CN109191153A - A kind of jewelry after-sales-service information management method - Google Patents

A kind of jewelry after-sales-service information management method Download PDF

Info

Publication number
CN109191153A
CN109191153A CN201811096636.5A CN201811096636A CN109191153A CN 109191153 A CN109191153 A CN 109191153A CN 201811096636 A CN201811096636 A CN 201811096636A CN 109191153 A CN109191153 A CN 109191153A
Authority
CN
China
Prior art keywords
information
feedback
sales
jewelry
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811096636.5A
Other languages
Chinese (zh)
Inventor
洪树钺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lang Yao Agel Ecommerce Ltd
Original Assignee
Shenzhen Lang Yao Agel Ecommerce Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lang Yao Agel Ecommerce Ltd filed Critical Shenzhen Lang Yao Agel Ecommerce Ltd
Priority to CN201811096636.5A priority Critical patent/CN109191153A/en
Publication of CN109191153A publication Critical patent/CN109191153A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • G06Q30/016After-sales

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of jewelry after-sales-service information management methods, the following steps are included: user passes through feedback platform, the user information is obtained by feedback platform real-name authentication, location information is obtained by feedback platform GPS positioning, corresponding product information passes through the corresponding consumer record of user information search, feedback information is uploaded into cloud, feedback information includes user information, location information, text information, image information, corresponding product information and classification options information.A kind of jewelry after-sales-service information management method of the present invention, first, preferably information can be encrypted, avoid information leakage, while can preferably guarantee the safety of information transmitting, secondly, can more have professional offer solution, avoiding influence problem timely, solve the problem of can also solution user much sooner, human input can be preferably saved simultaneously, brings better prospect of the application.

Description

A kind of jewelry after-sales-service information management method
Technical field
The present invention relates to after-sales-service information management domain, in particular to a kind of jewelry after-sales-service information management method.
Background technique
After-sales-service information management method is the process that feedback information of the user to product is carried out to receiving management with processing, It can be better understood by demand of the user to product, while lacking in processing technology can timely be understood by feedback information It falls into, then face handle;
There are certain drawbacks when in use in existing after-sales-service information management method, (1), with network intrusions it is existing As being easy to appear information loss, the information of user feedback cannot be received timely, so that exchanging between user and seller Problem, so as to cause a series of problem, the final relationship influenced between seller and user;(2), existing feedback problem is all It is answered by customer service, customer service and non-professionality personnel, so that answer does not have professional, influences the timely processing of problem; (3), existing after-sales-service information management cannot timely more new solution, some simple questions can only be returned It answers, specific question can only be answered by customer service, waste of manpower resource, while influence the timely processing of feedback information;(4), The management of field feedback cannot be timely transmitted in the hand of processing staff, and processing staff cannot timely understand product Defect influence product quality so that processing method cannot be improved, for this purpose, it is proposed that a kind of jewelry after-sales-service information Management method.
Summary of the invention
The main purpose of the present invention is to provide a kind of jewelry after-sales-service information management methods, can effectively solve background The problems in technology.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of jewelry after-sales-service information management method, comprising the following steps:
(1), feedback information is uploaded to cloud by feedback platform by user;
(2), server receives feedback information by cloud, searches for corresponding solution, and classify;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously For corresponding solution;
(4), server sends user mobile phone, and storage solution by cloud for solution.
Preferably, in the step (1), feedback information includes user information, location information, text information, image information, Corresponding product information and classification options information, and asymmetry encryption is carried out to feedback information.
It preferably,, will be in received feedback information by the classification options information in feedback information in the step (2) Text information and image information classify.
Preferably, in the step (3), solution is generated and is reported, and after classifying to report, be sent to Corresponding machining sector.
Preferably, in the step (4), while sending solution, it will send information to distance local processing department.
Preferably, the user information is obtained by feedback platform real-name authentication, and location information is fixed by feedback platform GPS Position obtains, and corresponding product information passes through the corresponding consumer record of user information search.
Preferably, the asymmetry encryption technology is to pass loser with the information of asymmetric encryption techniques to adopt with recipient Encryption technology protects the network information, and the chaotic method of mapping is introduced in asymmetry ciphering process and is optimized, is mixed Following formula is expressed as under ignorant sequence mapping: xi+1xi(1-xi), i=1,2 ..., L are defined as according to parameter value Trusted computer encryption for information stores integer and constructs random sequence, in asymmetric encryption techniques optimization process, 0≤μ≤1, x0Table Show that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic mapping start the change from doubling time Change process enters the overall process of chaos, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2
Compared with prior art, the invention has the following beneficial effects:
1, it is optimized, preferably information can be carried out by introducing the chaotic method of mapping in asymmetry encryption technology Encryption, avoids information leakage, while can preferably guarantee the safety of information transmitting;
2, by classifying to feedback information, and different processing is sent respectively to according to the information type of classification and is handled Department can more have professional offer solution, avoid the timely solution of influence problem;
3, by save and timely update in real time to solution, and according to problem automatically by corresponding solution party Case proposes, can solve the problems, such as user much sooner;
It 4, can much sooner by the way that solution is timely passed to corresponding machining sector with feedback information The defect of solution technology, and the corresponding processing technology of raising timely improved processing technology, while capableing of face.
Detailed description of the invention
Fig. 1 is a kind of overall structure flow chart of jewelry after-sales-service information management method of the present invention.
Specific embodiment
To be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, below with reference to Specific embodiment, the present invention is further explained.
Embodiment 1
(1), user is obtained by feedback platform, the user information by feedback platform real-name authentication, and location information is logical It crosses feedback platform GPS positioning to obtain, corresponding product information, will be on feedback information by the corresponding consumer record of user information search Cloud is passed to, feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected Item information, and asymmetry encryption is carried out to feedback information, the asymmetry encryption technology, is with asymmetric encryption techniques Information passes the encryption technology that loser uses with recipient and protects to the network information, introduces and reflects in asymmetry ciphering process It penetrates chaotic method to optimize, is expressed as following formula under chaos sequence mapping: xi+1xi(1-xi), i=1,2 ..., L, according to Parameter value is defined as trusted computer encryption for information storage integer building random sequence, optimizes to asymmetric encryption techniques In the process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic reflect The overall process for starting to enter chaos from the change procedure of doubling time is penetrated, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2
(2), server receives feedback information by cloud, searches for corresponding solution, and classify, passes through feedback Classification options information in information classifies the text information in received feedback information with image information;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously For corresponding solution, solution is generated and is reported, and after classifying to report, is being sent to corresponding processing department Door;
(4), server sends user mobile phone, and storage solution by cloud for solution, sends solution party While case, distance local processing department will send information to.
So-called asymmetric confidential technique is also known as public key cryptography, be exactly passed with the information of asymmetric encryption techniques loser with The encryption technology that recipient uses protects the network information.When carrying out information encryption using asymmetric encryption techniques, institute The algorithm of use is RSA Algorithm, and as a kind of public key algorithm, the influence of RSA is undoubtedly very big, it can avoid existing completely The password deposited is stolen by illegal.It introduces the chaotic method of mapping in asymmetry ciphering process to optimize, chaos sequence mapping Under be expressed as following formula:
xi+1xi(1-xi), i=1,2 ..., L
Mapping for above-mentioned chaotic mode is defined as trusted computer encryption for information storage integer according to parameter value Random sequence is constructed, specific step is as follows.
In to asymmetric encryption techniques optimization process, 0≤μ≤1, x0 indicate that Logistic mapping attracts fixed point.
xi+1=μ xi(1-xi)
In to asymmetric encryption techniques optimization process, if μ≤4, Logistic mapping start the variation from doubling time Process enters the overall process of chaos.It is stated with following formula:
ρ (x)=1/ (π 1-x2)1/2
Preferably information can be encrypted, avoid information leakage, while can preferably guarantee the peace of information transmitting Quan Xing.
Embodiment 2
(1), user is obtained by feedback platform, the user information by feedback platform real-name authentication, and location information is logical It crosses feedback platform GPS positioning to obtain, corresponding product information, will be on feedback information by the corresponding consumer record of user information search Cloud is passed to, feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected Item information, and asymmetry encryption is carried out to feedback information, the asymmetry encryption technology, is with asymmetric encryption techniques Information passes the encryption technology that loser uses with recipient and protects to the network information, introduces and reflects in asymmetry ciphering process It penetrates chaotic method to optimize, is expressed as following formula under chaos sequence mapping: xi+1xi(1-xi), i=1,2 ..., L, according to Parameter value is defined as trusted computer encryption for information storage integer building random sequence, optimizes to asymmetric encryption techniques In the process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic reflect The overall process for starting to enter chaos from the change procedure of doubling time is penetrated, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2
(2), server receives feedback information by cloud, searches for corresponding solution, and classify, passes through feedback Classification options information in information classifies the text information in received feedback information with image information;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously For corresponding solution, solution is generated and is reported, and after classifying to report, is being sent to corresponding processing department Door;
(4), server sends user mobile phone, and storage solution by cloud for solution, sends solution party While case, distance local processing department will send information to.
Feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected Item information, the user information are obtained by feedback platform real-name authentication, and location information carries out GPS to mobile phone by feedback platform Positioning obtains, and corresponding product information is logged in anti-by the corresponding consumer record of user information search, classification options information in user When presenting platform, the service type that the type for more needing to feed back selects different selections different, and according to the information type of classification It is sent respectively to different processing processing departments, professional offer solution can be more provided, influence problem is avoided It solves in time.
Embodiment 3
(1), user is obtained by feedback platform, the user information by feedback platform real-name authentication, and location information is logical It crosses feedback platform GPS positioning to obtain, corresponding product information, will be on feedback information by the corresponding consumer record of user information search Cloud is passed to, feedback information includes user information, and location information, text information, image information, corresponding product information and classification are selected Item information, and asymmetry encryption is carried out to feedback information, the asymmetry encryption technology, is with asymmetric encryption techniques Information passes the encryption technology that loser uses with recipient and protects to the network information, introduces and reflects in asymmetry ciphering process It penetrates chaotic method to optimize, is expressed as following formula under chaos sequence mapping: xi+1xi(1-xi), i=1,2 ..., L, according to Parameter value is defined as trusted computer encryption for information storage integer building random sequence, optimizes to asymmetric encryption techniques In the process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1=μ xi(1-xi), if μ≤4, Logistic reflect The overall process for starting to enter chaos from the change procedure of doubling time is penetrated, is stated with following formula: ρ (x)=1/ (π 1-x2)1/2
(2), server receives feedback information by cloud, searches for corresponding solution, and classify, passes through feedback Classification options information in information classifies the text information in received feedback information with image information;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, is mentioned simultaneously For corresponding solution, solution is generated and is reported, and after classifying to report, is being sent to corresponding processing department Door;
(4), server sends user mobile phone, and storage solution by cloud for solution, sends solution party While case, distance local processing department will send information to.
It during feedback, while solution is sent to user, and is saved, when encountering same problem When, it conveniently extracts, by constantly save and timely update to solution, and will be solved accordingly according to problem Scheme proposes, can solve the problems, such as user much sooner, while can preferably save human input;
By solution and feedback information, corresponding report is generated, and timely passes to corresponding machining sector, it can The defect of understanding technology much sooner, and processing technology is timely improved, while the raising for capableing of face is corresponding Processing technology, to accomplish to grow with each passing hour.
The above shows and describes the basic principles and main features of the present invention and the advantages of the present invention.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its Equivalent thereof.

Claims (7)

1. a kind of jewelry after-sales-service information management method, comprising the following steps:
(1), feedback information is uploaded to cloud by feedback platform by user;
(2), server receives feedback information by cloud, searches for corresponding solution, and classify;
(3), the information for completing classification is sent to corresponding processing department, information is screened and is saved, while phase being provided The solution answered;
(4), server sends user mobile phone, and storage solution by cloud for solution.
2. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (1) In, feedback information includes user information, and location information, text information, image information, corresponding product information and classification options are believed Breath, and asymmetry encryption is carried out to feedback information.
3. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (2) In, by the classification options information in feedback information, the text information in received feedback information is classified with image information.
4. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (3) In, solution is generated and is reported, and after classifying to report, is being sent to corresponding machining sector.
5. a kind of jewelry after-sales-service information management method according to claim 1, it is characterised in that: the step (4) In, while sending solution, it will send information to distance local processing department.
6. a kind of jewelry after-sales-service information management method according to claim 2, it is characterised in that: the user information It is obtained by feedback platform real-name authentication, location information carries out GPS positioning to mobile phone by feedback platform and obtains, corresponding product letter Breath passes through the corresponding consumer record of user information search.
7. a kind of jewelry after-sales-service information management method according to claim 2, it is characterised in that: the asymmetry Encryption technology is to pass the encryption technology that loser uses with recipient with the information of asymmetric encryption techniques to protect the network information Shield introduces the chaotic method of mapping in asymmetry ciphering process and optimizes, is expressed as following formula under chaos sequence mapping: xi+1xi(1-xi), i=1,2 ..., L, according to parameter value, be defined as the storage integer building of trusted computer encryption for information with Machine sequence, in asymmetric encryption techniques optimization process, 0≤μ≤1, x0Indicate that Logistic mapping attracts fixed point, xi+1 =μ xi(1-xi), if μ≤4, Logistic mapping start the overall process for entering chaos from the change procedure of doubling time, use following formula Statement: ρ (x)=1/ (π 1-x2)1/2
CN201811096636.5A 2018-09-19 2018-09-19 A kind of jewelry after-sales-service information management method Pending CN109191153A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811096636.5A CN109191153A (en) 2018-09-19 2018-09-19 A kind of jewelry after-sales-service information management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811096636.5A CN109191153A (en) 2018-09-19 2018-09-19 A kind of jewelry after-sales-service information management method

Publications (1)

Publication Number Publication Date
CN109191153A true CN109191153A (en) 2019-01-11

Family

ID=64908773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811096636.5A Pending CN109191153A (en) 2018-09-19 2018-09-19 A kind of jewelry after-sales-service information management method

Country Status (1)

Country Link
CN (1) CN109191153A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486413A (en) * 2014-12-15 2015-04-01 四川长虹电器股份有限公司 Information processing system
CN104933599A (en) * 2015-06-09 2015-09-23 广州信诚信息科技有限公司 3D crystal jewelry shopping mall system used for network transaction
CN105323640A (en) * 2014-08-04 2016-02-10 四川长虹电器股份有限公司 Method, system and equipment for realizing after-sales service of smart television based on Internet
CN105761035A (en) * 2016-02-03 2016-07-13 西安交通大学 Gold and jewelry property management system based on smart-RFID electronic tags

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323640A (en) * 2014-08-04 2016-02-10 四川长虹电器股份有限公司 Method, system and equipment for realizing after-sales service of smart television based on Internet
CN104486413A (en) * 2014-12-15 2015-04-01 四川长虹电器股份有限公司 Information processing system
CN104933599A (en) * 2015-06-09 2015-09-23 广州信诚信息科技有限公司 3D crystal jewelry shopping mall system used for network transaction
CN105761035A (en) * 2016-02-03 2016-07-13 西安交通大学 Gold and jewelry property management system based on smart-RFID electronic tags

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹书豪等: ""Logistic映射及其混沌序列特性分析"", 《延边大学学报(自然科学版)》 *

Similar Documents

Publication Publication Date Title
US11627109B2 (en) Methods for mapping IP addresses and domains to organizations using user activity data
CN111914269B (en) Data security sharing method and system in blockchain and cloud storage environment
US10007911B2 (en) Methods for rapidly provisioning application functionality to a mobile communication device
CN109858262A (en) Workflow examination and approval method, apparatus, system and storage medium based on block catenary system
CN108681966A (en) A kind of information monitoring method and device based on block chain
CN104811428A (en) Method, device and system for verifying client identity by social relation data
US11038925B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
WO2019109817A1 (en) Short message verification method, apparatus, storage medium, short message verification system, and terminal
CN104462621B (en) A kind of data processing method and device
US11277448B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11070593B2 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
CN111698328A (en) Enterprise big data analysis and processing platform based on hybrid cloud
CN111385751B (en) Information sending method, device, terminal and readable storage medium
CN115081540A (en) Data privacy protectable classification method and system based on integrated decision learning
US20220201045A1 (en) Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
CN114363013B (en) Supervision-friendly blockchain content privacy protection system, message sending and query method
CN103532709A (en) IBE (Identity Based Encryption) cryptographic equipment and data encryption and decryption method
CN113408752A (en) Garbage recovery supervision system and method based on block chain
CN104335236B (en) The method and apparatus forwarded for detecting sensitive data by the unauthorized batch of network
CN109191153A (en) A kind of jewelry after-sales-service information management method
CN108156256A (en) A kind of message real time propelling movement method and system based on Cloud Server group
CN108540374B (en) Information processing method, device, equipment and storage medium based on instant messaging
CN110266683A (en) Digital asset sharing method, device and electronic equipment
CN115392810A (en) Block chain-based full-process environment detection system and method thereof
CN112383407A (en) Online notarization full-flow log processing method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190111

RJ01 Rejection of invention patent application after publication