[go: up one dir, main page]

CN113157740A - Business material putting method and device and electronic equipment - Google Patents

Business material putting method and device and electronic equipment Download PDF

Info

Publication number
CN113157740A
CN113157740A CN202110451701.7A CN202110451701A CN113157740A CN 113157740 A CN113157740 A CN 113157740A CN 202110451701 A CN202110451701 A CN 202110451701A CN 113157740 A CN113157740 A CN 113157740A
Authority
CN
China
Prior art keywords
service
shielding
user
business
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110451701.7A
Other languages
Chinese (zh)
Other versions
CN113157740B (en
Inventor
卞仑
姜剑青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qifu Shuke (Shanghai) Technology Co.,Ltd.
Original Assignee
Shanghai Qifu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qifu Information Technology Co ltd filed Critical Shanghai Qifu Information Technology Co ltd
Priority to CN202110451701.7A priority Critical patent/CN113157740B/en
Publication of CN113157740A publication Critical patent/CN113157740A/en
Application granted granted Critical
Publication of CN113157740B publication Critical patent/CN113157740B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the present specification provides a method for delivering a service material, where a secondary user participating in a service is determined from a user group currently participating in the service, a target user is screened from the secondary user, a service shielding rule with a shielding packet is generated based on the screened target user, and the service shielding rule is executed when a delivery task is performed: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed. The secondary users participating in the service secondarily are determined from the user group participating in the service currently, the target users are screened out for shielding, the users are shielded when the service materials are put in, resources consumed by material putting are saved, and the overall accuracy of material putting is improved.

