Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It is to be noted that the terms "comprises" and "comprising" and any variations thereof in the examples and figures of the present application are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
With the development of science and technology, automatic intelligent services are introduced into the lives of people, and particularly, the automatic services based on office scenes are popular.
Foreground visitor shunting is an indispensable link for each office scene, and in the prior art, foreground visitor shunting is manually realized. After the visitor visits, the visitor needs to register under the guidance of foreground personnel, and the foreground personnel needs to determine the visiting purpose of the visitor so as to inform the visitor of the visitor to take treatment.
Such a manner is highly dependent on manpower, on one hand, when the foreground personnel temporarily leave the foreground, the foreground visitor diversion will have to be suspended, and on the other hand, when there are many visitors visiting simultaneously, the foreground personnel need to sequentially divert each visitor, which requires a long time for diversion and is inefficient.
The foreground visitor shunting method, the foreground visitor shunting device, the electronic equipment and the storage medium which are combined with the RPA and the AI, provided by the application, are used for acquiring the face information of a visiting user; determining the user identity of the visiting user according to the face information, and providing a corresponding visiting page for the visiting user; according to the visiting request triggered by the visiting user on the visiting page, the visiting user is determined and visiting information is sent to the visiting user, so that automatic distribution of the visiting user is achieved, and distribution pressure of a foreground is relieved conveniently.
Referring to fig. 1, fig. 1 is a schematic diagram of a network architecture on which the present application is based, and as shown in fig. 1, the network architecture on which the present application is based may include a server 2 and terminals 1. Referring to fig. 2, fig. 2 is a schematic diagram of another network architecture on which the present application is based, and as shown in fig. 2, the network architecture on which the present application is based may include a server 2, terminals 1, and a foreground guest shunting terminal 3.
In the architecture shown in fig. 1 or fig. 2, the server 2 is hardware or software that can interact with each terminal 1 through a network, and can be used to execute a foreground guest offloading method combining RPA and AI described in example one below, and provide a foreground guest offloading service for a client carried on each terminal 1. When the server 2 is hardware, it includes a cloud server with an arithmetic function. When the server 2 is software, it can be installed in an electronic device with an arithmetic function, wherein the electronic device includes, but is not limited to, a laptop portable computer, a desktop computer, and the like.
In addition, the terminal 1 refers to a device including a smart phone, a tablet computer, and the like, which can communicate and exchange information with the server 2 through a network. When the user to which the terminal 1 belongs is a visiting user, the user can obtain a visiting page through interaction with the server 2 and trigger a corresponding visiting request; when the user to which the terminal 1 belongs is a visiting user, it may receive a visiting request initiated by the visiting user by interacting with the server 2 to prepare for a visit.
Particularly, in the framework shown in fig. 2, a foreground visitor distribution terminal 3 is further included, where the foreground visitor distribution terminal 3 refers to a hardware terminal including an interactive display and a communication function, and is placed in the foreground. When the visitor visits, the visitor can acquire the visiting page by controlling the foreground visitor shunting terminal 3 and trigger the visiting request.
The technical scheme of the foreground visitor shunting method and device, the electronic equipment and the storage medium combining the RPA and the AI can realize automatic processing of foreground visitor shunting. Specifically, for visiting users, the scheme of the application provides visiting pages for the visiting users, so that each visiting user can trigger a corresponding visiting request based on the visiting page and visit based on information fed back by the visiting page; for the access user, based on the access request received by the access page, the access user can initiate a corresponding access notification to each access user, so that the access user can conveniently know the message to realize access.
In a first aspect, referring to fig. 3, fig. 3 is a schematic flowchart of a foreground visitor splitting method combining an RPA and an AI according to an embodiment of the present disclosure. The foreground visitor shunting method combining RPA and AI provided by the embodiment of the application comprises the following steps:
step 101, obtaining face information of a visiting user.
And 102, determining the user identity of the visiting user according to the face information, and providing a corresponding visiting page for the visiting user.
And 103, determining the access user and sending access information to the access user according to the access request triggered by the access user on the access page.
It should be noted that the main body of execution of the foreground guest splitting method in combination with RPA and AI provided by this example is the aforementioned server.
Firstly, after a visiting user reaches the foreground, the user can upload own face information through the terminal such as an intelligent terminal or a tablet personal computer used by the visiting user or a foreground visitor shunting terminal provided by the foreground. The visiting user is a visiting user, and the visiting user is a reception user.
Specifically, when the visiting user uses the terminal, the image acquisition module of the terminal can be called by scanning a two-dimensional code or a bar code or logging in a designated interface and the like to acquire the image of the face part of the visiting user. And then, the terminal sends the acquired image to a server so that the server processes the image to obtain the face information of the visiting user. In addition, the visiting user can also directly use the shunting terminal arranged on the foreground visitor to activate the image acquisition module, so that the image of the face can be shot and uploaded.
After the server acquires the image, the server can extract the face information in the image by using an image processing technology. The image processing includes but is not limited to image cropping, face location, feature extraction, etc. Through image processing, the server can obtain face information of the visiting user, wherein the face information can identify the unique user, namely, the face information corresponding to different users is different, such as the eye characteristics, the face characteristics and the like of the face.
Then, the server can determine the user identity of the visiting user according to the face information and provide a corresponding visiting page for the visiting user. As a possible implementation manner, the server may determine the user identity of the visiting user by comparing the face information. Specifically, the server may be pre-stored with a face information database in which face information of employees of the company where the face information is stored and face information of historical visitors who visited the company once is stored.
The user identities can be set according to specific application scenes, such as employee identities and non-employee identities, and can be further more specifically set to department A supervisor, department A employees and the like, interviewer, visitor, inspector and the like, so that different visiting pages can be subsequently provided based on the user identities which are not used, and the flexibility and the efficiency of foreground visitor distribution are further improved.
After the server receives the face information, whether the face information of the staff or the historical visitors which is consistent with the face information or has extremely high similarity exists or not is determined in the face information database, and more specifically, the face information with the highest matching degree is determined to serve as a comparison result through comparison of all key features in the face information.
It can also be understood that the matching degree can be calculated by setting corresponding weights based on each key feature in different face information, thereby further improving the matching accuracy.
If so, determining the user identity of the visiting user directly based on the face information database, if the visiting user is a branch company employee (corresponding to the situation of matching with the face information of the employee in the database); alternatively, the visiting user is a friend's attendant (corresponding to a match with the face information of the historic visitor in the database).
And if not, determining that the visiting user is a new visiting user.
And according to the user identity of the visiting user, the server provides a corresponding visiting page. The visiting page is a user interface provided based on user identity, and the visiting page can interact with the visiting user to further obtain a visiting request.
For example, fig. 4 is a schematic view of a first interface of a visited page provided in the embodiment of the present application. When the face information of the visiting user can be matched in the face information database, namely the identity of the visiting user is known, the visiting page can display the identity of the visiting user, and display the visiting purpose and the visiting user for confirmation. As shown in fig. 4, the visiting user is an employee of the branch company, and the visiting interface displays the name information, the work number information and other identity information.
Of course, the server may also be networked with a meeting reservation system or a flow object management system in the company, so that after the identity of the visiting user is determined, whether a meeting or a flow object related to the visiting user exists in the systems is inquired, and the meeting information or the flow object information can be displayed on a visiting page together for the visiting user to view.
And then, the visiting user can determine the purpose of the visiting based on the information provided by the visiting page, so that the server generates a corresponding visiting request based on an option triggered by the visiting user, and sends the generated visiting information to the visiting user for the visiting user to prepare for visiting.
Fig. 5 is a second interface schematic diagram of a visited page provided in the embodiment of the present application. When the face information of the visiting user can not be matched in the face information database, namely the identity of the visiting user is unknown, the visiting page can display a plurality of visiting destination options for confirmation. As shown in fig. 5, the visiting page with options of "appointment", "interview", "job insertion", "no appointment" and the like is provided for the visiting user to select the visiting purpose.
And then, determining a visiting user based on the visiting purpose, generating a visiting request, and sending the visiting information to the visiting user. Specifically, the access information includes: visiting user information, and/or face information; the visiting user information is obtained by the visiting user when the visiting user triggers the visiting request. For example, the visiting user information may be the name, contact information, company of the visiting user, and the face information may be a face image acquired by the acquisition. By sending the access information to the access user, the access user can better prepare for access.
According to the scheme, the visiting page can be provided for the visiting users, so that each visiting user can trigger a corresponding visiting request based on the visiting page and access based on information fed back by the visiting page; for the access user, based on the access request received by the access page, the access user can initiate a corresponding access notification to each access user, so that the access user can conveniently know the message to realize access.
On the basis of the above embodiment, in other alternative embodiments, the visit request includes a visit destination; correspondingly, the server can determine the corresponding access user according to the access purpose. The visiting purpose can be understood as the intention of the visiting user, such as communicating training, interviewing or attending, etc., and the visiting purpose without the visiting person can be the same or different.
For example, the visiting users may be different for different visiting purposes. In the visited page shown in fig. 4, when the visiting purpose of the visiting user is interactive training, the corresponding visiting user can train a manager for the staff. As shown in the visited page in fig. 5, when the visiting purpose of the visiting user is interviewing or job-entering, the corresponding visiting user may be HR; when the visiting purpose is a reservation, the visiting user can reserve personnel for the user; the visiting user can receive the reception personnel for the company when the visiting purpose is available or no reservation is available.
On the basis of the foregoing embodiment, in another optional implementation manner, the visit request includes the visiting user information; the determining of the visiting user comprises the following steps: and determining the corresponding access user according to the access user information. The information of the interview user can be the name, contact information, position and the like of the interview user.
Specifically, when the visiting user knows the visiting user of this time, as shown in fig. 4, the visiting user may be a staff training manager when the visiting purpose of the visiting user is communication training, or as shown in fig. 5, when the visiting user may be a user reservation person when the visiting purpose is reservation, the visiting user may directly input the visiting person information through the visiting page, so that the server obtains the visiting user information from the access request triggered by the visiting user, and determines the corresponding visiting user.
In addition, in other optional embodiments, the method further comprises: determining the communication information of the access user in a preset communication database; and sending the access information to the access user based on the communication information of the access user.
Specifically, after determining the access user, the server may determine communication information of the access user in a preset employee communication database, where the communication information may be a mobile phone number, a work number, an internal communication mode, and the like. Then, the server will send the access information generated in the previous embodiment to the access user through various communication channels.
In addition, based on the foregoing embodiment, in order to facilitate the visiting user to know the result of the visiting request as soon as possible, the server may display the visiting receipt on the visiting page according to the visiting receipt sent by the receiving visiting user. Specifically, after the visiting user receives the visiting information, the server may also send an inquiry message to the visiting user whether to return to the visiting response piece. When receiving an access receipt initiating operation triggered by an access user, displaying an access receipt on an access page; otherwise, no operation is performed. In this way, the visiting user can be made aware of the result of the visiting request, which is helpful for soothing the emotion and stress of the visiting user while waiting for the visiting user.
The foreground visitor distribution method combining the RPA and the AI can realize the automatic processing of foreground visitor distribution. For visiting users, the scheme of the application provides visiting pages for the visiting users, so that each visiting user can trigger a corresponding visiting request based on the visiting page and visit based on information fed back by the visiting page; for the access user, based on the access request received by the access page, the access user can initiate a corresponding access notification to each access user, so that the access user can conveniently know the message to realize access.
In an optional embodiment, when receiving the instruction for starting the substitute interview function fed back by the interview user, determining the interview conversation robot identifier to be called based on the identity identifier of the interview user, and calling the interview conversation robot to perform conversation interaction through the interview conversation robot identifier.
In practical application, the identity of the interview user and a corresponding table of the interview session robot identity can be preset, and when the instruction of the interview function is determined to be started, the interview session robot identity to be called can be determined according to the table.
Through the embodiment, when the interview user has no time to be interviewed or is not in the interview area, the interview robot replaces the interview user to carry out the dialogue with the interviewer.
In an embodiment, when receiving an instruction for starting the substitute interview function fed back by the interview user, the user can output a selectable interview question for the interview user, and a customized interview conversation robot is generated according to the selection of the interview user on the question to be treated, so as to carry out conversation with the interview user.
In practical application, a generation template of the interview conversation robot can be preset, after the interview user selects the interview problem, the corresponding dialect of the interview problem is used as the dialect of the conversation robot to generate the interview conversation robot, the corresponding dialect of each interview problem is output for the interview user one by one, and the reply of the interview user is collected and fed back to the interview user.
By the embodiment, after the interview conversation robot has a conversation with the interview user, the answer meeting the requirements of the interview user can be acquired, and all possible questions do not need to be output to the interview user.
In a second aspect, this embodiment provides a foreground visitor splitting device combining RPA and AI, which can be installed in the aforementioned server, fig. 6 is a schematic structural diagram of a foreground visitor splitting device combining RPA and AI provided in this application, and as shown in fig. 6, the foreground visitor splitting device combining RPA and AI includes:
the communication module 10 is used for acquiring the face information of the visiting user and providing a corresponding visiting page for the visiting user;
the processing module 20 is configured to determine a user identity of the visiting user according to the face information, and further configured to determine the visiting user according to a visiting request triggered by the visiting user on a visiting page, and send the visiting information to the visiting user through the communication module 10.
In an alternative embodiment, the visit request includes a visit destination; the processing module 20 is specifically configured to determine a corresponding visiting user according to the visiting destination.
In an alternative embodiment, the access request includes access user information; the processing module 20 is specifically configured to determine a corresponding visiting user according to the visiting user information.
In an optional embodiment, the processing module 20 is further configured to determine the communication information of the visiting user in a preset communication database; the communication module 10 is further configured to send the access information to the access user based on the communication information of the access user.
In an alternative embodiment, the access information comprises: visiting user information, and/or face information; the visiting user information is obtained by the visiting user when the visiting user triggers the visiting request.
In an optional embodiment, the communication module 10 is further configured to display the visit receipt on the visit page according to the visit receipt sent by the receiving visiting user.
In an optional embodiment, the communication module 10 is further configured to display the visit receipt on the visit page if a visit receipt initiation operation triggered by the visiting user is received.
The foreground visitor shunting device combining the RPA and the AI obtains the face information of a visiting user; determining the user identity of the visiting user according to the face information, and providing a corresponding visiting page for the visiting user; according to the visiting request triggered by the visiting user on the visiting page, the visiting user is determined and visiting information is sent to the visiting user, so that automatic distribution of the visiting user is achieved, and distribution pressure of a foreground is relieved conveniently.
On the next hand, this embodiment further provides an electronic device, which can be used to implement the technical solution of the foregoing method embodiment, and the implementation principle and technical effect of the electronic device are similar, which is not described herein again.
Referring to fig. 7, a schematic structural diagram of an electronic device 900 suitable for implementing the embodiment of the present application is shown, where the electronic device 900 may be a terminal device or a server. Among them, the terminal Device may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Media Player (PMP), a car terminal (e.g., car navigation terminal), etc., and a fixed terminal such as a digital TV, a desktop computer, etc. The electronic device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 7, the electronic device 900 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 901, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage means 908 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data necessary for the operation of the electronic apparatus 900 are also stored. The processing apparatus 901, the ROM902, and the RAM 903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
Generally, the following devices may be connected to the I/O interface 905: input devices 906 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 907 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 908 including, for example, magnetic tape, hard disk, etc.; and a communication device 909. The communication device 909 may allow the electronic apparatus 900 to perform wireless or wired communication with other apparatuses to exchange data. While fig. 7 illustrates an electronic device 900 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication device 909, or installed from the storage device 908, or installed from the ROM 902. The computer program, when executed by the processing apparatus 901, performs the above-described functions defined in the methods of the embodiments of the present application.
It should be noted that the computer readable medium mentioned above in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the methods shown in the above embodiments.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of Network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the application referred to in the present application is not limited to the embodiments with a particular combination of the above-mentioned features, but also encompasses other embodiments with any combination of the above-mentioned features or their equivalents without departing from the scope of the application. For example, the above features may be replaced with (but not limited to) features having similar functions as those described in this application.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the application. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
The purpose, technical solutions and advantages of the embodiments of the present application will be more clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.