource allocation method and device adopting restriction rules and electronic equipment Download PDFInfo
- Publication number
- CN112347386A CN112347386A CN202011027644.1A CN202011027644A CN112347386A CN 112347386 A CN112347386 A CN 112347386A CN 202011027644 A CN202011027644 A CN 202011027644A CN 112347386 A CN112347386 A CN 112347386A
- Authority
- CN
- China
- Prior art keywords
- current user
- page
- user
- information
- invitation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013468 resource allocation Methods 0.000 title claims abstract description 45
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012544 monitoring process Methods 0.000 claims abstract description 12
- 238000012795 verification Methods 0.000 claims abstract description 6
- 230000006399 behavior Effects 0.000 claims description 26
- 238000012545 processing Methods 0.000 claims description 17
- 238000010586 diagram Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 230000003993 interaction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000007405 data analysis Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000005111 flow chemistry technique Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 210000002268 wool Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9558—Details of hyperlinks; Management of linked annotations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0208—Trade or exchange of goods or services in exchange for incentives or rewards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0222—During e-commerce, i.e. online transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0225—Avoiding frauds
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Game Theory and Decision Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a resource allocation method adopting a restriction rule, which comprises the following steps: generating invitation information based on an invitation operation instruction of a current user on a business task page, and pushing an invitation page to a current user terminal, wherein the invitation page is used for sending the invitation information to an invited user of the current user; acquiring a current user identifier and page submission information returned by a new user guide page, wherein the page submission information comprises newly registered invited user information, and associating the newly registered invited user with a current user according to the current user identifier; monitoring behavior information of a newly registered invited user, and acquiring the completion condition of the business task of the current user according to the behavior information and a reserved task rule; carrying out resource allocation restriction rule verification on the completion condition; and when the completion condition accords with the limiting rule, configuring corresponding resources for the current user. The invention can more safely and effectively carry out resource allocation, avoid unnecessary loss caused by rule loopholes and simultaneously provide better user experience for users.
Description
Technical Field
The invention relates to the field of computer information processing, in particular to a resource allocation method and device for limiting bone volume, electronic equipment and a computer readable medium.
Background
With the continuous development of the internet technology of the mobile terminal, the mobile electronic commerce becomes a new direction of the electronic commerce development, and a merchant sends an electronic coupon (also called an electronic discount coupon) to a consumer by using the internet, so that goods or services can be purchased at a price much lower than usual, and the marketing effect exceeds the traditional advertising mode. The "malicious woolen party" also grows along with it.
The 'malicious wool party' refers to people or organizations who specially select the marketing activities of the Internet companies, exchange high rewards for low cost or even zero cost, gather into groups or even organize systems, do not aim at consumption, pay attention to loopholes in preferential policies, or use illegal or illegal means to collect resources in the marketing activities, then discount, sell and exchange cash.
In addition, the 'malicious woollen party' not only brings great loss to merchants, but also brings bad user experience because common users cannot enjoy the preference of the merchants due to the cheating means of 'malicious woollen party'.
Therefore, a new resource allocation method, apparatus, electronic device and computer readable medium are needed.
The above information disclosed in this background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of this, the present disclosure provides a resource allocation method, device, electronic device, and computer readable medium using restriction rules, which decompose resource rewards of business tasks into multi-step issuing, and set up issuing thresholds and picking thresholds simultaneously, so that resource allocation can be performed more safely and effectively, unnecessary loss caused by rule vulnerabilities is avoided, and better user experience is provided for users.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to an aspect of the present disclosure, a resource allocation method using a restriction rule is provided, including:
generating invitation information based on an invitation operation instruction of a current user on a business task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier;
pushing an invitation page to a current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user;
acquiring a current user identifier and page submission information returned by a new user guide page, wherein the page submission information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identifier;
monitoring behavior information of the newly registered invited user, and acquiring the completion condition of the business task of the current user according to the behavior information and a reserved task rule;
performing resource allocation restriction rule verification on the completion condition;
and when the completion condition accords with the limiting rule, configuring corresponding resources for the current user.
Optionally, the method further comprises: and pushing a service task page to the current user, and receiving an operation instruction of the current user for executing a service task through the service task page.
Optionally, the business task comprises sending invitation information of a financial product to a stakeholder of the current user so that the invited user uses the financial product.
Optionally, the business task further includes: a sub-business task corresponding to each particular node of the financial product.
Optionally, each specific node includes node information of registration, completion, credit, move payment, quota, repayment of the financial product.
Optionally, the obtaining the completion condition of the business task of the current user according to the behavior information and the reserved task rule includes: and when the behavior information of the newly registered invited users in a preset number indicates that the specific node of the financial product is completed, the current user completes the sub-business task corresponding to the specific node and acquires a sub-business task completion certificate.
Optionally, the method further comprises: the same sub-service task can obtain a plurality of sub-service completion certificates according to the multistage preset number.
Optionally, the configuring the corresponding resource to the current user includes: and presetting a resource allocation rule, and configuring a random number of resources in a first interval according to the certificate, wherein the first interval is a preset numerical value interval.
Optionally, the restriction rule includes: in the same resource allocation period, the acquired resource allocation times are less than or equal to a preset threshold value.
According to an aspect of the present disclosure, a resource configuration apparatus employing a restriction rule is provided, including: the information module is used for generating invitation information based on an invitation operation instruction of a current user on a business task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier; the invitation page module is used for pushing an invitation page to the current user terminal, and the invitation page is used for sending invitation information to an invited user of the current user; the association processing module is used for acquiring a current user identifier and page submission information returned by a new user guide page, wherein the page submission information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identifier; the monitoring module is used for monitoring the behavior information of the newly registered invited user and acquiring the completion condition of the business task of the current user according to the behavior information and a reserved task rule; the restriction rule module is used for verifying the resource allocation restriction rule of the completion condition; and the configuration module is used for configuring corresponding resources to the current user when the completion condition accords with the restriction rule.
Optionally, the method further comprises: and the pushing module is used for pushing a business task page to the current user and receiving an operation instruction of the current user for executing a business task through the business task page.
Optionally, the business task comprises sending invitation information of a financial product to a stakeholder of the current user so that the invited user uses the financial product.
Optionally, the business task further includes: a sub-business task corresponding to each particular node of the financial product.
Optionally, each specific node includes node information of registration, completion, credit, move payment, quota, repayment of the financial product.
Optionally, the monitoring module further comprises: and when the behavior information of the newly registered invited users in a preset number indicates that the specific node of the financial product is completed, the current user completes the sub-business task corresponding to the specific node and acquires a sub-business task completion certificate.
Optionally, the method further comprises: the same sub-service task can obtain a plurality of sub-service completion certificates according to the multistage preset number.
Optionally, the method further comprises: and the resource allocation rule module is used for setting and executing a resource allocation rule, wherein the resource allocation rule comprises the step of allocating resources with random quantity in a first interval according to the certificate, and the first interval is a preset numerical value interval.
Optionally, the restriction rule executed by the restriction rule module includes: in the same resource allocation period, the acquired resource allocation times are less than or equal to a preset threshold value.
According to an aspect of the present disclosure, an electronic device is provided, the electronic device including: one or more processors; storage means for storing one or more programs; when executed by one or more processors, cause the one or more processors to implement a method as above.
According to an aspect of the disclosure, a computer-readable medium is proposed, on which a computer program is stored, which program, when being executed by a processor, carries out the method as above.
According to the resource allocation method and device adopting the restriction rules, the electronic equipment and the computer readable medium, the method comprises the steps of generating invitation information based on an invitation operation instruction of a current user on a business task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier; pushing an invitation page to a current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user; acquiring a current user identifier and page submission information returned by a new user guide page, wherein the page submission information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identifier; monitoring behavior information of the newly registered invited user, and acquiring the completion condition of the business task of the current user according to the behavior information and a reserved task rule; performing resource allocation restriction rule verification on the completion condition; when the completion condition meets the limiting rule, the resource reward of the service task is decomposed into multi-step distribution in a mode of configuring corresponding resources to the current user, a distribution threshold and a receiving threshold are set simultaneously, the resource configuration can be carried out more safely and effectively, unnecessary loss caused by rule loopholes is avoided, and better user experience is brought to the user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects obtained more clear, the following will describe in detail the embodiments of the present invention with reference to the accompanying drawings. It should be noted, however, that the drawings described below are only illustrations of exemplary embodiments of the invention, from which other embodiments can be derived by those skilled in the art without inventive faculty.
Fig. 1 is a system block diagram illustrating a resource configuration method and apparatus employing restriction rules according to an exemplary embodiment.
FIG. 2 is a flow diagram illustrating a method for resource configuration employing restriction rules in accordance with an example embodiment.
Fig. 3 is a diagram illustrating a resource configuration apparatus employing restriction rules, according to an example embodiment.
FIG. 4 is a block diagram illustrating an electronic device in accordance with an example embodiment.
FIG. 5 is a block diagram illustrating a computer-readable medium in accordance with an example embodiment.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals denote the same or similar elements, components, or parts in the drawings, and thus their repetitive description will be omitted.
Features, structures, characteristics or other details described in a particular embodiment do not preclude the fact that the features, structures, characteristics or other details may be combined in a suitable manner in one or more other embodiments in accordance with the technical idea of the invention.
In describing particular embodiments, the present invention has been described with reference to features, structures, characteristics or other details that are within the purview of one skilled in the art to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific features, structures, characteristics, or other details.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components, or sections, these terms should not be construed as limiting. These phrases are used to distinguish one from another. For example, a first device may also be referred to as a second device without departing from the spirit of the present invention.
The term "and/or" and/or "includes any and all combinations of one or more of the associated listed items.
Fig. 1 is a system block diagram illustrating a resource configuration method and apparatus employing restriction rules according to an exemplary embodiment.
As shown in fig. 1, the system architecture 10 may include terminal devices 101, 102, a network 103, and a server 104. The network 103 serves as a medium for providing communication links between the terminal devices 101, 102 and the server 105. The network 103 is also used to provide a medium for communication links between the terminal devices 101, 102. Network 103 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102 to interact with the server 105 over the network 103 to receive or send messages or the like. The terminal devices 101 and 102 may be installed with various communication mobile applications, such as a financial service application, a shopping application, a web browser application, an instant messaging tool, a mailbox mobile, social platform software, and the like.
The terminal devices 101, 102 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 104 may be a server that provides various services, such as a background management server that provides support for financial services type applications used by users with the terminal devices 101, 102. The backend management server may perform processing such as analysis on the received user data, and feed back a processing result (e.g., resource allocation information) to the terminal apparatuses 101 and 102.
The terminal device 101, 102 may generate invitation information based on an invitation operation instruction of the current user on the service task page, for example, where the invitation information includes a current user identifier and a new user guidance page address containing the current user identifier; the server 104 may, for example, push an invitation page to a terminal of a current user, the invitation page being used to send invitation information to an invited user of the current user; the terminal devices 101 and 102 may, for example, obtain a current user identifier and page submission information returned by a new user guidance page, where the page submission information includes information of a newly registered invited user, and associate the newly registered invited user with the current user according to the current user identifier; the server 104 monitors the behavior information of the newly registered invited user, and acquires the completion condition of the business task of the current user according to the behavior information and a reserved task rule; the server 104 verifies the resource allocation restriction rule for the completion condition; and when the completion condition meets the limiting rule, the server 104 configures corresponding resources for the current user.
FIG. 2 is a flow diagram illustrating a method for resource configuration employing restriction rules in accordance with an example embodiment. The resource allocation method using the restriction rule at least includes steps S201 to S207.
In step S201, a business task page is pushed
And pushing a service task page to the current user, and receiving an operation instruction of the current user for executing the service task through the service task page.
Specifically, the server pushes the content of the service task page to the application of the current user terminal, and the application analyzes and renders and displays the service task page to the current user.
The business task page can show the specific content of the business task to the user, and meanwhile, the business task page can also receive the operation instruction of the current user for executing the business task. The operation instruction can be a touch interaction mode operation instruction such as touch and press, and can also be a non-contact interaction mode operation instruction such as voice input.
Optionally, the business task comprises sending invitation information of a financial product to a stakeholder of the current user to prompt the invited user to use the financial product.
Preferably, the business task can be decomposed into a plurality of sub business tasks corresponding to main specific nodes of the financial product, wherein each specific node comprises node information of registration, completion, credit, dynamic support, quotation, repayment and the like of the financial product.
The registration node subtask may, for example, invite a particular number of new users to complete the registration of the financial product for the current user; also for example, the move branch node subtask may invite a particular number of current users to complete the move branch operation.
In particular, financial products such as loan products, financial products.
In step S202, invitation information is generated.
And generating invitation information based on an invitation operation instruction of the current user on a service task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier.
More specifically, when receiving an operation that a current user executes the business task on a business task page, generating a user identifier and associating the user identifier with the current user. It should be noted that the above description is only given by way of example, and the present invention is not limited thereto. In other examples, the user may also obtain the user identification from a server.
And generating invitation information according to the user identification, wherein the invitation information comprises the user identification and the address of the new user guide page.
In step S203, an invitation page is pushed
And pushing an invitation page to the current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user.
Specifically, the invitation page is used for guiding the current user to send invitation information to the relatives, namely the invited users.
It is possible, for example, that the current user sends the above-mentioned invitation information to the invited user, such as http:// www.xy ×. bc.com/action1/regeist.phpvid ═ 03ox2345687eu, where "? "preceded by a new user guide page address,"? The "last VID" last string "03 ox2345687 eu" is the current user identification.
For each share or invite link of each user, a user identification is generated and passed to the new or invited user following the invite link. Generally, the user identification of the same user is unique and unchangeable. Meanwhile, the server records each user identifier and the associated information thereof, and information data can be inquired in a user database of the server through the user identifiers, so that data use and subsequent data analysis are facilitated.
In step S204, the invited user information is acquired and associated
Acquiring a current user identifier and page submission information returned by a new user guide page, wherein the page submission information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identifier.
More specifically, page submission information returned by a new user guidance page opened by an invited user after the current user sends the page submission information and the user identifier of the current user are obtained. The page submission information includes the registration information of the invited user, such as account name, mobile phone number, user name, gender, and the like. The server may set an inviter tag corresponding to the user identification of the inviter, i.e. the current user, such as "03 ox2345687 eu" above, when recording said invited new registered users.
In step S205, behavior information of the invited user is monitored, and a service task completion status of the current user is obtained.
And taking the code or equipment number of the invited user as an entry, acquiring behavior information of the invited user, which is reported by the invited user by dotting on a user behavior database page, and when the behavior information of a predetermined number of newly registered invited users indicates that a specific node of the financial product is completed, completing a sub-business task corresponding to the specific node by the current user and acquiring a sub-business task completion certificate.
Alternatively, the same sub-business task may obtain multiple completion credentials according to different multi-level subscription numbers. For example, the registration node subtasks preset specific numbers of 3, 5, 10, and 20, and when the number of successful registration users of the current user reaches 3, 5, 10, and 20, a subtask completion credential is given respectively.
Preferably, the same subtask completion voucher is different according to the predetermined number. For example, the subtask credential may be given 1-A when the number 3 is completed, 1-B when the number 5 is completed, and so on.
In step S206, restriction rule verification is performed.
And when the current user puts forward resource requirements according to the subtask completion certificate and the acquired subtask completion certificate, verifying the restriction rule.
The restriction rules include: in the same resource allocation period, the number of times that the same service task has acquired the allocated resources is less than or equal to a preset threshold value.
For example, the current user can use the subtask to complete the voucher exchange resource for the same financial product invitation activity within one day, and the number of times is less than or equal to the preset threshold value.
Specifically, for example, if the red packet removal is performed, and the preset threshold is 50 times, the upper limit of red packet removal by the user on the current day is 50, applications beyond 50 times are rejected, and the upper limit of picking is displayed.
In step S207, resource allocation
And when the completion condition meets the restriction rule in step S206, configuring the corresponding resource to the current user.
More specifically, when the current completion condition of the current user does not exceed a preset threshold number of times, a preset resource allocation rule is adopted to allocate resources to the current user.
The preset resource allocation rule may include allocation according to a fixed value or allocation according to a random value. When the random number is distributed according to the random value, the range of the random number is any random number in a preset numerical value interval.
By adopting the resource allocation method, the resource reward of the business task can be divided into multi-step distribution, and the distribution threshold and the picking threshold are set simultaneously, so that the resource allocation can be carried out more safely and effectively, unnecessary loss caused by rule loopholes is avoided, and better user experience is brought to users.
It should be noted that, in this example, the resource to be allocated mainly refers to a digital financial resource, such as a coupon, and the types of the coupon include a discount type, a cash type, a free type, and a payment type. Specifically, the specific resource is, for example, a cash award, a free award, or the like. It can be seen that the resource allocation of the present invention is essentially to perform restricted allocation of resources according to a predetermined rule, so as to improve the allocation security of the resources.
