CN114895775A - Service data processing method and device and intelligent counter - Google Patents

Service data processing method and device and intelligent counter Download PDF

Info

Publication number
CN114895775A
CN114895775A CN202210342275.8A CN202210342275A CN114895775A CN 114895775 A CN114895775 A CN 114895775A CN 202210342275 A CN202210342275 A CN 202210342275A CN 114895775 A CN114895775 A CN 114895775A
Authority
CN
China
Prior art keywords
user
target
target user
service data
interaction scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210342275.8A
Other languages
Chinese (zh)
Inventor
樊璐
申远远
徐丹
赵娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210342275.8A priority Critical patent/CN114895775A/en
Publication of CN114895775A publication Critical patent/CN114895775A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • Evolutionary Biology (AREA)
  • Primary Health Care (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Evolutionary Computation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The specification provides a business data processing method and device and an intelligent counter, which relate to the field of artificial intelligence. When a target user uses a user terminal such as an intelligent counter to handle related services in a self-service manner, the user terminal can firstly collect and determine the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme matched with the target user according to the user type of the target user; according to the target verification rule, performing user verification on the target user; under the condition that the user verification is determined to pass, interacting with a target user in an effective and friendly interaction mode according to a target interaction scheme to obtain a user identifier of the target user and target service data to be processed related to the service; and then, according to the user identification of the target user and the target service data, performing service data processing. Therefore, the user can be helped to complete self-service business transaction conveniently and safely, and the interaction experience of the user is improved.

Description

Service data processing method and device and intelligent counter
Technical Field
The specification belongs to the technical field of artificial intelligence, and particularly relates to a business data processing method and device and an intelligent counter.
Background
With the development of technology, in order to facilitate users to handle businesses, business service providers often deploy self-service devices such as self-service machines on line, and many business users can handle businesses by themselves through the self-service devices.
However, the existing self-service device is not friendly enough to users who are not familiar with character input, and is relatively complicated in service handling and prone to errors. Particularly, for users with vision disorder, hearing disorder, or language disorder, the above problem is more serious, resulting in relatively poor interactive experience for users.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The specification provides a service data processing method, a service data processing device and an intelligent counter, which can intelligently distinguish users with different conditions and types, and provide proper and matched verification rules and interaction schemes for the users with different types respectively so as to help the users complete self-service transaction conveniently and safely and improve the interaction experience of the users.
The present specification provides a service data processing method, which is applied to a user terminal, and includes:
responding to a trigger instruction, and acquiring characteristic data of a target user;
determining the user type of the target user according to the characteristic data of the target user;
determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user;
according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed;
and processing the service data according to the user identification of the target user and the target service data to be processed.
In one embodiment, the user terminal comprises at least one of: intelligent counter, self-service machine, cell-phone application.
In one embodiment, the user type includes one of: a visually impaired user, a hearing impaired user, a language impaired user.
In one embodiment, the characteristic data of the target user includes at least one of: the voice recognition method comprises the steps of obtaining a face image containing the face of a target user, a figure image containing the whole body of the target user, video data containing behavior and action of the target user in a specified time period, and audio data containing voice of the target user in the specified time period.
In one embodiment, determining the user type of the target user according to the feature data of the target user comprises:
and processing the characteristic data of the target user by using a preset classification model to determine the user type of the target user.
In one embodiment, determining the matched target verification rule according to the user type of the target user includes:
and according to the user type of the target user, screening one or more preset verification rules matched with the user type of the target user from the preset verification rule set to serve as the target verification rule.
In one embodiment, determining a matching target interaction scheme according to a user type of a target user includes:
under the condition that the user type of the target user is determined to be a hearing-impaired user, determining a preset first-class interaction scheme as a target interaction scheme; the preset first-class interaction scheme is an interaction scheme using a voice recognition model, a sign language corpus and a voice corpus;
under the condition that the user type of the target user is determined to be a vision disorder user, determining a preset second-class interaction scheme as a target interaction scheme; the preset second-class interaction scheme is an interaction scheme using a voice recognition model and a voice corpus;
under the condition that the user type of the target user is determined to be a language barrier user, determining a preset third-class interaction scheme as a target interaction scheme; the preset third-class interaction scheme is an interaction scheme using a sign language recognition model and a voice corpus.
In one embodiment, in a case that it is determined that the user type of the target user is a hearing-impaired user, interacting with the target user according to a target interaction scheme to obtain a user identifier of the target user and target service data to be processed, the method includes:
extracting a sign language action video indicating that a target user describes user information and service handling requirements through voice from a sign language corpus; and displaying the sign language action video to a target user;
collecting voice data of a target user; and processing the voice data by using a voice recognition model to acquire the user identification and the target service data of the target user.
In one embodiment, the service data processing is performed according to the user identifier of the target user and target service data to be processed, and includes:
inquiring a user database of a target user according to the user identification of the target user to determine whether the target user is a user to be attended;
under the condition that the target user is determined to be the user to be paid attention to, inquiring the association group of the target user to determine the associated user of the target user;
generating a confirmation request about the target service data; and communicating the confirmation request to the associated user;
detecting whether a confirmation instruction for a confirmation request is received from an associated user;
and under the condition that the confirmation instruction is determined to be received, carrying out service data processing related to the target service data.
In one embodiment, under the condition that a target user is determined to be a user to be paid attention to, collecting a process record of the target user when the user terminal is used for processing service data; and storing the process record into a cloud database.
This specification also provides a service data processing apparatus, including:
the acquisition module is used for responding to the trigger instruction and acquiring the characteristic data of the target user;
the first determining module is used for determining the user type of the target user according to the characteristic data of the target user;
the second determining module is used for determining a matched target verification rule and a target interaction scheme according to the user type of the target user;
the interaction module is used for carrying out user verification on the target user according to the target verification rule; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed;
and the processing module is used for processing the service data according to the user identification of the target user and the target service data to be processed.
The present specification also provides an intelligent counter comprising a processor and a memory for storing processor-executable instructions, the instructions when executed by the processor implementing the steps of: responding to a trigger instruction, and acquiring characteristic data of a target user; determining the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user; according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed; and processing the service data according to the user identification of the target user and the target service data to be processed.
The present specification also provides a computer readable storage medium having stored thereon computer instructions which, when executed by a processor, perform the steps of: responding to a trigger instruction, and acquiring characteristic data of a target user; determining the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user; according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed; and processing the service data according to the user identification of the target user and the target service data to be processed.
The present specification also provides a computer program product comprising a computer program which when executed by a processor performs the steps of: responding to a trigger instruction, and acquiring characteristic data of a target user; determining the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme which are matched with each other according to the user type of the target user; according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed; and processing the service data according to the user identification of the target user and the target service data to be processed.
Based on the service data processing method, the service data processing device and the intelligent counter provided by the specification, when a target user with service processing requirements uses a user terminal such as the intelligent counter to process related services in a self-service manner, the user terminal can firstly collect and determine the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme matched with the target user according to the user type of the target user; according to the target verification rule, performing user verification on the target user; under the condition that the user verification is determined to pass, interacting with the target user in an effective and friendly interaction mode according to the target interaction scheme to obtain a user identifier of the target user and target service data to be processed related to the service; and then, according to the user identification of the target user and the target service data, performing service data processing. Therefore, users with different status types can be intelligently distinguished, and proper and matched verification rules and interaction schemes are respectively provided for the users with different types to help the users to complete self-service handling conveniently and safely, so that the interaction experience of the users is improved, and meanwhile, the service handling efficiency is also improved.
Drawings
In order to more clearly illustrate the embodiments of the present specification, the drawings needed to be used in the embodiments will be briefly described below, and the drawings in the following description are only some of the embodiments described in the specification, and it is obvious to those skilled in the art that other drawings can be obtained based on the drawings without any inventive work.
Fig. 1 is a flowchart illustrating a service data processing method according to an embodiment of the present specification;
fig. 2 is a schematic diagram of an embodiment of a service data processing method provided by an embodiment of the present specification, in an example scenario;
fig. 3 is a schematic diagram of an embodiment of a service data processing method provided by an embodiment of the present specification, in a scenario example;
fig. 4 is a schematic structural component diagram of an intelligent counter provided in an embodiment of the present specification;
fig. 5 is a schematic structural component view of an intelligent counter provided in another embodiment of the present specification;
fig. 6 is a schematic structural component diagram of a service data processing apparatus according to an embodiment of the present specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all of the embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments in the present specification without any inventive step should fall within the scope of protection of the present specification.
Referring to fig. 1, an embodiment of the present specification provides a service data processing method. In specific implementation, the method may include the following:
s101: responding to a trigger instruction, and acquiring characteristic data of a target user;
s102: determining the user type of the target user according to the characteristic data of the target user;
s103: determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user;
s104: according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed;
s105: and processing the service data according to the user identification of the target user and the target service data to be processed.
In some embodiments, the service data processing method may be specifically applied to the user terminal side.
In this embodiment, the user terminal may specifically include a client front end that is applied to a user side and can implement functions such as data acquisition and data transmission. Specifically, the user terminal may be, for example, a desktop computer, a tablet computer, a notebook computer, a smart phone, a smart counter, a self-service machine, and the like. Alternatively, the user terminal may be a software application capable of running in the electronic device. For example, the application may be a mobile phone application such as an APP running on a smartphone.
Specifically, for example, referring to fig. 2, the user terminal may be an intelligent counter deployed in a business handling hall (e.g., a business handling hall of a bank), and capable of providing self-service business handling services for the user.
The user terminal is at least provided with or connected with a camera and a microphone.
In some embodiments, referring to fig. 2, the user terminal may be connected to the cloud server in a wired or wireless manner. The cloud server can be configured with a preset rule set, a plurality of preset interaction schemes, and corpora and recognition models of various different types. In addition, the cloud server is also connected with a user database. Correspondingly, the user terminal can inquire the user database through the cloud server.
In this embodiment, the cloud server may specifically include a background server that is applied to a network platform side and can implement functions such as data transmission and data processing. Specifically, the cloud server may be, for example, an electronic device having data operation, storage function, and network interaction function. Or, the cloud server may also be a software program that runs in the electronic device and provides support for data processing, storage, and network interaction. In this embodiment, the number of servers included in the cloud server is not specifically limited. The cloud server may be specifically one server, or may be several servers, or a server cluster formed by a plurality of servers.
In some embodiments, the target user may be specifically understood as a user who is currently using the user terminal to prepare for handling a service. Specifically, the target user may be a user unfamiliar with text input, for example, a user who is not literate. Further, the above-mentioned target user may also be a user who is not familiar with the text input, and there are cases such as visual impairment, hearing impairment, language impairment, etc., that require more careful care and help. In addition, the target user may be an elderly user who is not familiar with text input and has speech mixed with dialect, or a child user who is not familiar with text input and has not speaking smoothly. Of course, it should be noted that the above listed target users are only an exemplary illustration. In specific implementation, the target user may also include other types of users according to specific application scenarios and processing requirements.
In some embodiments, the feature data of the target user may specifically include at least one of the following: the voice recognition method comprises the steps of obtaining a face image containing the face of a target user, a character image containing the whole body of the target user, video data containing behavior and action of the target user in a specified time period, audio data containing voice of the target user in the specified time period and the like.
The human figure image may be an image including the whole body of the four limbs of the target user. The specified time period may be, specifically, one minute or two minutes from the start of the feature data acquisition.
It should be noted that the above mentioned feature data of the user and other data related to the user, which are referred to later in this specification, are obtained and used under the condition that the user knows and agrees. Moreover, the acquisition, storage, use, processing and the like of the data all conform to relevant regulations of national laws and regulations.
In some embodiments, the triggering instruction may be specifically understood as an instruction that triggers the user terminal to acquire feature data of the target user. In a specific implementation, the user terminal may be configured to generate the trigger instruction when detecting that there is a user to transact a service using the user terminal.
Specifically, for example, an infrared detector may be disposed on an intelligent counter. The intelligent counter can detect whether a user approaches the intelligent counter through the infrared detector. After the intelligent counter detects that the user approaches the intelligent counter through the infrared detector, the intelligent counter can further monitor the stay time of the user in the adjacent area of the intelligent counter; when the fact that the staying time exceeds a preset time threshold (for example, 1 minute and the like) is monitored, the intelligent counter can judge that the user has a high probability as a target user who is ready to use the intelligent counter to handle business, and further can generate the trigger instruction.
Furthermore, the intelligent counter can acquire a face image containing the face of a target user, a figure image containing the whole body of the target user and video data containing the behavior of the target user in a specified time period through the camera; and meanwhile, audio data containing the voice of the target user in a specified time period is acquired through the microphone, so that the characteristic data of the target user is obtained.
In some embodiments, the determining the user type of the target user according to the feature data of the target user may include the following steps: and processing the characteristic data of the target user by using a preset classification model to determine the user type of the target user.
In specific implementation, the characteristic data of the target user can be used as model input and input into a preset classification model; operating the preset classification model and outputting a corresponding data processing result; and determining the user type of the target user according to the data processing result.
In some embodiments, the user type may specifically include one of: visually impaired users, hearing impaired users, language impaired users, and the like.
In some embodiments, before implementation, feature data of a sample user may be obtained as sample feature data; marking the sample characteristic data according to the user type of the sample user to obtain marked sample characteristic data; and performing model training by using the labeled sample characteristic data to obtain a preset classification model.
In some embodiments, the determining the matched target verification rule according to the user type of the target user may include, in specific implementation: and according to the user type of the target user, screening one or more preset verification rules matched with the user type of the target user from the preset verification rule set to serve as the target verification rule.
In some embodiments, the preset verification rule set may specifically store a plurality of different preset verification rules for verifying the identity of the user, and a matching correspondence table between the preset verification rules and the user types. In the correspondence table, a preset validation rule may be matched and corresponding to one or more user types. The preset validation rule may specifically include: voiceprint validation rules, iris validation rules, face validation rules, fingerprint validation rules, and the like. It should be noted that the preset validation rules listed above are only an exemplary illustration. In specific implementation, the preset validation rules may further include other types of validation rules suitable for validating the identity of the user according to specific application scenarios and processing requirements. The present specification is not limited to these.
In some embodiments, in specific implementation, the target validation rules may be selected from the set of validation rules according to the security level of the service involved and based on the user type of the target user. Specifically, under the condition that the security level of the service is low, a preset verification rule with the highest matching degree with the user type of the target user can be screened out from a preset verification set according to the matching correspondence table to serve as the target verification rule. For example, the related service is an account balance inquiry service with a lower security level, the user type is a user with visual impairment, and correspondingly, the determined target verification rule is as follows: voiceprint validation rules.
Under the condition that the security level of the service is high, a plurality of preset verification rules which are ranked in the front of the matching degree of the user type of the target user can be screened from the preset verification rule set according to the matching corresponding relation table to be combined to serve as the target verification rule. For example, the related service is an account transfer service with a very high security level, the user type is a language barrier user, and correspondingly, the determined target verification rule is as follows: a combination of iris verification rules and face verification rules.
