[go: up one dir, main page]

HK1241503A1 - Resource processing method and apparatus - Google Patents

Resource processing method and apparatus

Info

Publication number
HK1241503A1
HK1241503A1 HK18100880.3A HK18100880A HK1241503A1 HK 1241503 A1 HK1241503 A1 HK 1241503A1 HK 18100880 A HK18100880 A HK 18100880A HK 1241503 A1 HK1241503 A1 HK 1241503A1
Authority
HK
Hong Kong
Prior art keywords
resource allocation
resource
access
party
flow sheet
Prior art date
Application number
HK18100880.3A
Other languages
Chinese (zh)
Other versions
HK1241503B (en
HK1241503A (en
Inventor
杨志蓉
戴馨
马海
梅方成
刘梅
万谦
刘巧勇
董华良
王之旭
丁伟伟
Original Assignee
阿里巴巴集团控股有限公司
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of HK1241503A1 publication Critical patent/HK1241503A1/en
Publication of HK1241503A publication Critical patent/HK1241503A/en
Publication of HK1241503B publication Critical patent/HK1241503B/en

Links

Description

Resource processing method and device
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of mobile interconnection technologies, and in particular, to a resource processing method and apparatus.
[ background of the invention ]
In the prior art, when there is a resource demand, a resource demanding party can provide a resource acquisition request, and the resource acquisition progress is recorded through a resource allocation flow sheet. When receiving a resource acquisition request, the resource provider may allocate resources for the resource consumer. However, when the resource supplier supplies the resource to the resource demander, the resource allocation is in a suspended state while the resource allocation flow sheet is in a pending state when the resource supplier temporarily has no resource available.
In the process of realizing the prior art, the inventor finds that the following technical problems exist:
when the resource supplier has no resource available, the resource allocation is in a pause state, and the resource allocation flow sheet is in a to-be-processed state, so that the resource turnover efficiency is reduced, and the resource allocation flow sheet is in the to-be-processed state for a long time, and occupies computer storage and computing resources.
Therefore, it is necessary to provide a technical solution for resource processing to solve the technical problems of low resource turnover efficiency, and large computer storage and computing resource occupation during resource allocation.
[ summary of the invention ]
The embodiment of the application provides a technical scheme for solving the technical problems of low resource turnover efficiency, occupation of computer storage during resource allocation and large amount of computing resources.
Specifically, the resource processing method includes the following steps executed by the computer under configuration:
generating a resource allocation flow sheet based on the resource allocation request;
processing the resource allocation flow sheet to generate an access entry of the resource allocation flow sheet;
and opening the access entrance so that a resource supply third party responds to the resource allocation request through the access entrance.
An embodiment of the present application further provides a resource processing apparatus, including:
the request module is used for generating a resource allocation flow sheet based on the resource allocation request;
the processing module is used for processing the resource allocation flow sheet and generating an access inlet of the resource allocation flow sheet;
and the issuing module is used for opening the access entrance so that a resource supply third party can respond to the resource allocation request through the access entrance.
The resource processing method and the resource processing device provided by the embodiment of the application have at least the following beneficial effects:
the resource allocation flow sheet based on the resource allocation request is processed to generate an access entry, when local resources are insufficient or resources are temporarily inconvenient to allocate, a resource supply third party can respond to the resource allocation request through the access entry to perform resource allocation operation, so that the resource turnover efficiency is improved, meanwhile, the corresponding resource allocation flow sheet is processed in time, and the storage of a computer and the occupation of computing resources are reduced.
[ description of the drawings ]
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a process diagram of a resource processing method according to an embodiment of the present application.
Fig. 2 is a schematic diagram of a process of pushing information according to an embodiment of the present disclosure.
Fig. 3 is a schematic diagram of another process for pushing information according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of a resource processing apparatus according to an embodiment of the present application.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a resource processing method provided in the embodiment of the present application specifically includes a computer executing the following steps under configuration:
s100: and generating a resource allocation flow sheet based on the resource allocation request.
The resource may be production data or life data which can be allocated and consumed, or the dominance of the production data and the life data. For ease of understanding, the allocation of funds is described herein as an example. It should be noted that the scope of the substantial protection of the present application should not be limited to the allocation of funds. Correspondingly, the resource allocation flow list may be a bill. The generation here may be understood as the local computer device generating the resource allocation flow sheet, and may also be understood as receiving the resource allocation flow sheet generated by the external application server. In particular, for example, a payment receipt generated by a server based on a payment item request is received.
S200: and processing the resource allocation flow sheet to generate an access entry of the resource allocation flow sheet.
It is understood that the information in the resource allocation flow sheet in the prior art is static. The resource allocation flow sheet generally has various detailed information of the resource allocation requester. Here, the resource allocation flow sheet is processed to disclose part of the information to other users based on the requirement of keeping the information of the resource allocation requester secret and the requirement of the resource allocation flow sheet accessible to other users.
Further, in another embodiment provided by the present application, the processing the resource allocation flow sheet to generate an access entry of the resource allocation flow sheet specifically includes:
and coding the resource allocation flow sheet to generate a sharing code.
And coding the virtual address of the resource allocation flow sheet in the server based on the requirement that the resource allocation flow sheet can be accessed by other users, and converting the virtual address into a sharing code which can be accessed by other users. Specifically, for example, the virtual address of the resource allocation flow sheet in the server may be encoded as a password, or the virtual address of the resource allocation flow sheet in the server may be encoded as a two-dimensional code.
S300: and opening the access entrance so that a resource supply third party responds to the resource allocation request through the access entrance.
The resource allocation requester can open the resource allocation flow sheet to the resource supply third party in a sharing mode. The resource provisioning third party may respond to the resource allocation request by accessing the portal. Specifically, for example, the resource allocation requester may forward the shared code to a third party, or the resource allocation requester may distribute the shared code to the platform. The resource supply third party can access the resource allocation flow sheet through the forwarding link, or the resource supply third party can access the resource allocation flow sheet through the sharing code issued by the platform, and the resource allocation request is responded according to the instruction of the resource supply third party.
Further, in another embodiment provided in the present application, opening the access entry specifically includes:
setting an access condition;
and when the access condition is met, opening the access entrance.
Based on the control of the access amount of the resource allocation flow sheet and the security consideration of the resource allocation flow sheet, the access condition of the access entry can be set. And when the access behavior does not meet the access condition, closing the access entrance.
Further, in another embodiment provided in the present application, the setting of the access condition specifically includes:
determining an upper limit on the number of resource offerings third parties that the access portal can accommodate;
setting the access condition that the number of accesses does not exceed the determined upper limit of the number.
An upper limit on the number of resource offerings third parties that the access portal can accommodate may be set. On the day or in a period of time, when the access times of the resource supply third party of the resource allocation flow list accessed through the access entrance reach the upper limit of the quantity, the access entrance is closed, and when the access times do not reach the upper limit of the quantity, the access entrance is opened. The upper limit of the number may be set according to actual needs, specifically, the access entry may limit the number of times that a single resource supplies a third party access, may limit the total number of times that the access entry supplies all the resources with the third party access, and may also limit the number of the third parties that supply the resources with the third party.
Further, in another embodiment provided in the present application, the setting of the access condition specifically includes:
determining an open term of the access entry;
setting the access condition that the access time is within the determined open period.
Access entry access time can be set, so that overdue access can be prevented, and the security of resource allocation process list sharing is guaranteed. When the resource supply third party accesses the resource allocation flow sheet within the determined open period, the access entrance is in an open state, and when the resource supply third party accesses the resource allocation flow sheet outside the open period, the access entrance is in a closed state.
In the embodiment provided by the application, the resource allocation flow sheet based on the resource allocation request is processed to generate the access entry, when the local resource is insufficient or the resource allocation is temporarily inconvenient, the resource supply third party can respond to the resource allocation request through the access entry to perform the operation of allocating the resource, so that the resource turnover efficiency is improved, meanwhile, the corresponding resource allocation flow sheet is processed in time, and the storage of a computer and the occupation of computing resources are reduced.
Further, in another embodiment provided herein, the method further includes:
and encrypting the resource allocation flow sheet to generate an encrypted resource allocation flow sheet.
Based on the requirement of information confidentiality of the resource allocation requester, the server can perform encryption processing on the resource allocation flow sheet. Specifically, for example, information related to the privacy of the resource allocation requester, such as account information related to the resource allocation flow sheet, is encrypted. When other users access the resource allocation flow sheet through the shared code, only the information agreed and disclosed in the protocol signed by the resource allocation requester and the server can be seen.
Further, in another embodiment provided by the present application, generating an encrypted resource allocation flow sheet specifically includes:
and generating a single number of the encrypted resource allocation flow sheet.
Based on the requirement of information confidentiality of the resource allocation requester, the server can encrypt the original resource allocation flow sheet to generate the single number of the encrypted resource allocation flow sheet, so that other users can access the resource allocation flow sheet through the shared code and see the information agreed and disclosed in the protocol signed by the resource allocation requester and the server through the mapping relation between the single number of the original resource allocation flow sheet and the single number of the generated encrypted resource allocation flow sheet, but cannot reversely deduce the resource allocation record of the resource allocation requester by means of reverse engineering through the single number of the generated encrypted resource allocation flow sheet.
Further, in another embodiment provided in the present application, opening the access portal further includes:
the open resource supplies the authority of a third party to access the access entrance;
and closing the right of the resource supply third party to open the access entrance.
Based on the requirements for information confidentiality and security of a resource allocation requester, the resource allocation flow sheet is prevented from being spread unlimitedly. That is, the access portal can only be subject to primary diffusion by the local user to the resource supply third party, and the resource supply third party is prevented from performing secondary diffusion to other parties in a forwarding or sharing manner.
Further, in another embodiment provided herein, the method further includes:
when the resource supply third party passes through the access entrance, determining the processing state of the resource allocation flow sheet;
and providing a mode responding to the resource allocation request according to the processing state of the resource allocation flow sheet so that a resource supply third party responds to the resource allocation request according to the mode.
In the application, a manner that the resource supply third party responds to the resource allocation can be provided according to the processing state of the resource allocation flow sheet. When the local resources are insufficient, the resources can be supplied by the resource supply third party. When the local resources are sufficient, after the local resources are distributed, the local resources can be compensated by a third party through resource supply, so that the local resources are always in a full state, the resource distribution request can be responded as far as possible locally, the resource turnover efficiency is improved, and the occupation of storage and computing resources of a computer when a resource distribution flow list is processed is reduced.
Referring to fig. 2, further, in another embodiment provided in the present application, the method further includes:
s101: inquiring a resource allocation record of a resource allocation requester who provides the resource allocation request as a first resource allocation record;
s102: inquiring a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
s103: mapping words in the first resource allocation record and the second resource allocation record into space vectors;
s104: calculating cosine similarity between space vectors corresponding to two words of a resource allocation requester and a resource supply third party;
s105: and when the cosine similarity is not less than a preset value, sending push information according to the first resource allocation record and the second resource allocation record.
In the implementation mode provided by the application, a technical scheme for mining and applying data is further provided. The server may query a resource allocation record of a resource allocation requester making the resource allocation request as the first resource allocation record. Still take the resource allocation request as a payment item request and the resource allocation flow sheet as a payment document as an example, the payment document usually relates to transaction details, such as the code, price, date, etc. of the commodity. The server takes a record of the payment terms over a period of time as a first resource allocation record. Likewise, the server provides a record of payment terms for the third party for the resource over a period of time as a second resource allocation record. The server may then perform text processing on the first resource allocation record and the second resource allocation record, and map words in the first resource allocation record and the second resource allocation record to space vectors. In particular, words may be characterized as real-valued vectors using the text depth representation model Word2 Vec. The text depth representation model Word2Vec is well documented in the prior art and will not be described in detail here. And simplifying the processing of the text content into vector operation in a multidimensional vector space through large-scale semantic training. And further calculating the similarity of the space vectors corresponding to the two words of the resource allocation requester and the resource supply third party, so as to characterize the similarity between the resource allocation requester and the resource supply third party. In the application, the cosine similarity of the space vector corresponding to the resource allocation requester and the space vector corresponding to the resource supply third party can be calculated. And when the calculated cosine similarity is not less than a preset value, the behavior of the resource allocation requester is similar to that of the resource supply third party. And then sending out the push information according to the first resource allocation record and the second resource allocation record. The server may compare the first resource allocation record and the second resource allocation record, in this example may compare the goods involved in the payment document, and push, to the resource provisioning third party, information of the goods that are present in the payment document of the resource allocation requestor but not present in the payment document of the resource provisioning third party. Likewise, the server may push, to the resource allocation requester, the commodity information that exists in the payment receipt of the resource supply third party but does not exist in the payment receipt of the resource allocation requester.
Referring to fig. 3, further, in another embodiment provided in the present application, the method further includes:
s201: querying a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
s202: querying another resource allocation record of the resource supply third party responding to the resource allocation request as a third resource allocation record;
s203: mapping words in the second resource allocation record and the third resource allocation record into space vectors;
s204: calculating cosine similarity between space vectors corresponding to two words of one resource supply third party and the other resource supply third party;
s205: and when the cosine similarity is not less than a preset value, sending push information according to the second resource allocation record and the third resource allocation record.
The difference from the previous embodiment is that the cosine similarity between the space vectors corresponding to the two resource supply third parties is calculated here. The details of the test are as follows:
the server may query a resource allocation record for a resource offering to a third party over a period of time as a second resource allocation record. The server may query a resource allocation record for another resource supplying a third party for a period of time as a third resource allocation record. Still take the resource allocation request as a payment item request and the resource allocation flow sheet as a payment document as an example, the payment document usually relates to transaction details, such as the code, price, date, etc. of the commodity. The server may characterize words as real-valued vectors using the text depth representation model Word2 Vec. Then, the cosine similarity of the space vectors corresponding to the two resource supply third parties can be calculated. And when the calculated cosine similarity is not less than a preset value, the behavior that the two resources are supplied to the third party is similar. And then sending out the push information according to the second resource allocation record and the third resource allocation record. The server may compare the second resource allocation record with the third resource allocation record, in which case the goods involved in the payment order number may be compared, pushing to the resource provisioning third party the information of the goods not present in the payment order number of the resource provisioning third party. Generally, here, another resource supply third party may be represented as a TOP N friend of the resource allocation requester.
A specific application scenario in the embodiment of the present application is described as follows:
a local computer device, such as a personal computer terminal device or a mobile terminal device, generates a payment receipt based on the payment item request based on the transaction record. Of course, the local computer device may receive payment documents based on the payment term request from the application server. The local computer device may process the payment document and generate a shared code, such as a two-dimensional code, an encrypted password, and the like, as an access portal for the payment document. Of course, the act of processing the payment document here may also be performed by the application server. The local computer equipment can perform information interaction with the application server to achieve information synchronization between the local computer equipment and the application server. The local computer device may forward the access portal to a resource provisioning third party or publish to the platform. Specifically, for example, to friends, or to circles of friends in the platform. Friends who receive the forwarded access portal link, or friends who see the access portal circle, may respond to the payment request. Funds may be raised in response to a payment item request when the payment document is in an unpaid state. When the payment document is in a payment completed state, the funds can be awarded in response to the payment item request. Therefore, the technical problems of low capital turnover efficiency, and large computer storage and calculation resource occupation during capital allocation can be solved. Further, the application server may query the payment item record of the payment item requestor. The application server may query the funding party's payroll record for raising or rewarding funds. The application server can adopt a text depth representation model Word2Vec to process payment item records of a payment item requester and a fund raising or rewarding party and map the payment item requester and the fund raising or rewarding party into a space vector. The application server may calculate a cosine similarity between the space vector corresponding to the payment item requestor and the space vector corresponding to the fund raising or rewarding party. And when the cosine similarity is not less than the preset value, the application server pushes the missing commodity information for the payment item requesting party. Alternatively, the application server may push the information of the goods lacking for the funding or appreciating party. The application server can also calculate the cosine similarity of the space vectors corresponding to the two funding or rewarding parties. And when the cosine similarity is not less than the preset value, the application server pushes the lacking commodity information for the fund raising or rewarding party. The information of the commodity judged to be missing here can be obtained by comparing the payment receipt.
In the resource processing method provided in the embodiment of the present application, referring to fig. 4 based on the same idea, the present application further provides a resource processing apparatus, including:
a request module 11, configured to generate a resource allocation flow sheet based on a resource allocation request;
the processing module 12 is configured to process the resource allocation flow sheet and generate an access entry of the resource allocation flow sheet;
and the issuing module 13 is configured to open the access portal, so that a resource supply third party responds to the resource allocation request through the access portal.
In the application, a manner that the resource supply third party responds to the resource allocation can be provided according to the processing state of the resource allocation flow sheet. When the local resources are insufficient, the resources can be supplied by the resource supply third party. When the local resources are sufficient, after the local resources are distributed, the local resources can be compensated by a third party through resource supply, so that the local resources are always in a full state, the resource distribution request can be responded as far as possible locally, the resource turnover efficiency is improved, and the occupation of storage and computing resources of a computer when a resource distribution flow list is processed is reduced.
Further, in another embodiment provided in the present application, the processing module 12 is specifically configured to:
and coding the resource allocation flow sheet to generate a sharing code.
And coding the virtual address of the resource allocation flow sheet in the server based on the requirement that the resource allocation flow sheet can be accessed by other users, and converting the virtual address into a sharing code which can be accessed by other users. Specifically, for example, the virtual address of the resource allocation flow sheet in the server may be encoded as a password, or the virtual address of the resource allocation flow sheet in the server may be encoded as a two-dimensional code.
Further, in another embodiment provided in the present application, the apparatus further includes an encryption module 14, specifically configured to:
and encrypting the resource allocation flow sheet to generate an encrypted resource allocation flow sheet.
Based on the requirement of information confidentiality of the resource allocation requester, the server can perform encryption processing on the resource allocation flow sheet. Specifically, for example, account information related to the resource allocation request is encrypted, and other information related to privacy of the resource allocation requester, such as account information related to the resource allocation flow sheet, and when other users access the resource allocation flow sheet through the shared code, only the information agreed to be published in the agreement signed by the resource allocation requester and the server can be seen.
Further, in another embodiment provided in the present application, the encryption module 14 is further configured to:
and generating a single number of the encrypted resource allocation flow sheet.
Based on the requirement of information confidentiality of the resource allocation requester, the server can encrypt the original resource allocation flow sheet to generate the single number of the encrypted resource allocation flow sheet, so that other users can access the resource allocation flow sheet through the shared code and see the information agreed and disclosed in the protocol signed by the resource allocation requester and the server through the mapping relation between the single number of the original resource allocation flow sheet and the single number of the generated encrypted resource allocation flow sheet, but cannot reversely deduce the resource allocation record of the resource allocation requester by means of reverse engineering through the single number of the generated encrypted resource allocation flow sheet.
Further, in another embodiment provided in the present application, the issuing module 13 is configured to:
the open resource supplies the authority of a third party to access the access entrance;
and closing the right of the resource supply third party to open the access entrance.
Based on the requirements for information confidentiality and security of a resource allocation requester, the resource allocation flow sheet is prevented from being spread unlimitedly. That is, the access portal can only be subject to primary diffusion by the local user to the resource supply third party, and the resource supply third party is prevented from performing secondary diffusion to other parties in a forwarding or sharing manner.
Further, in another embodiment provided in the present application, the issuing module 13 is configured to:
setting an access condition;
and when the access condition is met, opening the access entrance.
Based on the control of the access amount of the resource allocation flow sheet and the security consideration of the resource allocation flow sheet, the access condition of the access entry can be set. And when the access behavior does not meet the access condition, closing the access entrance.
Further, in another embodiment provided in the present application, the issuing module 13 is configured to:
determining an upper limit on the number of resource offerings third parties that the access portal can accommodate;
setting the access condition that the number of accesses does not exceed the determined upper limit of the number.
An upper limit on the number of resource offerings third parties that the access portal can accommodate may be set. On the day or in a period of time, when the access times of the resource supply third party of the resource allocation flow list accessed through the access entrance reach the upper limit of the quantity, the access entrance is closed, and when the access times do not reach the upper limit of the quantity, the access entrance is opened. The upper limit of the number may be set according to actual needs, specifically, the access entry may limit the number of times that a single resource supplies a third party access, may limit the total number of times that the access entry supplies all the resources with the third party access, and may also limit the number of the third parties that supply the resources with the third party.
Further, in another embodiment provided in the present application, the issuing module 13 is configured to:
determining an open term of the access entry;
setting the access condition that the access time is within the determined open period.
Access entry access time can be set, so that overdue access can be prevented, and the security of resource allocation process list sharing is guaranteed. When the resource supply third party accesses the resource allocation flow sheet within the determined open period, the access entrance is in an open state, and when the resource supply third party accesses the resource allocation flow sheet outside the open period, the access entrance is in a closed state.
Further, in another embodiment provided in the present application, the apparatus further includes a selecting module 15, specifically configured to:
when the resource supply third party passes through the access entrance, determining the processing state of the resource allocation flow sheet;
and providing a mode responding to the resource allocation request according to the processing state of the resource allocation flow sheet so that a resource supply third party responds to the resource allocation request according to the mode.
In the application, a manner that the resource supply third party responds to the resource allocation can be provided according to the processing state of the resource allocation flow sheet. When the local resources are insufficient, the resources can be supplied by the resource supply third party. When the local resources are sufficient, after the local resources are distributed, the local resources can be compensated by a third party through resource supply, so that the local resources are always in a full state, the resource distribution request can be responded as far as possible locally, the resource turnover efficiency is improved, and the occupation of storage and computing resources of a computer when a resource distribution flow list is processed is reduced.
Further, in another embodiment provided in the present application, the apparatus further includes a pushing module 16, specifically configured to:
inquiring a resource allocation record of a resource allocation requester who provides the resource allocation request as a first resource allocation record;
inquiring a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
mapping words in the first resource allocation record and the second resource allocation record into space vectors;
calculating cosine similarity between space vectors corresponding to two words of a resource allocation requester and a resource supply third party;
and when the cosine similarity is not less than a preset value, sending push information according to the first resource allocation record and the second resource allocation record.
In the implementation mode provided by the application, a technical scheme for mining and applying data is further provided. The server may query a resource allocation record of a resource allocation requester making the resource allocation request as the first resource allocation record. Still taking the resource allocation request as a payment item request and the resource allocation flow sheet as a payment receipt as an example, the payment sheet number generally refers to transaction details, such as the code, price, date, etc. of the commodity. The server takes a record of the payment terms over a period of time as a first resource allocation record. Likewise, the server provides a record of payment terms for the third party for the resource over a period of time as a second resource allocation record. The server may then perform text processing on the first resource allocation record and the second resource allocation record, and map words in the first resource allocation record and the second resource allocation record to space vectors. In particular, words may be characterized as real-valued vectors using the text depth representation model Word2 Vec. The text depth representation model Word2Vec is well documented in the prior art and will not be described in detail here. And simplifying the processing of the text content into vector operation in a multidimensional vector space through large-scale semantic training. And further calculating the similarity of the space vectors corresponding to the two words of the resource allocation requester and the resource supply third party, so as to characterize the similarity between the resource allocation requester and the resource supply third party. In the application, the cosine similarity of the space vector corresponding to the resource allocation requester and the space vector corresponding to the resource supply third party can be calculated. And when the calculated cosine similarity is not less than a preset value, the behavior of the resource allocation requester is similar to that of the resource supply third party. And then sending out the push information according to the first resource allocation record and the second resource allocation record. The server may compare the first resource allocation record and the second resource allocation record, in this example may compare the goods involved in the payment order number, and push, to the resource provisioning third party, information of the goods that are present in the payment order of the resource allocation requestor but not in the payment order of the resource provisioning third party. Likewise, the server may push, to the resource allocation requester, the commodity information that exists in the payment receipt of the resource supply third party but does not exist in the payment receipt of the resource allocation requester.
Further, in another embodiment provided in the present application, the apparatus further includes a pushing module 16, specifically configured to:
querying a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
querying another resource allocation record of the resource supply third party responding to the resource allocation request as a third resource allocation record;
mapping words in the second resource allocation record and the third resource allocation record into space vectors;
calculating cosine similarity between space vectors corresponding to two words of one resource supply third party and the other resource supply third party;
and when the cosine similarity is not less than a preset value, sending push information according to the second resource allocation record and the third resource allocation record.
The difference from the previous embodiment is that the cosine similarity between the space vectors corresponding to the two resource supply third parties is calculated here. The details of the test are as follows:
the server may query a resource allocation record for a resource offering to a third party over a period of time as a second resource allocation record. The server may query a resource allocation record for another resource supplying a third party for a period of time as a third resource allocation record. Still take the resource allocation request as a payment item request and the resource allocation flow sheet as a payment document as an example, the payment document usually relates to transaction details, such as the code, price, date, etc. of the commodity. The server may characterize words as real-valued vectors using the text depth representation model Word2 Vec. Then, the cosine similarity of the space vectors corresponding to the two resource supply third parties can be calculated. And when the calculated cosine similarity is not less than a preset value, the behavior that the two resources are supplied to the third party is similar. And then sending out the push information according to the second resource allocation record and the third resource allocation record. The server may compare the second resource allocation record with the third resource allocation record, in which case the goods involved in the payment document may be compared, pushing to the resource provisioning third party the information of the goods that are not present in the payment document of the resource provisioning third party. Generally, here, another resource supply third party may be represented as a TOP N friend of the resource allocation requester.
Further, in another embodiment provided by the present application, the resource allocation flow sheet is a bill.
In the embodiment provided by the application, the resource allocation flow sheet based on the resource allocation request is processed to generate the access entry, when the local resource is insufficient or the resource allocation is temporarily inconvenient, the resource supply third party can respond to the resource allocation request through the access entry to perform the operation of allocating the resource, so that the resource turnover efficiency is improved, meanwhile, the corresponding resource allocation flow sheet is processed in time, and the storage of a computer and the occupation of computing resources are reduced.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable numerical processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable numerical processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, numerical structures, modules of a program, or other numerical values. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transient media) such as modulated numeric signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (24)

1. A resource processing method, characterized in that a computer executes the following steps under configuration:
generating a resource allocation flow sheet based on the resource allocation request;
processing the resource allocation flow sheet to generate an access entry of the resource allocation flow sheet;
and opening the access entrance so that a resource supply third party responds to the resource allocation request through the access entrance.
2. The method of claim 1, wherein processing the resource allocation flow sheet to generate an access entry of the resource allocation flow sheet specifically comprises:
and coding the resource allocation flow sheet to generate a sharing code.
3. The method of claim 2, wherein the method further comprises:
and encrypting the resource allocation flow sheet to generate an encrypted resource allocation flow sheet.
4. The method of claim 3, wherein generating the encrypted resource allocation flow sheet specifically comprises:
and generating a single number of the encrypted resource allocation flow sheet.
5. The method of claim 1, wherein opening the access portal further comprises:
the open resource supplies the authority of a third party to access the access entrance;
and closing the right of the resource supply third party to open the access entrance.
6. The method of claim 1, wherein opening the access portal comprises:
setting an access condition;
and when the access condition is met, opening the access entrance.
7. The method of claim 6, wherein setting the access condition comprises:
determining an upper limit on the number of resource offerings third parties that the access portal can accommodate;
setting the access condition that the number of accesses does not exceed the determined upper limit of the number.
8. The method of claim 6, wherein setting the access condition comprises:
determining an open term of the access entry;
setting the access condition that the access time is within the determined open period.
9. The method of claim 1, wherein the method further comprises:
when the resource supply third party passes through the access entrance, determining the processing state of the resource allocation flow sheet;
and providing a mode responding to the resource allocation request according to the processing state of the resource allocation flow sheet so that a resource supply third party responds to the resource allocation request according to the mode.
10. The method of claim 9, wherein the method further comprises:
inquiring a resource allocation record of a resource allocation requester who provides the resource allocation request as a first resource allocation record;
inquiring a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
mapping words in the first resource allocation record and the second resource allocation record into space vectors;
calculating cosine similarity between space vectors corresponding to two words of a resource allocation requester and a resource supply third party;
and when the cosine similarity is not less than a preset value, sending push information according to the first resource allocation record and the second resource allocation record.
11. The method of claim 9, wherein the method further comprises:
querying a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
querying another resource allocation record of the resource supply third party responding to the resource allocation request as a third resource allocation record;
mapping words in the second resource allocation record and the third resource allocation record into space vectors;
calculating cosine similarity between space vectors corresponding to two words of one resource supply third party and the other resource supply third party;
and when the cosine similarity is not less than a preset value, sending push information according to the second resource allocation record and the third resource allocation record.
12. The method of any of claims 1-11, wherein the resource allocation flow sheet is a bill.
13. A resource processing apparatus, comprising:
the request module is used for generating a resource allocation flow sheet based on the resource allocation request;
the processing module is used for processing the resource allocation flow sheet and generating an access inlet of the resource allocation flow sheet;
and the issuing module is used for opening the access entrance so that a resource supply third party can respond to the resource allocation request through the access entrance.
14. The apparatus of claim 13, wherein the processing module is specifically configured to:
and coding the resource allocation flow sheet to generate a sharing code.
15. The apparatus of claim 14, wherein the apparatus further comprises an encryption module, specifically configured to:
and encrypting the resource allocation flow sheet to generate an encrypted resource allocation flow sheet.
16. The apparatus of claim 15, wherein the encryption module is further to:
and generating a single number of the encrypted resource allocation flow sheet.
17. The apparatus of claim 13, wherein the publishing module is to:
the open resource supplies the authority of a third party to access the access entrance;
and closing the right of the resource supply third party to open the access entrance.
18. The apparatus of claim 13, wherein the publishing module is to:
setting an access condition;
and when the access condition is met, opening the access entrance.
19. The apparatus of claim 18, wherein the publishing module is to:
determining an upper limit on the number of resource offerings third parties that the access portal can accommodate;
setting the access condition that the number of accesses does not exceed the determined upper limit of the number.
20. The apparatus of claim 18, wherein the publishing module is to:
determining an open term of the access entry;
setting the access condition that the access time is within the determined open period.
21. The apparatus of claim 13, further comprising a selection module specifically configured to:
when the resource supply third party passes through the access entrance, determining the processing state of the resource allocation flow sheet;
and providing a mode responding to the resource allocation request according to the processing state of the resource allocation flow sheet so that a resource supply third party responds to the resource allocation request according to the mode.
22. The apparatus of claim 21, wherein the apparatus further comprises a push module, specifically configured to:
inquiring a resource allocation record of a resource allocation requester who provides the resource allocation request as a first resource allocation record;
inquiring a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
mapping words in the first resource allocation record and the second resource allocation record into space vectors;
calculating cosine similarity between space vectors corresponding to two words of a resource allocation requester and a resource supply third party;
and when the cosine similarity is not less than a preset value, sending push information according to the first resource allocation record and the second resource allocation record.
23. The apparatus of claim 21, wherein the apparatus further comprises a push module, specifically configured to:
querying a resource allocation record of a resource supply third party responding to the resource allocation request as a second resource allocation record;
querying another resource allocation record of the resource supply third party responding to the resource allocation request as a third resource allocation record;
mapping words in the second resource allocation record and the third resource allocation record into space vectors;
calculating cosine similarity between space vectors corresponding to two words of one resource supply third party and the other resource supply third party;
and when the cosine similarity is not less than a preset value, sending push information according to the second resource allocation record and the third resource allocation record.
24. The apparatus of claims 13-23, wherein the resource allocation flow sheet is a bill.
HK18100880.3A 2018-01-22 Resource processing method and apparatus HK1241503B (en)

Publications (3)

Publication Number Publication Date
HK1241503A1 true HK1241503A1 (en) 2018-06-08
HK1241503A HK1241503A (en) 2018-06-08
HK1241503B HK1241503B (en) 2021-09-30

Family

ID=

Similar Documents

Publication Publication Date Title
US11726968B2 (en) Methods, apparatuses, and devices for transferring data assets based on blockchain
CN110457875B (en) Blockchain-based data authorization method and device
CN110473094B (en) Blockchain-based data authorization method and device
TWI701572B (en) Data access method, system and device
CN107038073B (en) Resource processing method and device
WO2021017433A1 (en) Data authorization method and device employing smart contract
CN110766550A (en) Asset query method and device based on block chain and electronic equipment
CN111475850A (en) Private data query method and device based on intelligent contract
CN111047321A (en) Service processing method and device, electronic equipment and storage medium
CN111767555A (en) Method for realizing privacy protection in block chain, node and storage medium
CN113221165B (en) User element authentication method and device based on block chain
CN111178840A (en) Service processing method, device, system, electronic equipment and storage medium
US20200118118A1 (en) Method and Apparatus for Processing Digital Asset Based on Blockchain
HK1241503A1 (en) Resource processing method and apparatus
HK1241503A (en) Resource processing method and apparatus
HK1241503B (en) Resource processing method and apparatus
HK40018147A (en) Data authorization method and device based on smart contract
Gupta et al. Genetic Algorithm for Load Balancing in Cloud Computing
HK40028440A (en) Service processing method and device, electronic equipment and storage medium
CN118194324A (en) Data protection method, device and medium for privacy calculation
CN119203199A (en) Data processing method, device, equipment and medium
CN117875859A (en) Block chain-based fund approval method and device, storage medium and electronic equipment
HK40018145B (en) Data authorization method and device based on block chain
HK40018145A (en) Data authorization method and device based on block chain
HK40018124B (en) Blockchain-based data authorization method and device