Those skilled in the art will appreciate that all or part of the steps to implement the above-described embodiments are implemented as programs (computer programs) executed by a computer data processing apparatus. When the computer program is executed, the method provided by the invention can be realized. Furthermore, the computer program may be stored in a computer readable storage medium, which may be a readable storage medium such as a magnetic disk, an optical disk, a ROM, a RAM, or a storage array composed of a plurality of storage media, such as a magnetic disk or a magnetic tape storage array. The storage medium is not limited to centralized storage, but may be distributed storage, such as cloud storage based on cloud computing.
Embodiments of the apparatus of the present invention are described below, which may be used to perform method embodiments of the present invention. The details described in the device embodiments of the invention should be regarded as complementary to the above-described method embodiments; reference is made to the above-described method embodiments for details not disclosed in the apparatus embodiments of the invention.
Fig. 3 is a diagram illustrating a resource configuration apparatus employing restriction rules, according to an example embodiment. As shown in fig. 3, the resource configuration device 30 adopting the restriction rule includes a push module 301, an information module 302, an invitation page module 303, an association processing module 304, a monitoring module 305, a restriction rule module 306, a resource allocation rule module 307, and a configuration module 308.
The pushing module 301 is configured to push a service task page to the current user, and receive an operation instruction for the current user to execute a service task through the service task page.
Specifically, the pushing module 301 pushes the content of the service task page to the application of the current user terminal, and the application parses and renders and displays the service task page to the current user.
The business task page can show the specific content of the business task to the user, and meanwhile, the business task page can also receive the operation instruction of the current user for executing the business task. The operation instruction can be a touch interaction mode operation instruction such as touch and press, and can also be a non-contact interaction mode operation instruction such as voice input.
Optionally, the business task comprises sending invitation information of a financial product to a stakeholder of the current user to prompt the invited user to use the financial product.
Preferably, the business task can be decomposed into a plurality of sub business tasks corresponding to main specific nodes of the financial product, wherein each specific node comprises node information of registration, completion, credit, dynamic support, quotation, repayment and the like of the financial product.
The registration node subtask may, for example, invite a particular number of new users to complete the registration of the financial product for the current user; also for example, the move branch node subtask may invite a particular number of current users to complete the move branch operation.
In particular, financial products such as loan products, financial products.
An information module 302, configured to generate invitation information based on an invitation operation instruction of a current user on a service task page, where the invitation information includes a current user identifier and a new user guidance page address including the current user identifier.
More specifically, when receiving an operation of a current user to execute the business task on the business task page, the information module 302 generates a user identifier and associates the user identifier with the current user. It should be noted that the above description is only given by way of example, and the present invention is not limited thereto. In other examples, the user may also obtain the user identification from a server.
And generating invitation information according to the user identification, wherein the invitation information comprises the user identification and the address of the new user guide page.
The invitation page module 303 is configured to push an invitation page to the current user terminal, where the invitation page is used to send invitation information to an invited user of the current user.
Specifically, the invitation page pushed by the invitation page module 303 is used to guide the current user to send invitation information to a related person, that is, an invited user.
It is possible, for example, that the current user sends the above-mentioned invitation information to the invited user, such as http:// www.xy ×. bc.com/action1/regeist.phpvid ═ 03ox2345687eu, where "? "preceded by a new user guide page address,"? The "last VID" last string "03 ox2345687 eu" is the current user identification.
For each share or invite link of each user, a user identification is generated and passed to the new or invited user following the invite link. Generally, the user identification of the same user is unique and unchangeable. Meanwhile, the server records each user identifier and the associated information thereof, and information data can be inquired in a user database of the server through the user identifiers, so that data use and subsequent data analysis are facilitated.
The association processing module 304 is configured to obtain a current user identifier and page submission information returned by a new user guidance page, where the page submission information includes information of a newly registered invited user, and associate the newly registered invited user with the current user according to the current user identifier.
More specifically, the association processing module 304 obtains page submission information returned by a new user guidance page opened by the invited user after the current user sends the page submission information, and the user identifier of the current user. The page submission information includes the registration information of the invited user, such as account name, mobile phone number, user name, gender, and the like. The server may set an inviter tag corresponding to the user identification of the inviter, i.e. the current user, such as "03 ox2345687 eu" above, when recording said invited new registered users.
A monitoring module 305, configured to monitor behavior information of the newly registered invited user, and obtain a completion condition of the business task of the current user according to the behavior information and a predetermined task rule.
The monitoring module 305 takes the code or the device number of the invited user as an entry, acquires behavior information of the invited user, which is reported by the invited user by dotting on a user behavior database page, when a predetermined number of behavior information of the newly registered invited user indicates that a specific node of the financial product is completed, the current user completes a sub-business task corresponding to the specific node, and acquires a sub-business task completion certificate.
Alternatively, the same sub-business task may obtain multiple completion credentials according to different multi-level subscription numbers. For example, the registration node subtasks preset specific numbers of 3, 5, 10, and 20, and when the number of successful registration users of the current user reaches 3, 5, 10, and 20, a subtask completion credential is given respectively.
Preferably, the same subtask completion voucher is different according to the predetermined number. For example, the subtask credential may be given 1-A when the number 3 is completed, 1-B when the number 5 is completed, and so on.
And a restriction rule module 306, configured to perform resource allocation restriction rule verification on the completion condition.
And when the current user puts forward resource requirements according to the subtask completion certificate and the acquired subtask completion certificate, the restriction rule module verifies the restriction rule.
The restriction rules include: in the same resource allocation period, the number of times that the same service task has acquired the allocated resources is less than or equal to a preset threshold value.
For example, the current user can use the subtask to complete the voucher exchange resource for the same financial product invitation activity within one day, and the number of times is less than or equal to the preset threshold value.
Specifically, for example, if the red packet removal is performed, and the preset threshold is 50 times, the upper limit of red packet removal by the user on the current day is 50, applications beyond 50 times are rejected, and the upper limit of picking is displayed.
A resource allocation rule module 307, configured to determine the resource allocation amount based on the resource allocation rule.
More specifically, when the current completion condition of the current user does not exceed the preset threshold number of times, the resource allocation rule module 307 determines the number of resources allocated by the current user by using a preset resource allocation rule.
The preset resource allocation rule may include allocation according to a fixed value or allocation according to a random value. When the random number is distributed according to the random value, the range of the random number is any random number in a preset numerical value interval.
A configuration module 308, configured to configure a corresponding resource to the current user when the completion condition meets the restriction rule.
Those skilled in the art will appreciate that the modules in the above-described embodiments of the apparatus may be distributed as described in the apparatus, and may be correspondingly modified and distributed in one or more apparatuses other than the above-described embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as specific physical implementations for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. An electronic device 400 according to this embodiment of the invention is described below with reference to fig. 4. The electronic device 400 shown in fig. 4 is only an example and should not bring any limitation to the function and the scope of use of the embodiments of the present invention.
As shown in fig. 4, electronic device 400 is embodied in the form of a general purpose computing device. The components of electronic device 400 may include, but are not limited to: at least one processing unit 410, at least one memory unit 420, a bus 430 that connects the various system components (including the memory unit 420 and the processing unit 410), a display unit 440, and the like.
Wherein the storage unit stores program code executable by the processing unit 410 to cause the processing unit 410 to perform the steps according to various exemplary embodiments of the present invention described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, the processing unit 410 may perform the steps as shown in fig. 2.
The storage unit 420 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)4201 and/or a cache memory unit 4202, and may further include a read only memory unit (ROM) 4203.
The storage unit 420 may also include a program/utility 4204 having a set (at least one) of program modules 4205, such program modules 4205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The electronic device 400 may also communicate with one or more external devices 400' (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 400, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 400 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 450. Also, the electronic device 400 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 460. The network adapter 460 may communicate with other modules of the electronic device 400 via the bus 430. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 400, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention. The computer program, when executed by a data processing apparatus, enables the computer readable medium to carry out the above-described methods of the invention.
The computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in embodiments in accordance with the invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP). The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.
Claims (10)
1. A resource allocation method using restriction rules, comprising:
generating invitation information based on an invitation operation instruction of a current user on a business task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier;
pushing an invitation page to a current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user;
acquiring a current user identifier and page submission information returned by a new user guide page, wherein the page submission information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identifier;
monitoring behavior information of the newly registered invited user, and acquiring the completion condition of the business task of the current user according to the behavior information and a reserved task rule;
performing resource allocation restriction rule verification on the completion condition;
and when the completion condition accords with the limiting rule, configuring corresponding resources for the current user.
2. The method of claim 1, further comprising:
and pushing a service task page to the current user, and receiving an operation instruction of the current user for executing a service task through the service task page.
3. The method of any of claims 1-2, wherein the business task comprises sending invitation information for a financial product to a stakeholder of the current user to cause an invited user to use the financial product.
4. The method according to any of claims 1-3, wherein the business task further comprises: a sub-business task corresponding to each particular node of the financial product.
5. The method according to any one of claims 1 to 4, wherein each specific node includes node information of registration, completion, credit, move, denomination, payment of a financial product.
6. The method according to any one of claims 1-5, wherein the obtaining of the completion of the business task of the current user according to the behavior information and the subscribed task rule comprises:
and when the behavior information of the newly registered invited users in a preset number indicates that the specific node of the financial product is completed, the current user completes the sub-business task corresponding to the specific node and acquires a sub-business task completion certificate.
7. The method according to any one of claims 1-6, further comprising: the same sub-service task can obtain a plurality of sub-service completion certificates according to the multistage preset number.
8. A resource allocation apparatus employing restriction rules, comprising:
the information module is used for generating invitation information based on an invitation operation instruction of a current user on a business task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier;
the invitation page module is used for pushing an invitation page to the current user terminal, and the invitation page is used for sending invitation information to an invited user of the current user;
the association processing module is used for acquiring a current user identifier and page submission information returned by a new user guide page, wherein the page submission information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identifier;
the monitoring module is used for monitoring the behavior information of the newly registered invited user and acquiring the completion condition of the business task of the current user according to the behavior information and a reserved task rule;
the restriction rule module is used for verifying the resource allocation restriction rule of the completion condition;
and the configuration module is used for configuring corresponding resources to the current user when the completion condition accords with the restriction rule.
9. An electronic device, wherein the electronic device comprises:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-7.
10. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011027644.1A CN112347386B (en) | 2020-09-25 | 2020-09-25 | Resource configuration method and device adopting restriction rule and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011027644.1A CN112347386B (en) | 2020-09-25 | 2020-09-25 | Resource configuration method and device adopting restriction rule and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112347386A true CN112347386A (en) | 2021-02-09 |
CN112347386B CN112347386B (en) | 2024-06-21 |
Family
ID=74360434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011027644.1A Active CN112347386B (en) | 2020-09-25 | 2020-09-25 | Resource configuration method and device adopting restriction rule and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112347386B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113343148A (en) * | 2021-06-18 | 2021-09-03 | 上海哔哩哔哩科技有限公司 | Resource processing method, client, server and system |
CN113674018A (en) * | 2021-07-26 | 2021-11-19 | 山东赤子城网络技术有限公司 | Resource transfer method, device, computer equipment and storage medium |
CN114968528A (en) * | 2022-05-30 | 2022-08-30 | 阿里巴巴(中国)有限公司 | Policy-based information processing method, electronic device, and storage medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090043818A1 (en) * | 2005-10-26 | 2009-02-12 | Cortica, Ltd. | Signature generation for multimedia deep-content-classification by a large-scale matching system and method thereof |
US20180083986A1 (en) * | 2016-09-21 | 2018-03-22 | Apple Inc. | Credential modification notifications |
CN108268605A (en) * | 2017-12-27 | 2018-07-10 | 北京洪泰同创信息技术有限公司 | A kind of communal space method for managing resource and system |
CN110807650A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | New financial product user invitation method and system |
CN110807649A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | Invitation reward method and system for financial products |
CN110807710A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | Method and system for managing invitation data of user inviting friends |
CN111612511A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and device based on activity task and electronic equipment |
CN111612502A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and device based on activity task and electronic equipment |
CN111612510A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and system based on activity task and electronic equipment |
CN111681032A (en) * | 2020-04-28 | 2020-09-18 | 上海淇馥信息技术有限公司 | Method and device for configuring additional resources and electronic equipment |
CN111681020A (en) * | 2020-04-16 | 2020-09-18 | 上海淇玥信息技术有限公司 | Resource configuration method and device based on task event of relationship person and electronic equipment |
CN111680245A (en) * | 2020-04-22 | 2020-09-18 | 上海淇玥信息技术有限公司 | Page display method and device based on business event and electronic equipment |
-
2020