In some embodiments, the user verification is performed on the target user according to the target verification rule, and in specific implementation, the corresponding feature to be tested can be obtained from the feature data of the target user according to the target verification rule; comparing the to-be-detected features of the target user with the reference features of the target user stored in the user database to obtain a comparison result; and determining whether the user verification of the target user passes or not according to the comparison result.
Specifically, for example, in a case where the target verification rule is a combination of an iris verification rule and a face verification rule, performing user verification on the target user according to the target verification rule may include: extracting iris features to be detected and face features to be detected of a target user from a face image containing the face of the target user according to a target verification rule; inquiring a user database of a target user, and acquiring reference iris features and reference face features which are provided by the target user during registration and stored in the user database; comparing the iris features to be detected with the reference iris features to obtain a first comparison result; meanwhile, comparing the facial features to be detected with the reference facial features to obtain a second comparison result; according to the first comparison result and the second comparison result, determining that the user of the target user passes verification under the condition that the feature difference value between the iris feature to be detected and the reference iris feature of the target user and the feature difference value between the face feature to be detected and the reference face feature are smaller than or equal to a preset feature difference threshold value; otherwise, determining that the user authentication of the target user is not passed.
In case it is determined that the user authentication of the target user passes, the subsequent data processing may be triggered. In contrast, in the case where it is determined that the user authentication of the target user has failed, in order to protect the data security of the user, the subsequent data processing is stopped, and a prompt message indicating that the user authentication has failed is communicated to the user through a display screen or a voice player.
In some embodiments, in specific implementation, the user terminal may determine the target interaction scheme matched with the target user according to the user type of the target user. Further, the user terminal can interact with the target user in a manner friendly to the target user according to the target user scheme so as to guide the target user to provide the user identification of the target user required by the service data processing and the target service data to be processed; and in the interaction process, the user identification of the target user provided by the target user and the target service data to be processed are acquired and acquired in a matched mode.
In some embodiments, the determining the matched target interaction scheme according to the user type of the target user may include the following steps: under the condition that the user type of the target user is determined to be a hearing-impaired user, determining a preset first-class interaction scheme as a target interaction scheme; the preset first-class interaction scheme is an interaction scheme using a voice recognition model, a sign language corpus and a voice corpus; under the condition that the user type of the target user is determined to be a vision disorder user, determining a preset second-class interaction scheme as a target interaction scheme; the preset second-class interaction scheme is an interaction scheme using a voice recognition model and a voice corpus; under the condition that the user type of the target user is determined to be a language barrier user, determining a preset third-class interaction scheme as a target interaction scheme; the preset third-class interaction scheme is an interaction scheme using a sign language recognition model and a voice corpus.
In some embodiments, before the implementation, the cloud server may configure a plurality of different types of preset interaction schemes through big data-based learning training, and establish a correspondence table between the different preset interaction schemes and the user types. The cloud server can send the preset interaction schemes and the corresponding relation table to the user terminal. The preset interaction scheme may specifically include: the method comprises the following steps of presetting a first-class interaction scheme, presetting a second-class interaction scheme and presetting a third-class interaction scheme. Based on the corresponding relation table, a preset first-class interaction scheme corresponds to the hearing-impaired users, a preset second-class interaction scheme corresponds to the vision-impaired users, and a preset third-class interaction scheme corresponds to the language-impaired users.
The preset first-class interaction scheme can be specifically configured with a corresponding speech recognition model, a sign language corpus and a speech corpus. The voice corpus stores audio data of a plurality of voice corpora related to business data processing. The sign language corpus stores video data of a plurality of sign language corpora related to business data processing. The voice recognition model can recognize voice audio data of a user and convert the voice audio data into text data of corresponding semantics.
The preset second-class interaction scheme may be specifically configured with a corresponding speech recognition model and a corresponding speech corpus.
The preset third-class interaction scheme can be specifically configured with a sign language recognition model and a voice corpus. The sign language identification model can identify sign language video data of a user and convert the sign language video data into text data with corresponding semantics.
In some embodiments, the preset third-class interaction scheme may be further configured with a lip language recognition model.
In some embodiments, the preset interaction schemes may further include a preset fourth type of interaction scheme corresponding to the elderly user and a preset fifth type of interaction scheme corresponding to the children user. The preset fourth type of interaction scheme may be specifically configured with a dialect speech recognition model based on dialect speech corpus training, and a dialect speech corpus. The preset fifth type of interaction scheme may be specifically configured with a child speech recognition model based on child speech corpus training, and a speech corpus.
In some embodiments, the interacting with the target user according to the target interaction scheme to obtain the user identifier of the target user and the target service data to be processed may include: inquiring a corresponding corpus according to a preset interactive template to acquire corresponding semantic corpus data; the corpus data is conveyed to a target user so as to guide the target user to complete the input of related data (such as user identification of the target user, target business data to be processed and the like) in a corresponding form; and performing data recognition by using the corresponding recognition model to acquire data input by the user.
The user identifier of the target user may specifically include at least one of the following: a name of the target user, a user account of the target user, a register mailbox of the target user, and the like.
In some embodiments, when it is determined that the user type of the target user is a hearing-impaired user, the interacting with the target user according to the target interaction scheme to obtain the user identifier of the target user and the target service data to be processed may include the following steps:
s1: extracting a sign language action video indicating that a target user describes user information and service handling requirements through voice from a sign language corpus; and displaying the sign language action video to a target user;
s2: collecting voice data of a target user; and processing the voice data by using a voice recognition model to acquire the user identification and the target service data of the target user.
Specifically, for example, the intelligent counter may find, from the sign language corpus, video data representing a sign language corpus that reminds a user to speak a name of the intelligent counter by voice and a service to be handled by the intelligent counter according to a preset interaction template, as the sign language action video; the sign language action video is presented to the target user via the display screen.
Correspondingly, after the target user watches the sign language action video, the target user can speak the name and the business to be handled according to the indication. The intelligent counter can monitor and collect voice data of a target user through the microphone.
Furthermore, the intelligent counter can process the voice data by using a voice recognition model, perform semantic recognition on the voice data, and convert the voice data into text data with corresponding semantics; then, the user identifier and the target service data of the target user can be detected and extracted from the text data.
Through the embodiment, the intelligent counter can accurately distinguish different types of users, and the target verification rule matched with the user type is adopted to complete user verification in a friendly mode; and under the condition that the user passes the verification, guiding the user to complete the input of related data by adopting a target interaction scheme matched with the user type in a friendly mode, and smoothly obtaining the required user identification and the service data to be processed. Therefore, the operation difficulty of the user can be reduced, and the interaction experience of the user is improved.
In some embodiments, referring to fig. 3, when the service data processing is performed according to the user identifier of the target user and the target service data to be processed, the specific implementation may include the following contents:
s105-1: inquiring a user database of a target user according to the user identification of the target user to determine whether the target user is a user to be attended;
s105-2: under the condition that the target user is determined to be the user to be paid attention to, inquiring the association group of the target user to determine the associated user of the target user;
s105-3: generating a confirmation request about the target service data; and communicating the confirmation request to the associated user;
s105-4: detecting whether a confirmation instruction for a confirmation request is received from an associated user;
s105-5: and under the condition that the confirmation instruction is determined to be received, carrying out service data processing related to the target service data.
In some embodiments, the association group may be a family group. At least the associated users with administrative responsibility (or referred to as parent users) are included in each associated group. The associated users have supervision authority over the users to be concerned. Based on the supervision authority, the associated user can assist the user to be attended in the associated group to audit the business data processing to be handled by the user to be attended, and the user to be attended can smoothly process the business data only under the condition that the associated user audits and confirms and does not have risks, so that the safety of the business data processing of the user to be attended can be effectively protected.
The association group may be preset for an associated user and stored in a user database. The association group at least includes a contact address corresponding to a terminal device of the associated user (e.g., a mobile phone held by the associated user).
Correspondingly, the intelligent counter can send a confirmation request about the target service data to the terminal equipment held by the associated user according to the contact way, so that the associated user can be reached.
In a specific implementation, the intelligent counter may send a confirmation request about the target service data to the terminal device held by the associated user according to the contact information based on the 5G transport protocol. Therefore, the associated users can be touched efficiently and timely, and the waiting time of the target user is reduced.
After the associated user receives the confirmation request through the terminal device, risk assessment can be performed on the business data currently processed by the user to be concerned, and when the risk is determined to be absent, the associated user can reply a keyword 'consent' as a confirmation instruction and feed back the consent to the intelligent counter. At this time, the intelligent counter processes the business data related to the target business data as a result of detecting the confirmation instruction. Conversely, upon determining that a risk exists, the associated user may reply with the keyword "disagree" as a non-confirmation instruction back to the intelligent counter. At this time, the intelligent counter may stop performing the business data processing related to the target business data because no confirmation instruction is detected, and convey a prompt message such as "there is a risk in the current business, the business cannot be handled temporarily, and please contact the associated user for confirmation" to the target user. Therefore, the safety of the service data processing of the target user can be effectively protected.
In some embodiments, when the method is implemented in the case that the target user is determined to be the user to be attended to, the method may further include: collecting a process record of a target user when the target user uses a user terminal to process service data; and storing the process record into a cloud database. Therefore, the whole process of processing the service data of the user to be concerned can be recorded and certified in time so as to facilitate subsequent inquiry and backtracking.
The process record may also specifically carry a user identifier of the target user, and information such as recording time.
In some embodiments, the cloud server may further receive a query request initiated by the associated user through the terminal device. The query request at least carries the user identifier of the target user and the query time. The cloud server can firstly query the association group where the target user is located according to the user identification of the target user so as to determine whether the user initiating the query request is the association user of the target user.
Under the condition that the user initiating the query request is determined not to be the associated user of the target user, the user can be determined to have no right to query the relevant records of the target user, and further prompt information of the unauthorized query can be generated and fed back. On the contrary, under the condition that the user initiating the query request is determined to be the associated user of the target user, the user can be determined to have the authority to query the relevant records of the target user, and further the query request can be responded, the records stored in the cloud database are queried, the process records carrying the same target user identification are found, and the process records with the recording time matched with the query time are used as the target process records needed by the user to be used; and feeding back the target process record to the associated user of the target user.
In some embodiments, the ue may specifically include at least one of: intelligent counters, self-service machines, mobile phone applications, and the like. Of course, the above listed user terminals to which the service data processing method provided in this specification can be applied are only schematic illustrations. In specific implementation, the service data processing method provided in this specification may also be applied to other types of user terminals according to specific application scenarios and processing requirements. The present specification is not limited to these.
In some embodiments, the service data processing is performed according to the user identifier of the target user and the target service data to be processed, and specifically may include: and completing the application or transaction of the target service of the target user according to the user identification and the target service data of the target user. For example, credit investigation data to be inquired by the target user is inquired and fed back. For another example, completing the electronic payment service requested to be opened by the target user. And for another example, completing the transfer process initiated by the target user, and the like.
As can be seen from the above, based on the service data processing method provided in the embodiments of the present specification, when a target user who has a service processing requirement uses a user terminal such as an intelligent counter to self-service process a related service, the user terminal may first collect and determine a user type of the target user according to feature data of the target user; determining a target verification rule and a target interaction scheme matched with the target user according to the user type of the target user; according to the target verification rule, performing user verification on the target user; under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain a user identifier of the target user and target service data to be processed related to the service; and further, the service data can be processed according to the user identification of the target user and the target service data. Therefore, different types of users can be intelligently distinguished, and proper and matched verification rules and interaction schemes are respectively provided for the different types of users to help the users to complete self-service business transaction conveniently and safely, and the interaction experience of the users is improved.
An embodiment of the present specification further provides an intelligent counter, including a processor and a memory for storing processor-executable instructions, where the processor, when implemented specifically, may perform the following steps according to the instructions: responding to a trigger instruction, and acquiring characteristic data of a target user; determining the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user; according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed; and processing the service data according to the user identification of the target user and the target service data to be processed.
In order to more accurately complete the above instructions, referring to fig. 4, the present specification further provides another specific intelligent counter, wherein the intelligent counter includes a network communication port 401, a processor 402 and a memory 403, and the above structures are connected by an internal cable, so that the structures can perform specific data interaction.
The network communication port 401 may be specifically configured to interact with a cloud server, obtain a preset validation rule and a preset interaction scheme provided by the cloud server, and query a user database through the cloud server.
The processor 402 may be specifically configured to respond to a trigger instruction and acquire feature data of a target user; determining the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme which are matched with each other according to the user type of the target user; according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed; and processing the service data according to the user identification of the target user and the target service data to be processed.
The memory 403 may be specifically configured to store a corresponding instruction program.
In this embodiment, the network communication port 401 may be a virtual port that is bound to different communication protocols, so that different data can be sent or received. For example, the network communication port may be a port responsible for web data communication, a port responsible for FTP data communication, or a port responsible for mail data communication. In addition, the network communication port can also be a communication interface or a communication chip of an entity. For example, it may be a wireless mobile network communication chip, such as GSM, CDMA, etc.; it can also be a Wifi chip; it may also be a bluetooth chip.
In this embodiment, the processor 402 may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller and embedded microcontroller, and so forth. The description is not intended to be limiting.
In this embodiment, the memory 403 may include multiple layers, and in a digital system, the memory may be any memory as long as binary data can be stored; in an integrated circuit, a circuit without a physical form and with a storage function is also called a memory, such as a RAM, a FIFO and the like; in the system, the storage device in physical form is also called a memory, such as a memory bank, a TF card and the like.
In some embodiments, referring to fig. 5, the intelligent counter may further include a camera 501, a microphone 502, a display 503, and a voice player 504. The camera 501 may be specifically configured to acquire a face image including a face of a target user, a figure image including a whole body of the target user, video data including behavior of the target user in a specified time period, and the like as feature data of the target user. The microphone 502 may be specifically configured to collect audio data including voice of a target user within a specified time period as feature data of the target user. The display screen 503 and/or the voice player 504 may be specifically configured to interact with a target user according to a corresponding target interaction scheme, and acquire a user identifier of the target user and target service data to be processed through the camera 501 and/or the microphone 502 during an interaction process.
An embodiment of the present specification further provides a computer storage medium based on the foregoing service data processing method, where the computer storage medium stores computer program instructions, and when the computer program instructions are executed, the computer storage medium implements: responding to a trigger instruction, and acquiring characteristic data of a target user; determining the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user; according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed; and processing the service data according to the user identification of the target user and the target service data to be processed.
In this embodiment, the storage medium includes, but is not limited to, a Random Access Memory (RAM), a Read-Only Memory (ROM), a Cache (Cache), a Hard Disk Drive (HDD), or a Memory Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set in accordance with a standard prescribed by a communication protocol.
In this embodiment, the functions and effects specifically realized by the program instructions stored in the computer storage medium can be explained by comparing with other embodiments, and are not described herein again.
Embodiments of the present specification further provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the following steps: responding to a trigger instruction, and acquiring characteristic data of a target user; determining the user type of the target user according to the characteristic data of the target user; determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user; according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed; and processing the service data according to the user identification of the target user and the target service data to be processed.
Referring to fig. 6, in a software layer, an embodiment of the present specification further provides a service data processing apparatus, which may specifically include the following structural modules:
the acquisition module 601 may be specifically configured to respond to a trigger instruction and acquire feature data of a target user;
the first determining module 602 may be specifically configured to determine a user type of a target user according to feature data of the target user;
the second determining module 603 may be specifically configured to determine, according to the user type of the target user, a target validation rule and a target interaction scheme that are matched with each other;
the interaction module 604 may be specifically configured to perform user authentication on a target user according to a target authentication rule; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed;
the processing module 605 may be specifically configured to perform service data processing according to the user identifier of the target user and the target service data to be processed.
In some embodiments, the ue may specifically include at least one of: intelligent counters, self-service machines, mobile phone applications, and the like.
In some embodiments, the user type may specifically include one of: visually impaired users, hearing impaired users, language impaired users, and the like.
In some embodiments, the characteristic data of the target user may specifically include at least one of: the system comprises a face image containing the face of a target user, a figure image containing the whole body of the target user, video data containing behavior and action of the target user in a specified time period, audio data containing voice of the target user in the specified time period and the like.
In some embodiments, when the first determining module 602 is implemented, the user type of the target user may be determined according to the feature data of the target user in the following manner: and processing the characteristic data of the target user by using a preset classification model to determine the user type of the target user.
In some embodiments, when the second determining module 603 is implemented, the matching target verification rule may be determined according to the user type of the target user in the following manner: and according to the user type of the target user, screening one or more preset verification rules matched with the user type of the target user from the preset verification rule set to serve as the target verification rule.
In some embodiments, when the second determining module 603 is implemented, the matching target interaction scheme may be determined according to the user type of the target user in the following manner: under the condition that the user type of the target user is determined to be a hearing-impaired user, determining a preset first-class interaction scheme as a target interaction scheme; the preset first-class interaction scheme is an interaction scheme using a voice recognition model, a sign language corpus and a voice corpus; under the condition that the user type of the target user is determined to be the vision disorder user, determining a preset second-class interaction scheme as a target interaction scheme; the preset second-class interaction scheme is an interaction scheme using a voice recognition model and a voice corpus; under the condition that the user type of the target user is determined to be a language barrier user, determining a preset third-class interaction scheme as a target interaction scheme; the preset third-class interaction scheme is an interaction scheme using a sign language recognition model and a voice corpus.
In some embodiments, when determining that the user type of the target user is a hearing-impaired user, when the interaction module 604 is implemented specifically, the interaction may be performed with the target user according to a target interaction scheme in the following manner to obtain a user identifier of the target user and target service data to be processed: extracting a sign language action video indicating that a target user describes user information and service handling requirements through voice from a sign language corpus; and displaying the sign language action video to a target user; collecting voice data of a target user; and processing the voice data by using a voice recognition model to acquire the user identification and the target service data of the target user.
In some embodiments, when the processing module 605 is implemented specifically, the service data processing may be performed according to the user identifier of the target user and the target service data to be processed in the following manner: inquiring a user database of a target user according to the user identification of the target user to determine whether the target user is a user to be attended; under the condition that the target user is determined to be the user to be paid attention to, inquiring the association group of the target user to determine the associated user of the target user; generating a confirmation request about the target service data; and communicating the confirmation request to the associated user; detecting whether a confirmation instruction for a confirmation request is received from an associated user; and under the condition that the confirmation instruction is determined to be received, carrying out service data processing related to the target service data.
In some embodiments, when the device is implemented specifically, the device may be further configured to collect a process record of the target user when the target user uses the user terminal to perform service data processing when determining that the target user is the user to be paid attention to; and storing the process record into a cloud database.
It should be noted that, the units, devices, modules, etc. illustrated in the above embodiments may be implemented by a computer chip or an entity, or implemented by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, which are described separately. It is to be understood that, in implementing the present specification, functions of each module may be implemented in one or more pieces of software and/or hardware, or a module that implements the same function may be implemented by a combination of a plurality of sub-modules or sub-units, or the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Therefore, the service data processing device provided based on the embodiment of the specification can intelligently distinguish different types of users, and provides appropriate and matched verification rules and interaction schemes for the different types of users respectively so as to help the users complete self-service transaction conveniently and safely, and improve the interaction experience of the users.
Although the present specification provides method steps as described in the examples or flowcharts, additional or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an apparatus or client product in practice executes, it may execute sequentially or in parallel (e.g., in a parallel processor or multithreaded processing environment, or even in a distributed data processing environment) according to the embodiments or methods shown in the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded. The terms first, second, etc. are used to denote names, but not any particular order.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present specification can be implemented by software plus necessary general hardware platform. With this understanding, the technical solutions in the present specification may be essentially embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a mobile terminal, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments in the present specification.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The description is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
While the specification has been described with examples, those skilled in the art will appreciate that there are numerous variations and permutations of the specification that do not depart from the spirit of the specification, and it is intended that the appended claims include such variations and modifications that do not depart from the spirit of the specification.

Claims (14)

1. A service data processing method is applied to a user terminal, and comprises the following steps:
responding to a trigger instruction, and acquiring characteristic data of a target user;
determining the user type of the target user according to the characteristic data of the target user;
determining a target verification rule and a target interaction scheme which are matched according to the user type of a target user;
according to the target verification rule, performing user verification on the target user; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed;
and processing the service data according to the user identification of the target user and the target service data to be processed.
2. The method of claim 1, wherein the user terminal comprises at least one of: intelligent counter, self-service machine, cell-phone application.
3. The method of claim 1, wherein the user type comprises one of: a visually impaired user, a hearing impaired user, a language impaired user.
4. The method of claim 3, wherein the target user profile includes at least one of: the voice recognition method comprises the steps of obtaining a face image containing the face of a target user, a figure image containing the whole body of the target user, video data containing behavior and action of the target user in a specified time period, and audio data containing voice of the target user in the specified time period.
5. The method of claim 4, wherein determining the user type of the target user based on the characteristic data of the target user comprises:
and processing the characteristic data of the target user by using a preset classification model to determine the user type of the target user.
6. The method of claim 3, wherein determining the matching target validation rule based on the user type of the target user comprises:
and according to the user type of the target user, screening one or more preset verification rules matched with the user type of the target user from the preset verification rule set to serve as the target verification rule.
7. The method of claim 3, wherein determining the matching target interaction scheme according to the user type of the target user comprises:
under the condition that the user type of the target user is determined to be a hearing-impaired user, determining a preset first-class interaction scheme as a target interaction scheme; the preset first-class interaction scheme is an interaction scheme using a voice recognition model, a sign language corpus and a voice corpus;
under the condition that the user type of the target user is determined to be the vision disorder user, determining a preset second-class interaction scheme as a target interaction scheme; the preset second-class interaction scheme is an interaction scheme using a voice recognition model and a voice corpus;
under the condition that the user type of the target user is determined to be a language barrier user, determining a preset third-class interaction scheme as a target interaction scheme; the preset third-class interaction scheme is an interaction scheme using a sign language recognition model and a voice corpus.
8. The method of claim 7, wherein in a case that the user type of the target user is determined to be a hearing-impaired user, interacting with the target user according to the target interaction scheme to obtain a user identifier of the target user and target service data to be processed, the method comprises:
extracting a sign language action video indicating that a target user describes user information and service handling requirements through voice from a sign language corpus; and displaying the sign language action video to a target user;
collecting voice data of a target user; and processing the voice data by using a voice recognition model to acquire the user identification and the target service data of the target user.
9. The method of claim 3, wherein performing service data processing according to the user identifier of the target user and the target service data to be processed comprises:
inquiring a user database of a target user according to the user identification of the target user to determine whether the target user is a user to be attended;
under the condition that the target user is determined to be the user to be paid attention to, inquiring the association group of the target user to determine the associated user of the target user;
generating a confirmation request about the target service data; and communicating the confirmation request to the associated user;
detecting whether a confirmation instruction for a confirmation request is received from an associated user;
and under the condition that the confirmation instruction is determined to be received, carrying out service data processing related to the target service data.
10. The method according to claim 9, wherein in case that the target user is determined to be the user to be attended to, the method further comprises: collecting a process record of a target user when the target user uses a user terminal to process service data; and storing the process record into a cloud database.
11. A service data processing apparatus, comprising:
the acquisition module is used for responding to the trigger instruction and acquiring the characteristic data of the target user;
the first determining module is used for determining the user type of the target user according to the characteristic data of the target user;
the second determining module is used for determining a matched target verification rule and a target interaction scheme according to the user type of the target user;
the interaction module is used for carrying out user verification on the target user according to the target verification rule; and under the condition that the user verification is determined to pass, interacting with the target user according to the target interaction scheme to obtain the user identification of the target user and the target service data to be processed;
and the processing module is used for processing the service data according to the user identification of the target user and the target service data to be processed.
12. An intelligent counter comprising a processor and a memory for storing processor-executable instructions, the processor implementing the steps of the method of any one of claims 1 to 10 when executing the instructions.
13. A computer-readable storage medium having stored thereon computer instructions which, when executed by a processor, carry out the steps of the method of any one of claims 1 to 10.
14. A computer program product comprising a computer program which, when executed by a processor, carries out the steps of the method according to any one of claims 1 to 10.
CN202210342275.8A 2022-04-02 2022-04-02 Service data processing method and device and intelligent counter Pending CN114895775A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210342275.8A CN114895775A (en) 2022-04-02 2022-04-02 Service data processing method and device and intelligent counter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210342275.8A CN114895775A (en) 2022-04-02 2022-04-02 Service data processing method and device and intelligent counter

Publications (1)

Publication Number Publication Date
CN114895775A true CN114895775A (en) 2022-08-12

Family

ID=82715517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210342275.8A Pending CN114895775A (en) 2022-04-02 2022-04-02 Service data processing method and device and intelligent counter

Country Status (1)

Country Link
CN (1) CN114895775A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116650845A (en) * 2023-04-27 2023-08-29 温州眼医眼视光医疗科技有限公司 Method for realizing remote control of myopia therapeutic apparatus and related system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116650845A (en) * 2023-04-27 2023-08-29 温州眼医眼视光医疗科技有限公司 Method for realizing remote control of myopia therapeutic apparatus and related system
CN116650845B (en) * 2023-04-27 2024-01-19 温州眼医眼视光医疗科技有限公司 Method for realizing remote control of myopia therapeutic apparatus and related system

Similar Documents

Publication Publication Date Title
CN112651841B (en) Online business handling method, online business handling device, server and computer readable storage medium
CN110263157B (en) Data risk prediction method, device and equipment
CN113435862B (en) Bill processing method and device based on mailbox
CN112507314B (en) Client identity verification method, device, electronic equipment and storage medium
CN110875039B (en) Speech recognition method and device
CN111343162A (en) System secure login method, device, medium and electronic equipment
CN111598122B (en) Data verification method and device, electronic equipment and storage medium
CN114895775A (en) Service data processing method and device and intelligent counter
CN111126071A (en) Method and device for determining questioning text data and data processing method of customer service group
CN107294981B (en) Authentication method and equipment
CN111882425B (en) Service data processing method, device and server
CN106056377A (en) Data processing method and smartwatch
CN115906028A (en) User identity verification method and device and self-service terminal
CN115294592A (en) Claim settlement information acquisition method and acquisition device, computer equipment and storage medium
WO2021073270A1 (en) Method and apparatus for risk management and control, computer apparatus, and storage medium
CN111599085B (en) Identity verification processing method and device and mobile terminal
CN114579341A (en) Card making method, device and equipment of all-in-one union pay card and readable storage medium
CN112115836A (en) Information verification method and device, computer readable storage medium and electronic equipment
CN111259216A (en) Information identification method, device and equipment
CN114154507A (en) Abnormal transfer monitoring method, device, equipment and storage medium
CN111275831B (en) Data processing method, system and computer readable storage medium
CN115860749B (en) Data processing method, device and equipment
CN110768969B (en) Test method and device based on network data monitoring and readable storage medium
US20230054815A1 (en) Systems and methods for prioritizing alerts
CN115631565A (en) Access control system control method and device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination