WO2020019454A1 - 风险数据显示方法、装置、计算机设备及存储介质 - Google Patents

风险数据显示方法、装置、计算机设备及存储介质 Download PDF

Info

Publication number
WO2020019454A1
WO2020019454A1 PCT/CN2018/106349 CN2018106349W WO2020019454A1 WO 2020019454 A1 WO2020019454 A1 WO 2020019454A1 CN 2018106349 W CN2018106349 W CN 2018106349W WO 2020019454 A1 WO2020019454 A1 WO 2020019454A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
risk
risk data
query
geographic information
Prior art date
Application number
PCT/CN2018/106349
Other languages
English (en)
French (fr)
Inventor
王旭
商文彬
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020019454A1 publication Critical patent/WO2020019454A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Definitions

  • the present application relates to the field of computer software, and in particular, to a method, a device, a computer device, and a storage medium for displaying risk data.
  • Risk data plays an important role in strengthening institutional risk management, increasing operating income, analyzing business direction, and improving user satisfaction. It is important data for analyzing the operation of the organization.
  • each region has corresponding risk data.
  • risk data After the risk data is collected, it is generally used for statistics and display in the form of data tables.
  • presentation of the table data is not intuitive enough and cannot be at different levels. Perform hierarchical and progressive display of data to better demonstrate the significance of data analysis.
  • a method for displaying risk data including:
  • the analysis request including a target analysis item
  • a risk data display device includes:
  • a query request obtaining module is configured to obtain a query request, and obtain an original risk map based on the query request, where the original risk map includes a regional block and primary risk data corresponding to the regional block;
  • a second-level risk data acquisition module configured to obtain a user's query geographic information, obtain the second-level risk data of an area block corresponding to the query geographic information based on the query geographic information, and display the second-level risk data;
  • An analysis request obtaining module is configured to obtain a user's analysis request based on the secondary risk data, where the analysis request includes a target analysis item;
  • the detailed risk data obtaining module is configured to obtain detailed risk data based on the target analysis item, and display the detailed risk data.
  • a computer device includes a memory, a processor, and computer-readable instructions stored in the memory and executable on the processor.
  • the processor executes the computer-readable instructions, the following steps are implemented:
  • the analysis request including a target analysis item
  • One or more non-volatile readable storage media storing computer-readable instructions, which when executed by one or more processors, cause the one or more processors to perform the following steps:
  • the analysis request including a target analysis item
  • FIG. 1 is a schematic diagram of an application environment of a risk data display method according to an embodiment of the present application
  • FIG. 2 is an implementation flowchart of a risk data display method provided in an embodiment of the present application
  • FIG. 3 is another implementation flowchart of a risk data display method provided in an embodiment of the present application.
  • FIG. 4 is another implementation flowchart of a risk data display method provided in an embodiment of the present application.
  • FIG. 5 is an implementation flowchart of step S20 in FIG. 2;
  • step S20 in FIG. 2 is another implementation flowchart of step S20 in FIG. 2;
  • FIG. 7 is an implementation flowchart of step S40 in FIG. 2;
  • FIG. 8 is a schematic diagram of a risk data display device according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a computer device according to an embodiment of the present application.
  • the risk data display method provided in this application can be applied in the application environment shown in FIG. 1, in which a client communicates with a server through a network.
  • the server obtains the original risk data based on the query request, and the client displays the risk data.
  • Clients can be, but are not limited to, various personal computers, laptops, smartphones, tablets, and portable wearable devices.
  • the server can be implemented by an independent server or a server cluster composed of multiple servers.
  • the risk data display method provided in the present application can also be applied only to the client. By integrating the server data on the client, the client directly stores the data, so that only a single client can execute this solution.
  • FIG. 2 shows a flowchart of a risk data display method in this embodiment.
  • the client transmits data through the network and the server, and displays the risk data in an intuitive way.
  • the risk data display method includes the following steps:
  • S10 Obtain a query request, and obtain an original risk map based on the query request.
  • the original risk map includes a regional section and primary risk data corresponding to the regional section.
  • the query request refers to a request triggered by a user through a risk data query action initiated by a client.
  • An original risk map is a map that displays primary risk data on a background map.
  • the regional block refers to a block of each geographical area divided on the original risk map, and the original risk map includes at least one area block. Among them, the area on the original risk map can be divided according to actual needs. For example, using the map of China as the original risk map, you can divide the regional sections according to the geographical locations of China's provinces and cities, or you can divide the regional sections according to the market responsibility area.
  • Primary risk data refers to the content or basic data that must appear on every loading of the original risk map. Preloading the primary risk data can reduce the loading time of subsequent displays and improve display efficiency. For example, the primary risk data may be the total turnover of each regional section.
  • the primary risk data can be defined by the user through the background, and the primary risk data that the user wants to know the most can be displayed in order to personalize the original risk map.
  • the client generates a query request according to the query action of the user.
  • it may be an operation request to open a query webpage, or an operation request to open a risk query APP.
  • the client generates a query request after obtaining the query action of the user, and sends the query request to the server.
  • the server obtains the original risk map.
  • the original risk map includes the regional section and the primary risk data corresponding to the regional section.
  • the original risk map with China map as the background is a China map showing primary risk data corresponding to various provinces and cities in China.
  • the regional section is divided by province; the original risk map with Asia map as the background is The regional map of Asia showing primary risk data for each country in Asia is divided by country.
  • the displayed primary risk data can be set according to specific requirements.
  • the primary risk data can be displayed on the original risk map without further retrieval, which is convenient for users to query.
  • S20 Obtain the query geographic information of the user, and obtain the secondary risk data of the area section corresponding to the query geographic information based on the query geographic information, and display the secondary risk data.
  • the querying geographic information refers to the geographic information of the area where the user needs to further query the secondary risk data.
  • the location of the querying geographic information may be information such as a city name, a country name, or latitude and longitude coordinates.
  • the secondary risk data can be more detailed data explaining the primary risk data, for example, it can be violation data and total business data used to calculate the total risk score; the secondary risk data can also be other than the primary risk data
  • the project's risk data such as the amount of penalties and recoveries, can be customized by the user through the background to meet the user's query needs and query habits.
  • the user can input the corresponding city name as the query geographic information through the client interface, or select the corresponding region section as the query geographic information on the original risk map of the client interface, and each query geographic information corresponds to a risk map
  • each query geographic information corresponds to a risk map
  • the secondary risk data may be displayed on the original risk map in the form of a pop-up floating box and pointing to a corresponding area block.
  • the secondary risk data is obtained in a targeted manner, which makes the data exchange more accurate and improves the query efficiency.
  • the analysis request refers to a request instruction for analyzing the secondary risk data
  • the target analysis item refers to a data item selected by the user to specifically analyze the secondary risk data
  • the user selects the target analysis item to be analyzed in the secondary risk data on the client display interface.
  • the secondary risk data includes multiple types of data items. According to the user's analysis request, the secondary risk selected by the user is obtained.
  • the data item of the data is the target analysis item.
  • the secondary risk data includes data items such as monthly invoicing amount, monthly repayment amount, monthly unsettled amount, and monthly fine amount. If the analysis of the monthly fine amount in the secondary risk data is required, then the selected monthly fine amount data Items are targeted analysis items.
  • S40 Obtain detailed risk data based on the target analysis item, and display detailed risk data.
  • the detailed risk data refers to more detailed and specific risk data.
  • the detailed risk data may be detailed data that further expands the secondary risk data, or may be related data for calculating the secondary risk data, and is used to carry out the secondary risk data. detailed analysis.
  • the target analysis item configured in the analysis request, detailed risk data corresponding to the target analysis item is obtained, and the detailed risk data is displayed on the client display interface. Further, historical data of detailed risk data of target analysis items in the area section can be obtained, and detailed risk data can be compared and analyzed based on the historical data. Further, detailed risk data of other competition agencies in the region can also be obtained for comparison and analysis.
  • the target risk analysis item is the detailed risk data of the monthly fine amount of Guangdong province, which can be the detailed data of the fine amount of each business unit in the current month, or the historical monthly fine amount of each month and the monthly fine amount of other insurance agencies in Guangdong province.
  • the regional section is divided on the original risk map, and the corresponding primary risk data is displayed directly on the corresponding regional section on the original risk map, so that the query display of the primary risk data is more intuitive, and it is convenient to intuitively understand the original Primary risk data for all area sections on the risk map; further obtain query geographic information, obtain secondary risk data, select target analysis items, obtain detailed risk data, perform detailed analysis of secondary risk data, and display primary risk data in steps
