Disclosure of Invention
The embodiment of the invention provides a method, a device, equipment and a storage medium for managing limit, which solve the risk hidden trouble that the limit management needs to be carried out by depending on an outsourcing system in the past, simultaneously enable a user to carry out the function of checking the financial market limit in advance, are internally provided with various financial market limit management dimensions, and can be flexibly configured so as to carry out the financial market limit management in a refined way.
In a first aspect, an embodiment of the present invention provides a method for managing an amount, including:
receiving a quota use request sent by a client, wherein the quota use request carries transaction elements, and the transaction elements comprise: customer identity information;
determining a sub-limit corresponding to the client identity information according to the client identity information;
and verifying the transaction elements according to the itemized quota, and if the verification is passed, sending verification pass to the client.
Further, the method also comprises the following steps:
receiving an occupation request sent after the client-side transaction;
and modifying the itemized quota according to the occupation request.
Further, before receiving the credit line use request sent by the client, the method further comprises:
obtaining a quota batch corresponding to the historical client identity information according to the historical client identity information;
and setting the quota parameter of at least one dimensionality according to the quota batch to obtain the divisional quota corresponding to the historical client identity information.
Further, the method also comprises the following steps:
and establishing a database according to the historical client identity information and the itemized limit corresponding to the historical identity information.
Further, determining the sub-limit corresponding to the client identity information according to the client identity information includes:
and inquiring the database according to the client identity information to obtain the sub-limit corresponding to the client identity information.
Further, setting the quota of at least one dimension according to the quota batch, and obtaining the itemized quota corresponding to the customer identity information includes:
and setting the quota parameters of a parameter combination according to the quota batch, wherein the parameter combination comprises at least two parameters.
Further, the transaction element is verified according to the itemized quota, and if the verification is passed, the sending of the verification pass to the client comprises:
if the amount of the target product in the transaction element is less than or equal to the amount of the target product corresponding to the itemized amount, sending a verification pass to the client so that the client carries out transaction according to the transaction element.
Further, the transaction element is verified according to the itemized quota, and if the verification is passed, the sending of the verification pass to the client comprises:
setting a dimension priority;
and verifying the transaction elements according to the dimension priority and the itemized quota, and if the verification is passed, sending a verification pass to the client.
Further, the transaction element further comprises: at least one of the amount, currency, credit agency, folder, product, term, and counterparty.
Further, the customer identity information is a customer number.
Further, the itemized quota includes: and the user numbers the corresponding quota parameter.
Further, the occupation request includes: the usage amount of the client.
In a second aspect, an embodiment of the present invention further provides a device for managing an amount, where the device includes:
the system comprises a receiving module and a sending module, wherein the receiving module is used for receiving a quota using request sent by a client, the quota using request carries transaction elements, and the transaction elements comprise: customer identity information;
the determining module is used for determining the corresponding sub-limit of the client identity information according to the client identity information;
and the verification module is used for verifying the transaction element according to the itemized quota, and if the verification is passed, the verification is passed to the client.
In a third aspect, an embodiment of the present invention further provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the method according to any one of the embodiments of the present invention.
In a fourth aspect, the present invention further provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method according to any one of the embodiments of the present invention.
The embodiment of the invention receives a credit line using request sent by a client, wherein the credit line using request carries transaction elements, and the transaction elements comprise: customer identity information; determining a sub-limit corresponding to the client identity information according to the client identity information; the transaction elements are verified according to the itemized limit, if the verification is passed, the verification is sent to the client side, the risk potential problem that the user needs to rely on an outsourcing system to manage the limit in the past is solved, meanwhile, the user can perform the function of verifying the financial market limit in advance, various financial market limit management dimensions are built in, and the configuration can be flexibly performed, so that the financial market limit management can be finely performed.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Example one
Fig. 1 is a flowchart of an embodiment of a method for managing an amount, where the embodiment is applicable to the case of amount management, and the method can be executed by an amount management device in the embodiment of the present invention, and the device can be implemented in a software and/or hardware manner, as shown in fig. 1, the method specifically includes the following steps:
s110, receiving a quota use request sent by a client, wherein the quota use request carries transaction elements, and the transaction elements comprise: customer identity information.
