WO2019205324A1 - Task allocation method and system, and terminal device - Google Patents

Task allocation method and system, and terminal device Download PDF

Info

Publication number
WO2019205324A1
WO2019205324A1 PCT/CN2018/097527 CN2018097527W WO2019205324A1 WO 2019205324 A1 WO2019205324 A1 WO 2019205324A1 CN 2018097527 W CN2018097527 W CN 2018097527W WO 2019205324 A1 WO2019205324 A1 WO 2019205324A1
Authority
WO
WIPO (PCT)
Prior art keywords
identified
identity information
target object
task
preset
Prior art date
Application number
PCT/CN2018/097527
Other languages
French (fr)
Chinese (zh)
Inventor
徐光飞
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019205324A1 publication Critical patent/WO2019205324A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063112Skill-based matching of a person or a group to a task
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • the present application belongs to the field of information management technologies, and in particular, to a task allocation method, system, and terminal device.
  • Telephone sales is a sales method based on telephone.
  • the telephone is the main means of communication.
  • the company directly contacts the customer in the name of the company, and uses the company's automated information management technology and professional operation platform to complete the promotion of the company's products.
  • the main marketing process of consulting, quotation, and confirmation of product transaction conditions.
  • An agent refers to a unit or individual that collects a commission from the agent according to the agency contract or authorization or verbal agreement, and the agent or agent who handles the business on behalf of the agent.
  • the vehicle insurance agent refers to the commission of the owner.
  • the prior art usually collects agent information manually, or when the agent answers the agent, the current phone number is marked as the agent phone number, and the recognition efficiency is low, resulting in inefficient call.
  • the existing telephone sales process has the problem that the agent identification efficiency is low, resulting in low efficiency of the agent's dialing.
  • the embodiment of the present application provides a task allocation method, a system, and a terminal device, so as to solve the problem that the agent identification efficiency is low in the existing telephone sales process, and the agent dialing efficiency is low.
  • a first aspect of the present application provides a task assignment method, including:
  • Deleting the invalid task from the task list to be delivered obtaining a valid task list, and delivering the valid task list.
  • a second aspect of the present application provides a task assignment system comprising:
  • the task obtaining module is configured to obtain a task list to be delivered.
  • An identity information obtaining module configured to acquire identity information of an object to be identified in the task list to be delivered;
  • a matching module configured to match identity information of the object to be identified by presetting the identity information of the target object in the target object database
  • the matching invalidation module is configured to: if the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task;
  • a deletion module configured to delete the invalid task from the task list to be delivered, obtain a valid task list, and deliver the valid task list.
  • a third aspect of the present application provides a terminal device including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the processor executing the computer readable The following steps are implemented when the instruction is executed:
  • Deleting the invalid task from the task list to be delivered obtaining a valid task list, and delivering the valid task list.
  • a fourth aspect of the present application provides a computer readable storage medium storing computer readable instructions that, when executed by a processor, implement the following steps:
  • Deleting the invalid task from the task list to be delivered obtaining a valid task list, and delivering the valid task list.
  • the task assignment method, system and terminal device provided by the present application perform matching query by the identity information of the target object in the target object database and the identity information of the object to be identified, and accurately identify the target object to be delivered.
  • the invalid task is deleted in the task to be delivered, and the efficiency of the agent's dialing is improved, which effectively solves the problem that the existing telephone sales process has low efficiency of agent identification, resulting in low efficiency of agent dialing.
  • FIG. 1 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 1 of the present application;
  • FIG. 2 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 2 of the present application;
  • FIG. 3 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 3 of the present application.
  • FIG. 4 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 4 of the present application.
  • FIG. 5 is a schematic structural diagram of a task distribution system according to Embodiment 5 of the present application.
  • FIG. 6 is a schematic structural diagram of a task distribution system according to Embodiment 6 of the present application.
  • FIG. 7 is a schematic structural diagram of a task distribution system according to Embodiment 7 of the present application.
  • Embodiment 8 is a schematic structural diagram of a task distribution system according to Embodiment 8 of the present application.
  • FIG. 9 is a schematic diagram of a terminal device provided in Embodiment 9 of the present application.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • this embodiment provides a task allocation method, which specifically includes:
  • Step S101 Obtain a task list to be delivered.
  • the agent system sends a task list to the agent according to the call request.
  • the task list that is delivered may include the agent's call task.
  • the agent system obtains the agent's corresponding task. A list of tasks to be delivered.
  • Step S102 Acquire identity information of the object to be identified in the task list to be delivered.
  • the task list to be delivered includes user information of one or more objects to be identified, and the user information includes identity information and service information of the object to be identified.
  • the identity information includes: a name, an ID card number, and a phone number, etc., which can indicate the identity of the user.
  • the identity information of all the objects to be identified in the task list to be delivered is obtained by acquiring the task list to be delivered. Specifically, the ID number or phone number of each object to be identified in the task list to be delivered is obtained.
  • Step S103 Match the identity information of the object to be identified by the identity information of the target object in the preset target object database.
  • a target object database containing identity information of the target object is pre-established.
  • the identity information of the target object (agent) is obtained in advance through various channels, such as the name, ID number, telephone number, Hong Kong and Macao pass code, agent document information, etc., which can reflect the identity of the agent.
  • the preset target object database includes the identity information of all agents in the industry.
  • the identity information of the object to be identified is matched with the identity information of the target object in the target object database. If one identity information matches, the object to be identified is the target object.
  • the phone number of the object to be identified matches the phone number of a target object in the target object database, indicating that the object to be identified corresponding to the phone number is the target object; the ID number of the object to be identified and the target object database If the ID number of a certain target object matches, it indicates that the object to be identified corresponding to the ID number is the target object.
  • the target object database includes multiple target objects, and each target object corresponds to multiple identity information.
  • the task list to be delivered also includes one or more objects to be identified, and each object to be identified also corresponds to multiple identity information.
  • identity information of the object to be identified and the identity information of the target object are matched, only one piece of identity information of the object to be identified matches one of the identity information of a target object in the target object database, indicating that the object to be identified The identity information matches the identity information of the target object.
  • Step S104 If the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task.
  • the task corresponding to the object to be identified is set as an invalid task.
  • Step S105 Delete the invalid task from the task list to be delivered, obtain a valid task list, and deliver the valid task list.
  • the task corresponding to the object to be identified is an invalid task.
  • the invalid task is deleted from the task list to be delivered, and a valid task list is obtained.
  • the effective task list does not include the dialing task corresponding to the target object.
  • the effective task list is delivered, and the agent dials according to the effective task list, and does not dial the telephone number of the target object (agent), thereby improving the dialing efficiency.
  • the task allocation method provided in this embodiment performs a matching query by using the identity information of the target object in the target object database and the identity information of the object to be identified, and accurately identifies the target object to be delivered, and waits for the target object to be delivered.
  • the invalid task is deleted in the task, and the efficiency of the agent's dialing is improved, which effectively solves the problem that the existing telephone sales process has low efficiency of agent identification, resulting in low efficiency of agent dialing.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the task assignment method provided in this embodiment further includes: steps S201 to S203, which are specifically described as follows:
  • Step S201 If the identity information of the object to be identified does not match the identity information of the target object, obtain the traffic volume of the object to be identified within a preset time period.
  • the preset target object database may not be updated in time, in order to further determine whether the target object (agent) still exists in the object to be identified, the identity information of the object to be identified and the identity information of the target object are not
  • the target object (agent) since the target object (agent) has more traffic in the preset time period than the non-target object, it is possible to further analyze whether the object to be identified is the target object by the traffic volume in the preset time period.
  • the amount of traffic of the object to be identified whose identity information does not match the identity information of the target object in the preset time period is obtained by the agent system.
  • the preset time period refers to the working time period of the day, for example, 8:00 ⁇ 20:00.
  • Obtaining the traffic volume of the object to be identified in the preset time period is specifically acquiring the traffic volume of each object to be identified within a preset time period, or acquiring the total traffic volume of each object to be identified within a plurality of preset time segments.
  • the total traffic is used as the traffic volume of the object to be identified, or the average traffic volume of each object to be identified in a plurality of preset time segments is obtained, and the average traffic volume is used as the traffic volume of the object to be identified.
  • Step S202 Determine whether the traffic volume is greater than a first preset threshold.
  • the first preset threshold is set to determine whether the object to be identified is the target object. That is, if the traffic volume of each object to be identified is greater than the first preset threshold, if the traffic volume of the object to be identified is greater than the first preset threshold, the object to be identified is the target object; if the traffic volume of the object to be identified is not If it is greater than the first preset threshold, the object to be identified may not be the target object.
  • the first preset threshold refers to a traffic threshold that is preset in order to measure whether the object to be identified is a target object.
  • the first preset threshold can be set according to industry experience.
  • Step S203 If the traffic volume is greater than the first preset threshold, set the task corresponding to the object to be identified as an invalid task.
  • the object to be identified is a target object (agent), and the task corresponding to the object to be identified is set as an invalid task.
  • the foregoing task assignment method further includes:
  • Step S204 If the traffic volume is not greater than the first preset threshold, and the traffic volume is greater than the second preset threshold, the object to be identified is set as a suspect target object, and the suspect is determined within a preset time interval.
  • the identity information of the target object is matched with the identity information of the target object in the target object database, wherein the first preset threshold is greater than the second preset threshold.
  • the traffic volume of the object to be identified is not greater than the first preset threshold and greater than the second preset threshold, it indicates that the object to be identified may be the target object, and the object to be identified is set as the suspect target object. Since the target object database is updated in real time, the identity information of the suspected target object is matched with the identity information of the target object in the target object database in a preset time interval. It should be noted that the preset time interval can be set according to the actual update frequency of the target object database.
  • the identity information of the suspected target object matches the identity information of the target object in the target object database, it indicates that the suspected target object is the target object. If the identity information of the suspect target object does not match the identity information of the target object in the target object database, it indicates that the suspect target object is not the target object.
  • the target object database includes multiple target objects, and each target object corresponds to multiple identity information.
  • Each suspected target object also corresponds to multiple identity information.
  • the identity information of the suspected target object and the identity information of the target object are matched, only one identity information of the suspected target object matches an identity information of a target object in the target object database, indicating the suspected target object The identity information matches the identity information of the target object.
  • Step S205 If the identity information of the suspected target object matches the identity information of the target object, set the task corresponding to the suspected target object as an invalid task.
  • the identity information of the suspected target object matches the identity information of the target object, it indicates that the suspected target object is the target object (agent), and therefore the task corresponding to the suspected target object is set as an invalid task.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • the task assignment method provided in this embodiment further includes: steps S301 to S304, which are specifically described as follows:
  • Step S301 If the identity information of the object to be identified does not match the identity information of the target object, obtain a historical recording of the object to be identified, and extract audio data.
  • a target object in order to further determine whether a target object (agent) still exists in the object to be identified, when the identity information of the object to be identified does not match the identity information of the target object, a historical recording of the object to be identified is obtained, and The audio data is extracted from the historical recording.
  • Step S302 Convert the audio data into text data.
  • the conversion of audio data into text data can be converted by an existing audio text conversion tool.
  • Step S303 Identify whether the preset data is included in the text data.
  • the industry terminology and the agent's common language are set as preset keywords. Identify whether the text data contains preset keywords. It should be noted that the preset keyword can be set according to industry terminology and the common language of the target object.
  • the obtained text data is: "I want to purchase No. 1101 auto insurance, no special contract", of which "No. 1101 auto insurance” and "Special contract” are industry terminology. Therefore, the text data contains preset keywords.
  • Step S304 If the text data includes a preset keyword, the task corresponding to the object to be identified is set as an invalid task.
  • the text data includes a preset keyword, it indicates that the object to be identified is the target object (agent), and therefore the task corresponding to the object to be identified is set as an invalid task.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • the task assignment method provided in this embodiment further includes: steps S401 to S404, which are specifically described as follows:
  • Step S401 If the identity information of the object to be identified does not match the identity information of the target object, obtain the voiceprint feature of the target object according to the historical recording of the target object.
  • the target object in order to further determine whether the target object (agent) still exists in the object to be identified, when the identity information of the object to be identified does not match the identity information of the target object, the voiceprint characteristics of each person are different. Therefore, whether the object to be identified is the target object can be further determined by the matching degree between the voiceprint feature of the object to be identified and the voiceprint feature of the target object.
  • acquiring the voiceprint feature of the target object first acquiring a historical recording of the target object, and acquiring a voiceprint feature of the target object according to the historical recording of the target object. It should be noted that when acquiring the voiceprint feature of the target object, the voiceprint feature of each target object is obtained according to the historical recording of each target object.
  • Step S402 Acquire a voiceprint feature of the object to be identified according to the historical recording of the object to be identified.
  • the historical recordings of each object to be identified are respectively acquired, and the voiceprint features of the object to be identified are obtained according to the historical recording of each object to be identified.
  • Step S403 Match the voiceprint feature of the object to be identified with the voiceprint feature of the target object.
  • the voiceprint features of each object to be identified are matched with the voiceprint features of each target object.
  • the voiceprint feature of the object to be identified matches the voiceprint feature of a certain target object, it indicates that the object to be recognized is the target object.
  • Step S404 If the matching degree exceeds the preset matching degree threshold, the task corresponding to the object to be identified is set as an invalid task.
  • the preset matching threshold refers to a preset threshold for measuring whether the voiceprint feature of the object to be identified matches the voiceprint feature of the target object, and the voiceprint feature of the object to be recognized and the voiceprint of the target object. If the matching degree of the feature exceeds the preset matching threshold, it indicates that the voiceprint feature of the object to be identified matches the voiceprint feature of the target object.
  • the voiceprint feature of the object to be identified matches the voiceprint feature of the target object, it indicates that the object to be identified is the target object (agent), and therefore the task corresponding to the object to be identified is set as an invalid task.
  • Embodiment 5 is a diagrammatic representation of Embodiment 5:
  • the present embodiment provides a task allocation system 100, which is used to perform the method steps in the first embodiment, which includes: a task to be delivered, an identity acquisition module 102, a matching module 103, and a matching.
  • the invalid module 104 and the delete module 105 are included in the first embodiment.
  • the task obtaining module 101 is configured to obtain a task list to be delivered.
  • the identity information obtaining module 102 is configured to obtain identity information of the object to be identified in the task list to be delivered;
  • the matching module 103 is configured to match the identity information of the object to be identified by presetting the identity information of the target object in the target object database;
  • the matching invalidation module 104 is configured to: if the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task;
  • the deleting module 105 is configured to delete the invalid task from the task list to be delivered, obtain a valid task list, and send the valid task list.
  • the present embodiment provides a task distribution system 200 for performing the method steps in the second embodiment, including: a traffic volume obtaining module 201, a first threshold determining module 202, and a preset threshold invalidating module 203. .
  • the traffic acquisition module 201 is configured to obtain the traffic volume of the object to be identified within a preset time period if the identity information of the object to be identified does not match the identity information of the target object.
  • the first threshold determining module 202 is configured to determine whether the traffic volume is greater than a first preset threshold.
  • the preset threshold invalidation module 203 is configured to set the task corresponding to the object to be identified as an invalid task if the traffic volume is greater than the first preset threshold.
  • the task distribution system further includes: a second threshold determination module and a suspected target object matching module.
  • a second threshold determining module configured to set the object to be identified as a suspect target object within a preset time interval, if the traffic volume is not greater than a first preset threshold, and the traffic volume is greater than a second preset threshold Matching the identity information of the suspect target object with the identity information of the target object in the target object database, where the first preset threshold is greater than the second preset threshold;
  • the suspected target object matching module is configured to: if the identity information of the suspected target object matches the identity information of the target object, set the task corresponding to the suspected target object as an invalid task.
  • a task distribution system 300 is provided to perform the method steps in the third embodiment, including: an audio acquisition module 301, a conversion module 302, an identification module 303, and a keyword invalidation module 304. .
  • the audio acquisition module 301 is configured to acquire a historical recording of the object to be identified and extract audio data if the identity information of the object to be identified does not match the identity information of the target object.
  • the conversion module 302 is configured to convert the audio data into text data.
  • the identification module 303 is configured to identify whether the preset data is included in the text data.
  • the keyword invalidation module 304 is configured to set the task corresponding to the object to be identified as an invalid task if the text data includes a preset keyword.
  • the task distribution system 400 is configured to perform the method steps in the fourth embodiment, and includes: a target voiceprint acquisition module 401, a voiceprint acquisition module 402, and a voiceprint matching module. 403 and a matching threshold invalidation module 404.
  • the target voiceprint obtaining module 401 is configured to obtain the voiceprint feature of the target object according to the historical recording of the target object if the identity information of the object to be identified does not match the identity information of the target object.
  • the voiceprint acquisition module 402 is configured to acquire the voiceprint feature of the object to be identified according to the historical recording of the object to be identified.
  • the voiceprint matching module 403 is configured to match the voiceprint feature of the object to be identified with the voiceprint feature of the target object.
  • the matching threshold invalidation module 404 is configured to set the task corresponding to the object to be identified as an invalid task if the matching degree exceeds the preset matching degree threshold.
  • FIG. 9 is a schematic diagram of a terminal device provided in Embodiment 9 of the present application.
  • the terminal device 9 of this embodiment includes a processor 90, a memory 91, and computer readable instructions 92, such as programs, stored in the memory 91 and executable on the processor 90.
  • the processor 90 executes the computer readable instructions 92 to implement the steps in the various blockchain-based vehicle violation detection method embodiments, such as steps S101 to S105 shown in FIG.
  • the processor 90 implements the functions of the modules/units in the above-described system embodiments when the computer readable instructions 92 are executed, such as the functions of the modules 101-105 shown in FIG.
  • the computer readable instructions 92 may be partitioned into one or more modules/units that are stored in the memory 91 and executed by the processor 90, To complete this application.
  • the one or more modules/units may be a series of computer readable instruction instruction segments capable of performing a particular function, the instruction segments being used to describe the execution of the computer readable instructions 92 in the terminal device 9.
  • the computer readable instructions 92 may be divided into a task to be delivered, an identity information acquisition module, a matching module, a matching invalid module, and a deletion module.
  • the specific functions of each module are as follows:
  • the task obtaining module is configured to obtain a task list to be delivered.
  • An identity information obtaining module configured to acquire identity information of an object to be identified in the task list to be delivered,
  • a matching module configured to match identity information of the object to be identified by presetting the identity information of the target object in the target object database
  • the matching invalidation module is configured to: if the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task;
  • a deletion module configured to delete the invalid task from the task list to be delivered, obtain a valid task list, and deliver the valid task list.
  • the terminal device 9 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud management server.
  • the terminal device may include, but is not limited to, a processor 90 and a memory 91. It will be understood by those skilled in the art that FIG. 9 is only an example of the terminal device 9, does not constitute a limitation of the terminal device 9, may include more or less components than those illustrated, or combine some components, or different components.
  • the terminal device may further include an input/output device, a network access device, a bus, and the like.
  • the so-called processor 90 can be a central processing unit (Central Processing Unit, CPU), can also be other general-purpose processors, digital signal processors (DSP), application specific integrated circuits (Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 91 may be an internal storage unit of the terminal device 9, such as a hard disk or a memory of the terminal device 9.
  • the memory 91 may also be an external storage device of the terminal device 9, for example, a plug-in hard disk provided on the terminal device 9, a smart memory card (SMC), and a secure digital (SD). Card, flash card (Flash Card) and so on.
  • the memory 91 may also include both an internal storage unit of the terminal device 9 and an external storage device.
  • the memory 91 is configured to store the computer readable instructions and other programs and data required by the terminal device.
  • the memory 91 can also be used to temporarily store data that has been output or is about to be output.
  • each functional unit and module in the foregoing wireless terminal may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit, and the integrated unit may be hardware.
  • Formal implementation can also be implemented in the form of software functional units.
  • the specific names of the respective functional units and modules are only for the purpose of facilitating mutual differentiation, and are not intended to limit the scope of protection of the present application.
  • the disclosed system/terminal device and method may be implemented in other manners.
  • the system/terminal device embodiment described above is merely illustrative.
  • the division of the module or unit is only a logical function division.
  • there may be another division manner for example, multiple units.
  • components may be combined or integrated into another system, or some features may be omitted or not performed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, system or unit, and may be in electrical, mechanical or other form.
  • the units provided as separate component descriptions may or may not be physically separated, and the components arranged for unit display may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. on. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated modules/units if implemented in the form of software functional units and arranged to be sold or used as separate products, may be stored in a computer readable storage medium.
  • the present application implements all or part of the processes in the foregoing embodiments, and may also be implemented by computer readable instructions, which may be stored in a computer readable storage medium.
  • the computer readable instructions when executed by a processor, may implement the steps of the various method embodiments described above.
  • the computer readable instructions comprise computer readable instruction code, which may be in the form of source code, an object code form, an executable file or some intermediate form or the like.
  • the computer readable medium can include any entity or system capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a removable hard drive, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only) Memory), random access memory (RAM, Random) Access Memory), electrical carrier signals, telecommunications signals, and software distribution media.
  • ROM Read Only memory
  • RAM Random Access Memory
  • electrical carrier signals telecommunications signals
  • telecommunications signals and software distribution media. It should be noted that the content contained in the computer readable medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction, for example, in some jurisdictions, according to legislation and patent practice, computer readable media It does not include electrical carrier signals and telecommunication signals.

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present application is applicable to the technical field of information management, and provides a task allocation method, comprising: obtaining a task list to be delivered; obtaining identity information of an object to be identified in the task list to be delivered; matching the identity information of the object to be identified and identity information of a target object in a preset target object database; if the identity information of the object to be identified matches the identity information of the target object, setting a task corresponding to the object to be identified as an invalid task; and deleting the invalid task from the task list to be delivered to obtain a valid task list, and delivering the valid task list. By matching identity information of an object to be identified and identity information of a target object in a preset target object database to accurately identify the target object in tasks to be delivered, and deleting an invalid task from the tasks to be delivered, the agent dialing efficiency is improved, so that the existing problem of low agent dialing efficiency caused by low proxy identification efficiency during a telesales process is resolved.

Description

一种任务分配方法、系统及终端设备Task assignment method, system and terminal device
本申请申明享有2018年04月24日递交的申请号为201810373332.2、名称为“一种任务分配方法、系统及终端设备”中国专利申请的优先权,该中国专利申请的整体内容以参考的方式结合在本申请中。The application claims the priority of the Chinese Patent Application No. 201810373332.2, entitled "A Task Assignment Method, System and Terminal Equipment", which is filed on April 24, 2018, the entire contents of which are incorporated by reference. In this application.
技术领域Technical field
本申请属于信息管理技术领域,尤其涉及一种任务分配方法、系统及终端设备。The present application belongs to the field of information management technologies, and in particular, to a task allocation method, system, and terminal device.
背景技术Background technique
电话销售是一种依托电话的销售方式,以电话为主要沟通手段,通过专用电话营销号码,以公司名义与客户直接联系,并运用公司自动化信息管理技术和专业化运行平台,完成公司产品的推介、咨询、报价、以及产品成交条件确认等主要营销过程的业务。Telephone sales is a sales method based on telephone. The telephone is the main means of communication. Through the special telephone marketing number, the company directly contacts the customer in the name of the company, and uses the company's automated information management technology and professional operation platform to complete the promotion of the company's products. The main marketing process of consulting, quotation, and confirmation of product transaction conditions.
在电话销售过程中,若坐席拨打了代理人的电话号码,往往难以促成交易,销售成功率低。代理人是指根据代理契约或授权书或口头约定,向被代理者收取一定佣金,在被代理人授权的范围内代为办理业务的单位或者个人,例如车险代理人是指根据车主的委托,在车主授权的范围内代为办理车险业务,并依法向车主收取代理手续费的单位或者个人。因此,在业内通常需要识别代理人的电话号码,并屏蔽掉代理人的电话号码,避免坐席拨打而浪费坐席资源。In the telephone sales process, if the agent dials the agent's phone number, it is often difficult to facilitate the transaction, and the sales success rate is low. An agent refers to a unit or individual that collects a commission from the agent according to the agency contract or authorization or verbal agreement, and the agent or agent who handles the business on behalf of the agent. For example, the vehicle insurance agent refers to the commission of the owner. The unit or individual who handles the auto insurance business on behalf of the owner of the vehicle and collects the agency fee from the owner according to law. Therefore, in the industry, it is usually necessary to identify the agent's phone number and block the agent's phone number to avoid the agent's call and waste the agent resources.
现有技术通常是人为收集代理人信息,或者坐席拨打时遇见代理人接听后,再将当前拨打的电话号码标记为代理人电话号码,识别效率低下,造成坐席拨打效率低下。The prior art usually collects agent information manually, or when the agent answers the agent, the current phone number is marked as the agent phone number, and the recognition efficiency is low, resulting in inefficient call.
综上所述,现有电话销售过程存在代理人识别效率低下,造成坐席拨打效率低下的问题。In summary, the existing telephone sales process has the problem that the agent identification efficiency is low, resulting in low efficiency of the agent's dialing.
技术问题technical problem
有鉴于此,本申请实施例提供了一种任务分配方法、系统及终端设备,以解决现有电话销售过程存在代理人识别效率低下,造成坐席拨打效率低下的问题。In view of this, the embodiment of the present application provides a task allocation method, a system, and a terminal device, so as to solve the problem that the agent identification efficiency is low in the existing telephone sales process, and the agent dialing efficiency is low.
技术解决方案Technical solution
本申请的第一方面提供了一种任务分配方法,包括:A first aspect of the present application provides a task assignment method, including:
获取待下发的任务列表;Obtain a list of tasks to be delivered;
获取所述待下发的任务列表中待识别对象的身份信息,Obtaining identity information of the object to be identified in the task list to be delivered,
通过预设的目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;Matching the identity information of the object to be identified by the identity information of the target object in the preset target object database;
若所述待识别对象的身份信息与所述目标对象的身份信息匹配,将所述待识别对象对应的任务设置为无效任务;And if the identity information of the object to be identified matches the identity information of the target object, setting the task corresponding to the object to be identified as an invalid task;
从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。Deleting the invalid task from the task list to be delivered, obtaining a valid task list, and delivering the valid task list.
本申请的第二方面提供了一种任务分配系统,包括:A second aspect of the present application provides a task assignment system comprising:
待下发任务获取模块,用于获取待下发的任务列表;The task obtaining module is configured to obtain a task list to be delivered.
身份信息获取模块,用于获取所述待下发的任务列表中待识别对象的身份信息;An identity information obtaining module, configured to acquire identity information of an object to be identified in the task list to be delivered;
匹配模块,用于通过预设目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;a matching module, configured to match identity information of the object to be identified by presetting the identity information of the target object in the target object database;
匹配无效模块,用于若所述待识别对象的身份信息与所述目标对象的身份信息匹配,则将所述待识别对象对应的任务设置为无效任务;And the matching invalidation module is configured to: if the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task;
删除模块,用于从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。And a deletion module, configured to delete the invalid task from the task list to be delivered, obtain a valid task list, and deliver the valid task list.
本申请的第三方面提供了一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现以下步骤:A third aspect of the present application provides a terminal device including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the processor executing the computer readable The following steps are implemented when the instruction is executed:
获取待下发的任务列表;Obtain a list of tasks to be delivered;
获取所述待下发的任务列表中待识别对象的身份信息,Obtaining identity information of the object to be identified in the task list to be delivered,
通过预设的目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;Matching the identity information of the object to be identified by the identity information of the target object in the preset target object database;
若所述待识别对象的身份信息与所述目标对象的身份信息匹配,将所述待识别对象对应的任务设置为无效任务;And if the identity information of the object to be identified matches the identity information of the target object, setting the task corresponding to the object to be identified as an invalid task;
从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。Deleting the invalid task from the task list to be delivered, obtaining a valid task list, and delivering the valid task list.
本申请的第四方面提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令被处理器执行时实现以下步骤:A fourth aspect of the present application provides a computer readable storage medium storing computer readable instructions that, when executed by a processor, implement the following steps:
获取待下发的任务列表;Obtain a list of tasks to be delivered;
获取所述待下发的任务列表中待识别对象的身份信息,Obtaining identity information of the object to be identified in the task list to be delivered,
通过预设的目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;Matching the identity information of the object to be identified by the identity information of the target object in the preset target object database;
若所述待识别对象的身份信息与所述目标对象的身份信息匹配,将所述待识别对象对应的任务设置为无效任务;And if the identity information of the object to be identified matches the identity information of the target object, setting the task corresponding to the object to be identified as an invalid task;
从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。Deleting the invalid task from the task list to be delivered, obtaining a valid task list, and delivering the valid task list.
有益效果Beneficial effect
本申请提供的一种任务分配方法、系统及终端设备,通过预设目标对象数据库中目标对象的身份信息与待识别对象的身份信息进行匹配查询,精确地识别待下发任务中的目标对象,并在待下发任务中删除无效任务,提高坐席拨打的效率,有效地解决了现有的电话销售过程存在代理人识别效率低下,造成坐席拨打效率低下的问题。The task assignment method, system and terminal device provided by the present application perform matching query by the identity information of the target object in the target object database and the identity information of the object to be identified, and accurately identify the target object to be delivered. In addition, the invalid task is deleted in the task to be delivered, and the efficiency of the agent's dialing is improved, which effectively solves the problem that the existing telephone sales process has low efficiency of agent identification, resulting in low efficiency of agent dialing.
附图说明DRAWINGS
图1是本申请实施例一提供的一种任务分配方法的实现流程示意图;1 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 1 of the present application;
图2是本申请实施例二提供的一种任务分配方法的实现流程示意图;2 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 2 of the present application;
图3是本申请实施例三提供的一种任务分配方法的实现流程示意图;3 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 3 of the present application;
图4是本申请实施例四提供的一种任务分配方法的实现流程示意图;4 is a schematic flowchart of an implementation process of a task allocation method according to Embodiment 4 of the present application;
图5是本申请实施例五提供的一种任务分配系统的结构示意图;5 is a schematic structural diagram of a task distribution system according to Embodiment 5 of the present application;
图6是本申请实施例六提供的一种任务分配系统的结构示意图;6 is a schematic structural diagram of a task distribution system according to Embodiment 6 of the present application;
图7是本申请实施例七提供的一种任务分配系统的结构示意图;7 is a schematic structural diagram of a task distribution system according to Embodiment 7 of the present application;
图8是本申请实施例八提供的一种任务分配系统的结构示意图;8 is a schematic structural diagram of a task distribution system according to Embodiment 8 of the present application;
图9是本申请实施例九提供的终端设备的示意图。FIG. 9 is a schematic diagram of a terminal device provided in Embodiment 9 of the present application.
本发明的实施方式Embodiments of the invention
为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、系统、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。Specific details such as specific system architectures, techniques, and the like are set forth for the purpose of illustration and description. However, it will be apparent to those skilled in the art that the present invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, systems, circuits, and methods are omitted so as not to obscure the description of the application.
为了说明本申请所述的技术方案,下面通过具体实施例来进行说明。In order to explain the technical solutions described in the present application, the following description will be made by way of specific embodiments.
实施例一:Embodiment 1:
如图1所示,本实施例提供了一种任务分配方法,其具体包括:As shown in FIG. 1 , this embodiment provides a task allocation method, which specifically includes:
步骤S101:获取待下发的任务列表。Step S101: Obtain a task list to be delivered.
在具体应用中,坐席系统会根据拨打需求向坐席人员下发任务列表,下发的任务列表中可能包含代理人的拨打任务,为了避免坐席人员拨打代理人的对应的拨打任务,通过坐席系统获取待下发的任务列表。In a specific application, the agent system sends a task list to the agent according to the call request. The task list that is delivered may include the agent's call task. In order to prevent the agent from dialing the agent's corresponding task, the agent system obtains the agent's corresponding task. A list of tasks to be delivered.
步骤S102:获取所述待下发的任务列表中待识别对象的身份信息。Step S102: Acquire identity information of the object to be identified in the task list to be delivered.
在具体应用中,待下发的任务列表包括一个或多个待识别对象的用户信息,用户信息包括待识别对象的身份信息和业务信息。需要说明的是,身份信息包括:姓名、身份证号码以及电话号码等能够表明用户身份的信息。在本实施例中,通过获取待下发的任务列表后获取待下发的任务列表中的全部待识别对象的身份信息。具体为获取待下发的任务列表中每一个待识别对象的身份证号码或电话号码。In a specific application, the task list to be delivered includes user information of one or more objects to be identified, and the user information includes identity information and service information of the object to be identified. It should be noted that the identity information includes: a name, an ID card number, and a phone number, etc., which can indicate the identity of the user. In this embodiment, the identity information of all the objects to be identified in the task list to be delivered is obtained by acquiring the task list to be delivered. Specifically, the ID number or phone number of each object to be identified in the task list to be delivered is obtained.
步骤S103:通过预设的目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配。Step S103: Match the identity information of the object to be identified by the identity information of the target object in the preset target object database.
在具体应用中,预先建立包含目标对象的身份信息的目标对象数据库。预先通过各个渠道获取目标对象(代理人)的身份信息,如目标对象的姓名、身份证号码、电话号码、港澳通行证编码、代理人证件信息等能够体现代理人身份的信息。预设的目标对象数据库中包括本行业内所有代理人的身份信息。In a specific application, a target object database containing identity information of the target object is pre-established. The identity information of the target object (agent) is obtained in advance through various channels, such as the name, ID number, telephone number, Hong Kong and Macao pass code, agent document information, etc., which can reflect the identity of the agent. The preset target object database includes the identity information of all agents in the industry.
在具体应用中,将待识别对象的身份信息与目标对象数据库中的目标对象的身份信息进行匹配,若有一项身份信息匹配则说明该待识别对象为目标对象。示例性的,待识别对象的电话号码与目标对象数据库中某一目标对象的电话号码匹配,则表明该电话号码对应的待识别对象为目标对象;待识别对象的身份证号码与目标对象数据库中某一目标对象的身份证号码匹配,则表明该身份证号码对应的待识别对象为目标对象。In a specific application, the identity information of the object to be identified is matched with the identity information of the target object in the target object database. If one identity information matches, the object to be identified is the target object. Exemplarily, the phone number of the object to be identified matches the phone number of a target object in the target object database, indicating that the object to be identified corresponding to the phone number is the target object; the ID number of the object to be identified and the target object database If the ID number of a certain target object matches, it indicates that the object to be identified corresponding to the ID number is the target object.
需要说明的是,目标对象数据库中包含多个目标对象,每个目标对象对应多个身份信息。待下发的任务列表中也包含一个或多个待识别对象,每个待识别对象也对应多个身份信息。在匹配待识别对象的身份信息和目标对象的身份信息时,只需待识别对象的一项身份信息与目标对象数据库中的某个目标对象的某一项身份信息匹配,则表明该待识别对象的身份信息与目标对象的身份信息匹配。It should be noted that the target object database includes multiple target objects, and each target object corresponds to multiple identity information. The task list to be delivered also includes one or more objects to be identified, and each object to be identified also corresponds to multiple identity information. When the identity information of the object to be identified and the identity information of the target object are matched, only one piece of identity information of the object to be identified matches one of the identity information of a target object in the target object database, indicating that the object to be identified The identity information matches the identity information of the target object.
步骤S104:若所述待识别对象的身份信息与所述目标对象的身份信息匹配,将所述待识别对象对应的任务设置为无效任务。Step S104: If the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task.
在具体应用中,当待识别对象的身份信息与目标对象的身份信息匹配时,说明该待识别对象为目标对象(代理人),则将该待识别对象对应的任务设置为无效任务。In a specific application, when the identity information of the object to be identified matches the identity information of the target object, indicating that the object to be identified is the target object (agent), the task corresponding to the object to be identified is set as an invalid task.
步骤S105:从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。Step S105: Delete the invalid task from the task list to be delivered, obtain a valid task list, and deliver the valid task list.
在具体应用中,由于该待识别对象对应的任务为无效任务,为了提高效率,将该无效任务从待下发的任务列表中删除,进而得到有效任务列表。此时,该有效任务列表中不包含目标对象对应的拨打任务。将该有效任务列表进行下发,坐席根据有效任务列表进行拨打,不会拨打到目标对象(代理人)的电话号码,进而提高拨打效率。In the specific application, the task corresponding to the object to be identified is an invalid task. In order to improve the efficiency, the invalid task is deleted from the task list to be delivered, and a valid task list is obtained. At this time, the effective task list does not include the dialing task corresponding to the target object. The effective task list is delivered, and the agent dials according to the effective task list, and does not dial the telephone number of the target object (agent), thereby improving the dialing efficiency.
本实施例提供的一种任务分配方法,通过预设目标对象数据库中目标对象的身份信息与待识别对象的身份信息进行匹配查询,精确地识别待下发任务中的目标对象,并在待下发任务中删除无效任务,提高坐席拨打的效率,有效地解决了现有的电话销售过程存在代理人识别效率低下,造成坐席拨打效率低下的问题。The task allocation method provided in this embodiment performs a matching query by using the identity information of the target object in the target object database and the identity information of the object to be identified, and accurately identifies the target object to be delivered, and waits for the target object to be delivered. The invalid task is deleted in the task, and the efficiency of the agent's dialing is improved, which effectively solves the problem that the existing telephone sales process has low efficiency of agent identification, resulting in low efficiency of agent dialing.
实施例二:Embodiment 2:
如图2所示,相对于实施例一,本实施例提供的一种任务分配方法还包括:步骤S201~S203,具体详述如下:As shown in FIG. 2, with respect to the first embodiment, the task assignment method provided in this embodiment further includes: steps S201 to S203, which are specifically described as follows:
步骤S201:若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象在预设时间段内的业务量。Step S201: If the identity information of the object to be identified does not match the identity information of the target object, obtain the traffic volume of the object to be identified within a preset time period.
在具体应用中,由于预设的目标对象数据库可能没能及时更新,为了更进一步确定待识别对象中是否还存在目标对象(代理人),在待识别对象的身份信息与目标对象的身份信息不匹配时,由于目标对象(代理人)在预设时间段内的业务量多于非目标对象,因此可以通过预设时间段内的业务量进一步分析待识别对象是否为目标对象。通过坐席系统获取身份信息与目标对象的身份信息不匹配的待识别对象在预设时间段内的业务量。In the specific application, since the preset target object database may not be updated in time, in order to further determine whether the target object (agent) still exists in the object to be identified, the identity information of the object to be identified and the identity information of the target object are not When matching, since the target object (agent) has more traffic in the preset time period than the non-target object, it is possible to further analyze whether the object to be identified is the target object by the traffic volume in the preset time period. The amount of traffic of the object to be identified whose identity information does not match the identity information of the target object in the preset time period is obtained by the agent system.
需要说明的是,预设时间段是指每天的工作时间段,例如:8:00~20:00。It should be noted that the preset time period refers to the working time period of the day, for example, 8:00~20:00.
获取待识别对象在预设时间段内的业务量具体为获取每一个待识别对象在预设时间段内的业务量,或者获取每一个待识别对象在多个预设时间段内的总业务量,将该总业务量作为该待识别对象的业务量,又或者获取每一个待识别对象在多个预设时间段内的平均业务量,将该平均业务量作为该待识别对象的业务量。Obtaining the traffic volume of the object to be identified in the preset time period is specifically acquiring the traffic volume of each object to be identified within a preset time period, or acquiring the total traffic volume of each object to be identified within a plurality of preset time segments. The total traffic is used as the traffic volume of the object to be identified, or the average traffic volume of each object to be identified in a plurality of preset time segments is obtained, and the average traffic volume is used as the traffic volume of the object to be identified.
步骤S202:判断所述业务量是否大于第一预设阈值。Step S202: Determine whether the traffic volume is greater than a first preset threshold.
在具体应用中,由于目标对象(代理人)在预设时间段内的业务量较多,因此设定第一预设阈值来判断该待识别对象是否为目标对象。即分别判断每一个待识别对象的业务量是否大于第一预设阈值,若待识别对象的业务量大于第一预设阈值,则该待识别对象为目标对象;若待识别对象的业务量不大于第一预设阈值,则该待识别对象可能不是目标对象。需要说明的是,第一预设阈值是指为了衡量待识别对象是否为目标对象而预先设置的业务量阈值。第一预设阈值可以根据行业经验进行设定。In a specific application, since the target object (agent) has a large amount of traffic in the preset time period, the first preset threshold is set to determine whether the object to be identified is the target object. That is, if the traffic volume of each object to be identified is greater than the first preset threshold, if the traffic volume of the object to be identified is greater than the first preset threshold, the object to be identified is the target object; if the traffic volume of the object to be identified is not If it is greater than the first preset threshold, the object to be identified may not be the target object. It should be noted that the first preset threshold refers to a traffic threshold that is preset in order to measure whether the object to be identified is a target object. The first preset threshold can be set according to industry experience.
步骤S203:若所述业务量大于第一预设阈值,将所述待识别对象对应的任务设置为无效任务。Step S203: If the traffic volume is greater than the first preset threshold, set the task corresponding to the object to be identified as an invalid task.
在具体应用中,由于待识别对象的业务量大于第一预设阈值,因此该待识别对象为目标对象(代理人),因此将该待识别对象对应的任务设置为无效任务。In a specific application, the object to be identified is a target object (agent), and the task corresponding to the object to be identified is set as an invalid task.
在一个实施例中,上述任务分配方法,还包括:In an embodiment, the foregoing task assignment method further includes:
步骤S204:若所述业务量不大于第一预设阈值,且所述业务量大于第二预设阈值,将所述待识别对象设置为疑似目标对象,在预设时间间隔内将所述疑似目标对象的身份信息与所述目标对象数据库中目标对象的身份信息进行匹配,其中,所述第一预设阈值大于所述第二预设阈值。Step S204: If the traffic volume is not greater than the first preset threshold, and the traffic volume is greater than the second preset threshold, the object to be identified is set as a suspect target object, and the suspect is determined within a preset time interval. The identity information of the target object is matched with the identity information of the target object in the target object database, wherein the first preset threshold is greater than the second preset threshold.
在具体应用中,当待识别对象的业务量不大于第一预设阈值且大于第二预设阈值时,表明该待识别对象可能为目标对象,将该待识别对象设置为疑似目标对象。由于目标对象数据库会进行实时更新,因此在预设时间间隔内将该疑似目标对象的身份信息与目标对象数据库中目标对象的身份信息进行匹配。需要说明的是,预设时间间隔可以根据目标对象数据库的实际更新频率进行设置。In a specific application, when the traffic volume of the object to be identified is not greater than the first preset threshold and greater than the second preset threshold, it indicates that the object to be identified may be the target object, and the object to be identified is set as the suspect target object. Since the target object database is updated in real time, the identity information of the suspected target object is matched with the identity information of the target object in the target object database in a preset time interval. It should be noted that the preset time interval can be set according to the actual update frequency of the target object database.
在具体应用中,当疑似目标对象的身份信息与目标对象数据库中目标对象的身份信息匹配,则表明该疑似目标对象为目标对象。疑似目标对象的身份信息与目标对象数据库中目标对象的身份信息不匹配,则表明该疑似目标对象不是目标对象。In a specific application, when the identity information of the suspected target object matches the identity information of the target object in the target object database, it indicates that the suspected target object is the target object. If the identity information of the suspect target object does not match the identity information of the target object in the target object database, it indicates that the suspect target object is not the target object.
需要说明的是,目标对象数据库中包含多个目标对象,每个目标对象对应多个身份信息。每个疑似目标对象也对应多个身份信息。在匹配疑似目标对象的身份信息和目标对象的身份信息时,只需疑似目标对象的一项身份信息与目标对象数据库中的某个目标对象的某一项身份信息匹配,则表明该疑似目标对象的身份信息与目标对象的身份信息匹配。It should be noted that the target object database includes multiple target objects, and each target object corresponds to multiple identity information. Each suspected target object also corresponds to multiple identity information. When the identity information of the suspected target object and the identity information of the target object are matched, only one identity information of the suspected target object matches an identity information of a target object in the target object database, indicating the suspected target object The identity information matches the identity information of the target object.