  • Second-level risk data and detailed risk data make the data query more hierarchical, which can not only control the global display of the risk data in general, but also accurately query the second-level risk data and detailed risk data according to actual needs, to obtain a deeper level Data, it is easy to highlight key points. This method also reduces data tedious interaction, reduces resource consumption, and improves the efficiency of query and display.
  • the risk data display method before step S10, that is, before the step of obtaining a query request, the risk data display method further includes the following steps:
  • S101 Obtain original data, generate a regional identifier based on a regional dimension of the original data, and generate an agency identifier based on a data source agency of the original data.
  • raw data refers to unprocessed data generated by various institutions during the course of market transactions.
  • Raw data includes data of the trading institution where the user is located, as well as data of other relevant competing institutions.
  • the original data contains the geographic information of the source of the original data and the code of the source organization of the data.
  • the regional dimension refers to the source geographic information in the original data as the distinguishing dimension.
  • the region identifier is an attribute identifier that indicates the region dimension of the original data.
  • the data source organization refers to the original data generating organization, that is, the original data obtaining organization.
  • the organization ID is an attribute identification of the data source organization that indicates the original data.
  • the automatic acquisition frequency of the original data can be set, and the original data is regularly obtained from the major data platforms through the web crawler technology, and then the geographic information of the original data source is used as the regional dimension, and the regional identifier is generated according to the regional dimension of the original data.
  • a geographic dimension used to identify and distinguish the original data.
  • the original data acquisition organization is used as the data source organization, and an organization ID is generated based on the original data source organization.
  • the organization identification is used to identify and distinguish the original data source organization.
  • the basic data refers to the original data marked with the area identification and the organization identification.
  • the regional data is used to label the original data according to its regional dimension.
  • the regional data on the original risk map is used as a unit to summarize and classify the original data.
  • the original data of each regional dimension is identified by the regional ID corresponding to the regional dimension.
  • the regional dimension of the basic data and the source organization of the data can be identified by the regional identifier and the institutional identifier of the basic data, which is convenient for inquiries and calls.
  • S103 Associate the basic data with the regional section according to the area identification and the organization identification, and establish a risk map database.
  • the risk map database refers to a database that associates basic data with regional sections to form primary risk data, secondary risk data, and detailed risk data.
  • the basic data is summarized and classified according to the area ID and the organization ID.
  • the basic data of the area ID corresponding to the area block is stored in blocks, and then different agencies in the same area block are stored.
  • the identified basic data is partitioned and stored.
  • the basic data of the same data source institution in the same area dimension are integrated together, and the basic data and the regional sections are associated one by one according to the area identification and institution identification to establish a risk map database.
  • a regional identifier is generated according to the regional dimension of the original data, and an organizational identifier is generated according to the data source agency.
  • the original data is labeled with the regional identifier and the organizational identifier label to obtain basic data. Identify the regional dimension and data source organization of the basic data to facilitate the association of the basic data with the regional section. Correlating the basic data with the regional sections of the original risk map one by one to establish a risk map database is convenient for organizing the basic data of each regional section, and facilitating data query and recall.
  • the method for displaying risk data further includes the following steps:
  • the primary risk data is divided into different data levels according to the corresponding data amount, and the data level of the primary risk data of each area section is marked on the original risk map.
  • the primary risk data can be divided into different data levels according to the corresponding data amount, and the regional sections where the primary risk data of different data levels are marked on the original risk map to distinguish the primary risk data corresponding to different data amounts. .
  • the data level of the primary risk data of each area section on the original risk map may be marked by rendering the area sections of the original risk map with different data levels in different colors.
  • different colors can be used to indicate different score segments, 100-85 indicates high scores in red, 84-65 indicates dark scores in high blue, and 64-45.
  • the light blue indicates that the score is average, the gray score below 44 indicates that the score is low, and the primary risk data of each level is marked with different colors, making the display of the primary risk data more prominent and contrastive.
  • the data level of the primary risk data on the original risk map can also be directly marked by the text labeling method, or a three-dimensional map can be used to mark the data by setting different heights of the regional blocks.
  • S202 Based on the data level of the primary risk data of each regional section, sort the primary risk data of each regional section to form a regional risk data list.
  • a regional risk data list is formed based on the data levels of all the regional sections of the original risk map and the primary risk data corresponding to each regional section.
  • the regional risk data list is sorted according to the data level of the primary risk data, which can be displayed more intuitively
  • the volume of primary risk data in each area is convenient for comparison.
  • the primary risk data of different data levels are marked to show the data that best meets the query requirements, so as to highlight the display focus of the data, which is convenient and intuitive. Distinguish the differences between different data levels, making the data query more prominent; using the form of regional risk data list to sort the primary risk data of each area section for comparison and analysis, and the amount of primary risk data displayed It is relatively small, occupies less resources, and is easy to handle.
  • step S20 that is, obtaining the query geographic information of the user, obtaining the secondary risk data of the area section corresponding to the query geographic information based on the query geographic information, and displaying the secondary risk data, It includes the following steps:
  • S211 Based on the user's geographic selection request, obtain the geographical location currently selected by the user as the query geographic information.
  • the geographic selection request refers to a request for selecting a corresponding geographic location input by a user through a client.
  • the geographic location is based on the area section on the original risk map.
  • Querying geographic information refers to the geographic information of regions where users need to further query secondary risk data.
  • the geographical location currently selected by the user is obtained as the query geographic information.
  • the user's current login location can be obtained as the query geographic information, and by automatically obtaining the user's login location as the query geographic information, the operation process of selecting the query geographic information is reduced, which is convenient for operation. It can also obtain the geographic location selected by the user through mouse and / or keyboard input as the query geographic information, which can accurately obtain the query geographic information selected by the user, and obtain the secondary risk data required by the user, making the query more accurate and more consistent with the user Demand.
  • S212 Query the risk map database according to the regional section corresponding to the query geographic information, and obtain the secondary risk data corresponding to the regional section.
  • each query geographic information corresponds to the upper region section of the original risk map.
  • the risk map database is queried, and corresponding secondary risk data is obtained from the risk map database.
  • the secondary risk data is updated asynchronously through interactive web application technology, and the updated secondary risk data is displayed.
  • the interactive webpage application technology is an interactive asynchronous update webpage development technology, such as Ajax technology.
  • Ajax stands for "Asynchronous Javascript And XML (Async JavaScript and XML)" and is abbreviated as Ajax. It is a type of interactive web application technology.
  • Ajax is a technology used to create fast and dynamic web pages. It uses an asynchronous method to communicate with the server. Interrupt the user's operation, have a more rapid response ability, can update part of the webpage technology without reloading the entire webpage. Through a small amount of data exchange with the server in the background, the web page can be updated asynchronously.
  • the secondary risk data interacts with the system foreground through Ajax.
  • the system foreground obtains the latest secondary risk data.
  • the primary risk data displayed in other areas on the original risk map is not updated. Risk data does not need to be reloaded.
  • the display mode of the secondary data may be displayed in the form of a floating window on the area plate corresponding to the query geographic information on the original risk map.
  • querying geographic information includes a login ID and a login password; and obtaining the secondary risk data of an area section corresponding to the querying geographic information based on the querying geographic information, further including:
  • S221 Verify the login ID and login password. If the verification succeeds, based on the user's login ID, query the control authority corresponding to the login ID.
  • the login ID is identification information of a user's login identity, and is used to distinguish different registrants.
  • the login password is a password for login based on the corresponding login ID. Querying geographic information includes login ID and login password.
  • the user logs in based on the login ID and the corresponding login password
  • the server verifies the user's login ID based on the login password. If the authentication succeeds, the login password matches the login ID. If the user logs in successfully, the user logs in based on the user's login. ID, query the control authority corresponding to the login ID, and the background assigns the corresponding query authority through the authority control field returned. Further, the control authority is based on different users of different institutions when logging in, and the client sends the login ID to the background for filtering verification.
  • the user's query geographic information exceeds the scope of the control authority. If it is within the scope of the control authority, the secondary risk data corresponding to the query geographic information is obtained and the query result is displayed. ; If it exceeds the scope of control authority, it is forbidden to display secondary risk data and send prompt information. Further, the user's control authority can be restricted according to the region location of the user's login ID. For example, the Shenzhen user requests to query the secondary risk data of the Shenzhen region, and the query of geographic information of the Shenzhen user does not exceed the scope of the control authority of the login ID.
  • the control authority corresponding to the login ID is verified, so as to realize the control authority allocation of the secondary risk data query.
  • the login ID is assigned control rights to control the query scope of the login ID to improve the confidentiality of the secondary risk data query, so that the display method of the risk data is more in line with business requirements.
  • the target analysis item includes a data category option and a display mode option; obtaining detailed risk data based on the target analysis item and displaying the detailed risk data includes:
  • S41 Obtain the target data category selected by the user from the data category option, and obtain the target display mode selected by the user from the display mode option.
  • the data category option refers to the choice of data category used to select detailed risk data, for example, historical monthly fine amount option, regulatory penalty loss data option, and other insurance institution monthly fine amount option, etc.
  • the data category option is displayed on the client
  • the interface is displayed in the form of a drop-down list.
  • the user can click and select the corresponding data category option to configure the data category of the detailed risk data to be queried.
  • the target data category is the data category selected by the user in the data category option.
  • the display method options are options for selecting how to display detailed risk data, for example, line chart options, bar chart options, bar chart options, and pie chart options.
  • the display method options are displayed in the form of a drop-down list on the client display interface.
  • the user clicks and selects the corresponding display method options to configure the display method of detailed risk data on the display page.
  • the server changes the display method options based on the display method selected by the user.
  • the corresponding api value changes the display mode. For example, change the histogram to a line chart, that is, change the api value of the corresponding display option from bar to line.
  • the target display method refers to the display method selected by the user in the display method option.
  • click to select the target data category to be queried from the data category option drop-down list on the client display interface and click to select the target display mode from the display mode option drop-down list to display detailed risk data of the target data category.
  • S42 Based on the target data category, query the risk map database to obtain detailed risk data corresponding to the target data category.
  • the risk map database is queried, and detailed risk data corresponding to the target data category is obtained from the risk map database.
  • the acquired detailed risk data is displayed according to the target display mode configured by the user. Further, the display mode of the detailed risk data can be changed in real time through the display mode option, so that the display of the detailed risk data can be changed in real time according to user needs, personalized configuration, and the display of the detailed risk data are more visual and intuitive.
  • the data category option and display mode option are provided to the user to select the data category and display mode of the query, so that the configuration operation of the data category and display mode is simpler; according to the target data category selected by the user, the query details
  • the risk data makes the detailed risk data query more accurate and more in line with the query requirements; the detailed risk data is displayed according to the target display method selected by the user, which makes the display method more personalized and meets the user's personalized needs.
  • a risk data display device corresponds to the risk data display method in the above embodiment in a one-to-one correspondence.
  • the risk data display device includes a query request acquisition module 10, a secondary risk data acquisition module 20, an analysis request acquisition module 30, and a detailed risk data acquisition module 40.
  • the implementation functions of the query request acquisition module 10, the secondary risk data acquisition module 20, the analysis request acquisition module 30, and the detailed risk data acquisition module 40 correspond to the steps corresponding to the risk data display method in the above embodiment, and each function module The details are as follows:
  • the query request obtaining module 10 is configured to obtain a query request, and obtain an original risk map based on the query request.
  • the original risk map includes a regional section and primary risk data corresponding to the regional section.
  • the secondary risk data acquisition module 20 is configured to obtain the query geographic information of the user, obtain the secondary risk data of the area section corresponding to the query geographic information based on the query geographic information, and display the secondary risk data.
  • the analysis request obtaining module 30 is configured to obtain a user's analysis request based on the secondary risk data, and the analysis request includes a target analysis item.
  • the detailed risk data obtaining module 40 is configured to obtain detailed risk data based on a target analysis item and display the detailed risk data.
  • the risk data display device further includes a raw data processing module 101, a raw data annotation module 102, and a database establishment module 103.
  • the raw data processing module 101 is configured to obtain raw data, generate a regional identifier based on a regional dimension of the raw data, and generate an institutional identifier based on a data source agency of the raw data.
  • the original data labeling module 102 is configured to label the original data by using a region identifier and an organization identifier to obtain basic data.
  • a database establishing module 103 is configured to associate basic data with a regional section according to a regional identifier and an agency identifier to establish a risk map database.
  • the risk data display device further includes a data level dividing module 201 and a data list forming module 202.
  • the data level dividing module 201 is configured to divide the primary risk data into different data levels according to the corresponding data amount, and indicate the data level of the primary risk data of each area section on the original risk map.
  • the data list forming module 202 is configured to sort the primary risk data of each regional block based on the data level of the primary risk data of each regional block to form a regional risk data list.
  • the secondary risk data acquisition module 20 includes a query geographic information acquisition unit 211, a secondary risk data query unit 212, and a secondary risk data display unit 213.
  • the query geographic information acquisition unit 211 is configured to acquire the geographical location currently selected by the user as the query geographic information based on the user's geographic selection request.
  • the second-level risk data query unit 212 is configured to query a risk map database according to the regional section corresponding to the query geographic information, and obtain the second-level risk data corresponding to the regional section.
  • the secondary risk data display unit 213 is configured to asynchronously update the secondary risk data through an interactive web application technology, and display the updated secondary risk data.
  • the secondary risk data acquisition module 20 further includes a login verification unit 221 and a permission control unit 222.
  • the login verification unit 221 is configured to verify a login ID and a login password. If the verification succeeds, based on the login ID of the user, query the control authority corresponding to the login ID.
  • the authority control unit 222 is configured to obtain secondary risk data matching the authority according to the authority.
  • the detailed risk data acquisition module 40 includes a detailed risk data configuration unit 41, a detailed risk data query unit 42 and a detailed risk data display unit 43.
  • the detailed risk data configuration unit 41 is configured to obtain a target data category selected by the user from the data category options and obtain a target display mode selected by the user from the display mode options.
  • the detailed risk data query unit 42 is configured to query a risk map database based on the target data category to obtain detailed risk data corresponding to the target data category.
  • the detailed risk data display unit 43 is configured to display detailed risk data according to a target display mode.
  • Each module in the above-mentioned risk data display device may be implemented in whole or in part by software, hardware, and a combination thereof.
  • the above-mentioned modules may be embedded in the hardware form or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor calls and performs the operations corresponding to the above modules.
  • a computer device is provided.
  • the computer device may be a server, and its internal structure diagram may be as shown in FIG. 9.
  • the computer device includes a processor, a memory, and a network interface connected through a system bus.
  • the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, computer-readable instructions, and a database.
  • the internal memory provides an environment for operating the operating system and computer-readable instructions in a non-volatile storage medium.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer-readable instructions are executed by a processor to implement a method for displaying risk data.
  • a computer device including a memory, a processor, and computer-readable instructions stored on the memory and executable on the processor.
  • the processor executes the computer-readable instructions, the following steps are implemented:
  • the original risk map includes a regional section and primary risk data corresponding to the regional section;
  • one or more non-volatile readable storage media storing computer readable instructions are provided.
  • the computer readable storage medium stores computer readable instructions, and the computer readable instructions are processed by one or more processors. When executed, cause one or more processors to perform the following steps:
  • the original risk map includes a regional section and primary risk data corresponding to the regional section;
  • Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM) or external cache memory.
  • RAM is available in various forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Synchlink DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDRSDRAM dual data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchronous chain Synchlink DRAM
  • Rambus direct RAM
  • DRAM direct memory bus dynamic RAM
  • RDRAM memory bus dynamic RAM

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

一种风险数据显示方法、装置、计算机设备及存储介质,方法包括:获取查询请求,基于查询请求获取原始风险地图,原始风险地图包括区域版块和与区域版块相对应的初级风险数据(S10);获取用户的查询地理信息,基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,并显示二级风险数据(S20);基于二级风险数据,获取用户的分析请求,分析请求包括目标分析项(S30);基于目标分析项获取详细风险数据,并显示详细风险数据(S40)。上述技术方案采用风险数据显示方法,通过将风险数据与地图结合的方式,达到了提高风险数据查询效率且使得风险数据的展示方式更为直观的效果。

Description

风险数据显示方法、装置、计算机设备及存储介质
本专利申请以2018年7月26日提交的申请号为201810832155.X,名称为“风险数据显示方法、装置、计算机设备及存储介质”的中国发明专利申请为基础,并要求其优先权。
技术领域
本申请涉及计算机软件领域,尤其涉及一种风险数据显示方法、装置、计算机设备及存储介质。
背景技术
风险数据对于加强机构风险管理、提高营业收益、分析业务方向和改善用户满意度有重要的作用,是用于分析机构运营的重要数据。
在保险行业的产险合规平台中,各个地区都有对应的风险数据,风险数据采集后,一般利用数据表格的方式进行统计和展示,但是表格数据呈现方式不够直观,无法从不同的层次上对数据进行分层递进的展示,从而更好的展示数据分析的意义。且针对整体的风险数据难以突出重点,缺少直观的对比展示,其数据查询和更新也比较繁琐,查询的效率低,数据交互占用资源大。
发明内容
基于此,有必要针对上述技术问题,提供一种可以提高风险数据查询效率且展示方式更为直观的风险数据显示方法、装置、计算机设备及存储介质。
一种风险数据显示方法,包括:
获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
一种风险数据显示装置,包括:
查询请求获取模块,用于获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
二级风险数据获取模块,用于获取用户的查询地理信息,基于所述查询地理信息获取 与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
分析请求获取模块,用于基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
详细风险数据获取模块,用于基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
本申请的一个或多个实施例的细节在下面的附图和描述中提出,本申请的其他特征和优点将从说明书、附图以及权利要求变得明显。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一实施例中风险数据显示方法的一应用环境示意图;
图2是本申请一实施例中提供的风险数据显示方法的一实现流程图;
图3是本申请实施例中提供的风险数据显示方法的另一实现流程图;
图4是本申请实施例中提供的风险数据显示方法的又一实现流程图;
图5是图2中步骤S20的一实现流程图;
图6是图2中步骤S20的另一实现流程图;
图7是图2中步骤S40的一实现流程图;
图8是本申请一实施例中风险数据显示装置的一示意图;
图9是本申请一实施例中计算机设备的一示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请提供的风险数据显示方法,可应用在如图1的应用环境中,其中,客户端通过网络与服务端进行通信。服务端基于查询请求获取原始风险数据,客户端显示风险数据。客户端可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备。服务端可以用独立的服务器或者是多个服务器组成的服务器集群来实现。进一步地,本申请提供的风险数据显示方法也可以只应用在客户端中,通过将服务端的数据集成在客户端,由客户端直接存储数据,如此只需要单个客户端即可执行本方案。
图2示出本实施例中风险数据显示方法的流程图。以该风险数据显示方法应用在如图1所示的客户端中为例,客户端通过网络和服务端进行数据的传输,并且通过直观的方式显示风险数据。如图2所示,该风险数据显示方法包括如下步骤:
S10:获取查询请求,基于查询请求获取原始风险地图,原始风险地图包括区域版块和与区域版块相对应的初级风险数据。
其中,查询请求是指用户通过客户端发起的风险数据查询动作而触发的请求。原始风险地图指在背景地图上展示初级风险数据的地图。区域版块是指原始风险地图上划分的各地理区域的版块,原始风险地图上包括至少一个区域版块。其中,原始风险地图上的区域版块可以按照实际需求进行划分。例如,以中国地图为原始风险地图,则可以按照中国各省市的地理位置划分区域版块,也可以根据市场责任地区划分区域版块。初级风险数据是指原始风险地图上每次加载都必须要出现的内容或者基础数据。对初级风险数据进行预加载,可以减少后续显示的加载时间,提高显示效率。例如,初级风险数据可以是各区域版块的总营业额。优选地,初级风险数据可以由用户通过后台自行定义,可以展示用户最想要了解的初级风险数据,以便个性化定制原始风险地图。
具体地,客户端根据用户的查询动作,产生查询请求。例如,可以是打开查询网页的操作请求,也可以是打开风险查询APP的操作请求。客户端获取到用户的查询动作后产生查询请求,并将该查询请求发送至服务端。服务端获取原始风险地图,原始风险地图包括区域版块和与区域版块相对应的初级风险数据。例如,以中国地图为背景的原始风险地图 则为显示中国各个省市对应的初级风险数据的中国地图,其区域版块是以省为单位进行划分的;以亚洲地图为背景的原始风险地图则为显示亚洲各个国家对应的初级风险数据的亚洲地图,其区域版块是以国家为单位进行划分的。其显示的初级风险数据可以根据具体需求进行设置,初级风险数据能够不需进一步检索即可显示在原始风险地图上,便于用户查询。
S20:获取用户的查询地理信息,基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,并显示二级风险数据。
其中,查询地理信息是指用户需要进一步查询二级风险数据的地区的地理信息,查询地理信息位置可以是城市名称、国家名称或者是经纬度坐标等信息。二级风险数据可以是对初级风险数据进行解释的更为详细的数据,例如可以是用于计算总风险得分的违规数据与营业总数据;二级风险数据也可以是初级风险数据之外的其他项目的风险数据,例如处罚金额、追回金额等,可以由用户通过后台进行自定义,以便符合用户的查询需求和查询习惯。
具体地,用户可以通过客户端界面输入相应的城市名称作为查询地理信息,也可以在客户端界面的原始风险地图上选择相应的区域版块作为查询地理信息,每一查询地理信息对应一风险地图上的区域版块,获取与查询地理信息相对应的区域版块的二级风险数据,并将二级风险数据显示在客户端界面。进一步地,二级风险数据可以是在原始风险地图上以弹出悬浮框并指向相应区域版块的形式显示。根据具体选择的查询地理信息,有针对性地获取二级风险数据,使得数据交换更准确,提高查询效率。
S30:基于二级风险数据,获取用户的分析请求,分析请求包括目标分析项。
其中,分析请求是指对二级风险数据进行分析的请求指令,目标分析项是指用户选择的对二级风险数据进行具体分析的数据项目。
具体地,用户在客户端显示界面选择二级风险数据中想要进行分析的目标分析项,二级风险数据包括多个类型的数据项目,根据用户的分析请求,获取用户选定的二级风险数据的数据项目,即为目标分析项目。例如,二级风险数据包括月开票金额、月回款金额、月未结算金额、月罚款金额等数据项目,请求对二级风险数据中的月罚款金额进行分析,那么选定的月罚款金额数据项目则为目标分析项。
S40:基于目标分析项获取详细风险数据,并显示详细风险数据。
其中,详细风险数据是指更为详细具体的风险数据,详细风险数据可以是对二级风险数据进一步扩展的详细数据,可以是计算二级风险数据的相关数据,用于对二级风险数据进行具体分析。
具体地,根据分析请求中配置的目标分析项,获取与目标分析项对应的详细风险数据,并在客户端显示界面显示该详细风险数据。进一步地,可以获取该区域版块下目标分析项的详细风险数据的历史数据,基于历史数据对详细风险数据进行对比和分析。进一步地, 还可以获取该区域版块的其他竞争机构的详细风险数据,以便于进行对比和分析。例如,目标分析项为广东省的月罚款金额的详细风险数据可以是当月各业务单位的罚款金额的详细数据,也可以是每月的历史月罚款金额以及广东省其他保险机构的月罚款金额。
在一实施例中,在原始风险地图上划分区域版块,直接在原始风险地图上相应的区域版块显示出相应的初级风险数据,使得初级风险数据的查询展示更为直观,可以便于直观地了解原始风险地图上所有区域版块的初级风险数据;进一步获取查询地理信息,获取二级风险数据,选择目标分析项,获取详细风险数据,以对二级风险数据进行详细分析,通过分步显示初级风险数据、二级风险数据和详细风险数据,使得数据查询更层次化,既可以从大体上掌控风险数据的全局显示,又可以按照实际需求精准查询二级风险数据和详细风险数据,得到更为深层次的数据,便于突出重点,这种方式也减少数据繁琐交互,减少资源占用,提高查询和展示的效率。
在一实施例中,如图3所示,在步骤S10之前,即在获取查询请求的步骤之前,风险数据显示方法还包括如下步骤:
S101:获取原始数据,基于原始数据的地区维度生成地区标识,基于原始数据的数据来源机构生成机构标识。
其中,原始数据是指市场交易过程中各机构产生的未经处理的数据,原始数据包括用户所在交易机构的数据,也包括其他相关竞争机构的数据。原始数据中包含着原始数据的来源地理信息以及该数据来源机构的代码。地区维度是指以原始数据中的来源地理信息为区分维度。地区标识是标明原始数据的地区维度的属性标识。数据来源机构是指原始数据的产生机构,即原始数据的获取机构。机构标识是标明原始数据的数据来源机构的属性标识。
具体地,可以设置原始数据的自动获取频率,通过网络爬虫技术从各大数据平台定期获取原始数据,然后将原始数据的来源地理信息作为地区维度,根据原始数据的地区维度生成地区标识,地区标识用于识别和区分原始数据的地区维度。将原始数据的获取机构作为数据来源机构,根据原始数据的数据来源机构生成机构标识,机构标识用于识别和区分原始数据的数据来源机构。
S102:采用地区标识和机构标识对原始数据进行标注,得到基础数据。
其中,基础数据是指采用地区标识和机构标识标注过的原始数据。
具体地,采用地区标识对原始数据按照其地区维度进行标注,以原始风险地图上的区域版块为单位,对原始数据进行汇总分类,每一地区维度的原始数据采用与地区维度对应的地区标识进行标注,然后将同一地区维度内不同数据来源机构的原始数据采用与数据来源机构对应的机构标识进行标注,将同一地区维度的相同数据来源机构的原始数据整合在一起,得到同一地区维度的相同数据来源机构的基础数据。可以通过基础数据的地区标识和机构标识识别出基础数据的地区维度和数据来源机构,便于查询和调用。
S103:根据地区标识和机构标识将基础数据与区域版块进行关联,建立风险地图数据库。
其中,风险地图数据库是指将基础数据与区域版块进行关联,形成初级风险数据、二级风险数据和详细风险数据的数据库。
具体地,以原始风险地图上的区域版块为单位,根据地区标识和机构标识对基础数据进行汇总分类,将与区域版块对应的地区标识的基础数据分块存储,然后将同一区域版块内不同机构标识的基础数据进行分区存储,将同一地区维度的相同数据来源机构的基础数据整合在一起,并按照地区标识和机构标识将基础数据与区域版块一一进行关联,建立风险地图数据库。
本实施例中,根据原始数据的地区维度生成地区标识和根据数据来源机构生成机构标识,采用地区标识和机构标识标对原始数据进行标注,得到基础数据,可以非常方便的通过地区标识和机构标识识别出基础数据的地区维度和数据来源机构,便于将基础数据与区域版块进行关联。将基础数据对应原始风险地图的区域版块一一关联以建立风险地图数据库,便于对各区域版块的基础数据进行整理,方便数据的查询和调用。
在一实施例中,如图4所示,在获取查询请求,基于查询请求获取原始风险地图的步骤之后,并且在基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,并显示二级风险数据的步骤之前,该风险数据显示方法还具体包括如下步骤:
S201:将初级风险数据按照相应的数据量划分为不同数据级别,并在原始风险地图上标明各个区域版块的初级风险数据的数据级别。
具体地,初级风险数据可以按照相应的数据量划分为不同的数据级别,并在原始风险地图上对不同数据级别的初级风险数据所在的区域版块进行标注,以区分对应不同数据量的初级风险数据。
进一步地,在原始风险地图上标明各个区域版块的初级风险数据的数据级别,可以通过采用不同颜色渲染原始风险地图不同数据级别的区域版块来标注。例如,对于全国各省市的总运营得分的初级风险数据,可以采用不同的颜色分别表示不同分数段,100-85用红色表示得分很高、84-65用深蓝色表示得分较高、64-45用浅蓝色表示得分一般、44分以下用灰色表示得分低,用不同的颜色标注各个等级的初级风险数据,使得初级风险数据的展示更具有突出性和对比性。优选地,原始风险地图上初级风险数据的数据级别还可以通过采用文字标注的方式直接标注初级风险数据的数据级别,还可以采用立体地图,通过设置区域版块不同的高度来标注等。
S202:基于各个区域版块的初级风险数据的数据级别,对各个区域版块的初级风险数据进行排序,形成地区风险数据列表。
具体地,基于原始风险地图的所有区域版块以及各区域版块对应的初级风险数据的数据级别,形成地区风险数据列表,地区风险数据列表按照初级风险数据的数据级别大小进 行排序,可以更直观地展示各区域版块初级风险数据的数据量,便于进行比较。
在一实施例中,通过在原始风险地图上显示全部的初级风险数据,对不同数据级别的初级风险数据进行标注,以展示出最符合查询要的数据,以突出数据的显示重点,便于直观的区分不同数据级别之间的差别,使得数据查询更有突出性;采用地区风险数据列表的形式,对各区域版块的初级风险数据进行排序,便于进行比较分析,且展示的初级风险数据的数据量相对较小,占用资源少,便于处理。
在一实施例中,如图5所示,步骤S20,即获取用户的查询地理信息,基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,并显示二级风险数据,具体包括如下步骤:
S211:基于用户的地理选择请求,获取用户当前选定的地理位置作为查询地理信息。
其中,地理选择请求是指用户通过客户端输入的选择相应地理位置的请求,地理位置是以原始风险地图上区域版块为基础的。查询地理信息是指用户需要进一步查询二级风险数据的地区的地理信息。
具体地,基于用户的地理选择请求,获取用户当前选定的地理位置作为查询地理信息。优选地,可以是基于用户的登录信息,获取用户当前的登录地作为查询地理信息,通过自动获取用户的登录地作为查询地理信息,减少了选择查询地理信息的操作流程,便于操作。还可以是获取用户通过鼠标和/或键盘输入而选择的地理位置作为查询地理信息,能够精确获取用户选择的查询地理信息,获取用户所需的二级风险数据,使得查询更准确,更符合用户的需求。
进一步地,可以通过选择原始风险地图上对应的区域版块选择查询地理信息,例如查询河南省的二级风险数据,可以获取用户使用鼠标在原始风险地图上选择的河南省区域版块作为查询地理信息,即可查询河南省的二级风险数据,还可以通过获取用户于输入框输入的查询地理信息进行查询,包括输入的国家名称,城市名称,或者经纬度信息等。
S212:根据查询地理信息对应的区域版块,查询风险地图数据库,获取与区域版块相对应的二级风险数据。
具体地,每一查询地理信息都对应至原始风险地图的上区域版块,根据查询地理信息对应的区域版块,查询风险地图数据库,从风险地图数据库中获取相应的二级风险数据。
S213:将二级风险数据通过交互式网页应用技术进行异步更新,并显示更新后的二级风险数据。
其中,交互式网页应用技术是一种交互式异步更新的网页开发技术,例如Ajax技术。Ajax即“Asynchronous Javascript And XML(异步JavaScript和XML)”缩写为Ajax,是交互式网页应用技术的一种,Ajax是用于创建快速动态网页的技术,使用异步方式与服务端通信,不需要打断用户的操作,具有更加迅速的响应能力,可以在无需重新加载整个网页的情况下,能够更新部分网页的技术。通过在后台与服务端进行少量数据交换,可以使网 页实现异步更新。
具体地,二级风险数据通过Ajax与系统前台进行交互,系统前台获取最新的二级风险数据,原始风险地图上其他区域版块显示的初级风险数据并未更新,则系统前台其他区域版块显示的初级风险数据无需重新加载。
进一步地,二级数据的显示方式可以是以悬浮窗的形式显示在原始风险地图上查询地理信息对应的区域版块上。
在一实施例中,通过采用交互式网页应用技术进行数据更新和交互,只对查询地理信息所对应的二级风险数据进行加载更新,无需刷新整个网页,即可加载查询地理位置对应的二级风险数据。交互式网页应用技术不必刷新整个页面,只需对页面的局部进行更新,节省网络带宽,提高了页面的加载速度,从而缩短用户等待时间,提高了查询效率。
在一实施例中,如图6所示,步骤S20,查询地理信息包括登录ID和登录密码;基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,还包括:
S221:验证登录ID和登录密码,若验证通过,则基于用户的登录ID,查询与登录ID相对应的控制权限。
其中,登录ID是用户登录身份的标识信息,用于区分不同的登录者。登录密码是基于对应的登录ID进行登录的密码。查询地理信息包括登录ID和登录密码。
具体地,用户基于登录ID和相应的登录密码进行登录,服务端根据登录密码对用户的登录ID进行验证,若验证通过,则登录密码与登录ID相匹配,用户登录成功,则基于用户的登录ID,查询与登录ID相对应的控制权限,后台通过返回的权限控制字段,分配相应的查询权限。进一步地,控制权限是根据不同机构不同用户在登录时,由客户端将登录ID发送给后台进行过滤验证的。
S222:根据控制权限,获取与控制权限相匹配的二级风险数据。
具体地,基于登录ID对应的控制权限,判断用户的查询地理信息是否超出控制权限的范围,若在控制权限的范围之内,则获取查询地理信息对应的二级风险数据,并进行查询结果展示;若超出控制权限的范围,则禁止显示二级风险数据,并发送提示信息。进一步地,可以根据用户登录ID的地区位置限制用户的控制权限,例如,深圳用户请求查询是深圳地区的二级风险数据,该深圳用户的查询地理信息未超出的该登录ID的控制权限的范围,则正常进行查询,获取深圳地区的二级风险数据并进行显示;若深圳用户的登录ID并未分配查询广州地区的二级风险数据的控制权限,若该登录ID查询广州的二级风险数据时,获取不到广州的二级风险信息,并由提示信息进行提示,权限不足,无法获取广州的二级风险信息,其显示界面仍然显示在其最大控制权限的范围内,例如,继续显示在原始风险地图的初级风险数据界面。
在一具体实施例中,通过验证登录ID和登录密码,以对登录ID对应的控制权限进行验证,以实现二级风险数据查询的控制权限分配。通过登录ID分配控制权限,控制登录 ID的查询范围,以提高二级风险数据查询的保密性,以使得风险数据的显示方法更符合业务需求。
在一实施例中,如图7所示,步骤S40中,目标分析项包括数据类别选项和展示方式选项;基于目标分析项获取详细风险数据,并显示详细风险数据,包括:
S41:从数据类别选项中获取用户选择的目标数据类别,从展示方式选项中获取用户选择的目标展示方式。
其中,数据类别选项是指用于选择详细风险数据的数据类别的选择项,例如,历史月罚款金额选项、监管处罚损失数据选项和其他保险机构月罚款金额选项等,数据类别选项在客户端显示界面以下拉列表的形式展现,用户通过点击勾选相应的数据类别选项,配置需要查询的详细风险数据的数据类别。目标数据类别是指数据类别选项中用户选定的数据类别。
展示方式选项是指用于选择详细风险数据的展示方式的选择项,例如,折线图选项、柱状图选项、条形图选项和饼图选项等。展示方式选项在客户端显示界面以下拉列表的形式展现,用户通过点击勾选相应的展示方式选项,配置详细风险数据在显示页面的展示方式,服务端基于用户选择的展示方式,更改展示方式选项对应的api值,对显示方式进行变更。例如,柱状图更改成折线图,即将相应的展示方式选项的api值由bar更改成line即可。目标展示方式是指展示方式选项中用户选定的展示方式。
具体地,在客户端显示界面的数据类别选项下拉列表中点击勾选需要查询的目标数据类别,在展示方式选项下拉列表中点击勾选目标展示方式,以对目标数据类别的详细风险数据的展示方式进行配置。
S42:基于目标数据类别,查询风险地图数据库,获取与目标数据类别相对应的详细风险数据。
具体地,根据用户选择的目标数据类别,查询风险地图数据库,从风险地图数据库中获取与目标数据类别相对应的详细风险数据。
S43:根据目标展示方式,显示详细风险数据。
具体地,根据用户配置的目标展示方式,显示获取的详细风险数据。进一步地,可以通过展示方式选项实时更改详细风险数据的展示方式,使得详细风险数据的展示能够更具用户需求实时更改,个性化配置,详细风险数据的展示更形象直观。
在一实施例中,通过数据类别选项和展示方式选项提供给用户对查询的数据类别和展示方式的选择,使得对数据类别和展示方式的配置操作更简单;根据用户选择的目标数据类别查询详细风险数据,使得详细风险数据的查询更精确,更符合查询需求;根据用户选择的目标展示方式对详细风险数据进行展示,使得展示方式更个性化,满足了用户的个性化需求。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执 行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
在一实施例中,提供一种风险数据显示装置,该风险数据显示装置与上述实施例中风险数据显示方法一一对应。如图8所示,该风险数据显示装置包括查询请求获取模块10、二级风险数据获取模块20、分析请求获取模块30和详细风险数据获取模块40。其中,查询请求获取模块10、二级风险数据获取模块20、分析请求获取模块30和详细风险数据获取模块40的实现功能与上述实施例中风险数据显示方法对应的步骤一一对应,各功能模块详细说明如下:
查询请求获取模块10,用于获取查询请求,基于查询请求获取原始风险地图,原始风险地图包括区域版块和与区域版块相对应的初级风险数据。
二级风险数据获取模块20,用于获取用户的查询地理信息,基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,并显示二级风险数据。
分析请求获取模块30,用于基于二级风险数据,获取用户的分析请求,分析请求包括目标分析项。
详细风险数据获取模块40,用于基于目标分析项获取详细风险数据,并显示详细风险数据。
优选地,风险数据显示装置还包括:原始数据处理模块101、原始数据标注模块102和数据库建立模块103。
原始数据处理模块101,用于获取原始数据,基于原始数据的地区维度生成地区标识,基于原始数据的数据来源机构生成机构标识。
原始数据标注模块102,用于采用地区标识和机构标识对原始数据进行标注,得到基础数据。
数据库建立模块103,用于根据地区标识和机构标识将基础数据与区域版块进行关联,建立风险地图数据库。
优选地,风险数据显示装置还包括:数据级别划分模块201和数据列表形成模块202。
数据级别划分模块201,用于将初级风险数据按照相应的数据量划分为不同数据级别,并在原始风险地图上标明各个区域版块的初级风险数据的数据级别。
数据列表形成模块202,用于基于各个区域版块的初级风险数据的数据级别,对各个区域版块的初级风险数据进行排序,形成地区风险数据列表。
优选地,二级风险数据获取模块20包括:查询地理信息获取单元211、二级风险数据查询单元212和二级风险数据显示单元213。
查询地理信息获取单元211,用于基于用户的地理选择请求,获取用户当前选定的地理位置作为查询地理信息。
二级风险数据查询单元212,用于根据查询地理信息对应的区域版块,查询风险地图数据库,获取与区域版块相对应的二级风险数据。
二级风险数据显示单元213,用于将二级风险数据通过交互式网页应用技术进行异步更新,并显示更新后的二级风险数据。
优选地,二级风险数据获取模块20还包括:登录验证单元221和权限控制单元222。
登录验证单元221,用于验证登录ID和登录密码,若验证通过,则基于用户的登录ID,查询与登录ID相对应的控制权限。
权限控制单元222,用于根据控制权限,获取与控制权限相匹配的二级风险数据。
优选地,详细风险数据获取模块40包括:详细风险数据配置单元41、详细风险数据查询单元42和详细风险数据显示单元43。
详细风险数据配置单元41,用于从数据类别选项中获取用户选择的目标数据类别,从展示方式选项中获取用户选择的目标展示方式。
详细风险数据查询单元42,用于基于目标数据类别,查询风险地图数据库,获取与目标数据类别相对应的详细风险数据。
详细风险数据显示单元43,用于根据目标展示方式,显示详细风险数据。
关于风险数据显示装置的具体限定可以参见上文中对于风险数据显示方法的限定,在此不再赘述。上述风险数据显示装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图9所示。该计算机设备包括通过系统总线连接的处理器、存储器和网络接口。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种风险数据显示方法。
在一个实施例中,提供了一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机可读指令,处理器执行计算机可读指令时实现以下步骤:
获取查询请求,基于查询请求获取原始风险地图,原始风险地图包括区域版块和与区域版块相对应的初级风险数据;
获取用户的查询地理信息,基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,并显示二级风险数据;
基于二级风险数据,获取用户的分析请求,分析请求包括目标分析项;
基于目标分析项获取详细风险数据,并显示详细风险数据。
在一个实施例中,提供一个或多个存储有计算机可读指令的非易失性可读存储介质, 计算机可读存储介质存储有计算机可读指令,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:
获取查询请求,基于查询请求获取原始风险地图,原始风险地图包括区域版块和与区域版块相对应的初级风险数据;
获取用户的查询地理信息,基于查询地理信息获取与查询地理信息相对应的区域版块的二级风险数据,并显示二级风险数据;
基于二级风险数据,获取用户的分析请求,分析请求包括目标分析项;
基于目标分析项获取详细风险数据,并显示详细风险数据。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种风险数据显示方法,其特征在于,包括:
    获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
    获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
    基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
    基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
  2. 如权利要求1所述的风险数据显示方法,其特征在于,在所述获取查询请求的步骤之前,所述风险数据显示方法还包括:
    获取原始数据,基于所述原始数据的地区维度生成地区标识,基于所述原始数据的数据来源机构生成机构标识;
    采用所述地区标识和所述机构标识对所述原始数据进行标注,得到基础数据;
    根据所述地区标识和所述机构标识将所述基础数据与区域版块进行关联,建立风险地图数据库。
  3. 如权利要求1所述的风险数据显示方法,其特征在于,在所述获取查询请求,基于所述查询请求获取原始风险地图的步骤之后,并且在所述基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据的步骤之前,所述风险数据显示方法还包括:
    将所述初级风险数据按照相应的数据量划分为不同数据级别,并在所述原始风险地图上标明各个区域版块的所述初级风险数据的数据级别;
    基于各个区域版块的所述初级风险数据的所述数据级别,对各个区域版块的所述初级风险数据进行排序,形成地区风险数据列表。
  4. 如权利要求2所述的风险数据显示方法,其特征在于,所述获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据,包括:
    基于用户的地理选择请求,获取用户当前选定的地理位置作为所述查询地理信息;
    根据所述查询地理信息对应的区域版块,查询所述风险地图数据库,获取与所述区域版块相对应的二级风险数据;
    将所述二级风险数据通过交互式网页应用技术进行异步更新,并显示更新后的所述二级风险数据。
  5. 如权利要求1所述的风险数据显示方法,其特征在于,所述查询地理信息包括登录 ID和登录密码;
    所述基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,还包括:
    验证所述登录ID和登录密码,若验证通过,则基于用户的登录ID,查询与所述登录ID相对应的控制权限;
    根据所述控制权限,获取与所述控制权限相匹配的二级风险数据。
  6. 如权利要求1所述的风险数据显示方法,其特征在于,所述目标分析项包括数据类别选项和展示方式选项;
    所述基于所述目标分析项获取详细风险数据,并显示所述详细风险数据,包括:
    从所述数据类别选项中获取用户选择的目标数据类别,从所述展示方式选项中获取用户选择的目标展示方式;
    基于所述目标数据类别,查询风险地图数据库,获取与所述目标数据类别相对应的详细风险数据;
    根据所述目标展示方式,显示所述详细风险数据。
  7. 一种风险数据显示装置,其特征在于,包括:
    查询请求获取模块,用于获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
    二级风险数据获取模块,用于获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
    分析请求获取模块,用于基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
    详细风险数据获取模块,用于基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
  8. 如权利要求7所述的风险数据显示装置,其特征在于,所述风险数据显示装置还包括:
    原始数据处理模块,用于获取原始数据,基于所述原始数据的地区维度生成地区标识,基于所述原始数据的数据来源机构生成机构标识;
    原始数据标注模块,用于采用所述地区标识和所述机构标识对所述原始数据进行标注,得到基础数据;
    数据库建立模块,用于根据所述地区标识和所述机构标识将所述基础数据与区域版块进行关联,建立风险地图数据库。
  9. 如权利要求7所述的风险数据显示装置,其特征在于,所述风险数据显示装置还包括:
    数据级别划分模块,用于将所述初级风险数据按照相应的数据量划分为不同数据级 别,并在所述原始风险地图上标明各个区域版块的所述初级风险数据的数据级别;
    数据列表形成模块,用于基于各个区域版块的所述初级风险数据的所述数据级别,对各个区域版块的所述初级风险数据进行排序,形成地区风险数据列表。
  10. 如权利要求8所述的风险数据显示装置,其特征在于,所述二级风险数据获取模块包括:
    查询地理信息获取单元,用于基于用户的地理选择请求,获取用户当前选定的地理位置作为所述查询地理信息;
    二级风险数据查询单元,用于根据所述查询地理信息对应的区域版块,查询所述风险地图数据库,获取与所述区域版块相对应的二级风险数据;
    二级风险数据显示单元,用于将所述二级风险数据通过交互式网页应用技术进行异步更新,并显示更新后的所述二级风险数据。
  11. 如权利要求7所述的风险数据显示装置,其特征在于,所述二级风险数据获取模块还包括:
    登录验证单元,用于验证所述登录ID和登录密码,若验证通过,则基于用户的登录ID,查询与所述登录ID相对应的控制权限;
    权限控制单元,用于根据所述控制权限,获取与所述控制权限相匹配的二级风险数据。
  12. 如权利要求7所述的风险数据显示装置,其特征在于,所述详细风险数据获取模块包括:
    详细风险数据配置单元,用于从所述数据类别选项中获取用户选择的目标数据类别,从所述展示方式选项中获取用户选择的目标展示方式;
    详细风险数据查询单元,用于基于所述目标数据类别,查询风险地图数据库,获取与所述目标数据类别相对应的详细风险数据;
    详细风险数据显示单元,用于根据所述目标展示方式,显示所述详细风险数据。
  13. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
    获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
    基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
    基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
  14. 如权利要求13所述的计算机设备,其特征在于,在所述获取查询请求的步骤之前,所述处理器执行所述计算机可读指令时还实现如下步骤:
    获取原始数据,基于所述原始数据的地区维度生成地区标识,基于所述原始数据的数据来源机构生成机构标识;
    采用所述地区标识和所述机构标识对所述原始数据进行标注,得到基础数据;
    根据所述地区标识和所述机构标识将所述基础数据与区域版块进行关联,建立风险地图数据库。
  15. 如权利要求13所述的计算机设备,其特征在于,在所述获取查询请求,基于所述查询请求获取原始风险地图的步骤之后,并且在所述基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据的步骤之前,所述处理器执行所述计算机可读指令时还实现如下步骤:
    将所述初级风险数据按照相应的数据量划分为不同数据级别,并在所述原始风险地图上标明各个区域版块的所述初级风险数据的数据级别;
    基于各个区域版块的所述初级风险数据的所述数据级别,对各个区域版块的所述初级风险数据进行排序,形成地区风险数据列表。
  16. 如权利要求14所述的计算机设备,其特征在于,所述获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据,包括:
    基于用户的地理选择请求,获取用户当前选定的地理位置作为所述查询地理信息;
    根据所述查询地理信息对应的区域版块,查询所述风险地图数据库,获取与所述区域版块相对应的二级风险数据;
    将所述二级风险数据通过交互式网页应用技术进行异步更新,并显示更新后的所述二级风险数据。
  17. 一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行执行时如下步骤:
    获取查询请求,基于所述查询请求获取原始风险地图,所述原始风险地图包括区域版块和与所述区域版块相对应的初级风险数据;
    获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据;
    基于所述二级风险数据,获取用户的分析请求,所述分析请求包括目标分析项;
    基于所述目标分析项获取详细风险数据,并显示所述详细风险数据。
  18. 如权利要求17所述的非易失性可读存储介质,其特征在于,在所述获取查询请求的步骤之前,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器还执行如下步骤:
    获取原始数据,基于所述原始数据的地区维度生成地区标识,基于所述原始数据的数 据来源机构生成机构标识;
    采用所述地区标识和所述机构标识对所述原始数据进行标注,得到基础数据;
    根据所述地区标识和所述机构标识将所述基础数据与区域版块进行关联,建立风险地图数据库。
  19. 如权利要求17所述的非易失性可读存储介质,其特征在于,在所述获取查询请求,基于所述查询请求获取原始风险地图的步骤之后,并且在所述基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据的步骤之前,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器还执行如下步骤:
    将所述初级风险数据按照相应的数据量划分为不同数据级别,并在所述原始风险地图上标明各个区域版块的所述初级风险数据的数据级别;
    基于各个区域版块的所述初级风险数据的所述数据级别,对各个区域版块的所述初级风险数据进行排序,形成地区风险数据列表。
  20. 如权利要求18所述的非易失性可读存储介质,其特征在于,所述获取用户的查询地理信息,基于所述查询地理信息获取与所述查询地理信息相对应的区域版块的二级风险数据,并显示所述二级风险数据,包括:
    基于用户的地理选择请求,获取用户当前选定的地理位置作为所述查询地理信息;
    根据所述查询地理信息对应的区域版块,查询所述风险地图数据库,获取与所述区域版块相对应的二级风险数据;
    将所述二级风险数据通过交互式网页应用技术进行异步更新,并显示更新后的所述二级风险数据。
PCT/CN2018/106349 2018-07-26 2018-09-19 风险数据显示方法、装置、计算机设备及存储介质 WO2020019454A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810832155.XA CN109214931A (zh) 2018-07-26 2018-07-26 风险数据显示方法、装置、计算机设备及存储介质
CN201810832155.X 2018-07-26

Publications (1)

Publication Number Publication Date
WO2020019454A1 true WO2020019454A1 (zh) 2020-01-30

Family

ID=64990611

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/106349 WO2020019454A1 (zh) 2018-07-26 2018-09-19 风险数据显示方法、装置、计算机设备及存储介质

Country Status (2)

Country Link
CN (1) CN109214931A (zh)
WO (1) WO2020019454A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919777A (zh) * 2019-03-05 2019-06-21 上海金大师网络科技有限公司 一种数据呈现方法、装置、设备及存储介质
CN111666319B (zh) * 2019-03-07 2023-03-21 腾讯科技(深圳)有限公司 数据显示方法、装置、电子设备及计算机可读存储介质
CN110162565B (zh) * 2019-04-04 2021-12-24 深圳奇迹智慧网络有限公司 预警显示方法、装置及终端设备
CN110990508B (zh) * 2019-11-26 2022-03-25 浙江省环境科技有限公司 基于gis项目信息管理方法、装置、设备以及存储介质
CN111815105A (zh) * 2020-05-18 2020-10-23 深圳市第一反应信息科技有限公司 一种用于提供风险评估地图信息的方法与设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557567A (zh) * 2016-11-21 2017-04-05 中国农业银行股份有限公司 一种数据处理方法及系统
CN106599004A (zh) * 2015-10-20 2017-04-26 北京国双科技有限公司 一种地图数据的显示方法及装置
CN107133314A (zh) * 2017-05-02 2017-09-05 山东浪潮通软信息科技有限公司 一种进行地域相关大数据的分析方法及装置
US20180060970A1 (en) * 2016-09-01 2018-03-01 International Business Machines Corporation System and method for context-based driver monitoring

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599004A (zh) * 2015-10-20 2017-04-26 北京国双科技有限公司 一种地图数据的显示方法及装置
US20180060970A1 (en) * 2016-09-01 2018-03-01 International Business Machines Corporation System and method for context-based driver monitoring
CN106557567A (zh) * 2016-11-21 2017-04-05 中国农业银行股份有限公司 一种数据处理方法及系统
CN107133314A (zh) * 2017-05-02 2017-09-05 山东浪潮通软信息科技有限公司 一种进行地域相关大数据的分析方法及装置

Also Published As

Publication number Publication date
CN109214931A (zh) 2019-01-15

Similar Documents

Publication Publication Date Title
WO2020019454A1 (zh) 风险数据显示方法、装置、计算机设备及存储介质
US10481875B2 (en) Generation of an application from template
CA3038513C (en) Method and system for providing domain-specific incremental search results with a customer self-service system for a financial management system
US20200311342A1 (en) Populating values in a spreadsheet using semantic cues
US10466971B2 (en) Generation of an application from data
US11119982B2 (en) Correlation of performance data and structure data from an information technology environment
US20190384801A1 (en) Application processing method, computer device, and storage medium
WO2017080170A1 (zh) 群体用户画像方法及系统
US11500655B2 (en) Inline and contextual delivery of database content
US8874502B2 (en) Real time datamining
CN108664582B (zh) 企业关系的查询方法、装置、计算机设备及存储介质
CN109614347B (zh) 多级缓存数据的处理方法、装置、存储介质及服务器
US11620444B2 (en) Providing action associated with event detected within communication
CN112019820A (zh) 界面生成方法和装置
CN109522923A (zh) 客户地址聚合方法、装置及计算机可读存储介质
US11531723B2 (en) Dynamic contextual library
CN113076731A (zh) 报告文件生成方法、装置、计算机设备和存储介质
US11347821B2 (en) Real-time generation of an improved graphical user interface for overlapping electronic content
CN113129155A (zh) 多类型人员信息处理方法、设备及存储介质
US9613105B1 (en) Streamlined data entry based on data relationships
JP2019121247A (ja) 情報処理装置、情報処理方法、及びプログラム
AU2018202359A1 (en) Systems. methods and machine readable programs for value chain analytics
CN114416235B (zh) 单据展示方法、装置、计算机设备和存储介质
CN117216425A (zh) 金融业务页面展示方法、装置、计算机设备和存储介质
CN115878746A (zh) 政策文本确定方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18927249

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 23.03.2021.)

122 Ep: pct application non-entry in european phase

Ref document number: 18927249

Country of ref document: EP

Kind code of ref document: A1