Wherein the transaction element may include customer identity information, and may further include: at least one of the amount, currency, credit institution, folder, product, term and counterparty may be, for example, receiving an amount use request sent by the client, where the amount use request carries a transaction element, and the transaction element is: user a requests product O on a credit of 100 ten thousand.
The client identity information may be a client number, or may also be other data capable of representing the client identity, which is not limited in this embodiment of the present invention.
And S120, determining a sub-limit corresponding to the client identity information according to the client identity information.
For example, the obtaining manner of the stripe quota may be: the method comprises the steps of obtaining historical client identity information in advance, determining an amount batch corresponding to the historical client identity information according to the historical client identity information, carrying out multi-dimensional amount parameter setting according to the amount batch to obtain a striped amount corresponding to the historical client identity information, establishing a database according to the striped amount corresponding to the historical client identity information and the historical client identity information, and inquiring the database according to the client identity information to obtain the striped amount corresponding to the client identity information. For example, historical customer identity information may be obtained in advance: the method comprises the steps that client identity information A, client identity information B and client identity information C are obtained, a quota batch a corresponding to the client identity information A, a quota batch B corresponding to the client identity information B and a quota batch C corresponding to the client identity information C are obtained, and at least one dimensionality quota parameter setting is carried out according to the quota batch a to obtain a sub-quota x corresponding to the client identity information A; setting the quota parameter of at least one dimension according to the quota batch B to obtain a sub-quota y corresponding to the customer identity information B; setting the quota parameter of at least one dimensionality according to the quota batch C to obtain a divisional quota z corresponding to the client identity information C, storing a divisional quota x corresponding to the client identity information A, a divisional quota y corresponding to the client identity information B and a divisional quota z corresponding to the client identity information C into a database, and inquiring the database according to the client identity information A to obtain the divisional quota x corresponding to the client identity information A if the client identity information is A.
S130, the transaction elements are verified according to the itemized quota, and if the verification is passed, the verification is passed and sent to the client.
The method for verifying the transaction element according to the itemized limit can be used for comparing the limit corresponding to the product in the transaction element with the limit corresponding to the same product in the itemized limit, if the limit corresponding to the product in the transaction element is smaller than or equal to the limit corresponding to the same product in the itemized limit, the verification of the transaction element is passed, and if the limit corresponding to the product in the transaction element is larger than the limit corresponding to the same product in the itemized limit, the verification of the transaction element is failed.
For example, the transaction element is verified according to the itemized quota, and if the verification is passed, a verification pass is sent to the client, for example, if the transaction element includes: the client identity information A, the product W and the limit R corresponding to the product are verified for the transaction element according to the itemized limit x, and the itemized limit x comprises the following components: and if the amount R is less than or equal to the amount T, the verification is passed, and if the R is greater than the amount T, the verification fails.
Optionally, the method further includes:
receiving an occupation request sent after the client-side transaction;
and modifying the itemized quota according to the occupation request.
For example, after a client transacts, the client sends an occupation request, and modifies the partitioned quota after receiving the occupation request sent by the client, for example, if the transaction elements include: the client identity information A, the product W and the limit R corresponding to the product W verify the transaction element according to the itemized limit x, and the itemized limit x comprises: the credit T that product W corresponds, credit M that product L corresponds, credit N that product W and product L correspond, if credit R is less than or equal to credit T, then the check is passed, sends the check to the client and passes, and the client receives the check and passes the back, carries out the transaction, and after the transaction is accomplished, the client sends and occupies the request, and wherein, it includes to occupy the request: and the quota R corresponding to the product W is divided into quota x according to an occupation request sent by the client: and modifying the limit T corresponding to the product W, and modifying the limit N corresponding to the product W and the product L to obtain modified sub-strip limit x: the quota T-R corresponding to the product W and the quota N-R corresponding to the product W and the product L.
Optionally, before receiving the request for using the quota sent by the client, the method further includes:
obtaining a quota batch corresponding to the historical client identity information according to the historical client identity information;
and setting the quota parameter of at least one dimensionality according to the quota batch to obtain the divisional quota corresponding to the historical client identity information.
Wherein the at least one dimension may be at least one of a credit amount, currency, credit institution, folder, product, term, and counterparty.
For example, the parameter set may also be a parameter set for a parameter combination of the same dimension, for example, a product amount of 100 RMB, a product amount of 200 RMB, and a product amount of 150 RMB may be used for the product combination of A + B.
Illustratively, a quota batch corresponding to historical customer identity information is obtained according to the historical customer identity information, and quota parameter setting of at least one dimension is performed according to the quota batch to obtain a itemized quota corresponding to the historical customer identity information. For example, historical customer identity information may be obtained in advance: the method comprises the steps that client identity information A, client identity information B and client identity information C are obtained, a quota batch a corresponding to the client identity information A, a quota batch B corresponding to the client identity information B and a quota batch C corresponding to the client identity information C are obtained, and at least one dimensionality quota parameter setting is carried out according to the quota batch a to obtain a sub-quota x corresponding to the client identity information A; setting the quota parameter of at least one dimension according to the quota batch B to obtain a sub-quota y corresponding to the customer identity information B; setting the quota parameter of at least one dimensionality according to the quota batch C to obtain a divisional quota z corresponding to the client identity information C, storing a divisional quota x corresponding to the client identity information A, a divisional quota y corresponding to the client identity information B and a divisional quota z corresponding to the client identity information C into a database, and inquiring the database according to the client identity information A to obtain the divisional quota x corresponding to the client identity information A if the client identity information is A.
Optionally, the method further includes:
and establishing a database according to the historical client identity information and the itemized limit corresponding to the historical identity information.
For example, a database is established by client identity information determined according to historical client identity information and a stripe amount corresponding to the client identity information, for example, the historical client identity information may be obtained in advance: the method comprises the steps that client identity information A, client identity information B and client identity information C are obtained, a quota batch a corresponding to the client identity information A, a quota batch B corresponding to the client identity information B and a quota batch C corresponding to the client identity information C are obtained, and at least one dimensionality quota parameter setting is carried out according to the quota batch a to obtain a sub-quota x corresponding to the client identity information A; setting the quota parameter of at least one dimension according to the quota batch B to obtain a sub-quota y corresponding to the customer identity information B; and setting the quota parameter of at least one dimensionality according to the quota batch C to obtain a sub-quota z corresponding to the client identity information C, and storing a sub-quota x corresponding to the client identity information A, a sub-quota y corresponding to the client identity information B and a sub-quota z corresponding to the client identity information C in a database.
Optionally, determining the itemized quota corresponding to the client identity information according to the client identity information includes:
and inquiring the database according to the client identity information to obtain the sub-limit corresponding to the client identity information.
For example, the database is queried according to the client identity information to obtain the stripe amount x corresponding to the client identity information a, where the client identity information a is a, and the database is queried according to the client identity information a to obtain the stripe amount x corresponding to the client identity information a.
Optionally, setting an amount of at least one dimension according to the amount wholesale, and obtaining a itemized amount corresponding to the client identity information includes:
and setting the quota parameters of a parameter combination according to the quota batch, wherein the parameter combination comprises at least two parameters.
Wherein, the parameter combination can be a product combination, for example, a combination of a product A and a product B; or a combination of folders, for example, a combination of a first type of folder and a second type of folder.
For example, the parameter setting of the amount of the parameter combination according to the amount batch may be, for example, setting the amount of the combination of the product a and the product B to be G according to the amount batch.
Optionally, the verifying the transaction element according to the itemized quota, and if the verification is passed, sending a verification pass to the client includes:
if the amount of the target product in the transaction element is less than or equal to the amount of the target product corresponding to the itemized amount, sending a verification pass to the client so that the client carries out transaction according to the transaction element.
Optionally, the verifying the transaction element according to the itemized quota, and if the verification is passed, sending a verification pass to the client includes:
setting a dimension priority;
and verifying the transaction elements according to the dimension priority and the itemized quota, and if the verification is passed, sending a verification pass to the client.
The method for setting the dimension priority may be implemented by establishing a decision tree model, or may be implemented by directly setting the priority, which is not limited in the embodiment of the present invention.
Specifically, setting a dimension priority; and verifying the transaction elements according to the dimension priority and the itemized quota, and if the verification is passed, sending a verification pass to the client, for example, if the priority of the product is greater than folder, verifying according to the quota of the product, and then verifying according to the folder.
Optionally, the transaction element further comprises: at least one of the amount, currency, credit agency, folder, product, term, and counterparty.
The currency is a currency corresponding to the amount, and may be renminbi, gold or other currency, which is not limited in this embodiment of the present invention.
The credit institution may be a credit line that at least one bank can provide for the user, for example, the credit line that bank a can provide for the user is 100 ten thousand, and the credit line that bank B can provide for the user is 150 ten thousand.
Wherein the folder comprises at least one type of transaction, for example, the first type of folder comprises: a first type of transaction and a second type of transaction, the second type of folder comprising: a third type of transaction and a fourth type of transaction.
Wherein the term is a product term.
The transaction opponent is a client transaction opponent determined according to the credit line batch, for example, the client a and the client B are transaction opponents, the credit line provided for the client a is 100 ten thousand, and the credit line provided for the company B is 100 ten thousand.
Optionally, the customer identity information is a customer number.
Optionally, the division quota includes: and the user numbers the corresponding quota parameter.
Optionally, the occupation request includes: the usage amount of the client.
Illustratively, the occupancy request includes: the usage amount of the client may be, for example, that the client performs a transaction after receiving the verification, and after the transaction is completed, the client sends an occupation request, where the occupation request includes: and the amount R corresponding to the product W.
In an exemplary embodiment, the present system design is described separately below.
(1) The limit setting module:
1) the limit setting dimension: aiming at the characteristics of the financial institution limit management, the system provides multiple dimensions for setting up limit management, including but not limited to the dimensions of limit amount, currency, credit institution, folder, product, term, counterparty and the like. Each dimension field can be freely combined to establish the quota, and the quota management of fine flexibility is realized.
2) Setting flexible grouping of dimensions: in order to more flexibly manage the quota and support the establishment of group management of quota setting dimensions, a plurality of product parameters can be set as a product parameter combination and managed as one dimension of the quota, and similarly, folder, a transaction opponent and a credit institution can also be used as the parameter combination to set the parameters.
Meanwhile, the supported parameter combination can be stored in a database, renaming of the parameter combination can be carried out, and the parameter combination can be used for reusing new quota.
(2) The limit checking module:
1) the amount is checked in advance: the transaction of the financial institution has the characteristics of large amount of money, scene responsibility, high real-time performance and the like, and if the amount cannot be verified in advance, the risk potential is easy to appear only through a post-inspection mode. The system supports real-time verification of financial market transaction, and can prevent an excess transaction scene in a transaction intercepting mode if the verification fails.
2) Decision tree support: the system is internally provided with decision support trees with various dimensions. Different quota dimensions can be used as different classification or judgment rules to flexibly control the quota.
(3) The quota occupying module:
1) the quota is occupied: refined quota occupation is carried out through decision tree support, multiple and detailed quota occupation and release are supported, and corresponding quota release or deduction is carried out as long as transaction elements are matched.
2) Automatic recalculation: and when the limit is set, the parameter is modified, the occupied amount and the available amount of the limit are automatically recalculated according to the dimension of the limit, and the real-time and accurate limit management and analysis purposes are provided.
3) The occupation details of the amount: besides visually displaying the limit occupation result and the details for the user in a single direction, the system also supports real-time export of the details ledger and provides powerful support for management and analysis of the limit condition for the user.
The embodiment of the invention relates to a solution applied to the refined limit management of a financial market, and provides a system and an implementation method for the refined limit management of the financial market, which solve the risk hidden trouble that the limit management needs to be carried out by depending on an outsourcing system in the past, enable a user to carry out the function of checking the financial market limit in advance, embed various financial market limit management dimensions, and can be flexibly configured so as to carry out the refined limit management of the financial market.
The embodiment of the invention can configure a multi-dimensional quota element setting mode and a refined quota checking and occupying mode. The configurable processing mode of the quota multi-dimension comprises a user configuration mode, flexible dimension setting, stored data and a final display form. The real-time occupation of the limit of the financial market transaction mainly comprises the prior verification of the limit of the financial market transaction, the real-time occupation of the limit of the financial market transaction, the fine control of the limit by combining a decision tree mode, and the limit can be quickly displayed in a last display stage according to a predefined form.
According to the technical scheme of the embodiment, a credit use request sent by a client is received, wherein the credit use request carries transaction elements, and the transaction elements comprise: customer identity information; determining a sub-limit corresponding to the client identity information according to the client identity information; the transaction elements are verified according to the itemized limit, if the verification is passed, the verification is sent to the client side, the risk potential problem that the user needs to rely on an outsourcing system to manage the limit in the past is solved, meanwhile, the user can perform the function of verifying the financial market limit in advance, various financial market limit management dimensions are built in, and the configuration can be flexibly performed, so that the financial market limit management can be finely performed.
Example two
FIG. 2 is a diagram illustrating a structure of a credit management device according to a second embodiment of the present invention. The embodiment may be applicable to the condition of credit management, the device may be implemented in a software and/or hardware manner, and the device may be integrated in any device providing a credit management function, as shown in fig. 2, the credit management device specifically includes: a receiving module 210, a determining module 220 and a verifying module 230.
The receiving module 210 is configured to receive a request for using a credit sent by a client, where the request for using the credit carries transaction elements, and the transaction elements include: customer identity information;
the determining module 220 is configured to determine a sub-limit corresponding to the client identity information according to the client identity information;
and the verification module 230 is configured to verify the transaction element according to the itemized quota, and if the verification passes, send a verification pass to the client.
The product can execute the method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
According to the technical scheme of the embodiment, a credit use request sent by a client is received, wherein the credit use request carries transaction elements, and the transaction elements comprise: customer identity information; determining a sub-limit corresponding to the client identity information according to the client identity information; the transaction elements are verified according to the itemized limit, if the verification is passed, the verification is sent to the client side, the risk potential problem that the user needs to rely on an outsourcing system to manage the limit in the past is solved, meanwhile, the user can perform the function of verifying the financial market limit in advance, various financial market limit management dimensions are built in, and the configuration can be flexibly performed, so that the financial market limit management can be finely performed.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a computer device in a third embodiment of the present invention. FIG. 3 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present invention. The computer device 12 shown in FIG. 3 is only an example and should not impose any limitation on the scope of use or functionality of embodiments of the present invention.
As shown in FIG. 3, computer device 12 is in the form of a general purpose computing device. The components of computer device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an enhanced ISA bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system Memory 28 may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) 30 and/or cache Memory 32. Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 3, and commonly referred to as a "hard drive"). Although not shown in FIG. 3, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (a Compact disk-Read Only Memory (CD-ROM)), Digital Video disk (DVD-ROM), or other optical media may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with computer device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. In the computer device 12 of the present embodiment, the display 24 is not provided as a separate body but is embedded in the mirror surface, and when the display surface of the display 24 is not displayed, the display surface of the display 24 and the mirror surface are visually integrated. Moreover, computer device 12 may also communicate with one or more networks (e.g., a Local Area Network (LAN), Wide Area Network (WAN)) and/or a public Network (e.g., the Internet) via Network adapter 20. As shown, network adapter 20 communicates with the other modules of computer device 12 via bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, Redundant processing units, external disk drive Arrays, disk array (RAID) systems, tape drives, and data backup storage systems, to name a few.
The processing unit 16 executes various functional applications and data processing by running the program stored in the system memory 28, for example, implementing the quota management method provided by the embodiment of the present invention:
receiving a quota use request sent by a client, wherein the quota use request carries transaction elements, and the transaction elements comprise: customer identity information;
determining a sub-limit corresponding to the client identity information according to the client identity information;
and verifying the transaction elements according to the itemized quota, and if the verification is passed, sending verification pass to the client.
Example four
The fourth embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for managing an amount, provided in all embodiments of the present invention:
receiving a quota use request sent by a client, wherein the quota use request carries transaction elements, and the transaction elements comprise: customer identity information;
determining a sub-limit corresponding to the client identity information according to the client identity information;
and verifying the transaction elements according to the itemized quota, and if the verification is passed, sending verification pass to the client.
Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (Hyper Text Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a source text input by a user, and translating the source text into a target text corresponding to a target language; acquiring historical correction behaviors of the user; and correcting the target text according to the historical correction behaviors to obtain a translation result, and pushing the translation result to a client where the user is located.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, or the like, as well as conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of an element does not in some cases constitute a limitation on the element itself.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.