Movatterモバイル変換


[0]ホーム

URL:


CN110610376A - Behavior data response method and device, computer equipment and storage medium - Google Patents

Behavior data response method and device, computer equipment and storage medium
Download PDF

Info

Publication number
CN110610376A
CN110610376ACN201910707399.XACN201910707399ACN110610376ACN 110610376 ACN110610376 ACN 110610376ACN 201910707399 ACN201910707399 ACN 201910707399ACN 110610376 ACN110610376 ACN 110610376A
Authority
CN
China
Prior art keywords
user
target
logic
users
behavior data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910707399.XA
Other languages
Chinese (zh)
Inventor
陈诚
康璐遥
林华春
邓文强
詹欣壁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Merchants Union Consumer Finance Co Ltd
Original Assignee
Merchants Union Consumer Finance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merchants Union Consumer Finance Co LtdfiledCriticalMerchants Union Consumer Finance Co Ltd
Priority to CN201910707399.XApriorityCriticalpatent/CN110610376A/en
Publication of CN110610376ApublicationCriticalpatent/CN110610376A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention relates to a response method and device of behavior data, computer equipment and a storage medium, and belongs to the technical field of networks. The method comprises the following steps: acquiring user behavior data of candidate users; the candidate users comprise users triggering the target event; screening target users from the candidate users according to the user behavior data; acquiring an execution logic corresponding to a target event; the execution logic is determined according to the corresponding relation between the target event and a predetermined logic tree; and executing corresponding touch operation to the target user according to the execution logic. The technical scheme solves the problem that the response when the user generates the specific behavior has hysteresis. The real-time response can be carried out when the user generates specific behaviors, and the hysteresis of application response is reduced.

Description

Behavior data response method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of network technologies, and in particular, to a method and an apparatus for responding to behavior data, a computer device, and a storage medium.
Background
With the development of network technology, the management platform of the application often needs to respond according to the behavior data of the user, for example: after the user performs some operations, the user status is judged, and information is output (sending short message, making phone call, etc.) to the user in a targeted manner. At present, the management requirements of many applications are better supported in an off-line scene, various behavior data flow into a data warehouse after being cleaned in a T +1 mode, and a management platform responds according to the cleaned behavior data so as to ensure the retention rate of a user and the conversion rate of a business process.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the traditional mode: the delay time of the T +1 mode itself is long, and generally, data of the business database is synchronized to the data warehouse in the early morning for further processing. This results in a hysteresis in the response to a user producing a particular action.
Disclosure of Invention
Based on this, embodiments of the present invention provide a behavior data response method, apparatus, computer device, and storage medium, which can respond to behavior data of a user in real time, and reduce the hysteresis of application response.
The content of the embodiment of the invention is as follows:
in a first aspect, an embodiment of the present invention provides a response method for behavior data, including the following steps: acquiring user behavior data of candidate users; the candidate users comprise users triggering target events; screening out target users from the candidate users according to the user behavior data; acquiring an execution logic corresponding to the target event; the execution logic is determined according to the corresponding relation between the target event and a predetermined logic tree; and executing corresponding touch operation to the target user according to the execution logic.
In one embodiment, after the step of screening the target user from the candidate users according to the user behavior data, the method further includes: storing the description information of the target user into a redis database; the step of executing the corresponding reach operation to the target user according to the execution logic includes: determining an execution time according to the execution logic; if the execution time is up, obtaining the description information of the target user from the redis database; and executing corresponding touch operation to the target user according to the description information of the target user.
In one embodiment, before the step of obtaining the execution logic corresponding to the target event, the method further includes: if the preset timing time is up, loading the newly added execution logic in the logic configuration library; the newly added execution logic is determined by the logic configuration library according to the scene information and/or the logic configuration information input by the input equipment; the logic configuration library is a MySQL database; and updating the logic tree according to the newly added execution logic.
In one embodiment, the step of screening the candidate users for the target user according to the user behavior data includes: acquiring a user screening condition corresponding to the target event; and determining candidate users of which the user behavior data meet the user screening conditions as the target users.
In one embodiment, the step of determining the candidate user whose user behavior data meets the user filtering condition as the target user includes: comparing the user information of the candidate user, the environment information of the network environment where the candidate user is located, the time information for triggering the target event and/or the equipment information of the used equipment with the user screening condition; and determining the candidate users with the comparison results meeting the preset conditions as the target users.
In one embodiment, the step of executing, according to the execution logic, a corresponding reach operation to the target user includes: determining touch operation corresponding to the execution logic according to a pre-established mapping table; wherein, the mapping table comprises the corresponding relation between the execution logic and the touch operation; the reaching operation includes at least one of: dialing a telephone, sending a short message, sending APP information and sending a push message; and executing the corresponding touch operation to the target user.
In one embodiment, after the step of performing the corresponding reach operation to the target user according to the execution logic, the method further includes: sending the description information of the target user and the execution information of the touch operation to an application terminal through a message queue; the application terminal comprises a terminal used by a user.
In a second aspect, an embodiment of the present invention provides a response apparatus for behavior data, including: the data acquisition module is used for acquiring user behavior data of the candidate user; the candidate users comprise users triggering target events; the user screening module is used for screening target users from the candidate users according to the user behavior data; a logic obtaining module, configured to obtain an execution logic corresponding to the target event; the execution logic is determined according to the corresponding relation between the target event and a predetermined logic tree; and the behavior execution module is used for executing corresponding touch operation to the target user according to the execution logic.
In a third aspect, an embodiment of the present invention provides a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program: acquiring user behavior data of candidate users; the candidate users comprise users triggering target events; screening out target users from the candidate users according to the user behavior data; acquiring an execution logic corresponding to the target event; the execution logic is determined according to the corresponding relation between the target event and a predetermined logic tree; and executing corresponding touch operation to the target user according to the execution logic.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps: acquiring user behavior data of candidate users; the candidate users comprise users triggering target events; screening out target users from the candidate users according to the user behavior data; acquiring an execution logic corresponding to the target event; the execution logic is determined according to the corresponding relation between the target event and a predetermined logic tree; and executing corresponding touch operation to the target user according to the execution logic.
One of the above technical solutions has the following advantages or beneficial effects: acquiring user behavior data of candidate users triggering a target event, and screening out target users from the candidate users; determining an execution logic corresponding to the target event according to the corresponding relation between the target event and the logic tree; and executing corresponding touch operation to the target user according to the execution logic. The real-time response can be carried out when the user generates specific behaviors, and the hysteresis of application response is reduced.
Drawings
FIG. 1 is a diagram of an application environment of a response method for behavior data in one embodiment;
FIG. 2 is a flow diagram that illustrates a method for responding to behavioral data in one embodiment;
FIG. 3 is a display interface for an administrator to determine user filter criteria in one embodiment;
FIG. 4 is a flow diagram illustrating a method for determining a reach operation in one embodiment;
FIG. 5 is a system diagram that illustrates a method for implementing a response to behavioral data, in one embodiment;
FIG. 6 is a flowchart illustrating a response method of behavior data according to another embodiment;
FIG. 7 is a block diagram showing the structure of a response unit for behavior data in one embodiment;
FIG. 8 shows an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The response method of the behavior data provided by the application can be applied to the application environment shown in fig. 1. The application environment includes a server 101 and an application terminal 102, which can perform network communication. The server 101 filters the target user according to the user behavior data of the candidate user, determines an execution logic, and outputs response information to the application terminal 102 according to the execution logic, so as to execute a corresponding reach operation to the target user. Further, the server 101 may be implemented by a stand-alone server or a server cluster composed of a plurality of servers. The application terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. In addition, the server 101 may be replaced by a terminal, which may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
The embodiment of the invention provides a behavior data response method and device, computer equipment and a storage medium. The following are detailed below.
In one embodiment, as shown in FIG. 2, a method of responding to behavioral data is provided. Taking the application of the method to the server side in fig. 1 as an example for explanation, the method comprises the following steps:
s201, acquiring user behavior data of a candidate user; the candidate users include users that trigger the target event.
The triggering target event refers to a specific operation performed on the network, and may be opening a certain interface and triggering a certain key. Further, the target event may refer to operations of applying for, browsing in real time, placing an order, refunding money, searching, getting a coupon, and the like in a certain application a. And the users who execute the target event at the same time or in the same time period are the candidate users. The number of candidate users may be one, two, or more.
User behavior data may refer to various data generated by a user while performing network operations, such as: device identification, app type, app version number, operating system, client MAC address, operation timestamp, page before entering the page, operation object, user ID, etc. The server can determine the image of the corresponding candidate user according to the user behavior data so as to carry out subsequent processing.
Further, the user behavior data may be determined by behavior detail data sent by the application terminal, where the behavior detail data may refer to user behavior details of all operations performed by the user at the application terminal; meanwhile, the user behavior data can also be determined according to queue data sent by a redis database, wherein the queue data is data cached on the redis and corresponds to two structures: one is a zset ordered list with createTime + delay as score; one is normal (k, v) data, storing the actual message body.
S202, screening out target users from the candidate users according to the user behavior data.
The server can determine user characteristics according to the user behavior data, and can screen out target users with user behavior data meeting set conditions from the candidate users according to the user characteristics.
Further, the setting condition that the user behavior data needs to satisfy may be determined according to an actual situation, and may be determined by the generation time, the operation mode, the credit feature, and the like of the user behavior.
S203, acquiring an execution logic corresponding to the target event; the execution logic is determined according to the corresponding relation between the target event and the predetermined logic tree.
The execution logic may refer to a logic to be followed by a response after the target user triggers the target event, and may also be referred to as an execution rule, and specifically may be an output mode, an output time, and the like of the response. A logic tree (also referred to as a rule tree) may be a database containing a plurality of execution logic that may correspond to a plurality of applications (one or two may also be possible) for various possible network operation events. Therefore, when the candidate users triggering the target event are analyzed, the corresponding execution logic can be determined according to the logic tree.
And S204, executing corresponding touch operation to the target user according to the execution logic.
The step determines the response information according to the execution logic and outputs the corresponding response information to the target user, wherein the response information corresponds to the relevant information of the touch operation, and the purpose of executing the corresponding touch operation to the target user can be realized through the mode.
The behavior data response method provided in this embodiment can determine the target user and determine the corresponding execution logic in real time when the user generates a specific behavior (the process of determining the target user and the execution logic can be regarded as a response to the user behavior data, that is, a real-time response to the user behavior data), execute the touch operation to the target user according to the execution logic, and can effectively reduce the hysteresis of the application response.
In one embodiment, the step of screening the target users from the candidate users according to the user behavior data comprises: acquiring a user screening condition corresponding to a target event; and determining candidate users of which the user behavior data accord with the user screening conditions as target users.
The determination process of the user screening condition may include, but is not limited to, the following two ways: 1. various types of network behavior data are obtained through a network crawler tool, the effect to be achieved by various target events is read (the effect can be set by a user), big data analysis is carried out on the network behavior data and the effect, the condition which the network behavior data should meet to achieve the effect is determined, and the condition can be determined as a user screening condition; 2. set by the user. Further, the user screening condition may refer to a condition that needs to be satisfied, such as user information of the user, environment information of a network environment where the user is located, time information for triggering an event, and device information of a device used, and for an online shopping scenario, the user screening condition is as follows, to name two examples: male, network security, ordering time is between 8:00-18:00, and the used equipment is a PC; for the scene of the borrowing breakpoint, the user screening conditions are as follows: the available amount is more than 1w, and the last borrowing time exceeds 3 months.
Further, for a borrowing breakpoint scenario, when monitoring that a user enters a borrowing page, the server determines that the user is a target user according to whether the user behavior data meets the above conditions, and if so, the server stores the description information into a delay queue of the redis (which is called a delay queue because the touch operation may be delayed to judge whether the description information needs to be executed after a period of time elapses, and therefore, the description information of the target user also needs to be delayed to be stored in the redis for at least a period of time).
Further, the step of determining candidate users whose user behavior data meet the user screening condition as target users includes: comparing user information of the candidate user, environment information of the network environment where the candidate user is located, time information of a trigger target event and/or equipment information of used equipment with user screening conditions; and determining the candidate users with the comparison results meeting the preset conditions as target users.
Specifically, taking loan management as an example, the administrator may determine the user filter criteria through an interface such as that shown in fig. 3. The information in the interface is explained below: "instance ID" represents the ID number of the present operation; the "instance name" indicates the purpose of the operation, and includes: filtering the list; the logic can represent the requirement which needs to be met by the user filtering at this time, and other logic rules can be selected through a pull-down list on the right side; the to-be-selected items of the list filtering condition can be determined according to the logic, namely the content of the logic is determined, and then the corresponding to-be-selected list filtering condition exists, the user selects the required filtering condition through the pull-down list on the right side, and meanwhile, the selected filtering condition can be deleted through the X; "employee status selection" means a selection of the company that the user is at; the special list indicates some additional filtering conditions, such as the age, sex, location area, etc. of the user. The administrator selects a corresponding user screening condition through the interface, and the user screening condition generated according to the selected information in fig. 3 is that (if a certain candidate user satisfies the following conditions, the user is excluded and not taken as a target user): the names of the company name list are shown in a high risk list, a grey list, a black list, a customer harassment list, a borrowing form refused list, a sensitive complaint list, an internal complaint list, an overdue list, a call-in/call-out forbidden list and an external complaint list, and are employees of company A.
According to the embodiment, the target user is screened from the candidate users according to the user screening conditions, so that the triggering operation is more targeted, the network resources are effectively saved, and meanwhile, the recommendation information can be accurately output by the target user.