步骤S205:若所述疑似目标对象的身份信息与所述目标对象的身份信息匹配,将所述疑似目标对象对应的任务设置为无效任务。Step S205: If the identity information of the suspected target object matches the identity information of the target object, set the task corresponding to the suspected target object as an invalid task.
在具体应用中,当疑似目标对象的身份信息与目标对象的身份信息匹配时,则表明该疑似目标对象为目标对象(代理人),因此将该疑似目标对象对应的任务设置为无效任务。In a specific application, when the identity information of the suspected target object matches the identity information of the target object, it indicates that the suspected target object is the target object (agent), and therefore the task corresponding to the suspected target object is set as an invalid task.
实施例三:Embodiment 3:
如图3所示,相对于实施例一和二,本实施例提供的一种任务分配方法还包括:步骤S301~S304,具体详述如下:As shown in FIG. 3, with respect to the first and second embodiments, the task assignment method provided in this embodiment further includes: steps S301 to S304, which are specifically described as follows:
步骤S301:若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象的历史录音,并提取音频数据。Step S301: If the identity information of the object to be identified does not match the identity information of the target object, obtain a historical recording of the object to be identified, and extract audio data.
在具体应用中,为了更进一步确定待识别对象中是否还存在目标对象(代理人),在待识别对象的身份信息与目标对象的身份信息不匹配时,获取待识别对象的历史录音,并从该历史录音中提取音频数据。In a specific application, in order to further determine whether a target object (agent) still exists in the object to be identified, when the identity information of the object to be identified does not match the identity information of the target object, a historical recording of the object to be identified is obtained, and The audio data is extracted from the historical recording.
步骤S302:将所述音频数据转换为文本数据。Step S302: Convert the audio data into text data.
在具体应用中,音频数据转换为文本数据可以通过现有的音频文字转换工具进行转换。In a specific application, the conversion of audio data into text data can be converted by an existing audio text conversion tool.
步骤S303:识别所述文本数据中是否包含预设关键字。Step S303: Identify whether the preset data is included in the text data.
在具体应用中,在代理人与坐席客服通话的过程中,会采用一些行业术语和代理人的常用语。因此将行业术语和代理人的常用语设置为预设关键字。识别分析该文本数据中是否包含预设关键字。需要说明的是,预设关键字可以根据行业术语以及目标对象的常用语进行设置。In the specific application, in the process of the agent and the agent customer service call, some industry terminology and the agent's common language are adopted. Therefore, the industry terminology and the agent's common language are set as preset keywords. Identify whether the text data contains preset keywords. It should be noted that the preset keyword can be set according to industry terminology and the common language of the target object.
示例性的,获取到的文本数据为:“我要购买1101号车险,不增加特约”,其中“1101号车险”以及“特约”为本行业术语。因此该文本数据中包含预设关键字。Exemplarily, the obtained text data is: "I want to purchase No. 1101 auto insurance, no special contract", of which "No. 1101 auto insurance" and "Special contract" are industry terminology. Therefore, the text data contains preset keywords.
步骤S304:若所述文本数据中包含预设关键字,则将所述待识别对象对应的任务设置为无效任务。Step S304: If the text data includes a preset keyword, the task corresponding to the object to be identified is set as an invalid task.
在具体应用中,若文本数据中包含预设关键字,则表明该待识别对象为目标对象(代理人),因此将该待识别对象对应的任务设置为无效任务。In the specific application, if the text data includes a preset keyword, it indicates that the object to be identified is the target object (agent), and therefore the task corresponding to the object to be identified is set as an invalid task.
实施例四:Embodiment 4:
如图4所示,相对于实施例一至三,本实施例提供的一种任务分配方法还包括:步骤S401~S404,具体详述如下:As shown in FIG. 4, with respect to the first to third embodiments, the task assignment method provided in this embodiment further includes: steps S401 to S404, which are specifically described as follows:
步骤S401:若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,根据目标对象的历史录音获取目标对象的声纹特征。Step S401: If the identity information of the object to be identified does not match the identity information of the target object, obtain the voiceprint feature of the target object according to the historical recording of the target object.
在具体应用中,为了更进一步确定待识别对象中是否还存在目标对象(代理人),在待识别对象的身份信息与目标对象的身份信息不匹配时,由于每个人的声纹特征都不一样,因此可以通过待识别对象的声纹特征和目标对象的声纹特征的匹配度进一步判断该待识别对象是否为目标对象。In a specific application, in order to further determine whether the target object (agent) still exists in the object to be identified, when the identity information of the object to be identified does not match the identity information of the target object, the voiceprint characteristics of each person are different. Therefore, whether the object to be identified is the target object can be further determined by the matching degree between the voiceprint feature of the object to be identified and the voiceprint feature of the target object.
在具体应用中,获取目标对象的声纹特征,首先获取目标对象的历史录音,根据目标对象的历史录音获取目标对象的声纹特征。需要说明的是,在获取目标对象的声纹特征时是分别根据每个目标对象的历史录音获取每个目标对象的声纹特征。In a specific application, acquiring the voiceprint feature of the target object, first acquiring a historical recording of the target object, and acquiring a voiceprint feature of the target object according to the historical recording of the target object. It should be noted that when acquiring the voiceprint feature of the target object, the voiceprint feature of each target object is obtained according to the historical recording of each target object.
步骤S402:根据所述待识别对象的历史录音获取所述待识别对象的声纹特征。Step S402: Acquire a voiceprint feature of the object to be identified according to the historical recording of the object to be identified.
在具体应用中,分别获取每个待识别对象的历史录音,再根据每个待识别对象的历史录音获取该待识别对象的声纹特征。In a specific application, the historical recordings of each object to be identified are respectively acquired, and the voiceprint features of the object to be identified are obtained according to the historical recording of each object to be identified.
步骤S403:将所述待识别对象的声纹特征与所述目标对象的声纹特征进行匹配。Step S403: Match the voiceprint feature of the object to be identified with the voiceprint feature of the target object.
在具体应用中,将每个待识别对象的声纹特征与每个目标对象的声纹特征进行匹配。当待识别对象的声纹特征与某一目标对象的声纹特征匹配则表明该待识别对象为目标对象。In a specific application, the voiceprint features of each object to be identified are matched with the voiceprint features of each target object. When the voiceprint feature of the object to be identified matches the voiceprint feature of a certain target object, it indicates that the object to be recognized is the target object.
步骤S404:若匹配度超过预设匹配度阈值,则将所述待识别对象对应的任务设置为无效任务。Step S404: If the matching degree exceeds the preset matching degree threshold, the task corresponding to the object to be identified is set as an invalid task.
需要说明的是,预设匹配阈值是指预先设置的用于衡量待识别对象的声纹特征与目标对象的声纹特征是否匹配的阈值,当待识别对象的声纹特征与目标对象的声纹特征的匹配度超过预设匹配阈值,则表明该待识别对象的声纹特征与目标对象的声纹特征匹配。It should be noted that the preset matching threshold refers to a preset threshold for measuring whether the voiceprint feature of the object to be identified matches the voiceprint feature of the target object, and the voiceprint feature of the object to be recognized and the voiceprint of the target object. If the matching degree of the feature exceeds the preset matching threshold, it indicates that the voiceprint feature of the object to be identified matches the voiceprint feature of the target object.
在具体应用中,若待识别对象的声纹特征与目标对象的声纹特征匹配,则表明该待识别对象为目标对象(代理人),因此将该待识别对象对应的任务设置为无效任务。In a specific application, if the voiceprint feature of the object to be identified matches the voiceprint feature of the target object, it indicates that the object to be identified is the target object (agent), and therefore the task corresponding to the object to be identified is set as an invalid task.
实施例五:Embodiment 5:
如图5所示,本实施例提供一种任务分配系统100,用于执行实施例一中的方法步骤,其包括:待下发任务获取模块101、身份信息获取模块102、匹配模块103、匹配无效模块104以及删除模块105。As shown in FIG. 5, the present embodiment provides a task allocation system 100, which is used to perform the method steps in the first embodiment, which includes: a task to be delivered, an identity acquisition module 102, a matching module 103, and a matching. The invalid module 104 and the delete module 105.
待下发任务获取模块101,用于获取待下发的任务列表;The task obtaining module 101 is configured to obtain a task list to be delivered.
身份信息获取模块102,用于获取所述待下发的任务列表中待识别对象的身份信息;The identity information obtaining module 102 is configured to obtain identity information of the object to be identified in the task list to be delivered;
匹配模块103,用于通过预设目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;The matching module 103 is configured to match the identity information of the object to be identified by presetting the identity information of the target object in the target object database;
匹配无效模块104,用于若所述待识别对象的身份信息与所述目标对象的身份信息匹配,则将所述待识别对象对应的任务设置为无效任务;The matching invalidation module 104 is configured to: if the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task;
删除模块105,用于从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。The deleting module 105 is configured to delete the invalid task from the task list to be delivered, obtain a valid task list, and send the valid task list.
需要说明的是,本申请实施例提供的任务分配系统,由于与本申请图1所示方法实施例基于同一构思,其带来的技术效果与本申请图1所示方法实施例相同,具体内容可参见本申请图1所示方法实施例中的叙述,此处不再赘述。It should be noted that the task distribution system provided by the embodiment of the present application is based on the same concept as the method embodiment shown in FIG. 1 of the present application, and the technical effects thereof are the same as those of the method embodiment shown in FIG. 1 of the present application. For reference, refer to the description in the method embodiment shown in FIG. 1 of the present application, and details are not described herein again.
实施例六:Example 6:
如图6所示,本实施例提供一种任务分配系统200,用于执行实施例二中的方法步骤,其包括:业务量获取模块201、第一阈值判断模块202以及预设阈值无效模块203。As shown in FIG. 6 , the present embodiment provides a task distribution system 200 for performing the method steps in the second embodiment, including: a traffic volume obtaining module 201, a first threshold determining module 202, and a preset threshold invalidating module 203. .
业务量获取模块201,用于若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象在预设时间段内的业务量。The traffic acquisition module 201 is configured to obtain the traffic volume of the object to be identified within a preset time period if the identity information of the object to be identified does not match the identity information of the target object.
第一阈值判断模块202,用于判断所述业务量是否大于第一预设阈值。The first threshold determining module 202 is configured to determine whether the traffic volume is greater than a first preset threshold.
预设阈值无效模块203,用于若所述业务量大于第一预设阈值,将所述待识别对象对应的任务设置为无效任务。The preset threshold invalidation module 203 is configured to set the task corresponding to the object to be identified as an invalid task if the traffic volume is greater than the first preset threshold.
在一个实施例中,上述任务分配系统还包括:第二阈值判断模块和疑似目标对象匹配模块。In an embodiment, the task distribution system further includes: a second threshold determination module and a suspected target object matching module.
第二阈值判断模块,用于若所述业务量不大于第一预设阈值,且所述业务量大于第二预设阈值,将所述待识别对象设置为疑似目标对象在预设时间间隔内将所述疑似目标对象的身份信息与所述目标对象数据库中目标对象的身份信息进行匹配,其中,所述第一预设阈值大于所述第二预设阈值;a second threshold determining module, configured to set the object to be identified as a suspect target object within a preset time interval, if the traffic volume is not greater than a first preset threshold, and the traffic volume is greater than a second preset threshold Matching the identity information of the suspect target object with the identity information of the target object in the target object database, where the first preset threshold is greater than the second preset threshold;
疑似目标对象匹配模块,用于若所述疑似目标对象的身份信息与所述目标对象的身份信息匹配,将所述疑似目标对象对应的任务设置为无效任务。The suspected target object matching module is configured to: if the identity information of the suspected target object matches the identity information of the target object, set the task corresponding to the suspected target object as an invalid task.
实施例七:Example 7:
如图7所示,本实施例提供的一种任务分配系统300,用于执行实施例三中的方法步骤,其包括:音频获取模块301、转换模块302、识别模块303以及关键字无效模块304。As shown in FIG. 7, a task distribution system 300 is provided to perform the method steps in the third embodiment, including: an audio acquisition module 301, a conversion module 302, an identification module 303, and a keyword invalidation module 304. .
音频获取模块301用于若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象的历史录音,并提取音频数据。The audio acquisition module 301 is configured to acquire a historical recording of the object to be identified and extract audio data if the identity information of the object to be identified does not match the identity information of the target object.
转换模块302用于将所述音频数据转换为文本数据。The conversion module 302 is configured to convert the audio data into text data.
识别模块303用于识别所述文本数据中是否包含预设关键字。The identification module 303 is configured to identify whether the preset data is included in the text data.
关键字无效模块304用于若所述文本数据中包含预设关键字,则将所述待识别对象对应的任务设置为无效任务。The keyword invalidation module 304 is configured to set the task corresponding to the object to be identified as an invalid task if the text data includes a preset keyword.
实施例八:Example 8:
如图8所示,本实施例提供的一种任务分配系400,用于执行实施例四中的方法步骤,其包括:目标声纹获取模块401、识别声纹获取模块402、声纹匹配模块403以及匹配阈值无效模块404。As shown in FIG. 8 , the task distribution system 400 is configured to perform the method steps in the fourth embodiment, and includes: a target voiceprint acquisition module 401, a voiceprint acquisition module 402, and a voiceprint matching module. 403 and a matching threshold invalidation module 404.
目标声纹获取模块401用于若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,根据目标对象的历史录音获取目标对象的声纹特征。The target voiceprint obtaining module 401 is configured to obtain the voiceprint feature of the target object according to the historical recording of the target object if the identity information of the object to be identified does not match the identity information of the target object.
识别声纹获取模块402用于根据所述待识别对象的历史录音获取所述待识别对象的声纹特征。The voiceprint acquisition module 402 is configured to acquire the voiceprint feature of the object to be identified according to the historical recording of the object to be identified.
声纹匹配模块403用于将所述待识别对象的声纹特征与所述目标对象的声纹特征进行匹配。The voiceprint matching module 403 is configured to match the voiceprint feature of the object to be identified with the voiceprint feature of the target object.
匹配阈值无效模块404用于若匹配度超过预设匹配度阈值,则将所述待识别对象对应的任务设置为无效任务。The matching threshold invalidation module 404 is configured to set the task corresponding to the object to be identified as an invalid task if the matching degree exceeds the preset matching degree threshold.
实施例九:Example 9:
图9是本申请实施例九提供的终端设备的示意图。如图9所示,该实施例的终端设备9包括:处理器90、存储器91以及存储在所述存储器91中并可在所述处理器90上运行的计算机可读指令92,例如程序。所述处理器90执行所述计算机可读指令92时实现上述各个基于区块链的车辆违章检测方法实施例中的步骤,例如图1所示的步骤S101至S105。或者,所述处理器90执行所述计算机可读指令92时实现上述系统实施例中各模块/单元的功能,例如图5所示模块101至105的功能。FIG. 9 is a schematic diagram of a terminal device provided in Embodiment 9 of the present application. As shown in FIG. 9, the terminal device 9 of this embodiment includes a processor 90, a memory 91, and computer readable instructions 92, such as programs, stored in the memory 91 and executable on the processor 90. The processor 90 executes the computer readable instructions 92 to implement the steps in the various blockchain-based vehicle violation detection method embodiments, such as steps S101 to S105 shown in FIG. Alternatively, the processor 90 implements the functions of the modules/units in the above-described system embodiments when the computer readable instructions 92 are executed, such as the functions of the modules 101-105 shown in FIG.
示例性的,所述计算机可读指令92可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器91中,并由所述处理器90执行,以完成本申请。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机可读指令指令段,该指令段用于描述所述计算机可读指令92在所述终端设备9中的执行过程。例如,所述计算机可读指令92可以被分割成待下发任务获取模块、身份信息获取模块、匹配模块、匹配无效模块以及删除模块,各模块具体功能如下:Illustratively, the computer readable instructions 92 may be partitioned into one or more modules/units that are stored in the memory 91 and executed by the processor 90, To complete this application. The one or more modules/units may be a series of computer readable instruction instruction segments capable of performing a particular function, the instruction segments being used to describe the execution of the computer readable instructions 92 in the terminal device 9. For example, the computer readable instructions 92 may be divided into a task to be delivered, an identity information acquisition module, a matching module, a matching invalid module, and a deletion module. The specific functions of each module are as follows:
待下发任务获取模块,用于获取待下发的任务列表;The task obtaining module is configured to obtain a task list to be delivered.
身份信息获取模块,用于获取所述待下发的任务列表中待识别对象的身份信息,An identity information obtaining module, configured to acquire identity information of an object to be identified in the task list to be delivered,
匹配模块,用于通过预设目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;a matching module, configured to match identity information of the object to be identified by presetting the identity information of the target object in the target object database;
匹配无效模块,用于若所述待识别对象的身份信息与所述目标对象的身份信息匹配,则将所述待识别对象对应的任务设置为无效任务;And the matching invalidation module is configured to: if the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task;
删除模块,用于从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。And a deletion module, configured to delete the invalid task from the task list to be delivered, obtain a valid task list, and deliver the valid task list.
所述终端设备9可以是桌上型计算机、笔记本、掌上电脑及云端管理服务器等计算设备。所述终端设备可包括,但不仅限于,处理器90、存储器91。本领域技术人员可以理解,图9仅仅是终端设备9的示例,并不构成对终端设备9的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述终端设备还可以包括输入输出设备、网络接入设备、总线等。The terminal device 9 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud management server. The terminal device may include, but is not limited to, a processor 90 and a memory 91. It will be understood by those skilled in the art that FIG. 9 is only an example of the terminal device 9, does not constitute a limitation of the terminal device 9, may include more or less components than those illustrated, or combine some components, or different components. For example, the terminal device may further include an input/output device, a network access device, a bus, and the like.
所称处理器90可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The so-called processor 90 can be a central processing unit (Central Processing Unit, CPU), can also be other general-purpose processors, digital signal processors (DSP), application specific integrated circuits (Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
所述存储器91可以是所述终端设备9的内部存储单元,例如终端设备9的硬盘或内存。所述存储器91也可以是所述终端设备9的外部存储设备,例如所述终端设备9上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器91还可以既包括所述终端设备9的内部存储单元也包括外部存储设备。所述存储器91用于存储所述计算机可读指令以及所述终端设备所需的其他程序和数据。所述存储器91还可以用于暂时地存储已经输出或者将要输出的数据。The memory 91 may be an internal storage unit of the terminal device 9, such as a hard disk or a memory of the terminal device 9. The memory 91 may also be an external storage device of the terminal device 9, for example, a plug-in hard disk provided on the terminal device 9, a smart memory card (SMC), and a secure digital (SD). Card, flash card (Flash Card) and so on. Further, the memory 91 may also include both an internal storage unit of the terminal device 9 and an external storage device. The memory 91 is configured to store the computer readable instructions and other programs and data required by the terminal device. The memory 91 can also be used to temporarily store data that has been output or is about to be output.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述系统的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述无线终端中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。It will be apparent to those skilled in the art that, for convenience and brevity of description, only the division of each functional unit and module described above is exemplified. In practical applications, the above functions may be assigned to different functional units as needed. The module is completed by dividing the internal structure of the system into different functional units or modules to perform all or part of the functions described above. Each functional unit and module in the embodiment may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit, and the integrated unit may be hardware. Formal implementation can also be implemented in the form of software functional units. In addition, the specific names of the respective functional units and modules are only for the purpose of facilitating mutual differentiation, and are not intended to limit the scope of protection of the present application. For the specific working process of the unit and the module in the foregoing wireless terminal, reference may be made to the corresponding process in the foregoing method embodiment, and details are not described herein again.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the parts that are not detailed or described in a certain embodiment can be referred to the related descriptions of other embodiments.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
在本申请所提供的实施例中,应该理解到,所揭露的系统/终端设备和方法,可以通过其它的方式实现。例如,以上所描述的系统/终端设备实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,系统或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。In the embodiments provided by the present application, it should be understood that the disclosed system/terminal device and method may be implemented in other manners. For example, the system/terminal device embodiment described above is merely illustrative. For example, the division of the module or unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units. Or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, system or unit, and may be in electrical, mechanical or other form.
所述设置为分离部件说明的单元可以是或者也可以不是物理上分开的,设置为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units provided as separate component descriptions may or may not be physically separated, and the components arranged for unit display may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. on. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
所述集成的模块/单元如果以软件功能单元的形式实现并设置为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,也可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一计算机可读存储介质中,该计算机可读指令在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机可读指令包括计算机可读指令代码,所述计算机可读指令代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机可读指令代码的任何实体或系统、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括是电载波信号和电信信号。The integrated modules/units, if implemented in the form of software functional units and arranged to be sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, the present application implements all or part of the processes in the foregoing embodiments, and may also be implemented by computer readable instructions, which may be stored in a computer readable storage medium. The computer readable instructions, when executed by a processor, may implement the steps of the various method embodiments described above. Wherein, the computer readable instructions comprise computer readable instruction code, which may be in the form of source code, an object code form, an executable file or some intermediate form or the like. The computer readable medium can include any entity or system capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a removable hard drive, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only) Memory), random access memory (RAM, Random) Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. It should be noted that the content contained in the computer readable medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction, for example, in some jurisdictions, according to legislation and patent practice, computer readable media It does not include electrical carrier signals and telecommunication signals.
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。The above-mentioned embodiments are only used to explain the technical solutions of the present application, and are not limited thereto; although the present application has been described in detail with reference to the foregoing embodiments, those skilled in the art should understand that they can still implement the foregoing embodiments. The technical solutions described in the examples are modified or equivalently replaced with some of the technical features; and the modifications or substitutions do not deviate from the spirit and scope of the technical solutions of the embodiments of the present application, and should be included in Within the scope of protection of this application.

Claims (20)

  1. 一种任务分配方法,其特征在于,包括:A task assignment method, comprising:
    获取待下发的任务列表;Obtain a list of tasks to be delivered;
    获取所述待下发的任务列表中待识别对象的身份信息;Obtaining identity information of the object to be identified in the task list to be delivered;
    通过预设的目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;Matching the identity information of the object to be identified by the identity information of the target object in the preset target object database;
    若所述待识别对象的身份信息与所述目标对象的身份信息匹配,将所述待识别对象对应的任务设置为无效任务;And if the identity information of the object to be identified matches the identity information of the target object, setting the task corresponding to the object to be identified as an invalid task;
    从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。Deleting the invalid task from the task list to be delivered, obtaining a valid task list, and delivering the valid task list.
  2. 根据权利要求1所述的任务分配方法,其特征在于,还包括:The task assignment method according to claim 1, further comprising:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象在预设时间段内的业务量;If the identity information of the object to be identified does not match the identity information of the target object, obtain the traffic volume of the object to be identified within a preset time period;
    判断所述业务量是否大于第一预设阈值;Determining whether the traffic volume is greater than a first preset threshold;
    若所述业务量大于第一预设阈值,将所述待识别对象对应的任务设置为无效任务。If the traffic volume is greater than the first preset threshold, the task corresponding to the object to be identified is set as an invalid task.
  3. 根据权利要求2所述的任务分配方法,其特征在于,还包括:The task assignment method according to claim 2, further comprising:
    若所述业务量不大于第一预设阈值,且所述业务量大于第二预设阈值,将所述待识别对象设置为疑似目标对象,在预设时间间隔内将所述疑似目标对象的身份信息与所述目标对象数据库中目标对象的身份信息进行匹配,其中,所述第一预设阈值大于所述第二预设阈值;If the traffic volume is not greater than the first preset threshold, and the traffic volume is greater than the second preset threshold, the object to be identified is set as a suspect target object, and the suspect target object is set in a preset time interval. The identity information is matched with the identity information of the target object in the target object database, where the first preset threshold is greater than the second preset threshold;
    若所述疑似目标对象的身份信息与所述目标对象的身份信息匹配,将所述疑似目标对象对应的任务设置为无效任务。And if the identity information of the suspected target object matches the identity information of the target object, setting the task corresponding to the suspected target object as an invalid task.
  4. 根据权利要求1所述的任务分配方法,其特征在于,还包括:The task assignment method according to claim 1, further comprising:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象的历史录音,并提取音频数据;If the identity information of the object to be identified does not match the identity information of the target object, obtain a historical recording of the object to be identified, and extract audio data;
    将所述音频数据转换为文本数据;Converting the audio data into text data;
    识别所述文本数据中是否包含预设关键字;Identifying whether the text data includes a preset keyword;
    若所述文本数据中包含预设关键字,则将所述待识别对象对应的任务设置为无效任务。If the text data includes a preset keyword, the task corresponding to the object to be identified is set as an invalid task.
  5. 根据权利要求1所述的任务分配方法,其特征在于,还包括:The task assignment method according to claim 1, further comprising:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,根据目标对象的历史录音获取目标对象的声纹特征;If the identity information of the object to be identified does not match the identity information of the target object, obtaining a voiceprint feature of the target object according to a historical recording of the target object;
    根据所述待识别对象的历史录音获取所述待识别对象的声纹特征;Obtaining a voiceprint feature of the object to be identified according to the historical recording of the object to be identified;
    将所述待识别对象的声纹特征与所述目标对象的声纹特征进行匹配;Matching the voiceprint feature of the object to be identified with the voiceprint feature of the target object;
    若匹配度超过预设匹配度阈值,则将所述待识别对象对应的任务设置为无效任务。If the matching degree exceeds the preset matching degree threshold, the task corresponding to the object to be identified is set as an invalid task.
  6. 一种任务分配系统,其特征在于,包括:A task distribution system, comprising:
    待下发任务获取模块,用于获取待下发的任务列表;The task obtaining module is configured to obtain a task list to be delivered.
    身份信息获取模块,用于获取所述待下发的任务列表中待识别对象的身份信息;An identity information obtaining module, configured to acquire identity information of an object to be identified in the task list to be delivered;
    匹配模块,用于通过预设目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;a matching module, configured to match identity information of the object to be identified by presetting the identity information of the target object in the target object database;
    匹配无效模块,用于若所述待识别对象的身份信息与所述目标对象的身份信息匹配,则将所述待识别对象对应的任务设置为无效任务;And the matching invalidation module is configured to: if the identity information of the object to be identified matches the identity information of the target object, set the task corresponding to the object to be identified as an invalid task;
    删除模块,用于从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。And a deletion module, configured to delete the invalid task from the task list to be delivered, obtain a valid task list, and deliver the valid task list.
  7. 根据权利要求6所述的任务分配系统,其特征在于,还包括:The task distribution system according to claim 6, further comprising:
    业务量获取模块,用于若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象在预设时间段内的业务量。The traffic acquisition module is configured to acquire the traffic volume of the object to be identified within a preset time period if the identity information of the object to be identified does not match the identity information of the target object.
    第一阈值判断模块,用于判断所述业务量是否大于第一预设阈值。The first threshold determining module is configured to determine whether the traffic volume is greater than a first preset threshold.
    预设阈值无效模块,用于若所述业务量大于第一预设阈值,将所述待识别对象对应的任务设置为无效任务。The preset threshold invalidation module is configured to set the task corresponding to the object to be identified as an invalid task if the traffic volume is greater than the first preset threshold.
  8. 根据权利要求7所述的任务分配系统,其特征在于,还包括:The task distribution system according to claim 7, further comprising:
    第二阈值判断模块,用于若所述业务量不大于第一预设阈值,且所述业务量大于第二预设阈值,将所述待识别对象设置为疑似目标对象在预设时间间隔内将所述疑似目标对象的身份信息与所述目标对象数据库中目标对象的身份信息进行匹配,其中,所述第一预设阈值大于所述第二预设阈值;a second threshold determining module, configured to set the object to be identified as a suspect target object within a preset time interval, if the traffic volume is not greater than a first preset threshold, and the traffic volume is greater than a second preset threshold Matching the identity information of the suspect target object with the identity information of the target object in the target object database, where the first preset threshold is greater than the second preset threshold;
    疑似目标对象匹配模块,用于若所述疑似目标对象的身份信息与所述目标对象的身份信息匹配,将所述疑似目标对象对应的任务设置为无效任务。The suspected target object matching module is configured to: if the identity information of the suspected target object matches the identity information of the target object, set the task corresponding to the suspected target object as an invalid task.
  9. 根据权利要求6所述的任务分配系统,其特征在于,还包括:The task distribution system according to claim 6, further comprising:
    音频获取模块,用于若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象的历史录音,并提取音频数据;An audio acquisition module, configured to: if the identity information of the object to be identified does not match the identity information of the target object, acquire a historical recording of the object to be identified, and extract audio data;
    转换模块,用于将所述音频数据转换为文本数据;a conversion module, configured to convert the audio data into text data;
    识别模块,用于识别所述文本数据中是否包含预设关键字;An identification module, configured to identify whether the text data includes a preset keyword;
    关键字无效模块,用于若所述文本数据中包含预设关键字,则将所述待识别对象对应的任务设置为无效任务。The keyword invalidation module is configured to set the task corresponding to the object to be identified as an invalid task if the text data includes a preset keyword.
  10. 根据权利要求6所述的任务分配系统,其特征在于,还包括:The task distribution system according to claim 6, further comprising:
    目标声纹获取模块,用于若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,根据目标对象的历史录音获取目标对象的声纹特征;a target voiceprint acquiring module, configured to obtain a voiceprint feature of the target object according to the historical recording of the target object if the identity information of the object to be identified does not match the identity information of the target object;
    识别声纹获取模块,用于根据所述待识别对象的历史录音获取所述待识别对象的声纹特征;a voiceprint acquisition module, configured to acquire a voiceprint feature of the object to be identified according to the historical recording of the object to be identified;
    声纹匹配模块,用于将所述待识别对象的声纹特征与所述目标对象的声纹特征进行匹配;a voiceprint matching module, configured to match a voiceprint feature of the object to be identified with a voiceprint feature of the target object;
    匹配阈值无效模块,用于若匹配度超过预设匹配度阈值,则将所述待识别对象对应的任务设置为无效任务。The matching threshold invalidation module is configured to set the task corresponding to the object to be identified as an invalid task if the matching degree exceeds the preset matching degree threshold.
  11. 一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:A terminal device comprising a memory, a processor, and computer readable instructions stored in the memory and operable on the processor, wherein the processor executes the computer readable instructions as follows step:
    获取待下发的任务列表;Obtain a list of tasks to be delivered;
    获取所述待下发的任务列表中待识别对象的身份信息;Obtaining identity information of the object to be identified in the task list to be delivered;
    通过预设的目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;Matching the identity information of the object to be identified by the identity information of the target object in the preset target object database;
    若所述待识别对象的身份信息与所述目标对象的身份信息匹配,将所述待识别对象对应的任务设置为无效任务;And if the identity information of the object to be identified matches the identity information of the target object, setting the task corresponding to the object to be identified as an invalid task;
    从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。Deleting the invalid task from the task list to be delivered, obtaining a valid task list, and delivering the valid task list.
  12. 根据权利要求11所述的终端设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:The terminal device according to claim 11, wherein the processor further implements the following steps when the computer readable instructions are executed:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象在预设时间段内的业务量;If the identity information of the object to be identified does not match the identity information of the target object, obtain the traffic volume of the object to be identified within a preset time period;
    判断所述业务量是否大于第一预设阈值;Determining whether the traffic volume is greater than a first preset threshold;
    若所述业务量大于第一预设阈值,将所述待识别对象对应的任务设置为无效任务。If the traffic volume is greater than the first preset threshold, the task corresponding to the object to be identified is set as an invalid task.
  13. 根据权利要求12所述的终端设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:The terminal device according to claim 12, wherein the processor further implements the following steps when the computer readable instructions are executed:
    若所述业务量不大于第一预设阈值,且所述业务量大于第二预设阈值,将所述待识别对象设置为疑似目标对象,在预设时间间隔内将所述疑似目标对象的身份信息与所述目标对象数据库中目标对象的身份信息进行匹配,其中,所述第一预设阈值大于所述第二预设阈值;If the traffic volume is not greater than the first preset threshold, and the traffic volume is greater than the second preset threshold, the object to be identified is set as a suspect target object, and the suspect target object is set in a preset time interval. The identity information is matched with the identity information of the target object in the target object database, where the first preset threshold is greater than the second preset threshold;
    若所述疑似目标对象的身份信息与所述目标对象的身份信息匹配,将所述疑似目标对象对应的任务设置为无效任务。And if the identity information of the suspected target object matches the identity information of the target object, setting the task corresponding to the suspected target object as an invalid task.
  14. 根据权利要求11所述的终端设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:The terminal device according to claim 11, wherein the processor further implements the following steps when the computer readable instructions are executed:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象的历史录音,并提取音频数据;If the identity information of the object to be identified does not match the identity information of the target object, obtain a historical recording of the object to be identified, and extract audio data;
    将所述音频数据转换为文本数据;Converting the audio data into text data;
    识别所述文本数据中是否包含预设关键字;Identifying whether the text data includes a preset keyword;
    若所述文本数据中包含预设关键字,则将所述待识别对象对应的任务设置为无效任务。If the text data includes a preset keyword, the task corresponding to the object to be identified is set as an invalid task.
  15. 根据权利要求11所述的终端设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:The terminal device according to claim 11, wherein the processor further implements the following steps when the computer readable instructions are executed:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,根据目标对象的历史录音获取目标对象的声纹特征;If the identity information of the object to be identified does not match the identity information of the target object, obtaining a voiceprint feature of the target object according to a historical recording of the target object;
    根据所述待识别对象的历史录音获取所述待识别对象的声纹特征;Obtaining a voiceprint feature of the object to be identified according to the historical recording of the object to be identified;
    将所述待识别对象的声纹特征与所述目标对象的声纹特征进行匹配;Matching the voiceprint feature of the object to be identified with the voiceprint feature of the target object;
    若匹配度超过预设匹配度阈值,则将所述待识别对象对应的任务设置为无效任务。If the matching degree exceeds the preset matching degree threshold, the task corresponding to the object to be identified is set as an invalid task.
  16. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如下步骤:A computer readable storage medium storing computer readable instructions, wherein the computer readable instructions, when executed by a processor, implement the following steps:
    获取待下发的任务列表;Obtain a list of tasks to be delivered;
    获取所述待下发的任务列表中待识别对象的身份信息;Obtaining identity information of the object to be identified in the task list to be delivered;
    通过预设的目标对象数据库中目标对象的身份信息对所述待识别对象的身份信息进行匹配;Matching the identity information of the object to be identified by the identity information of the target object in the preset target object database;
    若所述待识别对象的身份信息与所述目标对象的身份信息匹配,将所述待识别对象对应的任务设置为无效任务;And if the identity information of the object to be identified matches the identity information of the target object, setting the task corresponding to the object to be identified as an invalid task;
    从所述待下发的任务列表中删除所述无效任务,得到有效任务列表并将所述有效任务列表进行下发。Deleting the invalid task from the task list to be delivered, obtaining a valid task list, and delivering the valid task list.
  17. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述计算机可读指令被处理器执行时还实现如下步骤:The computer readable storage medium of claim 16, wherein the computer readable instructions are further executed by the processor to:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象在预设时间段内的业务量;If the identity information of the object to be identified does not match the identity information of the target object, obtain the traffic volume of the object to be identified within a preset time period;
    判断所述业务量是否大于第一预设阈值;Determining whether the traffic volume is greater than a first preset threshold;
    若所述业务量大于第一预设阈值,将所述待识别对象对应的任务设置为无效任务。If the traffic volume is greater than the first preset threshold, the task corresponding to the object to be identified is set as an invalid task.
  18. 根据权利要求17所述的计算机可读存储介质,其特征在于,所述计算机可读指令被处理器执行时还实现如下步骤:The computer readable storage medium of claim 17, wherein the computer readable instructions are further executed by the processor to:
    若所述业务量不大于第一预设阈值,且所述业务量大于第二预设阈值,将所述待识别对象设置为疑似目标对象,在预设时间间隔内将所述疑似目标对象的身份信息与所述目标对象数据库中目标对象的身份信息进行匹配,其中,所述第一预设阈值大于所述第二预设阈值;If the traffic volume is not greater than the first preset threshold, and the traffic volume is greater than the second preset threshold, the object to be identified is set as a suspect target object, and the suspect target object is set in a preset time interval. The identity information is matched with the identity information of the target object in the target object database, where the first preset threshold is greater than the second preset threshold;
    若所述疑似目标对象的身份信息与所述目标对象的身份信息匹配,将所述疑似目标对象对应的任务设置为无效任务。And if the identity information of the suspected target object matches the identity information of the target object, setting the task corresponding to the suspected target object as an invalid task.
  19. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述计算机可读指令被处理器执行时还实现如下步骤:The computer readable storage medium of claim 16, wherein the computer readable instructions are further executed by the processor to:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,获取所述待识别对象的历史录音,并提取音频数据;If the identity information of the object to be identified does not match the identity information of the target object, obtain a historical recording of the object to be identified, and extract audio data;
    将所述音频数据转换为文本数据;Converting the audio data into text data;
    识别所述文本数据中是否包含预设关键字;Identifying whether the text data includes a preset keyword;
    若所述文本数据中包含预设关键字,则将所述待识别对象对应的任务设置为无效任务。If the text data includes a preset keyword, the task corresponding to the object to be identified is set as an invalid task.
  20. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述计算机可读指令被处理器执行时还实现如下步骤:The computer readable storage medium of claim 16, wherein the computer readable instructions are further executed by the processor to:
    若所述待识别对象的身份信息与所述目标对象的身份信息不匹配,根据目标对象的历史录音获取目标对象的声纹特征;If the identity information of the object to be identified does not match the identity information of the target object, obtaining a voiceprint feature of the target object according to a historical recording of the target object;
    根据所述待识别对象的历史录音获取所述待识别对象的声纹特征;Obtaining a voiceprint feature of the object to be identified according to the historical recording of the object to be identified;
    将所述待识别对象的声纹特征与所述目标对象的声纹特征进行匹配;Matching the voiceprint feature of the object to be identified with the voiceprint feature of the target object;
    若匹配度超过预设匹配度阈值,则将所述待识别对象对应的任务设置为无效任务。If the matching degree exceeds the preset matching degree threshold, the task corresponding to the object to be identified is set as an invalid task.
PCT/CN2018/097527 2018-04-24 2018-07-27 Task allocation method and system, and terminal device WO2019205324A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810373332.2 2018-04-24
CN201810373332.2A CN108764633A (en) 2018-04-24 2018-04-24 A kind of method for allocating tasks, system and terminal device

Publications (1)

Publication Number Publication Date
WO2019205324A1 true WO2019205324A1 (en) 2019-10-31

Family

ID=64011632

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/097527 WO2019205324A1 (en) 2018-04-24 2018-07-27 Task allocation method and system, and terminal device

Country Status (2)

Country Link
CN (1) CN108764633A (en)
WO (1) WO2019205324A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114757278A (en) * 2022-04-15 2022-07-15 北京科杰科技有限公司 Invalid task processing method and device, computer equipment and storage medium

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177182B (en) * 2019-04-15 2022-09-02 中国平安人寿保险股份有限公司 Sensitive data processing method and device, computer equipment and storage medium
CN112232613A (en) * 2019-07-15 2021-01-15 拉扎斯网络科技(上海)有限公司 Task scheduling method and device, electronic equipment and computer readable storage medium
CN111709824A (en) * 2020-06-09 2020-09-25 中国建设银行股份有限公司 Service data processing method and device and electronic equipment
CN114897429B (en) * 2022-06-07 2024-02-02 平安科技(深圳)有限公司 Task allocation method, device, equipment and storage medium suitable for customer service communication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104753758A (en) * 2013-12-30 2015-07-01 深圳市腾讯计算机系统有限公司 Information attribute identification method and device
CN107094166A (en) * 2016-12-12 2017-08-25 口碑控股有限公司 A kind of service information sending method and device
CN107220262A (en) * 2016-03-22 2017-09-29 阿里巴巴集团控股有限公司 Information processing method and device
CN107357821A (en) * 2017-05-24 2017-11-17 杭州励飞软件技术有限公司 Method for managing system, device and storage medium
CN107506639A (en) * 2017-08-28 2017-12-22 广东小天才科技有限公司 One kind applies management-control method and device
CN107609058A (en) * 2017-08-25 2018-01-19 维沃移动通信有限公司 A kind of marketing method, robot customer side, artificial customer side and user terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030169857A1 (en) * 2002-03-06 2003-09-11 Lucent Technologies Inc. Subscriber activated calling party voice-print identification system for voice message screening
CN107040671A (en) * 2016-08-23 2017-08-11 平安科技(深圳)有限公司 List distribution method and device
CN106851026A (en) * 2017-01-23 2017-06-13 北京奇虎科技有限公司 Inactive phone number is recognized and method for cleaning, device and mobile terminal
CN107220532B (en) * 2017-04-08 2020-10-23 网易(杭州)网络有限公司 Method and apparatus for recognizing user identity through voice
CN107784517A (en) * 2017-08-28 2018-03-09 平安科技(深圳)有限公司 A kind of customer information screening method and terminal device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104753758A (en) * 2013-12-30 2015-07-01 深圳市腾讯计算机系统有限公司 Information attribute identification method and device
CN107220262A (en) * 2016-03-22 2017-09-29 阿里巴巴集团控股有限公司 Information processing method and device
CN107094166A (en) * 2016-12-12 2017-08-25 口碑控股有限公司 A kind of service information sending method and device
CN107357821A (en) * 2017-05-24 2017-11-17 杭州励飞软件技术有限公司 Method for managing system, device and storage medium
CN107609058A (en) * 2017-08-25 2018-01-19 维沃移动通信有限公司 A kind of marketing method, robot customer side, artificial customer side and user terminal
CN107506639A (en) * 2017-08-28 2017-12-22 广东小天才科技有限公司 One kind applies management-control method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114757278A (en) * 2022-04-15 2022-07-15 北京科杰科技有限公司 Invalid task processing method and device, computer equipment and storage medium
CN114757278B (en) * 2022-04-15 2022-12-16 北京科杰科技有限公司 Invalid task processing method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN108764633A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
WO2019205324A1 (en) Task allocation method and system, and terminal device
CN109241068B (en) Method and device for comparing foreground and background data and terminal equipment
CN107767070B (en) Method and device for information popularization
CN111371858B (en) Group control equipment identification method, device, medium and electronic equipment
CN108920257B (en) Transaction processing method, device, equipment and storage medium
WO2019179030A1 (en) Product purchasing prediction method, server and storage medium
CN110796556A (en) Information processing method and device, computer readable storage medium and electronic equipment
CN110264222A (en) Responsible investigation method, apparatus and terminal device based on data acquisition
CN112950191A (en) Service data processing method and device based on fee refunding service and computer equipment
CN109544207A (en) A kind of information processing method, storage medium and server
CN111695077A (en) Asset information pushing method, terminal equipment and readable storage medium
CN109377391B (en) Information tracking method, storage medium and server
CN112905677A (en) Data processing method and device, service processing system and computer equipment
CN109146122A (en) A kind of probability forecasting method, device, electronic equipment and computer storage medium
CN112612817B (en) Data processing method, device, terminal equipment and computer readable storage medium
CN114817347A (en) Business approval method and device, electronic equipment and storage medium
CN109582720B (en) Data storage method, device and storage medium
CN113128595A (en) Method, apparatus, device and computer readable medium for integrating customer information
CN112907395A (en) Client type identification method, device and equipment
CN112131219A (en) Customer maintenance management method and system
CN110619275A (en) Information pushing method and device, computer equipment and storage medium
CN113434754A (en) Method and device for determining recommended API (application program interface) service, electronic equipment and storage medium
CN109447386B (en) Work assessment method and terminal equipment
CN113392138B (en) Statistical analysis method, device, server and storage medium for private data
WO2019223135A1 (en) Workbook filtering method, device, computer apparatus, and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18916526

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 02/02/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18916526

Country of ref document: EP

Kind code of ref document: A1