- 2020-09-25 CN CN202011027644.1A patent/CN112347386B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090043818A1 (en) * | 2005-10-26 | 2009-02-12 | Cortica, Ltd. | Signature generation for multimedia deep-content-classification by a large-scale matching system and method thereof |
US20180083986A1 (en) * | 2016-09-21 | 2018-03-22 | Apple Inc. | Credential modification notifications |
CN108268605A (en) * | 2017-12-27 | 2018-07-10 | 北京洪泰同创信息技术有限公司 | A kind of communal space method for managing resource and system |
CN110807650A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | New financial product user invitation method and system |
CN110807649A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | Invitation reward method and system for financial products |
CN110807710A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | Method and system for managing invitation data of user inviting friends |
CN111612511A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and device based on activity task and electronic equipment |
CN111612502A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and device based on activity task and electronic equipment |
CN111612510A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and system based on activity task and electronic equipment |
CN111681020A (en) * | 2020-04-16 | 2020-09-18 | 上海淇玥信息技术有限公司 | Resource configuration method and device based on task event of relationship person and electronic equipment |
CN111680245A (en) * | 2020-04-22 | 2020-09-18 | 上海淇玥信息技术有限公司 | Page display method and device based on business event and electronic equipment |
CN111681032A (en) * | 2020-04-28 | 2020-09-18 | 上海淇馥信息技术有限公司 | Method and device for configuring additional resources and electronic equipment |
Non-Patent Citations (3)
Title |
---|
X. DING等: "JellyFish: Online Performance Tuning with Adaptive Configuration and Elastic Container in Hadoop Yarn", IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), vol. 2015, 18 February 2016 (2016-02-18), pages 831 - 836 * |
张建平等: "一种基于流量与日志的专网用户行为分析方法", 信息安全研究, vol. 6, no. 9, 5 September 2020 (2020-09-05), pages 783 - 790 * |
郑磊等: "网格环境中资源发现与监视机制的研究", 计算机技术与发展, vol. 16, no. 1, 10 January 2006 (2006-01-10), pages 83 - 86 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113343148A (en) * | 2021-06-18 | 2021-09-03 | 上海哔哩哔哩科技有限公司 | Resource processing method, client, server and system |
CN113343148B (en) * | 2021-06-18 | 2023-12-01 | 上海哔哩哔哩科技有限公司 | Resource processing method, client, server and system |
CN113674018A (en) * | 2021-07-26 | 2021-11-19 | 山东赤子城网络技术有限公司 | Resource transfer method, device, computer equipment and storage medium |
CN114968528A (en) * | 2022-05-30 | 2022-08-30 | 阿里巴巴(中国)有限公司 | Policy-based information processing method, electronic device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112347386B (en) | 2024-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112347386A (en) | Resource allocation method and device adopting restriction rules and electronic equipment | |
CN110807649A (en) | Invitation reward method and system for financial products | |
CN111612502A (en) | Resource allocation method and device based on activity task and electronic equipment | |
CN110348894B (en) | Method and device for displaying resource advertisement and electronic equipment | |
CN110324414B (en) | Resource bit flow distribution method and device and electronic equipment | |
CN111611516B (en) | Resource allocation method and device and electronic equipment | |
CN111612510A (en) | Resource allocation method and system based on activity task and electronic equipment | |
CN112348659B (en) | User identification policy distribution method and device and electronic equipment | |
CN111612500A (en) | Financial resource expiration reminding method and device and electronic equipment | |
CN112346625A (en) | Resource management method and device and electronic equipment | |
CN112348460A (en) | Resource limit adjusting method and device of cooperative task and electronic equipment | |
CN111612504A (en) | Information sending method and device for task completion user and electronic equipment | |
CN111221449A (en) | Method and device for establishing and displaying sharing type activity and electronic equipment | |
Mahrakani et al. | Customer satisfaction measurement of e-banking service quality in Riyadh, Saudi Arabia | |
CN112346628A (en) | Special shared resource certificate management method, system and electronic equipment | |
CN112347344A (en) | Management method and device for multi-period additional resource certificate and electronic equipment | |
CN112346608A (en) | Page display method and device based on business activity result display and electronic equipment | |
CN112508693B (en) | Resource distribution channel distribution method and device based on user tags and electronic equipment | |
CN113992761B (en) | Transaction processing method, apparatus, electronic device, medium and program product | |
CN112016790B (en) | User policy allocation method and device and electronic equipment | |
CN110796543A (en) | Method and device for obtaining customized information based on relational network and electronic equipment | |
CN115600969A (en) | Service processing method and device, electronic equipment and computer readable medium | |
CN112347389A (en) | Resource configuration method and device based on task construction and information verification completion and electronic equipment | |
CN113298555B (en) | Promotion strategy generation method and device and electronic equipment | |
CN111612508A (en) | Financial resource allocation request processing method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |