CN113852723B - Number scheduling method, equipment and storage medium - Google Patents

Number scheduling method, equipment and storage medium Download PDF

Info

Publication number
CN113852723B
CN113852723B CN202111387931.8A CN202111387931A CN113852723B CN 113852723 B CN113852723 B CN 113852723B CN 202111387931 A CN202111387931 A CN 202111387931A CN 113852723 B CN113852723 B CN 113852723B
Authority
CN
China
Prior art keywords
privacy
provider
providers
attributes
numbers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111387931.8A
Other languages
Chinese (zh)
Other versions
CN113852723A (en
Inventor
赵彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Alibaba Cloud Computing Ltd
Original Assignee
Alibaba China Co Ltd
Alibaba Cloud Computing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba China Co Ltd, Alibaba Cloud Computing Ltd filed Critical Alibaba China Co Ltd
Priority to CN202111387931.8A priority Critical patent/CN113852723B/en
Publication of CN113852723A publication Critical patent/CN113852723A/en
Application granted granted Critical
Publication of CN113852723B publication Critical patent/CN113852723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the application provides a number scheduling method, equipment and a storage medium. In the embodiment of the application, the weights of the number attributes can be determined according to the importance degrees of the number attributes of the privacy number provider; determining the number weight weights of a plurality of privacy number providers according to the weights of the number attributes and the number attribute information of the privacy numbers of the privacy number providers; and then, the privacy number providers can be scheduled according to the number weight of the privacy number providers, so that the automatic scheduling of the privacy numbers of the privacy number platform is realized, the contribution degree of different number attributes of the privacy number providers to the number weight of the privacy number providers is considered in the privacy number scheduling process, and the rationality of the privacy number scheduling is improved.

Description

Number scheduling method, equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a number scheduling method, device, and storage medium.
Background
The number protection technology is a technology for providing temporary numbers for a client and a server to contact with each other in a specific scene and a specific time period so as to hide real numbers of the client and the server and protect the privacy of the client and the server. The technology is widely applied to internet services such as network car booking, take-out meal ordering, logistics, mediation and the like.
Taking take-out service as an example, most of the existing take-out services adopt a mode of taking orders by a distributor, and when an order is generated, an order placing client number a, a privacy number X and a distributor number B are bound. A. The B number realizes one-to-one bidirectional number protection between the ordering client and the distributor by dialing the X number.
With the continuous development of number privacy protection technology, the demand for privacy numbers is also increasing. The number quantity provided by one operator platform can not meet the service requirement, and the number protection system needs to access the numbers of multiple operator platforms to guarantee the service. However, at present, the proportion of the number quantity of the privacy numbers of each operator platform in the number protection system completely depends on manual decision, so that the performance and the cost of the number protection system cannot be guaranteed.
Disclosure of Invention
Aspects of the present application provide a number scheduling method, device, storage medium, and computer program product to implement automatic scheduling of a privacy number, which is helpful for improving the rationality of the privacy number scheduling.
The embodiment of the application provides a number scheduling method, which comprises the following steps:
acquiring number attribute information of privacy numbers of a plurality of privacy number providers;
determining the weights of the number attributes according to the importance degrees of the number attributes;
determining number weight weights of the privacy number providers according to the weights of the number attributes and the number attribute information;
and scheduling the privacy numbers of the privacy number providers according to the number weight of the privacy number providers.
An embodiment of the present application further provides a computing device, including: a memory and a processor; wherein the memory is used for storing a computer program;
the processor is coupled to the memory for executing the computer program for performing the steps in the number scheduling method described above.
Embodiments of the present application also provide a computer-readable storage medium storing computer instructions, which, when executed by one or more processors, cause the one or more processors to perform the steps of the above number scheduling method.
An embodiment of the present application further provides a computer program product, including: a computer program; the computer program, when executed by a processor, causes the processor to perform the steps of the number scheduling method described above.
In the embodiment of the application, the weights of a plurality of number attributes are determined according to the importance degrees of the number attributes of the privacy number provider; determining the number weight weights of a plurality of privacy number providers according to the weights of the number attributes and the number attribute information of the privacy numbers of the privacy number providers; and then, the privacy number providers can be scheduled according to the number weight of the privacy number providers, so that the automatic scheduling of the privacy numbers of the privacy number platform is realized, the contribution degree of different number attributes of the privacy number providers to the number weight of the privacy number providers is considered in the privacy number scheduling process, and the rationality of the privacy number scheduling is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 and fig. 2 are schematic structural diagrams of a number protection system provided in an embodiment of the present application;
fig. 3 is a schematic flowchart of a number scheduling method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a computing device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
With the continuous development of number privacy protection technology, the demand for privacy numbers is also increasing. The number quantity provided by one operator platform can not meet the service requirement, and the number protection system needs to access the numbers of multiple operator platforms to guarantee the service. However, at present, the proportion of the number quantity of the privacy numbers of each operator platform in the number protection system completely depends on manual decision, so that the performance and the cost of the number protection system cannot be guaranteed.
To solve the above technical problem, in some embodiments of the present application, weights of a plurality of number attributes of a privacy number provider are determined according to importance degrees of the plurality of number attributes; determining the number weight weights of a plurality of privacy number providers according to the weights of the number attributes and the number attribute information of the privacy numbers of the privacy number providers; and then, the privacy number providers can be scheduled according to the number weight of the privacy number providers, so that the automatic scheduling of the privacy numbers of the privacy number platform is realized, the contribution degree of different number attributes of the privacy number providers to the number weight of the privacy number providers is considered in the privacy number scheduling process, and the rationality of the privacy number scheduling is improved.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
It should be noted that: like reference numerals refer to like objects in the following figures and embodiments, and thus, once an object is defined in one figure or embodiment, further discussion thereof is not required in subsequent figures and embodiments.
Fig. 1 and fig. 2 are schematic structural diagrams of a number protection system according to an embodiment of the present application. As shown in fig. 1 and 2, the number protection system includes: a number protection provider 10 and a number protection demander 20.
The number protection service provider 10 is a server device that provides a number protection service. The server device may be a single server device, a cloud server array, or a Virtual Machine (VM) running in the cloud server array. In addition, the server device may also refer to other computing devices with corresponding service capabilities, such as a terminal device (running a service program) such as a computer.
The number protection demander 20 refers to a user party who uses or subscribes to a number protection service. For example, the party needing number protection may be an e-commerce platform, such as a take-out platform party, a car appointment platform party, various intermediary platforms or a website shopping platform. The number service demander 20 may use the number protection service provided by the number protection service provider 10 to provide privacy number services for its users. The users of number service demander 20 may include: a first subscriber 30 who subscribes or subscribes to the services provided by the number service provider 20 and a second subscriber 40 who provides his subscription to the first subscriber 30. The first and second clients 30 and 40 may be terminal devices having a call and communication function. Such as a mobile phone, a tablet computer, or a wearable device. As shown in fig. 2, the first user terminal 30 and the second user terminal 40 may establish a binding relationship through the service provided by the number service demander 20.
For example, in a takeaway service scenario, the first user terminal 30 may be a terminal device of a takeaway ordering user; the second user terminal 40 may be a terminal device of a distributor who orders the order user to perform the takeaway distribution, or may be a terminal device of a takeaway merchant who subscribes to the first user terminal 30. Binding relations can be established between the take-out ordering users and take-out distributors, or between the take-out ordering users and take-out merchants through take-out orders. For another example, in an online shopping scenario, the first user end 30 may be a terminal device of an online shopping user; the second client 40 may be a terminal device of a merchant of the first client 30 shopping online or a terminal device of a distributor who distributes orders of the first client 30 shopping online. Accordingly, a binding relationship can be established between the online shopping user and the merchant or between the online shopping user and the order distributor through the online shopping order. For another example, in a network car-booking scenario, the first user terminal 30 may be a terminal device of a user of the network car-booking, and the second user terminal 40 may be a terminal device of a driver of the order-taking. Accordingly, the online car booking user and the order taking driver can establish a binding relationship through the online car booking order.
In this embodiment, the number privacy of the first user end 30 and the second user end 40 is protected, and the number protection provider 10 may provide a temporary number for the first user end 30 and the second user end 40 to contact with each other in a specific scene and a specific time period, so as to hide the real numbers of both parties and protect the privacy of both parties. The temporary number is a privacy number, which is called privacy number for short. The number protection provider 10 assigns, binds, and recycles privacy numbers for communications between the first and second clients 30, 40. In the embodiments of the present application, the number is not limited to a specific implementation form. Alternatively, the number may be a fixed telephone number, a mobile telephone number, a network-wide call center number, and/or an extension number, among others. Of course, for the privacy number, the number may be a fixed telephone number, a mobile telephone number, a network-wide call center number and/or an extension number.
In this embodiment, the number protection provider 10 may assign, bind, and recycle the privacy numbers of the communication between the first user end 30 and the second user end 40 based on the network behavior relationship between the first user end 30 and the second user end 40. For example, in a take-away service scenario, the number protection provider 10 may bind the order placement user number a (the number of the first user 30), the privacy number X, the distributor number B (the number of the second user 40) at the time the order is generated. The first user terminal 30 and the second user terminal 40 can realize bidirectional number protection between the ordering user and the distributor by dialing the X number.
In some embodiments, number protection provider 10 has a number resource that can provide a privacy number; in other embodiments, the number protection provider 10 does not have a number resource, and the number resource is provided by another operator, i.e. the privacy number is provided by the operator. In the embodiment of the present application, the party who provides the privacy number resource is referred to as the privacy number provider 50. The following takes the network subscription service as an example, and an exemplary manner of communication between the first user end 30 and the second user end 40 is described.
As shown in fig. 2, the number protection demander 20 may allocate an order service, i.e. a second client 40, to the first client 30 in response to an order placing request of the first client 30. The number of the ordering user corresponding to the first user end 30 is a number a, and the number of the second user end 40 is a number B. Further, as shown in step 1 in fig. 2, the number protection demander 20 may provide the numbers a and B and order information to the number protection provider 10. The order information may include an order identifier, such as an order number, etc.
Further, as shown in step 2, the protection service provider 10 may assign a privacy number X to the order; and binds the number A, B, the order information, and the privacy number X. Thereafter, the first user terminal 30 and the second user terminal 40 can communicate by dialing the X number. Specifically, the second user terminal 40 (dispenser) may dial the privacy number X by the number B (step 3). The privacy number provider 50 receives the communication request for the privacy number X, and may transmit the number B and the privacy number X to the number protection provider 10 in response to the request (step 4). The number protection provider 10 can query the order information bound by the privacy number X according to the privacy number X; then, according to the order information and the number B, the number to be dialed by the number B is determined as the number a (step 5). Thereafter, the number protection provider 10 may transmit the number a to the privacy number provider 50 (step 6). The privacy number provider 50 may forward the call dialed by the second subscriber 40 to the privacy number X to the number a of the first subscriber 30 (step 7). If the first user terminal 30 answers, a call service between the first user terminal 30 and the second user terminal 40 can be established, so that the first user terminal 30 and the second user terminal 40 communicate through the privacy number X. Of course, the first user side 30 can also dial the second user side 40 through the privacy number X, and the specific process can refer to the related content of the second user side 40 dialing the first user side 30 through the privacy number X, which is not described herein again.
The above embodiment is only exemplified by the case of performing call communication between the first user terminal 30 and the second user terminal 40 through the privacy number X. Of course, the first user end 30 and the second user end 40 may also communicate short messages and the like through the privacy number X. Different from the above-mentioned call communication, in step 3, the first user terminal 30 sends a short message to the privacy number X; in step 7, the privacy number X sends the short message to the number B of the second user terminal 40, so that the first user terminal 30 and the second user terminal 40 can also communicate the short message through the privacy number X. The short message can be a text short message, a voice short message or a multimedia message.
It should be noted that the above embodiment only exemplifies one-to-one bidirectional number protection, and exemplifies a manner of communication by the privacy number X. Of course, the privacy number communication can also be applied to the application scene of one-to-many or extension number calling. For example, in some application scenarios, the privacy number X may bind to any number a, and any other user may communicate with number a through the privacy number X. For example, in a rental or sales scenario, where the seller does not wish the actual number to be revealed, the number protection provider 10 may bind the privacy number X to the seller number a, through which any other user may communicate. Specifically, any user may dial a privacy number X; the privacy number provider 50 may send the privacy number X to the number protection provider 10; the number protection provider 10 can query the binding relationship by using the privacy number X to obtain a seller number a bound by the privacy number X; thereafter, the seller number a is sent to the privacy number provider 50; the privacy number provider 50 may forward the phone to the seller number a, enabling any user to communicate with the seller through the privacy number X.
In other embodiments, the privacy number X may be bound to any number a and bound to a set number group; number a may communicate with any number in the group of numbers via privacy number X. Specifically, any number in the number group may dial a privacy number X; the privacy number provider 50 may send the privacy number X to the number protection provider 10; the number protection provider 10 can query the binding relationship by using the privacy number X to obtain a number a bound by the privacy number X; thereafter, the number a is sent to the privacy number provider 50; the privacy number provider 50 may forward the phone to number a, enabling any number in the set to communicate with the seller through privacy number X.
The embodiment simply explains the communication process of the privacy number, and the privacy number technology can realize bidirectional number protection of both communication parties, hide real numbers of both parties and protect the privacy of both parties. However, with the continuous development of number privacy protection technology, the demand for privacy numbers is increasing. The number quantity provided by one operator platform can not meet the service requirement, and the number protection system needs to access the numbers of multiple operator platforms to guarantee the service. Because the technical capabilities of each operator platform are different, the quality and the cost of the provided privacy numbers are different, and therefore how to save the cost of the privacy number cost becomes a technical problem to be solved urgently in the privacy number scheduling process while ensuring the communication quality of the privacy numbers. In the embodiment of the application, the privacy number scheduling refers to scheduling the privacy numbers so as to adjust the number of the privacy numbers of the privacy number providers in the number protection system.
In the embodiment of the present application, in order to implement automatic scheduling of privacy numbers of multiple privacy number providers, a corresponding number scheduling method is proposed, and the number scheduling method provided in the embodiment of the present application is exemplarily described below from the perspective of protecting the providers by the number.
Fig. 3 is a flowchart illustrating a number scheduling method according to an embodiment of the present application. As shown in fig. 3, the number scheduling method mainly includes:
301. number attribute information of privacy numbers of a plurality of privacy number providers is acquired.
302. And determining the weights of the number attributes according to the importance degrees of the number attributes.
303. The number weight of a plurality of privacy number providers is determined according to the weight of a plurality of number attributes and the number attribute information.
304. And scheduling the privacy numbers of the privacy number providers according to the number weight of the privacy number providers.
In the embodiment of the present application, the privacy number provider refers to a service provider, such as a communication operator, that provides a privacy number resource. In the embodiment of the present application, the classification granularity of the privacy number provider is not limited. In some embodiments, the plurality of privacy number providers may be a plurality of operators; in other embodiments, multiple privacy number providers may be sub-platforms corresponding to different regions of the same operator, such as an operator in province a and C, an operator in province B and C, and the like. In the embodiments of the present application, a plurality means more than one, and may be 2 or more than 2.
Number attributes of a privacy number refer to evaluation indicators that can characterize the quality of the privacy number provided by the privacy number provider, including but not limited to: number cost, communication stability, number call completing rate and the like. The number attribute can be characterized by specific numerical quantized attribute values, such as the monthly communication failure number can be used for characterizing the communication stability.
Since the number attribute of the privacy number provider may reflect the quality or performance of the privacy number provided by the privacy number provider to some extent, in step 301, number attribute information of the privacy numbers of a plurality of privacy number providers may be acquired. The number attribute information of the privacy number may include: the method comprises the steps of obtaining a plurality of number attributes of a privacy number provider and attribute values corresponding to the number attributes. Plural means 2 or more.
In the embodiment of the present application, a specific implementation of obtaining number attribute information of a privacy number provider is not limited. In some embodiments, number attribute information for the privacy number of the privacy number provider may be entered by a corresponding technician of the number protection system. Alternatively, the number protection system may autonomously acquire the number attribute information of the privacy number provider. For example, the number protection system may acquire communication quality data of a privacy number provided by a privacy number provider within a set period of time; the communication quality data may include the number of times of use, the number of times of connection, the number of times of failure, and the like of the privacy number within a set time period. Further, number attribute information of each privacy number provider may be determined based on the communication quality data of each privacy number provider.
In the actual number protection service process, different application scenes have different requirements on the number attribute of the privacy number service, and different number protection demanders may have different requirements on the number attribute of the privacy number service. For example, some number protection demanders compare the cost of paying for the privacy number service, and require the cost to be first; some number protection demanders compare the communication stability and the call completing rate of the privacy number service under consideration, and the requirement quality is first and the like. These requirements on number attributes can be characterized by the importance of the number attributes, which determines the contribution of different number attributes in the scheduling of privacy numbers. In order to ensure the rationality of the privacy number scheduling, the number attributes with higher importance degree are generally required to have larger contribution degree in the privacy number scheduling. Based on this, in step 302, the weights of the plurality of number attributes may be determined according to the importance degrees of the plurality of number attributes. The weight of the number attribute can represent the contribution degree of the number attribute in subsequent privacy number scheduling. In the embodiment of the present application, the importance degree of a plurality of number attributes may be expressed by the relative importance degree between the plurality of number attributes, for example, the number attribute a i Is important toTo an extent greater than a j And the like. Accordingly, for n number attributes a i Can be represented as a 1 >a 3 >a 2 >…>a k And so on.
In the embodiment of the present application, a specific implementation of obtaining importance levels of multiple number attributes is not limited. In some embodiments, the importance of multiple number attributes may be predetermined. Specifically, a technician of the number protection system may set the importance levels of a plurality of number attributes according to the application scenario of the number protection, and set the importance levels in the number protection system in advance. Alternatively, a technician of the number protection system may determine the importance of a plurality of number attributes according to the requirement of the number protection demander, and set the importance in the number protection system in advance. Accordingly, step 302 may determine the weights of the number attributes according to the preset importance degrees of the number attributes.
Of course, the number protection system may also determine the importance of multiple number attributes and the like according to the service characteristics of the number protection demander. For example, the service characteristics of the number protection demander can be input into a pre-trained ranking model, and the ranking model is used to determine the importance of a plurality of number attributes.
In the embodiments of the present application, a specific implementation manner of determining the weight of the plurality of number attributes is not limited. In some embodiments, a pairwise comparison matrix of number attributes may be constructed based on the importance of a plurality of number attributes. Wherein, the elements in the pair comparison matrix of the number attribute can represent the scale of the comparison of the importance degrees of different attributes. Since the elements in the pair-wise comparison matrix of number attributes may characterize the scale of comparison of the importance levels of different attributes, the weights of multiple number attributes may be determined from the pair-wise comparison matrix of number attributes.
Alternatively, an analytic hierarchy process may be used to construct a pairwise comparison matrix of number attributes according to the importance of a plurality of number attributes. The analytic hierarchy process can decompose the problem into different composition factors according to the nature of the problem and the total target to be achieved, and the factors are gathered and combined according to different levels according to the mutual correlation influence and membership among the factors to form a multi-level analytic structure model, so that the problem is finally summarized into the determination of the relative important weight of the lowest layer (scheme, measure and the like for decision making) relative to the highest layer (total target) or the scheduling of the relative order of superiority and inferiority. In the examples of the present application, the specific implementation of the analytic hierarchy process is not limited. The following description will exemplify the above-described embodiment of determining the weight of a plurality of number attributes, taking the analytic hierarchy process as the Santy-pair comparison matrix scaling method as an example.
Assume that the number of privacy number providers is m; m is more than or equal to 2 and is an integer, and each privacy number provider is assumed to comprise n number attributes, and each number attribute is marked as a j . Wherein n is not less than 2 and is an integer; j is 1,2, …, n. The importance levels of the plurality of number attributes may be represented by an attribute importance level sequence Z. For example a p Degree of importance of q Same, then a p =a q (ii) a If a p Greater than a r Then a is p >a r Finally, an importance sequence Z can be obtained: a is p =a q >a r . Furthermore, n attribute values of m privacy number providers are expressed in a matrix form, and the j number attribute value corresponding to the ith privacy number provider is recorded as x ij Obtaining a number attribute value matrix M of a plurality of privacy number providers a1 . Where i denotes the ith privacy number provider, and i ═ 1,2, …, m. Number attribute value matrix M of multiple privacy number providers a1 Can be expressed as:
Figure GDA0003596638860000071
further, a pair comparison matrix of the number attributes is constructed according to the importance degrees of the number attributes. Specifically, the scale between two number attributes can be obtained based on the Santy-pairwise comparison matrix scaling method shown in table 1 below according to the importance of a plurality of number attributes, and then the pairwise comparison matrix of the number attributes can be obtained.
TABLE 1 Santy-paired comparison matrix Scale basis
Scale According to
1 a p =a q
3 a p >a q
5 a p >a u >a q
7 a p >a u >a v >a q
9 a p >a u >…>a v >a q
As shown in Table 1, if the number attribute a p And a q The degree of importance of is p =a q Then number attribute a p And a q The scale in the contrast matrix obtained by the comparison is 1. If the number attribute a p And a q The degree of importance of is p >a q Then number attribute a p And a q The scale in the contrast matrix obtained by the comparison was 3. If the number attribute a p And a q The degree of importance of is p >a u >a q I.e. a p And a q BetweenWith an additional number attribute a u Importance ratio of q Is large but larger than a p Small, then number attribute a p And a q The scale in the contrast matrix obtained by the comparison was 5. If the number attribute a p And a q There are 2 number attributes a in between u And a v Importance ratio of q Is large but larger than a p Small, then number attribute a p And a q The scale in the comparison matrix obtained by comparison is 7. If the number attribute a p And a q The importance degree of more than 2 other number attributes in between is more than a q Is large but larger than a p Small, then number attribute a p And a q The scale in the contrast matrix obtained by the comparison is 9, and so on. The indices of the number attribute a in table 1 are equal to 1,2, …, n.
In the embodiment of the application, the number attribute a p And a q The degree of importance of (A) is compared to obtain a scale value which is recorded as y pq . Accordingly, number attribute a q And a p Compared with the obtained scale value y qp Can be expressed as:
Figure GDA0003596638860000072
based on the Santy-pairwise comparison matrix scaling method shown in Table 1, the scale between every two number attributes is obtained, and further, a pairwise comparison matrix of the number attributes is obtained and is marked as M a2 . Wherein, the pair-wise comparison matrix M of the number attributes a2 Can be expressed as:
Figure GDA0003596638860000081
furthermore, a pair comparison matrix M of number attributes corresponding to the n number attributes can be used a2 Weights for a plurality of number attributes are determined. Specifically, each number attribute a may be obtained from a pair-wise comparison matrix of number attributes j A scale against which a plurality of number attributes are compared; calculating labels for comparing each number attribute with multiple number attributesDegree and; for any number attribute a j Determining the number attribute a j Scale comparison to multiple number attributes and comparison to all number attributes (e.g., a) 1 -a n ) The ratio between the sum of the scales compared with the plurality of number attributes is any number attribute a j The weight of (c). The corresponding calculation formula of this embodiment can be expressed as:
Figure GDA0003596638860000082
in formula (4) w j Indicating number attribute a j The weight of (c); y is jq Indicating number attribute a j And number attribute a q Scale of comparison. Accordingly, the weights of the n number attributes may be represented as a weight matrix M of number attributes of n x 1 a3
M a3 =[w 1 w 2 …w n ] T (5)。
The weight of the number attribute can reflect the contribution degree of the number attribute to subsequent privacy number scheduling to a certain extent, wherein the greater the weight of the number attribute is, the greater the contribution degree to the privacy number scheduling is. Based on this, in step 303, number weight weights of a plurality of privacy number providers can be determined based on the weights of the plurality of number attributes and number attribute information corresponding to the plurality of privacy number providers. The number weight of the privacy number provider refers to the weight of the number of the privacy numbers provided by the privacy number provider, and can represent the proportion of the privacy numbers provided by the privacy number provider in all the privacy numbers used by the number protection system. The number weight of the privacy number provider is taken into account with the weight of each number attribute of the privacy number provider, namely, the contribution degree of the number attribute of the privacy number provider to the number weight of the privacy number provider is taken into account, so that the number attribute which has a large influence on the number weight of the privacy number provider is made, and the contribution degree to the determined number weight is large, and therefore, the reasonability of the determined number weight is improved.
Specifically, for any privacy number provider i, the weighting of multiple number attributes may be utilized to be hiddenThe number attribute information of the private number provider i is subjected to weighted summation to obtain an attribute weighted value r of the private number provider i i
The different number attributes differ in their goodness measures. For the cost-type number attribute, the smaller the corresponding attribute value is, the lower the cost is, and the more beneficial the number protection system is; for the number attribute of the performance type, the larger the corresponding attribute value is, the better the performance of the number protection system is. Based on this, in order to measure the quality of the number attribute with a uniform standard, for any privacy number provider i, the number attribute information of the privacy number provider i can be normalized to obtain the normalized number attribute information of the privacy number provider i. Furthermore, the normalized number attribute information of any privacy number provider i can be weighted and summed by using the weights of a plurality of number attributes to obtain an attribute weighted value r of any privacy number provider i i
After obtaining the attribute weighted value of the privacy number provider, for any privacy number provider i, the attribute weighted value r of the privacy number provider can be obtained i And attribute weighted values of a plurality of privacy number providers, and determining the number weight of the privacy number provider i. Specifically, the sum of attribute weighted values of a plurality of privacy number providers can be calculated; and normalizing the attribute weighted value of the privacy number provider i by using the sum of the attribute weighted values of the privacy number providers to obtain the number weight of the privacy number provider i.
To facilitate understanding of the above-described embodiments for determining the number weight of the privacy number provider, the following describes an exemplary implementation process for determining the number weight of the privacy number provider in combination with a specific formula.
A number attribute value matrix M that accommodates a plurality of privacy number providers shown in the above equation (1) a1 Number attribute value x of a plurality of privacy number providers is known ij The method mainly comprises two types, wherein one type is a cost index, namely the smaller the index is, the better the model is; one is a performance type indicator, i.e., the larger the better the type. And carrying out normalization processing on the attribute values of different types. Among other things, cost metrics may include: privacy number cost attributes, etc.; the performance type indicators may include: privacyNumber call-through rate, privacy number communication stability, etc.
The normalized formula of the cost index can be expressed as:
Figure GDA0003596638860000091
wherein, in the formula (6),
Figure GDA0003596638860000092
is the minimum value among the attribute values corresponding to the number attribute belonging to the cost-type index of the jth privacy number provider (i.e., the above-mentioned m privacy number providers). x is the number of ij An attribute value corresponding to the jth number attribute belonging to the cost-type index of the privacy number provider i; x' ij And indicating a normalized attribute value corresponding to the jth number attribute belonging to the cost index of the privacy number provider i.
The normalized formula of the performance index can be expressed as:
Figure GDA0003596638860000093
wherein, in formula (7), f * j The number attribute value corresponding to the jth number of the plurality of privacy number providers (i.e., the above-described m privacy number providers) belonging to the performance type indicator is the maximum value. x is the number of ij An attribute value corresponding to the jth number attribute belonging to the performance type index of the privacy number provider i; x' ij And indicating a normalized attribute value corresponding to the jth number attribute belonging to the performance type index of the privacy number provider i.
Based on the above equations (6) and (7), the number attribute information of a plurality of privacy number providers can be normalized to obtain normalized number attribute information corresponding to each privacy number provider, that is, the number attribute value matrix M in the above equation (1) a1 Conversion normalization number attribute information matrix Ma' 1
Figure GDA0003596638860000094
Further, the normalized number attribute information of any privacy number provider i can be weighted and summed by using the weights of the n number attributes shown in the above equation (5), and an attribute weighted value r of any privacy number provider i is obtained i . The calculation formula can be expressed as:
Figure GDA0003596638860000101
wherein, in the formula (9), r i An attribute weighted value of a privacy number provider i; i is 1,2, …, m. x' it A normalized attribute value corresponding to the t-th number attribute representing the privacy number provider i; t is 1,2, …, n.
Further, the sum of attribute weighted values of a plurality of privacy number providers can be calculated; and utilizing the sum of the attribute weighted values of the plurality of privacy number providers to the attribute weighted value r of the privacy number provider i i Normalization processing is carried out to obtain the number weight r 'of the privacy number provider i' i Whose formula can be expressed as
Figure GDA0003596638860000102
The number weight determining mode of the privacy number provider is not influenced by the number attribute quantity and the specific attribute value of the privacy number provider, and the application range is wide. The number weight determination mode can be used for automatically determining the number weight of each privacy number provider by only determining the ranking of the importance degree of the number attributes of the privacy number providers.
After the number weights for the plurality of privacy number providers are determined, then, in step 304, the privacy numbers of the plurality of privacy number providers may be scheduled according to the number weights for the plurality of privacy number providers. In the embodiment of the application, scheduling the privacy numbers of the multiple privacy number providers mainly refers to scheduling or adjusting the number of the privacy numbers of the multiple privacy number providers in the number protection system. Aiming at any number protection demander, the number of the privacy numbers used by the number protection demander in the number protection system can be scheduled or adjusted.
Alternatively, the number of privacy numbers of the privacy number provider currently used may be acquired. For example, for a certain number protection demander, the number of privacy numbers of the privacy number provider currently used by the number protection demander may be acquired. Furthermore, the privacy numbers of the privacy number providers can be dispatched step by step according to the number weight of the privacy number providers and the number of the privacy number providers used currently. The step-by-step scheduling of the privacy numbers of the privacy number providers refers to batch scheduling of the privacy numbers of the privacy number providers in the number protection system. Optionally, the privacy numbers of the multiple privacy number providers can be scheduled one by one according to the number weight of the multiple privacy number providers and the number of the currently used privacy number providers, that is, after one privacy number provider is scheduled, the next privacy number provider is scheduled.
Specifically, for a first privacy number provider which is not scheduled, the number of privacy numbers which need to be scheduled by the first privacy number provider can be determined according to the number weight of the first privacy number provider, the number of privacy numbers of the currently used privacy number provider and the scheduling result of the scheduled privacy number provider. Optionally, the number of the privacy numbers to be scheduled by the first privacy number provider is a quantity to be requested, and a mathematical model is established according to the number of the currently used privacy number providers and the scheduling result of the scheduled privacy number providers by taking the proportion of the privacy numbers provided by the first privacy number provider equal to the number weight of the first privacy number provider as a target; and solving the mathematical model to obtain the number of the privacy numbers to be scheduled by the first privacy number provider.
Further, the number of the privacy numbers of the first privacy number provider can be scheduled according to the number of the privacy numbers that the first privacy number provider needs to schedule. After the first privacy number provider finishes scheduling, the next unscheduled privacy number provider can be acquired as a new first privacy number provider, and the operation of determining the number of the privacy numbers which need to be scheduled by the first privacy number provider is returned to be executed until the plurality of privacy number providers finish scheduling.
To facilitate understanding of the above-described embodiments for determining number weight of privacy number providers, the following describes an exemplary implementation process for scheduling privacy numbers of multiple privacy number providers according to a specific formula.
Specifically, the number of privacy numbers of the privacy number provider currently used may be acquired from the number protection system. Specifically, the number of privacy numbers of each privacy number provider currently used may be acquired from the number protection system and recorded as num i 。num i Indicating the number of privacy numbers of the ith privacy number provider currently in use. Accordingly, the total number of privacy numbers S currently in use may be expressed as:
Figure GDA0003596638860000111
further, the number of privacy number provider i may be weighted by r' i D is used as the target weight of the privacy number provider i after scheduling, and the number of the privacy numbers which the privacy number provider i needs to schedule is set i . Accordingly, the number d of privacy numbers that the privacy number provider i needs to schedule may be i For the amount to be requested, a mathematical model is established by taking the account ratio of the privacy numbers provided by the first privacy number provider equal to the number weight of the first privacy number provider as a target:
Figure GDA0003596638860000112
wherein, in formula (12), S > 0. In the embodiment of the application, for the case that the number protection system does not have a privacy number actually used currently, that is, S is 0, S may be initially assigned as a positive integer when the privacy number is scheduled.
From the mathematical model (12) a privacy number can be derivedNumber d of privacy numbers that provider i needs to schedule i Comprises the following steps:
Figure GDA0003596638860000113
wherein d is i >0 indicates that privacy number provider i needs to add privacy number, d i <0 indicates that the privacy number provider i needs to reduce the privacy number.
Further, the number d of privacy numbers that need to be scheduled by the privacy number provider i i And scheduling the privacy number of the privacy number provider i. Wherein, if d i >0, then d is added in the number protection system i The privacy number of individual privacy number provider i; if d is i <0, d is reduced from the number of the privacy numbers of the privacy number providers which are currently used and obtained i The absolute value of (a) the privacy number of privacy number provider i.
The total number of the privacy numbers used by the number protection system after the ith scheduling is as follows:
S i =S i-1 +d i-1 (14)
for the (i +1) th scheduling, the total number S of the privacy numbers after the ith scheduling can be determined i And substituting the total number of the privacy numbers currently used by the number protection system into the formula (13), and solving to obtain a privacy number scheduling result for the privacy number provider (i + 1). And repeating the operations until the privacy number scheduling of the m privacy number providers is completed.
The step-by-step scheduling of the plurality of privacy number providers can realize the privacy number scheduling on the premise of ensuring that the privacy number proportion of each privacy number provider is equal to the calculated theoretical number weight, and is beneficial to improving the accuracy of the privacy number scheduling. This is because, when the number of privacy numbers provided by the privacy number providers is changed by scheduling all the privacy number providers as a whole, the proportion of the privacy numbers provided by the privacy number providers cannot be matched with the calculated weight of the theoretical number, and therefore, it is necessary to schedule the privacy numbers provided by a plurality of privacy number providers step by step.
In the embodiment of the present application, the trigger condition for executing the number scheduling method is not limited. In some embodiments, the number protection system may execute the number scheduling method according to a set scheduling period; alternatively, the number scheduling method described above may be performed in response to a scheduling trigger operation. In other embodiments, the number dispatch operation may be triggered by the number protection demander. Correspondingly, the number scheduling operation can be executed in response to the privacy number scheduling request; further, the privacy number scheduling results for the plurality of privacy number providers may also be provided to the sender initiating the privacy number scheduling request. The sender may output a privacy number scheduling result, and so on.
It should be noted that the number scheduling method may be a real scheduling or a simulated scheduling when scheduling privacy numbers of multiple privacy number providers. For the embodiment of performing the simulated scheduling of the privacy numbers for a plurality of privacy number providers, the privacy numbers are scheduled for the plurality of privacy number providers according to the number weights of the plurality of privacy number providers, and the privacy number scheduling result is obtained. Further, a privacy number scheduling result can be output for a user to view and the like.
According to the number scheduling method provided by the embodiment, the weights of a plurality of number attributes can be determined according to the importance degrees of the number attributes of the privacy number provider; determining the number weight weights of a plurality of privacy number providers according to the weights of the number attributes and the number attribute information of the privacy numbers of the privacy number providers; and then, the privacy number providers can be scheduled according to the number weight of the privacy number providers, so that the automatic scheduling of the privacy numbers of the privacy number platform is realized, the contribution degree of different number attributes of the privacy number providers to the number weight of the privacy number providers is considered in the privacy number scheduling process, and the rationality of the privacy number scheduling is improved.
In addition, the number scheduling mode provided by the embodiment of the application is wide in application range and can be repeatedly used. When the privacy number provider changes or the number attribute of the privacy number provider changes, the number attribute of a new privacy number provider can be obtained again or new number attribute can be obtained, and the number attribute of the newly obtained privacy number provider is utilized, so that the real-time scheduling of the privacy number in the number protection system can be realized only through the number scheduling operation, and the number protection system is kept in dynamic balance.
It should be noted that the execution subjects of the steps of the methods provided in the above embodiments may be the same device, or different devices may be used as the execution subjects of the methods. For example, the execution subject of steps 301 and 302 may be device a; for another example, the execution subject of step 301 may be device a, and the execution subject of step 302 may be device B; and so on.
In addition, in some of the flows described in the above embodiments and the drawings, a plurality of operations are included in a specific order, but it should be clearly understood that the operations may be executed out of the order presented herein or in parallel, and the sequence numbers of the operations, such as 301, 302, etc., are merely used for distinguishing different operations, and the sequence numbers do not represent any execution order per se. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel.
Accordingly, embodiments of the present application also provide a computer-readable storage medium storing computer instructions, which, when executed by one or more processors, cause the one or more processors to perform the steps of the number scheduling method.
Embodiments of the present application further provide a computer program product, including a computer program. The computer program, when executed by a processor, causes the processor to perform the steps of the number scheduling method described above. In the embodiments of the present application, a specific implementation form of the computer program product is not limited in the embodiments of the present application. In some embodiments, the computer program product may be implemented as a software function module, a service website, a number protection system in communication software, or the like. In other embodiments, the computer program product may be deployed in the cloud and implemented as software as a service as a software as a service (SaaS), such as a number protection system in a cloud communication system.
Fig. 4 is a schematic structural diagram of a computing device according to an embodiment of the present application. As shown in fig. 4, a computing device may include: a memory 40a and a processor 40 b; the memory 40a is used for storing computer programs.
The processor 40b is coupled to the memory 40a for executing a computer program for: acquiring number attribute information of privacy numbers of a plurality of privacy number providers; determining the weight of the number attributes according to the importance degrees of the number attributes; determining number weight weights of a plurality of privacy number providers according to the weights of the number attributes and the number attribute information; and scheduling the privacy numbers of the privacy number providers according to the number weight of the privacy number providers.
In some embodiments, the processor 40b, when determining the weights of the plurality of number attributes, is specifically configured to: according to the importance degrees of the number attributes, a pair comparison matrix of the number attributes is constructed; and determining the weights of the plurality of number attributes according to the pair-wise comparison matrix of the number attributes.
Optionally, the processor 40b is specifically configured to, when constructing the pair-wise comparison matrix of number attributes: and adopting an analytic hierarchy process to construct a pair comparison matrix of the number attributes according to the importance degrees of the number attributes.
Optionally, when the processor 40b determines the weights of the plurality of number attributes, it is specifically configured to: obtaining the scale of each number attribute compared with a plurality of number attributes from the pair comparison matrix of the number attributes; calculating the scale sum of all number attributes compared with a plurality of number attributes; for any number attribute, determining the ratio between the scale of any number attribute compared with the plurality of number attributes and the scale sum of all number attributes compared with the plurality of number attributes as the weight of any number attribute.
In other embodiments, the processor 40b, when determining the number weight of the plurality of privacy number providers, is specifically configured to: for any privacy number provider, carrying out weighted summation on the number attribute information of any privacy number provider by using the weights of a plurality of number attributes to obtain an attribute weighted value of any privacy number provider; and determining the number weight of any privacy number provider according to the attribute weighted value of any privacy number provider and the attribute weighted values of a plurality of privacy number providers.
Optionally, when determining the number weight of any privacy number provider, the processor 40b is specifically configured to: calculating the sum of attribute weighted values of a plurality of privacy number providers; and normalizing the attribute weighted value of any privacy number provider by using the sum of the attribute weighted values of a plurality of privacy number providers to obtain the number weight of any privacy number provider.
Optionally, when the processor 40b performs weighted summation on the number attribute information of any privacy number provider, the processor is specifically configured to: normalizing the number attribute information of any privacy number provider to obtain the normalized number attribute information of any privacy number provider; and carrying out weighted summation on the normalized number attribute information of any privacy number provider by using the weights of the number attributes to obtain an attribute weighted value of any privacy number provider.
In still other embodiments, the processor 40b, when scheduling the privacy numbers of the plurality of privacy number providers, is specifically configured to: acquiring the number of privacy numbers of a privacy number provider used currently; and performing privacy number step-by-step scheduling on the plurality of privacy number providers according to the number weight of the plurality of privacy number providers and the number of the privacy numbers of the currently used privacy number providers.
Optionally, when performing privacy number step scheduling on multiple privacy number providers, the processor 40b is specifically configured to: aiming at a first privacy number provider which is not scheduled, determining the number of the privacy numbers which need to be scheduled by the first privacy number provider according to the number weight of the first privacy number provider, the number of the currently used privacy number providers and the scheduling result of the scheduled privacy number provider; scheduling the privacy numbers of the first privacy number provider according to the number of the privacy numbers to be scheduled by the first privacy number provider; and obtaining the next unscheduled privacy number provider as a new first privacy number provider, and returning to execute the operation of determining the number of the privacy numbers which need to be scheduled by the first privacy number provider until the plurality of privacy number providers are scheduled.
Optionally, when determining the number of privacy numbers that the first privacy number provider needs to schedule, the processor 40b is specifically configured to: establishing a mathematical model according to the number of the privacy numbers of the currently used privacy number providers and the scheduling result of the scheduled privacy number providers by taking the number of the privacy numbers to be scheduled by the first privacy number provider as a quantity to be solved and taking the proportion of the privacy numbers provided by the first privacy number provider equal to the number weight of the first privacy number provider as a target; and solving the mathematical model to obtain the number of the privacy numbers to be scheduled by the first privacy number provider.
Optionally, the processor 40b is further configured to: the privacy number scheduling results obtained by performing privacy number scheduling on a plurality of privacy number providers are provided to the sender initiating the privacy number scheduling request through the communication component 40c, so that the sender can output the privacy number scheduling results.
In some optional implementations, as shown in fig. 4, the computing device may further include: power supply component 40d, and the like. Only some of the components are schematically shown in fig. 4, and it is not meant that the computing device must include all of the components shown in fig. 4, nor that the computing device can include only the components shown in fig. 4.
The computing device provided by the embodiment can determine the weights of the number attributes according to the importance degrees of the number attributes of the privacy number provider; determining the number weight weights of a plurality of privacy number providers according to the weights of the number attributes and the number attribute information of the privacy numbers of the privacy number providers; and then, the privacy number providers can be scheduled according to the number weight of the privacy number providers, so that the automatic scheduling of the privacy numbers of the privacy number platform is realized, the contribution degree of different number attributes of the privacy number providers to the number weight of the privacy number providers is considered in the privacy number scheduling process, and the rationality of the privacy number scheduling is improved.
In embodiments of the present application, the memory is used to store computer programs and may be configured to store other various data to support operations on the device on which it is located. Wherein the processor may execute a computer program stored in the memory to implement the corresponding control logic. The memory may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
In the embodiments of the present application, the processor may be any hardware processing device that can execute the above described method logic. Alternatively, the processor may be a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), or a Micro Controller Unit (MCU); programmable devices such as Field-Programmable Gate arrays (FPGAs), Programmable Array Logic devices (PALs), General Array Logic devices (GAL), Complex Programmable Logic Devices (CPLDs), etc. may also be used; or Advanced Reduced Instruction Set (RISC) processors (ARM), or System On Chips (SOC), etc., but is not limited thereto.
In embodiments of the present application, the communication component is configured to facilitate wired or wireless communication between the device in which it is located and other devices. The device in which the communication component is located can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, 4G, 5G or a combination thereof. In an exemplary embodiment, the communication component receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component may also be implemented based on Near Field Communication (NFC) technology, Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, or other technologies.
In the embodiment of the present application, the display assembly may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the display assembly includes a touch panel, the display assembly may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
In embodiments of the present application, a power supply component is configured to provide power to various components of the device in which it is located. The power components may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device in which the power component is located.
In embodiments of the present application, the audio component may be configured to output and/or input audio signals. For example, the audio component includes a Microphone (MIC) configured to receive an external audio signal when the device in which the audio component is located is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in a memory or transmitted via a communication component. In some embodiments, the audio assembly further comprises a speaker for outputting audio signals. For example, for devices with language interaction functionality, voice interaction with a user may be enabled through an audio component, and so forth.
It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
The storage medium of the computer is a readable storage medium, which may also be referred to as a readable medium. Readable storage media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (11)

1. A number scheduling method, comprising:
acquiring number attribute information of privacy numbers of a plurality of privacy number providers;
determining the weights of the number attributes according to the importance degrees of the number attributes;
determining number weight weights of the privacy number providers according to the weights of the number attributes and the number attribute information; wherein, the number weight refers to the weight of the number of the privacy numbers provided by the privacy number provider;
and scheduling the privacy numbers of the privacy number providers according to the number weight of the privacy number providers.
2. The method of claim 1, wherein determining the weight of the number attributes according to the importance of the number attributes comprises:
according to the importance degrees of the number attributes, a pair comparison matrix of the number attributes is constructed;
and determining the weights of the plurality of number attributes according to the pair comparison matrix of the number attributes.
3. The method of claim 2, wherein constructing a pairwise comparison matrix of number attributes based on the importance of the number attributes comprises:
and adopting an analytic hierarchy process to construct a pair comparison matrix of the number attributes according to the importance degrees of the number attributes.
4. The method of claim 1, wherein determining number quantity weights for the plurality of privacy number providers based on the weights for the plurality of number attributes and the number attribute information comprises:
for any privacy number provider, carrying out weighted summation on the number attribute information of the privacy number provider by utilizing the weights of the number attributes to obtain an attribute weighted value of the privacy number provider;
and determining the number weight of any privacy number provider according to the attribute weighted value of any privacy number provider and the attribute weighted values of the plurality of privacy number providers.
5. The method of claim 4, wherein the weighted summing of the number attribute information for any of the privacy number providers using the weights for the plurality of number attributes comprises:
normalizing the number attribute information of any privacy number provider to obtain normalized number attribute information of any privacy number provider;
and carrying out weighted summation on the normalized number attribute information of any privacy number provider by using the weights of the number attributes to obtain an attribute weighted value of any privacy number provider.
6. The method as claimed in claim 1, wherein said scheduling the privacy numbers of the plurality of privacy number providers according to the number weight of the plurality of privacy number providers comprises:
acquiring the number of privacy numbers of a privacy number provider used currently; and step-by-step scheduling is carried out on the privacy numbers of the privacy number providers according to the number weight of the privacy number providers and the number of the privacy number providers used currently.
7. The method of claim 6, wherein the step scheduling the privacy numbers of the plurality of privacy number providers based on the number weight of the plurality of privacy number providers and the number of privacy numbers of the currently used privacy number providers comprises:
for a first privacy number provider which is not scheduled, determining the number of the privacy numbers which need to be scheduled by the first privacy number provider according to the number weight of the first privacy number provider, the number of the privacy numbers of the currently used privacy number provider and the scheduling result of the scheduled privacy number provider;
scheduling the privacy numbers of the first privacy number provider according to the number of the privacy numbers to be scheduled by the first privacy number provider;
and obtaining the next unscheduled privacy number provider as a new first privacy number provider, and returning to execute the operation of determining the number of the privacy numbers which need to be scheduled by the first privacy number provider until the plurality of privacy number providers are scheduled completely.
8. The method according to claim 7, wherein the determining the number of the privacy numbers that the first privacy number provider needs to schedule according to the number weight of the first privacy number provider, the number of the privacy numbers of the currently used privacy number providers and the scheduling result of the scheduled privacy number providers comprises:
establishing a mathematical model according to the number of the currently used privacy number providers and the scheduling result of the scheduled privacy number providers by taking the number of the privacy numbers to be scheduled by the first privacy number provider as a quantity to be solved and the number weight of the first privacy number provider as an objective;
and solving the mathematical model to obtain the number of the privacy numbers to be scheduled by the first privacy number provider.
9. The method according to any one of claims 1-8, further comprising:
and providing the privacy number scheduling results obtained by scheduling the privacy numbers of the privacy number providers to a sender initiating a privacy number scheduling request so that the sender can output the privacy number scheduling results.
10. A computing device, comprising: a memory and a processor; wherein the memory is to store a computer program;
the processor is coupled to the memory for executing the computer program for performing the steps of the method of any of claims 1-9.
11. A computer-readable storage medium having stored thereon computer instructions, which, when executed by one or more processors, cause the one or more processors to perform the steps of the method of any one of claims 1-9.
CN202111387931.8A 2021-11-22 2021-11-22 Number scheduling method, equipment and storage medium Active CN113852723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111387931.8A CN113852723B (en) 2021-11-22 2021-11-22 Number scheduling method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111387931.8A CN113852723B (en) 2021-11-22 2021-11-22 Number scheduling method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113852723A CN113852723A (en) 2021-12-28
CN113852723B true CN113852723B (en) 2022-08-16

Family

ID=78982176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111387931.8A Active CN113852723B (en) 2021-11-22 2021-11-22 Number scheduling method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113852723B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115297444B (en) * 2022-09-13 2023-10-20 广西东信易通科技有限公司 Message collection method and system based on 5G network and security privacy number

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107580151A (en) * 2017-09-14 2018-01-12 北京行圆汽车信息技术有限公司 The distribution method and device of virtual-number
CN112616143A (en) * 2020-12-18 2021-04-06 南京领行科技股份有限公司 Method and device for distributing communication number, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112671864B (en) * 2020-12-15 2023-04-07 广西东信易通科技有限公司 Privacy number dynamic allocation system based on active request

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107580151A (en) * 2017-09-14 2018-01-12 北京行圆汽车信息技术有限公司 The distribution method and device of virtual-number
CN112616143A (en) * 2020-12-18 2021-04-06 南京领行科技股份有限公司 Method and device for distributing communication number, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113852723A (en) 2021-12-28

Similar Documents

Publication Publication Date Title
TWI736673B (en) Incoming call processing method, device and terminal
CN111861569B (en) Product information recommendation method and device
US20130253969A1 (en) Broadcast Messaging of Incentives Based on Value
EP3554152B1 (en) Categorized location identification based on historical locations of a user device
JP2015534148A (en) A machine learning model for hierarchically based arrays
CN103368869B (en) Network flow managing system and method
CN111010426A (en) Message pushing method and device
CN111932238B (en) Payment account recommendation method and device and electronic equipment
CN111010527B (en) Method and related device for establishing video call through short message link
CN105491085A (en) Method and device for on-line requesting for queuing
CN113852723B (en) Number scheduling method, equipment and storage medium
Varalakshmi et al. Multifaceted trust management framework based on a trust level agreement in a collaborative cloud
CN106998314A (en) Account exchange method and device
US10419359B2 (en) Resource path monitoring
US20160381227A1 (en) Methods and apparatuses for connecting consumers to local service providers
Akingbesote et al. Performance modeling of proposed guiset middleware for mobile healthcare services in e‐marketplaces
CN111953650A (en) Service account logout method, device, equipment and storage medium
CN114140033B (en) Service personnel allocation method and device, electronic equipment and storage medium
CN111163237B (en) Call service flow control method and related device
KR20120132453A (en) Processing method for financial products admission and financial server for the same
CN106598987A (en) Information recommendation method and device
US20200210914A1 (en) Risk management system interface
CN107861962B (en) Template recommendation method and device
CN110659979A (en) Method and apparatus for predicting loss rate of default, storage medium, and electronic device
KR101838397B1 (en) Apparatus for processing data capacity and control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40064980

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant