CN111160737A - Adaptation method of resource allocation scheme and related equipment - Google Patents
Adaptation method of resource allocation scheme and related equipment Download PDFInfo
- Publication number
- CN111160737A CN111160737A CN201911310363.4A CN201911310363A CN111160737A CN 111160737 A CN111160737 A CN 111160737A CN 201911310363 A CN201911310363 A CN 201911310363A CN 111160737 A CN111160737 A CN 111160737A
- Authority
- CN
- China
- Prior art keywords
- user
- resource allocation
- information
- allocation scheme
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Operations Research (AREA)
- Educational Administration (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Game Theory and Decision Science (AREA)
- Technology Law (AREA)
- Data Mining & Analysis (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses an adaptation method of a resource allocation scheme and related equipment, which are implemented by acquiring basic information of a user in a server; acquiring user data information according to the basic information, and cleaning and converting the user data information to generate a standard data table; performing admission audit according to the standard data table to determine whether the user is credited or not; if yes, classifying the data in the standard data table, calculating corresponding index values according to various data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme. By applying the technical scheme of the application, the real situation of the user can be reflected more truly, the resource allocation scheme which is more in line with the real situation of the user is generated, the risk control capability and the resource allocation scheme design capability of the mechanism are improved, the problem of mismatching of the client resource allocation scheme caused by various reasons is solved, and meanwhile, the labor cost and the time cost of the mechanism are reduced.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an adaptation method for a resource allocation scheme and a related device.
Background
With the development of internet information technology, various resource products based on big data in various fields are successively introduced by various organizations, such as: financing schemes, storage space allocation schemes, material allocation schemes, etc. for different customers. A customer can log in a business system of each organization through channels such as a website, a mobile phone client, a WeChat applet and the like, fill in resource allocation requirements, complete application submission on the line, and then the system can realize automatic approval in a zero-manual intervention mode according to information input and authorized by the customer. However, in the prior art, since the resource allocation demand information is collected by the client during the application, the generated resource allocation scheme may not reflect the real situation of the client at all or reflect the situation of the client only in one side, considering that the application element is relatively simple, the client may have a heuristic mind, and the proficiency of the client in operating the system is low.
Disclosure of Invention
In view of the above, an object of the present invention is to provide an adaptation method for a resource allocation scheme and a related device, so as to reflect the real situation of a user more truly and generate a resource allocation scheme more suitable for the real situation of the user.
Based on the above object, in a first aspect, the present invention provides an adaptation method of a resource allocation scheme, including:
acquiring basic information of a user in a server;
acquiring user data information according to the basic information, and cleaning and converting the user data information to generate a standard data table;
performing admission audit according to the standard data table to determine whether the user is credited or not;
if yes, classifying the data in the standard data table, calculating corresponding index values according to various data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme.
In some embodiments, before obtaining the basic information of the user in the server, the method further includes:
acquiring basic information and authorization information input by a user;
and confirming whether the authorization of the user is valid or not to the server according to the authorization information, and if so, extracting the basic information from the server according to the basic information.
In some embodiments, the obtaining user data information according to the basic information specifically includes:
and performing data extraction on the basic information through an ETL tool, and establishing an original data table according to the extracted data, wherein the original data table comprises the user data information.
In some embodiments, the generating a standard data table by performing cleansing conversion on the user data information specifically includes:
and carrying out data cleaning on the original data table through a structured query statement, and converting the original data table into the standard data table according to a preset data corresponding relation.
In some embodiments, the performing admission audit according to the standard data table to determine whether the user is granted a credit specifically includes:
verifying or grading corresponding data in the standard data table according to a preset verification rule, determining the risk degree grade of the corresponding data, summarizing all the risk degree grades, judging whether the risk degree grades reach a preset condition, and if so, determining the user credit granting.
In some embodiments, the validation rules include at least: identity matching verification, risk policy verification, anti-fraud verification, and/or model scoring.
In some embodiments, after outputting the optimal resource allocation scheme, the method further includes:
acquiring selection information of a user, and judging whether the user selects the optimal resource allocation scheme or not according to the selection information;
if not, adjusting each parameter in the optimal resource allocation scheme downwards to generate a low-allocation resource allocation scheme, and outputting the low-allocation resource allocation scheme.
In a second aspect, the present application further provides an adaptive device for a resource allocation scheme, including:
the acquisition module is used for acquiring basic information of a user in the server;
the conversion module acquires user data information according to the basic information, and performs cleaning conversion on the user data information to generate a standard data table;
the determining module is used for performing admission verification according to the standard data table and determining whether the user is credited or not;
and if so, classifying the data in the standard data table, calculating corresponding index values according to various data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme.
In a third aspect, the present application further provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the program to implement the method for adapting a resource allocation scheme as described above.
In a fourth aspect, the present application further provides a computer-readable storage medium, which stores instructions that, when executed on a terminal device, cause the terminal device to execute the method for adapting a resource allocation scheme as described above.
From the above, the adaptation method of the resource allocation scheme and the related device provided by the invention can be used for obtaining the basic information of the user in the server; acquiring user data information according to the basic information, and cleaning and converting the user data information to generate a standard data table; performing admission audit according to the standard data table to determine whether the user is credited or not; if yes, classifying the data in the standard data table, calculating corresponding index values according to various data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme. By applying the technical scheme of the application, the real situation of the user can be reflected more truly, the resource allocation scheme which is more in line with the real situation of the user is generated, the risk control capability and the resource allocation scheme design capability of the mechanism are improved, the problem of mismatching of the client resource allocation scheme caused by various reasons is solved, and meanwhile, the labor cost and the time cost of the mechanism are reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating an adaptation method of a resource allocation scheme according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating a method for adapting a resource allocation scheme, which is particularly applicable to the field of financial financing, according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an adapting device of a resource allocation scheme according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
It is to be noted that technical terms or scientific terms used in the embodiments of the present invention should have the ordinary meanings as understood by those having ordinary skill in the art to which the present disclosure belongs, unless otherwise defined. The use of "first," "second," and similar terms in this disclosure is not intended to indicate any order, quantity, or importance, but rather is used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that a element, article, or method step that precedes the word, and includes the element, article, or method step that follows the word, and equivalents thereof, does not exclude other elements, articles, or method steps.
As background, in the prior art, for example, financing distribution schemes in the financial field. With the development of internet information technology and the policy guidance of the development of small and medium enterprises in the country supported by the state in recent years, a great number of financial institutions successively put forward popular financial loan products based on big data. The client can log in a business system of a financial institution through channels such as internet banking, mobile banking, WeChat small program and the like, fill in financing requirements, complete application submission of online loan, and then the system can realize automatic loan approval in a zero-manual intervention mode according to information input and authorized by the client. The approval results are presented primarily as elements of a financing scheme, including but not limited to financed: several factors such as limit, deadline, interest rate and payment mode. At present, the on-line financing scheme output process of the financial institution mainly comprises the steps of client application initiation, data filling, loan approval, application information matching and financing scheme output. In the methodology and system processing mechanism, the method adopts 'outputting complete matching result' or 'outputting slightly poor matching result', and the matching elements mainly comprise simple indexes such as financing amount and the like.
By adopting the technical scheme, the financing demand information self-filled by the client is collected during application, and considering that the application elements are relatively simple, the client may have heuristic psychology and the proficiency of the client on system operation is low, the method can comprise the following steps: the output basis of the financing scheme mainly comprises simple information filled by a client, the scheme design lacks substantial wind control guided by data, and the credit granting cost can be greatly improved if manual financing scheme design adjustment is added; the real financing requirement of the client is inconsistent with the financing requirement filling (the filling information is wrong or the knowledge of the financing requirement of the client is insufficient), so that the problems of increased credit granting risk caused by mismatching of the financing scheme and the like are formed.
The method for adapting the resource allocation scheme is designed and realized, and the actual optimal resource allocation scheme which accords with the user is generated by acquiring the basic information of the user in the database, examining the qualification of the user based on the basic information and determining the real resource allocation requirement or capacity of the user. The real situation of the user can be reflected more truly, and therefore the resource allocation scheme which is more consistent with the real situation of the user is generated.
The technical solutions provided by the embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, a schematic flowchart of an adaptation method of a resource allocation scheme in this embodiment is shown, where the method specifically includes the following steps:
This step aims to obtain the basic information of the user. The basic information is information that can reflect various basic personal information of the user and various basic domain information required by each domain, for example: for the financing scheme, acquiring personal property information, debt information, judicial information and the like of a user; for the storage space allocation scheme, use frequency information, use amount information, safe use time information, and the like of the user are acquired.
Meanwhile, the server may be a database which is independently set by each organization and used for storing user information, or a database which is provided by a third-party organization and contains user-related basic information, and the like. The server actively acquires or passively receives the latest relevant basic information of the user, such as: the server actively inquires basic information related to the user in the Internet or a cooperative third-party mechanism according to the set time; the server passively acquires user basic information input by a worker, and the like.
In addition, the acquisition process in the step can also be according to the active request of the user; it is also possible to actively perform the establishment of the resource allocation scheme according to the protocol and the like.
And 102, acquiring user data information according to the basic information, and cleaning and converting the user data information to generate a standard data table.
The step aims to perform data cleaning on all user data information and generate a standard data table which accords with the following steps. The user data information refers to user data information required by the current resource allocation, which is screened from all basic information of the user according to the resource allocation request. Then, based on the user data information, cleaning and conversion are carried out to standard data tables.
The method for acquiring the user data information from the basic data may be to extract the basic information by an ETL tool, and establish an original data table according to the extracted data, where the original data table includes the user data information. Wherein ETL is an abbreviation of Extract-Transform-Load in english, and is used to describe the process of extracting (Extract), converting (Transform), and loading (Load) data from a source end to a destination end. It is a data warehouse technology, and typical representatives of ETL tools are: informatica, Datastage, OWB, Microsoft DTS, Beeload, Kettle, and so on. The manner of obtaining the user data information from the basic data may also be by using a structured query language (SQL statement), which is a special purpose programming language, and is a database query and programming language, used for accessing data and querying, updating, and managing the relational database system, that is, querying the basic information through the SQL statement and extracting the corresponding required user data information.
And then, cleaning and converting the user data information to generate a standard data table. The cleaning mode can be as follows: and uniformly cleaning all user data information, such as: removing spaces, removing commas from digital data, unifying data units of the same type of data, and the like; or different requirements are set for different fields and cleaning is carried out according to the requirements, for example: cleaning of report numbers and the like with only a blank space removed, cleaning of data totals and the like with a blank space removed, cleaning of data commas and the like, cleaning of certificate types with a blank space removed, and person information recognition, and the like. And converting the cleaned user data information into a standard data table, namely generating the standard table capable of completely mapping the user data information.
Therefore, different ways of acquiring user data information and different ways of cleaning and converting data do not affect the protection scope of the invention as long as the corresponding purposes can be achieved.
And 103, performing admission audit according to the standard data table to determine whether the user is credited.
The step aims at determining whether the user meets the requirement of the current resource allocation scheme or not and whether the current resource allocation scheme can be carried out on the user or not.
And the admission auditing is to audit each item of data in the standard data table. The process of determining whether the user is trusted can be that each item of data is calculated according to a preset mode to obtain a score, then all the scores are added, and if the score exceeds a certain value, the user is determined to pass or not pass; the data may also be rated after being calculated according to a preset mode, for example: ABCDE five level, etc., if the number reaching above a certain level exceeds a preset threshold, then pass or fail is determined, etc. For example: identity matching verification is carried out on identity information in user data, risk strategy verification is carried out on risk bearing capacity and the like, anti-fraud verification is carried out on historical behaviors and the like of a user, and a score or a rating is obtained respectively.
And 104, if yes, classifying the data in the standard data table, calculating corresponding index values according to various types of data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme.
The method comprises the steps of classifying various data in a standard data table after credit granting is passed, calculating according to a preset logic rule to obtain index values in various dimensions, comparing all the index values to generate an optimal resource allocation scheme and outputting the optimal resource allocation scheme. The index value can be in various forms, such as: in the financing scheme, the house property information, the debt right information and the like may exist in the standard data sheet, the scheme can divide the data information into two types and respectively calculate the corresponding index values, and the index values can be the longest loan term, the largest loan amount, the lowest loan interest rate and the like; in the storage space allocation scheme, user usage frequency information, average usage space information, maximum space information occupied by a user, occupied duration information, and the like may exist in the standard data table, and index values thereof may be a longest usage period, a maximum usage space, a highest usage bandwidth, and the like. And then, according to the specific requirements of the user or the evaluation rule automatically set by the system, selecting the optimal resource allocation scheme from different index values.
And finally, outputting the optimal resource allocation scheme. According to different application scenarios and implementation requirements, the specific output mode for the optimal resource allocation scheme can be flexibly selected.
For example, for an application scenario in which the method of the present embodiment is executed on a single device, the optimal resource allocation scheme may be directly output in a display manner on a display part (display, projector, etc.) of the current device, so that an operator of the current device can directly see the content of the optimal resource allocation scheme from the display part.
For another example, for an application scenario executed on a system composed of multiple devices by the method of this embodiment, the optimal resource allocation scheme may be sent to other preset devices serving as receivers in the system through any data communication manner (e.g., wired connection, NFC, bluetooth, wifi, cellular mobile network, etc.), so that the preset devices receiving the optimal resource allocation scheme may perform subsequent processing on the preset devices. Optionally, the preset device may be a preset server, and the server is generally arranged at a cloud end and used as a data processing and storage center, which can store and distribute the optimal resource allocation scheme; the receiver of the distribution is a terminal device, and the holder or operator of the terminal device may be a user, a person of a target object, a manager of a tax authority, a manager of a banking authority, and the like.
For another example, for an application scenario executed on a system composed of multiple devices, the method of this embodiment may directly send the optimal resource allocation scheme to a preset terminal device through any data communication manner, where the terminal device may be one or more of the foregoing paragraphs.
By applying the technical scheme of the application, the scheme is that the basic information of the user in the server is obtained; acquiring user data information according to the basic information, and cleaning and converting the user data information to generate a standard data table; performing admission audit according to the standard data table to determine whether the user is credited or not; if yes, classifying the data in the standard data table, calculating corresponding index values according to various data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme. By applying the technical scheme of the application, the real situation of the user can be reflected more truly, the resource allocation scheme which is more in line with the real situation of the user is generated, the risk control capability and the resource allocation scheme design capability of the mechanism are improved, the problem of mismatching of the client resource allocation scheme caused by various reasons is solved, and meanwhile, the labor cost and the time cost of the mechanism are reduced.
In an optional embodiment of the present application, in order to ensure the validity of obtaining the basic information of the user each time, the situation that the user information can be automatically obtained without the permission of the user is prevented. Before the obtaining of the basic information of the user in the server, the method further includes:
acquiring basic information and authorization information input by a user;
and confirming whether the authorization of the user is valid or not to the server according to the authorization information, and if so, extracting the basic information from the server according to the basic information.
The basic information is information that can reflect the most basic characteristics of the user, such as name, identification number, and the like. The authorization information is the authorization executed by the user on the resource allocation scheme.
In an optional embodiment of the present application, in order to more accurately acquire the user data information in the basic information, response time in the acquisition process is reduced, and response speed is increased. The acquiring user data information according to the basic information specifically includes:
and performing data extraction on the basic information through an ETL tool, and establishing an original data table according to the extracted data, wherein the original data table comprises the user data information.
Wherein the original data table initially classifies the user data.
In an alternative embodiment of the present application, in order to quickly clean and convert data, the data is quickly cleaned and converted directly based on the initial classification of the user data in the original data table. The step of cleaning and converting the user data information to generate a standard data table specifically includes:
and carrying out data cleaning on the original data table through a structured query statement, and converting the original data table into the standard data table according to a preset data corresponding relation.
In an alternative embodiment of the present application, the user's qualifications are verified accurately and comprehensively. Performing admission audit according to the standard data table to determine whether the user is trusted, specifically comprising:
verifying or grading corresponding data in the standard data table according to a preset verification rule, determining the risk degree grade of the corresponding data, summarizing all the risk degree grades, judging whether the risk degree grades reach a preset condition, and if so, determining the user credit granting.
Further, the validation rule at least comprises: identity matching verification, risk policy verification, anti-fraud verification, and/or model scoring.
The identity matching verification means whether the identity information of the user is real and effective, the risk policy verification means whether the risk tolerance of the user in the financial field is consistent, and the anti-fraud verification means whether fraud, fraud and the like related to the field of the resource allocation scheme exist in the historical behavior record of the user.
In an alternative embodiment of the present application, in order to adapt to different requirements of users, a more conservative resource allocation scheme is set for users. After the outputting the optimal resource allocation scheme, the method further includes:
acquiring selection information of a user, and judging whether the user selects the optimal resource allocation scheme or not according to the selection information;
if not, adjusting each parameter in the optimal resource allocation scheme downwards to generate a low-allocation resource allocation scheme, and outputting the low-allocation resource allocation scheme.
In a specific application scenario, as shown in fig. 2, a financing scheme in the financial field is taken as an example. The specific implementation steps comprise:
1) the client initiates a loan application and fills in basic information of the client.
2) The customer completes the information authorization of the service handling organization.
3) The financial institution business processing system confirms that the user authorization is valid, collects authorized client data information to related systems, analyzes and processes the authorized client data information through an ETL engine, generates a standard data table on the basis of an original data table, and completely maps the user data information. The user data information may include various client data such as industry and commerce information, tax information, judicial information, credit information, etc. (specifically, the convention in the client's license is taken as the standard).
4) The financial institution business processing system finishes the customer admission examination and approval from multiple dimensions such as identity matching verification, risk strategy verification, anti-fraud verification, model scoring and the like according to the obtained and processed customer data, namely a standard data table, evaluates the risk degrees of multiple aspects such as credit, compliance, finance and the like of the customer, finally generates a comprehensive admission result and determines whether the customer can be credited.
5) The financial institution business processing system executes a complex financing scheme adaptation model based on the standard data sheet of the trusted client. Firstly, classifying data (such as individual human, enterprise, escort and the like) according to basic application information acquired by a standard data table; and secondly, setting a business logic rule for the data, and calculating to obtain an index value of the credit granting element. Finally, all output results are compared, the optimal financing scheme is comprehensively decided and output, and the optimal financing scheme is transmitted back to a client application channel and the results are displayed.
The complex financing scheme is different from a financing scheme which mainly takes simple information filled by a client as a basis, and is an approval submodel which integrates a plurality of elements including but not limited to 'loan object', 'loan amount', 'loan term', 'loan interest rate', 'guarantee mode', 'repayment mode', 'payment mode' and the like in the form of an approval model, and a plurality of indexes such as 'client default grade', 'borrower age', 'mortgage room age', 'stock turnover rate' and the like are arranged under each submodel.
Such as: according to the basic application information of the client, house property information is obtained, the house property information is firstly sorted and then divided into security data, then business logic judgment is carried out on the part of data, and the specific value of the longest loan term which can be approved if the house property is taken as a security measure for the mortgage can be obtained through rule calculation through data such as house type, land use right due date, registration time and the like. And integrating other data and the wind control dimension to output the optimal loan term finally provided for the client.
6) And the client checks the optimal financing scheme, autonomously selects whether to sign a contract, and signs the contract to select to maintain the original financing scheme or to reduce the parameters to generate a low-allocation financing scheme.
Wherein, the low-allocation financing scheme refers to the result that the financing element is slightly worse than the best financing scheme, for example, the financing amount in the best financing scheme is 200 ten thousand, the financing period is 36 months, the repayment mode is payment due per month, and other elements … …
The client can only actively adjust the financing element slightly worse than the best credit scheme, for example, the adjustment limit is less than 200 ten thousand, or the adjustment period is less than 36 months … …, and the low-version financing scheme is generated after adjustment.
The optimized scheme improves the risk control capability and the financing scheme design capability of the financial institution from the aspect of business application, solves the problem of mismatching of the client financing scheme caused by various reasons, and reduces the credit granting risk of the financial institution. From the perspective of system processing, the system deploys a financing scheme adaptation model, so that the automation and intelligence level of financing scheme output is improved, and meanwhile, the labor cost and time cost of financial institutions are reduced.
Based on the same inventive concept, an embodiment of the present invention further provides an adapting device for a resource allocation scheme, as shown in fig. 3, including:
an obtaining module 301, which obtains basic information of a user in a server;
the conversion module 302 is used for acquiring user data information according to the basic information, and cleaning and converting the user data information to generate a standard data table;
a determining module 303, configured to perform admission audit according to the standard data table, and determine whether the user is trusted;
if yes, the execution module 304 classifies the data in the standard data table, performs corresponding index value calculation according to various types of data, determines an optimal resource allocation scheme according to the index value, and outputs the optimal resource allocation scheme.
In an optional embodiment, before the obtaining module 301 obtains the basic information of the user in the server, the method further includes:
acquiring basic information and authorization information input by a user;
and confirming whether the authorization of the user is valid or not to the server according to the authorization information, and if so, extracting the basic information from the server according to the basic information.
In an optional embodiment, the obtaining, by the conversion module 302, user data information according to the basic information specifically includes:
and performing data extraction on the basic information through an ETL tool, and establishing an original data table according to the extracted data, wherein the original data table comprises the user data information.
In an optional embodiment, the converting module 302 performs cleaning conversion on the user data information to generate a standard data table, which specifically includes:
and carrying out data cleaning on the original data table through a structured query statement, and converting the original data table into the standard data table according to a preset data corresponding relation.
In an optional embodiment, the determining module 303 performs admission audit according to the standard data table to determine whether the user is trusted, specifically including:
verifying or grading corresponding data in the standard data table according to a preset verification rule, determining the risk degree grade of the corresponding data, summarizing all the risk degree grades, judging whether the risk degree grades reach a preset condition, and if so, determining the user credit granting.
In an optional embodiment, the validation rule comprises at least: identity matching verification, risk policy verification, anti-fraud verification, and/or model scoring.
In an optional embodiment, after the executing module 304 outputs the optimal resource allocation scheme, the method further includes:
acquiring selection information of a user, and judging whether the user selects the optimal resource allocation scheme or not according to the selection information;
if not, adjusting each parameter in the optimal resource allocation scheme downwards to generate a low-allocation resource allocation scheme, and outputting the low-allocation resource allocation scheme.
The device of the foregoing embodiment is used to implement the corresponding method in the foregoing embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same application concept, embodiments of the present application further provide an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the method according to any of the above embodiments is implemented.
Fig. 4 is a schematic diagram illustrating a more specific hardware structure of an electronic device according to this embodiment, where the electronic device may include: a processor 410, a memory 420, an input/output interface 430, a communication interface 440, and a bus 450. Wherein processor 410, memory 420, input/output interface 430, and communication interface 440 are communicatively coupled to each other within the device via bus 450.
The processor 410 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present specification.
The Memory 420 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random access Memory), a static storage device, a dynamic storage device, or the like. The memory 420 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 420 and called to be executed by the processor 410.
The input/output interface 430 is used for connecting an input/output module to realize information input and output. The input/output module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 440 is used for connecting a communication module (not shown in the figure) to realize communication interaction between the device and other devices. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
It should be noted that although the above-mentioned device only shows the processor 410, the memory 420, the input/output interface 430, the communication interface 440 and the bus 450, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
The electronic device of the foregoing embodiment is used to implement the corresponding method in the foregoing embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same application concept, embodiments of the present application further provide a computer-readable storage medium, where instructions are stored, and when the instructions are executed on a terminal device, the terminal device is caused to perform the method according to any of the above embodiments.
Computer-readable storage media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The storage medium of the foregoing embodiment is used to implement the corresponding method in the foregoing embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the idea of the invention, also features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity.
In addition, well known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures for simplicity of illustration and discussion, and so as not to obscure the invention. Furthermore, devices may be shown in block diagram form in order to avoid obscuring the invention, and also in view of the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the present invention is to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the invention, it should be apparent to one skilled in the art that the invention can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present invention has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The embodiments of the invention are intended to embrace all such alternatives, modifications and variances that fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements and the like that may be made without departing from the spirit and principles of the invention are intended to be included within the scope of the invention.
Claims (10)
1. A method for adapting a resource allocation scheme, comprising:
acquiring basic information of a user in a server;
acquiring user data information according to the basic information, and cleaning and converting the user data information to generate a standard data table;
performing admission audit according to the standard data table to determine whether the user is credited or not;
if yes, classifying the data in the standard data table, calculating corresponding index values according to various data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme.
2. The method of claim 1, wherein before obtaining the basic information of the user in the server, the method further comprises:
acquiring basic information and authorization information input by a user;
and confirming whether the authorization of the user is valid or not to the server according to the authorization information, and if so, extracting the basic information from the server according to the basic information.
3. The method according to claim 1, wherein the obtaining user data information according to the basic information specifically includes:
and performing data extraction on the basic information through an ETL tool, and establishing an original data table according to the extracted data, wherein the original data table comprises the user data information.
4. The method according to claim 3, wherein the generating of the standard data table by performing cleansing conversion on the user data information specifically comprises:
and carrying out data cleaning on the original data table through a structured query statement, and converting the original data table into the standard data table according to a preset data corresponding relation.
5. The method according to claim 1, wherein performing admission audit according to the standard data table to determine whether the user is trusted specifically includes:
verifying or grading corresponding data in the standard data table according to a preset verification rule, determining the risk degree grade of the corresponding data, summarizing all the risk degree grades, judging whether the risk degree grades reach a preset condition, and if so, determining the user credit granting.
6. The method according to claim 5, characterized in that said validation rules comprise at least: identity matching verification, risk policy verification, anti-fraud verification, and/or model scoring.
7. The method of claim 1, wherein after outputting the optimal resource allocation scheme, further comprising:
acquiring selection information of a user, and judging whether the user selects the optimal resource allocation scheme or not according to the selection information;
if not, adjusting each parameter in the optimal resource allocation scheme downwards to generate a low-allocation resource allocation scheme, and outputting the low-allocation resource allocation scheme.
8. An adaptation apparatus of a resource allocation scheme, comprising:
the acquisition module is used for acquiring basic information of a user in the server;
the conversion module acquires user data information according to the basic information, and performs cleaning conversion on the user data information to generate a standard data table;
the determining module is used for performing admission verification according to the standard data table and determining whether the user is credited or not;
and if so, classifying the data in the standard data table, calculating corresponding index values according to various data, determining an optimal resource allocation scheme according to the index values, and outputting the optimal resource allocation scheme.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of adapting a resource allocation scheme according to any of claims 1-7 when executing the program.
10. A computer-readable storage medium, having stored therein instructions that, when run on a terminal device, cause the terminal device to perform the method of adapting a resource allocation scheme according to any one of claims 1-7.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911310363.4A CN111160737A (en) | 2019-12-18 | 2019-12-18 | Adaptation method of resource allocation scheme and related equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911310363.4A CN111160737A (en) | 2019-12-18 | 2019-12-18 | Adaptation method of resource allocation scheme and related equipment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN111160737A true CN111160737A (en) | 2020-05-15 |
Family
ID=70557717
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201911310363.4A Pending CN111160737A (en) | 2019-12-18 | 2019-12-18 | Adaptation method of resource allocation scheme and related equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111160737A (en) |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111985773A (en) * | 2020-07-15 | 2020-11-24 | 北京淇瑀信息科技有限公司 | User resource allocation strategy determining method and device and electronic equipment |
| CN112203262A (en) * | 2020-09-21 | 2021-01-08 | 厦门南讯股份有限公司 | ETL multi-person cooperation method based on Web Bluetooth |
| CN113379380A (en) * | 2021-06-07 | 2021-09-10 | 广发银行股份有限公司 | Member registration method, system, device and storage medium |
| CN113762925A (en) * | 2021-09-07 | 2021-12-07 | 广东电网有限责任公司 | Auxiliary ticket filling method, device, electronic device and storage medium |
| CN114022159A (en) * | 2021-09-28 | 2022-02-08 | 东方微银科技股份有限公司 | Target qualification confirmation method and device |
| CN114021879A (en) * | 2021-09-27 | 2022-02-08 | 东方微银科技股份有限公司 | Target object qualification confirmation method and device |
| CN114022158A (en) * | 2021-09-28 | 2022-02-08 | 东方微银科技股份有限公司 | Resource allocation method and equipment for individual targets |
| CN114066478A (en) * | 2021-09-27 | 2022-02-18 | 东方微银科技股份有限公司 | A target classification evaluation method and equipment based on intellectual property information |
| CN114266648A (en) * | 2021-12-24 | 2022-04-01 | 深圳前海微众银行股份有限公司 | Approval trust method, device, terminal equipment and storage medium |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1680951A (en) * | 2004-07-05 | 2005-10-12 | 中国银行股份有限公司 | System and method for online user authorization for banks |
| CN102034208A (en) * | 2010-12-15 | 2011-04-27 | 中国民生银行股份有限公司 | Credit operation approval data processing system and method |
| CN103839183A (en) * | 2014-03-19 | 2014-06-04 | 江苏苏大大数据科技有限公司 | Intelligent credit extension method and intelligent credit extension device |
| US20140172687A1 (en) * | 2011-08-31 | 2014-06-19 | Mehran Chirehdast | Methods and Systems for Financial Transactions |
| CN107590734A (en) * | 2017-08-21 | 2018-01-16 | 中国建设银行股份有限公司 | Determine method and device, terminal device and the computer-readable storage medium of the accrediting amount |
| CN108564286A (en) * | 2018-04-19 | 2018-09-21 | 天合泽泰(厦门)征信服务有限公司 | A kind of artificial intelligence finance air control credit assessment method and system based on big data reference |
| CN109816340A (en) * | 2019-01-04 | 2019-05-28 | 深圳壹账通智能科技有限公司 | Resource approval method, system, computer equipment and storage medium |
-
2019
- 2019-12-18 CN CN201911310363.4A patent/CN111160737A/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1680951A (en) * | 2004-07-05 | 2005-10-12 | 中国银行股份有限公司 | System and method for online user authorization for banks |
| CN102034208A (en) * | 2010-12-15 | 2011-04-27 | 中国民生银行股份有限公司 | Credit operation approval data processing system and method |
| US20140172687A1 (en) * | 2011-08-31 | 2014-06-19 | Mehran Chirehdast | Methods and Systems for Financial Transactions |
| CN103839183A (en) * | 2014-03-19 | 2014-06-04 | 江苏苏大大数据科技有限公司 | Intelligent credit extension method and intelligent credit extension device |
| CN107590734A (en) * | 2017-08-21 | 2018-01-16 | 中国建设银行股份有限公司 | Determine method and device, terminal device and the computer-readable storage medium of the accrediting amount |
| CN108564286A (en) * | 2018-04-19 | 2018-09-21 | 天合泽泰(厦门)征信服务有限公司 | A kind of artificial intelligence finance air control credit assessment method and system based on big data reference |
| CN109816340A (en) * | 2019-01-04 | 2019-05-28 | 深圳壹账通智能科技有限公司 | Resource approval method, system, computer equipment and storage medium |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111985773A (en) * | 2020-07-15 | 2020-11-24 | 北京淇瑀信息科技有限公司 | User resource allocation strategy determining method and device and electronic equipment |
| CN112203262A (en) * | 2020-09-21 | 2021-01-08 | 厦门南讯股份有限公司 | ETL multi-person cooperation method based on Web Bluetooth |
| CN113379380A (en) * | 2021-06-07 | 2021-09-10 | 广发银行股份有限公司 | Member registration method, system, device and storage medium |
| CN113762925A (en) * | 2021-09-07 | 2021-12-07 | 广东电网有限责任公司 | Auxiliary ticket filling method, device, electronic device and storage medium |
| CN114021879A (en) * | 2021-09-27 | 2022-02-08 | 东方微银科技股份有限公司 | Target object qualification confirmation method and device |
| CN114066478A (en) * | 2021-09-27 | 2022-02-18 | 东方微银科技股份有限公司 | A target classification evaluation method and equipment based on intellectual property information |
| CN114022159A (en) * | 2021-09-28 | 2022-02-08 | 东方微银科技股份有限公司 | Target qualification confirmation method and device |
| CN114022158A (en) * | 2021-09-28 | 2022-02-08 | 东方微银科技股份有限公司 | Resource allocation method and equipment for individual targets |
| CN114266648A (en) * | 2021-12-24 | 2022-04-01 | 深圳前海微众银行股份有限公司 | Approval trust method, device, terminal equipment and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111160737A (en) | Adaptation method of resource allocation scheme and related equipment | |
| CN111143339B (en) | Method, device, equipment and storage medium for distributing service resources | |
| CA3176778C (en) | Information processing device, information processing method, and computer program background | |
| CN108876188B (en) | Inter-connected service provider risk assessment method and device | |
| WO2020177478A1 (en) | Credit-based qualification information auditing method, apparatus and device | |
| CN113591932A (en) | User abnormal behavior processing method and device based on support vector machine | |
| CN116630020A (en) | Risk assessment method and device, storage medium and electronic equipment | |
| US20150221025A1 (en) | Method, system, and computer program product for determining a payment strategy | |
| CN117934154A (en) | Transaction risk prediction method, model training method, device, equipment, medium and program product | |
| Kijkasiwat et al. | Financial inclusion in the industry 4.0: the effects of financial inclusion on electronic payments in Thailand | |
| CN111242419A (en) | Method, device, equipment and storage medium for identifying risk user | |
| CN114219615A (en) | Data processing method and related device for mortgage loan scenario | |
| CN120086337A (en) | Intelligent dialogue questioning and clarification implementation method and related equipment | |
| CN111178744A (en) | Distribution method, device, equipment and storage medium | |
| CN110009170B (en) | Model scoring correction method and device and server | |
| CN117541401A (en) | Information pushing method, device, electronic equipment and storage medium | |
| CN111898970A (en) | A product application qualification certification method and device | |
| CN109145029B (en) | Asset investment information query method, system and computer readable storage medium | |
| CN105354740A (en) | Method and apparatus for establishing personal credit information database | |
| CN116757833A (en) | Method and device for acquiring pre-credit limit and electronic equipment | |
| CN115601157A (en) | Quota processing method, device, electronic equipment and computer readable medium | |
| CN114066478A (en) | A target classification evaluation method and equipment based on intellectual property information | |
| US20240185336A1 (en) | Establishing a decentralized finance network | |
| CN113011971B (en) | Risk measure method, apparatus, system and computer storage medium | |
| US11989774B1 (en) | Systems and methods for providing digital trusted data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB02 | Change of applicant information | ||
| CB02 | Change of applicant information |
Address after: 10-7, 10-8, No.10, Qingyun Road, Jiangbei District, Chongqing, 400025 Applicant after: Oriental micro bank technology (Chongqing) Co., Ltd Address before: 100044 floor 4, Ronghui international building, building 1, yard 42, gaoliangxie street, Haidian District, Beijing Applicant before: Oriental micro silver technology (Beijing) Co.,Ltd. |
|
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200515 |