CN117649303A - Security service acceptance method, device, computer equipment and storage medium - Google Patents

Security service acceptance method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN117649303A
CN117649303A CN202311738345.2A CN202311738345A CN117649303A CN 117649303 A CN117649303 A CN 117649303A CN 202311738345 A CN202311738345 A CN 202311738345A CN 117649303 A CN117649303 A CN 117649303A
Authority
CN
China
Prior art keywords
target
service
security service
display interface
target security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311738345.2A
Other languages
Chinese (zh)
Inventor
陈庆锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Life Insurance Co ltd
Original Assignee
China Life Insurance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Life Insurance Co ltd filed Critical China Life Insurance Co ltd
Priority to CN202311738345.2A priority Critical patent/CN117649303A/en
Publication of CN117649303A publication Critical patent/CN117649303A/en
Pending legal-status Critical Current

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to a security service processing method, a security service processing device, computer equipment and a storage medium. The method comprises the following steps: when a user logs in a service platform to perform service operation, receiving text information data input by the user; responding to the text information data, displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and the target security service information after determining the target security service type matched with the text information data from preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data; and responding to the confirmation submitting operation aiming at the user in the target service display interface, and accepting the target security service content corresponding to the target service display interface. The method can improve the security business handling efficiency.

Description

Security service acceptance method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of natural language processing technologies, and in particular, to a security service processing method, a device, a computer device, and a storage medium.
Background
Security refers to a series of services provided by an insurance company in accordance with the contractual agreements and the requirements of the applicant, insured or beneficiary in order to maintain the contract as valid after the insurance contract has been validated.
When transacting security services, the user needs to know basic security knowledge, so as to select security services to be transacted and select corresponding function entries. Meanwhile, in the handling process, the region needing to be filled is usually required to be selected for multiple times, various information such as insured information, policy information and the like are manually recorded, time and labor are wasted, and the efficiency is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a secure business processing method, apparatus, computer device, and storage medium that can improve business handling efficiency.
In a first aspect, the present application provides a security service acceptance method. The method comprises the following steps:
when a user logs in a service platform to perform service operation, receiving text information data input by the user;
responding to the text information data, displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and target security service information after determining the target security service type matched with the text information data from preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data;
And responding to a confirmation submitting operation aiming at a user in the target service display interface, accepting target security service content corresponding to the target service display interface, wherein the target service display interface is determined according to the first service display interface.
In one embodiment, the target security service content is determined by:
determining initial security service content based on the target security service type and the target security service information, wherein the initial security service content comprises a candidate occupation mark and a candidate association field corresponding to the candidate occupation mark;
determining a target associated field matched with an attribute field in the target security service information from the candidate associated fields;
and processing the target occupation mark corresponding to the target association field based on the assignment information of the attribute field to obtain the target security service content.
In one embodiment, after displaying a first service presentation interface matching the target security service content in response to the text information data, the method includes:
receiving a trigger instruction, wherein the trigger instruction is triggered in a preset mode and is used for starting a suspension text box;
and responding to the triggering instruction, displaying a second service display interface, wherein the second service display interface comprises a floating text box fixed in a floating mode, and the content in the floating text box is determined according to the text information data.
In one embodiment, the floating text box has a corresponding relation with the target occupation mark, the floating text box at least comprises matching characters matched with assignment information of the target occupation mark and associated characters in text information data, and the matching characters are in a selected state;
after the second service display interface is displayed in response to the trigger instruction, the method comprises the following steps:
and responding to a selection instruction aiming at the characters in the suspension text box, displaying a third service display interface, wherein the third service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
In one embodiment, the floating text box has a corresponding relation with the target occupation mark, the floating text box at least comprises matching characters matched with assignment information of the target occupation mark and associated characters in text information data, and the matching characters are in a selected state;
after the second service display interface is displayed in response to the trigger instruction, the method comprises the following steps:
and responding to a removal instruction aiming at the characters in the floating text box, displaying a fourth service display interface, wherein the fourth service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
In one embodiment, the target security service content is determined by:
determining a candidate service object list corresponding to the target security service type based on the target security service type;
and determining a target service object matched with the service object in the target security service information from the candidate service object list, and obtaining target security service content of the target service object.
In a second aspect, the present application further provides a security service acceptance apparatus. The device comprises:
the receiving module is used for receiving text information data input by a user when the user logs in the service platform to perform service operation;
the display module is used for responding to the text information data and displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and target security service information after the target security service type matched with the text information data is determined from preset basic security service types and the target security service information corresponding to the target security service type is identified from the text information data;
and the acceptance module is used for responding to the confirmation submitting operation aiming at the user in the target service display interface and accepting the target security service content corresponding to the target service display interface, wherein the target service display interface is determined according to the first service display interface.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, the memory stores a computer program, and the processor executes the computer program to realize the following steps:
when a user logs in a service platform to perform service operation, receiving text information data input by the user;
responding to the text information data, displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and target security service information after determining the target security service type matched with the text information data from preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data;
and responding to a confirmation submitting operation aiming at a user in the target service display interface, accepting target security service content corresponding to the target service display interface, wherein the target service display interface is determined according to the first service display interface.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
When a user logs in a service platform to perform service operation, receiving text information data input by the user;
responding to the text information data, displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and target security service information after determining the target security service type matched with the text information data from preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data;
and responding to a confirmation submitting operation aiming at a user in the target service display interface, accepting target security service content corresponding to the target service display interface, wherein the target service display interface is determined according to the first service display interface.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, performs the steps of:
when a user logs in a service platform to perform service operation, receiving text information data input by the user;
responding to the text information data, displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and target security service information after determining the target security service type matched with the text information data from preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data;
And responding to a confirmation submitting operation aiming at a user in the target service display interface, accepting target security service content corresponding to the target service display interface, wherein the target service display interface is determined according to the first service display interface.
According to the security service processing method, the security service processing device, the computer equipment and the storage medium, when a user logs in the service platform to perform service operation, the front-end service platform receives text information data input by the user, responds to the text information data, and displays a first service display interface matched with target security service content, wherein the target security service content is a target security service type matched with the text information data determined from preset basic security service types, and after target security service information corresponding to the target security service type is identified from the text information data, the target security service content corresponding to the target service display interface is accepted according to the target security service type and the target security service information, and responds to confirmation submitting operation of the user in the target service display interface. The method can solve the problem that a user does not know the security service, and can hardly select which function entrance is used for handling the service, and the user does not need to sequentially select and manually enter the areas to be filled in the handling process, so that the service handling efficiency is improved.
Drawings
FIG. 1 is an application environment diagram of a security service acceptance method in one embodiment;
FIG. 2 is a flow diagram of a method of security service acceptance in one embodiment;
FIG. 3 is a flowchart of a method for handling security services according to another embodiment;
FIG. 4 is a schematic diagram of receiving text message data in another embodiment;
FIG. 5 is a schematic diagram of initial security services according to another embodiment;
FIG. 6 is a schematic diagram of a first business presentation interface matching with target security business content according to another embodiment;
FIG. 7 is a flowchart illustrating a second business presentation interface according to another embodiment;
FIG. 8 is a schematic diagram of a second business presentation interface in another embodiment;
FIG. 9 is a schematic diagram of a second business presentation interface in another embodiment;
FIG. 10 is a schematic diagram of a third business presentation interface in another embodiment;
FIG. 11 is a block diagram of a security service accepting apparatus in one embodiment;
fig. 12 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Before describing embodiments of the present application, related terms referred to in the present application will be first described.
And (3) preserving: after the personal insurance contract is validated, the insurer provides a series of services according to the contract engagement and the requirements of the applicant, insured or beneficiary in order to maintain the contract in continuous validity.
Group insurance preservation: the method has the advantages that the method is effective for the group insurance contract, the interests of the group members are guaranteed, and the insurance company updates the insurance policy information in time according to the contract agreement to assist the group members in solving a series of insurance related problems.
When a user handles security services, the user usually logs in a service platform at the front end to perform service operation, needs to know basic security knowledge so as to select the security services to be handled based on icons in a user interface, and in the handling process, the areas to be filled at different positions in the interface may need to be sequentially selected and manually input, so that service handling efficiency is low.
According to the security service acceptance method, a user can be supported to input text information data comprising specific service contents to be handled at the front end in a text description or voice description mode, the text information data are integrally input into a service platform at the front end, the service platform can send the text information data to a server end for analysis, the server end can automatically identify service types and service information in the text information data to obtain an identification result, the identification result is returned to the service platform at the front end, the service platform at the front end automatically jumps to a service display interface to be accepted based on the service types and the service information and brings the identified service information into the service display interface to reduce the user learning cost and the information input time, and service handling efficiency is improved.
The following will describe an implementation environment of the solution provided in the embodiments of the present application.
Referring to fig. 1, the security service acceptance method provided in the embodiment of the present application may be applied to an application environment as shown in fig. 1. The front-end service platform 102 communicates with the server 104 through a network, and the front-end service platform 102 may be, but not limited to, APP clients or web clients of various personal computers, notebook computers, smart phones, tablet computers, and internet of things devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
The following is a method embodiment of the present application, by which a security service acceptance method is described, and for details not disclosed in the method embodiment of the present application, reference is made to the foregoing embodiment.
In one embodiment, as shown in fig. 2, a security service acceptance method is provided, and the method is applied to the front-end service platform 102 in fig. 1 for illustration, and includes the following steps:
and 202, receiving text information data input by a user when the user logs in a service platform to perform service operation.
The text information data can comprise business content which needs to be transacted by the user and business transacting information text.
In this embodiment of the present application, when a user logs in to a service platform to perform a service operation, the service platform may display an interface including a service input box to the user, and after the user inputs a service content to be transacted in the service input box in the form of text description or voice description, click a submit button to trigger a submit instruction. In response to the submitting instruction, the service platform can send the text information data in the text description form or the text information data extracted from the voice data in the voice description form to the server side for analysis.
Step 204, in response to the text information data, displaying a first service presentation interface that matches the target security service content.
The target security service content is determined according to the target security service type and the target security service information after the target security service type corresponding to the target security service type is identified from the text information data.
The preset basic security service type in the embodiment of the present application may refer to a security item type that can be handled by a front-end service platform, for example, in group checking security, the basic security service type may include a change of insured person data, a change of insurance unit data, a decrease of insured persons, a new addition of insured persons, and so on, and the security service information may refer to specific service information in the security item, for example, specific service objects in the insured person data change service, that is, which insured person needs to be changed, and specific service contents, that is, which information needs to be changed, where specific service contents may include attribute fields and assignment information corresponding to the attribute fields, where the attribute fields may be name, gender, identity card number, mobile phone number, and so on, and the assignment information may be specific name information, gender information, identity card number information, mobile phone number information, and so on.
In this embodiment of the present application, the server identifies the text information data to obtain an identification result, where the identification result may include a target security service type that the user wants to transact and target security service information corresponding to the target security service type. The server side sends the identification result to a front-end service platform, and the front-end service platform matches the security items needing to be skipped according to the identification result, automatically brings the target security service information into the target security service information, generates target security service content and displays a first service display interface.
For example, the server may use a natural language processing technology (Nature Language processing, NLP) to understand the user intention contained in the text information data, that is, what kind of security function item the user wants to transact, match the security function item the user wants to transact with a preset basic security service type, thereby determining a target security service type, and extract, based on the NLP technology, target security service information corresponding to the target security service type from the text information data.
Step 206, responding to the confirmation submitting operation aiming at the user in the target service display interface, and accepting the target security service content corresponding to the target service display interface.
The target service display interface in the embodiment of the present application may be a first service display interface, where the first service display interface not only includes target security service content, but also includes an icon or a button that triggers a confirmation submitting operation of a user, and in response to the confirmation submitting operation for the user in the service display interface, the front end service platform accepts the target security service content corresponding to the first service display interface.
In the security service acceptance method, when a user logs in a service platform to perform service operation, the front-end service platform receives text information data input by the user, responds to the text information data, and displays a first service display interface matched with target security service content, wherein the target security service content is a target security service type matched with the text information data determined from preset basic security service types, and after target security service information corresponding to the target security service type is identified from the text information data, the target security service content corresponding to the target service display interface is accepted according to the target security service type and the target security service information determined, and responds to confirmation submitting operation aiming at the user in the target service display interface. The method can solve the problem that a user does not know the security service, and can hardly select which function entrance is used for handling the service, and the user does not need to sequentially select and manually enter the areas to be filled in the handling process, so that the service handling efficiency is improved.
The security service acceptance method provided in the embodiment of the present application will be described below by taking the insured life data change service as an example.
In one embodiment, as shown in fig. 3, a security service acceptance method is provided, and the method is applied to the front-end service platform 102 and the server 104 in fig. 1 for illustration, and includes the following steps:
and 302, receiving text information data input by a user when the user logs in a service platform to perform service operation.
For example, the user inputs text information data in the front-end service platform in a text description manner, and sends the text information data, as shown in fig. 4, the text information data is "change the name of the insured number 5 to Li Yiyi, and the mobile phone number is 13233334444".
And step 304, identifying the target security service type and the target security service information according to the text information data.
For example, the server determines, from preset basic security service types, that a target security service type matched with the text information data in fig. 4 is an insured person data change service by using an NLP technology, where the target security service information corresponding to the insured person data change service includes a service object number 5 insured person, and the service content includes an attribute field and assignment information as a name: li Yiyi, mobile phone number: 13233334444, and sends the target security service type and the target security service information to the front-end service platform.
Step 306, determining the initial security service content based on the target security service type and the target security service information.
In one possible implementation manner, after the front-end service platform receives the target security service type and the target security service information, determining a candidate service object list corresponding to the target security service type based on the target security service type, and determining a target service object matched with the service object in the target security service information from the candidate service object list to obtain initial security service content of the target service object.
For example, the front-end service platform determines an insured person list based on the insured person profile change service, determines the insured person number 5 from the insured person list, and obtains the initial security service content of the insured person number 5.
Referring to fig. 5, fig. 5 schematically illustrates an initial security service content, where the initial security service content is generally stored in a front-end service platform in the form of a designated service template, and includes candidate placeholders and candidate association fields, where the candidate placeholders mark positions of the editable fields, each candidate placeholder corresponds to one candidate association field, and the candidate placeholders may be immediately after the candidate association field. As shown in fig. 5, in the initial security service content of the insured number 5, the candidate association field includes a number, a work number, a name, a mobile phone number, etc., the candidate occupation mark corresponding to the name is filled with "good plum", and the candidate occupation mark corresponding to the mobile phone number is filled with "13333445566".
And 308, determining a target associated field matched with the attribute field in the target security service information from the candidate associated fields, and processing the target occupation mark corresponding to the target associated field based on the assignment information of the attribute field to obtain the target security service content.
Referring to fig. 6, fig. 6 illustrates an exemplary first business presentation interface that matches the target security business content. The front-end service platform determines the attribute fields, namely the name and the mobile phone number, in the target security service information from the candidate associated fields, namely the number, the work number, the name and the mobile phone number, and the like, the matched target associated fields, namely the name and the mobile phone number in the candidate associated fields, automatically fills the target occupation mark corresponding to the name into the 'Li Yiyi', automatically fills the target occupation mark corresponding to the mobile phone number into the '13233334444' to update the initial security service content, and obtains the target security service content.
Step 310, in response to the text information data, displaying a first service display interface matched with the target security service content, receiving a confirmation submitting operation of the user, and accepting the target security service content corresponding to the first service display interface.
The first service display interface in this embodiment of the present application includes an association field and assignment information corresponding to the placeholder marks displayed in the text box, where "Li Yiyi" and "13233334444" corresponding to the multiple target placeholder marks may be highlighted, for example, thickened or hooked, so as to prompt the user that the information that the insured person data change service wants to change this time.
In one possible implementation of the embodiment as shown in fig. 3, after displaying the first service presentation interface matched with the target security service content in response to the text information data in step 310, the steps as shown in fig. 7 may further be included:
step 702, a trigger instruction is received, where the trigger instruction is triggered by a preset manner and is used to start a hover text box.
The preset mode may be clicking an icon or a designated area set in the first service display interface, or a mouse control and the like fall into the designated area in the first service display interface.
In step 704, in response to the triggering instruction, a second service presentation interface is displayed, where the second service presentation interface includes a hover text box that is fixed in a hover manner, and the content in the hover text box is determined according to the text information data.
In a possible implementation manner, referring to fig. 8, in response to the trigger instruction, the front-end service platform displays a second service display interface, a floating text box is displayed in the second service display interface, the content in the floating text box includes text information data input by a user, further, the front-end service platform can determine matching characters matched with assignment information corresponding to a plurality of target space occupying marks in the text information data, the matching characters are highlighted in the floating text box, the highlighted matching characters can clearly indicate where automatically changed service information is intercepted from the text information data, and the mapping display is performed on the carried service information and characters in the text information data, so that the user is supported to quickly check the service information, the service handling efficiency is reduced, and the service satisfaction is improved.
In another possible implementation, referring to fig. 9, the floating text box has a correspondence with the target placeholder, and the floating text box includes at least a matching character and an associated character in the text information data that match the assignment information of the target placeholder, and the matching character is in a selected state.
The floating text box in the embodiment of the application has a one-to-one correspondence with the target occupation mark or the target association field, for example, the target association field is a name, the assignment information corresponding to the target association field is Li Yi, the matching characters 'plum', 'one' matched with the assignment information 'Li Yi' are determined from the mobile phone number 13233334444 'by changing the name of the insured number 5 to Li Yiyi, and the association characters' last name ',' first name ',' change to 'one' associated with the assignment information 'Li Yi', and the matching characters and the association characters are intercepted from text information data and displayed in the corresponding floating text box. The matching characters are in a selected state, and the characters in the selected state can be highlighted.
In this embodiment of the present application, the trigger instruction received by the front-end service platform may be, for example, that the mouse control of the user falls into a specified area corresponding to the target occupation mark or the target association field, and the front-end service platform starts a suspension text box corresponding to the target occupation mark or the target association field. For example, when the mouse control falls into the designated area corresponding to the "name", a hover text box corresponding to the "name" is displayed above the "name", and when the mouse control falls into the designated area corresponding to the "phone number", a hover text box corresponding to the "phone number" is displayed above the "phone number".
And after the second service display interface is displayed in response to the trigger instruction, a third service display interface is displayed in response to a selection instruction for the characters in the floating text box, wherein the third service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
For example, as shown in fig. 10, in the text information data, the real intention of the user is to change the name to "Li Yiyi", and the server side identifies the target security service information from the text information data, the assignment information corresponding to the name attribute field is "Li Yi", and when the user checks the second service display interface, the user may select "one" of the unselected associated characters, change it to the selected state, and display it in the target text box through the third service display interface.
Further, when the user triggers the selection instruction, the front-end service platform responds to the triggering instruction, can modify assignment information corresponding to the selection instruction, updates the target security service content, and takes the third service display interface as a target service display interface.
Correspondingly, after the second service display interface is displayed in response to the trigger instruction, a fourth service display interface is displayed in response to a removal instruction for characters in the floating text box, wherein the fourth service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
For example, in the text information data of "change insured name 5 to Li Yiyi and mobile phone number 13233334444", the real intention of the user is to change the name to Li Yi, and the input text information data has an error, the server identifies that the assignment information corresponding to the name attribute field is Li Yiyi, as shown in fig. 10; the user moves out the selected state of the matching character "one", and the front-end service platform responds to the removal instruction for the character in the floating text box to display a fourth service display interface, namely as shown in fig. 9.
The security service acceptance method provided in the embodiment of the present application will be further described below by taking newly added insured services and reduced insured services as examples.
In one embodiment, for a newly added insured service, after receiving the newly added insured service type, the front end service platform determines an initial security service content, where the initial security service content may include a plurality of association fields and occupation marks of information to be filled, and matches an attribute field of service information corresponding to the newly added insured service in text information data with the association field, and then automatically fills assignment information into the occupation marks corresponding to the association fields. Other solution content may specifically refer to the embodiment shown in fig. 3 and the embodiment shown in fig. 7, and the embodiments of the present application are not described herein again.
In one embodiment, for reducing insured traffic, the front end traffic platform may determine a list of candidate traffic objects corresponding to the reduced insured traffic type based on the target insured traffic type, i.e. the reduced insured traffic type; and determining a target service object matched with the service object in the target security service information from the candidate service object list, and obtaining target security service content of the target service object. For example, the text information data may be "delete number 5 insured", the front end service platform may determine a insured list based on the reduced insured service type, determine that the service object is a target service object of number 5 insured from the insured list, obtain an information template pre-stored by number 5 insured as target security service content for service display interface display, and accept the security service of the reduced number 5 insured after receiving the submitting instruction of user confirmation of deletion.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a security service acceptance device for implementing the security service acceptance method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of the security service acceptance device or devices provided below may refer to the limitation of the security service acceptance method hereinabove, and will not be repeated herein.
In one embodiment, as shown in fig. 11, there is provided a security service accepting apparatus including: a receiving module 1102, a display module 1104, and an accepting module 1106, wherein:
and the receiving module 1102 is used for receiving text information data input by a user when the user logs in the service platform to perform service operation.
And a display module 1104, configured to respond to the text information data, and display a first service display interface that is matched with the target security service content, where the target security service content is determined according to the target security service type and the target security service information after determining the target security service type that is matched with the text information data from the preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data.
And the acceptance module 1106 is configured to accept, in response to a confirmation submitting operation for a user in the target service display interface, target security service content corresponding to the target service display interface, where the target service display interface is determined according to the first service display interface.
In one embodiment, the target security service content is determined by: determining initial security service content based on the target security service type and the target security service information, wherein the initial security service content comprises a candidate occupation mark and a candidate association field corresponding to the candidate occupation mark; determining a target associated field matched with an attribute field in the target security service information from the candidate associated fields; and processing the target occupation mark corresponding to the target association field based on the assignment information of the attribute field to obtain the target security service content.
In one embodiment, the display module 1104, after executing the first business presentation interface that matches the target security business content in response to the text information data, is further configured to: receiving a trigger instruction, wherein the trigger instruction is triggered in a preset mode and is used for starting a suspension text box; and responding to the triggering instruction, displaying a second service display interface, wherein the second service display interface comprises a floating text box fixed in a floating mode, and the content in the floating text box is determined according to the text information data.
In one embodiment, the floating text box has a corresponding relation with the target occupation mark, the floating text box at least comprises matching characters matched with assignment information of the target occupation mark and associated characters in text information data, and the matching characters are in a selected state; the display module 1104, after executing the response trigger instruction, is further configured to: and responding to a selection instruction aiming at the characters in the suspension text box, displaying a third service display interface, wherein the third service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
In one embodiment, the floating text box has a corresponding relation with the target occupation mark, the floating text box at least comprises matching characters matched with assignment information of the target occupation mark and associated characters in text information data, and the matching characters are in a selected state; the display module 1104, after executing the response trigger instruction, is further configured to: and responding to a removal instruction aiming at the characters in the floating text box, displaying a fourth service display interface, wherein the fourth service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
In one embodiment, the target security service content is determined by: determining a candidate service object list corresponding to the target security service type based on the target security service type; and determining a target service object matched with the service object in the target security service information from the candidate service object list, and obtaining target security service content of the target service object.
The modules in the security service receiving apparatus may be all or partially implemented by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 12. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media, and the input/output interfaces of the computer device for exchanging information between the processor and external devices. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a security service acceptance method.
It will be appreciated by those skilled in the art that the structure shown in fig. 12 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, implements the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. A method of security service acceptance, the method comprising:
when a user logs in a service platform to perform service operation, receiving text information data input by the user;
responding to the text information data, displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and the target security service information after determining the target security service type matched with the text information data from preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data;
And responding to a confirmation submitting operation aiming at a user in a target service display interface, accepting target security service content corresponding to the target service display interface, wherein the target service display interface is determined according to the first service display interface.
2. The method of claim 1, wherein the target security service content is determined by:
determining initial security service content based on the target security service type and the target security service information, wherein the initial security service content comprises a candidate occupation mark and a candidate association field corresponding to the candidate occupation mark;
determining a target associated field matched with an attribute field in the target security service information from the candidate associated fields;
and processing the target occupation mark corresponding to the target association field based on the assignment information of the attribute field to obtain the target security service content.
3. The method of claim 2, wherein after displaying the first service presentation interface matching the target security service content in response to the text information data, comprising:
receiving a trigger instruction, wherein the trigger instruction is triggered in a preset mode and is used for starting a suspension text box;
And responding to the triggering instruction, displaying a second service display interface, wherein the second service display interface comprises the floating text box fixed in a floating mode, and the content in the floating text box is determined according to the text information data.
4. A method according to claim 3, wherein the floating text box has a correspondence with the target placeholder, the floating text box comprising at least a matching character and an associated character in the text information data that match the assignment information of the target placeholder, and the matching character being in a selected state;
and responding to the trigger instruction, after displaying the second service display interface, the method comprises the following steps:
and responding to a selection instruction aiming at the characters in the suspension text box, displaying a third service display interface, wherein the third service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
5. A method according to claim 3, wherein the floating text box has a correspondence with the target placeholder, the floating text box comprising at least a matching character and an associated character in the text information data that match the assignment information of the target placeholder, and the matching character being in a selected state;
And responding to the trigger instruction, after displaying the second service display interface, the method comprises the following steps:
and responding to a removal instruction for the characters in the floating text box, displaying a fourth service display interface, wherein the fourth service display interface is used for displaying the characters in the selected state in the target text box corresponding to the target occupation mark.
6. The method of claim 1, wherein the target security service content is determined by:
determining a candidate service object list corresponding to the target security service type based on the target security service type;
and determining a target service object matched with the service object in the target security service information from the candidate service object list, and obtaining the target security service content of the target service object.
7. A security service acceptance apparatus, the apparatus comprising:
the receiving module is used for receiving text information data input by a user when the user logs in the service platform to perform service operation;
the display module is used for responding to the text information data and displaying a first service display interface matched with target security service content, wherein the target security service content is determined according to the target security service type and the target security service information after determining the target security service type matched with the text information data from preset basic security service types and identifying the target security service information corresponding to the target security service type from the text information data;
And the acceptance module is used for responding to the confirmation submitting operation aiming at the user in the target service display interface and accepting the target security service content corresponding to the target service display interface, wherein the target service display interface is determined according to the first service display interface.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202311738345.2A 2023-12-18 2023-12-18 Security service acceptance method, device, computer equipment and storage medium Pending CN117649303A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311738345.2A CN117649303A (en) 2023-12-18 2023-12-18 Security service acceptance method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311738345.2A CN117649303A (en) 2023-12-18 2023-12-18 Security service acceptance method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117649303A true CN117649303A (en) 2024-03-05

Family

ID=90043286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311738345.2A Pending CN117649303A (en) 2023-12-18 2023-12-18 Security service acceptance method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117649303A (en)

Similar Documents

Publication Publication Date Title
CN110286974B (en) Application configuration method, device, equipment and storage medium based on H5 page
CN108509485B (en) Data preprocessing method and device, computer equipment and storage medium
CN108334625B (en) User information processing method and device, computer equipment and storage medium
US10963888B2 (en) Payment complaint method, device, server and readable storage medium
CN110609954A (en) Data acquisition method and device, computer equipment and storage medium
CN113157947A (en) Knowledge graph construction method, tool, device and server
CN113076731A (en) Report file generation method and device, computer equipment and storage medium
CN113591934A (en) Method, device and equipment for arranging business analysis model and storage medium
CN111026963A (en) Data query method and device, and configuration information setting method and device
CN109785867B (en) Double-recording flow configuration method and device, computer equipment and storage medium
CN117649303A (en) Security service acceptance method, device, computer equipment and storage medium
CN115758271A (en) Data processing method, data processing device, computer equipment and storage medium
CN111461824B (en) Interface display method, electronic device and computer readable storage medium
CN113674083A (en) Internet financial platform credit risk monitoring method, device and computer system
CN107644043B (en) Internet bank quick navigation setting method and system
US20150293973A1 (en) Managing electronic records
US20220261666A1 (en) Leveraging big data, statistical computation and artificial intelligence to determine a likelihood of object renunciation prior to a resource event
CN108256990B (en) Server, risk prompting method and computer readable storage medium
CN116910069A (en) Database updating method, device, computer equipment and storage medium
CN115544056A (en) Performance data acquisition method and device
CN114780561A (en) Entity attribute editing method and device, computer equipment and storage medium
CN117216164A (en) Financial data synchronous processing method, apparatus, device, medium and program product
JP2022135067A (en) Information sharing support method and information sharing support device
CN117932332A (en) Training method of resource transfer strategy model and resource transfer method
CN116664270A (en) Method, device, equipment, storage medium and product for determining same object

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination