CN109191153A - A kind of jewelry after-sales-service information management method - Google Patents
A kind of jewelry after-sales-service information management method Download PDFInfo
- Publication number
- CN109191153A CN109191153A CN201811096636.5A CN201811096636A CN109191153A CN 109191153 A CN109191153 A CN 109191153A CN 201811096636 A CN201811096636 A CN 201811096636A CN 109191153 A CN109191153 A CN 109191153A
- Authority
- CN
- China
- Prior art keywords
- information
- feedback
- sales
- jewelry
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
- G06Q30/015—Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
- G06Q30/016—After-sales
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of jewelry after-sales-service information management methods, the following steps are included: user passes through feedback platform, the user information is obtained by feedback platform real-name authentication, location information is obtained by feedback platform GPS positioning, corresponding product information passes through the corresponding consumer record of user information search, feedback information is uploaded into cloud, feedback information includes user information, location information, text information, image information, corresponding product information and classification options information.A kind of jewelry after-sales-service information management method of the present invention, first, preferably information can be encrypted, avoid information leakage, while can preferably guarantee the safety of information transmitting, secondly, can more have professional offer solution, avoiding influence problem timely, solve the problem of can also solution user much sooner, human input can be preferably saved simultaneously, brings better prospect of the application.
Description
Technical field
The present invention relates to after-sales-service information management domain, in particular to a kind of jewelry after-sales-service information management method.
Background technique
After-sales-service information management method is the process that feedback information of the user to product is carried out to receiving management with processing,
It can be better understood by demand of the user to product, while lacking in processing technology can timely be understood by feedback information
It falls into, then face handle;
There are certain drawbacks when in use in existing after-sales-service information management method, (1), with network intrusions it is existing
As being easy to appear information loss, the information of user feedback cannot be received timely, so that exchanging between user and seller
Problem, so as to cause a series of problem, the final relationship influenced between seller and user;(2), existing feedback problem is all
It is answered by customer service, customer service and non-professionality personnel, so that answer does not have professional, influences the timely processing of problem;
(3), existing after-sales-service information management cannot timely more new solution, some simple questions can only be returned
It answers, specific question can only be answered by customer service, waste of manpower resource, while influence the timely processing of feedback information;(4),
The management of field feedback cannot be timely transmitted in the hand of processing staff, and processing staff cannot timely understand product
Defect influence product quality so that processing method cannot be improved, for this purpose, it is proposed that a kind of jewelry after-sales-service information
Management method.
Summary of the invention
The main purpose of the present invention is to provide a kind of jewelry after-sales-service information management methods, can effectively solve background
The problems in technology.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of jewelry after-sales-service information management method, comprising the following steps:
(1), feedback information is uploaded to cloud by feedback platform by user;
(2), server receives feedback information by cloud, searches for corresponding solution, and classify;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously
For corresponding solution;
(4), server sends user mobile phone, and storage solution by cloud for solution.
Preferably, in the step (1), feedback information includes user information, location information, text information, image information,
Corresponding product information and classification options information, and asymmetry encryption is carried out to feedback information.
It preferably,, will be in received feedback information by the classification options information in feedback information in the step (2)
Text information and image information classify.
Preferably, in the step (3), solution is generated and is reported, and after classifying to report, be sent to
Corresponding machining sector.
Preferably, in the step (4), while sending solution, it will send information to distance local processing department.
Preferably, the user information is obtained by feedback platform real-name authentication, and location information is fixed by feedback platform GPS
Position obtains, and corresponding product information passes through the corresponding consumer record of user information search.
Preferably, the asymmetry encryption technology is to pass loser with the information of asymmetric encryption techniques to adopt with recipient
Encryption technology protects the network information, and the chaotic method of mapping is introduced in asymmetry ciphering process and is optimized, is mixed
Following formula is expressed as under ignorant sequence mapping: xi+1=μxi(1-xi), i=1,2 ..., L are defined as according to parameter value
Trusted computer encryption for information stores integer and constructs random sequence, in asymmetric encryption techniques optimization process, 0≤μ≤1, x0Table
Show that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic mapping start the change from doubling time
Change process enters the overall process of chaos, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2。
Compared with prior art, the invention has the following beneficial effects:
1, it is optimized, preferably information can be carried out by introducing the chaotic method of mapping in asymmetry encryption technology
Encryption, avoids information leakage, while can preferably guarantee the safety of information transmitting;
2, by classifying to feedback information, and different processing is sent respectively to according to the information type of classification and is handled
Department can more have professional offer solution, avoid the timely solution of influence problem;
3, by save and timely update in real time to solution, and according to problem automatically by corresponding solution party
Case proposes, can solve the problems, such as user much sooner;
It 4, can much sooner by the way that solution is timely passed to corresponding machining sector with feedback information
The defect of solution technology, and the corresponding processing technology of raising timely improved processing technology, while capableing of face.
Detailed description of the invention
Fig. 1 is a kind of overall structure flow chart of jewelry after-sales-service information management method of the present invention.
Specific embodiment
To be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, below with reference to
Specific embodiment, the present invention is further explained.
Embodiment 1
(1), user is obtained by feedback platform, the user information by feedback platform real-name authentication, and location information is logical
It crosses feedback platform GPS positioning to obtain, corresponding product information, will be on feedback information by the corresponding consumer record of user information search
Cloud is passed to, feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected
Item information, and asymmetry encryption is carried out to feedback information, the asymmetry encryption technology, is with asymmetric encryption techniques
Information passes the encryption technology that loser uses with recipient and protects to the network information, introduces and reflects in asymmetry ciphering process
It penetrates chaotic method to optimize, is expressed as following formula under chaos sequence mapping: xi+1=μxi(1-xi), i=1,2 ..., L, according to
Parameter value is defined as trusted computer encryption for information storage integer building random sequence, optimizes to asymmetric encryption techniques
In the process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic reflect
The overall process for starting to enter chaos from the change procedure of doubling time is penetrated, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2;
(2), server receives feedback information by cloud, searches for corresponding solution, and classify, passes through feedback
Classification options information in information classifies the text information in received feedback information with image information;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously
For corresponding solution, solution is generated and is reported, and after classifying to report, is being sent to corresponding processing department
Door;
(4), server sends user mobile phone, and storage solution by cloud for solution, sends solution party
While case, distance local processing department will send information to.
So-called asymmetric confidential technique is also known as public key cryptography, be exactly passed with the information of asymmetric encryption techniques loser with
The encryption technology that recipient uses protects the network information.When carrying out information encryption using asymmetric encryption techniques, institute
The algorithm of use is RSA Algorithm, and as a kind of public key algorithm, the influence of RSA is undoubtedly very big, it can avoid existing completely
The password deposited is stolen by illegal.It introduces the chaotic method of mapping in asymmetry ciphering process to optimize, chaos sequence mapping
Under be expressed as following formula:
xi+1=μxi(1-xi), i=1,2 ..., L
Mapping for above-mentioned chaotic mode is defined as trusted computer encryption for information storage integer according to parameter value
Random sequence is constructed, specific step is as follows.
In to asymmetric encryption techniques optimization process, 0≤μ≤1, x0 indicate that Logistic mapping attracts fixed point.
xi+1=μ xi(1-xi)
In to asymmetric encryption techniques optimization process, if μ≤4, Logistic mapping start the variation from doubling time
Process enters the overall process of chaos.It is stated with following formula:
ρ (x)=1/ (π 1-x2)1/2
Preferably information can be encrypted, avoid information leakage, while can preferably guarantee the peace of information transmitting
Quan Xing.
Embodiment 2
(1), user is obtained by feedback platform, the user information by feedback platform real-name authentication, and location information is logical
It crosses feedback platform GPS positioning to obtain, corresponding product information, will be on feedback information by the corresponding consumer record of user information search
Cloud is passed to, feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected
Item information, and asymmetry encryption is carried out to feedback information, the asymmetry encryption technology, is with asymmetric encryption techniques
Information passes the encryption technology that loser uses with recipient and protects to the network information, introduces and reflects in asymmetry ciphering process
It penetrates chaotic method to optimize, is expressed as following formula under chaos sequence mapping: xi+1=μxi(1-xi), i=1,2 ..., L, according to
Parameter value is defined as trusted computer encryption for information storage integer building random sequence, optimizes to asymmetric encryption techniques
In the process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic reflect
The overall process for starting to enter chaos from the change procedure of doubling time is penetrated, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2;
(2), server receives feedback information by cloud, searches for corresponding solution, and classify, passes through feedback
Classification options information in information classifies the text information in received feedback information with image information;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously
For corresponding solution, solution is generated and is reported, and after classifying to report, is being sent to corresponding processing department
Door;
(4), server sends user mobile phone, and storage solution by cloud for solution, sends solution party
While case, distance local processing department will send information to.
Feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected
Item information, the user information are obtained by feedback platform real-name authentication, and location information carries out GPS to mobile phone by feedback platform
Positioning obtains, and corresponding product information is logged in anti-by the corresponding consumer record of user information search, classification options information in user
When presenting platform, the service type that the type for more needing to feed back selects different selections different, and according to the information type of classification
It is sent respectively to different processing processing departments, professional offer solution can be more provided, influence problem is avoided
It solves in time.
Embodiment 3
(1), user is obtained by feedback platform, the user information by feedback platform real-name authentication, and location information is logical
It crosses feedback platform GPS positioning to obtain, corresponding product information, will be on feedback information by the corresponding consumer record of user information search
Cloud is passed to, feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected
Item information, and asymmetry encryption is carried out to feedback information, the asymmetry encryption technology, is with asymmetric encryption techniques
Information passes the encryption technology that loser uses with recipient and protects to the network information, introduces and reflects in asymmetry ciphering process
It penetrates chaotic method to optimize, is expressed as following formula under chaos sequence mapping: xi+1=μxi(1-xi), i=1,2 ..., L, according to
Parameter value is defined as trusted computer encryption for information storage integer building random sequence, optimizes to asymmetric encryption techniques
In the process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic reflect
The overall process for starting to enter chaos from the change procedure of doubling time is penetrated, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2;
(2), server receives feedback information by cloud, searches for corresponding solution, and classify, passes through feedback
Classification options information in information classifies the text information in received feedback information with image information;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously
For corresponding solution, solution is generated and is reported, and after classifying to report, is being sent to corresponding processing department
Door;
(4), server sends user mobile phone, and storage solution by cloud for solution, sends solution party
While case, distance local processing department will send information to.
It during feedback, while solution is sent to user, and is saved, when encountering same problem
When, it conveniently extracts, by constantly save and timely update to solution, and will be solved accordingly according to problem
Scheme proposes, can solve the problems, such as user much sooner, while can preferably save human input;
By solution and feedback information, corresponding report is generated, and timely passes to corresponding machining sector, it can
The defect of understanding technology much sooner, and processing technology is timely improved, while the raising for capableing of face is corresponding
Processing technology, to accomplish to grow with each passing hour.
The above shows and describes the basic principles and main features of the present invention and the advantages of the present invention.The technology of the industry
Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this
The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes
Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its
Equivalent thereof.
Claims (7)
1. a kind of jewelry after-sales-service information management method, comprising the following steps:
(1), feedback information is uploaded to cloud by feedback platform by user;
(2), server receives feedback information by cloud, searches for corresponding solution, and classify;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, while phase being provided
The solution answered;
(4), server sends user mobile phone, and storage solution by cloud for solution.
2. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (1)
In, feedback information includes user information, and location information, text information, image information, corresponding product information and classification options are believed
Breath, and asymmetry encryption is carried out to feedback information.
3. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (2)
In, by the classification options information in feedback information, the text information in received feedback information is classified with image information.
4. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (3)
In, solution is generated and is reported, and after classifying to report, is being sent to corresponding machining sector.
5. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (4)
In, while sending solution, it will send information to distance local processing department.
6. a kind of jewelry after-sales-service information management method according to claim 2, it is characterised in that: the user information
It is obtained by feedback platform real-name authentication, location information carries out GPS positioning to mobile phone by feedback platform and obtains, corresponding product letter
Breath passes through the corresponding consumer record of user information search.
7. a kind of jewelry after-sales-service information management method according to claim 2, it is characterised in that: the asymmetry
Encryption technology is to pass the encryption technology that loser uses with recipient with the information of asymmetric encryption techniques to protect the network information
Shield introduces the chaotic method of mapping in asymmetry ciphering process and optimizes, is expressed as following formula under chaos sequence mapping:
xi+1=μxi(1-xi), i=1,2 ..., L, according to parameter value, be defined as the storage integer building of trusted computer encryption for information with
Machine sequence, in asymmetric encryption techniques optimization process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1
=μ xi(1-xi), if μ≤4, Logistic mapping start the overall process for entering chaos from the change procedure of doubling time, use following formula
Statement: ρ (x)=1/ (π 1-x2)1/2。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811096636.5A CN109191153A (en) | 2018-09-19 | 2018-09-19 | A kind of jewelry after-sales-service information management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811096636.5A CN109191153A (en) | 2018-09-19 | 2018-09-19 | A kind of jewelry after-sales-service information management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109191153A true CN109191153A (en) | 2019-01-11 |
Family
ID=64908773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811096636.5A Pending CN109191153A (en) | 2018-09-19 | 2018-09-19 | A kind of jewelry after-sales-service information management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109191153A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104486413A (en) * | 2014-12-15 | 2015-04-01 | 四川长虹电器股份有限公司 | Information processing system |
CN104933599A (en) * | 2015-06-09 | 2015-09-23 | 广州信诚信息科技有限公司 | 3D crystal jewelry shopping mall system used for network transaction |
CN105323640A (en) * | 2014-08-04 | 2016-02-10 | 四川长虹电器股份有限公司 | Method, system and equipment for realizing after-sales service of smart television based on Internet |
CN105761035A (en) * | 2016-02-03 | 2016-07-13 | 西安交通大学 | Gold and jewelry property management system based on smart-RFID electronic tags |
-
2018
- 2018-09-19 CN CN201811096636.5A patent/CN109191153A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105323640A (en) * | 2014-08-04 | 2016-02-10 | 四川长虹电器股份有限公司 | Method, system and equipment for realizing after-sales service of smart television based on Internet |
CN104486413A (en) * | 2014-12-15 | 2015-04-01 | 四川长虹电器股份有限公司 | Information processing system |
CN104933599A (en) * | 2015-06-09 | 2015-09-23 | 广州信诚信息科技有限公司 | 3D crystal jewelry shopping mall system used for network transaction |
CN105761035A (en) * | 2016-02-03 | 2016-07-13 | 西安交通大学 | Gold and jewelry property management system based on smart-RFID electronic tags |
Non-Patent Citations (1)
Title |
---|
曹书豪等: ""Logistic映射及其混沌序列特性分析"", 《延边大学学报(自然科学版)》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11627109B2 (en) | Methods for mapping IP addresses and domains to organizations using user activity data | |
CN111914269B (en) | Data security sharing method and system in blockchain and cloud storage environment | |
US10007911B2 (en) | Methods for rapidly provisioning application functionality to a mobile communication device | |
CN109858262A (en) | Workflow examination and approval method, apparatus, system and storage medium based on block catenary system | |
CN108681966A (en) | A kind of information monitoring method and device based on block chain | |
CN104811428A (en) | Method, device and system for verifying client identity by social relation data | |
US11038925B2 (en) | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods | |
WO2019109817A1 (en) | Short message verification method, apparatus, storage medium, short message verification system, and terminal | |
CN104462621B (en) | A kind of data processing method and device | |
US11277448B2 (en) | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods | |
US11070593B2 (en) | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods | |
CN111698328A (en) | Enterprise big data analysis and processing platform based on hybrid cloud | |
CN111385751B (en) | Information sending method, device, terminal and readable storage medium | |
CN115081540A (en) | Data privacy protectable classification method and system based on integrated decision learning | |
US20220201045A1 (en) | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods | |
CN114363013B (en) | Supervision-friendly blockchain content privacy protection system, message sending and query method | |
CN103532709A (en) | IBE (Identity Based Encryption) cryptographic equipment and data encryption and decryption method | |
CN113408752A (en) | Garbage recovery supervision system and method based on block chain | |
CN104335236B (en) | The method and apparatus forwarded for detecting sensitive data by the unauthorized batch of network | |
CN109191153A (en) | A kind of jewelry after-sales-service information management method | |
CN108156256A (en) | A kind of message real time propelling movement method and system based on Cloud Server group | |
CN108540374B (en) | Information processing method, device, equipment and storage medium based on instant messaging | |
CN110266683A (en) | Digital asset sharing method, device and electronic equipment | |
CN115392810A (en) | Block chain-based full-process environment detection system and method thereof | |
CN112383407A (en) | Online notarization full-flow log processing method and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190111 |
|
RJ01 | Rejection of invention patent application after publication |