CN112347386B - Resource configuration method and device adopting restriction rule and electronic equipment - Google Patents
Resource configuration method and device adopting restriction rule and electronic equipment Download PDFInfo
- Publication number
- CN112347386B CN112347386B CN202011027644.1A CN202011027644A CN112347386B CN 112347386 B CN112347386 B CN 112347386B CN 202011027644 A CN202011027644 A CN 202011027644A CN 112347386 B CN112347386 B CN 112347386B
- Authority
- CN
- China
- Prior art keywords
- user
- current user
- page
- information
- invited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000013468 resource allocation Methods 0.000 claims abstract description 57
- 238000012544 monitoring process Methods 0.000 claims abstract description 13
- 230000006399 behavior Effects 0.000 claims description 32
- 238000012545 processing Methods 0.000 claims description 17
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 5
- 230000002452 interceptive effect Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9558—Details of hyperlinks; Management of linked annotations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0208—Trade or exchange of goods or services in exchange for incentives or rewards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0222—During e-commerce, i.e. online transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0225—Avoiding frauds
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Game Theory and Decision Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a resource allocation method adopting a limiting rule, which comprises the following steps: generating invitation information based on an invitation operation instruction of a current user on a service task page, pushing an invitation page to a current user terminal, wherein the invitation page is used for sending the invitation information to an invited user of the current user; acquiring a current user identification returned by a new user guide page and page submitting information, wherein the page submitting information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identification; monitoring behavior information of a newly registered invited user, and acquiring the completion condition of the business task of the current user according to the behavior information and a reserved task rule; verifying a resource allocation limit rule for the completion condition; and when the completion condition accords with the limit rule, configuring corresponding resources for the current user. The method and the system can perform resource allocation more safely and more effectively, avoid unnecessary loss caused by rule loopholes, and provide better user experience for users.
Description
Technical Field
The present invention relates to the field of computer information processing, and in particular, to a method, an apparatus, an electronic device, and a computer readable medium for configuring resources using a constraint rule.
Background
With the continuous development of mobile terminal internet technology, mobile electronic commerce becomes a new direction of electronic commerce development, merchants send electronic coupons (also called electronic discount coupons) to consumers through the internet, goods or services can be purchased at a much lower price than usual, and marketing effects exceed traditional advertising modes.
Accordingly, there is a need for a new resource allocation method, apparatus, electronic device, and computer-readable medium.
The above information disclosed in the background section is only for enhancement of understanding of the background of the disclosure and therefore it may include information that does not form the prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of this, the disclosure proposes a resource allocation method, apparatus, electronic device and computer readable medium that adopt a constraint rule, decompose a resource reward of a service task into multi-step issuing, and set an issuing threshold and a receiving threshold at the same time, so that resource allocation can be performed more safely and more effectively, unnecessary loss caused by rule loopholes is avoided, and better user experience is provided for users.
Other features and advantages of the present disclosure will be apparent from the following detailed description, or may be learned in part by the practice of the disclosure.
According to an aspect of the present disclosure, a resource allocation method employing a constraint rule is provided, including:
generating invitation information based on an invitation operation instruction of a current user on a service task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier;
Pushing an invitation page to a current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user;
acquiring a current user identification returned by a new user guide page and page submitting information, wherein the page submitting information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identification;
Monitoring behavior information of the newly registered invited user, and acquiring the completion condition of the business task of the current user according to the behavior information and the reserved task rule;
verifying a resource allocation restriction rule for the completion condition;
and when the completion condition accords with the limit rule, configuring corresponding resources for the current user.
Optionally, the method further comprises: and pushing a service task page to the current user, and receiving an operation instruction of executing the service task by the current user through the service task page.
Optionally, the business task includes sending invitation information of a financial product to a relationship of the current user, so that the invited user uses the financial product.
Optionally, the service task further includes: sub-business tasks corresponding to each particular node of the financial product.
Optionally, each specific node includes node information of registering, finishing, granting, moving, lifting and repayment of the financial product.
Optionally, the obtaining the completion condition of the service task of the current user according to the behavior information and the reserved task rule includes: when the behavior information of the preset number of newly registered invited users indicates that the specific nodes of the financial products are completed, the current users complete the sub-business tasks corresponding to the specific nodes, and acquire sub-business task completion certificates.
Optionally, the method further comprises: the same sub-service task can acquire a plurality of sub-service completion credentials according to a plurality of levels of predetermined numbers.
Optionally, said configuring the corresponding resource to the current user includes: and presetting a resource allocation rule, and configuring a random number of resources in a first interval according to the certificate, wherein the first interval is a preset numerical interval.
Optionally, the limiting rule includes: and in the same resource allocation period, the number of acquired resource allocation is smaller than or equal to a preset threshold value.
According to an aspect of the present disclosure, there is provided a resource allocation apparatus employing a restriction rule, including: the information module is used for generating invitation information based on an invitation operation instruction of a current user on a business task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier; the invitation page module is used for pushing an invitation page to a current user terminal, and the invitation page is used for sending invitation information to an invited user of the current user; the association processing module is used for acquiring a current user identification returned by a new user guide page and page submitting information, wherein the page submitting information comprises newly registered invited user information, and the newly registered invited user is associated with the current user according to the current user identification; the monitoring module is used for monitoring the behavior information of the newly registered invited user and acquiring the completion condition of the business task of the current user according to the behavior information and the reserved task rule; the limit rule module is used for verifying the resource allocation limit rule of the completion condition; and the configuration module is used for configuring corresponding resources for the current user when the completion condition accords with the limit rule.
Optionally, the method further comprises: and the pushing module is used for pushing a service task page to the current user, and receiving an operation instruction of executing the service task by the current user through the service task page.
Optionally, the business task includes sending invitation information of a financial product to a relationship of the current user, so that the invited user uses the financial product.
Optionally, the service task further includes: sub-business tasks corresponding to each particular node of the financial product.
Optionally, each specific node includes node information of registering, finishing, granting, moving, lifting and repayment of the financial product.
Optionally, the monitoring module further comprises: when the behavior information of the preset number of newly registered invited users indicates that the specific nodes of the financial products are completed, the current users complete the sub-business tasks corresponding to the specific nodes, and acquire sub-business task completion certificates.
Optionally, the method further comprises: the same sub-service task can acquire a plurality of sub-service completion credentials according to a plurality of levels of predetermined numbers.
Optionally, the method further comprises: the resource allocation rule module is used for setting and executing a resource allocation rule, wherein the resource allocation rule comprises configuring a random number of resources in a first interval according to the certificate, and the first interval is a preset numerical interval.
Optionally, the limiting rule executed by the limiting rule module includes: and in the same resource allocation period, the number of acquired resource allocation is smaller than or equal to a preset threshold value.
According to an aspect of the present disclosure, there is provided an electronic device including: one or more processors; a storage means for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the methods as described above.
According to an aspect of the present disclosure, a computer-readable medium is presented, on which a computer program is stored, which program, when being executed by a processor, implements a method as described above.
According to the resource configuration method, the device, the electronic equipment and the computer readable medium adopting the limiting rule, the method, the device and the electronic equipment adopting the limiting rule are adopted, and invitation information is generated based on an invitation operation instruction of a current user on a business task page, wherein the invitation information comprises a current user identifier and a new user guide page address containing the current user identifier; pushing an invitation page to a current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user; acquiring a current user identification returned by a new user guide page and page submitting information, wherein the page submitting information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identification; monitoring behavior information of the newly registered invited user, and acquiring the completion condition of the business task of the current user according to the behavior information and the reserved task rule; verifying a resource allocation restriction rule for the completion condition; when the completion condition accords with the limit rule, the corresponding resource configuration mode is adopted for the current user, the resource rewards of the service tasks are decomposed into multi-step release, and meanwhile, a release threshold and a retrieval threshold are set, so that the resource configuration can be carried out more safely and more effectively, unnecessary loss caused by rule loopholes is avoided, and better user experience is provided for the user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects achieved more clear, specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted, however, that the drawings described below are merely illustrative of exemplary embodiments of the present invention and that other embodiments of the present invention may be derived from these drawings by those skilled in the art without undue effort.
FIG. 1 is a system block diagram illustrating a method and apparatus for resource allocation employing constraint rules, according to an example embodiment.
FIG. 2 is a flow chart illustrating a method of resource allocation employing constraint rules according to an example embodiment.
Fig. 3 is a diagram illustrating a resource allocation apparatus employing constraint rules according to an example embodiment.
Fig. 4 is a block diagram of an electronic device, according to an example embodiment.
Fig. 5 is a block diagram of a computer-readable medium shown according to an example embodiment.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments can be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals in the drawings denote the same or similar elements, components or portions, and thus a repetitive description thereof will be omitted.
The features, structures, characteristics or other details described in a particular embodiment do not exclude that may be combined in one or more other embodiments in a suitable manner, without departing from the technical idea of the invention.
In the description of specific embodiments, features, structures, characteristics, or other details described in the present invention are provided to enable one skilled in the art to fully understand the embodiments. It is not excluded that one skilled in the art may practice the present invention without one or more of the specific features, structures, characteristics, or other details.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various devices, elements, components or portions, this should not be limited by these terms. These words are used to distinguish one from the other. For example, a first device may also be referred to as a second device without departing from the spirit of the invention.
The term "and/or" and/or "includes all combinations of any of the associated listed items and one or more.
FIG. 1 is a system block diagram illustrating a method and apparatus for resource allocation employing constraint rules, according to an example embodiment.
As shown in fig. 1, the system architecture 10 may include terminal devices 101, 102, a network 103, and a server 104. The network 103 is used as a medium to provide communication links between the terminal devices 101, 102 and the server 105. The network 103 also serves as a medium for providing communication links between the terminal devices 101, 102. The network 103 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
A user may interact with the server 105 via the network 103 using the terminal devices 101, 102 to receive or send messages or the like. Various communication mobile terminal applications, such as financial service type applications, shopping type applications, web browser applications, instant messaging tools, mailbox mobile terminals, social platform software, etc., can be installed on the terminal devices 101, 102.
The terminal devices 101, 102 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 104 may be a server providing various services, such as a background management server providing support for financial service-like applications used by the user with the terminal devices 101, 102. The background management server may perform processing such as analysis on the received user data, and feed back the processing result (e.g., resource allocation information) to the terminal devices 101 and 102.
The terminal device 101, 102 may generate invitation information, for example, based on an invitation operation instruction of the current user on the service task page, the invitation information including the current user identification and a new user guidance page address including the current user identification; the server 104 may, for example, push an invitation page to a current user terminal, where the invitation page is used to send invitation information to an invited user of the current user; the terminal device 101, 102 may, for example, obtain a current user identification returned by the new user guidance page and page submission information, where the page submission information includes newly registered invited user information, and associate the newly registered invited user with the current user according to the current user identification; the server 104 monitors the behavior information of the newly registered invited user and acquires the completion condition of the business task of the current user according to the behavior information and the reserved task rule; the server 104 verifies the resource allocation restriction rule of the completion condition; when the completion condition meets the limit rule, the server 104 configures corresponding resources for the current user.
FIG. 2 is a flow chart illustrating a method of resource allocation employing constraint rules according to an example embodiment. The resource allocation method employing the restriction rule includes at least steps S201 to S207.
In step S201, a service task page is pushed
And pushing a service task page to the current user, and receiving an operation instruction of executing the service task by the current user through the service task page.
Specifically, the server pushes the content of the service task page to the application of the current user terminal, and the application analyzes and renders and displays the service task page to the current user.
The service task page can display the specific content of the service task to the user, and meanwhile, the operation instruction of executing the service task by the current user can also be received through the service task page. The operation instruction may be a touch-type interactive operation instruction such as touch and press, or a non-touch-type interactive operation instruction such as voice input.
Optionally, the business task includes sending invitation information for a financial product to a relationship of the current user to prompt the invited user to use the financial product.
Preferably, the business tasks can be decomposed into a plurality of sub-business tasks corresponding to main specific nodes of the financial products, wherein each specific node comprises node information of registration, completion, credit, movable support, quota raising, repayment and the like of the financial products.
The registration node subtask may, for example, invite a specific number of new users to complete registration of the financial product for the current user; for example, the mobile node subtask may complete a mobile operation for a particular number of invited users of the current user.
Specifically, financial products such as loan-type products, financial products.
In step S202, invitation information is generated.
And generating invitation information based on the invitation operation instruction of the current user on the service task page, wherein the invitation information comprises the current user identification and a new user guide page address containing the current user identification.
More specifically, when the operation of executing the business task on the business task page by the current user is accepted, a user identification is generated and associated with the current user. The foregoing is illustrative only, and is not to be construed as limiting the present invention. In other examples, the user may also obtain the user identification from the server.
And generating invitation information according to the user identification, wherein the invitation information comprises the user identification and a new user guide page address.
In step S203, the push invitation page
And pushing an invitation page to a current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user.
Specifically, the invitation page is used for guiding the current user to send invitation information to the relational person, namely the invited user.
For example, the current user may send the above-mentioned invitation information to the invited user, such as http:// www.xy bc/action 1/regeist. Phpvd=03ox 2345687eu, where "? "is preceded by a new user guide page address,"? "rear vid=rear string" 03ox2345687eu "is the current user identification.
For each sharing or sending of the invitation link for each user, a user identification is generated and is passed along with the invitation link to the new or invited user. In general, the user identity of the same user is unique and unchanged. Meanwhile, the server records each user identifier and the associated information thereof, and information data inquiry can be carried out in a user database of the server through the user identifiers so as to facilitate data use and subsequent data analysis.
In step S204, the invited user information is acquired and associated
And acquiring a current user identification returned by a new user guide page and page submitting information, wherein the page submitting information comprises newly registered invited user information, and associating the newly registered invited user with the current user according to the current user identification.
More specifically, page submission information returned by a new user guide page opened by the invited user after the current user sends out and the user identification of the current user are obtained. The page submission information includes registration information for the invited user, such as account name, cell phone number, user name, gender, etc. When the server records the new registered user to be invited, an inviter tag may be set, which corresponds to the user identifier of the inviter, i.e. the current user, as described in "03ox2345687eu" above.
In step S205, the behavior information of the invited user is monitored, and the current user service task completion status is obtained.
And taking the code or the equipment number of the invited user as an entry, acquiring the behavior information of the invited user, which is reported by the invited user in a dotting manner on a user behavior database page, and when the behavior information of the newly registered invited user in a preset quantity indicates that a specific node of the financial product is completed, completing a sub-business task corresponding to the specific node by the current user, and acquiring a sub-business task completion credential.
Alternatively, the same sub-business task may obtain multiple completion credentials based on a different number of multi-level subscriptions. For example, the registration node subtasks are preset to be 3, 5, 10 and 20, and when the number of successful registration persons of the invited users of the current user reaches 3, 5, 10 and 20, a subtask completion credential is respectively given to the current user.
Preferably, the same subtask completion credentials are different according to a predetermined number of differences. The subtask credential 1-A may be given, for example, when the number 3 is completed, the subtask credential 1-B when the number 5 is completed, and so on.
In step S206, restriction rule verification is performed.
And when the current user puts forward a resource requirement according to the completion sub-business task and the acquired sub-task completion certificate, carrying out limit rule verification.
The restriction rule includes: and in the same resource allocation period, the number of times that the same service task has acquired the allocation resources is less than or equal to a preset threshold value.
For example, the current user invites the same financial product to the activity during the day, and the number of times the credential redemption resources are completed using the subtasks is less than or equal to a preset threshold.
Specifically, taking the case of tearing down the red packet, if the preset threshold is 50 times, the upper limit of tearing down the red packet by the user on the same day is 50, the application beyond 50 times is refused, and the upper limit of getting is displayed.
In step S207, resource allocation
When the completion condition meets the constraint rule in step S206, corresponding resources are configured to the current user.
More specifically, when the current completion condition of the current user does not exceed the preset threshold number of times, a preset resource allocation rule is adopted to allocate resources to the current user.
Wherein, the preset resource allocation rule can be allocated according to a fixed value or according to a random value. When the random number is distributed according to the random value, the range of the random number is any random number in a preset numerical range.
By adopting the resource allocation method, the resource rewards of the business tasks can be decomposed into multi-step issuing, and the issuing threshold and the acquisition threshold are set at the same time, so that the resource allocation can be performed more safely and more effectively, unnecessary loss caused by rule loopholes is avoided, and better user experience is provided for users.
It should be noted that, in this example, the resources to be allocated mainly refer to digitized financial resources, such as coupons, and types of coupons include discount types, cash types, exemption types, and repayment types. Specifically, the specific resource is, for example, cash rewards, exempt rewards, or the like. It can be seen that the resource allocation of the present invention essentially performs a restricted allocation of resources according to a predetermined rule, so as to improve the allocation security of the resources.
Those skilled in the art will appreciate that all or part of the steps implementing the above-described embodiments are implemented as a program (computer program) executed by a computer data processing apparatus. The above-described method provided by the present invention can be implemented when the computer program is executed. Moreover, the computer program may be stored in a computer readable storage medium, which may be a readable storage medium such as a magnetic disk, an optical disk, a ROM, a RAM, or a storage array composed of a plurality of storage media, for example, a magnetic disk or a tape storage array. The storage medium is not limited to a centralized storage, but may be a distributed storage, such as cloud storage based on cloud computing.
The following describes apparatus embodiments of the invention that may be used to perform method embodiments of the invention. Details described in the embodiments of the device according to the invention should be regarded as additions to the embodiments of the method described above; for details not disclosed in the embodiments of the device according to the invention, reference may be made to the above-described method embodiments.
Fig. 3 is a diagram illustrating a resource allocation apparatus employing constraint rules according to an example embodiment. As shown in fig. 3, the resource allocation apparatus 30 employing the restriction rule includes a push module 301, an information module 302, an invitation page module 303, an association processing module 304, a monitoring module 305, a restriction rule module 306, a resource allocation rule module 307, and a configuration module 308.
The pushing module 301 is configured to push a service task page to the current user, and receive, through the service task page, an operation instruction for the current user to execute a service task.
Specifically, the pushing module 301 pushes the content of the service task page to the application of the current user terminal, and the application parses the rendering and displays the service task page to the current user.
The service task page can display the specific content of the service task to the user, and meanwhile, the operation instruction of executing the service task by the current user can also be received through the service task page. The operation instruction may be a touch-type interactive operation instruction such as touch and press, or a non-touch-type interactive operation instruction such as voice input.
Optionally, the business task includes sending invitation information for a financial product to a relationship of the current user to prompt the invited user to use the financial product.
Preferably, the business tasks can be decomposed into a plurality of sub-business tasks corresponding to main specific nodes of the financial products, wherein each specific node comprises node information of registration, completion, credit, movable support, quota raising, repayment and the like of the financial products.
The registration node subtask may, for example, invite a specific number of new users to complete registration of the financial product for the current user; for example, the mobile node subtask may complete a mobile operation for a particular number of invited users of the current user.
Specifically, financial products such as loan-type products, financial products.
The information module 302 is configured to generate invitation information based on an invitation operation instruction of the current user on the service task page, where the invitation information includes a current user identifier and a new user guide page address including the current user identifier.
More specifically, upon accepting the operation of the current user to perform the business task on the business task page, the information module 302 generates a user identification and associates the user identification with the current user. The foregoing is illustrative only, and is not to be construed as limiting the present invention. In other examples, the user may also obtain the user identification from the server.
And generating invitation information according to the user identification, wherein the invitation information comprises the user identification and a new user guide page address.
And the invitation page module 303 is configured to push an invitation page to a current user terminal, where the invitation page is configured to send invitation information to an invited user of the current user.
Specifically, the invitation page pushed by the invitation page module 303 is used for guiding the current user to send the invitation information to the relational person, i.e. the invited user.
For example, the current user may send the above-mentioned invitation information to the invited user, such as http:// www.xy bc/action 1/regeist. Phpvd=03ox 2345687eu, where "? "is preceded by a new user guide page address,"? "rear vid=rear string" 03ox2345687eu "is the current user identification.
For each sharing or sending of the invitation link for each user, a user identification is generated and is passed along with the invitation link to the new or invited user. In general, the user identity of the same user is unique and unchanged. Meanwhile, the server records each user identifier and the associated information thereof, and information data inquiry can be carried out in a user database of the server through the user identifiers so as to facilitate data use and subsequent data analysis.
And the association processing module 304 is configured to obtain a current user identifier and page submission information returned by the new user guidance page, where the page submission information includes information of the newly registered invited user, and associate the newly registered invited user with the current user according to the current user identifier.
More specifically, the association processing module 304 obtains the page submission information returned by the new user guide page opened by the invited user after the current user sends out and the user identification of the current user. The page submission information includes registration information for the invited user, such as account name, cell phone number, user name, gender, etc. When the server records the new registered user to be invited, an inviter tag may be set, which corresponds to the user identifier of the inviter, i.e. the current user, as described in "03ox2345687eu" above.
And the monitoring module 305 is configured to monitor behavior information of the newly registered invited user, and obtain the completion condition of the service task of the current user according to the behavior information and a reserved task rule.
The monitoring module 305 takes the code or the equipment number of the invited user as an entry, acquires the behavior information of the invited user, which is reported by the invited user in a dotting manner on a user behavior database page, and when a predetermined number of the newly registered behavior information of the invited user indicates that a specific node of the financial product is completed, the current user completes a sub-service task corresponding to the specific node, and acquires a sub-service task completion credential.
Alternatively, the same sub-business task may obtain multiple completion credentials based on a different number of multi-level subscriptions. For example, the registration node subtasks are preset to be 3, 5, 10 and 20, and when the number of successful registration persons of the invited users of the current user reaches 3, 5, 10 and 20, a subtask completion credential is respectively given to the current user.
Preferably, the same subtask completion credentials are different according to a predetermined number of differences. The subtask credential 1-A may be given, for example, when the number 3 is completed, the subtask credential 1-B when the number 5 is completed, and so on.
And the restriction rule module 306 is used for verifying the resource allocation restriction rule of the completion condition.
And when the current user puts forward a resource requirement according to the completion sub-business task and the acquired sub-task completion voucher, the restriction rule module performs restriction rule verification.
The restriction rule includes: and in the same resource allocation period, the number of times that the same service task has acquired the allocation resources is less than or equal to a preset threshold value.
For example, the current user invites the same financial product to the activity during the day, and the number of times the credential redemption resources are completed using the subtasks is less than or equal to a preset threshold.
Specifically, taking the case of tearing down the red packet, if the preset threshold is 50 times, the upper limit of tearing down the red packet by the user on the same day is 50, the application beyond 50 times is refused, and the upper limit of getting is displayed.
A resource allocation rule module 307 for determining the number of resource allocations based on the resource allocation rule.
More specifically, when the current completion situation of the current user does not exceed the preset threshold number of times, the resource allocation rule module 307 determines the number of resources configured by the current user by adopting a preset resource allocation rule.
Wherein, the preset resource allocation rule can be allocated according to a fixed value or according to a random value. When the random number is distributed according to the random value, the range of the random number is any random number in a preset numerical range.
And a configuration module 308, configured to configure corresponding resources to the current user when the completion situation meets the constraint rule.
It will be appreciated by those skilled in the art that the modules in the embodiments of the apparatus described above may be distributed in an apparatus as described, or may be distributed in one or more apparatuses different from the embodiments described above with corresponding changes. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
The following describes an embodiment of an electronic device according to the present invention, which may be regarded as a specific physical implementation of the above-described embodiment of the method and apparatus according to the present invention. Details described in relation to the embodiments of the electronic device of the present invention should be considered as additions to the embodiments of the method or apparatus described above; for details not disclosed in the embodiments of the electronic device of the present invention, reference may be made to the above-described method or apparatus embodiments.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. An electronic device 400 according to this embodiment of the present invention is described below with reference to fig. 4. The electronic device 400 shown in fig. 4 is merely an example and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 4, the electronic device 400 is embodied in the form of a general purpose computing device. The components of electronic device 400 may include, but are not limited to: at least one processing unit 410, at least one memory unit 420, a bus 430 connecting the different system components (including memory unit 420 and processing unit 410), a display unit 440, and the like.
Wherein the storage unit stores program code that is executable by the processing unit 410 such that the processing unit 410 performs the steps according to various exemplary embodiments of the present invention described in the electronic prescription stream processing method section above in this specification. For example, the processing unit 410 may perform the steps shown in fig. 2.
The memory unit 420 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 4201 and/or cache memory 4202, and may further include Read Only Memory (ROM) 4203.
The storage unit 420 may also include a program/utility 4204 having a set (at least one) of program modules 4205, such program modules 4205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 430 may be a local bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or using any of a variety of bus architectures.
Electronic device 400 may also communicate with one or more external devices 400' (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with electronic device 400, and/or any device (e.g., router, modem, etc.) that enables electronic device 400 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 450. Also, electronic device 400 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 460. The network adapter 460 may communicate with other modules of the electronic device 400 via the bus 430. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 400, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the exemplary embodiments described herein may be implemented in software, or may be implemented in software in combination with necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer readable storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, or a network device, etc.) to perform the above-mentioned method according to the present invention. The computer program, when executed by a data processing device, enables the computer readable medium to carry out the above-described method of the present invention.
The computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in accordance with embodiments of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or Digital Signal Processor (DSP). The present invention can also be implemented as an apparatus or device program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present invention may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
The above-described specific embodiments further describe the objects, technical solutions and advantageous effects of the present invention in detail, and it should be understood that the present invention is not inherently related to any particular computer, virtual device or electronic apparatus, and various general-purpose devices may also implement the present invention. The foregoing description of the embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (20)
1. A resource allocation method employing a constraint rule, comprising:
generating user identifications based on operation instructions of a current user for executing service tasks on a service task page, associating the user identifications with the current user, recording each user identification and associated information, and generating invitation information according to the user identifications, wherein the invitation information comprises the user identifications of the current user and a new user guide page address containing the current user identifications;
Pushing an invitation page to a current user terminal, wherein the invitation page is used for sending invitation information to an invited user of the current user;
Acquiring a current user identification and page submitting information returned by a new user guiding page opened by an invited user after the current user is sent out, wherein the page submitting information comprises newly registered invited user information, and associating and recording the newly registered invited user with the current user according to the current user identification;
Monitoring newly registered invited user behavior information, and taking the code or the equipment number of the invited user as an entry to acquire the invited user behavior information which is reported by the invited user in a dotting way on a user behavior database page; acquiring the completion condition of the business task of the current user according to the invited user behavior information and the reserved task rule, wherein if a preset number of newly registered invited user behavior information indicates that a specific node is completed, the current user completes a sub-business task corresponding to the specific node and acquires a sub-business task completion credential;
when the current user puts forward a resource requirement according to the completion sub-business task and the acquired sub-business task completion certificate, verifying a resource allocation restriction rule of the completion condition;
When the current completion condition of the current user does not exceed the preset threshold number of times and the completion condition accords with the limit rule, corresponding resources are configured for the current user.
2. The method as recited in claim 1, further comprising:
and pushing a service task page to the current user, and receiving an operation instruction of executing the service task by the current user through the service task page.
3. The method of claim 2, wherein the business task includes sending invitations to financial products to the current user's relatives to cause the invited user to use the financial products.
4. A method according to claim 3, wherein the business task further comprises: sub-business tasks corresponding to each particular node of the financial product.
5. The method of claim 4, wherein each specific node includes node information for registering, finishing, granting, moving, lifting, repayment of financial products.
6. The method as recited in claim 5, further comprising:
The newly registered invited user behavior information indicates that the specific node is completed including the specific node indicating that the financial product is completed.
7. The method as recited in claim 6, further comprising: the same sub-service task can acquire a plurality of sub-service completion credentials according to a plurality of levels of predetermined numbers, and the same sub-service task completion credentials are different according to different predetermined numbers.
8. The method of claim 7, wherein said configuring the corresponding resource to the current user comprises:
the preset resource allocation rule comprises allocation according to a fixed value or random value, and the range of the random number is any random number in a preset numerical value interval when the random number is allocated according to the random value;
And configuring a random number of resources in a first interval according to the certificate, wherein the first interval is a preset numerical interval.
9. The method of claim 8, wherein the restriction rule comprises:
and in the same resource allocation period, the number of acquired resource allocation is smaller than or equal to a preset threshold value.
10. A resource allocation apparatus employing a restriction rule, comprising:
The information module is used for generating a user identifier based on an invitation operation instruction of a current user for executing a service task on a service task page, associating the user identifier with the current user, recording each user identifier and associated information thereof, and generating invitation information according to the user identifier, wherein the invitation information comprises the user identifier of the current user and a new user guide page address containing the current user identifier;
The invitation page module is used for pushing an invitation page to a current user terminal, and the invitation page is used for sending invitation information to an invited user of the current user;
The association processing module is used for acquiring a current user identifier and page submitting information returned by a new user guide page opened by the invited user after the current user is sent out, wherein the page submitting information comprises newly registered invited user information, and the newly registered invited user is associated with the current user according to the current user identifier and recorded;
the monitoring module is used for monitoring the newly registered behavior information of the invited user, and acquiring the behavior information of the invited user, which is reported by the invited user in a dotting way on a user behavior database page, by taking the code or the equipment number of the invited user as an entry; acquiring the completion condition of the business task of the current user according to the invited user behavior information and the reserved task rule, wherein if a preset number of newly registered invited user behavior information indicates that a specific node is completed, the current user completes a sub-business task corresponding to the specific node and acquires a sub-business task completion credential;
The limiting rule module is used for verifying a limiting rule of resource allocation for the completion condition when the current user puts forward a resource requirement according to the completion sub-service task and the acquired sub-service task completion certificate;
and the configuration module is used for configuring corresponding resources for the current user when the current completion condition of the current user does not exceed the preset threshold number of times and the completion condition accords with the limit rule.
11. The apparatus as recited in claim 10, further comprising:
And the pushing module is used for pushing a service task page to the current user, and receiving an operation instruction of executing the service task by the current user through the service task page.
12. The apparatus of claim 11, wherein the business task includes sending invitations to financial products to the current user's relatives to cause the invited user to use the financial products.
13. The apparatus of claim 12, wherein the business task further comprises: sub-business tasks corresponding to each particular node of the financial product.
14. The apparatus of claim 13, wherein each specific node includes node information for registration, completion, credit, movable support, payoff, and repayment of a financial product.
15. The apparatus of claim 14, wherein the monitoring module further comprises: the newly registered invited user behavior information indicates that the specific node is completed including the specific node indicating that the financial product is completed.
16. The apparatus as recited in claim 15, further comprising:
The same sub-service task can acquire a plurality of sub-service completion credentials according to a plurality of levels of predetermined numbers, and the same sub-service task completion credentials are different according to different predetermined numbers.
17. The apparatus as recited in claim 16, further comprising:
The resource allocation rule module is used for setting and executing a resource allocation rule, wherein the resource allocation rule comprises allocation according to a fixed value or random value, and the range of the random number is any random number in a preset numerical value interval when the random number is allocated according to the random value; and configuring a random number of resources in a first interval according to the certificate, wherein the first interval is a preset numerical interval.
18. The apparatus of claim 17, wherein the restriction rules executed by the restriction rules module comprise: and in the same resource allocation period, the number of acquired resource allocation is smaller than or equal to a preset threshold value.
19. An electronic device, wherein the electronic device comprises:
A processor; and
A memory storing computer executable instructions that, when executed, cause the processor to perform the method of any of claims 1-9.
20. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011027644.1A CN112347386B (en) | 2020-09-25 | 2020-09-25 | Resource configuration method and device adopting restriction rule and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011027644.1A CN112347386B (en) | 2020-09-25 | 2020-09-25 | Resource configuration method and device adopting restriction rule and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112347386A CN112347386A (en) | 2021-02-09 |
CN112347386B true CN112347386B (en) | 2024-06-21 |
Family
ID=74360434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011027644.1A Active CN112347386B (en) | 2020-09-25 | 2020-09-25 | Resource configuration method and device adopting restriction rule and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112347386B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113343148B (en) * | 2021-06-18 | 2023-12-01 | 上海哔哩哔哩科技有限公司 | Resource processing method, client, server and system |
CN113674018A (en) * | 2021-07-26 | 2021-11-19 | 山东赤子城网络技术有限公司 | Resource transfer method, apparatus, computer equipment and storage medium |
CN114968528B (en) * | 2022-05-30 | 2024-11-22 | 淘宝(中国)软件有限公司 | Policy-based information processing method, electronic device, and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807649A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | Invitation reward method and system for financial products |
CN111612502A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and device based on activity task and electronic equipment |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8326775B2 (en) * | 2005-10-26 | 2012-12-04 | Cortica Ltd. | Signature generation for multimedia deep-content-classification by a large-scale matching system and method thereof |
US10218719B2 (en) * | 2016-09-21 | 2019-02-26 | Apple Inc. | Credential modification notifications |
CN108268605B (en) * | 2017-12-27 | 2021-02-05 | 北京洪泰同创信息技术有限公司 | Shared space resource management method and system |
CN110807650A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | New financial product user invitation method and system |
CN110807710A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | Method and system for managing invitation data of user inviting friends |
CN111612510A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and system based on activity task and electronic equipment |
CN111612511A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and device based on activity task and electronic equipment |
CN111681020A (en) * | 2020-04-16 | 2020-09-18 | 上海淇玥信息技术有限公司 | Resource configuration method and device based on task event of relationship person and electronic equipment |
CN111680245A (en) * | 2020-04-22 | 2020-09-18 | 上海淇玥信息技术有限公司 | Page display method and device based on business event and electronic equipment |
CN111681032B (en) * | 2020-04-28 | 2024-02-13 | 奇富数科(上海)科技有限公司 | Method and device for configuring additional resources and electronic equipment |
-
2020
- 2020-09-25 CN CN202011027644.1A patent/CN112347386B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807649A (en) * | 2019-09-26 | 2020-02-18 | 北京淇瑀信息科技有限公司 | Invitation reward method and system for financial products |
CN111612502A (en) * | 2020-04-11 | 2020-09-01 | 上海淇玥信息技术有限公司 | Resource allocation method and device based on activity task and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN112347386A (en) | 2021-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210279780A1 (en) | Transactional Platform | |
CN112347386B (en) | Resource configuration method and device adopting restriction rule and electronic equipment | |
CN110324414B (en) | Resource bit flow distribution method and device and electronic equipment | |
CN110807649A (en) | Invitation reward method and system for financial products | |
CN110348894B (en) | Method and device for displaying resource advertisement and electronic equipment | |
CN111612502A (en) | Resource allocation method and device based on activity task and electronic equipment | |
CN111159534A (en) | User portrait based aid decision making method and device, equipment and medium | |
CN111611513B (en) | Page display method and device based on user identity information and electronic equipment | |
CN112348659B (en) | User identification policy distribution method and device and electronic equipment | |
CN111611514B (en) | Page display method and device based on user login information and electronic equipment | |
CN109447712A (en) | A kind of consultation method, device, electronic equipment and storage medium | |
CN110333866B (en) | Method and device for generating receiving page and electronic equipment | |
CN111612510A (en) | Resource allocation method and system based on activity task and electronic equipment | |
CN111770128B (en) | Message management method and device | |
CN112347344A (en) | Management method and device for multi-period additional resource certificate and electronic equipment | |
CN112346628A (en) | Special shared resource certificate management method, system and electronic equipment | |
CN112346608A (en) | Page display method and device based on business activity result display and electronic equipment | |
CN111612504A (en) | Information sending method and device for task completion user and electronic equipment | |
CN111221449A (en) | Method and device for establishing and displaying sharing type activity and electronic equipment | |
CN110796543A (en) | Method and device for obtaining customized information based on relational network and electronic equipment | |
CN111681032B (en) | Method and device for configuring additional resources and electronic equipment | |
CN108763881A (en) | Method and apparatus for controlling user right | |
CN113298555A (en) | Promotion strategy generation method and device and electronic equipment | |
CN111612508A (en) | Financial resource allocation request processing method and device and electronic equipment | |
CN112347389B (en) | Resource configuration method and device based on task construction and completion information verification, and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |