CN113902453A - A method and system for avoiding malicious competition - Google Patents
A method and system for avoiding malicious competition Download PDFInfo
- Publication number
- CN113902453A CN113902453A CN202111192542.XA CN202111192542A CN113902453A CN 113902453 A CN113902453 A CN 113902453A CN 202111192542 A CN202111192542 A CN 202111192542A CN 113902453 A CN113902453 A CN 113902453A
- Authority
- CN
- China
- Prior art keywords
- target
- user
- consultation
- malicious
- customers
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Qualifying participants for shopping transactions
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides a method and a system for avoiding malicious competition, wherein the method comprises the following steps: acquiring a target client to be distributed, wherein the target client carries target information; according to the target information, carrying out malicious competitor identification on the target client, and passing or intercepting the target client according to a malicious identification result; when the target client passes through the malicious competitor identification, carrying out real client identification on the target client according to the target information; and distributing the target client to the corresponding service personnel according to the real recognition result. The invention can screen out the situation that service personnel imitate customers, maintain good influence on ecological environment, relieve malicious competition caused by mechanism loopholes and reasonably arrange the reception mechanism of the service personnel.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for avoiding malicious competition.
Background
Due to the rapid development of internet technology, the model of house sales has expanded from traditional face-to-face sales of service personnel to an online house marketing model. The prior 'consultation reception' in the on-line house property marketing mode has the defect of mechanism, for example, a salesman exhibition list which is attached to a house source and can be consulted by a client is used for displaying the sequencing and the real personal information of the salesman in a public way, and the prior house source or a building is used for the default salesman which is directly consulted by the client and also used for displaying the personal information in a public way. For example, if a current default salesperson a is consulted by a first customer, a has waited for the customer, the system will set the next salesperson B to become the customer for the current default waited for sale, and B will waited for the next second consultation.
Based on the mechanism, a salesperson can use a second mobile phone number and a micro signal of the salesperson to pretend to be a client to consult for current sales, and squeeze out original sales, so that the salesperson obtains a current default exhibition position and becomes a receptionist of the next real client, thereby increasing the probability of obtaining customers and being not beneficial to the benign operation of house property marketing.
Disclosure of Invention
Based on this, it is necessary to provide a method and system for avoiding malicious competition in view of the above technical problems.
A method of circumventing malicious competition, comprising the steps of: acquiring a target client to be distributed, wherein the target client carries target information; according to the target information, carrying out malicious competitor identification on the target client, and passing or intercepting the target client according to a malicious identification result; when the target client passes through the malicious competitor identification, carrying out real client identification on the target client according to the target information; and distributing the target client to the corresponding service personnel according to the real recognition result.
In one embodiment, before the obtaining the target customer to be distributed, the method further includes: and anonymizing the real information of the service staff at the default exhibition position on the network page, and replacing the display with a default head portrait and a random number.
In one embodiment, the identifying, according to the target information, a malicious competitor of the target customer, and passing or intercepting the target customer according to a malicious identification result specifically includes: the target information comprises a device identifier and an application software identifier, and the application software identifiers correspond to the target account numbers one by one; inquiring whether sales information exists under the target account according to the application software identification, and if the sales information exists, judging that the target account is a malicious competitor; if no sales information exists, carrying out real customer identification on the target account; or associating the device identifier with the application software identifier, querying a plurality of application software identifiers of the same device according to the device identifier, associating the plurality of application software identifiers with the device identifier, and if sales information exists in at least one of the plurality of application software identifiers, determining that the target account corresponding to the device identifier is a malicious competitor; if no sales information exists under all application software identifications, carrying out real customer identification on the target account; and marking a malicious competition identifier on the target account determined as the malicious competition, and hiding the consultation button for the target account carrying the malicious competition identifier.
In one embodiment, the performing, when the target customer is identified by the malicious competitor, real customer identification on the target customer according to the target information specifically includes: setting a buried point on a network page, and recording user behavior information, wherein the user behavior information comprises a page browsed by a user, clicking time and duration and times for browsing a building or a house source; analyzing and counting the user browsing duration according to the user behavior information, assigning a score to the user browsing duration, recording the score as a browsing duration score T, and calculating the browsing duration score according to whether a history transaction client exists or not; analyzing and counting the duration of the consultation problem according to the user behavior information, assigning a score to the duration of the consultation problem, recording the score as a consultation problem score Q, and calculating the consultation problem score according to whether a historical transaction client exists or not; analyzing and counting other behavior information according to the user behavior information, assigning scores to the other behavior information, recording the scores as other behavior scores O, and calculating the other behavior scores according to scoring rules; and calculating the pre-transaction rate of the user according to the browsing duration value T, the consultation question duration value Q and other behavior values O, and identifying the real user according to the pre-transaction rate.
In one embodiment, the analyzing and counting the browsing duration of the user according to the user behavior information, assigning a score to the browsing duration of the user, and recording the score as a browsing duration score T, and calculating the browsing duration score according to whether there is a history transaction client, specifically includes: when a history transaction client exists, the calculation rule of the browsing duration score is as follows: if the user browsing duration is more than (2+ n) than the average browsing duration of the submitted clients, then T ═ 45+ (n 0.1) n is more than or equal to 1; if the average browsing duration of the committed clients is less than the browsing duration of the user and is not more than 2, the average browsing duration of the committed clients is T-40; if the browsing duration of the user is equal to the average browsing duration of the committed clients, T is 35; if (1/2) the average browsing duration of the committed clients is less than or equal to the average browsing duration of the users and less than the average browsing duration of the committed clients, T is 30; if the user browsing time length is less than (1/2) the average time length of the finished clients, T is 20; when no history transaction client exists, the calculation rule of the browsing duration score is as follows:
if the total user duration/browsing times is more than 0 and less than or equal to 1 minute, T is 20; if the total browsing time length/browsing times of the user is less than or equal to 5 minutes and is less than 1 minute, T is equal to 30; if (the total browsing time length/browsing times of the user) is more than or equal to 5 minutes, then T is 40; if (total user browsing duration/browsing number) > 5 × n +1 min, T is 45+0.1 n.
In one embodiment, the analyzing and counting the duration of the consultation problem according to the user behavior information, assigning a score to the duration of the consultation problem, and recording as a consultation problem score Q, and calculating the consultation problem score according to whether a historical transaction client exists, specifically includes: when a historical transaction client exists, the calculation rule of the consultation problem score is as follows: if the total time length of the user consultation problems is more than (2+ n) the average consultation time length of the submitted clients, Q is 40+ (n is 0.1), and n is more than or equal to 1; if the total time of the user consultation problems is more than 2 and the average time of the consultation problems of the clients is up to 40; if the average consulting time of the committed clients is less than the total consulting time of the users and is not more than 2, and the average consulting time of the committed clients is less than 35; if the total time length of the user consultation problem is equal to the average consultation time length of the committed clients, Q is equal to 30; if (1/2) the average consulted duration of the committed clients is less than or equal to the user consulted duration less than the average consulted duration of the committed clients, Q is 25; if the user consultation duration is less than (1/2) and the average consultation duration of the submitted clients is reached, Q is 15; when no historical transaction client exists, the calculation rule of the consultation problem score is as follows: if the total time length of the user consultation problem/the consultation times are more than 0 and less than or equal to 1 minute, Q is 15; if the total time length of the user consultation problem/consultation times is less than or equal to 5 minutes and is less than 1 minute, Q is 25; if (the total duration of the user consultation questions/the consultation times) is more than or equal to 5 minutes, Q is 35; if (total duration of user consultation questions/number of consultation times) > 5 × n +1 min, Q is 40+0.1 n.
In one embodiment, the analyzing and counting other behavior information according to the user behavior information, assigning a score to the other behavior information, and recording as a score O of the other behavior, and calculating the score of the other behavior according to a scoring rule specifically includes: the other behaviors comprise collecting the building or house source, telephone contact and house watching, and the scores are respectively 2, 2 and 6; the scoring rule is as follows: o (collection + telephone contact + house watching) is less than or equal to 10.
In one embodiment, the calculating a pre-deal rate of the user according to the browsing duration score T, the consulting question duration score Q, and the other behavior scores O, and performing real user identification according to the pre-deal rate specifically includes: recording the user pre-transaction rate as S, wherein the calculation formula of the user pre-transaction rate is as follows: s ═ 100% of (T + Q + O); and identifying the real user according to a preset pre-transaction rate range.
In one embodiment, the allocating the target customer to the corresponding service person according to the real recognition result specifically includes: let W be the weight of the user consultation question, then W is Q/(T + Q + O) × 100%; when there is a history transaction client, let WAre all made ofConsulting a weighted average of the questions for the historical friendship client; mixing the W and the WAre all made ofComparing, if W is larger than or equal to WAre all made ofIf the default pre-transaction rate is 80%, the current target customer is distributed to the current service staff, and if W is less than WAre all made ofThen the next target customer is distributed to the next service personnel; and when no historical transaction client exists, recording the number of the current target clients to be distributed as n, and if the sum of the pre-transaction rates of the n clients does not reach 80%, ending the default reception by the target client and the current service staff to obtain the target information of the next target client.
A system to circumvent malicious competition, comprising: the target client acquisition module is used for acquiring a target client to be distributed, and the target client carries target information; the malicious competitor identification module is used for identifying malicious competitors for the target client according to the target information and a malicious identification result and passing or intercepting the target client; the real customer identification module is used for carrying out real customer identification on the target customer according to the target information when the target customer passes the identification of the malicious competitor; and the target customer distribution module is used for distributing the target customer to the corresponding service personnel according to the real identification result.
Compared with the prior art, the invention has the advantages and beneficial effects that: the invention can screen out the situation that service personnel imitate customers, maintain good influence on ecological environment, relieve malicious competition caused by mechanism loopholes and reasonably arrange the reception mechanism of the service personnel.
Drawings
FIG. 1 is a flow diagram of a method of avoiding malicious competition, according to an embodiment;
fig. 2 is a schematic structural diagram of a system for avoiding malicious competition in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings by way of specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In one embodiment, as shown in fig. 1, there is provided a method of avoiding malicious competition, comprising the steps of:
step S101, a target client to be distributed is obtained, and the target client carries target information.
Specifically, a target client to be distributed is obtained, the target client carries corresponding target information, and the client is identified according to the target information.
And S102, identifying malicious competitors for the target client according to the target information, and passing or intercepting the target client according to a malicious identification result.
Specifically, according to target information, identifying a malicious competitor for a target client, and if the target client is identified to be the malicious competitor, intercepting the target client; and if the target client is identified not to be the malicious competitor, carrying out real client identification on the target client, and further excluding the malicious competitor.
And step S103, when the target client passes through the identification of the malicious competitor, carrying out real client identification on the target client according to the target information.
Specifically, when the target client is identified by the malicious competitor, the real client identification is carried out on the target client according to the target information, so that the corresponding service personnel can be conveniently distributed to the target client.
And step S104, distributing the target client to the corresponding service personnel according to the real identification result.
Specifically, the target client is distributed to the corresponding service personnel according to the real recognition result.
In the embodiment, target information of a target client to be distributed is obtained, malicious competitor identification is performed on the target client according to the target information, the target client is passed or intercepted according to a malicious identification result, real client identification is performed on the target client according to the target information when the target client is identified by the malicious competitor, the target client is distributed to a corresponding service staff according to a real identification result, so that the situation that the service staff imitates the client is screened out, a good ecological environment is maintained, malicious competition caused by mechanism loopholes is relieved, and a reception mechanism of the service staff is reasonably arranged.
Before step S101, the method further includes: and anonymizing the real information of the service staff at the default exhibition position on the network page, and replacing the display with a default head portrait and a random number.
Specifically, before the target client is obtained, the information of the service staff at the exhibition position of the network page can be anonymized, the default head portrait and the random number are adopted to replace the exhibition, the target client can check the real information of the service staff to be waited after entering the consultation page, and the situation that the service staff falsely consults other service staff is effectively avoided.
Wherein, step S102 specifically includes: the target information comprises equipment identification and application software identification, and the application software identification corresponds to the target account one by one; inquiring whether sales information exists under a target account according to the application software identification, and if the sales information exists, judging the target account as a malicious competitor; if no sales information exists, real customer identification is carried out on the target account; or associating the device identifier with the application software identifiers, querying a plurality of application software identifiers of the same device according to the device identifier, associating the plurality of application software identifiers with the device identifier, and if sales information exists in at least one of the plurality of application software identifiers, determining that the target account corresponding to the device identifier is a malicious competitor; if no sales information exists under all application software identifications, carrying out real customer identification on the target account; and marking a malicious competition identifier on the target account determined as the malicious competition, and hiding the consultation button for the target account carrying the malicious competition identifier.
Specifically, the target information includes a device identifier and an application software identifier, the application software identifier corresponds to the target account one by one, and the device identifier and the application software identifier are obtained according to user authorization; according to the application software identification, inquiring whether sales information exists under a target account, and persisting user data information to a database, if sales information exists, judging that the target account is a malicious competitor, and if sales information does not exist, performing real customer identification on the target account; or the device identification is associated with the application software identification, a plurality of application software identifications of the same device are inquired according to the device identification, the plurality of application software identifications are associated with the device identification, if sales information exists in at least one of the plurality of application software identifications, a target account corresponding to the device identification is judged to be a malicious competitor, and if no sales information exists in all the application software identifications, real customer identification is carried out on the target account; and marking a malicious competition identifier on the target account determined to be in malicious competition, and hiding a consultation button for the target account carrying the malicious competition identifier, namely, the service personnel cannot consult the floor where the service personnel are located.
Wherein, step S103 specifically includes: setting a buried point on a network page, and recording user behavior information, wherein the user behavior information comprises a page browsed by a user, clicking time and duration and times for browsing a building or a house source; analyzing and counting the user browsing duration according to the user behavior information, assigning a score to the user browsing duration, recording the score as a browsing duration score T, and calculating the browsing duration score according to whether a history transaction client exists or not; analyzing and counting the duration of the consultation problem according to the user behavior information, assigning a score to the duration of the consultation problem, recording the score as a consultation problem score Q, and calculating the score of the consultation problem according to whether a historical transaction client exists or not; analyzing and counting other behavior information according to the user behavior information, assigning scores to the other behavior information, recording the scores as other behavior scores O, and calculating other behavior scores according to scoring rules; and calculating the pre-transaction rate of the user according to the browsing time length value T, the consultation question time length value Q and other behavior values O, and identifying the real user according to the pre-transaction rate.
Specifically, in one case, when the service person uses two mobile phones for malicious competition, the malicious competitors can be further excluded by real customer identification. Setting a buried point on a network page, and recording user behavior information, such as each page browsed by a user, each event clicked, and the duration and the number of times of browsing a building or a house source; analyzing and counting the browsing duration, the consultation problem duration and other behavior information of the user according to the behavior information of the user, assigning scores, respectively recording the scores as a browsing duration score T, a consultation problem score Q and other behavior scores O, calculating the pre-transaction rate of the user according to the three scores, and identifying the real user according to the pre-transaction rate.
When a history transaction client exists, the calculation rule of the browsing time length score is as follows: if the user browsing duration is more than (2+ n) than the average browsing duration of the submitted clients, then T ═ 45+ (n 0.1) n is more than or equal to 1; if the average browsing duration of the committed clients is less than the browsing duration of the user and is not more than 2, the average browsing duration of the committed clients is T-40; if the browsing duration of the user is equal to the average browsing duration of the committed clients, T is 35; if (1/2) the average browsing duration of the committed clients is less than or equal to the average browsing duration of the users and less than the average browsing duration of the committed clients, T is 30; if the user browsing time length is less than (1/2) the average time length of the finished clients, T is 20;
when no history transaction client exists, the calculation rule of the browsing duration score is as follows: if the total user duration/browsing times is more than 0 and less than or equal to 1 minute, T is 20; if the total browsing time length/browsing times of the user is less than or equal to 1 minute and less than or equal to 5 minutes, the T is 30, and if the total browsing time length/browsing times of the user is more than or equal to 5 minutes, the T is 40; if (total user browsing duration/browsing number) > 5 × n +1 min, T is 45+0.1 n.
Wherein, when the historical transaction client exists, the calculation rule of the consultation problem score is as follows: if the total time length of the user consultation problems is more than (2+ n) the average consultation time length of the submitted clients, Q is 40+ (n is 0.1), and n is more than or equal to 1; if the total time of the user consultation problems is more than 2 and the average time of the consultation problems of the clients is up to 40; if the average consulting time of the committed clients is less than the total consulting time of the users and is not more than 2, and the average consulting time of the committed clients is less than 35; if the total time length of the user consultation problem is equal to the average consultation time length of the committed clients, Q is equal to 30; if (1/2) the average consulted duration of the committed clients is less than or equal to the user consulted duration less than the average consulted duration of the committed clients, Q is 25; if the user consultation duration is less than (1/2) and the average consultation duration of the submitted clients is reached, Q is 15;
when no historical transaction client exists, the calculation rule of the consultation problem score is as follows: if the total time length of the user consultation problem/the consultation times are more than 0 and less than or equal to 1 minute, Q is 15; if the total time length of the user consultation problem/consultation times is less than or equal to 5 minutes and is less than 1 minute, Q is 25; if (the total duration of the user consultation questions/the consultation times) is more than or equal to 5 minutes, Q is 35; if (total duration of user consultation questions/number of consultation times) > 5 × n +1 min, Q is 40+0.1 n.
Wherein, other behaviors comprise collecting the building or house source, telephone contact and house watching, and the scores are respectively 2, 2 and 6; the scoring rule is as follows: o (collection + telephone contact + house watching) is less than or equal to 10.
Recording the user pre-transaction rate as S, wherein the calculation formula of the user pre-transaction rate is as follows:
S=(T+Q+O)*100%;
and identifying the real user according to a preset pre-transaction rate range.
Specifically, for example, a pre-maturity of less than 40% is considered as an untrusted user, for which the consultation button is hidden; the pre-transaction rate is 40% -60%, the user is determined as an in-doubt user, and a consultation button is opened but the real information of the reception service staff is hidden; the pre-transaction rate exceeds 60%, the client is determined as a real client, and a consultation button and real information are opened; the pre-maturity of over 80% is considered as an important client to which a consultation button and real information are opened.
Wherein, step S104 specifically includes: let W be the weight of the user consultation question, then
W=Q/(T+Q+O)*100%;
When there is a history transaction client, let WAre all made ofConsulting a weighted average of the questions for the historical friendship client; mixing W with WAre all made ofComparing, if W is larger than or equal to WAre all made ofIf the default pre-transaction rate is 80%, the target customer is allocated to the current service personnel, and if W is less than WAre all made ofThen the target customer is distributed to the next service personnel;
and when no historical transaction client exists, recording the number of the current target clients to be distributed as n, and if the sum of the pre-transaction rates of the n clients does not reach 80%, ending the default reception by the target client and the current service staff to obtain the target information of the next target client.
Specifically, when the historical transaction client exists, the weight of the user consultation problem is compared with the average value of the weights of the consultation problems of the historical transaction client, and W is more than or equal to WAre all made ofWhen the pre-transaction rate of the current target customer is up to 80%; at W < WAre all made ofThen, the next target customer is allocated to the next service staff; when no historical transaction client exists, the number of the current target clients to be distributed is recorded as n, if the sum of the pre-transaction rates of the n clients does not reach 80%, the current target client and the current service personnel finish the default reception to obtain the target information of the next target client, and the next target client is identified with the real client through malicious competitionAfter identification, the server is distributed to the next service personnel for reception.
As shown in fig. 2, there is provided a system 20 for avoiding malicious competition, comprising: a target client acquisition module 21, a malicious competitor identification module 22, a real client identification module 23 and a target client distribution module 24, wherein:
a target client obtaining module 21, configured to obtain a target client to be allocated, where the target client carries target information;
the malicious competitor identification module 22 is used for identifying malicious competitors for the target client according to the target information and the malicious identification result, and passing or intercepting the target client;
the real client identification module 23 is configured to perform real client identification on the target client according to the target information when the target client passes through the malicious competitor identification;
and the target client distribution module 24 distributes the target client to the corresponding service personnel according to the real identification result.
In one embodiment, the malicious competitor identification module 22 is specifically configured to: the target information comprises equipment identification and application software identification, and the application software identification corresponds to the target account one by one; inquiring whether sales information exists under a target account according to the application software identification, and if the sales information exists, judging the target account as a malicious competitor; if no sales information exists, real customer identification is carried out on the target account; or associating the device identifier with the application software identifiers, querying a plurality of application software identifiers of the same device according to the device identifier, associating the plurality of application software identifiers with the device identifier, and if sales information exists in at least one of the plurality of application software identifiers, determining that the target account corresponding to the device identifier is a malicious competitor; if no sales information exists under all application software identifications, carrying out real customer identification on the target account; and marking a malicious competition identifier on the target account determined as the malicious competition, and hiding the consultation button for the target account carrying the malicious competition identifier.
In one embodiment, the real client identification module 23 is specifically configured to: setting a buried point on a network page, and recording user behavior information, wherein the user behavior information comprises a page browsed by a user, clicking time and duration and times for browsing a building or a house source; analyzing and counting the user browsing duration according to the user behavior information, assigning a score to the user browsing duration, recording the score as a browsing duration score T, and calculating the browsing duration score according to whether a history transaction client exists or not; analyzing and counting the duration of the consultation problem according to the user behavior information, assigning a score to the duration of the consultation problem, recording the score as a consultation problem score Q, and calculating the score of the consultation problem according to whether a historical transaction client exists or not; analyzing and counting other behavior information according to the user behavior information, assigning scores to the other behavior information, recording the scores as other behavior scores O, and calculating other behavior scores according to scoring rules; and calculating the pre-transaction rate of the user according to the browsing time length value T, the consultation question time length value Q and other behavior values O, and identifying the real user according to the pre-transaction rate.
In one embodiment, the target customer allocation module 24 is specifically configured to: let W be the weight of the user consultation question, then W is Q/(T + Q + O) × 100%; when there is a history transaction client, let WAre all made ofConsulting a weighted average of the questions for the historical friendship client; mixing W with WAre all made ofComparing, if W is larger than or equal to WAre all made ofIf the default pre-transaction rate is 80%, distributing the current target customer to the current service personnel, and if W is less than WAre all made ofThen the next target customer is distributed to the next service personnel; and when no historical transaction client exists, recording the number of the current target clients to be distributed as n, and if the sum of the pre-transaction rates of the n clients does not reach 80%, ending the default reception by the target client and the current service staff to obtain the target information of the next target client.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
It will be apparent to those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be centralized on a single computing device or distributed across a network of computing devices, and optionally they may be implemented in program code executable by a computing device, such that they may be stored on a computer storage medium (ROM/RAM, magnetic disks, optical disks) and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The foregoing is a more detailed description of the present invention that is presented in conjunction with specific embodiments, and the practice of the invention is not to be considered limited to those descriptions. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111192542.XA CN113902453B (en) | 2021-10-13 | 2021-10-13 | A method and system for avoiding malicious competition |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111192542.XA CN113902453B (en) | 2021-10-13 | 2021-10-13 | A method and system for avoiding malicious competition |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN113902453A true CN113902453A (en) | 2022-01-07 |
| CN113902453B CN113902453B (en) | 2025-04-29 |
Family
ID=79191812
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111192542.XA Active CN113902453B (en) | 2021-10-13 | 2021-10-13 | A method and system for avoiding malicious competition |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113902453B (en) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108734366A (en) * | 2017-04-24 | 2018-11-02 | 北京京东尚科信息技术有限公司 | User identification method and its system |
| CN108833453A (en) * | 2017-04-26 | 2018-11-16 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus determined using account |
| US20190026752A1 (en) * | 2017-07-20 | 2019-01-24 | Dong Min Kim | System for providing real property information online and system for providing safe transaction service using bigdata-based grade classification and market value prediction |
| CN111275487A (en) * | 2020-01-18 | 2020-06-12 | 李琦 | Client data acquisition method and device, server and storage medium |
| CN111292140A (en) * | 2020-03-19 | 2020-06-16 | 重庆锐云科技有限公司 | Online customer intelligent distribution method |
| CN112396504A (en) * | 2021-01-21 | 2021-02-23 | 北京天通慧智科技有限公司 | E-commerce order intercepting method and device and electronic equipment |
| CN112580952A (en) * | 2020-12-09 | 2021-03-30 | 腾讯科技(深圳)有限公司 | User behavior risk prediction method and device, electronic equipment and storage medium |
-
2021
- 2021-10-13 CN CN202111192542.XA patent/CN113902453B/en active Active
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108734366A (en) * | 2017-04-24 | 2018-11-02 | 北京京东尚科信息技术有限公司 | User identification method and its system |
| CN108833453A (en) * | 2017-04-26 | 2018-11-16 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus determined using account |
| US20190026752A1 (en) * | 2017-07-20 | 2019-01-24 | Dong Min Kim | System for providing real property information online and system for providing safe transaction service using bigdata-based grade classification and market value prediction |
| CN111275487A (en) * | 2020-01-18 | 2020-06-12 | 李琦 | Client data acquisition method and device, server and storage medium |
| CN111292140A (en) * | 2020-03-19 | 2020-06-16 | 重庆锐云科技有限公司 | Online customer intelligent distribution method |
| CN112580952A (en) * | 2020-12-09 | 2021-03-30 | 腾讯科技(深圳)有限公司 | User behavior risk prediction method and device, electronic equipment and storage medium |
| CN112396504A (en) * | 2021-01-21 | 2021-02-23 | 北京天通慧智科技有限公司 | E-commerce order intercepting method and device and electronic equipment |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113902453B (en) | 2025-04-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Markos et al. | Information sensitivity and willingness to provide continua: a comparative privacy study of the United States and Brazil | |
| Christl et al. | Corporate surveillance in everyday life | |
| Chou et al. | Factors influencing the adoption of mobile commerce in Taiwan | |
| Hille et al. | Consumer fear of online identity theft: Scale development and validation | |
| US20100100398A1 (en) | Social network interface | |
| EP3918770A1 (en) | Systems and methods for vulnerability assessment and remedy identification | |
| US20080015979A1 (en) | Web-based searching for payment card products with credit pre-approvals | |
| AU2011309773A1 (en) | System, method, and computer readable medium for distributing targeted data using anonymous profiles | |
| CN101454771A (en) | System and method for classifying and labeling individuals based on feature matching using multimedia surveys | |
| KR101917852B1 (en) | A System of Providing Hospital Management Consulting Service | |
| CN112801670B (en) | Risk assessment method and device for payment operations | |
| Libaque-Sáenz et al. | Understanding antecedents to perceived information risks: An empirical study of the Korean telecommunications market | |
| WO2023286665A1 (en) | Compliance information acquisition device, method, and program | |
| US20130110660A1 (en) | Method of collecting opinions and surveying data | |
| CN115423599A (en) | Credit evaluation method and device, electronic equipment and storage medium | |
| CN110929144A (en) | Business data management method, system and readable storage medium | |
| KR101253676B1 (en) | Loan diagnosis simulation service system and method | |
| CN101449284A (en) | Scoring traffic quality to network sites using cross-correlated traffic parameters | |
| CN113902453A (en) | A method and system for avoiding malicious competition | |
| Petyaeva et al. | Improving our understanding of user trial samples using survey data | |
| JP7553937B2 (en) | Evaluation system, evaluation method, and program | |
| KR20240001807A (en) | Method and device for providing brokerage service for real estate mortgage based on de-identification of personal data | |
| Martin et al. | No Cookies for You!: Evaluating the Promises of Big Tech's' Privacy-Enhancing Techniques | |
| US20110251864A1 (en) | Method and system for mitigating survey fraud | |
| KR101656024B1 (en) | Matching apparatus and method for mate candidate |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |