WO2020237858A1 - Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt - Google Patents
Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt Download PDFInfo
- Publication number
- WO2020237858A1 WO2020237858A1 PCT/CN2019/102422 CN2019102422W WO2020237858A1 WO 2020237858 A1 WO2020237858 A1 WO 2020237858A1 CN 2019102422 W CN2019102422 W CN 2019102422W WO 2020237858 A1 WO2020237858 A1 WO 2020237858A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- breakpoint
- target server
- information
- classification result
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/90—Buffering arrangements
- H04L49/9063—Intermediate storage in different physical parts of a node or terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Definitions
- This application relates to the field of computer information technology, and in particular to a method, device, device, and non-volatile storage medium for transmitting breakpoint data.
- the inventor realizes that when a user uses an application client with a capital transaction function loaded on a smart terminal (such as a smart phone) to conduct a capital transaction, the server corresponding to the client performs identity authentication processing on the transaction request operation initiated by the user. For example, when a transaction operation involving major economic interests is involved, the user may be required to perform physiological recognition (such as face recognition, fingerprint recognition, voice recognition, etc.). When the user’s identity information authentication fails, the transaction operation is a breakpoint.
- the process of breakpoint data transmission is generally breakpoint recognition-data processing-transaction processing end-return end. If there are important drawbacks in the synchronous data method, data coupling is high, data transmission time is long, and it will not be counted until the downstream system data processing is completed.
- the breakpoint data transfer is complete. That is to say, it takes a long time for the transaction server corresponding to the operation link to obtain the user's relevant data operations through the APP, and the entire process span is long. If the transaction server has multiple transactions that need to be processed in a certain period of time, the amount of data is large (above 100,000), and the process will be complicated by then, affecting the user experience.
- the main purpose of this application is to provide a breakpoint data transmission method, device, equipment, and non-volatile storage medium, which aims to solve the problem of long data transmission time and data coupling when traditional transaction institutions perform data breakpoint transmission.
- this application provides a breakpoint data transmission method, which includes:
- the classification result is transmitted to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
- this application also proposes a breakpoint data transmission device, which includes:
- the identification module is used to respond to the identity authentication request initiated by the user and identify the data breakpoint according to the result of the identity authentication request;
- An obtaining module configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
- the classification module is used to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
- the transmission module is configured to transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
- this application also proposes a device for breakpoint data transmission, and the device includes:
- One or more processors are One or more processors;
- One or more application programs wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, and the one or more application programs are configured to Perform the steps of a breakpoint data transfer method.
- this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a Or multiple application programs, the one or more application programs configured to implement the steps of the breakpoint data transmission method as described above.
- This application first responds to the identity authentication request initiated by the user, and identifies the data breakpoint according to the result of the identity authentication request; then sends the data breakpoint to the preset thread queue, and the preset thread queue obtains the user's behavior data according to the data breakpoint; The behavior data is stored in the preset data table to classify the behavior data to obtain the classification result; finally, the classification result is transmitted to the target server, so that the target server can obtain the user identity representing the breakpoint data from the classification result as soon as possible Information, the coupling between various code modules during the entire operation process is reduced, reducing the complexity of process processing, and the transmission time is correspondingly shortened, which improves the efficiency of transaction institutions when transmitting data breakpoints.
- FIG. 1 is a schematic structural diagram of a device for breakpoint data transmission in a hardware operating environment involved in a solution of an embodiment of the application;
- FIG. 2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application;
- FIG. 3 is a schematic flowchart of a second embodiment of a method for transmitting breakpoint data according to this application;
- FIG. 4 is a schematic flowchart of a third embodiment of a method for transmitting breakpoint data according to this application.
- Fig. 5 is a structural block diagram of a breakpoint data transmission device of this application.
- FIG. 1 is a schematic structural diagram of a device for transmission of breakpoint data in a hardware operating environment involved in a solution of an embodiment of the application.
- the device may include: one or more processors 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
- the communication bus 1002 is used to implement connection and communication between these components.
- the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
- the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
- the memory 1005 can be a high-speed RAM memory or a stable memory (non-volatile memory), such as disk storage.
- the memory 1005 may also be a storage device independent of the foregoing processor 1001.
- the device may be a computer device used by the user, such as a smart phone.
- the memory 1005 which is a non-volatile computer-readable storage medium, may include an operating system, a network communication module, a user receiving module, and one or more application programs.
- the processor calls one or more application programs stored in the memory 1005 through the processor 1001, and executes the steps of the breakpoint data transmission method.
- FIG. 2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application.
- the breakpoint data transmission method includes the following steps:
- Step S10 In response to the identity authentication request initiated by the user, the data breakpoint is identified according to the result of the identity authentication request.
- the execution subject of this embodiment is the processor of the above-mentioned breakpoint data transmission device, and the breakpoint data transmission device may represent an application client with a fund transaction function.
- the user when a user uses the client to conduct a fund transaction, the user will initiate an identity authentication request to the verification server corresponding to the client based on the authentication interface displayed on the client. For example, the user is required to perform physiological identification (such as Face recognition, fingerprint recognition, voice recognition, etc.), when the result of the identity authentication request fails, the data breakpoint of the fund transaction is identified.
- physiological identification such as Face recognition, fingerprint recognition, voice recognition, etc.
- the client may prohibit the user's subsequent operations during a preset period of time (such as prohibiting the user from trading for 6 hours).
- the processor obtains the start event of the identity authentication request in response to the identity authentication request initiated by the user; when the preset event in the identity authentication request is triggered, according to the start event and the triggered preset Set the event to get the data breakpoint.
- the rules for identifying breakpoints in this embodiment can be based on CRM (Customer Relationship Management, customer relationship management program) set the breakpoint identification rules to deal with.
- CRM Customer Relationship Management, customer relationship management program
- the customer relationship management program can be set: the user will trigger the start event For x hours, the untriggered end event (that is, the preset event) is defined as a breakpoint, and the corresponding breakpoint trigger success code is S. Both the start event and the end event are the user's operation track, and x is the time interval of the user's operation track.
- Zhang San went to a financial institution to borrow money, Zhang San handed over face recognition, but failed the review, and the system did not detect that Zhang San submitted his face again for 10 hours or failed the review again, a face recognition review would be generated Breakpoint not passed ;
- the start event is that the face recognition fails, and the end event is to submit the face recognition again.
- the time interval is 10 hours.
- the event function CheUpdateEvent() is called to monitor the breakpoint triggering success code S in real time.
- the monitoring result is that the breakpoint triggering is successful, the data breakpoint is identified.
- Step S20 Send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
- the client after the client has identified the data breakpoint, it will pass the data breakpoint to the CRM, and the CRM will send the received data breakpoint to the preset thread queue;
- the function of the preset thread queue is: the server corresponding to the client may respond to authentication requests initiated by multiple different users at a certain period of time, and send the identified data breakpoints to the preset thread in sequence according to the time sequence of the authentication request In a queue; the preset thread queue may be a CRM thread queue, and the thread queue contains breakpoints arranged in the time sequence of user requests;
- the CRM thread queue will obtain the user's behavior data according to the data breakpoint.
- the authentication request initiated by the user will include the start event and the end event (that is, the preset event).
- the start event and the end event constitute the user's operation Track, the user's behavior data can be obtained from the user's operation track.
- Step S30 Store the behavior data in a preset data table to classify the behavior data to obtain a classification result.
- the user's behavior data will be analyzed.
- the user's behavior data includes the record of the user's input verification information; usually the client involved in the fund transaction needs to perform multiple verifications when verifying the identity information of a user, such as Mobile phone verification, ID card information verification, verification of answering questions set by yourself, and face verification are all identity verification.
- the processor will identify valuable user information in real time, that is, the processor will analyze the behavior data according to different predetermined formats to obtain data in different formats; and then store the data in different formats into the preset data In the table, the behavior data is classified to obtain user identity information from the classification result;
- the user's behavior data includes the user's mobile phone number, contact email, ID card and other information, and these information are all in a predetermined format, for example, the mobile phone number is 11 for a number, and its corresponding predetermined format is integer data in int (11) Type; ID is 18 for a number, and its corresponding predetermined format is an integer data type of int (18); and the predetermined format corresponding to the mailbox is a fuzzy string containing @.
- the mobile phone number of type int (11), ID information of type int (18), and the corresponding column attributes of the fuzzy string type mailbox containing @ are preset in the preset data table, so After the behavior data is stored in the preset data table, the behavior data can be classified to obtain user identity information.
- Step S40 Transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
- target server may be the same as the server corresponding to the client.
- the breakpoint data transmission device of this embodiment can be loaded with GoldenGate software, and use the Transactional Data Management (TDM) of GoldenGate software. Management), which can realize the second-level data capture, conversion and delivery of large amounts of data between heterogeneous IT infrastructures.
- TDM Transactional Data Management
- GoldenGate can support almost all common operating systems and database platforms.
- the breakpoint data transmission device can pass GoldenGate transmits the classification result of the user in the data table to the target server, so that the target server obtains the user's different identity information from the classification result, so as to realize timely synchronization of data between the client and its downstream target server.
- the GoldenGate software uses the log-based structured data replication method to obtain data additions, deletions and changes by analyzing the online log or archive log of the preset data table (the amount of data is only about one-fourth of the log), and then these changes Apply to the target database, and then realize the synchronization of the preset data table with the target server.
- the target server can obtain the user identity information that characterizes the breakpoint data in the first time, and the coupling between the various code modules during the operation of the entire client The degree of reduction reduces the complexity of process processing, and the transmission time is shortened accordingly.
- FIG. 3 is a schematic flowchart of a second embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment of the above-mentioned breakpoint data transmission method, a second implementation of the breakpoint data transmission method of the present application is proposed example.
- step S40 includes:
- Step S401 Read the log data of the preset data table, analyze the log data, and the log data represents the classification result of the behavior data.
- this embodiment can use the capture process of GoldenGate software (Extract Process) Read the log data of the preset data table, and the log data represents the classification result of the behavior data in step S30. Then analyze the log data, extract the behavior data related to the addition, deletion, and modification operations of the preset data table in the log data; classify the behavior data, and convert the classification result of the behavior data into The intermediate format predefined by the GoldenGate software is stored in the local transaction data management TDM queue file.
- GoldenGate software Extract Process
- Step S402 When the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains user identity information according to the data addition information.
- the classification result of the behavior data of the local transaction data management queue file includes new data information, that is, the analysis result is that when a new row of data is found in the preset data table in the log data, it will be transmitted through GoldenGate
- the process transmits the TDM queue file to the target server in the form of TCP protocol or IP protocol, so that the target server caches the new data information in the transaction data management cache queue, and manages the cache queue according to the transaction data
- the new information in China Data acquires user identity information; the data can be compressed with a compression ratio of up to 10:1, reducing the resource occupation of the target server.
- the target server includes a preset database
- the preset database is a relational database, such as Sql Server Database, or MySQL database;
- the target server will read data addition information from the TDM transaction data management cache queue, and create a corresponding SQL statement based on the structure of the data table corresponding to the data addition information in the preset database, such as the data
- the newly added information involves the five attributes of the user’s name a, gender b, mobile phone number c, contact email d, and ID card e.
- the preset database in the target server is associated with the user
- the data table t1 corresponding to the information may only have the two important attributes of the user's mobile phone number and ID card, so the corresponding SQL statement created will be: INSERT INTO t1 (mobile phone number, ID card) VALUE("c", "e”);
- the user identity information is obtained from the newly added information of the data, and the user identity information is written into the preset database through the SQL statement, so that the user identity information can be obtained faster, that is, the downstream target server can first Get breakpoint data at a time.
- FIG. 4 is a schematic flowchart of a third embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment or the second embodiment of the above breakpoint data transmission method, the breakpoint of this application is proposed The third embodiment of the data transmission method.
- step S40 specifically includes:
- Step S40' Transmit the classification result to the target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result, and displays the user identity information, so that The customer service staff feeds back a return visit request based on the user identity information.
- the target server can characterize the computer terminal used by the customer service staff of the agency.
- the computer terminal receives the user identity information that can characterize the data breakpoint, it will display the user identity information and prompt the customer service staff to The user has a corresponding data breakpoint, that is, the transaction authentication fails, so that the customer service staff feedback a return visit request based on the user identity information.
- the user identity information may include the user's mobile phone number, contact email address, ID card and other information; and the return visit request fed back by the customer service staff includes at least one of a telephone return visit, a short message return visit, and an email return visit.
- the customer service personnel of this embodiment can make a telephone return visit to the user whose identity recognition is unsuccessful for the first time, which improves the user experience.
- this application also proposes a breakpoint data transmission device, which includes:
- the identification module 10 is used to respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
- the obtaining module 20 is configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
- the classification module 30 is configured to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
- the transmission module 40 is configured to transmit the classification result to a target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result.
- breakpoint data transmission device of this implementation may be a computer application client, which is loaded in the above-mentioned device for breakpoint data transmission.
- the specific implementation of the breakpoint data transmission device of this application Refer to the above-mentioned method embodiment of the breakpoint data transmission device, which will not be repeated here.
- this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a computer
- the readable instructions are configured to implement the steps of the breakpoint data transmission method as described above.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
La présente invention concerne un procédé, un appareil, un dispositif et un support de stockage non volatil de transmission de données de point d'arrêt. Dans la présente invention, une réponse à une demande d'authentification d'identité lancée par un utilisateur est d'abord effectuée, et un point d'arrêt de données est identifié selon le résultat de la demande d'authentification d'identité ; puis le point d'arrêt de données est envoyé à une file d'attente de fil prédéfinie, la file d'attente de fil prédéfinie obtient des données de comportement d'utilisateur selon le point d'arrêt de données, et stocke les données de comportement dans une table de données prédéfinie pour classifier les données de comportement et obtenir un résultat de classification ; enfin, le résultat de classification est transmis à un serveur de destination afin de permettre au serveur de destination d'obtenir rapidement, à partir du résultat de classification, les informations d'identité d'utilisateur représentant les données de point d'arrêt ; le niveau de couplage entre les divers modules de code est réduit pendant l'ensemble du processus de fonctionnement, ce qui réduit la complexité de traitement ; le temps de transmission est également réduit en conséquence, ce qui améliore l'efficacité des institutions de transaction pendant la transmission de points d'arrêt de données.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910467874.0A CN110336791B (zh) | 2019-05-29 | 2019-05-29 | 一种断点数据传输方法、装置、设备及计算机存储介质 |
CN201910467874.0 | 2019-05-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020237858A1 true WO2020237858A1 (fr) | 2020-12-03 |
Family
ID=68140511
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/102422 WO2020237858A1 (fr) | 2019-05-29 | 2019-08-26 | Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110336791B (fr) |
WO (1) | WO2020237858A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115225649A (zh) * | 2022-07-19 | 2022-10-21 | 维沃移动通信有限公司 | 数据同步方法、装置和电子设备 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111045768B (zh) * | 2019-11-27 | 2023-06-23 | 青岛歌尔智能传感器有限公司 | 图表模块的应用方法、图表模块的应用装置及存储介质 |
CN113918657B (zh) * | 2021-12-14 | 2022-03-15 | 天津南大通用数据技术股份有限公司 | 一种并行高性能增量同步方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170364697A1 (en) * | 2015-02-12 | 2017-12-21 | Tencent Technology (Shenzhen) Company Limited | Data interworking method and data interworking device |
CN107798037A (zh) * | 2017-04-26 | 2018-03-13 | 平安科技(深圳)有限公司 | 用户特征数据的获取方法及服务器 |
CN109375913A (zh) * | 2018-09-11 | 2019-02-22 | 中铁程科技有限责任公司 | 数据处理方法及装置 |
CN109615393A (zh) * | 2018-10-23 | 2019-04-12 | 平安科技(深圳)有限公司 | 断点的跟进处理方法及装置 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105530269B (zh) * | 2014-09-28 | 2019-04-09 | 阿里巴巴集团控股有限公司 | 数据交互方法和***以及服务器 |
CN107704473A (zh) * | 2016-08-09 | 2018-02-16 | ***通信集团四川有限公司 | 一种数据处理方法和装置 |
CN107864120A (zh) * | 2017-09-25 | 2018-03-30 | 国土资源部珠宝玉石首饰管理中心深圳珠宝研究所 | 身份验证方法、装置及计算机可读存储介质 |
CN107911227B (zh) * | 2017-09-28 | 2020-04-28 | 平安科技(深圳)有限公司 | 一种断点数据跟进方法、电子装置及计算机可读存储介质 |
CN109062690A (zh) * | 2018-07-18 | 2018-12-21 | 郑州云海信息技术有限公司 | 一种请求响应方法、服务器、介质及*** |
-
2019
- 2019-05-29 CN CN201910467874.0A patent/CN110336791B/zh active Active
- 2019-08-26 WO PCT/CN2019/102422 patent/WO2020237858A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170364697A1 (en) * | 2015-02-12 | 2017-12-21 | Tencent Technology (Shenzhen) Company Limited | Data interworking method and data interworking device |
CN107798037A (zh) * | 2017-04-26 | 2018-03-13 | 平安科技(深圳)有限公司 | 用户特征数据的获取方法及服务器 |
CN109375913A (zh) * | 2018-09-11 | 2019-02-22 | 中铁程科技有限责任公司 | 数据处理方法及装置 |
CN109615393A (zh) * | 2018-10-23 | 2019-04-12 | 平安科技(深圳)有限公司 | 断点的跟进处理方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115225649A (zh) * | 2022-07-19 | 2022-10-21 | 维沃移动通信有限公司 | 数据同步方法、装置和电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN110336791A (zh) | 2019-10-15 |
CN110336791B (zh) | 2022-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020237858A1 (fr) | Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt | |
WO2020119116A1 (fr) | Procédé, appareil et dispositif de vérification d'assurance médicale basés sur l'analyse de données et support de stockage | |
WO2019144738A1 (fr) | Procédé de vérification de service financier, appareil et dispositif, et support d'informations informatique | |
WO2020034526A1 (fr) | Procédé d'inspection de qualité, appareil, dispositif et support de stockage informatique pour l'enregistrement d'une assurance | |
WO2020006852A1 (fr) | Procédé, appareil et dispositif de traitement de vérification de remboursement de frais de déplacement en libre-service et support de stockage informatique | |
WO2020215681A1 (fr) | Procédé et appareil de génération d'informations d'indication, terminal et support de stockage | |
WO2020078053A1 (fr) | Procédé, appareil et dispositif de détection d'anomalies de données médicales et support d'informations | |
US9058350B2 (en) | Computer-implemented method of determining validity of a command line | |
WO2020015067A1 (fr) | Procédé d'acquisition de données, dispositif, équipement et support de stockage | |
WO2020119384A1 (fr) | Procédé, appareil et dispositif de détection d'anomalie d'assurance médicale sur la base d'une analyse de mégadonnées, et support | |
WO2020233090A1 (fr) | Procédé, appareil et dispositif de configuration d'application basés sur une page h5, et support de stockage | |
WO2020119176A1 (fr) | Procédé de vérification de données de remboursement, serveur d'identification et support de stockage | |
WO2020258657A1 (fr) | Procédé et appareil de détection d'anomalie, dispositif informatique et support d'informations | |
WO2020253135A1 (fr) | Procédé et dispositif d'analyse automatique, équipement utilisateur et support de stockage | |
WO2020000632A1 (fr) | Procédé, appareil et dispositif d'émission de facture, et support d'informations lisible par ordinateur | |
WO2020108111A1 (fr) | Procédé d'identification de comportement de fraude d'assurance médicale, appareil, dispositif et support de mémoire lisible | |
WO2017107367A1 (fr) | Procédé de traitement d'identifiants d'utilisateurs, terminal et son support de stockage non volatile lisible par ordinateur | |
WO2014012477A1 (fr) | Système et procédé de pousser d'information de réseau | |
WO2021072881A1 (fr) | Procédé, appareil et dispositif de traitement de demande fondée sur un stockage d'objet, et support de stockage | |
WO2020253115A1 (fr) | Procédé, appareil et dispositif de recommandation de produit basés sur une reconnaissance vocale et support de stockage | |
WO2020062641A1 (fr) | Procédé d'identification d'un rôle d'utilisateur, équipement utilisateur, support d'informations et appareil d'identification d'un rôle d'utilisateur | |
US20150149293A1 (en) | Advertisement storage method and advertisement insertion method, device, and system | |
WO2020107899A1 (fr) | Procédé, dispositif et équipement de prédiction de coût médical, et support d'informations lisible par ordinateur | |
WO2020062658A1 (fr) | Procédé et appareil de génération de contrat, dispositif et support de stockage | |
WO2020253131A1 (fr) | Procédé, appareil et dispositif de paiement par carte bancaire, et support de stockage informatique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19930790 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19930790 Country of ref document: EP Kind code of ref document: A1 |