Description

Business material putting method and device and electronic equipment
Technical Field
The present application relates to the field of internet, and in particular, to a method and an apparatus for delivering business materials, and an electronic device.
Background
When a user participates in a business, materials are often required to be put into the user, however, when a putting object of the materials is selected, the user requirements participating in the business are often directly responded to put the materials into the user, however, the material putting accuracy is reduced due to the mode, and a business material putting method with high accuracy is needed to be provided.
At present, the reason for the low accuracy of this method is that when the materials are delivered to users who participate in the business in response to their demands, the materials are actually delivered to each user who participates in the business. However, in practical situations, some users with low quality who have been rejected from participating in the service for the first time still have a high rejection probability to participate in the service again, and thus after the material is delivered to the users, the users with high probability cannot obtain a desired service effect, thereby causing the accuracy of delivering the material to be reduced.
Disclosure of Invention
The embodiment of the specification provides a business material delivery method and device and electronic equipment, and is used for improving the material delivery accuracy.
An embodiment of the present specification provides a method for delivering a business material, including:
determining secondary users participating in the service secondarily from a user group participating in the service currently;
screening target users from the secondary users, and generating a service shielding rule with a shielding packet based on the screened target users;
executing the business shielding rule when a launching task is carried out: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed.
Optionally, the method further comprises:
and monitoring the execution effect of the business shielding rule, and identifying abnormality based on the execution effect of the business shielding rule.
Optionally, the monitoring the execution effect of the traffic masking rule, and identifying an exception based on the execution effect of the traffic masking rule include:
and monitoring the execution effect of the business shielding rule according to the releasing channel, and identifying the releasing channel missing the shielding packet.
Optionally, the execution effect of the traffic masking rule includes: and the service material is used for triggering the reaching state information of the target user in the shielding packet.
Optionally, the service is a finished service.
Optionally, the method further comprises: and calculating the piece passing rate.
Optionally, the method further comprises:
and comparing the complete piece passing rate calculated in the current monitoring period with the complete piece passing rate calculated in the historical monitoring period, and identifying the abnormality of the service in the current monitoring period.
Optionally, the calculating the complete piece passing rate includes:
and calculating the pass rate of the finished parts by combining the effective period of the business shielding rule.
Optionally, the secondary user is a user who evaluates failure after participating in the service for the first time.
An embodiment of the present specification further provides a service material delivery device, including:
the shielding packet module is used for determining secondary users participating in the service secondarily from the user group participating in the service currently;
screening target users from the secondary users, and generating a service shielding rule with a shielding packet based on the screened target users;
and the releasing module executes the service shielding rule when a releasing task is carried out: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed.
Optionally, the method further comprises:
and monitoring the execution effect of the business shielding rule, and identifying abnormality based on the execution effect of the business shielding rule.
Optionally, the monitoring the execution effect of the traffic masking rule, and identifying an exception based on the execution effect of the traffic masking rule include:
and monitoring the execution effect of the business shielding rule according to the releasing channel, and identifying the releasing channel missing the shielding packet.
Optionally, the execution effect of the traffic masking rule includes: and the service material is used for triggering the reaching state information of the target user in the shielding packet.
Optionally, the service is a finished service.
Optionally, the method further comprises: and calculating the piece passing rate.
Optionally, the method further comprises:
and comparing the complete piece passing rate calculated in the current monitoring period with the complete piece passing rate calculated in the historical monitoring period, and identifying the abnormality of the service in the current monitoring period.
Optionally, the calculating the complete piece passing rate includes:
and calculating the pass rate of the finished parts by combining the effective period of the business shielding rule.
Optionally, the secondary user is a user who evaluates failure after participating in the service for the first time.
An embodiment of the present specification further provides an electronic device, where the electronic device includes:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform any of the methods described above.
The present specification also provides a computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement any of the above methods.
In the various technical solutions provided in the embodiments of the present description, a secondary user who participates in a service secondarily is determined from a user group who participates in the service at present, a target user is screened from the secondary user, a service shielding rule with a shielding packet is generated based on the screened target user, and the service shielding rule is executed when a task is launched: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed. The secondary users participating in the service secondarily are determined from the user group participating in the service currently, the target users are screened out for shielding, the users are shielded when the service materials are put in, resources consumed by material putting are saved, and the overall accuracy of material putting is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic diagram illustrating a principle of a method for delivering business materials according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a business material delivery device provided in an embodiment of the present specification;
fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals denote the same or similar elements, components, or parts in the drawings, and thus their repetitive description will be omitted.
Features, structures, characteristics or other details described in a particular embodiment do not preclude the fact that the features, structures, characteristics or other details may be combined in a suitable manner in one or more other embodiments in accordance with the technical idea of the invention.
In describing particular embodiments, the present invention has been described with reference to features, structures, characteristics or other details that are within the purview of one skilled in the art to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific features, structures, characteristics, or other details.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The term "and/or" and/or "includes all combinations of any one or more of the associated listed items.
Fig. 1 is a schematic diagram of a method for delivering business materials according to an embodiment of the present disclosure, where the method may include:
s101: and determining secondary users participating in the service secondarily from the user group participating in the service currently.
In practical application, when the platform puts service activities to a user who has launched a finished piece, a certain resource position needs to be occupied or a certain resource needs to be consumed, and each putting has opportunity cost, so that accurate putting of materials is realized, and the improvement of the platform operation level is facilitated.
In the embodiment of the present specification, the service is a service for performing a piece.
The completion component may refer to reporting of information, such as reporting of academic information, by the user in order to prove his credit.
In this embodiment, the secondary user is a user who has failed evaluation after first participating in a service.
In an actual scenario, this may mean that a plurality of user information participating in a service in a current monitoring period is obtained by means of client data reporting, that is, a user group, in which some users are users participating in the service for the first time, and some users are users who are rejected after participating in the service for the first time and participate in the service again in the current monitoring period, and may be recorded as secondary users.
It should be noted that, at this time, the complete service in which the user participates may be one service node in the platform providing multiple node services, and the platform may further provide additional services after the user participates in the complete service, for example, delivering service materials to some of the users.
In specific implementation, a user behavior event can be recorded, and a secondary user who participates in the service secondarily is identified according to the user behavior event.
When identifying whether the user currently participating in the service is a secondary user, the method can be judged by combining the equipment identification number. Of course, it is also possible to identify a situation where one user uses a plurality of devices to determine whether the user is a secondary user.
In an embodiment, it is considered that a user may log in by using a plurality of accounts, and in order to remember passwords, the user often sets the passwords of the plurality of accounts to be the same password, so that if the user can recognize the password, the accuracy of recognizing the secondary user can be improved, and the accuracy and the utilization efficiency of material delivery are improved.
Therefore, in the embodiment of the present specification, the method may further include:
and judging whether a plurality of user accounts correspond to the same user or not according to the passwords of the plurality of login accounts, if so, using the current user participating in the service by the accounts as a secondary user.
Of course, it is also possible to collect user operation attribute information, such as operation consistency data, reaction time data, and component response link data, generated by multiple devices participating in a service in the same local area network to determine whether the time operators of the multiple devices are the same user, and further determine whether the user using the multiple devices participating in the service is a secondary user.
S102: and screening target users from the secondary users, and generating a service shielding rule with a shielding packet based on the screened target users.
In the embodiment of the present specification, a screening model may be constructed, which is used to screen a target user with low credit data from secondary users.
Therefore, the target users with low credit data can be shielded, and resources consumed by material delivery are reduced.
The service shielding rule may be a shielding instruction, and when the service shielding rule is executed specifically, the shielding packet and the shielding instruction may be sent to the material delivery system, and the material delivery system reads the shielding packet and the shielding instruction and then delivers the material.
The material delivery system may include a material delivery system of a third party, which is not specifically illustrated and limited herein.
When the material putting system puts in materials, the crowd bags to be put in can be limited to be obtained, the user information under the shielding bags is eliminated in a sufficient mode, and then the materials can be put in.
S103: executing the business shielding rule when a launching task is carried out: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed.
Determining secondary users participating in the service secondarily from a user group participating in the service currently, screening target users from the secondary users, generating a service shielding rule with a shielding packet based on the screened target users, and executing the service shielding rule when a launching task is performed: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed. The secondary users participating in the service secondarily are determined from the user group participating in the service currently, the target users are screened out for shielding, the users are shielded when the service materials are put in, the overall accuracy of material putting is improved, and resources consumed by material putting are saved.
In the embodiment of the present specification, the method may further include:
and monitoring the execution effect of the business shielding rule, and identifying abnormality based on the execution effect of the business shielding rule.
By monitoring the execution effect of the business shielding rule, the actual material putting condition can be known, and whether the material is abnormal or not can be judged, so that the management and control level is improved.
Specifically, the user behavior of the shielded user may be monitored to determine whether the shielded user is thrown with the material, and if the shielded user generates the user behavior related to the material, it indicates that the shielded package is abnormal, and it is necessary to perform fault location on the throwing process.
In this embodiment of the present specification, the monitoring the execution effect of the business masking rule, and identifying an exception based on the execution effect of the business masking rule may include:
and monitoring the execution effect of the business shielding rule according to the releasing channel, and identifying the releasing channel missing the shielding packet.
In this embodiment of the present specification, the execution effect of the business masking rule may include: and the service material is used for triggering the reaching state information of the target user in the shielding packet.
And determining the execution effect of the business shielding rule by monitoring whether the material reaches the user.
In the embodiment of the present specification, the method may further include: and calculating the piece passing rate.
In the embodiment of the present specification, the method may further include:
and comparing the complete piece passing rate calculated in the current monitoring period with the complete piece passing rate calculated in the historical monitoring period, and identifying the abnormality of the service in the current monitoring period.
Considering that after the material is put in, the user often delays an event when the user finishes the work, so that the work finishing rate counted in the current monitoring period cannot necessarily reflect the effect of executing the service shielding rule in the current monitoring period.
Therefore, in order to accurately calculate the shielding effect, in this embodiment of the present specification, the calculating the piece passing rate may include:
and calculating the pass rate of the finished parts by combining the effective period of the business shielding rule.
Wherein the identified anomalies may include: the equipment information of the users in the same user shielding package is different from the finished equipment information, the shielding package information is lost, and the platform has no equipment information of finished users in related clients.
After the abnormity is identified, the system can automatically give an alarm to the operator to prompt the operator to repair the fault.
Of course, the identification of the abnormality can be system habit identification, and the system can build a real-time monitoring module and configure a monitoring rule for monitoring the execution effect of the shielding rule.
Fig. 2 is a schematic structural diagram of a business material delivery apparatus provided in an embodiment of this specification, where the apparatus may include:
a mask packet module 201, which determines secondary users participating in the service from the user group participating in the service at present;
screening target users from the secondary users, and generating a service shielding rule with a shielding packet based on the screened target users;
the launching module 202, when launching the task, executes the service shielding rule: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed.
In an actual scenario, this may mean that a plurality of user information participating in a service in a current monitoring period is obtained by means of client data reporting, that is, a user group, in which some users are users participating in the service for the first time, and some users are users who are rejected after participating in the service for the first time and participate in the service again in the current monitoring period, and may be recorded as secondary users.
It should be noted that, at this time, the complete service in which the user participates may be one service node in the platform providing multiple node services, and the platform may further provide additional services after the user participates in the complete service, for example, delivering service materials to some of the users.
In specific implementation, a user behavior event can be recorded, and a secondary user who participates in the service secondarily is identified according to the user behavior event.
In the embodiment of the present specification, the method may further include:
and monitoring the execution effect of the business shielding rule, and identifying abnormality based on the execution effect of the business shielding rule.
In this embodiment of the present specification, the monitoring the execution effect of the business masking rule, and identifying an exception based on the execution effect of the business masking rule may include:
and monitoring the execution effect of the business shielding rule according to the releasing channel, and identifying the releasing channel missing the shielding packet.
In this embodiment of the present specification, the execution effect of the business masking rule may include: and the service material is used for triggering the reaching state information of the target user in the shielding packet.
In the embodiment of the present specification, the service is a service for performing a piece.
In the embodiment of the present specification, the method may further include: and calculating the piece passing rate.
In the embodiment of the present specification, the method may further include:
and comparing the complete piece passing rate calculated in the current monitoring period with the complete piece passing rate calculated in the historical monitoring period, and identifying the abnormality of the service in the current monitoring period.
Considering that after the material is put in, the user often delays an event when the user finishes the work, so that the work finishing rate counted in the current monitoring period cannot necessarily reflect the effect of executing the service shielding rule in the current monitoring period.
Therefore, in order to accurately calculate the shielding effect, in this embodiment of the present specification, the calculating the piece passing rate may include:
and calculating the pass rate of the finished parts by combining the effective period of the business shielding rule.
Wherein the identified anomalies may include: the equipment information of the users in the same user shielding package is different from the finished equipment information, the shielding package information is lost, and the platform has no equipment information of finished users in related clients.
After the abnormity is identified, the system can automatically give an alarm to the operator to prompt the operator to repair the fault.
Of course, the identification of the abnormality can be system habit identification, and the system can build a real-time monitoring module and configure a monitoring rule for monitoring the execution effect of the shielding rule.
In this embodiment, the secondary user is a user who has failed evaluation after first participating in a service.
The device determines secondary users participating in the service secondarily from a user group participating in the service currently, screens out target users from the secondary users, generates a service shielding rule with a shielding packet based on the screened target users, and executes the service shielding rule when a task is launched: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed. The secondary users participating in the service secondarily are determined from the user group participating in the service currently, the target users are screened out for shielding, the users are shielded when the service materials are put in, resources consumed by material putting are saved, and the overall accuracy of material putting is improved.
Based on the same inventive concept, the embodiment of the specification further provides the electronic equipment.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as specific physical implementations for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure. An electronic device 300 according to this embodiment of the invention is described below with reference to fig. 3. The electronic device 300 shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 3, electronic device 300 is embodied in the form of a general purpose computing device. The components of electronic device 300 may include, but are not limited to: at least one processing unit 310, at least one memory unit 320, a bus 330 connecting the various system components (including the memory unit 320 and the processing unit 310), a display unit 340, and the like.
Wherein the storage unit stores program code executable by the processing unit 310 to cause the processing unit 310 to perform the steps according to various exemplary embodiments of the present invention described in the above-mentioned processing method section of the present specification. For example, the processing unit 310 may perform the steps as shown in fig. 1.
The storage unit 320 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)3201 and/or a cache storage unit 3202, and may further include a read only memory unit (ROM) 3203.
The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 400 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 300, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 300 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 350. Also, the electronic device 300 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 360. Network adapter 360 may communicate with other modules of electronic device 300 via bus 330. It should be appreciated that although not shown in FIG. 3, other hardware and/or software modules may be used in conjunction with electronic device 300, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAI D systems, tape drives, and data backup storage systems, etc.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention. The computer program, when executed by a data processing apparatus, enables the computer readable medium to implement the above-described method of the invention, namely: such as the method shown in fig. 1.
Fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
A computer program implementing the method shown in fig. 1 may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in embodiments in accordance with the invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP). The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (12)

1. A method for releasing business materials is characterized by comprising the following steps:
determining secondary users participating in the service secondarily from a user group participating in the service currently;
screening target users from the secondary users, and generating a service shielding rule with a shielding packet based on the screened target users;
executing the business shielding rule when a launching task is carried out: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed.
2. The method of claim 1, further comprising:
and monitoring the execution effect of the business shielding rule, and identifying abnormality based on the execution effect of the business shielding rule.
3. The method according to any one of claims 1-2, wherein the monitoring the execution effect of the traffic masking rule, and the identifying an anomaly based on the execution effect of the traffic masking rule comprises:
and monitoring the execution effect of the business shielding rule according to the releasing channel, and identifying the releasing channel missing the shielding packet.
4. The method according to any of claims 1-3, wherein the effect of the execution of the traffic masking rule comprises: and the service material is used for triggering the reaching state information of the target user in the shielding packet.
5. The method according to any of claims 1-4, characterized in that the service is a completion service.
6. The method according to any one of claims 1-5, further comprising: and calculating the piece passing rate.
7. The method according to any one of claims 1-6, further comprising:
and comparing the complete piece passing rate calculated in the current monitoring period with the complete piece passing rate calculated in the historical monitoring period, and identifying the abnormality of the service in the current monitoring period.
8. The method according to any one of claims 1-7, wherein the calculating the complete piece passage rate comprises:
and calculating the pass rate of the finished parts by combining the effective period of the business shielding rule.
9. The method according to any of claims 1-8, wherein the secondary user is a user who has not been evaluated for failure after first participation in the service.
10. A business material delivery device, comprising:
the shielding packet module is used for determining secondary users participating in the service secondarily from the user group participating in the service currently;
screening target users from the secondary users, and generating a service shielding rule with a shielding packet based on the screened target users;
and the releasing module executes the service shielding rule when a releasing task is carried out: and removing the target user from the guest group pointed by the release task, and releasing the business materials to the guest group from which the target user is removed.
11. An electronic device, wherein the electronic device comprises:
a processor; and the number of the first and second groups,
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-9.
12. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-9.
CN202110451701.7A 2021-04-26 2021-04-26 Service material throwing method and device and electronic equipment Active CN113157740B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110451701.7A CN113157740B (en) 2021-04-26 2021-04-26 Service material throwing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110451701.7A CN113157740B (en) 2021-04-26 2021-04-26 Service material throwing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113157740A true CN113157740A (en) 2021-07-23
CN113157740B CN113157740B (en) 2023-06-23

Family

ID=76870947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110451701.7A Active CN113157740B (en) 2021-04-26 2021-04-26 Service material throwing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113157740B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100063890A1 (en) * 2008-09-09 2010-03-11 Compucredit Corporation Methods and Systems for Generating, Qualifying, and Processing Leads
US7797231B1 (en) * 2006-08-28 2010-09-14 Loeb Enterprises, Llc. Methods and systems for facilitating one-time consumer loans arising from declined credit card transactions
US20110029371A1 (en) * 2009-07-30 2011-02-03 Devries Derek Method and system of allocation of popularity credit in a private communications network
US20150363600A1 (en) * 2013-03-12 2015-12-17 Huawei Technologies Co., Ltd. Method, Apparatus, and System for Data Protection
US20190180046A1 (en) * 2017-12-07 2019-06-13 Yahoo Holdings, Inc. Securing digital content using separately authenticated hidden folders
CN110246025A (en) * 2019-04-24 2019-09-17 深圳融信网金信息科技有限公司 Antifraud method based on user information, system, terminal device
CN110807653A (en) * 2019-11-28 2020-02-18 北京淇瑀信息科技有限公司 Method and device for screening users and electronic equipment
CN112508693A (en) * 2021-02-05 2021-03-16 北京淇瑀信息科技有限公司 Resource distribution channel distribution method and device based on user tags and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7797231B1 (en) * 2006-08-28 2010-09-14 Loeb Enterprises, Llc. Methods and systems for facilitating one-time consumer loans arising from declined credit card transactions
US20100063890A1 (en) * 2008-09-09 2010-03-11 Compucredit Corporation Methods and Systems for Generating, Qualifying, and Processing Leads
US20110029371A1 (en) * 2009-07-30 2011-02-03 Devries Derek Method and system of allocation of popularity credit in a private communications network
US20150363600A1 (en) * 2013-03-12 2015-12-17 Huawei Technologies Co., Ltd. Method, Apparatus, and System for Data Protection
US20190180046A1 (en) * 2017-12-07 2019-06-13 Yahoo Holdings, Inc. Securing digital content using separately authenticated hidden folders
CN110246025A (en) * 2019-04-24 2019-09-17 深圳融信网金信息科技有限公司 Antifraud method based on user information, system, terminal device
CN110807653A (en) * 2019-11-28 2020-02-18 北京淇瑀信息科技有限公司 Method and device for screening users and electronic equipment
CN112508693A (en) * 2021-02-05 2021-03-16 北京淇瑀信息科技有限公司 Resource distribution channel distribution method and device based on user tags and electronic equipment

Also Published As

Publication number Publication date
CN113157740B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
US10997010B2 (en) Service metric analysis from structured logging schema of usage data
US10175978B2 (en) Monitoring code sensitivity to cause software build breaks during software project development
CN102089775B (en) There is the service performance manager for alleviating restricted responsibility service-level agreement with automatic protection and pattern
US20120185936A1 (en) Systems and Methods for Detecting Fraud Associated with Systems Application Processing
US11736511B2 (en) Information technology security assessment model for process flows and associated automated remediation
CN111949531B (en) Block chain network testing method, device, medium and electronic equipment
US10685043B2 (en) Event analysis in network management event streams
US20210357280A1 (en) Systems and methods for application operational monitoring
CN107294808A (en) The methods, devices and systems of interface testing
CN111245642A (en) Method and device for acquiring dependency relationship between multiple systems and electronic equipment
US20220060371A1 (en) Fault localization for cloud-native applications
CN104866296A (en) Data processing method and device
CN112232856A (en) A diversion-based business processing method, device and electronic device
CN117372180A (en) Financial information statistics management system based on big data
CN113411209A (en) Distributed password service full-link detection system and method
CN115037577B (en) Intelligent gateway service management platform
CN116149824A (en) Task re-running processing method, device, equipment and storage medium
Sebu et al. Business activity monitoring solution to detect deviations in business process execution
CN113157740A (en) Business material putting method and device and electronic equipment
CN110609761B (en) Method and device for determining fault source, storage medium and electronic equipment
US20210294682A1 (en) Predicting cost reduction of event correlation in fault event management
CN111681094A (en) Method and device for monitoring resource strategy abnormity and electronic equipment
US10606714B2 (en) Stopping central processing units for data collection based on event categories of events
Rieke et al. Predictive security analysis for event-driven processes
CN112508207A (en) Fault detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 200333 room 1027, 10th floor, 89 Yunling East Road, Putuo District, Shanghai

Patentee after: Qifu Shuke (Shanghai) Technology Co.,Ltd.

Address before: 200333 room 1027, 10th floor, 89 Yunling East Road, Putuo District, Shanghai

Patentee before: Shanghai Qifu Information Technology Co.,Ltd.