WO2020237858A1 - Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt - Google Patents

Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt Download PDF

Info

Publication number
WO2020237858A1
WO2020237858A1 PCT/CN2019/102422 CN2019102422W WO2020237858A1 WO 2020237858 A1 WO2020237858 A1 WO 2020237858A1 CN 2019102422 W CN2019102422 W CN 2019102422W WO 2020237858 A1 WO2020237858 A1 WO 2020237858A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
breakpoint
target server
information
classification result
Prior art date
Application number
PCT/CN2019/102422
Other languages
English (en)
Chinese (zh)
Inventor
谢富华
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020237858A1 publication Critical patent/WO2020237858A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9063Intermediate storage in different physical parts of a node or terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Definitions

  • This application relates to the field of computer information technology, and in particular to a method, device, device, and non-volatile storage medium for transmitting breakpoint data.
  • the inventor realizes that when a user uses an application client with a capital transaction function loaded on a smart terminal (such as a smart phone) to conduct a capital transaction, the server corresponding to the client performs identity authentication processing on the transaction request operation initiated by the user. For example, when a transaction operation involving major economic interests is involved, the user may be required to perform physiological recognition (such as face recognition, fingerprint recognition, voice recognition, etc.). When the user’s identity information authentication fails, the transaction operation is a breakpoint.
  • the process of breakpoint data transmission is generally breakpoint recognition-data processing-transaction processing end-return end. If there are important drawbacks in the synchronous data method, data coupling is high, data transmission time is long, and it will not be counted until the downstream system data processing is completed.
  • the breakpoint data transfer is complete. That is to say, it takes a long time for the transaction server corresponding to the operation link to obtain the user's relevant data operations through the APP, and the entire process span is long. If the transaction server has multiple transactions that need to be processed in a certain period of time, the amount of data is large (above 100,000), and the process will be complicated by then, affecting the user experience.
  • the main purpose of this application is to provide a breakpoint data transmission method, device, equipment, and non-volatile storage medium, which aims to solve the problem of long data transmission time and data coupling when traditional transaction institutions perform data breakpoint transmission.
  • this application provides a breakpoint data transmission method, which includes:
  • the classification result is transmitted to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  • this application also proposes a breakpoint data transmission device, which includes:
  • the identification module is used to respond to the identity authentication request initiated by the user and identify the data breakpoint according to the result of the identity authentication request;
  • An obtaining module configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
  • the classification module is used to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
  • the transmission module is configured to transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  • this application also proposes a device for breakpoint data transmission, and the device includes:
  • One or more processors are One or more processors;
  • One or more application programs wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, and the one or more application programs are configured to Perform the steps of a breakpoint data transfer method.
  • this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a Or multiple application programs, the one or more application programs configured to implement the steps of the breakpoint data transmission method as described above.
  • This application first responds to the identity authentication request initiated by the user, and identifies the data breakpoint according to the result of the identity authentication request; then sends the data breakpoint to the preset thread queue, and the preset thread queue obtains the user's behavior data according to the data breakpoint; The behavior data is stored in the preset data table to classify the behavior data to obtain the classification result; finally, the classification result is transmitted to the target server, so that the target server can obtain the user identity representing the breakpoint data from the classification result as soon as possible Information, the coupling between various code modules during the entire operation process is reduced, reducing the complexity of process processing, and the transmission time is correspondingly shortened, which improves the efficiency of transaction institutions when transmitting data breakpoints.
  • FIG. 1 is a schematic structural diagram of a device for breakpoint data transmission in a hardware operating environment involved in a solution of an embodiment of the application;
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application;
  • FIG. 3 is a schematic flowchart of a second embodiment of a method for transmitting breakpoint data according to this application;
  • FIG. 4 is a schematic flowchart of a third embodiment of a method for transmitting breakpoint data according to this application.
  • Fig. 5 is a structural block diagram of a breakpoint data transmission device of this application.
  • FIG. 1 is a schematic structural diagram of a device for transmission of breakpoint data in a hardware operating environment involved in a solution of an embodiment of the application.
  • the device may include: one or more processors 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 can be a high-speed RAM memory or a stable memory (non-volatile memory), such as disk storage.
  • the memory 1005 may also be a storage device independent of the foregoing processor 1001.
  • the device may be a computer device used by the user, such as a smart phone.
  • the memory 1005 which is a non-volatile computer-readable storage medium, may include an operating system, a network communication module, a user receiving module, and one or more application programs.
  • the processor calls one or more application programs stored in the memory 1005 through the processor 1001, and executes the steps of the breakpoint data transmission method.
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for transmitting breakpoint data according to this application.
  • the breakpoint data transmission method includes the following steps:
  • Step S10 In response to the identity authentication request initiated by the user, the data breakpoint is identified according to the result of the identity authentication request.
  • the execution subject of this embodiment is the processor of the above-mentioned breakpoint data transmission device, and the breakpoint data transmission device may represent an application client with a fund transaction function.
  • the user when a user uses the client to conduct a fund transaction, the user will initiate an identity authentication request to the verification server corresponding to the client based on the authentication interface displayed on the client. For example, the user is required to perform physiological identification (such as Face recognition, fingerprint recognition, voice recognition, etc.), when the result of the identity authentication request fails, the data breakpoint of the fund transaction is identified.
  • physiological identification such as Face recognition, fingerprint recognition, voice recognition, etc.
  • the client may prohibit the user's subsequent operations during a preset period of time (such as prohibiting the user from trading for 6 hours).
  • the processor obtains the start event of the identity authentication request in response to the identity authentication request initiated by the user; when the preset event in the identity authentication request is triggered, according to the start event and the triggered preset Set the event to get the data breakpoint.
  • the rules for identifying breakpoints in this embodiment can be based on CRM (Customer Relationship Management, customer relationship management program) set the breakpoint identification rules to deal with.
  • CRM Customer Relationship Management, customer relationship management program
  • the customer relationship management program can be set: the user will trigger the start event For x hours, the untriggered end event (that is, the preset event) is defined as a breakpoint, and the corresponding breakpoint trigger success code is S. Both the start event and the end event are the user's operation track, and x is the time interval of the user's operation track.
  • Zhang San went to a financial institution to borrow money, Zhang San handed over face recognition, but failed the review, and the system did not detect that Zhang San submitted his face again for 10 hours or failed the review again, a face recognition review would be generated Breakpoint not passed ;
  • the start event is that the face recognition fails, and the end event is to submit the face recognition again.
  • the time interval is 10 hours.
  • the event function CheUpdateEvent() is called to monitor the breakpoint triggering success code S in real time.
  • the monitoring result is that the breakpoint triggering is successful, the data breakpoint is identified.
  • Step S20 Send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
  • the client after the client has identified the data breakpoint, it will pass the data breakpoint to the CRM, and the CRM will send the received data breakpoint to the preset thread queue;
  • the function of the preset thread queue is: the server corresponding to the client may respond to authentication requests initiated by multiple different users at a certain period of time, and send the identified data breakpoints to the preset thread in sequence according to the time sequence of the authentication request In a queue; the preset thread queue may be a CRM thread queue, and the thread queue contains breakpoints arranged in the time sequence of user requests;
  • the CRM thread queue will obtain the user's behavior data according to the data breakpoint.
  • the authentication request initiated by the user will include the start event and the end event (that is, the preset event).
  • the start event and the end event constitute the user's operation Track, the user's behavior data can be obtained from the user's operation track.
  • Step S30 Store the behavior data in a preset data table to classify the behavior data to obtain a classification result.
  • the user's behavior data will be analyzed.
  • the user's behavior data includes the record of the user's input verification information; usually the client involved in the fund transaction needs to perform multiple verifications when verifying the identity information of a user, such as Mobile phone verification, ID card information verification, verification of answering questions set by yourself, and face verification are all identity verification.
  • the processor will identify valuable user information in real time, that is, the processor will analyze the behavior data according to different predetermined formats to obtain data in different formats; and then store the data in different formats into the preset data In the table, the behavior data is classified to obtain user identity information from the classification result;
  • the user's behavior data includes the user's mobile phone number, contact email, ID card and other information, and these information are all in a predetermined format, for example, the mobile phone number is 11 for a number, and its corresponding predetermined format is integer data in int (11) Type; ID is 18 for a number, and its corresponding predetermined format is an integer data type of int (18); and the predetermined format corresponding to the mailbox is a fuzzy string containing @.
  • the mobile phone number of type int (11), ID information of type int (18), and the corresponding column attributes of the fuzzy string type mailbox containing @ are preset in the preset data table, so After the behavior data is stored in the preset data table, the behavior data can be classified to obtain user identity information.
  • Step S40 Transmit the classification result to a target server, so that the target server obtains user identity information that characterizes the breakpoint data from the classification result.
  • target server may be the same as the server corresponding to the client.
  • the breakpoint data transmission device of this embodiment can be loaded with GoldenGate software, and use the Transactional Data Management (TDM) of GoldenGate software. Management), which can realize the second-level data capture, conversion and delivery of large amounts of data between heterogeneous IT infrastructures.
  • TDM Transactional Data Management
  • GoldenGate can support almost all common operating systems and database platforms.
  • the breakpoint data transmission device can pass GoldenGate transmits the classification result of the user in the data table to the target server, so that the target server obtains the user's different identity information from the classification result, so as to realize timely synchronization of data between the client and its downstream target server.
  • the GoldenGate software uses the log-based structured data replication method to obtain data additions, deletions and changes by analyzing the online log or archive log of the preset data table (the amount of data is only about one-fourth of the log), and then these changes Apply to the target database, and then realize the synchronization of the preset data table with the target server.
  • the target server can obtain the user identity information that characterizes the breakpoint data in the first time, and the coupling between the various code modules during the operation of the entire client The degree of reduction reduces the complexity of process processing, and the transmission time is shortened accordingly.
  • FIG. 3 is a schematic flowchart of a second embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment of the above-mentioned breakpoint data transmission method, a second implementation of the breakpoint data transmission method of the present application is proposed example.
  • step S40 includes:
  • Step S401 Read the log data of the preset data table, analyze the log data, and the log data represents the classification result of the behavior data.
  • this embodiment can use the capture process of GoldenGate software (Extract Process) Read the log data of the preset data table, and the log data represents the classification result of the behavior data in step S30. Then analyze the log data, extract the behavior data related to the addition, deletion, and modification operations of the preset data table in the log data; classify the behavior data, and convert the classification result of the behavior data into The intermediate format predefined by the GoldenGate software is stored in the local transaction data management TDM queue file.
  • GoldenGate software Extract Process
  • Step S402 When the analysis result includes data addition information, the data addition information is transmitted to a target server, so that the target server obtains user identity information according to the data addition information.
  • the classification result of the behavior data of the local transaction data management queue file includes new data information, that is, the analysis result is that when a new row of data is found in the preset data table in the log data, it will be transmitted through GoldenGate
  • the process transmits the TDM queue file to the target server in the form of TCP protocol or IP protocol, so that the target server caches the new data information in the transaction data management cache queue, and manages the cache queue according to the transaction data
  • the new information in China Data acquires user identity information; the data can be compressed with a compression ratio of up to 10:1, reducing the resource occupation of the target server.
  • the target server includes a preset database
  • the preset database is a relational database, such as Sql Server Database, or MySQL database;
  • the target server will read data addition information from the TDM transaction data management cache queue, and create a corresponding SQL statement based on the structure of the data table corresponding to the data addition information in the preset database, such as the data
  • the newly added information involves the five attributes of the user’s name a, gender b, mobile phone number c, contact email d, and ID card e.
  • the preset database in the target server is associated with the user
  • the data table t1 corresponding to the information may only have the two important attributes of the user's mobile phone number and ID card, so the corresponding SQL statement created will be: INSERT INTO t1 (mobile phone number, ID card) VALUE("c", "e”);
  • the user identity information is obtained from the newly added information of the data, and the user identity information is written into the preset database through the SQL statement, so that the user identity information can be obtained faster, that is, the downstream target server can first Get breakpoint data at a time.
  • FIG. 4 is a schematic flowchart of a third embodiment of a breakpoint data transmission method according to this application. Based on the first embodiment or the second embodiment of the above breakpoint data transmission method, the breakpoint of this application is proposed The third embodiment of the data transmission method.
  • step S40 specifically includes:
  • Step S40' Transmit the classification result to the target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result, and displays the user identity information, so that The customer service staff feeds back a return visit request based on the user identity information.
  • the target server can characterize the computer terminal used by the customer service staff of the agency.
  • the computer terminal receives the user identity information that can characterize the data breakpoint, it will display the user identity information and prompt the customer service staff to The user has a corresponding data breakpoint, that is, the transaction authentication fails, so that the customer service staff feedback a return visit request based on the user identity information.
  • the user identity information may include the user's mobile phone number, contact email address, ID card and other information; and the return visit request fed back by the customer service staff includes at least one of a telephone return visit, a short message return visit, and an email return visit.
  • the customer service personnel of this embodiment can make a telephone return visit to the user whose identity recognition is unsuccessful for the first time, which improves the user experience.
  • this application also proposes a breakpoint data transmission device, which includes:
  • the identification module 10 is used to respond to the identity authentication request initiated by the user, and identify the data breakpoint according to the result of the identity authentication request;
  • the obtaining module 20 is configured to send the data breakpoint to a preset thread queue, and the preset thread queue obtains the behavior data of the user according to the data breakpoint;
  • the classification module 30 is configured to store the behavior data in a preset data table to classify the behavior data to obtain a classification result;
  • the transmission module 40 is configured to transmit the classification result to a target server, so that the target server obtains the user identity information representing the breakpoint data from the classification result.
  • breakpoint data transmission device of this implementation may be a computer application client, which is loaded in the above-mentioned device for breakpoint data transmission.
  • the specific implementation of the breakpoint data transmission device of this application Refer to the above-mentioned method embodiment of the breakpoint data transmission device, which will not be repeated here.
  • this application also proposes a non-volatile storage medium, the non-volatile storage medium is a non-volatile computer-readable storage medium, and the non-volatile storage medium stores a computer
  • the readable instructions are configured to implement the steps of the breakpoint data transmission method as described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne un procédé, un appareil, un dispositif et un support de stockage non volatil de transmission de données de point d'arrêt. Dans la présente invention, une réponse à une demande d'authentification d'identité lancée par un utilisateur est d'abord effectuée, et un point d'arrêt de données est identifié selon le résultat de la demande d'authentification d'identité ; puis le point d'arrêt de données est envoyé à une file d'attente de fil prédéfinie, la file d'attente de fil prédéfinie obtient des données de comportement d'utilisateur selon le point d'arrêt de données, et stocke les données de comportement dans une table de données prédéfinie pour classifier les données de comportement et obtenir un résultat de classification ; enfin, le résultat de classification est transmis à un serveur de destination afin de permettre au serveur de destination d'obtenir rapidement, à partir du résultat de classification, les informations d'identité d'utilisateur représentant les données de point d'arrêt ; le niveau de couplage entre les divers modules de code est réduit pendant l'ensemble du processus de fonctionnement, ce qui réduit la complexité de traitement ; le temps de transmission est également réduit en conséquence, ce qui améliore l'efficacité des institutions de transaction pendant la transmission de points d'arrêt de données.
PCT/CN2019/102422 2019-05-29 2019-08-26 Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt WO2020237858A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910467874.0A CN110336791B (zh) 2019-05-29 2019-05-29 一种断点数据传输方法、装置、设备及计算机存储介质
CN201910467874.0 2019-05-29

Publications (1)

Publication Number Publication Date
WO2020237858A1 true WO2020237858A1 (fr) 2020-12-03

Family

ID=68140511

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/102422 WO2020237858A1 (fr) 2019-05-29 2019-08-26 Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt

Country Status (2)

Country Link
CN (1) CN110336791B (fr)
WO (1) WO2020237858A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225649A (zh) * 2022-07-19 2022-10-21 维沃移动通信有限公司 数据同步方法、装置和电子设备

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111045768B (zh) * 2019-11-27 2023-06-23 青岛歌尔智能传感器有限公司 图表模块的应用方法、图表模块的应用装置及存储介质
CN113918657B (zh) * 2021-12-14 2022-03-15 天津南大通用数据技术股份有限公司 一种并行高性能增量同步方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170364697A1 (en) * 2015-02-12 2017-12-21 Tencent Technology (Shenzhen) Company Limited Data interworking method and data interworking device
CN107798037A (zh) * 2017-04-26 2018-03-13 平安科技(深圳)有限公司 用户特征数据的获取方法及服务器
CN109375913A (zh) * 2018-09-11 2019-02-22 中铁程科技有限责任公司 数据处理方法及装置
CN109615393A (zh) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 断点的跟进处理方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530269B (zh) * 2014-09-28 2019-04-09 阿里巴巴集团控股有限公司 数据交互方法和***以及服务器
CN107704473A (zh) * 2016-08-09 2018-02-16 ***通信集团四川有限公司 一种数据处理方法和装置
CN107864120A (zh) * 2017-09-25 2018-03-30 国土资源部珠宝玉石首饰管理中心深圳珠宝研究所 身份验证方法、装置及计算机可读存储介质
CN107911227B (zh) * 2017-09-28 2020-04-28 平安科技(深圳)有限公司 一种断点数据跟进方法、电子装置及计算机可读存储介质
CN109062690A (zh) * 2018-07-18 2018-12-21 郑州云海信息技术有限公司 一种请求响应方法、服务器、介质及***

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170364697A1 (en) * 2015-02-12 2017-12-21 Tencent Technology (Shenzhen) Company Limited Data interworking method and data interworking device
CN107798037A (zh) * 2017-04-26 2018-03-13 平安科技(深圳)有限公司 用户特征数据的获取方法及服务器
CN109375913A (zh) * 2018-09-11 2019-02-22 中铁程科技有限责任公司 数据处理方法及装置
CN109615393A (zh) * 2018-10-23 2019-04-12 平安科技(深圳)有限公司 断点的跟进处理方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225649A (zh) * 2022-07-19 2022-10-21 维沃移动通信有限公司 数据同步方法、装置和电子设备

Also Published As

Publication number Publication date
CN110336791A (zh) 2019-10-15
CN110336791B (zh) 2022-02-22

Similar Documents

Publication Publication Date Title
WO2020237858A1 (fr) Procédé, appareil, dispositif et support de stockage non volatil de transmission de données de point d'arrêt
WO2020119116A1 (fr) Procédé, appareil et dispositif de vérification d'assurance médicale basés sur l'analyse de données et support de stockage
WO2019144738A1 (fr) Procédé de vérification de service financier, appareil et dispositif, et support d'informations informatique
WO2020034526A1 (fr) Procédé d'inspection de qualité, appareil, dispositif et support de stockage informatique pour l'enregistrement d'une assurance
WO2020006852A1 (fr) Procédé, appareil et dispositif de traitement de vérification de remboursement de frais de déplacement en libre-service et support de stockage informatique
WO2020215681A1 (fr) Procédé et appareil de génération d'informations d'indication, terminal et support de stockage
WO2020078053A1 (fr) Procédé, appareil et dispositif de détection d'anomalies de données médicales et support d'informations
US9058350B2 (en) Computer-implemented method of determining validity of a command line
WO2020015067A1 (fr) Procédé d'acquisition de données, dispositif, équipement et support de stockage
WO2020119384A1 (fr) Procédé, appareil et dispositif de détection d'anomalie d'assurance médicale sur la base d'une analyse de mégadonnées, et support
WO2020233090A1 (fr) Procédé, appareil et dispositif de configuration d'application basés sur une page h5, et support de stockage
WO2020119176A1 (fr) Procédé de vérification de données de remboursement, serveur d'identification et support de stockage
WO2020258657A1 (fr) Procédé et appareil de détection d'anomalie, dispositif informatique et support d'informations
WO2020253135A1 (fr) Procédé et dispositif d'analyse automatique, équipement utilisateur et support de stockage
WO2020000632A1 (fr) Procédé, appareil et dispositif d'émission de facture, et support d'informations lisible par ordinateur
WO2020108111A1 (fr) Procédé d'identification de comportement de fraude d'assurance médicale, appareil, dispositif et support de mémoire lisible
WO2017107367A1 (fr) Procédé de traitement d'identifiants d'utilisateurs, terminal et son support de stockage non volatile lisible par ordinateur
WO2014012477A1 (fr) Système et procédé de pousser d'information de réseau
WO2021072881A1 (fr) Procédé, appareil et dispositif de traitement de demande fondée sur un stockage d'objet, et support de stockage
WO2020253115A1 (fr) Procédé, appareil et dispositif de recommandation de produit basés sur une reconnaissance vocale et support de stockage
WO2020062641A1 (fr) Procédé d'identification d'un rôle d'utilisateur, équipement utilisateur, support d'informations et appareil d'identification d'un rôle d'utilisateur
US20150149293A1 (en) Advertisement storage method and advertisement insertion method, device, and system
WO2020107899A1 (fr) Procédé, dispositif et équipement de prédiction de coût médical, et support d'informations lisible par ordinateur
WO2020062658A1 (fr) Procédé et appareil de génération de contrat, dispositif et support de stockage
WO2020253131A1 (fr) Procédé, appareil et dispositif de paiement par carte bancaire, et support de stockage informatique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19930790

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19930790

Country of ref document: EP

Kind code of ref document: A1