WO2020237858A1 - Breakpoint data transmission method, apparatus, device, and non-volatile storage medium - Google Patents

Breakpoint data transmission method, apparatus, device, and non-volatile storage medium Download PDF

Info

Publication number
WO2020237858A1
WO2020237858A1 PCT/CN2019/102422 CN2019102422W WO2020237858A1 WO 2020237858 A1 WO2020237858 A1 WO 2020237858A1 CN 2019102422 W CN2019102422 W CN 2019102422W WO 2020237858 A1 WO2020237858 A1 WO 2020237858A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
breakpoint
target server
information
classification result
Prior art date
Application number
PCT/CN2019/102422
Other languages
French (fr)
Chinese (zh)
Inventor
谢富华
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020237858A1 publication Critical patent/WO2020237858A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9063Intermediate storage in different physical parts of a node or terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Definitions

  • This application relates to the field of computer information technology, and in particular to a method, device, device, and non-volatile storage medium for transmitting breakpoint data.
  • the inventor realizes that when a user uses an application client with a capital transaction function loaded on a smart terminal (such as a smart phone) to conduct a capital transaction, the server corresponding to the client performs identity authentication processing on the transaction request operation initiated by the user. For example, when a transaction operation involving major economic interests is involved, the user may be required to perform physiological recognition (such as face recognition, fingerprint recognition, voice recognition, etc.). When the user’s identity information authentication fails, the transaction operation is a breakpoint.
  • the process of breakpoint data transmission is generally breakpoint recognition-data processing-transaction processing end-return end. If there are important drawbacks in the synchronous data method, data coupling is high, data transmission time is long, and it will not be counted until the downstream system data processing is completed.
  • the breakpoint data transfer is complete. That is to say, it takes a long time for the transaction server corresponding to the operation link to obtain the user's relevant data operations through the APP, and the entire process span is long. If the transaction server has multiple transactions that need to be processed in a certain period of time, the amount of data is large (above 100,000), and the process will be complicated by then, affecting the user experience.
  • the main purpose of this application is to provide a breakpoint data transmission method, device, equipment, and non-volatile storage medium, which aims to solve the problem of long data transmission time and data coupling when traditional transaction institutions perform data breakpoint transmission.
  • this application provides a breakpoint data transmission method, which includes:
  • the classification result is transmitted to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  • this application also proposes a breakpoint data transmission device, which includes:
  • the identification module is used to respond to the identity authentication request initiated by the user and identify the data breakpoint according to the result of the identity authentication request;
  • An obtaining module configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
  • the classification module is used to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
  • the transmission module is configured to transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  • this application also proposes a device for breakpoint data transmission, and the device includes:
  • One or more processors are One or more processors;
  • One or more application programs wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, and the one or more application programs are configured to Perform the steps of a breakpoint data transfer method.
  • this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a Or multiple application programs, the one or more application programs configured to implement the steps of the breakpoint data transmission method as described above.
  • This application first responds to the identity authentication request initiated by the user, and identifies the data breakpoint according to the result of the identity authentication request; then sends the data breakpoint to the preset thread queue, and the preset thread queue obtains the user's behavior data according to the data breakpoint; The behavior data is stored in the preset data table to classify the behavior data to obtain the classification result; finally, the classification result is transmitted to the target server, so that the target server can obtain the user identity representing the breakpoint data from the classification result as soon as possible Information, the coupling between various code modules during the entire operation process is reduced, reducing the complexity of process processing, and the transmission time is correspondingly shortened, which improves the efficiency of transaction institutions when transmitting data breakpoints.
  • FIG. 1 is a schematic structural diagram of a device for breakpoint data transmission in a hardware operating environment involved in a solution of an embodiment of the application;
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application;
  • FIG. 3 is a schematic flowchart of a second embodiment of a method for transmitting breakpoint data according to this application;
  • FIG. 4 is a schematic flowchart of a third embodiment of a method for transmitting breakpoint data according to this application.
  • Fig. 5 is a structural block diagram of a breakpoint data transmission device of this application.
  • FIG. 1 is a schematic structural diagram of a device for transmission of breakpoint data in a hardware operating environment involved in a solution of an embodiment of the application.
  • the device may include: one or more processors 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 can be a high-speed RAM memory or a stable memory (non-volatile memory), such as disk storage.
  • the memory 1005 may also be a storage device independent of the foregoing processor 1001.
  • the device may be a computer device used by the user, such as a smart phone.
  • the memory 1005 which is a non-volatile computer-readable storage medium, may include an operating system, a network communication module, a user receiving module, and one or more application programs.
  • the processor calls one or more application programs stored in the memory 1005 through the processor 1001, and executes the steps of the breakpoint data transmission method.
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application.
  • the breakpoint data transmission method includes the following steps:
  • Step S10 In response to the identity authentication request initiated by the user, the data breakpoint is identified according to the result of the identity authentication request.
  • the execution subject of this embodiment is the processor of the above-mentioned breakpoint data transmission device, and the breakpoint data transmission device may represent an application client with a fund transaction function.
  • the user when a user uses the client to conduct a fund transaction, the user will initiate an identity authentication request to the verification server corresponding to the client based on the authentication interface displayed on the client. For example, the user is required to perform physiological identification (such as Face recognition, fingerprint recognition, voice recognition, etc.), when the result of the identity authentication request fails, the data breakpoint of the fund transaction is identified.
  • physiological identification such as Face recognition, fingerprint recognition, voice recognition, etc.
  • the client may prohibit the user's subsequent operations during a preset period of time (such as prohibiting the user from trading for 6 hours).
  • the processor obtains the start event of the identity authentication request in response to the identity authentication request initiated by the user; when the preset event in the identity authentication request is triggered, according to the start event and the triggered preset Set the event to get the data breakpoint.
  • the rules for identifying breakpoints in this embodiment can be based on CRM (Customer Relationship Management, customer relationship management program) set the breakpoint identification rules to deal with.
  • CRM Customer Relationship Management, customer relationship management program
  • the customer relationship management program can be set: the user will trigger the start event For x hours, the untriggered end event (that is, the preset event) is defined as a breakpoint, and the corresponding breakpoint trigger success code is S. Both the start event and the end event are the user's operation track, and x is the time interval of the user's operation track.
  • Zhang San went to a financial institution to borrow money, Zhang San handed over face recognition, but failed the review, and the system did not detect that Zhang San submitted his face again for 10 hours or failed the review again, a face recognition review would be generated Breakpoint not passed ;
  • the start event is that the face recognition fails, and the end event is to submit the face recognition again.
  • the time interval is 10 hours.
  • the event function CheUpdateEvent() is called to monitor the breakpoint triggering success code S in real time.
  • the monitoring result is that the breakpoint triggering is successful, the data breakpoint is identified.
  • Step S20 Send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
  • the client after the client has identified the data breakpoint, it will pass the data breakpoint to the CRM, and the CRM will send the received data breakpoint to the preset thread queue;
  • the function of the preset thread queue is: the server corresponding to the client may respond to authentication requests initiated by multiple different users at a certain period of time, and send the identified data breakpoints to the preset thread in sequence according to the time sequence of the authentication request In a queue; the preset thread queue may be a CRM thread queue, and the thread queue contains breakpoints arranged in the time sequence of user requests;
  • the CRM thread queue will obtain the user's behavior data according to the data breakpoint.
  • the authentication request initiated by the user will include the start event and the end event (that is, the preset event).
  • the start event and the end event constitute the user's operation Track, the user's behavior data can be obtained from the user's operation track.
  • Step S30 Store the behavior data in a preset data table to classify the behavior data to obtain a classification result.
  • the user's behavior data will be analyzed.
  • the user's behavior data includes the record of the user's input verification information; usually the client involved in the fund transaction needs to perform multiple verifications when verifying the identity information of a user, such as Mobile phone verification, ID card information verification, verification of answering questions set by yourself, and face verification are all identity verification.
  • the processor will identify valuable user information in real time, that is, the processor will analyze the behavior data according to different predetermined formats to obtain data in different formats; and then store the data in different formats into the preset data In the table, the behavior data is classified to obtain user identity information from the classification result;
  • the user's behavior data includes the user's mobile phone number, contact email, ID card and other information, and these information are all in a predetermined format, for example, the mobile phone number is 11 for a number, and its corresponding predetermined format is integer data in int (11) Type; ID is 18 for a number, and its corresponding predetermined format is an integer data type of int (18); and the predetermined format corresponding to the mailbox is a fuzzy string containing @.
  • the mobile phone number of type int (11), ID information of type int (18), and the corresponding column attributes of the fuzzy string type mailbox containing @ are preset in the preset data table, so After the behavior data is stored in the preset data table, the behavior data can be classified to obtain user identity information.
  • Step S40 Transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  • target server may be the same as the server corresponding to the client.
  • the breakpoint data transmission device of this embodiment can be loaded with GoldenGate software, and use the Transactional Data Management (TDM) of GoldenGate software. Management), which can realize the second-level data capture, conversion and delivery of large amounts of data between heterogeneous IT infrastructures.
  • TDM Transactional Data Management
  • GoldenGate can support almost all common operating systems and database platforms.
  • the breakpoint data transmission device can pass GoldenGate transmits the classification result of the user in the data table to the target server, so that the target server obtains the user's different identity information from the classification result, so as to realize timely synchronization of data between the client and its downstream target server.
  • the GoldenGate software uses the log-based structured data replication method to obtain data additions, deletions and changes by analyzing the online log or archive log of the preset data table (the amount of data is only about one-fourth of the log), and then these changes Apply to the target database, and then realize the synchronization of the preset data table with the target server.
  • the target server can obtain the user identity information that characterizes the breakpoint data in the first time, and the coupling between the various code modules during the operation of the entire client The degree of reduction reduces the complexity of process processing, and the transmission time is shortened accordingly.
  • FIG. 3 is a schematic flowchart of a second embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment of the above-mentioned breakpoint data transmission method, a second implementation of the breakpoint data transmission method of the present application is proposed example.
  • step S40 includes:
  • Step S401 Read the log data of the preset data table, analyze the log data, and the log data represents the classification result of the behavior data.
  • this embodiment can use the capture process of GoldenGate software (Extract Process) Read the log data of the preset data table, and the log data represents the classification result of the behavior data in step S30. Then analyze the log data, extract the behavior data related to the addition, deletion, and modification operations of the preset data table in the log data; classify the behavior data, and convert the classification result of the behavior data into The intermediate format predefined by the GoldenGate software is stored in the local transaction data management TDM queue file.
  • GoldenGate software Extract Process
  • Step S402 When the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains user identity information according to the data addition information.
  • the classification result of the behavior data of the local transaction data management queue file includes new data information, that is, the analysis result is that when a new row of data is found in the preset data table in the log data, it will be transmitted through GoldenGate
  • the process transmits the TDM queue file to the target server in the form of TCP protocol or IP protocol, so that the target server caches the new data information in the transaction data management cache queue, and manages the cache queue according to the transaction data
  • the new information in China Data acquires user identity information; the data can be compressed with a compression ratio of up to 10:1, reducing the resource occupation of the target server.
  • the target server includes a preset database
  • the preset database is a relational database, such as Sql Server Database, or MySQL database;
  • the target server will read data addition information from the TDM transaction data management cache queue, and create a corresponding SQL statement based on the structure of the data table corresponding to the data addition information in the preset database, such as the data
  • the newly added information involves the five attributes of the user’s name a, gender b, mobile phone number c, contact email d, and ID card e.
  • the preset database in the target server is associated with the user
  • the data table t1 corresponding to the information may only have the two important attributes of the user's mobile phone number and ID card, so the corresponding SQL statement created will be: INSERT INTO t1 (mobile phone number, ID card) VALUE("c", "e”);
  • the user identity information is obtained from the newly added information of the data, and the user identity information is written into the preset database through the SQL statement, so that the user identity information can be obtained faster, that is, the downstream target server can first Get breakpoint data at a time.
  • FIG. 4 is a schematic flowchart of a third embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment or the second embodiment of the above breakpoint data transmission method, the breakpoint of this application is proposed The third embodiment of the data transmission method.
  • step S40 specifically includes:
  • Step S40' Transmit the classification result to the target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result, and displays the user identity information, so that The customer service staff feeds back a return visit request based on the user identity information.
  • the target server can characterize the computer terminal used by the customer service staff of the agency.
  • the computer terminal receives the user identity information that can characterize the data breakpoint, it will display the user identity information and prompt the customer service staff to The user has a corresponding data breakpoint, that is, the transaction authentication fails, so that the customer service staff feedback a return visit request based on the user identity information.
  • the user identity information may include the user's mobile phone number, contact email address, ID card and other information; and the return visit request fed back by the customer service staff includes at least one of a telephone return visit, a short message return visit, and an email return visit.
  • the customer service personnel of this embodiment can make a telephone return visit to the user whose identity recognition is unsuccessful for the first time, which improves the user experience.
  • this application also proposes a breakpoint data transmission device, which includes:
  • the identification module 10 is used to respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
  • the obtaining module 20 is configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
  • the classification module 30 is configured to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
  • the transmission module 40 is configured to transmit the classification result to a target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result.
  • breakpoint data transmission device of this implementation may be a computer application client, which is loaded in the above-mentioned device for breakpoint data transmission.
  • the specific implementation of the breakpoint data transmission device of this application Refer to the above-mentioned method embodiment of the breakpoint data transmission device, which will not be repeated here.
  • this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a computer
  • the readable instructions are configured to implement the steps of the breakpoint data transmission method as described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Disclosed by the present application are a breakpoint data transmission method, apparatus, device, and non-volatile storage medium. In the present application, a response to an identity authentication request initiated by a user is first made, and a data breakpoint is identified according to the result of the identity authentication request; then the data breakpoint is sent to a preset thread queue, the preset thread queue obtains user behavior data according to the data breakpoint, and stores the behavior data in a preset data table to classify the behavior data and obtain a classification result; lastly, the classification result is transmitted to destination server in order to enable the destination server to promptly obtain from the classification result the user identity information representing the breakpoint data; the degree of coupling between the various code modules is decreased during the whole operation process, reducing the complexity of processing; the transmission time is also shortened accordingly, improving the efficiency of transaction institutions during transmission of data breakpoints.

Description

断点数据传输方法、装置、设备及非易失性存储介质 Breakpoint data transmission method, device, equipment and non-volatile storage medium To
本申请要求于2019年05月29日提交中国专利局、申请号为201910467874.0、发明名称为“一种断点数据传输方法、装置、设备及非易失性存储介质”的中国专利申请的优先权,其全部内容通过引用结合在申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office, the application number is 201910467874.0, and the invention title is "a method, device, equipment and non-volatile storage medium for breakpoint data transmission" on May 29, 2019 , Its entire content is incorporated in the application by reference.
技术领域 Technical field
本申请涉及计算机信息技术领域,尤其涉及一种断点数据传输方法、装置、设备及非易失性存储介质。This application relates to the field of computer information technology, and in particular to a method, device, device, and non-volatile storage medium for transmitting breakpoint data.
背景技术Background technique
发明人意识到用户在使用智能终端(例如智能手机)上装载的具有资金交易功能的应用程序客户端进行资金交易时,该客户端对应的服务器会对用户发起的交易请求操作进行身份认证处理,例如涉及到重大经济利益的交易操作环节时,可能需要用户进行生理识别(如人脸识别、指纹识别、声音识别等),当用户身份信息认证不通过时,该交易操作即为断点,该断点数据传输的流程一般为断点识别-数据加工-交易处理端-返回结束,如果用同步数据方式存在重要弊端,数据耦合性高,数据传输时间长,等到下游***数据处理完成了才算断点数据传输完成。也就是说该操作环节对应的交易服务器在需要过很长时间之后才能获取该用户通过APP进行相关的数据操作,整个流程跨度长。如果该交易服务器在某个时间段有多起交易需要处理时,那么数据量大(10万级以上),届时流程会复杂,影响用户的体验。The inventor realizes that when a user uses an application client with a capital transaction function loaded on a smart terminal (such as a smart phone) to conduct a capital transaction, the server corresponding to the client performs identity authentication processing on the transaction request operation initiated by the user. For example, when a transaction operation involving major economic interests is involved, the user may be required to perform physiological recognition (such as face recognition, fingerprint recognition, voice recognition, etc.). When the user’s identity information authentication fails, the transaction operation is a breakpoint. The process of breakpoint data transmission is generally breakpoint recognition-data processing-transaction processing end-return end. If there are important drawbacks in the synchronous data method, data coupling is high, data transmission time is long, and it will not be counted until the downstream system data processing is completed. The breakpoint data transfer is complete. That is to say, it takes a long time for the transaction server corresponding to the operation link to obtain the user's relevant data operations through the APP, and the entire process span is long. If the transaction server has multiple transactions that need to be processed in a certain period of time, the amount of data is large (above 100,000), and the process will be complicated by then, affecting the user experience.
上述内容仅用于辅助理解本申请的技术方案,并不代表承认上述内容是现有技术。The above content is only used to assist the understanding of the technical solution of this application, and does not mean that the above content is recognized as prior art.
发明内容Summary of the invention
本申请的主要目的在于提供了一种断点数据传输方法、装置、设备以及非易失性存储介质,旨在解决目前传统的交易机构在进行数据断点传输时,数据传输时间长,数据耦合性高的问题。The main purpose of this application is to provide a breakpoint data transmission method, device, equipment, and non-volatile storage medium, which aims to solve the problem of long data transmission time and data coupling when traditional transaction institutions perform data breakpoint transmission. The problem of high sex.
为实现上述目的,本申请提供了一种断点数据传输方法,所述方法包括:In order to achieve the above objective, this application provides a breakpoint data transmission method, which includes:
响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;Respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;Sending the data breakpoint into a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果; Storing the behavior data in a preset data table to classify the behavior data to obtain a classification result;
将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。The classification result is transmitted to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
此外,为实现上述目的,本申请还提出一种断点数据传输装置,所述装置包括:In addition, in order to achieve the above-mentioned object, this application also proposes a breakpoint data transmission device, which includes:
识别模块,用于响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;The identification module is used to respond to the identity authentication request initiated by the user and identify the data breakpoint according to the result of the identity authentication request;
获取模块,用于将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;An obtaining module, configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
分类模块,用于将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果; The classification module is used to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
传输模块,用于将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。The transmission module is configured to transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
此外,为实现上述目的,本申请还提出一种用于断点数据传输的设备,所述设备包括:In addition, in order to achieve the above purpose, this application also proposes a device for breakpoint data transmission, and the device includes:
一个或多个处理器;One or more processors;
存储器;Memory
一个或多个应用程序,其中,所述一个或多个应用程序被存储在所述存储器中并被配置为由所述一个或多个处理器执行,所述一个或多个应用程序配置用于执行一种断点数据传输方法的步骤。One or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, and the one or more application programs are configured to Perform the steps of a breakpoint data transfer method.
此外,为实现上述目的,本申请还提出一种非易失性存储介质,所述非易失性存储介质为非易失性计算机可读存储介质,所述非易失性存储介质存储有一个或多个应用程序,所述一个或多个应用程序配置为实现如上所述的断点数据传输方法的步骤。In addition, in order to achieve the above object, this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a Or multiple application programs, the one or more application programs configured to implement the steps of the breakpoint data transmission method as described above.
本申请首先响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;再将数据断点送入预设线程队列中,由预设线程队列根据数据断点获取用户的行为数据;将行为数据存入预设数据表中,以对行为数据进行分类,得到分类结果;最后将分类结果传输到目标服务器,以使得目标服务器第一时间从分类结果中获取表征断点数据的用户身份信息,整个运行过程中各个代码模块之间的耦合度降低,减少了流程处理的复杂度,传输时间也相应地缩短,提高了交易机构传输数据断点时的效率。This application first responds to the identity authentication request initiated by the user, and identifies the data breakpoint according to the result of the identity authentication request; then sends the data breakpoint to the preset thread queue, and the preset thread queue obtains the user's behavior data according to the data breakpoint; The behavior data is stored in the preset data table to classify the behavior data to obtain the classification result; finally, the classification result is transmitted to the target server, so that the target server can obtain the user identity representing the breakpoint data from the classification result as soon as possible Information, the coupling between various code modules during the entire operation process is reduced, reducing the complexity of process processing, and the transmission time is correspondingly shortened, which improves the efficiency of transaction institutions when transmitting data breakpoints.
附图说明Description of the drawings
图1为本申请实施例方案涉及的硬件运行环境的用于断点数据传输的设备的结构示意图;FIG. 1 is a schematic structural diagram of a device for breakpoint data transmission in a hardware operating environment involved in a solution of an embodiment of the application;
图2为本申请一种断点数据传输方法第一实施例的流程示意图;2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application;
图3为本申请一种断点数据传输方法第二实施例的流程示意图;3 is a schematic flowchart of a second embodiment of a method for transmitting breakpoint data according to this application;
图4为本申请一种断点数据传输方法第三实施例流程示意图; 4 is a schematic flowchart of a third embodiment of a method for transmitting breakpoint data according to this application;
图5为本申请一种断点数据传输装置的结构框图。Fig. 5 is a structural block diagram of a breakpoint data transmission device of this application.
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization, functional characteristics, and advantages of the purpose of this application will be further described in conjunction with the embodiments and with reference to the accompanying drawings.
具体实施方式Detailed ways
参照图1,图1为本申请实施例方案涉及的硬件运行环境的用于断点数据传输设备的结构示意图。Referring to FIG. 1, FIG. 1 is a schematic structural diagram of a device for transmission of breakpoint data in a hardware operating environment involved in a solution of an embodiment of the application.
如图1所示,该设备可以包括:一个或多个处理器1001,例如CPU,通信总线1002、用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。As shown in FIG. 1, the device may include: one or more processors 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Among them, the communication bus 1002 is used to implement connection and communication between these components. The user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. The network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface). The memory 1005 can be a high-speed RAM memory or a stable memory (non-volatile memory), such as disk storage. Optionally, the memory 1005 may also be a storage device independent of the foregoing processor 1001.
本领域技术人员可以理解,图1中示出的结构并不构成对所述设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。所述设备可以是用户使用的计算机设备,例如智能手机。Those skilled in the art can understand that the structure shown in FIG. 1 does not constitute a limitation on the device, and may include more or fewer components than those shown in the figure, or combine certain components, or arrange different components. The device may be a computer device used by the user, such as a smart phone.
如图1所示,作为一种非易失性计算机可读存储介质的存储器1005中可以包括操作***、网络通信模块、用户接收模块以及一个或多个应用程序。As shown in FIG. 1, the memory 1005, which is a non-volatile computer-readable storage medium, may include an operating system, a network communication module, a user receiving module, and one or more application programs.
在图1所示的设备中,所述处理器通过处理器1001调用存储器1005中存储的一个或多个应用程序,并执行断点数据传输方法的步骤。In the device shown in FIG. 1, the processor calls one or more application programs stored in the memory 1005 through the processor 1001, and executes the steps of the breakpoint data transmission method.
参照图2,图2为本申请一种断点数据传输方法第一实施例的流程示意图。Referring to FIG. 2, FIG. 2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application.
本实施例中,所述断点数据传输方法包括以下步骤:In this embodiment, the breakpoint data transmission method includes the following steps:
步骤S10:响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点。Step S10: In response to the identity authentication request initiated by the user, the data breakpoint is identified according to the result of the identity authentication request.
需要说明的是,本实施例的执行主体为上述断点数据传输设备的处理器,所述断点数据传输设备可以表征具有资金交易功能的应用程序客户端。It should be noted that the execution subject of this embodiment is the processor of the above-mentioned breakpoint data transmission device, and the breakpoint data transmission device may represent an application client with a fund transaction function.
可理解的是,用户在使用所述客户端进行资金交易时,用户会基于客户端显示的认证界面来发起身份认证请求到与所述客户端对应的验证服务器,例如需要用户进行生理识别(如人脸识别、指纹识别、声音识别等),在身份认证请求结果不通过时,识别出资金交易的数据断点。It is understandable that when a user uses the client to conduct a fund transaction, the user will initiate an identity authentication request to the verification server corresponding to the client based on the authentication interface displayed on the client. For example, the user is required to perform physiological identification (such as Face recognition, fingerprint recognition, voice recognition, etc.), when the result of the identity authentication request fails, the data breakpoint of the fund transaction is identified.
例如,以人脸识别为例,在用户人脸识别几次没有通过后,客户端可能会在预设时段对用户的后续操作进行禁止(如禁止用户6小时进行交易)。For example, taking face recognition as an example, after the user's face recognition fails several times, the client may prohibit the user's subsequent operations during a preset period of time (such as prohibiting the user from trading for 6 hours).
在具体实现中,处理器响应用户发起的身份认证请求,获取所述身份认证请求的开始事件;在所述身份认证请求中的预设事件被触发时,根据所述开始事件以及被触发的预设事件得到数据断点。In a specific implementation, the processor obtains the start event of the identity authentication request in response to the identity authentication request initiated by the user; when the preset event in the identity authentication request is triggered, according to the start event and the triggered preset Set the event to get the data breakpoint.
本实施例的识别断点的规则可依据CRM(Customer Relationship Management,客户关系管理程序)设置的断点识别规则来处理。The rules for identifying breakpoints in this embodiment can be based on CRM (Customer Relationship Management, customer relationship management program) set the breakpoint identification rules to deal with.
具体地,客户关系管理程序可以设置:将用户在触发开始事件 x小时,未触发的结束事件(即所述预设事件)定义为断点,相应的断点触发成功代码为S。开始事件和结束事件都是用户的操作轨迹,x是用户操作轨迹的时间间隔。例如:张三到某个金融机构去借款,张三移交了人脸识别,但审核不通过,***10小时没检测到张三再次提交人脸或者再次审核不通过,就会生成人脸识别审核不通过断点 ;开始事件是人脸识别不通过,结束事件是再次提交人脸识别,时间隔间是10小时。Specifically, the customer relationship management program can be set: the user will trigger the start event For x hours, the untriggered end event (that is, the preset event) is defined as a breakpoint, and the corresponding breakpoint trigger success code is S. Both the start event and the end event are the user's operation track, and x is the time interval of the user's operation track. For example: Zhang San went to a financial institution to borrow money, Zhang San handed over face recognition, but failed the review, and the system did not detect that Zhang San submitted his face again for 10 hours or failed the review again, a face recognition review would be generated Breakpoint not passed ; The start event is that the face recognition fails, and the end event is to submit the face recognition again. The time interval is 10 hours.
本实施例在响应用户的认证请求后,会调用事件函数CheUpdateEvent()实时地对断点触发成功代码为S进行监听,在监听结果为断点触发成功时,即识别出数据断点。 In this embodiment, after responding to the user's authentication request, the event function CheUpdateEvent() is called to monitor the breakpoint triggering success code S in real time. When the monitoring result is that the breakpoint triggering is successful, the data breakpoint is identified. To
步骤S20:将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;Step S20: Send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
在具体实现中,客户端在识别出的数据断点后,会将数据断点传给CRM,CRM会将接收到数据断点送入预设线程队列中;In specific implementation, after the client has identified the data breakpoint, it will pass the data breakpoint to the CRM, and the CRM will send the received data breakpoint to the preset thread queue;
预设线程队列的作用在于:客户端对应的服务器在某段时间可能会响应多个不同用户发起的身份验证请求,将识别出的数据断点按照身份验证请求的时间顺序依次送入预设线程队列中;所述预设线程队列可以是CRM线程队列,线程队列中包含以用户请求的时间顺序排列成的断点;The function of the preset thread queue is: the server corresponding to the client may respond to authentication requests initiated by multiple different users at a certain period of time, and send the identified data breakpoints to the preset thread in sequence according to the time sequence of the authentication request In a queue; the preset thread queue may be a CRM thread queue, and the thread queue contains breakpoints arranged in the time sequence of user requests;
然后,CRM线程队列会根据数据断点来获取用户的行为数据,用户发起的身份验证请求中会包括开始事件和结束事件(即所述预设事件),开始事件和结束事件构成了用户的操作轨迹,可从用户的操作轨迹中获取用户的行为数据。Then, the CRM thread queue will obtain the user's behavior data according to the data breakpoint. The authentication request initiated by the user will include the start event and the end event (that is, the preset event). The start event and the end event constitute the user's operation Track, the user's behavior data can be obtained from the user's operation track.
步骤S30:将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果。Step S30: Store the behavior data in a preset data table to classify the behavior data to obtain a classification result.
在具体实现中,会对用户的行为数据进行分析,用户的行为数据包括用户输入验证信息的记录;通常涉及资金交易的客户端在对一个用户的身份信息进行验证的时候需要进行多重验证,如手机验证、身份证信息验证、回答自己设定的提问的验证、以及人脸验证这些都属于身份验证。In the specific implementation, the user's behavior data will be analyzed. The user's behavior data includes the record of the user's input verification information; usually the client involved in the fund transaction needs to perform multiple verifications when verifying the identity information of a user, such as Mobile phone verification, ID card information verification, verification of answering questions set by yourself, and face verification are all identity verification.
具体地,处理器会实时地识别出有价值的用户信息,即处理器会按照不同的预定格式对所述行为数据进行分析,得到不同格式的数据;然后将不同格式的数据存入预设数据表中,以对所述行为数据进行分类,从分类结果中得到用户身份信息;Specifically, the processor will identify valuable user information in real time, that is, the processor will analyze the behavior data according to different predetermined formats to obtain data in different formats; and then store the data in different formats into the preset data In the table, the behavior data is classified to obtain user identity information from the classification result;
例如用户的行为数据包括用户的手机号、联系邮箱、身份证等信息,而这些信息都是有预定格式的,例如手机号码是11为数字,其对应的预定格式为int(11)的整数数据类型;身份证是18为数字,其对应的预定格式为int(18)的整数数据类型;而邮箱对应的预定格式为包含@的模糊字符串。For example, the user's behavior data includes the user's mobile phone number, contact email, ID card and other information, and these information are all in a predetermined format, for example, the mobile phone number is 11 for a number, and its corresponding predetermined format is integer data in int (11) Type; ID is 18 for a number, and its corresponding predetermined format is an integer data type of int (18); and the predetermined format corresponding to the mailbox is a fuzzy string containing @.
相应地,所述预设数据表中预先设置好类型为int(11)的手机号码、类型为int(18)的身份证信息、以及包含了@的模糊字符串类型邮箱相应的列属性,这样在所述行为数据被存入预设数据表后,能够实现行为数据进行分类,进而得到用户身份信息。Correspondingly, the mobile phone number of type int (11), ID information of type int (18), and the corresponding column attributes of the fuzzy string type mailbox containing @ are preset in the preset data table, so After the behavior data is stored in the preset data table, the behavior data can be classified to obtain user identity information.
步骤S40:将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。Step S40: Transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
需要说明的是,所述目标服务器可以与上述客户端对应的服务器一致。 It should be noted that the target server may be the same as the server corresponding to the client.
具体地, 本实施例的断点数据传输设备可以装载GoldenGate软件,利用GoldenGate软件的交易数据管理(TDM,Transactional Data Management),可以在异构的IT基础结构之间实现大量数据的秒一级的数据捕捉、转换和投递。GoldenGate可以支持几乎所有常用操作***和数据库平台。在检测到所述数据库与目标服务器之间处于通讯状态时,执行所述将所述用户身份信息同步到目标服务器的步骤。specifically, The breakpoint data transmission device of this embodiment can be loaded with GoldenGate software, and use the Transactional Data Management (TDM) of GoldenGate software. Management), which can realize the second-level data capture, conversion and delivery of large amounts of data between heterogeneous IT infrastructures. GoldenGate can support almost all common operating systems and database platforms. When it is detected that the database and the target server are in a communication state, the step of synchronizing the user identity information to the target server is performed.
即所述断点数据传输设备可通过 GoldenGate将所述数据表中用户的分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取用户不同的身份信息,以实现客户端与其下游目标服务器的数据及时同步。即利用GoldenGate软件基于日志的结构化数据复制方式,通过解析所述预设数据表的在线日志或归档日志获得数据的增删改变化(数据量只有日志的四分之一左右),再将这些变化应用到目标数据库,进而实现所述预设数据表与目标服务器同步,目标服务器能够第一时间获取表征所述断点数据的用户身份信息,整个客户端在运行过程中各个代码模块之间的耦合度降低,减少了流程处理的复杂度,传输时间也相应地缩短。That is, the breakpoint data transmission device can pass GoldenGate transmits the classification result of the user in the data table to the target server, so that the target server obtains the user's different identity information from the classification result, so as to realize timely synchronization of data between the client and its downstream target server. That is, the GoldenGate software uses the log-based structured data replication method to obtain data additions, deletions and changes by analyzing the online log or archive log of the preset data table (the amount of data is only about one-fourth of the log), and then these changes Apply to the target database, and then realize the synchronization of the preset data table with the target server. The target server can obtain the user identity information that characterizes the breakpoint data in the first time, and the coupling between the various code modules during the operation of the entire client The degree of reduction reduces the complexity of process processing, and the transmission time is shortened accordingly.
进一步地,参照图3,图3为本申请一断点数据传输方法第二实施例的流程示意图,基于上述断点数据传输方法第一实施例,提出本申请的断点数据传输方法第二实施例。Further, referring to FIG. 3, FIG. 3 is a schematic flowchart of a second embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment of the above-mentioned breakpoint data transmission method, a second implementation of the breakpoint data transmission method of the present application is proposed example.
本实施例中,所述步骤S40,包括:In this embodiment, the step S40 includes:
步骤S401,读取所述预设数据表的日志数据,对所述日志数据进行解析,所述日志数据表征所述行为数据的分类结果。Step S401: Read the log data of the preset data table, analyze the log data, and the log data represents the classification result of the behavior data.
具体地,本实施例可利用GoldenGate软件的捕捉进程(Extract Process)读取所述预设数据表的日志数据,所述日志数据表征上述步骤S30的行为数据的分类结果。然后对所述日志数据进行解析,提取所述日志数据中与所述预设数据表的增删改操作相关的行为数据;对所述行为数据进行分类,并将所述行为数据的分类结果转换为所述GoldenGate软件预定义的中间格式存放在本地的交易数据管理TDM队列文件中。Specifically, this embodiment can use the capture process of GoldenGate software (Extract Process) Read the log data of the preset data table, and the log data represents the classification result of the behavior data in step S30. Then analyze the log data, extract the behavior data related to the addition, deletion, and modification operations of the preset data table in the log data; classify the behavior data, and convert the classification result of the behavior data into The intermediate format predefined by the GoldenGate software is stored in the local transaction data management TDM queue file.
步骤S402,在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器根据所述数据新增信息获取用户身份信息。Step S402: When the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains user identity information according to the data addition information.
在具体实现中,在本地的交易数据管理队列文件的行为数据的分类结果中包括数据新增信息,即解析结果为日志数据中发现预设数据表新添加了一行数据时,会通过GoldenGate的传送进程将TDM队列文件以TCP协议或者IP协议的方式传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理的缓存队列中,并根据所述交易数据管理缓存队列中数据新增信息获取用户身份信息;可以通过高达10:1的压缩率对数据进行压缩,降低目标服务器的资源占有。In specific implementation, the classification result of the behavior data of the local transaction data management queue file includes new data information, that is, the analysis result is that when a new row of data is found in the preset data table in the log data, it will be transmitted through GoldenGate The process transmits the TDM queue file to the target server in the form of TCP protocol or IP protocol, so that the target server caches the new data information in the transaction data management cache queue, and manages the cache queue according to the transaction data The new information in China Data acquires user identity information; the data can be compressed with a compression ratio of up to 10:1, reducing the resource occupation of the target server.
具体地,所述目标服务器包括预设数据库,所述预设数据库为关系型数据库,例如Sql Server 数据库、或者MySQL数据库;Specifically, the target server includes a preset database, and the preset database is a relational database, such as Sql Server Database, or MySQL database;
目标服务器会从所述TDM交易数据管理缓存队列中读取数据新增信息,基于所述预设数据库中与所述数据新增信息对应的数据表的结构创建相应的SQL语句,例如所述数据新增信息涉及用户的姓名a、性别b、手机号c、联系邮箱d和身份证e这五条属性,但是目标服务器中的预设数据库为了达到数据压缩的目的,所述预设数据库中与用户信息对应的数据表t1可能只有用户的手机号和身份证这两条重要的属性,因此创建的相应的SQL语句会是:INSERT INTO t1(手机号,身份证) VALUE(“c”,“e”);The target server will read data addition information from the TDM transaction data management cache queue, and create a corresponding SQL statement based on the structure of the data table corresponding to the data addition information in the preset database, such as the data The newly added information involves the five attributes of the user’s name a, gender b, mobile phone number c, contact email d, and ID card e. However, in order to achieve the purpose of data compression, the preset database in the target server is associated with the user The data table t1 corresponding to the information may only have the two important attributes of the user's mobile phone number and ID card, so the corresponding SQL statement created will be: INSERT INTO t1 (mobile phone number, ID card) VALUE("c", "e");
然后从所述数据新增信息中获取用户身份信息,通过所述SQL语句将所述用户身份信息写入所述预设数据库中,能够更快地获取用户身份信息,即下游的目标服务器能够第一时间获取断点数据。Then the user identity information is obtained from the newly added information of the data, and the user identity information is written into the preset database through the SQL statement, so that the user identity information can be obtained faster, that is, the downstream target server can first Get breakpoint data at a time.
进一步地,参照图4,图4为本申请一断点数据传输方法的第三实施例的流程示意图,基于上述断点数据传输方法第一实施例或第二实施例,提出本申请的断点数据传输方法第三实施例。Further, referring to FIG. 4, FIG. 4 is a schematic flowchart of a third embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment or the second embodiment of the above breakpoint data transmission method, the breakpoint of this application is proposed The third embodiment of the data transmission method.
本实施例中,所述步骤S40具体包括:In this embodiment, the step S40 specifically includes:
步骤S40`:将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息,并对所述用户身份信息进行展示,以使得客服人员基于所述用户身份信息反馈回访请求。Step S40': Transmit the classification result to the target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result, and displays the user identity information, so that The customer service staff feeds back a return visit request based on the user identity information.
可理解的是,所述目标服务器可以表征该机构客服人员使用的计算机终端,计算机终端在接收到能够表征数据断点的用户身份信息时,会对所述用户身份信息进行展示,提示客服人员该用户有对应的数据断点,即交易认证失败,以使得客服人员基于所述用户身份信息反馈回访请求。It is understandable that the target server can characterize the computer terminal used by the customer service staff of the agency. When the computer terminal receives the user identity information that can characterize the data breakpoint, it will display the user identity information and prompt the customer service staff to The user has a corresponding data breakpoint, that is, the transaction authentication fails, so that the customer service staff feedback a return visit request based on the user identity information.
其中,用户身份信息可以包括用户的手机号、联系邮箱、身份证等信息等;而客服人员反馈的回访请求至少包括电话回访、短信回访、以及邮箱回访中的一种。Among them, the user identity information may include the user's mobile phone number, contact email address, ID card and other information; and the return visit request fed back by the customer service staff includes at least one of a telephone return visit, a short message return visit, and an email return visit.
本实施例的客服人员能够第一时间对身份识别不成功的用户进行电话回访了,提高用户使用体验。The customer service personnel of this embodiment can make a telephone return visit to the user whose identity recognition is unsuccessful for the first time, which improves the user experience.
此外,参照图5,本申请还提出一种断点数据传输装置,所述装置包括:In addition, referring to FIG. 5, this application also proposes a breakpoint data transmission device, which includes:
识别模块10,用于响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;The identification module 10 is used to respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
获取模块20,用于将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;The obtaining module 20 is configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
分类模块30,用于将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果; The classification module 30 is configured to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
传输模块40,用于将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。The transmission module 40 is configured to transmit the classification result to a target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result.
可理解的是,本实施的断点数据传输装置可以是一种计算机应用程序客户端,该客户端装载在上述用于断点数据传输的设备中,本申请断点数据传输装置的具体实现方式可参照上述断点数据传输装置方法实施例,此处不再赘述。 It is understandable that the breakpoint data transmission device of this implementation may be a computer application client, which is loaded in the above-mentioned device for breakpoint data transmission. The specific implementation of the breakpoint data transmission device of this application Refer to the above-mentioned method embodiment of the breakpoint data transmission device, which will not be repeated here. To
此外,为实现上述目的,本申请还提出一种非易失性存储介质,所述非易失性存储介质为非易失性计算机可读存储介质,所述非易失性存储介质存储有计算机可读指令,所述计算机可读指令配置为实现如上所述的断点数据传输方法的步骤。In addition, in order to achieve the above object, this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a computer The readable instructions are configured to implement the steps of the breakpoint data transmission method as described above.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者***不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者***所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者***中还存在另外的相同要素。It should be noted that in this article, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or system including a series of elements not only includes those elements, It also includes other elements that are not explicitly listed, or elements inherent to the process, method, article, or system. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, article or system that includes the element.
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the foregoing embodiments of the present application are only for description, and do not represent the advantages and disadvantages of the embodiments.
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。The above are only preferred embodiments of this application, and do not limit the scope of this application. Any equivalent structure or equivalent process transformation made using the content of the description and drawings of this application, or directly or indirectly used in other related technical fields , The same reason is included in the scope of patent protection of this application.

Claims (20)

  1. 一种断点数据传输方法,所述方法包括: A breakpoint data transmission method, the method includes:
    响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;Respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
    将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;Sending the data breakpoint into a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
    将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果; Storing the behavior data in a preset data table to classify the behavior data to obtain a classification result;
    将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。The classification result is transmitted to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  2. 如权利要求1所述的方法,所述响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点的步骤,包括:The method according to claim 1, wherein the step of identifying the data breakpoint according to the result of the identity authentication request in response to the identity authentication request initiated by the user comprises:
    响应用户发起的身份认证请求,获取所述身份认证请求的开始事件;Responding to the identity authentication request initiated by the user, obtaining the start event of the identity authentication request;
    在所述身份认证请求中的预设事件被触发时,根据所述开始事件以及被触发的预设事件得到数据断点。When the preset event in the identity authentication request is triggered, a data breakpoint is obtained according to the start event and the triggered preset event.
  3. 如权利要求1所述的方法,所述将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息的步骤,包括:The method according to claim 1, wherein the step of transmitting the classification result to a target server so that the target server obtains user identity information representing the breakpoint data from the classification result comprises:
    读取所述预设数据表的日志数据,对所述日志数据进行解析,所述日志数据表征所述行为数据的分类结果;Read log data of the preset data table, analyze the log data, and the log data represents a classification result of the behavior data;
    在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器根据所述数据新增信息获取用户身份信息。When the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains user identity information according to the data addition information.
  4. 如权利要求3所述的方法,所述在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器根据所述数据新增信息获取用户身份信息的步骤,包括:The method of claim 3, wherein when the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains the user identity according to the data addition information The information steps include:
    在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理缓存队列中,并根据所述交易数据管理缓存队列中数据新增信息获取用户身份信息。When the analysis result includes data addition information, the data addition information is transmitted to the target server, so that the target server caches the data addition information in the transaction data management cache queue, and according to the transaction The newly added information of data in the data management cache queue obtains user identity information.
  5. 如权利要求4所述的方法,所述读取所述预设数据表的日志数据,对所述日志数据进行解析的步骤,包括:5. The method of claim 4, wherein the step of reading log data of the preset data table and analyzing the log data comprises:
    利用GoldenGate软件的捕捉进程读取所述预设数据表的日志数据;Using the capture process of GoldenGate software to read the log data of the preset data table;
    对所述日志数据进行解析,提取所述日志数据中与所述预设数据表的增删改操作相关的行为数据;Parse the log data, and extract behavior data related to the addition, deletion, and modification operations of the preset data table in the log data;
    对所述行为数据进行分类,并将所述行为数据的分类结果转换为所述GoldenGate软件预定义的中间格式存放在本地的交易数据管理队列文件中。The behavior data is classified, and the classification result of the behavior data is converted into an intermediate format predefined by the GoldenGate software and stored in a local transaction data management queue file.
  6. 如权利要求5所述的方法,所述目标服务器包括预设数据库;8. The method of claim 5, wherein the target server includes a preset database;
    所述在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理缓存队列中,并根据所述交易数据管理缓存队列中数据新增信息获取用户身份信息的步骤,包括:When the analysis result includes data addition information, the data addition information is transmitted to the target server, so that the target server caches the data addition information in the transaction data management cache queue, and according to all The steps of acquiring user identity information by adding data in the transaction data management cache queue include:
    在本地的交易数据管理队列文件的行为数据的分类结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理缓存队列中,基于所述预设数据库中与所述数据新增信息对应的数据表的结构创建相应的sql语句,从所述数据新增信息中获取用户身份信息,通过所述sql语句将所述用户身份信息写入所述预设数据库中。 When the classification result of the behavior data of the local transaction data management queue file includes data addition information, the data addition information is transmitted to the target server, so that the target server caches the data addition information in the transaction In the data management cache queue, a corresponding SQL statement is created based on the structure of the data table corresponding to the added data information in the preset database, and user identity information is obtained from the added data information, and the SQL statement The user identity information is written into the preset database. To
  7. 如权利要求1所述的方法,所述将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息的步骤,包括:The method according to claim 1, wherein the step of transmitting the classification result to a target server so that the target server obtains user identity information representing the breakpoint data from the classification result comprises:
    将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息,并对所述用户身份信息进行展示,以使得客服人员基于所述用户身份信息反馈回访请求,所述回访请求至少包括电话回访、短信回访、以及邮箱回访中的一种。The classification result is transmitted to the target server, so that the target server obtains the user identity information that characterizes the breakpoint data from the classification result, and displays the user identity information, so that the customer service personnel are based on the The user identity information feedback return visit request, the return visit request includes at least one of a telephone return visit, a short message return visit, and a mailbox return visit.
  8. 如权利要求2所述的方法,所述将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息的步骤,包括:The method according to claim 2, wherein the step of transmitting the classification result to a target server, so that the target server obtains user identity information representing the breakpoint data from the classification result, comprises:
    将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息,并对所述用户身份信息进行展示,以使得客服人员基于所述用户身份信息反馈回访请求,所述回访请求至少包括电话回访、短信回访、以及邮箱回访中的一种。The classification result is transmitted to the target server, so that the target server obtains the user identity information that characterizes the breakpoint data from the classification result, and displays the user identity information, so that the customer service personnel are based on the The user identity information feedback return visit request, the return visit request includes at least one of a telephone return visit, a short message return visit, and a mailbox return visit.
  9. 一种断点数据传输装置,所述装置包括:A breakpoint data transmission device, the device includes:
    识别模块,用于响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;The identification module is used to respond to the identity authentication request initiated by the user and identify the data breakpoint according to the result of the identity authentication request;
    获取模块,用于将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;An obtaining module, configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
    分类模块,用于将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果; The classification module is used to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
    传输模块,用于将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。The transmission module is configured to transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  10. 一种用于断点数据传输的设备,所述设备包括:A device for breakpoint data transmission, the device includes:
    一个或多个处理器;One or more processors;
    存储器;Memory
    一个或多个应用程序,其中,所述一个或多个应用程序被存储在所述存储器中并被配置为由所述一个或多个处理器执行,所述一个或多个应用程序配置用于执行一种断点数据传输方法:One or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, and the one or more application programs are configured to Perform a breakpoint data transfer method:
    其中,所述断点数据传输方法包括以下步骤:Wherein, the breakpoint data transmission method includes the following steps:
    响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;Respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
    将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;Sending the data breakpoint into a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
    将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果; Storing the behavior data in a preset data table to classify the behavior data to obtain a classification result;
    将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。The classification result is transmitted to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  11. 如权利要求10所述的用于断点数据传输的设备,所述响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点的步骤,包括:The device for breakpoint data transmission according to claim 10, wherein the step of identifying the data breakpoint according to the result of the identity authentication request in response to the identity authentication request initiated by the user comprises:
    响应用户发起的身份认证请求,获取所述身份认证请求的开始事件;Responding to the identity authentication request initiated by the user, obtaining the start event of the identity authentication request;
    在所述身份认证请求中的预设事件被触发时,根据所述开始事件以及被触发的预设事件得到数据断点。When the preset event in the identity authentication request is triggered, a data breakpoint is obtained according to the start event and the triggered preset event.
  12. 如权利要求10所述的用于断点数据传输的设备,所述将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息的步骤,包括:The device for transmission of breakpoint data according to claim 10, said transmitting said classification result to a target server, so that said target server obtains from said classification result a user identity characterizing said breakpoint data The information steps include:
    读取所述预设数据表的日志数据,对所述日志数据进行解析,所述日志数据表征所述行为数据的分类结果;Read log data of the preset data table, analyze the log data, and the log data represents a classification result of the behavior data;
    在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器根据所述数据新增信息获取用户身份信息。When the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains user identity information according to the data addition information.
  13. 如权利要求12所述的用于断点数据传输的设备,所述在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器根据所述数据新增信息获取用户身份信息的步骤,包括:The device for breakpoint data transmission according to claim 12, wherein when the analysis result includes data addition information, the data addition information is transmitted to the target server, so that the target server is based on the The steps for obtaining user identity information by adding information to data include:
    在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理缓存队列中,并根据所述交易数据管理缓存队列中数据新增信息获取用户身份信息。When the analysis result includes data addition information, the data addition information is transmitted to the target server, so that the target server caches the data addition information in the transaction data management cache queue, and according to the transaction The newly added information of data in the data management cache queue obtains user identity information.
  14. 如权利要求13所述于断点数据传输的设备,所述读取所述预设数据表的日志数据,对所述日志数据进行解析的步骤,包括:The device for data transmission at a breakpoint according to claim 13, wherein the step of reading the log data of the preset data table and analyzing the log data comprises:
    利用GoldenGate软件的捕捉进程读取所述预设数据表的日志数据;Using the capture process of GoldenGate software to read the log data of the preset data table;
    对所述日志数据进行解析,提取所述日志数据中与所述预设数据表的增删改操作相关的行为数据;Parse the log data, and extract behavior data related to the addition, deletion, and modification operations of the preset data table in the log data;
    对所述行为数据进行分类,并将所述行为数据的分类结果转换为所述GoldenGate软件预定义的中间格式存放在本地的交易数据管理队列文件中。The behavior data is classified, and the classification result of the behavior data is converted into an intermediate format predefined by the GoldenGate software and stored in a local transaction data management queue file.
  15. 如权利要求14所述的用于断点数据传输的设备,所述目标服务器包括预设数据库;The device for breakpoint data transmission according to claim 14, wherein the target server includes a preset database;
    所述在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理缓存队列中,并根据所述交易数据管理缓存队列中数据新增信息获取用户身份信息的步骤,包括:When the analysis result includes data addition information, the data addition information is transmitted to the target server, so that the target server caches the data addition information in the transaction data management cache queue, and according to all The steps of acquiring user identity information by adding data in the transaction data management cache queue include:
    在本地的交易数据管理队列文件的行为数据的分类结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理缓存队列中,基于所述预设数据库中与所述数据新增信息对应的数据表的结构创建相应的sql语句,从所述数据新增信息中获取用户身份信息,通过所述sql语句将所述用户身份信息写入所述预设数据库中。 When the classification result of the behavior data of the local transaction data management queue file includes data addition information, the data addition information is transmitted to the target server, so that the target server caches the data addition information in the transaction In the data management cache queue, a corresponding SQL statement is created based on the structure of the data table corresponding to the added data information in the preset database, and user identity information is obtained from the added data information, and the SQL statement The user identity information is written into the preset database. To
  16. 如权利要求10所述的用于断点数据传输的设备,所述将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息的步骤,包括:The device for transmission of breakpoint data according to claim 10, said transmitting said classification result to a target server, so that said target server obtains from said classification result a user identity characterizing said breakpoint data The information steps include:
    将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息,并对所述用户身份信息进行展示,以使得客服人员基于所述用户身份信息反馈回访请求,所述回访请求至少包括电话回访、短信回访、以及邮箱回访中的一种。The classification result is transmitted to the target server, so that the target server obtains the user identity information that characterizes the breakpoint data from the classification result, and displays the user identity information, so that the customer service personnel are based on the The user identity information feedback return visit request, the return visit request includes at least one of a telephone return visit, a short message return visit, and a mailbox return visit.
  17. 一种非易失性存储介质,所述非易失性存储介质为非易失性计算机可读存储介质,所述非易失性存储介质存储有一个或多个应用程序,所述一个或多个应用程序被处理器执行时,配置为实现下步骤:A non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, the non-volatile storage medium stores one or more application programs, the one or more When an application is executed by the processor, it is configured to implement the following steps:
    响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点;Respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
    将所述数据断点送入预设线程队列中,由所述预设线程队列根据所述数据断点获取所述用户的行为数据;Sending the data breakpoint into a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
    将所述行为数据存入预设数据表中,以对所述行为数据进行分类,得到分类结果; Storing the behavior data in a preset data table to classify the behavior data to obtain a classification result;
    将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息。The classification result is transmitted to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  18. 如权利要求17所述的非易失性存储介质,所述响应用户发起的身份认证请求,根据身份认证请求结果识别出数据断点的步骤,包括:The non-volatile storage medium according to claim 17, wherein the step of identifying a data breakpoint according to the result of the identity authentication request in response to the identity authentication request initiated by the user comprises:
    响应用户发起的身份认证请求,获取所述身份认证请求的开始事件;Responding to the identity authentication request initiated by the user, obtaining the start event of the identity authentication request;
    在所述身份认证请求中的预设事件被触发时,根据所述开始事件以及被触发的预设事件得到数据断点。When the preset event in the identity authentication request is triggered, a data breakpoint is obtained according to the start event and the triggered preset event.
  19. 如权利要求17所述的非易失性存储介质,所述将所述分类结果传输到目标服务器,以使得所述目标服务器从所述分类结果中获取表征所述断点数据的用户身份信息的步骤,包括:The non-volatile storage medium according to claim 17, said transmitting the classification result to a target server, so that the target server obtains the user identity information that characterizes the breakpoint data from the classification result The steps include:
    读取所述预设数据表的日志数据,对所述日志数据进行解析,所述日志数据表征所述行为数据的分类结果;Read log data of the preset data table, analyze the log data, and the log data represents a classification result of the behavior data;
    在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器根据所述数据新增信息获取用户身份信息。When the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains user identity information according to the data addition information.
  20. 如权利要求19所述的非易失性存储介质,所述在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器根据所述数据新增信息获取用户身份信息的步骤,包括:The non-volatile storage medium according to claim 19, wherein when the analysis result includes data addition information, the data addition information is transmitted to the target server, so that the target server updates the data according to the data The steps to add information to obtain user identity information include:
    在解析结果中包括数据新增信息时,将所述数据新增信息传送至目标服务器,以使得所述目标服务器将所述数据新增信息缓存到交易数据管理缓存队列中,并根据所述交易数据管理缓存队列中数据新增信息获取用户身份信息。 When the analysis result includes data addition information, the data addition information is transmitted to the target server, so that the target server caches the data addition information in the transaction data management cache queue, and according to the transaction The newly added information of data in the data management cache queue obtains user identity information. To
PCT/CN2019/102422 2019-05-29 2019-08-26 Breakpoint data transmission method, apparatus, device, and non-volatile storage medium WO2020237858A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910467874.0A CN110336791B (en) 2019-05-29 2019-05-29 Method, device and equipment for transmitting breakpoint data and computer storage medium
CN201910467874.0 2019-05-29

Publications (1)

Publication Number Publication Date
WO2020237858A1 true WO2020237858A1 (en) 2020-12-03

Family

ID=68140511

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/102422 WO2020237858A1 (en) 2019-05-29 2019-08-26 Breakpoint data transmission method, apparatus, device, and non-volatile storage medium

Country Status (2)

Country Link
CN (1) CN110336791B (en)
WO (1) WO2020237858A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225649A (en) * 2022-07-19 2022-10-21 维沃移动通信有限公司 Data synchronization method and device and electronic equipment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111045768B (en) * 2019-11-27 2023-06-23 青岛歌尔智能传感器有限公司 Application method of chart module, application device of chart module and storage medium
CN113918657B (en) * 2021-12-14 2022-03-15 天津南大通用数据技术股份有限公司 Parallel high-performance incremental synchronization method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170364697A1 (en) * 2015-02-12 2017-12-21 Tencent Technology (Shenzhen) Company Limited Data interworking method and data interworking device
CN107798037A (en) * 2017-04-26 2018-03-13 平安科技(深圳)有限公司 The acquisition methods and server of user characteristic data
CN109375913A (en) * 2018-09-11 2019-02-22 中铁程科技有限责任公司 Data processing method and device
CN109615393A (en) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 The follow-up processing method and processing device of breakpoint

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530269B (en) * 2014-09-28 2019-04-09 阿里巴巴集团控股有限公司 Data interactive method and system and server
CN107704473A (en) * 2016-08-09 2018-02-16 ***通信集团四川有限公司 A kind of data processing method and device
CN107864120A (en) * 2017-09-25 2018-03-30 国土资源部珠宝玉石首饰管理中心深圳珠宝研究所 Auth method, device and computer-readable recording medium
CN107911227B (en) * 2017-09-28 2020-04-28 平安科技(深圳)有限公司 Breakpoint data follow-up method, electronic device and computer-readable storage medium
CN109062690A (en) * 2018-07-18 2018-12-21 郑州云海信息技术有限公司 A kind of request responding method, server, medium and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170364697A1 (en) * 2015-02-12 2017-12-21 Tencent Technology (Shenzhen) Company Limited Data interworking method and data interworking device
CN107798037A (en) * 2017-04-26 2018-03-13 平安科技(深圳)有限公司 The acquisition methods and server of user characteristic data
CN109375913A (en) * 2018-09-11 2019-02-22 中铁程科技有限责任公司 Data processing method and device
CN109615393A (en) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 The follow-up processing method and processing device of breakpoint

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225649A (en) * 2022-07-19 2022-10-21 维沃移动通信有限公司 Data synchronization method and device and electronic equipment

Also Published As

Publication number Publication date
CN110336791A (en) 2019-10-15
CN110336791B (en) 2022-02-22

Similar Documents

Publication Publication Date Title
WO2020237858A1 (en) Breakpoint data transmission method, apparatus, device, and non-volatile storage medium
WO2020119116A1 (en) Medical insurance auditing method, apparatus and device based on data analysis, and storage medium
WO2019144738A1 (en) Financial service verification method, apparatus and device, and computer storage medium
WO2020034526A1 (en) Quality inspection method, apparatus, device and computer storage medium for insurance recording
WO2020006852A1 (en) Travel expenses self-service reimbursement verification processing method, apparatus and device, and computer storage medium
WO2020215681A1 (en) Indication information generation method and apparatus, terminal, and storage medium
WO2020078053A1 (en) Medical data anomaly detection method, apparatus, and device, and storage medium
US9058350B2 (en) Computer-implemented method of determining validity of a command line
WO2020015067A1 (en) Data acquisition method, device, equipment and storage medium
WO2020119384A1 (en) Medical insurance abnormity detection method, apparatus and device based on big data analysis, and medium
WO2020233090A1 (en) Application configuration method, apparatus and device based on h5 page, and storage medium
WO2020119176A1 (en) Reimbursement data checking method, identification server, and storage medium
WO2020258657A1 (en) Abnormality detection method and apparatus, computer device and storage medium
WO2020253135A1 (en) Automated analysis method and device, user equipment, and storage medium
WO2020000632A1 (en) Invoice issuing method, apparatus and device, and computer-readable storage medium
WO2020108111A1 (en) Medical insurance fraud behavior identification method, apparatus, device and readable storage medium
WO2017107367A1 (en) Method for user identifier processing, terminal and nonvolatile computer readable storage medium thereof
WO2014012477A1 (en) Network information pushing system and method
WO2021072881A1 (en) Object storage-based request processing method, apparatus and device, and storage medium
WO2020253115A1 (en) Voice recognition-based product recommendation method, apparatus and device, and storage medium
WO2020062641A1 (en) Method for identifying user role, and user equipment, storage medium, and apparatus for identifying user role
US20150149293A1 (en) Advertisement storage method and advertisement insertion method, device, and system
WO2020107899A1 (en) Medical cost prediction method, device and equipment, and computer-readable storage medium
WO2020062658A1 (en) Contract generation method and apparatus, and device and storage medium
WO2020253131A1 (en) Bank card payment method, apparatus and device, and computer storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19930790

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19930790

Country of ref document: EP

Kind code of ref document: A1