CN115563173A - Data processing method, device, equipment and medium - Google Patents

Data processing method, device, equipment and medium Download PDF

Info

Publication number
CN115563173A
CN115563173A CN202211193667.9A CN202211193667A CN115563173A CN 115563173 A CN115563173 A CN 115563173A CN 202211193667 A CN202211193667 A CN 202211193667A CN 115563173 A CN115563173 A CN 115563173A
Authority
CN
China
Prior art keywords
user information
target user
task
condition
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211193667.9A
Other languages
Chinese (zh)
Inventor
侯美雪
胡伟
陈仲宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202211193667.9A priority Critical patent/CN115563173A/en
Publication of CN115563173A publication Critical patent/CN115563173A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24573Query processing with adaptation to user needs using data annotations, e.g. user-defined metadata
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Library & Information Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present application relates to the field of data access technologies, and in particular, to a data processing method, apparatus, device, and medium. In the method, one or more first tasks are determined according to a plurality of query requests in response to the plurality of query requests. Each query request comprises a first condition, and the first condition of each query request in the query requests in each first task is the same. And aiming at any first task, determining first target user information from a database according to a first condition contained in any first task, wherein the first target user information meets the first condition contained in any first task. And displaying the first target user information. In the above scheme, in the data processing process, the plurality of query requests are merged into the first task, and the target user information is screened according to the first task, so that compared with a scheme of screening the target user information according to each query request, the computing resources can be saved, and the data processing is more efficient.

Description

Data processing method, device, equipment and medium
Technical Field
The present application relates to the field of data access technologies, and in particular, to a data processing method, apparatus, device, and medium.
Background
With the development of the internet, a high-speed computing system of a computer can help people to perform correlation analysis data among huge information data. The data storage, processing and analysis drive the development of big data. However, as the total amount of data query requests submitted by users increases greatly, higher demands are made on the ability to process data.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, data processing equipment and a data processing medium, which are used for enabling data processing to be more efficient.
In a first aspect, an embodiment of the present application provides a data processing method, including:
in response to a plurality of query requests, determining one or more first tasks from the plurality of query requests; each query request comprises a first condition, and the first conditions of the query requests in each first task are the same; the first condition includes one or more of: a business type and a risk type of the data;
for any first task, determining target user information from a database according to a first condition contained in the any first task; wherein the first target user information meets a first condition contained in any one of the first tasks;
and displaying the first target user information.
In the above method, one or more first tasks are determined based on the plurality of query requests. Each of the query requests included in each first task includes the same first condition, and therefore, the first task may include a plurality of query requests having the same first condition. In the data processing process, compared with processing each query request, the first task containing a plurality of query requests can save computing resources, and the data processing is more efficient.
Optionally, the method further includes:
under the condition that the parameter length of any first task is larger than a first threshold value, dividing a query request contained in any first task into at least two subtasks; wherein the parameter length of each subtask is not greater than the first threshold;
the determining, according to the first condition included in any of the first tasks, the first target user information from the database specifically includes:
and aiming at any subtask, determining the first target user information from the database according to a first condition contained in the subtask.
In the method, the first task which is larger than the first threshold value is divided into at least two subtasks, so that the problem that the system cannot process the first task due to the fact that the parameter length of the first task is too long can be prevented.
Optionally, the determining one or more first tasks according to the plurality of query requests specifically includes:
determining one or more first query request sets from the plurality of query requests according to the risk type of the data; wherein each first set of query requests includes a risk type for the data;
and aiming at any first query request set, determining the one or more first tasks from the any first query request set according to the service type.
In the method, one or more first tasks are determined step by step according to the risk type and the business type of the data. The plurality of query requests are made to become one or more first tasks. The risk type and the business type of the data contained in each query request in the query requests contained in the first task are the same, so that the first target user information can be conveniently determined through the risk type and the business type of the data contained in the first task.
Optionally, each query task further includes a second condition, and after determining, for any first task, target user information from a database according to the first condition included in the any first task, the method further includes:
determining second target user information from the first target user information according to the second condition; wherein the second target user information meets any second condition contained in the first task; the second condition contains one or more types of user information of interest.
In the method, all the second target user information satisfying the second condition in the first target user information may be determined. And the second target user information and the corresponding control behavior are conveniently stored in the first list subsequently. And sending the first list to a service system corresponding to the service type, and controlling the user corresponding to the second target user information by the service system according to the first list.
Optionally, the method further includes:
acquiring a control behavior corresponding to the second target user information, and storing the second target user information and the control behavior in a first list;
and sending the first list to a service system corresponding to the service type.
In the method, the second target user information and the corresponding control behavior are stored in the first list. And sending the first list to a service system corresponding to the service type. And the service system can conveniently and timely manage and control the user corresponding to the second target user information according to the first name list.
Optionally, the determining one or more first tasks according to the multiple query requests specifically includes:
acquiring the termination time of each query request in the plurality of query requests;
the determining one or more first tasks according to the plurality of query requests specifically includes:
and determining the one or more first tasks according to the query requests which do not reach the termination time in the plurality of query requests.
In the method, whether the query request is valid can be confirmed through the termination time. The problem that the processing of the query request which has reached the termination time wastes the computing resources is prevented.
Optionally, the method further includes:
determining third target user information which exists in the historical second target user information and does not exist in the second target user information;
storing the third target user information in a second list;
and sending the second list to a service system corresponding to the service type.
In the above method, the third target user information is stored in the second list. And sending the second list to a service system corresponding to the service type. The service system can conveniently confirm the specific condition of the third target user information which exists in the historical second target user information and does not exist in the second target user information according to the second list.
Optionally, the method further includes:
comparing the quantity of the second target user information with the quantity of the historical second target user information to determine the change quantity of the second target user information;
and displaying the change amount.
In the above method, the amount of change of the second target user information is determined by comparing the amount of the second target user information with the amount of the historical second target user information, and the user change amount is displayed. The user can more intuitively see the change of the second user information, and the user experience is improved.
In a second aspect, an embodiment of the present application provides a data processing apparatus, including:
the system comprises a determining module, a processing module and a processing module, wherein the determining module is used for responding to a plurality of query requests and determining one or more first tasks according to the query requests; each query request comprises a first condition, and the first conditions of the query requests in each first task are the same; the first condition includes one or more of: a business type and a risk type of the data;
the processing module is used for determining target user information from a database according to a first condition contained in any first task aiming at any first task; wherein the first target user information meets a first condition contained in any one of the first tasks;
and the display module is used for displaying the first target user information.
In a third aspect, an embodiment of the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the computer program is executed by the processor, the processor is enabled to implement any one of the data processing methods in the first aspect.
In a fourth aspect, an embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the data processing method of the first aspect is implemented.
In a fifth aspect, the present application further provides a computer program product, which includes a computer program, and the computer program is executed by a processor to implement the data processing method according to any one of the above first aspects.
The technical effect brought by any one implementation manner in the second aspect to the fifth aspect may refer to the technical effect brought by the corresponding implementation manner in the first aspect, and details are not described here again.
Drawings
Fig. 1 is a schematic view of an application scenario of a data processing method according to an embodiment of the present application;
fig. 2 is a flowchart of a data processing method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a condition selection provided by an embodiment of the present application;
fig. 4 is a schematic diagram of a first list and a second list according to an embodiment of the present application;
fig. 5 is a schematic diagram of a third list provided in an embodiment of the present application;
fig. 6 is a schematic diagram of a user change amount according to an embodiment of the present application;
fig. 7 is a flowchart of a data processing method according to an embodiment of the present application;
FIG. 8 is a diagram illustrating an apparatus for data processing according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In the technical scheme, the data acquisition, transmission, use and the like meet the requirements of relevant national laws and regulations. To make the objects, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the accompanying drawings, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The application scenario described in the embodiment of the present application is for more clearly illustrating the technical solution of the embodiment of the present application, and does not form a limitation on the technical solution provided in the embodiment of the present application, and it can be known by a person skilled in the art that with the occurrence of a new application scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems. In the description of the present application, the meaning of "a plurality" is two or more, unless otherwise specified.
As shown in fig. 1, an application scenario diagram of an optional data processing method provided in the embodiment of the present application includes a server 100 and a terminal 101, where the server 100 and the terminal 101 may be communicatively connected through a network to implement the data processing method of the present application.
The user may use the server 100 to interact with the terminal 101 through a network, such as receiving or sending messages. Various client application programs, such as a program writing application, a web browser application, a search application, and the like, may be installed on the terminal 101. The terminal 101 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, desktop computers, and the like.
The server 100 is configured to determine one or more first tasks according to the plurality of query requests in response to the plurality of query requests. Each query request comprises a first condition, and the first condition of each query request in the query requests in each first task is the same. The first condition includes one or more of: a type of service and a type of risk of the data. For any first task, target user information is determined from the database according to a first condition contained in any first task. The first target user information meets a first condition contained in any first task. And displaying the first target user information. The server 100 may be implemented as an independent server or a server cluster composed of a plurality of servers.
Fig. 2 is a schematic flow chart of a data processing method according to an embodiment of the present application.
S201, responding to a plurality of query requests, and determining one or more first tasks according to the query requests; each query request comprises a first condition, and the first conditions of the query requests in each first task are the same; the first condition includes one or more of: a traffic type and a risk type of the data.
Each query request includes a first condition. The first condition includes one or more of the following: a traffic type and a risk type of the data. The traffic types comprise different services that can be provided to the user. For example, different services that can be provided to the user are collected, paid for, etc., by a client included in the terminal. The risk type of the data refers to a problem corresponding to the user information of the user. For example, the user information is incomplete, the user information is not true, and the like. The second condition is the type of user information that is of interest to the user. Such as user rating, user age, etc. Optionally, the query request further includes a management action. The control behavior comprises specific behavior corresponding to prohibition of providing service for the target user. For example, the control actions of forbidding collection, forbidding payment and the like. The first condition, the second condition and the control behavior are preset and are displayed to the user when the user submits a query request.
It will be appreciated that in selecting the first condition, the user selects only one type of service and only one type of risk for the data. Upon selecting the second condition, the user may select a variety of user information types of interest to the user. When selecting the governing behaviors, the user may select a variety of governing behaviors.
As shown in fig. 3, the first condition includes other conditions such as incomplete user information, unreal user information, service 1, and the like. The first condition includes user age, user rating, and other conditions. The control behavior comprises other control behaviors such as payment prohibition, deposit prohibition and the like, and is selected by the user.
And responding to a plurality of query requests of a user, and acquiring the termination time of each query request in the query requests. The user can select the termination time when uploading a plurality of query requests, and the user can also select the termination time of a plurality of query requests at any time. For example, the query request termination time may be 9/19/2022, 10/20/2022, and the like.
Optionally, since data processing is performed according to a preset period, it is necessary to determine whether the plurality of query requests reach corresponding termination time through data processing time. If the data processing time reaches the termination time of the query request, the query request is invalid, and data processing is not needed. If the data processing time does not reach the termination time of the query request, the query request is valid.
In the method, whether the query request is valid can be determined through the termination time. And under the condition that the query request is effective, carrying out the next data processing. The problem that the query request cannot be completed in time due to insufficient computing resources can be prevented.
One or more first tasks may be determined based on ones of the plurality of query requests that have not reached the termination time. It is understood that the preset period may be a time period of 1 day, 2 days, 1 month, etc., and the preset period is an empirical value preset by a person skilled in the art, and may be set reasonably according to a specific application scenario.
For example, assume that query 1 expires at 11 months and 24 days 2022. The data processing time is 2022 years, 10 months and 5 days. If the query request 1 does not reach the termination time, the query request 1 is valid, and data processing can be performed on the query request 1. For another example, suppose that the termination time of query 2 may be 9/19/2022 and the data processing time is 11/24/2022. When the query request 2 reaches the termination time, the query request is invalid and is no longer processed.
From the plurality of query requests that have not reached the termination time determined above, a plurality of query requests containing the same risk type of data are stored in one query request set. And if the plurality of query requests contain the risk types of the plurality of data, determining a plurality of first query request sets according to the risk types of the data. Wherein each first set of query requests includes a risk type for the data.
And aiming at any first query request set, and storing a plurality of query requests containing the same service type in one or more first tasks according to the service type. The first task includes both the risk type and the business type of the data.
Optionally, in order to obtain the management and control behavior corresponding to the target user more quickly in the subsequent process, for any first task, a plurality of query requests including the same management and control behavior may be stored in one or more second query request sets. The second query request set includes a risk type of the data, a service type of the data, and a management and control behavior.
By the method, the plurality of query requests are combined into one or more first tasks, and the number of the query requests is reduced. The data processing duration is not influenced by the number of the query requests and is only related to the risk types of the data, the business types of the data and the number of the types of the management and control behaviors. Processing the first task may save computational resources compared to processing each query request. The data processing is faster.
A fast and general-purpose computing engine for large-scale data processing has a length limit for task parameters of data processing. Such as an (Apache Spark) cluster. Therefore, under the condition that the parameter generation length of any first task is larger than a first threshold value, the plurality of query requests in the first task are divided into at least two subtasks according to the parameter length which is not larger than the first threshold value. The first threshold value is a preset maximum parameter length of the first task which can be contained. The maximum value of the parameter length of the query request can be determined according to the first condition type and the second condition type. And determining the maximum number of the first tasks which can contain the query requests according to the first threshold and the maximum value of the parameter length of the query requests. The maximum number of first tasks that can contain query requests is compared to the number of first tasks that actually contain query requests. If the number of the first task actually containing the query requests is larger than the maximum number of the first task capable of containing the query requests, the parameter length of the first task is larger than the first threshold value. And dividing the query request contained in the first task into at least two subtasks according to a preset rule. And the parameter length of each subtask is not larger than a first threshold value. By the method, the problem that the system cannot run due to the fact that the parameter length of the first task exceeds the first threshold value is solved.
In a possible case, when the query request included in any one of the first tasks is divided into at least two subtasks, the preset rule may be to randomly allocate the query request included in the first task. And randomly splitting any first task until the obtained parameter length of each subtask is not greater than a first threshold value, and stopping splitting. In another possible case, when the query request included in any first task is divided into at least two subtasks, the preset rule may be to equally distribute all query requests in the first task according to the number. And when the obtained parameter length of the subtask is larger than a first threshold value, the subtask is continuously divided into at least two subtasks, and the division is stopped until the obtained parameter length of each subtask is not larger than the first threshold value. The two preset rules do not constitute a limitation to the embodiments of the present application. The preset rule may also be preset by a person skilled in the art, and the preset rule may be reasonably set according to a specific application scenario.
For example, assume that the first threshold is 1000. 5 condition types are provided for the user to select, and in the case that the query request contains 5 condition types, the parameter length of the query request is 200. That is, the maximum parameter length for each query request is 200. A maximum of 5 query requests are included in the first task. It is estimated whether the parameter length of the first task is larger than a first threshold value according to the number of the query requests contained in the first task. If the first task comprises 7 query requests, the parameter length of the first task is larger than the first threshold value. If the first task comprises 2 query requests, the length of the parameter of the first task is smaller than the threshold value. In the case that the first task includes 7 query requests, the first task is randomly split into a subtask 1 and a subtask 2. Subtask 1 contains 3 query requests. Subtask 2 contains 4 query requests. The parameter lengths of the subtasks 1 and 2 are not larger than the first threshold.
S202, aiming at any first task, according to a first condition contained in any first task, first target user information is determined from a database. The first target user information meets a first condition contained in any first task.
And aiming at any first task, according to a first condition contained in any first task, determining first target user information meeting all different condition types contained in the first condition from a database. The database contains all user information which can provide service. In the query requests contained in the first task, the first conditions contained in each query request are the same. For example, the first condition included in each of the query requests included in the first task is that the user information is incomplete and the service 1. According to the first condition, first target user information meeting user information incompleteness and service 1 is determined from the database.
It can be understood that, for any subtask, the first target user information is determined from the database according to the first condition included in any subtask, which is the same as the method for determining, for any first task, the first target user information that meets all different types of conditions included in the first condition from the database according to the first condition included in any first task, and therefore, details are not repeated here.
And S203, displaying the first target user information.
After determining the first target user information, the first target user information is transmitted to the terminal, and the first target user information may be displayed in an electronic screen of the terminal. The user can conveniently check the specific condition of the first target user information. The user experience is improved.
And (4) optional. Since the first task is determined according to the first condition in the plurality of query requests, the first condition included in each of the query requests included in each of the first tasks is the same. And because each query task may contain a second condition. The second condition may be different in each query request contained in the first task. Thus, in the first task, the second target user information may be determined from the first target user information according to the second condition in the first task, with or in connection with the second condition included in each query request. Wherein the second target user information meets any second condition contained in any first task.
For example, assume that the first task includes query request 1, query request 2, and query request 3. The first condition in the query request 1 contains that the user information is not authentic and the service 1. The second condition includes the age of the user being 20 to 30. The first condition in the query 2 contains that the user information is not authentic, and the service 1. The second condition includes a user level of 1. The first condition packet in the query request 3 is not true to the user information and is a service 1. The second condition includes the age of the user being 65 to 70. The second condition of connection in the first task is that the user age is 20 to 30 or the user rank is 1 or the user age is 65 to 70. And determining second target user information from the first target user information according to a second condition of connection in the first task. That is, the first target user information corresponds to the user information of the user age of 20 to 30 or the user rank of 1 or the user age of 65 to 70.
When one or more first tasks are determined according to the first condition and the management and control behavior in the plurality of query requests, the first condition and the management and control behavior contained in each query request in each first task are the same. Therefore, the control behavior corresponding to the first target user information corresponding to each first task is the same. The business type, the risk type of the data and the control behavior corresponding to the second target user information are the same. And acquiring a control behavior corresponding to the second target user information from the first task, and storing the second target user information and the control behavior in a first list. And sending the first list to a service system corresponding to the service type in a file mode. The second list is stored in a database. For example, the first list may be a table format or a text document format, and the present application is not limited in particular. By the method, the system corresponding to the service type can determine the control behavior of the second target user through the first list in time. For example, as shown in fig. 4, the first list is used to indicate target user information of service 1 and a corresponding policing behavior, where the policing behavior corresponding to user 1 is to forbid depositing. When the user 1 deposits through the mobile phone, the mobile phone prompts to prohibit the deposit and to complete the user information. The corresponding control behaviors of the user 2, the user 3 and the user 4 are the prohibition of payment. When the user 2, the user 3 and the user 4 pay by the mobile phone, the mobile phone prompts to prohibit payment and please complete the user information.
Optionally, the information in all the first lists may also be stored in a third list, that is, the third list includes information of target users corresponding to all the service types. By the method, the target user information change of all service types can be conveniently checked subsequently. The user experience is improved. As shown in fig. 5, target user information in all service types including that the control behavior corresponding to the user 1 in the service 1 is prohibition of deposit, the control behavior corresponding to the user 2 in the service 1 is prohibition of payment, and the control behavior corresponding to the user 1 in the service 2 is prohibition of deposit.
In one possible case, since the data processing is performed according to a preset cycle, the historical second target user information of the last data processing time in the database is acquired. And comparing the historical second target user information with the second target user information determined at this time. And determining third target user information which exists in the historical second target user information and does not exist in the target user information. And storing the third target user information in a second list, and determining the user information which needs to be subjected to management and control at one time and does not need to be subjected to management and control at present according to the second list. And sending the second list to a service system corresponding to the service type. The second list is stored in a database. For example, the second list may be in a table format or a text document format, and the application is not limited in particular. In the method, the service system can more clearly determine the user information which is once managed and controlled but not managed and controlled through the second list. And determining the change condition of the user information which needs to be managed at one time and does not need to be managed at present according to the user information in the second list and the user information in the historical second list.
The second target user information is stored in the first list in the embodiment of the application. And storing the third target user information in a second list. The first list and the second list are stored in a database. Compared with the prior art that most target user information is only inquired and not stored, the subsequent tracking record is more convenient. And the first list and the second list are automatically sent to the service system corresponding to the service type, so that the method has more flexibility compared with the prior art in which the first list and the second list are downloaded manually by a user.
Alternatively, the amount of change in the second target user information may be determined by comparing the amount of the second target user information with the amount of the historical second target user information. For example, the amount of change in the user information such as the amount of increase in the second target user information, the amount of decrease in the second target user information, and the like. The amount of change of the user information in the above-described sixth list may be embodied by a line graph, a bar graph, or the like. The user can more intuitively observe the change of the user information.
In a possible case, all users that meet the first condition in the first task in the database due to the above are the first user information. The second condition that meets all the inquiry requests in the first user information is the second user information. That is, the first target user information and the second target user information do not conform to the first condition and the second condition of one query request but conform to the first condition of the first task and the second condition of all query requests included in the first task. When the user wants to view the change amount of the target user information determined by one query request, the fourth target user information can be determined from the database according to the first condition and the second condition in the query request. And storing the fourth target user information meeting the first condition and the second condition in the query request in a fifth list. And comparing the fourth target user information with historical fourth target user information, determining the change amount of the fourth target user information, and storing the change amount of the fourth target user information in a sixth list. For example, the sixth list stores the user information change amount such as the user information increase amount, the user information decrease amount, and the like. Alternatively, the amount of change in the user information in the sixth list may be represented by a line graph, a bar graph, or the like. The user can observe the change of the user information more intuitively, and compared with the method of manually determining the change of the user information according to the first list and the second list, the user experience can be improved. As shown in the line drawing of fig. 6. Fig. 6 shows an amount of increase of the fourth target user information determined by the query request 1. The first condition of the query request 1 contains user incompletion, service 1. The second condition includes the age of the user being 40-50 years. In 2022, 9 and 1 days, the target users increased by 200 people. In 2022, 9, month 2, the target users increased 450 individuals. On day 9, month 3, 2022, target users increased 520 individuals. On 9/4/2022, target users increased 540 individuals. In 2022, 9/5, the target users increased by 400 people.
Optionally, because a plurality of query requests cause an accumulative effect in the data processing process, when determining the target user information in the first time period in which the service can be provided, the target user information may not be sent to each service system in time. However, each service system needs to perform management and control according to the management and control behavior corresponding to the target user information in the first time period in which the service can be provided, and a problem of time delay occurs. Therefore, the data processing method can be implemented in the second time period in which the service cannot be provided, and the first list and the second list are sent to each business system in time before the second time period in which the service can be provided, so that no time delay is ensured. Wherein the first time period and the second time period are different time periods. By the method, the target user information and the change amount of the target user information are respectively determined at different time periods, the problem of time delay caused by insufficient computing resources is solved, and timeliness is improved.
For example, it is assumed that the second period of data processing during which the service is not available may be selected from 21 o 'clock on the first day to 5 o' clock on the second day. The first time period during which service may be provided may be 8 o 'clock to 17 o' clock on the second day. The first condition includes conditions of incomplete user information, suspected user information, service 1, service 2, service 3 and the like. The second condition includes conditions of user age, user grade and the like. The control action comprises actions of forbidding collection, forbidding payment and the like. The query request 1 submitted by the user comprises the first conditions of incomplete user information and business 1. The second condition is that the user level is 3, and the control action comprises the prohibition of collection. The query request 2 submitted by the user comprises the first conditions of incomplete user information and business 1. The second condition is that the user is 30 to 50 years old and the act of regulation involves prohibiting payment. The query request 3 submitted by the user includes the first condition that the user information is incomplete and the service 1 is available. The second condition is that the user is 20 to 30 years old and the act of regulation involves prohibiting payment. The query request 4 submitted by the user includes the first condition that the user information is not real and the service 1 is not real. The second condition is that the user is 10 to 30 years old and the act of regulation involves prohibiting payment. The query request 5 submitted by the user includes the first condition that the user information is not true and the service 2 is not true. The second condition is that the user level is level 2, and the governing action comprises prohibiting payment. At least one first task is determined based on each query request. The first task 1 includes a query request 1, a query request 2, and a query request 3. The first task 2 includes a query request 4, a query request 5. Since the parameter length of the first threshold is 500 and the parameter length of one query request is 250, a maximum of 2 query requests can be included in the first task. Dividing the query request 1, the query request 2 and the query request 3 contained in the first task 1 into at least one subtask of which the number of the contained query requests is not more than 2. It can be obtained that subtask 1 contains query request 1 and query request 2. Subtask 2 contains query request 3. The second condition of the subtask 1 connection is that the user rating is 3 or the user age is 30 to 50 years. And according to the incomplete first conditional user information of the subtask 2 and the service 1, determining first target user information which accords with the incomplete user information and the service 1 from the database. And determining second target user information corresponding to a user grade of 3 or a user age of 30 to 50 years from the first target user information according to a second condition of the subtask 1 connection. The method for determining the second target user information by the 2 nd query request and the subtask 2 is the same as the subtask 1, and is not described herein again. And storing the second target user information in the first list. And determining that third target user information which does not exist in the second target user information exists in the historical target second user information, and storing the third target user information in a second list. And according to the service type corresponding to each first task or subtask, sending the first list and the second list to a corresponding service system before 8 o' clock on the next day. And the management and control behavior of the service system in the first time period in the next day according to the second target user information is not influenced, and service is provided for the user. And determining fourth target user information corresponding to each query request in response to each query request in the first time period during which the service can be provided on the next day. And comparing the fourth target user information with the corresponding fourth historical target user, determining the change amount of the fourth target user information, and displaying the change amount.
The data processing process in the embodiment of the present application may be implemented by relying on a fast general-purpose computing engine (Apache Spark) cluster designed for large-scale data processing. Data storage may rely on open source database (HBase) implementations. The above-mentioned clusters and databases in the present application do not constitute a limitation to the embodiments of the present application. The cluster and the database can also be preset by those skilled in the art, and can also be reasonably set according to a specific application scenario.
As shown in fig. 7, an exemplary flowchart of data processing is provided in the embodiments of the present application.
S701, responding to the plurality of query requests, and acquiring the termination time of each query request in the plurality of query requests;
s702, determining one or more first query request sets from the plurality of query requests according to the query requests which do not reach the termination time in the plurality of query requests and the risk types of the data;
s703, aiming at any first query request set, determining one or more first tasks from any first query request set according to the service type;
s704, aiming at any first task, determining first target user information from a database according to a first condition contained in any first task;
s705, displaying first target user information;
s706, determining second target user information from the first target user information according to a second condition; wherein the second target user information conforms to any second condition contained in the first task;
s707, acquiring a control behavior corresponding to the second target user information, and storing the second target user information and the control behavior in a first list;
s708, the first list is sent to a service system corresponding to the service type.
An embodiment of the present application provides a data processing apparatus, and as shown in fig. 8, the apparatus includes: a determination module 801, a processing module 802, and a display module 803, wherein:
a determining module 801, configured to determine, in response to a plurality of query requests, one or more first tasks according to the plurality of query requests; each query request comprises a first condition, and the first conditions of the query requests in each first task are the same; the first condition includes one or more of: a business type and a risk type of the data;
a processing module 802, configured to determine, for any first task, target user information from a database according to a first condition included in any first task; wherein, the first target user information accords with a first condition contained in any first task;
a display module 803, configured to display the first target user information.
Optionally, the processing module 802 is further configured to:
under the condition that the parameter length of any first task is larger than a first threshold value, dividing a query request contained in any first task into at least two subtasks; and the parameter length of each subtask is not larger than a first threshold value.
The determining module 801 is specifically configured to determine, according to the first condition included in any first task, the first target user information from the database, and:
and aiming at any subtask, determining the first target user information from the database according to a first condition contained in the subtask.
Optionally, the processing module 802 is specifically configured to determine one or more first tasks according to the multiple query requests:
determining one or more first query request sets from a plurality of query requests according to the risk type of the data; each first query request set comprises risk types of data;
and aiming at any first query request set, determining one or more first tasks from any first query request set according to the service type.
Optionally, each query task further includes a second condition, and after determining, for any first task, the target user information from the database according to the first condition included in any first task, the determining module 801 is further configured to:
determining second target user information from the first target user information according to a second condition; wherein the second target user information conforms to any second condition contained in the first task; the second condition contains one or more types of user information of interest.
Optionally, each query task further includes a second condition, and for any first task, after determining the target user information from the database according to the first condition included in any first task, the processing module 802 is further configured to:
acquiring a control behavior corresponding to the second target user information, and storing the second target user information and the control behavior in a first list;
and sending the first list to a service system corresponding to the service type.
Optionally, each query task further includes a second condition, and one or more first tasks are determined according to the multiple query requests, and the processing module 802 is specifically configured to:
acquiring the termination time of each query request in a plurality of query requests;
determining one or more first tasks according to the plurality of query requests, the processing module 802 is specifically configured to:
and determining one or more first tasks according to the query requests which do not reach the termination time in the plurality of query requests.
And determining one or more first tasks according to the query requests which do not reach the termination time in the plurality of query requests.
Optionally, the determining module 801 is specifically configured to:
and determining third target user information which exists in the historical second target user information and does not exist in the second target user information.
Optionally, the determining module 801 is specifically configured to:
comparing the quantity of the second target user information with the quantity of the historical second target user information to determine the change quantity of the second target user information;
the amount of change is displayed.
The embodiment of the application also provides the electronic equipment. An electronic device 90 according to this embodiment of the present application is described below with reference to fig. 9. The electronic device 90 shown in fig. 9 is only an example, and should not bring any limitation to the functions and the use range of the embodiment of the present application.
As shown in fig. 9, the electronic device 90 is represented in the form of a general electronic device. The components of the electronic device 90 may include, but are not limited to: the at least one processor 91, the at least one memory 92, and a bus 93 that connects the various system components (including the memory 92 and the processor 91).
Bus 93 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
Memory 92 may include readable media in the form of volatile memory, such as Random Access Memory (RAM) 921 and/or cache memory 922, and may further include Read Only Memory (ROM) 923.
Memory 92 may also include programs/utilities 925 having a set (at least one) of program modules 924, such program modules 924 including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which or some combination thereof may comprise an implementation of a network environment.
The electronic device 90 may also communicate with one or more external devices 94 (e.g., keyboard, pointing device, etc.), with one or more devices that enable a user to interact with the electronic device 90, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 90 to communicate with one or more other electronic devices. Such communication may be through an input/output (I/O) interface 95. Also, the electronic device 90 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via a network adapter 96. As shown, the network adapter 96 communicates with other modules for the electronic device 90 over the bus 93. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 90, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In an exemplary embodiment, a computer readable storage medium comprising instructions, such as a memory 92 comprising instructions, executable by the processor 91 to perform the data processing method described above is also provided. Alternatively, the storage medium may be a non-transitory computer readable storage medium, for example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, there is also provided a computer program product comprising a computer program which, when executed by the processor 91, implements any of the data processing methods as provided herein.
In exemplary embodiments, various aspects of a data processing method provided by the present application may also be implemented in the form of a program product, which includes program code for causing a computer device to perform the steps in the data processing method according to various exemplary embodiments of the present application described above in this specification, when the program product runs on the computer device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for the data processing method of the embodiments of the present application may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be executed on an electronic device. However, the program product of the present application is not so limited, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the consumer electronic device, partly on the consumer electronic device, as a stand-alone software package, partly on the consumer electronic device and partly on a remote electronic device, or entirely on the remote electronic device or server. In the case of remote electronic devices, the remote electronic devices may be connected to the consumer electronic device through any kind of network, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external electronic device, such as through the internet using an internet service provider.
It should be noted that although in the above detailed description several units or sub-units of the apparatus are mentioned, such a division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (12)

1. A data processing method, comprising:
in response to a plurality of query requests, determining one or more first tasks from the plurality of query requests; each query request comprises a first condition, and the first conditions of the query requests in each first task are the same; the first condition includes one or more of: a business type and a risk type of the data;
aiming at any first task, determining target user information from a database according to a first condition contained in the any first task; wherein the first target user information meets a first condition contained in the any one first task;
and displaying the first target user information.
2. The method of claim 1, further comprising:
under the condition that the parameter length of any first task is larger than a first threshold value, dividing a query request contained in any first task into at least two subtasks; wherein the parameter length of each subtask is not greater than the first threshold;
the determining, according to a first condition included in any one of the first tasks, first target user information from a database specifically includes:
and aiming at any subtask, determining the first target user information from the database according to a first condition contained in the subtask.
3. The method according to claim 1, wherein the determining one or more first tasks according to the plurality of query requests specifically includes:
determining one or more first query request sets from the plurality of query requests according to the risk type of the data; wherein each first set of query requests includes a risk type for the data;
and aiming at any first query request set, determining the one or more first tasks from the any first query request set according to the service type.
4. The method according to claim 1, wherein each query task further includes a second condition, and after determining, for any first task, target user information from the database according to the first condition included in the any first task, the method further comprises:
determining second target user information from the first target user information according to the second condition; wherein the second target user information meets any second condition contained in the first task; the second condition contains one or more types of user information of interest.
5. The method of claim 4, further comprising:
acquiring a control behavior corresponding to the second target user information, and storing the second target user information and the control behavior in a first list;
and sending the first list to a service system corresponding to the service type.
6. The method of claim 1, further comprising:
acquiring the termination time of each query request in the plurality of query requests;
the determining one or more first tasks according to the plurality of query requests specifically includes:
and determining the one or more first tasks according to the query requests which do not reach the termination time in the plurality of query requests.
7. The method of claim 4, further comprising:
determining third target user information which exists in the historical second target user information and does not exist in the second target user information;
storing the third target user information in a second list;
and sending the second list to a service system corresponding to the service type.
8. The method of claim 4, further comprising:
comparing the quantity of the second target user information with the quantity of the historical second target user information to determine the change quantity of the second target user information;
and displaying the change amount.
9. A data processing apparatus, characterized by comprising:
the determining module is used for responding to a plurality of query requests and determining one or more first tasks according to the query requests; each query request comprises a first condition, and the first conditions of the query requests in each first task are the same; the first condition includes one or more of: a business type and a risk type of the data;
the processing module is used for determining target user information from a database according to a first condition contained in any first task aiming at any first task; wherein the first target user information meets a first condition contained in any one of the first tasks;
and the display module is used for displaying the first target user information.
10. A data processing apparatus, characterized by comprising:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory and for executing the steps comprised by the method of any one of claims 1 to 8 in accordance with the obtained program instructions.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a computer, cause the computer to perform the method according to any one of claims 1-8.
12. A computer program product, the computer program product comprising: computer program code which, when run on a computer, causes the computer to perform the method according to any of the preceding claims 1-8.
CN202211193667.9A 2022-09-28 2022-09-28 Data processing method, device, equipment and medium Pending CN115563173A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211193667.9A CN115563173A (en) 2022-09-28 2022-09-28 Data processing method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211193667.9A CN115563173A (en) 2022-09-28 2022-09-28 Data processing method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN115563173A true CN115563173A (en) 2023-01-03

Family

ID=84743171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211193667.9A Pending CN115563173A (en) 2022-09-28 2022-09-28 Data processing method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN115563173A (en)

Similar Documents

Publication Publication Date Title
US10523580B2 (en) Automatic cloud provisioning based on related internet news and social network trends
CN108629029B (en) Data processing method and device applied to data warehouse
CN110914817B (en) Cognitive data filtering for storage environments
CN111181770B (en) Resource allocation method, system, electronic equipment and storage medium
US10838798B2 (en) Processing system for performing predictive error resolution and dynamic system configuration control
CN103530292A (en) Webpage displaying method and device
US20150207691A1 (en) Preloading content based on network connection behavior
US20160188717A1 (en) Network crawling prioritization
CN109086414B (en) Method, apparatus and storage medium for searching blockchain data
CN111681032B (en) Method and device for configuring additional resources and electronic equipment
CN113254191A (en) Method, electronic device and computer program product for running applications
US11386183B2 (en) Systems and methods for predictive caching
CN115563173A (en) Data processing method, device, equipment and medium
CN114064403A (en) Task delay analysis processing method and device
CN112491939B (en) Multimedia resource scheduling method and system
CN114723455A (en) Service processing method and device, electronic equipment and storage medium
CN114257521A (en) Flow prediction method, device, electronic equipment and storage medium
CN111917804B (en) Service channel recommendation method, system and equipment
CN113779412A (en) Message reach method, node and system based on block chain network
CN111950770A (en) Method and device for managing resource return auxiliary strategy and electronic equipment
US20150293763A1 (en) Dynamic and intelligent multi-triggered item revalidation based on projected return on investment
Kanagasabai et al. Ec2bargainhunter: It's easy to hunt for cost savings on amazon ec2!
CN117170821B (en) Service processing method, device, electronic equipment and computer readable medium
CN113329011B (en) Security access control method and device
US20220101149A1 (en) Assessing propagation of distributed content relevant to a subject of focus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination