CN115378806A - Flow distribution method and device, computer equipment and storage medium - Google Patents
Flow distribution method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN115378806A CN115378806A CN202210989065.8A CN202210989065A CN115378806A CN 115378806 A CN115378806 A CN 115378806A CN 202210989065 A CN202210989065 A CN 202210989065A CN 115378806 A CN115378806 A CN 115378806A
- Authority
- CN
- China
- Prior art keywords
- flow distribution
- rule
- information
- traffic
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 238000012545 processing Methods 0.000 claims abstract description 50
- 238000012795 verification Methods 0.000 claims description 40
- 230000004048 modification Effects 0.000 claims description 23
- 238000012986 modification Methods 0.000 claims description 23
- 230000006399 behavior Effects 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 11
- 230000009286 beneficial effect Effects 0.000 abstract description 4
- 230000008569 process Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000013473 artificial intelligence Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 239000013598 vector Substances 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 230000002411 adverse Effects 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010606 normalization Methods 0.000 description 2
- 238000013468 resource allocation Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000003058 natural language processing Methods 0.000 description 1
- 210000001747 pupil Anatomy 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0879—Manual configuration through operator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the application belongs to the field of big data, and relates to a flow distribution method, which comprises the following steps: judging whether a flow distribution request input by a target user is received; if so, responding to the flow distribution request and displaying a preset rule configuration interface; receiving flow configuration information which is input by a target user and corresponds to each service scene; generating flow distribution rules respectively corresponding to each service scene based on the flow configuration information; and respectively carrying out one-to-one corresponding flow distribution processing on each service scene based on each flow distribution rule. The application also provides a flow distribution device, computer equipment and a storage medium. In addition, the application also relates to a block chain technology, and the traffic distribution rule can be stored in the block chain. The method and the device can realize intelligent distribution of the traffic resources of the service system according to actual service scene elements, improve the intelligence of processing the traffic distribution of the service system, ensure the rationality of the traffic resource distribution and are beneficial to improving the efficiency of the traffic distribution.
Description
Technical Field
The present application relates to the field of big data technologies, and in particular, to a method and an apparatus for allocating traffic, a computer device, and a storage medium.
Background
At present, a static allocation method is usually adopted for traffic allocation of a service system, and specifically, traffic resources are allocated and scheduled to the service system manually in real time according to performance data of each server in the service system. However, the static equilibrium allocation method depends on human experience, and has strong subjectivity, and has the problems of low resource scheduling efficiency and unreasonable resource allocation.
Disclosure of Invention
An object of the embodiments of the present application is to provide a traffic allocation method, an apparatus, a computer device, and a storage medium, so as to solve the technical problems of low resource scheduling efficiency and unreasonable resource allocation in the traffic allocation manner of the existing service system.
In order to solve the above technical problem, an embodiment of the present application provides a traffic distribution method, which adopts the following technical solutions:
judging whether a flow distribution request input by a target user is received;
if so, responding to the flow distribution request and displaying a preset rule configuration interface;
receiving flow configuration information corresponding to each service scene, which is input by the target user;
generating flow distribution rules respectively corresponding to the service scenes on the basis of the flow configuration information;
and respectively carrying out one-to-one corresponding flow distribution processing on each service scene based on each flow distribution rule.
Further, the step of performing one-to-one traffic allocation processing on each service scenario based on each traffic allocation rule specifically includes:
acquiring link information respectively corresponding to each service scene based on the flow distribution rule;
determining a designated link for flow distribution corresponding to a designated service scene and a weight corresponding to the designated link based on the link information; the appointed service scene is any one scene in all the service scenes;
and carrying out flow distribution processing on the specified scene based on the specified link and the weight of the specified link.
Further, the step of responding to the traffic distribution request and displaying a preset rule configuration interface, where the traffic distribution request carries user information of a target user, specifically includes:
analyzing the user information from the flow distribution request;
performing authority verification on the target user based on the user information and a preset authority score table;
if the authority passes the verification, performing identity verification on the target user based on the user information and a preset image database;
and if the identity authentication is passed, executing the step of responding to the flow distribution request and displaying a preset rule configuration page.
Further, the step of performing permission verification on the target user based on the user information and a preset permission score table specifically includes:
calling the authority score table, and judging whether first user information which is the same as the user information exists in the authority score table or not;
if first user information identical to the user information exists, inquiring a target authority score corresponding to the first user information from the authority score table;
acquiring an authority score interval corresponding to the rule configuration operation of flow distribution;
judging whether the target authority score is within the authority score interval or not;
if the authority score is within the authority score interval, judging that the authority verification is passed;
and if the authority score is not in the authority score interval, judging that the authority verification is not passed.
Further, the step of performing identity verification on the target user based on the user information and a preset image database specifically includes:
calling the image database, and judging whether second user information identical to the user information exists in the image database;
if second user information same as the user information exists, a standard face image corresponding to the second user information is obtained from the image database, and face information of the target user is obtained;
calculating first similarity between first interpupillary distance information contained in the face information and second interpupillary distance information contained in the standard face image; and the number of the first and second groups,
calculating a second similarity between first face information contained in the face information and second face information contained in the standard face image;
judging whether the first similarity is greater than a preset first similarity threshold value or not, and whether the second similarity is greater than a preset second similarity threshold value or not;
and if the first similarity is greater than the first similarity threshold and the second similarity is greater than the second similarity threshold, judging that the identity authentication is passed, otherwise, judging that the identity authentication is not passed.
Further, after the step of performing one-to-one traffic allocation processing on each service scenario based on each traffic allocation rule, the method further includes:
for each service scene, counting the number of received requests sent by specified users for accessing a target service scene; the target service scene is any one of all the service scenes;
judging whether the request quantity is greater than a preset quantity threshold value or not;
if so, acquiring the appointed user information of the appointed user;
and based on the specified user information, performing restriction processing on the request behavior of the specified user.
Further, after the step of generating traffic distribution rules corresponding to the respective service scenarios based on the traffic configuration information, the method further includes:
judging whether a modification request for a specified flow distribution rule sent by the target user is received; wherein, the specified flow distribution rule is any one of all the flow distribution rules;
if so, responding to the rule modification request and displaying a preset rule editing interface;
receiving modification information input by the target user in the rule editing interface;
modifying the specified flow distribution rule based on the modification information to obtain a modified specified flow distribution rule;
and storing the modified specified flow distribution rule and deleting the specified flow distribution rule.
In order to solve the above technical problem, an embodiment of the present application further provides a flow distribution device, which adopts the following technical solutions:
the first judgment module is used for judging whether a flow distribution request input by a target user is received or not;
the first display module is used for responding to the flow distribution request and displaying a preset rule configuration interface if the flow distribution request is received;
the first receiving module is used for receiving the traffic configuration information which is input by the target user and corresponds to each service scene;
a generating module, configured to generate traffic distribution rules corresponding to the service scenarios, respectively, based on the traffic configuration information;
and the processing module is used for respectively carrying out one-to-one corresponding flow distribution processing on each service scene based on each flow distribution rule.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, which adopts the following technical solutions:
judging whether a flow distribution request input by a target user is received or not;
if so, responding to the flow distribution request and displaying a preset rule configuration interface;
receiving flow configuration information corresponding to each service scene, which is input by the target user;
generating flow distribution rules respectively corresponding to the service scenes based on the flow configuration information;
and respectively carrying out one-to-one corresponding flow distribution processing on each service scene based on each flow distribution rule.
In order to solve the foregoing technical problem, an embodiment of the present application further provides a computer-readable storage medium, which adopts the following technical solutions:
judging whether a flow distribution request input by a target user is received;
if so, responding to the flow distribution request and displaying a preset rule configuration interface;
receiving flow configuration information corresponding to each service scene, which is input by the target user;
generating flow distribution rules respectively corresponding to the service scenes based on the flow configuration information;
and respectively carrying out one-to-one corresponding flow distribution processing on each service scene based on each flow distribution rule.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects:
according to the method and the device, after a flow distribution request input by a target user is received, a preset rule configuration interface is displayed firstly, then flow configuration information which is input by the target user and corresponds to each service scene is received, then flow distribution rules which correspond to each service scene are generated based on the flow configuration information, and finally flow distribution processing which corresponds to each service scene one by one is carried out based on each flow distribution rule. According to the method and the device, the flow distribution rules corresponding to the service scenes respectively are generated based on the flow configuration information input by the user, and then the flow distribution processing corresponding to the service scenes one by one is carried out based on the flow distribution rules respectively, so that the flow resources of the service system are intelligently distributed according to actual service scene elements, the processing intelligence of the flow distribution of the service system is improved, the reasonability of the flow resource distribution is ensured, the efficiency of the flow distribution is improved, and the use experience of the user is improved.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the description below are some embodiments of the present application, and that other drawings may be obtained by those skilled in the art without inventive effort.
FIG. 1 is an exemplary system architecture diagram to which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a traffic distribution method according to the present application;
FIG. 3 is a schematic block diagram of one embodiment of a flow distribution apparatus according to the present application;
FIG. 4 is a schematic block diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the traffic distribution method provided in the embodiments of the present application is generally executed by a server/terminal device, and accordingly, the traffic distribution apparatus is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow diagram of one embodiment of a traffic distribution method according to the present application is shown. The flow distribution method comprises the following steps:
step S201, determining whether a traffic allocation request input by a target user is received.
In this embodiment, an electronic device (for example, the server/terminal device shown in fig. 1) on which the traffic distribution method operates may receive a traffic distribution request input by a target user through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G/5G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, an UWB (ultra wideband) connection, and other wireless connection means now known or developed in the future. The target user can send out a flow distribution request through the held client. The traffic allocation request is a request for configuring a traffic allocation rule to allocate traffic to a service system.
Step S202, if yes, responding to the flow distribution request and displaying a preset rule configuration interface.
In this embodiment, the rule configuration interface at least includes a rule name, link information, and a weight reference value selection list corresponding to the link information.
Step S203, receiving traffic configuration information corresponding to each service scenario, which is entered by the target user.
In this embodiment, the target user may populate the rule name based on the actual service requirement information and filter out the required information from the weight reference value selection list to complete the entry of the traffic configuration information.
Step S204, generating traffic distribution rules respectively corresponding to the service scenarios based on the traffic configuration information.
In this embodiment, after obtaining the traffic configuration information, the rule engine may be invoked to generate traffic distribution rules respectively corresponding to each service scenario based on the traffic configuration information. The rule engine based management control method can realize finer-grained management control on flow distribution, can specify different flow distribution rules for different service scenes in the service system, and improves the management intelligence on the flow distribution of the service system.
Step S205, based on each traffic distribution rule, respectively perform one-to-one traffic distribution processing on each service scenario.
In this embodiment, the specific implementation process of performing one-to-one corresponding traffic allocation processing on each service scenario based on each traffic allocation rule is described in further detail in the following specific embodiments, and will not be described in detail herein.
After receiving a flow distribution request input by a target user, the method and the device display a preset rule configuration interface, then receive flow configuration information which is input by the target user and corresponds to each service scene, then generate flow distribution rules which correspond to each service scene respectively based on the flow configuration information, and finally perform one-to-one flow distribution processing on each service scene respectively based on each flow distribution rule. According to the method and the device, the flow distribution rules respectively corresponding to the service scenes are generated based on the flow configuration information input by the user, and then the flow distribution processing corresponding to the service scenes one to one is respectively carried out based on the flow distribution rules, so that the flow resources of the service system are intelligently distributed according to actual service scene elements, the processing intelligence of the flow distribution of the service system is improved, the reasonability of the flow resource distribution is ensured, the efficiency of the flow distribution is improved, and the use experience of the user is improved.
In some optional implementations, step S205 includes the following steps:
and acquiring link information respectively corresponding to each service scene based on the flow distribution rule.
In this embodiment, a one-to-one correspondence relationship exists between the traffic scenarios and the traffic distribution rules, one traffic scenario corresponds to one traffic distribution rule, and link information of the corresponding traffic scenario is defined in the traffic distribution rule.
Determining a designated link for flow distribution corresponding to a designated service scene and a weight corresponding to the designated link based on the link information; wherein the specified service scenario is any one of all the service scenarios.
In this embodiment, the link information in the traffic distribution rule includes a link for traffic distribution corresponding to a corresponding service scenario defined in advance according to an actual usage requirement, and a weight corresponding to the link for traffic distribution. Wherein, the weight corresponding to the link for traffic distribution can be determined based on a random number weighting algorithm.
And carrying out flow distribution processing on the specified scene based on the specified link and the weight of the specified link.
After the traffic distribution rules corresponding to the service scenes are generated, the link information corresponding to the service scenes can be obtained based on the traffic distribution rules, then the appointed links corresponding to the appointed service scenes and used for traffic distribution and the weights corresponding to the appointed links are determined based on the link information, and then traffic distribution processing is carried out on the appointed scenes based on the weights of the appointed links and the appointed links, so that traffic resources of the service system can be intelligently distributed according to actual service scene elements, the processing intelligence of traffic distribution of the service system is improved, and the use experience of users is improved.
In some optional implementation manners of this embodiment, the traffic allocation request carries user information of a target user, and step S202 includes the following steps:
and analyzing the user information from the flow distribution request.
In the present embodiment, the user information may include user name information or user ID information.
And performing authority verification on the target user based on the user information and a preset authority point table.
In this embodiment, the above-mentioned specific implementation process of performing the authority verification on the target user based on the user information and the preset authority score table will be described in further detail in the following specific embodiments, and will not be described in detail herein.
And if the authority passes the verification, performing identity verification on the target user based on the user information and a preset image database.
In this embodiment, the specific implementation process of performing identity authentication on the target user based on the user information and the preset image database is described in further detail in the following specific embodiments, and will not be described in detail herein.
And if the identity authentication is passed, executing the step of responding to the flow distribution request and displaying a preset rule configuration page.
According to the method and the device, after the flow distribution request input by the target user is received, the authority verification is firstly carried out on the target user, the identity verification is carried out on the target user after the authority verification is passed, the flow distribution request can be subsequently responded only when the authority verification and the identity verification of the target user are passed, and the preset rule configuration page is displayed so as to execute the subsequent processing flow, so that the adverse effect caused by responding to the flow distribution request input by an illegal user can be effectively avoided, and the safety and the normalization in the request processing process are effectively ensured. In addition, the target user is simply subjected to authority verification, and if the target user does not pass the authority verification, the flow distribution request is directly limited to be responded subsequently, so that the user does not need to be subjected to identity verification processing, and the processing intelligence of the flow distribution request is improved.
In some optional implementation manners, the performing permission verification on the target user based on the user information and a preset permission score table includes the following steps:
and calling the authority point list, and judging whether first user information identical to the user information exists in the authority point list.
In this embodiment, the authority score table is a pre-created data table in which user information of each employee and authority scores corresponding to the user information are recorded.
And if first user information identical to the user information exists, inquiring a target authority score corresponding to the first user information from the authority score table.
And acquiring an authority score interval corresponding to the rule configuration operation of the flow distribution.
In this embodiment, the authority score interval corresponding to the rule configuration operation of traffic distribution may be queried from a preset operation authority score table. The operation permission score table is a data table which is created in advance and records various service operations and permission score intervals corresponding to the service operations one by one.
And judging whether the target authority score is in the authority score interval.
And if the authority score is within the authority score interval, judging that the authority verification is passed.
And if the authority score is not in the authority score interval, judging that the authority verification is not passed.
According to the method and the device, the target authority score of the target user is obtained by inquiring the authority score table, and after the authority score interval corresponding to the rule configuration operation of flow distribution is inquired in the operation authority score table, whether the target authority score is in the authority score interval or not is judged, whether the target user has the authority of the rule configuration of the flow distribution or not can be judged intelligently and quickly, so that the condition that the rule of the flow distribution is configured for the user without the authority is provided can be effectively avoided, and the configuration safety of the flow distribution rule is guaranteed.
In some optional implementation manners, the performing identity verification on the target user based on the user information and a preset image database includes the following steps:
and calling the image database, and judging whether second user information identical to the user information exists in the image database.
In this embodiment, the image database is a database created in advance and recording user information of each employee and face images corresponding to the user information one to one.
And if second user information identical to the user information exists, acquiring a standard face image corresponding to the second user information from the image database, and acquiring the face information of the target user.
In this embodiment, the face information of the target user may be acquired by a camera of the electronic device.
And calculating first similarity between first interpupillary distance information contained in the face information and second interpupillary distance information contained in the standard face image. And (c) a second step of,
and calculating a second similarity between the first face information contained in the face information and the second face information contained in the standard face image.
In this embodiment, the calculation manner of the first similarity and the second similarity is not specifically limited, and may be set according to actual use requirements, for example, euclidean distance, manhattan distance, cosine similarity, and the like are adopted.
And judging whether the first similarity is greater than a preset first similarity threshold value or not, and whether the second similarity is greater than a preset second similarity threshold value or not.
In this embodiment, specific values of the first similarity threshold and the second similarity threshold are not specifically limited, and may be set according to actual use requirements.
And if the first similarity is greater than the first similarity threshold and the second similarity is greater than the second similarity threshold, judging that the identity authentication is passed, otherwise, judging that the identity authentication is not passed.
According to the method and the device, accurate identity verification processing for the target user is achieved by adopting a multiple identity verification mode corresponding to user information matching, pupil distance information comparison and face shape information comparison in the face image, accuracy and reliability of identity verification are improved, adverse consequences caused by response of a flow distribution request input by an illegal user are effectively avoided, and safety and normalization in a flow distribution request processing process are effectively guaranteed.
In some optional implementation manners of this embodiment, after step S205, the electronic device may further perform the following steps:
for each service scene, counting the number of received requests for accessing a target service scene, which are sent by a specified user; the target service scene is any one of all the service scenes.
In this embodiment, the manner of counting the number of received requests for accessing a target service scenario sent by a specific user may include: and detecting the URL times of accessing the target service scene by the user identification corresponding to the specified user within a preset time period, wherein the URL times are the request quantity. The preset time period is not particularly limited, and the preset time period is the current time period, and may be, for example, within 5 minutes of the current time period.
And judging whether the request quantity is greater than a preset quantity threshold value.
In this embodiment, the value of the preset number threshold is not specifically limited, and may be set according to actual use requirements. If the number of the requests is larger than the preset number threshold, the abnormal users who perform excessive business operation behaviors in a certain time period are indicated to occur, for example, the specified users have malicious list swiping behaviors for the target business scene.
And if so, acquiring the appointed user information of the appointed user.
In this embodiment, the request sent by the user includes a user identifier, where the user identifier includes, but is not limited to, account information of the user, an IP address of the user equipment, and the like.
And based on the specified user information, performing restriction processing on the request behavior of the specified user.
In this embodiment, the limiting the request behavior of the specified user may refer to limiting the user equipment corresponding to the specified user information, so as to suspend interrupting the service flow of the target service scenario sent by the user equipment.
According to the method and the device, the received request quantity sent by the designated user for accessing the target service scene is counted, and if the request quantity is detected to be larger than the preset quantity threshold value, the request behavior of the designated user can be intelligently limited on the basis of the designated user information of the designated user, so that the operation behavior of the designated user under the target service scene is limited, the problem that the sales volume under some service scenes is influenced due to malicious bill swiping can be effectively relieved, the economic loss of an operator is reduced, and the operation cost of the operator is reduced.
In some optional implementation manners of this embodiment, after step S204, the electronic device may further perform the following steps:
judging whether a modification request for a specified flow distribution rule sent by the target user is received; wherein the specified traffic distribution rule is any one of all the traffic distribution rules.
In this embodiment, the modification request may carry identification information specifying a traffic distribution rule.
And if so, responding to the rule modification request and displaying a preset rule editing interface.
In this embodiment, the rule editing interface is a rule editing interface corresponding to the specified traffic distribution rule.
And receiving modification information input by the target user in the rule editing interface.
And modifying the specified flow distribution rule based on the modification information to obtain the modified specified flow distribution rule.
In this embodiment, after receiving modification information input by the target user on the rule editing interface, the rule engine may be invoked to modify the specified traffic distribution rule based on the obtained modification information, so as to obtain the modified specified traffic distribution rule.
And storing the modified specified flow distribution rule, and deleting the specified flow distribution rule.
After the configuration of the flow distribution rule is completed, the target user can also directly modify the flow distribution rule by using the rule engine to regenerate the required correct flow distribution rule, and the modification mode does not need the change and the version of background code logic, so that the intelligence and the convenience of rule configuration are effectively improved, the development work of developers is greatly reduced, and the use physical examination of the target user is improved.
It is emphasized that the traffic distribution rules may also be stored in a node of a blockchain in order to further ensure privacy and security of the traffic distribution rules.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with computer readable instructions, which can be stored in a computer readable storage medium, and when executed, the processes of the embodiments of the methods described above can be included. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a traffic distribution apparatus, which corresponds to the embodiment of the method shown in fig. 2, and which can be applied to various electronic devices.
As shown in fig. 3, the flow distribution device 300 according to the present embodiment includes: a first determining module 301, a first receiving module 303, a generating module 304, and a processing module 305. Wherein:
a first determining module 301, configured to determine whether a traffic allocation request input by a target user is received;
a first display module 302, configured to respond to the traffic allocation request and display a preset rule configuration interface if the traffic allocation request is positive;
a first receiving module 303, configured to receive traffic configuration information corresponding to each service scenario, which is input by the target user;
a generating module 304, configured to generate traffic distribution rules corresponding to the service scenarios, respectively, based on the traffic configuration information;
the processing module 305 is configured to perform one-to-one traffic allocation processing on each service scenario based on each traffic allocation rule.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the traffic distribution method in the foregoing embodiment one to one, and are not described herein again.
In some optional implementations of this embodiment, the processing module 305 includes:
the generating submodule is used for generating a first similarity between each image in the vector library and the image to be checked on the basis of Euclidean distances between the image in the vector library and the respectively corresponding feature vectors of the image to be checked and repeated through the vector similarity search engine;
the obtaining sub-module is used for obtaining link information respectively corresponding to each service scene based on the flow distribution rule;
the determining submodule is used for determining a specified link which is corresponding to a specified service scene and used for flow distribution and a weight corresponding to the specified link based on the link information; the appointed service scene is any one scene in all the service scenes;
and the distribution submodule is used for carrying out flow distribution processing on the specified scene based on the specified link and the weight of the specified link.
In this embodiment, the operations that the modules or units are respectively configured to execute correspond to the steps of the traffic distribution method in the foregoing embodiment one to one, and are not described herein again.
In some optional implementation manners of this embodiment, the traffic allocation request carries user information of a target user, and the first display module 302 includes:
the analysis submodule is used for analyzing the user information from the flow distribution request;
the first verification submodule is used for performing authority verification on the target user based on the user information and a preset authority score table;
the second verification submodule is used for verifying the identity of the target user based on the user information and a preset image database if the authority verification is passed;
and the execution sub-module is used for executing the steps of responding to the flow distribution request and displaying a preset rule configuration page if the identity authentication passes.
In this embodiment, the operations that the modules or units are respectively configured to execute correspond to the steps of the traffic distribution method in the foregoing embodiment one to one, and are not described herein again.
In some optional implementations of this embodiment, the first verification sub-module includes:
the first judgment unit is used for calling the authority point table and judging whether first user information identical to the user information exists in the authority point table or not;
the query unit is used for querying a target authority score corresponding to the first user information from the authority score table if the first user information identical to the user information exists;
the first acquisition unit is used for acquiring an authority score interval corresponding to the rule configuration operation of flow distribution;
the second judging unit is used for judging whether the target authority score is in the authority score interval or not;
the first judgment unit is used for judging that the authority verification is passed if the authority score is within the authority score interval;
and the second judgment unit is used for judging that the authority verification is not passed if the authority score is not in the authority score interval.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the traffic distribution method in the foregoing embodiment one to one, and are not described herein again.
In some optional implementations of this embodiment, the second verification sub-module includes:
the third judging unit is used for calling the image database and judging whether second user information identical to the user information exists in the image database or not;
the second obtaining unit is used for obtaining a standard face image corresponding to the second user information from the image database and obtaining the face information of the target user if the second user information identical to the user information exists;
a first calculating unit, configured to calculate a first similarity between first interpupillary distance information included in the face information and second interpupillary distance information included in the standard face image; and the number of the first and second groups,
a second calculation unit configured to calculate a second similarity between first face information included in the face information and second face information included in the standard face image;
a fourth determining unit, configured to determine whether the first similarity is greater than a preset first similarity threshold, and whether the second similarity is greater than a preset second similarity threshold;
and the third judging unit is used for judging that the identity authentication is passed if the first similarity is greater than the first similarity threshold and the second similarity is greater than the second similarity threshold, and otherwise, judging that the identity authentication is not passed.
In this embodiment, the operations that the modules or units are respectively configured to execute correspond to the steps of the traffic distribution method in the foregoing embodiment one to one, and are not described herein again.
In some optional implementations of this embodiment, the flow distribution apparatus further includes:
the statistical module is used for counting the number of received requests for accessing a target service scene, which are sent by a specified user, for each service scene; the target service scene is any one of all the service scenes;
the second judgment module is used for judging whether the request quantity is greater than a preset quantity threshold value;
the acquisition module is used for acquiring the appointed user information of the appointed user if the appointed user information is acquired;
and the limiting module is used for limiting the request behavior of the specified user based on the specified user information.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the traffic distribution method in the foregoing embodiment one to one, and are not described herein again.
In some optional implementations of this embodiment, the flow distribution apparatus further includes:
the third judging module is used for judging whether a modification request for a specified flow distribution rule sent by the target user is received; the specified flow distribution rule is any one of all the flow distribution rules;
the second display module is used for responding to the rule modification request and displaying a preset rule editing interface if the rule modification request is received;
the second receiving module is used for receiving modification information input by the target user in the rule editing interface;
the modification module is used for modifying the specified flow distribution rule based on the modification information to obtain the modified specified flow distribution rule;
and the storage module is used for storing the modified specified flow distribution rule and deleting the specified flow distribution rule.
In this embodiment, the operations that the modules or units are respectively configured to execute correspond to the steps of the traffic distribution method in the foregoing embodiment one to one, and are not described herein again.
In order to solve the technical problem, the embodiment of the application further provides computer equipment. Referring to fig. 4 in particular, fig. 4 is a block diagram of a basic structure of a computer device according to the embodiment.
The computer device 4 comprises a memory 41, a processor 42, a network interface 43 communicatively connected to each other via a system bus. It is noted that only computer device 4 having components 41-43 is shown, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including flash memory, hard disks, multimedia cards, card-type memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disks, optical disks, etc. In some embodiments, the memory 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the computer device 4. Of course, the memory 41 may also include both internal and external storage devices of the computer device 4. In this embodiment, the memory 41 is generally used for storing an operating system installed in the computer device 4 and various types of application software, such as computer readable instructions of a flow distribution method. Further, the memory 41 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute computer readable instructions stored in the memory 41 or process data, such as computer readable instructions for executing the flow allocation method.
The network interface 43 may comprise a wireless network interface or a wired network interface, and the network interface 43 is generally used for establishing communication connection between the computer device 4 and other electronic devices.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects:
in the embodiment of the application, after a flow distribution request input by a target user is received, a preset rule configuration interface is displayed, flow configuration information corresponding to each service scene and input by the target user is received, flow distribution rules corresponding to each service scene are generated based on the flow configuration information, and finally, flow distribution processing corresponding to each service scene one to one is performed based on each flow distribution rule. According to the method and the device, the flow distribution rules corresponding to the service scenes respectively are generated based on the flow configuration information input by the user, and then the flow distribution processing corresponding to the service scenes one by one is carried out based on the flow distribution rules respectively, so that the flow resources of the service system are intelligently distributed according to actual service scene elements, the processing intelligence of the flow distribution of the service system is improved, the reasonability of the flow resource distribution is ensured, the efficiency of the flow distribution is improved, and the use experience of the user is improved.
The present application further provides another embodiment, which is to provide a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of the traffic distribution method as described above.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects:
in the embodiment of the application, after a flow distribution request input by a target user is received, a preset rule configuration interface is displayed, flow configuration information corresponding to each service scene and input by the target user is received, flow distribution rules corresponding to each service scene are generated based on the flow configuration information, and finally, flow distribution processing corresponding to each service scene one to one is performed based on each flow distribution rule. According to the method and the device, the flow distribution rules corresponding to the service scenes respectively are generated based on the flow configuration information input by the user, and then the flow distribution processing corresponding to the service scenes one by one is carried out based on the flow distribution rules respectively, so that the flow resources of the service system are intelligently distributed according to actual service scene elements, the processing intelligence of the flow distribution of the service system is improved, the reasonability of the flow resource distribution is ensured, the efficiency of the flow distribution is improved, and the use experience of the user is improved.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk), and includes several instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields, and all the equivalent structures are within the protection scope of the present application.
Claims (10)
1. A method of flow distribution, comprising the steps of:
judging whether a flow distribution request input by a target user is received;
if so, responding to the flow distribution request and displaying a preset rule configuration interface;
receiving flow configuration information corresponding to each service scene, which is input by the target user;
generating flow distribution rules respectively corresponding to the service scenes based on the flow configuration information;
and respectively carrying out one-to-one corresponding flow distribution processing on each service scene based on each flow distribution rule.
2. The traffic distribution method according to claim 1, wherein the step of performing, on the basis of each traffic distribution rule, one-to-one traffic distribution processing on each service scenario specifically includes:
acquiring link information respectively corresponding to each service scene based on the flow distribution rule;
determining a designated link for flow distribution corresponding to a designated service scene and a weight corresponding to the designated link based on the link information; the specified service scene is any one of all the service scenes;
and carrying out flow distribution processing on the specified scene based on the specified link and the weight of the specified link.
3. The traffic distribution method according to claim 1, wherein the traffic distribution request carries user information of a target user, and the step of displaying a preset rule configuration interface in response to the traffic distribution request specifically includes:
analyzing the user information from the flow distribution request;
performing authority verification on the target user based on the user information and a preset authority score table;
if the authority passes the verification, performing identity verification on the target user based on the user information and a preset image database;
and if the identity authentication is passed, executing the step of responding to the flow distribution request and displaying a preset rule configuration page.
4. The traffic distribution method according to claim 3, wherein the step of performing permission verification on the target user based on the user information and a preset permission score table specifically comprises:
calling the authority point list, and judging whether first user information identical to the user information exists in the authority point list or not;
if first user information identical to the user information exists, inquiring a target authority score corresponding to the first user information from the authority score table;
acquiring an authority score interval corresponding to the rule configuration operation of flow distribution;
judging whether the target authority score is in the authority score interval or not;
if the authority score is within the authority score interval, judging that the authority verification is passed;
and if the authority score is not in the authority score interval, judging that the authority verification is not passed.
5. The traffic distribution method according to claim 3, wherein the step of authenticating the target user based on the user information and a preset image database specifically comprises:
calling the image database, and judging whether second user information identical to the user information exists in the image database;
if second user information identical to the user information exists, a standard face image corresponding to the second user information is obtained from the image database, and the face information of the target user is obtained;
calculating first similarity between first interpupillary distance information contained in the face information and second interpupillary distance information contained in the standard face image; and the number of the first and second groups,
calculating a second similarity between first face information contained in the face information and second face information contained in the standard face image;
judging whether the first similarity is greater than a preset first similarity threshold value or not, and whether the second similarity is greater than a preset second similarity threshold value or not;
and if the first similarity is greater than the first similarity threshold and the second similarity is greater than the second similarity threshold, judging that the identity authentication is passed, otherwise, judging that the identity authentication is not passed.
6. The traffic distribution method according to claim 1, wherein after the step of performing one-to-one traffic distribution processing on each service scenario based on each traffic distribution rule, the method further comprises:
for each service scene, counting the number of received requests for accessing a target service scene, which are sent by a specified user; the target service scene is any one scene in all the service scenes;
judging whether the request quantity is greater than a preset quantity threshold value or not;
if yes, acquiring appointed user information of the appointed user;
and based on the specified user information, limiting the request behavior of the specified user.
7. The traffic distribution method according to claim 1, further comprising, after the step of generating traffic distribution rules corresponding to the respective service scenarios based on the traffic configuration information:
judging whether a modification request for a specified flow distribution rule sent by the target user is received; wherein, the specified flow distribution rule is any one of all the flow distribution rules;
if so, responding to the rule modification request and displaying a preset rule editing interface;
receiving modification information input by the target user in the rule editing interface;
modifying the specified flow distribution rule based on the modification information to obtain a modified specified flow distribution rule;
and storing the modified specified flow distribution rule, and deleting the specified flow distribution rule.
8. A flow distribution device, comprising:
the first judgment module is used for judging whether a flow distribution request input by a target user is received or not;
the first display module is used for responding to the flow distribution request and displaying a preset rule configuration interface if the flow distribution request is received;
the first receiving module is used for receiving the traffic configuration information which is input by the target user and corresponds to each service scene;
a generating module, configured to generate traffic distribution rules corresponding to the service scenarios, respectively, based on the traffic configuration information;
and the processing module is used for respectively carrying out one-to-one corresponding flow distribution processing on each service scene based on each flow distribution rule.
9. A computer device comprising a memory having computer readable instructions stored therein and a processor which when executed implements the steps of the flow allocation method of any one of claims 1 to 7.
10. A computer readable storage medium having computer readable instructions stored thereon which, when executed by a processor, implement the steps of the traffic distribution method of any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210989065.8A CN115378806A (en) | 2022-08-17 | 2022-08-17 | Flow distribution method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210989065.8A CN115378806A (en) | 2022-08-17 | 2022-08-17 | Flow distribution method and device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115378806A true CN115378806A (en) | 2022-11-22 |
Family
ID=84064879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210989065.8A Pending CN115378806A (en) | 2022-08-17 | 2022-08-17 | Flow distribution method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115378806A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116962298A (en) * | 2023-09-19 | 2023-10-27 | 阿里健康科技(中国)有限公司 | Access flow distribution method, device, equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594675A (en) * | 2012-02-10 | 2012-07-18 | 北京星网锐捷网络技术有限公司 | Traffic control system and method |
CN108112038A (en) * | 2016-11-24 | 2018-06-01 | 苏宁云商集团股份有限公司 | A kind of method and device for controlling flowing of access |
US20200112483A1 (en) * | 2018-10-04 | 2020-04-09 | Sandvine Corporation | System and method for intent based traffic management |
CN111652685A (en) * | 2020-06-05 | 2020-09-11 | 腾讯科技(深圳)有限公司 | Information processing method, information processing device, computer equipment and computer readable storage medium |
WO2020181821A1 (en) * | 2019-03-13 | 2020-09-17 | 平安科技(深圳)有限公司 | Traffic source ratio adjusting method and apparatus, computer device, and storage medium |
CN113326081A (en) * | 2021-06-30 | 2021-08-31 | 中国平安人寿保险股份有限公司 | Static resource processing method and device, computer equipment and storage medium |
CN113742776A (en) * | 2021-09-08 | 2021-12-03 | 未鲲(上海)科技服务有限公司 | Data verification method and device based on biological recognition technology and computer equipment |
CN114638630A (en) * | 2020-12-15 | 2022-06-17 | 北京小度互娱科技有限公司 | Flow management rule engine and information delivery method and device |
CN114745606A (en) * | 2022-02-23 | 2022-07-12 | 江苏苏云信息科技有限公司 | Flexible industrial data acquisition system and method based on rule scheduling |
-
2022
- 2022-08-17 CN CN202210989065.8A patent/CN115378806A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594675A (en) * | 2012-02-10 | 2012-07-18 | 北京星网锐捷网络技术有限公司 | Traffic control system and method |
CN108112038A (en) * | 2016-11-24 | 2018-06-01 | 苏宁云商集团股份有限公司 | A kind of method and device for controlling flowing of access |
US20200112483A1 (en) * | 2018-10-04 | 2020-04-09 | Sandvine Corporation | System and method for intent based traffic management |
WO2020181821A1 (en) * | 2019-03-13 | 2020-09-17 | 平安科技(深圳)有限公司 | Traffic source ratio adjusting method and apparatus, computer device, and storage medium |
CN111652685A (en) * | 2020-06-05 | 2020-09-11 | 腾讯科技(深圳)有限公司 | Information processing method, information processing device, computer equipment and computer readable storage medium |
CN114638630A (en) * | 2020-12-15 | 2022-06-17 | 北京小度互娱科技有限公司 | Flow management rule engine and information delivery method and device |
CN113326081A (en) * | 2021-06-30 | 2021-08-31 | 中国平安人寿保险股份有限公司 | Static resource processing method and device, computer equipment and storage medium |
CN113742776A (en) * | 2021-09-08 | 2021-12-03 | 未鲲(上海)科技服务有限公司 | Data verification method and device based on biological recognition technology and computer equipment |
CN114745606A (en) * | 2022-02-23 | 2022-07-12 | 江苏苏云信息科技有限公司 | Flexible industrial data acquisition system and method based on rule scheduling |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116962298A (en) * | 2023-09-19 | 2023-10-27 | 阿里健康科技(中国)有限公司 | Access flow distribution method, device, equipment and storage medium |
CN116962298B (en) * | 2023-09-19 | 2023-12-08 | 阿里健康科技(中国)有限公司 | Access flow distribution method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113326991B (en) | Automatic authorization method, device, computer equipment and storage medium | |
CN109710402A (en) | Method, apparatus, computer equipment and the storage medium of process resource acquisition request | |
CN112395390B (en) | Training corpus generation method of intention recognition model and related equipment thereof | |
CN112328486A (en) | Interface automation test method and device, computer equipment and storage medium | |
CN111639360A (en) | Intelligent data desensitization method and device, computer equipment and storage medium | |
CN114996675A (en) | Data query method and device, computer equipment and storage medium | |
CN115378806A (en) | Flow distribution method and device, computer equipment and storage medium | |
CN112507141B (en) | Investigation task generation method, investigation task generation device, computer equipment and storage medium | |
CN116956326A (en) | Authority data processing method and device, computer equipment and storage medium | |
CN117094729A (en) | Request processing method, device, computer equipment and storage medium | |
CN117252362A (en) | Scheduling method and device based on artificial intelligence, computer equipment and storage medium | |
CN116681045A (en) | Report generation method, report generation device, computer equipment and storage medium | |
CN115292580A (en) | Data query method and device, computer equipment and storage medium | |
CN112085469B (en) | Data approval method, device, equipment and storage medium based on vector machine model | |
CN114221964A (en) | Access request processing method and device, computer equipment and storage medium | |
CN111353768A (en) | Book borrowing supervision method, device, equipment and storage medium | |
CN115239185A (en) | Service provider distribution method, service provider distribution device, computer equipment and storage medium | |
CN117094827A (en) | Data generation method, device, computer equipment and storage medium | |
CN115080045A (en) | Link generation method and device, computer equipment and storage medium | |
CN117853241A (en) | Risk service provider identification method, apparatus, device and storage medium thereof | |
CN117034173A (en) | Data processing method, device, computer equipment and storage medium | |
CN117422523A (en) | Product online method and device, computer equipment and storage medium | |
CN117726457A (en) | Risk prediction method, device, equipment and storage medium based on artificial intelligence | |
CN117395310A (en) | Task processing method, device, computer equipment and storage medium | |
CN116737437A (en) | Data analysis method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20221122 |