In one embodiment, after the step of screening the target users from the candidate users according to the user behavior data, the method further includes: storing the description information of the target user into a redis database; according to the execution logic, executing the corresponding touch operation to the target user, wherein the step comprises the following steps: determining an execution time according to the execution logic; if the execution time is up, obtaining the description information of the target user from a redis database; and executing corresponding touch operation to the target user according to the description information of the target user.
The description information of the target user may refer to feature data of the target user, and may be information such as gender, age, location area, and time for triggering the target event of the user.
The redis is a key-value storage system, which supports storage of multiple value types, including string, list, set, zset, and hash, where these data types all support operations of push/pop, add/remove, and intersection union and difference, and these operations are atomic. On this basis, redis supports various different ways of ordering. In order to ensure efficiency, data is cached in a memory, and simultaneously, the redis periodically writes updated data into a disk or writes modification operation into an additional recording file, and realizes master-slave synchronization on the basis. In addition, in addition to storing the description information of the target user into the redis database, the execution time may also be stored in the redis database, and the server accesses the redis database in real time and determines whether the execution time is reached.
Specifically, 100 users (candidate users) enter the borrowing front page of the borrowing application A at a time and input the amount of money, but some of the users do not complete the borrowing process. According to the conventional T +1 data cleansing method, the server may need to settle the next day which specific users have not completed the borrowing process and determine the operation of the target user, so that no real-time response is made to the behavior data of the users. The behavior data response method provided by the embodiment of the invention can determine the target user from the 100 users in real time, store the description information of the target user in the redis database, and the server can access the redis database in real time (or periodically) and execute touch operation on the target user when the execution time is up.
Specifically, the server starts to monitor user behavior data when the user enters a borrowing home page, judges whether the user completes the borrowing operation after half an hour (execution time), and performs telephone communication (touch operation) on the user if the user does not borrow the loan.
In the embodiment, the description information of the target user is stored by the redis database, the server can scan the description information in the redis database in real time and execute the corresponding touch operation when the execution time reaches, and under the condition of ensuring timely response to the user behavior data, whether the touch operation is executed or not can be judged after delaying for a period of time according to the effect to be achieved by the target event, so that the executed touch operation can be ensured to achieve the expected effect. In addition, a redis database is adopted to store the description information, the execution time and the like of the target user, the redis database is low in cost and simple and convenient in use mode, and the implementation cost of the response method of the behavior data can be effectively reduced.
In some embodiments, message delay may also be implemented via a delay configuration of message middleware. Specifically, the message middleware may be a memcached database, a rockmq, or the like. The RocktMQ is a popular message middleware in the industry, has a delay characteristic, and can ensure that a touch operation is executed when the execution time reaches on the basis of ensuring real-time response to user behavior data.
In one embodiment, before the step of obtaining the execution logic corresponding to the target event, the method further includes: if the preset timing time is up, loading the newly added execution logic in the logic configuration library; the newly added execution logic is determined by the logic configuration library according to the scene information and/or the logic configuration information input by the input equipment; the logic configuration library is a MySQL database; and updating the logic tree according to the newly added execution logic.
The input device may be various devices having an information input function, and the device may further have an interface through which a user may input scene information, logic configuration information, and the like. Further, the scenario information may refer to scenario information of occurrence of an event (for example, the scenario information may include that a user opens a borrowing interface, inputs a borrowing amount, and returns a payment date), and the logic configuration information may refer to configuration information according to which the execution logic is generated (for example, the execution time may not exceed 2 months).
The timing time can be determined according to actual conditions, and the embodiment of the invention does not limit the specific data of the timing time. Further, multiple timing times may be included for the purpose of periodically loading the newly added execution logic in the logic configuration library.
The embodiment periodically acquires the newly added execution logic, and determines the execution logic corresponding to the target event according to the updated logic tree, so that the touch operation executed by the target user is the latest operation, and the intelligence of the server is improved.
In one embodiment, the step of performing the corresponding reach operation to the target user according to the execution logic comprises: determining touch operation corresponding to the execution logic according to a pre-established mapping table; wherein, the mapping table comprises the corresponding relation between the execution logic and the touch operation; the reach operation includes at least one of: dialing a telephone, sending a short message, sending APP information and sending a push message; and executing corresponding touch operation to the target user.
The information corresponding to the touch operation may be information for prompting the target user to pay, coupon information, and the like. In some embodiments, the reach operation may also include other content, such as: and sending vibration prompt information to a bracelet used by a target user.
According to the response method of the behavior data provided by the embodiment, the touch operation is executed to the target user in multiple modes, the target user can be pertinently enabled to acquire the information, and accurate information recommendation can be effectively achieved.
In one embodiment, as shown in fig. 4, a method for determining a reach operation is provided, which includes: s401, triggering a target event by a candidate user; s402, filtering an influence list to determine a target user from the candidate users; s403, determining the credit line of the target user; s404, editing message contents according to different message templates aiming at low quota and high quota respectively; and S405, generating a touch operation according to the edited message content and the execution time. The embodiment screens the target users from the candidate users, edits different message contents according to the credit line of the target users, and can realize accurate message recommendation of the target users.
In one embodiment, after the step of performing the corresponding reach operation to the target user according to the execution logic, the method further includes: sending description information of a target user and execution information of touch operation to an application terminal through a message queue; the application terminal includes a terminal used by a user.
The user may refer to a target user in the foregoing embodiment, and may also be an application administrator, an operator, and the like. The execution information of the touch operation may refer to information such as whether the touch operation is successfully executed.
The above embodiment sends the description information of the target user and the execution information of the reach operation to the application terminal, so that the user can know the execution condition of the reach operation to adjust the execution logic, the reach operation and the like, and a better response effect is achieved.
In an embodiment, the response method of behavior data provided in the embodiment of the present invention may be implemented by a system as shown in fig. 5, where the system is composed of three core modules, including a data preprocessing module, a rule engine module, and an output event processing module, and each module may also implement its function through a specific hardware device, which is specifically described as follows:
1. pre-processing module
The method comprises the following steps: 1) a synchronization event handler: receiving behavior detail data from an application (e.g., kafka), and processing into primitives (primitives may refer to those that a server can directly process); 2) an asynchronous event handler: and acquiring delay queue data in a redis database at regular time and processing the delay queue data into a basic data unit. Wherein the synchronous event handler is connected to a real-time cleansing module that obtains real-time data (from a network or from a redis database). In addition, the real-time cleaning module can realize functions such as real-time wind control and information recommendation by cleaning data, for example: and determining that the credit of a certain user is poor according to the analysis of the user behavior data, recommending the user with the good credit to an administrator and the like.
2. Rule engine module
The method comprises the following steps: 1) a configuration loading module: regularly loading rule data configured by a user (which can be understood as a regular character stream, and a rule engine used is drools); 2) self-defining function: on the basis of a rule engine basic function, the function of the rule engine is expanded, and particularly, some complex logics which cannot be realized in a rule script can be customized; in addition, common complex processing logic can be packaged to realize the multiplexing function; 3) a rule executor: and converting the target event into a specific execution rule.
3. Output event processing module
The method comprises the following steps: 1) processing an output event: receiving an execution rule of a rule executor, and processing the execution rule into a basic data unit; 2) an external repeater: forwarding the execution rule to an external system, wherein the external system comprises a Message Queue (MQ), a notification system and the like, and the message queue can send the execution rule to an operation business system so that an operator can know the specific execution condition of the response method of the behavior data; 3) the timing touch module: and outputting the execution rule to a delay queue of the redis, setting the execution time of rule judgment, and executing subsequent touch operation after the set time is reached.
In addition, the system further comprises: rule configuration console: providing a configuration page, wherein newly added scene information and rule configuration information can be stored in a MySQL database through a console; external service: the method mainly comprises the steps of connecting a CDP (client data online service system, wherein the CDP can be understood as a data service provider, recommending event messages can acquire label information of a user from the CDP, including gender, age, registration time and the like, and supplying the label information to a server for judgment), and acquiring related attribute information of the user.
The system uses the real-time behavior data of the user to combine meaningful composite touch events according to the business operation activity rules, and the touch events are delivered to a downstream operation business system to perform touch operation on the user, so that the touch operation can be performed on a target user in a targeted manner.
In order to better understand the above method, an application example of the response method of the behavior data of the present invention is explained in detail below as shown in fig. 6.
1. Multiple candidate users enter the borrowing interface at the same time.
2. The server determines the user behavior data of the candidate users according to the data sent by the synchronous event processor and the asynchronous event processor.
3. And determining user screening conditions corresponding to the borrowing behaviors, and determining a target user from the candidate users according to the user screening conditions.
4. Loading a newly added execution rule in the rule configuration console through the rule actuator, updating the rule tree according to the newly added execution rule, and determining an execution rule corresponding to the borrowing behavior through the updated rule tree, wherein the execution rule is assumed to be as follows: and after 30min, judging whether the target users complete the whole borrowing operation.
5. And after 30min, judging whether the target users complete the whole borrowing operation, determining the users who do not complete the borrowing operation, and sending borrowing preferential short messages to the users.
According to the embodiment, the real-time response can be performed when the user generates a specific behavior, and the hysteresis of the application response is reduced. The administrator can reach the client more timely and accurately by aiming at some real-time message recommendation means on various service scenes, service conversion is improved, and meanwhile, the administrator can configure execution logic in a graphical mode, so that the access cost of the execution rule is effectively reduced.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention.
Based on the same idea as the response method of the behavior data in the above-described embodiment, the present invention also provides a response device of the behavior data, which can be used to execute the response method of the behavior data. For convenience of illustration, the structure of the embodiment of the device for responding to the behavior data is only shown in the schematic diagram, and those skilled in the art will understand that the illustrated structure does not constitute a limitation to the device, and may include more or less components than those illustrated, or combine some components, or arrange different components.
As shown in fig. 7, the response device of behavior data includes a data obtaining module 701, a user filtering module 702, a logic obtaining module 703 and a behavior executing module 704, which are described in detail as follows:
a data obtaining module 701, configured to obtain user behavior data of a candidate user; the candidate users include users that trigger the target event.
The user screening module 702 is configured to screen a target user from the candidate users according to the user behavior data.
A logic obtaining module 703, configured to obtain an execution logic corresponding to the target event; the execution logic is determined according to the corresponding relation between the target event and the predetermined logic tree.
And a behavior executing module 704, configured to execute a corresponding reach operation to the target user according to the execution logic.
According to the embodiment, the real-time response can be performed when the user generates a specific behavior, and the hysteresis of the application response is reduced.
In one embodiment, further comprising: the information storage module is used for storing the description information of the target user into a redis database; a behavior execution module 704, comprising: the time determining submodule is used for determining the execution time according to the execution logic; the information acquisition submodule is used for acquiring the description information of the target user from the redis database if the execution time is up; and the operation execution sub-module is used for executing corresponding touch operation to the target user according to the description information of the target user.
In one embodiment, further comprising: the execution logic determination module is used for loading the newly added execution logic in the logic configuration library if the preset timing time is up; the newly added execution logic is determined by the logic configuration library according to the scene information and/or the logic configuration information input by the input equipment; the logic configuration library is a MySQL database; and the logic tree updating module is used for updating the logic tree according to the newly added execution logic.
In one embodiment, the user filtering module 702 includes: the screening condition acquisition submodule is used for acquiring a user screening condition corresponding to the target event; and the target user determining submodule is used for determining candidate users of which the user behavior data accord with the user screening conditions as target users.
In one embodiment, the target user determination submodule includes: the condition comparison unit is used for comparing the user information of the candidate user, the environment information of the network environment where the candidate user is located, the time information of the trigger target event and/or the equipment information of the used equipment with the user screening condition; and the target user determining unit is used for determining the candidate users with the comparison results meeting the preset conditions as the target users.
In one embodiment, behavior execution module 704 includes: the touch operation determining submodule is used for determining touch operation corresponding to the execution logic according to a pre-established mapping table; wherein, the mapping table comprises the corresponding relation between the execution logic and the touch operation; the reach operation includes at least one of: dialing a telephone, sending a short message, sending APP information and sending a push message; and the behavior execution submodule is used for executing corresponding touch operation to the target user.
In one embodiment, further comprising: the information sending module is used for sending the description information of the target user and the execution information of the touch operation to the application terminal through the message queue; the application terminal includes a terminal used by a user.
It should be noted that, the response device for behavior data of the present invention corresponds to the response method for behavior data of the present invention one to one, and the technical features and the advantages thereof described in the embodiment of the response method for behavior data are all applicable to the embodiment of the response device for behavior data, and specific contents may refer to the description in the embodiment of the method of the present invention, which is not described herein again, and thus is stated herein.
In addition, in the embodiment of the behavior data responding apparatus illustrated above, the logical division of the program modules is only an example, and in practical applications, the above function distribution may be performed by different program modules according to needs, for example, due to the configuration requirements of corresponding hardware or the convenience of implementation of software, that is, the internal structure of the behavior data responding apparatus is divided into different program modules to perform all or part of the above described functions.
The response method of the behavior data provided by the application can be applied to the computer equipment shown in FIG. 8. The computer device may be a server or a terminal device, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor is configured to provide computing and control capabilities; the memory includes a nonvolatile storage medium storing an operating system, a computer program (which implements a response method of behavior data when executed by the processor), and a database, an internal memory providing an environment for the operating system and the computer program in the nonvolatile storage medium to run; the database is used for storing data related to the execution process of the response method of the behavior data; the network interface is used for communicating with an external terminal through network connection.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program: acquiring user behavior data of candidate users; the candidate users comprise users triggering the target event; screening target users from the candidate users according to the user behavior data; acquiring an execution logic corresponding to a target event; the execution logic is determined according to the corresponding relation between the target event and a predetermined logic tree; and executing corresponding touch operation to the target user according to the execution logic.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and storing the description information of the target user into a redis database.
In one embodiment, the processor, when executing the computer program, further performs the steps of: determining an execution time according to the execution logic; if the execution time is up, obtaining the description information of the target user from a redis database; and executing corresponding touch operation to the target user according to the description information of the target user.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if the preset timing time is up, loading the newly added execution logic in the logic configuration library; the newly added execution logic is determined by the logic configuration library according to the scene information and/or the logic configuration information input by the input equipment; the logic configuration library is a MySQL database; and updating the logic tree according to the newly added execution logic.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a user screening condition corresponding to a target event; and determining candidate users of which the user behavior data accord with the user screening conditions as target users.
In one embodiment, the processor, when executing the computer program, further performs the steps of: comparing user information of the candidate user, environment information of the network environment where the candidate user is located, time information of a trigger target event and/or equipment information of used equipment with user screening conditions; and determining the candidate users with the comparison results meeting the preset conditions as target users.
In one embodiment, the processor, when executing the computer program, further performs the steps of: determining touch operation corresponding to the execution logic according to a pre-established mapping table; wherein, the mapping table comprises the corresponding relation between the execution logic and the touch operation; the reach operation includes at least one of: dialing a telephone, sending a short message, sending APP information and sending a push message; and executing corresponding touch operation to the target user.
In one embodiment, the processor, when executing the computer program, further performs the steps of: sending description information of a target user and execution information of touch operation to an application terminal through a message queue; the application terminal includes a terminal used by a user.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring user behavior data of candidate users; the candidate users comprise users triggering the target event; screening target users from the candidate users according to the user behavior data; acquiring an execution logic corresponding to a target event; the execution logic is determined according to the corresponding relation between the target event and a predetermined logic tree; and executing corresponding touch operation to the target user according to the execution logic.
In one embodiment, the computer program when executed by the processor further performs the steps of: and storing the description information of the target user into a redis database.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining an execution time according to the execution logic; if the execution time is up, obtaining the description information of the target user from a redis database; and executing corresponding touch operation to the target user according to the description information of the target user.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the preset timing time is up, loading the newly added execution logic in the logic configuration library; the newly added execution logic is determined by the logic configuration library according to the scene information and/or the logic configuration information input by the input equipment; the logic configuration library is a MySQL database; and updating the logic tree according to the newly added execution logic.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring a user screening condition corresponding to a target event; and determining candidate users of which the user behavior data accord with the user screening conditions as target users.
In one embodiment, the computer program when executed by the processor further performs the steps of: comparing user information of the candidate user, environment information of the network environment where the candidate user is located, time information of a trigger target event and/or equipment information of used equipment with user screening conditions; and determining the candidate users with the comparison results meeting the preset conditions as target users.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining touch operation corresponding to the execution logic according to a pre-established mapping table; wherein, the mapping table comprises the corresponding relation between the execution logic and the touch operation; the reach operation includes at least one of: dialing a telephone, sending a short message, sending APP information and sending a push message; and executing corresponding touch operation to the target user.
In one embodiment, the computer program when executed by the processor further performs the steps of: sending description information of a target user and execution information of touch operation to an application terminal through a message queue; the application terminal includes a terminal used by a user.
It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program, which is stored in a computer readable storage medium and sold or used as a stand-alone product. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
The terms "comprises" and "comprising," and any variations thereof, of embodiments of the present invention are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or (module) elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-described examples merely represent several embodiments of the present invention and should not be construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

CN201910707399.XA2019-08-012019-08-01Behavior data response method and device, computer equipment and storage mediumPendingCN110610376A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910707399.XACN110610376A (en)2019-08-012019-08-01Behavior data response method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910707399.XACN110610376A (en)2019-08-012019-08-01Behavior data response method and device, computer equipment and storage medium

Publications (1)

Publication NumberPublication Date
CN110610376Atrue CN110610376A (en)2019-12-24

Family

ID=68889769

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910707399.XAPendingCN110610376A (en)2019-08-012019-08-01Behavior data response method and device, computer equipment and storage medium

Country Status (1)

CountryLink
CN (1)CN110610376A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111353892A (en)*2020-03-312020-06-30中国建设银行股份有限公司Transaction risk monitoring method and device
CN111966935A (en)*2020-07-222020-11-20招联消费金融有限公司Information preloading method and device, computer equipment and storage medium
CN113128739A (en)*2019-12-312021-07-16马上消费金融股份有限公司Prediction method of user touch time, prediction model training method and related device
CN113342614A (en)*2021-06-292021-09-03深圳前海微众银行股份有限公司User breakpoint management method, device, equipment and computer program product
CN113706153A (en)*2021-08-042021-11-26支付宝(杭州)信息技术有限公司Method and device for reporting guidance and processing aiming at payment transaction
CN113703967A (en)*2021-08-112021-11-26网易(杭州)网络有限公司Data processing method, data processing apparatus, storage medium, and electronic apparatus
CN115311016A (en)*2022-08-172022-11-08北京萤火保科技有限公司 User touch method, apparatus, device and readable storage medium
CN116032749A (en)*2022-12-142023-04-28山东浪潮质量链科技有限公司 A service configuration method and device for Internet of Things
CN117435367A (en)*2023-11-072024-01-23上海鱼尔网络科技有限公司User behavior processing method, device, equipment, storage medium and program product
CN116032749B (en)*2022-12-142025-10-14浪潮云洲工业互联网有限公司 A service configuration method and device for the Internet of Things

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106886597A (en)*2017-02-242017-06-23乐蛙科技(上海)有限公司Control system, control method and receiving terminal that a kind of trigger-type is notified
CN108319723A (en)*2018-02-272018-07-24百度在线网络技术(北京)有限公司A kind of picture sharing method and device, terminal, storage medium
CN108629605A (en)*2017-03-152018-10-09北京京东尚科信息技术有限公司Real-time questionnaire method for pushing based on online customer service
CN108933823A (en)*2018-06-282018-12-04北京京东尚科信息技术有限公司User's touching reaches method and apparatus
CN109118296A (en)*2018-09-042019-01-01南京星邺汇捷网络科技有限公司Movable method for pushing, device and electronic equipment
CN109656960A (en)*2018-09-272019-04-19深圳壹账通智能科技有限公司Intelligent recommendation method, apparatus, terminal device and the storage medium of credit operation
CN109831488A (en)*2019-01-082019-05-31上海上湖信息技术有限公司Information recommendation method and system, readable storage medium storing program for executing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106886597A (en)*2017-02-242017-06-23乐蛙科技(上海)有限公司Control system, control method and receiving terminal that a kind of trigger-type is notified
CN108629605A (en)*2017-03-152018-10-09北京京东尚科信息技术有限公司Real-time questionnaire method for pushing based on online customer service
CN108319723A (en)*2018-02-272018-07-24百度在线网络技术(北京)有限公司A kind of picture sharing method and device, terminal, storage medium
CN108933823A (en)*2018-06-282018-12-04北京京东尚科信息技术有限公司User's touching reaches method and apparatus
CN109118296A (en)*2018-09-042019-01-01南京星邺汇捷网络科技有限公司Movable method for pushing, device and electronic equipment
CN109656960A (en)*2018-09-272019-04-19深圳壹账通智能科技有限公司Intelligent recommendation method, apparatus, terminal device and the storage medium of credit operation
CN109831488A (en)*2019-01-082019-05-31上海上湖信息技术有限公司Information recommendation method and system, readable storage medium storing program for executing

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113128739A (en)*2019-12-312021-07-16马上消费金融股份有限公司Prediction method of user touch time, prediction model training method and related device
CN111353892B (en)*2020-03-312024-07-30中国建设银行股份有限公司Transaction risk monitoring method and device
CN111353892A (en)*2020-03-312020-06-30中国建设银行股份有限公司Transaction risk monitoring method and device
CN111966935A (en)*2020-07-222020-11-20招联消费金融有限公司Information preloading method and device, computer equipment and storage medium
CN111966935B (en)*2020-07-222023-12-12招联消费金融有限公司Information preloading method, device, computer equipment and storage medium
CN113342614A (en)*2021-06-292021-09-03深圳前海微众银行股份有限公司User breakpoint management method, device, equipment and computer program product
CN113342614B (en)*2021-06-292024-11-08深圳前海微众银行股份有限公司 User breakpoint management method, device, equipment and computer program product
CN113706153A (en)*2021-08-042021-11-26支付宝(杭州)信息技术有限公司Method and device for reporting guidance and processing aiming at payment transaction
CN113703967A (en)*2021-08-112021-11-26网易(杭州)网络有限公司Data processing method, data processing apparatus, storage medium, and electronic apparatus
CN115311016A (en)*2022-08-172022-11-08北京萤火保科技有限公司 User touch method, apparatus, device and readable storage medium
CN116032749A (en)*2022-12-142023-04-28山东浪潮质量链科技有限公司 A service configuration method and device for Internet of Things
CN116032749B (en)*2022-12-142025-10-14浪潮云洲工业互联网有限公司 A service configuration method and device for the Internet of Things
CN117435367B (en)*2023-11-072024-06-04上海鱼尔网络科技有限公司User behavior processing method, device, equipment, storage medium and program product
CN117435367A (en)*2023-11-072024-01-23上海鱼尔网络科技有限公司User behavior processing method, device, equipment, storage medium and program product

Similar Documents

PublicationPublication DateTitle
CN110610376A (en)Behavior data response method and device, computer equipment and storage medium
CN111831420B (en)Method for task scheduling, related device and computer program product
CN111752799B (en)Service link tracking method, device, equipment and storage medium
CN106375458B (en)Service calling system, method and device
CN112311617A (en) A configuration data monitoring and alarming method and system
US10489748B2 (en)Managing the generation of text messages
CN112260933B (en)Communication method, communication device, electronic equipment and medium
CN111666298B (en) User service category detection method, device, and computer equipment based on Flink
CN110457089B (en)Data acquisition method, data acquisition device, computer readable storage medium and computer equipment
CN112241362B (en) A testing method, device, server and storage medium
CN113191889B (en)Wind control configuration method, configuration system, electronic equipment and readable storage medium
WO2017152765A1 (en)Automatic fusing-based message sending method, device and system
CN108197002A (en)Mobile equipment is without burying point data statistical method, system, terminal and medium
CN115757587A (en)Heterogeneous data source integration method and device, electronic equipment and storage medium
US9910737B2 (en)Implementing change data capture by interpreting published events as a database recovery log
CN113760315A (en)Method and device for testing system
CN111722994A (en) A method and device for responding to a task request
CN111600942A (en)Report processing method, device and equipment
CN109976945A (en)A kind of method and device of Log backup
CN109799981B (en)Integrated system and method based on execution chain
CN111143526B (en)Method and device for generating and controlling configuration information of counsel service control
CN108270912A (en)A kind of information processing method and device based on calendar application
CN113784174A (en)Method, device, electronic equipment and medium for generating video preview dynamic image
CN119226319B (en) Method and device for processing structured query statements in database multi-cluster mode
CN109542609A (en)A kind of method, apparatus withholding refund, computer equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20191224

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp