Query method, data processing method, server and client

文档序号:9059 发布日期:2021-09-17 浏览:33次 中文

1. A method for querying, the method comprising:

acquiring a query trigger request for a target object;

responding to the query trigger request, and matching to obtain the checking information of the target object;

returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

2. The method of claim 1, wherein the query trigger request comprises at least one of: the query request is triggered based on text input, the query request is triggered based on picture identification, the query request is triggered based on clicking behavior, and the query request is triggered based on browsing behavior.

3. The method of claim 1, wherein the ping information of the target object comprises at least one of: traceability information, authenticity information and security information.

4. The method of claim 3, wherein the ping information of the target object comprises at least one of: the total evaluation information of manufacturers to which the target object belongs, the total evaluation information of sellers to which the target object belongs, and the total evaluation information of logistics merchants to which the target object belongs.

5. The method of claim 1, wherein matching the ping information of the target object in response to the query trigger request comprises:

extracting identification information of a target object from the query trigger request;

matching the identification information serving as an index from a database of an inquiry platform to obtain code scanning information of a plurality of articles belonging to the same category as the target object;

and using the code scanning information of the plurality of articles belonging to the same category as the target object as the checking information.

6. The method of claim 1, wherein matching the ping information of the target object in response to the query trigger request comprises:

extracting identification information of a target object from the query trigger request;

matching the identification information serving as an index from a database of an inquiry platform to obtain code scanning information of a plurality of articles belonging to the same category as the target object;

collecting the code scanning information of the plurality of articles belonging to the same category as the target object;

and using the summary processing result as the inspection information.

7. The method of any one of claims 1 to 6, wherein the code scanning query for the scanned code comprises at least one of: tracing code and cipher.

8. A method of data processing, the method comprising:

acquiring a code scanning behavior of a target object;

obtaining a query result in response to the code scanning behavior, wherein the query result is inherent information of the target object;

the code scanning behavior and the query result of the target object are used as records to be stored in association with the class identification of the class to which the target object belongs;

and the code scanning behavior and the query result which are stored in an associated mode are used for matching and returning when receiving a query request of the item belonging to the item identification.

9. The method of claim 8, wherein the intrinsic information comprises at least one of: traceability information, authenticity information and security information.

10. The method of claim 8, wherein obtaining query results in response to the code scanning behavior comprises:

extracting an identification code from the code scanning behavior;

associating the identification code with the query address of the target object;

acquiring inherent information of the target object from the query address;

and taking the inherent information as the query result.

11. The method of claim 8, further comprising, after storing the code scanning behavior and the query result of the target object as a record in association with a class identifier of a class to which the target object belongs:

and aggregating the records with a plurality of records of class identifications of the class to which the target object belongs in the memory to obtain an aggregation result with the target main body as an index.

12. The method of claim 8, wherein the target subject comprises at least one of: production main part, supply of goods main part, transportation main part, sell the main part.

13. A method for querying, the method comprising:

acquiring a vaccine query request of a user based on a non-code scanning behavior;

responding to the vaccine query request, and matching and obtaining checking information of the queried vaccine from a query platform;

returning the ping information to the user;

the checking information is obtained by aggregating query results obtained by scanning and querying vaccines belonging to the same category with the vaccine by a target group.

14. The method of claim 13, wherein the vaccine query request comprises at least one of: vaccine lot number, vaccine name, vaccination site.

15. The method of claim 13, wherein the ping information comprises at least one of: abnormal proportion, recall information, cold chain information, failure information of the vaccination site, number of times the vaccine was code scanned.

16. A method for querying, the method comprising:

acquiring a query request carrying an inspection object;

matching and obtaining the checking information of the checking object from a checking platform in response to the query request;

returning the checking information of the checking object;

the checking information in the checking platform is obtained by aggregating the query results obtained by scanning and querying the articles belonging to the same category as the checking object according to the target group.

17. The method of claim 16 wherein the query request is a scan of the plain code of the subject and wherein scanning the item of the same class as the subject scans for the scanned plain code.

18. The method according to claim 16, wherein the query request is to input a picture of the verification object or to input a name of a store where the verification object is located.

19. The method of claim 16, wherein the query request is a user browsing a shopping interface of the ping object.

20. A method for querying, the method comprising:

receiving a query request for a target object;

displaying detail information of the target object in response to the query request;

and simultaneously displaying the checking information of the target object on a display interface, wherein the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

21. A server, comprising:

the communication module is used for establishing communication connection and transmitting data;

the processor is used for acquiring a query trigger request for a target object; responding to the query trigger request, and matching to obtain the checking information of the target object; returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

22. A client, comprising:

the input device is used for receiving a query trigger request for a target object;

the communication module is used for establishing communication connection, sending query information to a query platform and receiving inspection information of the target object returned by the query platform;

a display for displaying the ping information.

23. A server comprising a processor and a memory for storing processor-executable instructions which, when executed by the processor, implement the steps of the method of any one of claims 1 to 7.

24. A server comprising a processor and a memory for storing processor-executable instructions which, when executed by the processor, implement the steps of the method of any one of claims 8 to 12.

25. A computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the method of any one of claims 1 to 7.

26. A computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the method of any one of claims 8 to 12.

Background

At present, a user can scan a tracing code or a secret code on a packing box of the commodity to inquire some basic information of the commodity only after contacting the commodity or having ownership of the commodity, for example: traceability information, security information, authenticity information, and the like.

Generally, the ping action and the code scanning action are integrated, however, in many cases, the user cannot complete the ping through the code scanning action because of inconvenience or inadmissibility, for example: the object cannot be contacted, or the object is inconvenient to contact, or the code cannot be scanned due to limitations such as a password, so that the inspection cannot be performed, and further, the information of the target commodity cannot be determined.

In view of the above problems, no effective solution has been proposed.

Disclosure of Invention

The application aims to provide a query method, a data processing method, a server and a client, which can acquire code scanning information under the condition of non-code scanning.

The application provides a query method, a data processing method, a server and a client, which are realized as follows:

a method of querying, the method comprising:

acquiring a query trigger request for a target object;

responding to the query trigger request, and matching to obtain the checking information of the target object;

returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

A method of data processing, the method comprising:

acquiring a code scanning behavior of a target object;

obtaining a query result in response to the code scanning behavior, wherein the query result is inherent information of the target object;

the code scanning behavior and the query result of the target object are used as records to be stored in association with the class identification of the class to which the target object belongs;

and the code scanning behavior and the query result which are stored in an associated mode are used for matching and returning when receiving a query request of the item belonging to the item identification.

A method of querying, the method comprising:

acquiring a vaccine query request of a user based on a non-code scanning behavior;

responding to the vaccine query request, and matching and obtaining checking information of the queried vaccine from a query platform;

returning the ping information to the user;

the checking information is obtained by aggregating query results obtained by scanning and querying vaccines belonging to the same category with the vaccine by a target group.

A method of querying, the method comprising:

acquiring a query request carrying an inspection object;

matching and obtaining the checking information of the checking object from a checking platform in response to the query request;

returning the checking information of the checking object;

the checking information in the checking platform is obtained by aggregating the query results obtained by scanning and querying the articles belonging to the same category as the checking object according to the target group.

A method of querying, the method comprising:

receiving a query request for a target object;

displaying detail information of the target object in response to the query request;

and simultaneously displaying the checking information of the target object on a display interface, wherein the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

A server, comprising:

the communication module is used for establishing communication connection and transmitting data;

the processor is used for acquiring a query trigger request for a target object; responding to the query trigger request, and matching to obtain the checking information of the target object; returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

A client, comprising:

the input device is used for receiving a query trigger request for a target object;

the communication module is used for establishing communication connection, sending query information to a query platform and receiving inspection information of the target object returned by the query platform;

a display for displaying the ping information.

A server comprising a processor and a memory for storing processor-executable instructions, the instructions when executed by the processor implementing the steps of the method of:

acquiring a query trigger request for a target object;

responding to the query trigger request, and matching to obtain the checking information of the target object;

returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

A server comprising a processor and a memory for storing processor-executable instructions, the instructions when executed by the processor implementing the steps of the method of:

acquiring a code scanning behavior of a target object;

obtaining a query result in response to the code scanning behavior, wherein the query result is inherent information of the target object;

the code scanning behavior and the query result of the target object are used as records to be stored in association with the class identification of the class to which the target object belongs;

and the code scanning behavior and the query result which are stored in an associated mode are used for matching and returning when receiving a query request of the item belonging to the item identification.

A computer readable storage medium having stored thereon computer instructions which, when executed, implement steps implementing a method of:

acquiring a query trigger request for a target object;

responding to the query trigger request, and matching to obtain the checking information of the target object;

returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

A computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of a method comprising:

acquiring a code scanning behavior of a target object;

obtaining a query result in response to the code scanning behavior, wherein the query result is inherent information of the target object;

the code scanning behavior and the query result of the target object are used as records to be stored in association with the class identification of the class to which the target object belongs;

and the code scanning behavior and the query result which are stored in an associated mode are used for matching and returning when receiving a query request of the item belonging to the item identification.

According to the query method and the data processing method, code scanning data acquired by code scanning behaviors of users who purchase or use products belonging to the same category before aggregation are used as a query basis, and approximate information of the products after code scanning can be queried under the condition that other users cannot scan the codes, so that the general information is used as reference information to guide whether the users select the products or not, or whether the products used by the users are safe and reliable or not is determined. By means of the method, the technical problem that information is not equal due to the fact that the existing code scanning behavior and the existing query behavior are integrated and cannot be scanned under the condition that no code exists is solved, and the technical effects of effectively improving the information utilization rate and improving the user experience are achieved.

Drawings

In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.

FIG. 1 is a schematic diagram of an architecture of a query system provided herein;

FIG. 2 is a schematic view of a vaccine scenario in which the query method provided herein is applied;

FIG. 3 is a schematic view of an application of the query method provided by the present application in an e-commerce shopping scenario;

FIG. 4 is a schematic view of a shopping scenario of a brick-and-mortar store in which the query method provided by the present application is applied;

FIG. 5 is a schematic diagram of the architecture of a server provided herein;

FIG. 6 is a block diagram of the query device provided in the present application;

fig. 7 is a block diagram of a data processing apparatus according to the present application.

Detailed Description

In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

In order to solve the technical problem that the existing ping and code scanning behaviors of the user are integrated and cannot be separated, in this example, an inquiry system is provided, as shown in fig. 1, which may include: server 101, first client 102, second client 103.

The server 101 may be a cloud, a server cluster, or a processing platform, and any device capable of displaying data processing and/or storage functions may be used as the server 101.

The client may be a terminal device or software used by a client. Specifically, the client may be a terminal device such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart watch, or other wearable devices. Of course, the client may also be software that can run in the terminal device. For example: browser, query platform, etc.

Through the inquiry system, the checking and code scanning behaviors can be separated, after a user scans and inquires a product through the first client 102, inquiry operation information and the inquired information are transmitted to the server, the server integrates a plurality of code scanning operations to obtain statistical data of the product belonging to the same category as the product, and then responds to inquiry requests of other users for the product without the code scanning operations and returns the statistical data, so that other users can obtain information which can be obtained only by some code scanning operations even without the inquiry codes, and shopping reference is carried out, whether the used articles are safe and reliable or not is determined, or the rate of counterfeit goods of the purchased merchants is determined.

In one embodiment, the server may obtain a code scanning query operation of the user a on the target object through the first client, link to a corresponding query information website after obtaining the code scanning query operation, match and return a query result in the website, and after obtaining the query result returned to the user a, the server may associate and store the query result and the code scanning behavior with the category to which the target object belongs. The user a may have a plurality of products, that is, a lot or a class of products is provided, different users a all buy the product of the category or buy the product belonging to the same sku, and perform a code scanning operation, the code scanning operation is captured, and after the code scanning operation is captured, the code scanning operation and the query result can be stored in association, because all the users are products of the same category, and then the code scanning operation and the query result are all associated with the category, so that if a subsequent person initiates a non-code scanning query request through the second client 103, for example, inputs the product name of the category or inputs a picture of the category, the query result and the code scanning operation associated with the category can be returned as query results, or statistical results of the query result and the code scanning operation can be returned as query results.

The query result may be inherent information of the target object, and may include, but is not limited to, at least one of the following: traceability information, authenticity information and security information. That is, the query result is not subjective information, which is different from the content on the product evaluation website, and is subjective evaluation performed after people buy the product, but the query result in the present application is objective intrinsic information, for example, the traceability information of the product and the like are determined information that is not transferred by personal will, and the information can be obtained based on the code scanning operation.

That is to say, the query results obtained by the code scanning behavior of the previous user are multiplexed, so that the query results are used as information that other users can obtain the code scanned information under the condition that the code scanning is inconvenient or no code can be scanned, and the utilization rate of the information is improved.

By separating the user checking behavior from the code scanning behavior, namely, the user can check without a commodity tracing code (or a password and the like) in the hand, so that the checking behavior is not limited by time and place any more, and the checking can provide value for the user to make a decision in early purchase or release the consideration for the user who has been inoculated. Through sharing data, one code scanning result is only valuable to the current user, but the value is generated again through the collection of the results, and through statistics of the code scanning results, the overall judgment of merchants and commodities is formed, which is equivalent to enriching the evaluation system of the merchants and the commodities.

For the server, when the query result of the code scanning query behavior is obtained, when the code scanning behavior is captured, the identification code can be extracted from the code scanning query behavior, and then the identification code is associated with the query address of the target object; and then acquiring the inherent information of the target object from the query address, and taking the inherent information as the query result. That is, for the code scanning request, the code scanning request is processed according to a conventional code scanning request mode, and the server captures the code scanning operation in the process and acquires code scanning result data.

Further, in order to effectively improve the security of data and avoid the fear that the user is snooped on privacy, the user may be given a selection mechanism, that is, after the intrinsic information of the target object is acquired from the inquiry address, a confirmation request may be sent to the user to confirm whether the user allows the code scanning operation of the user as a piece of statistical data, if the user agrees, the code scanning operation and the acquired code scanning information are stored as a piece of data, and if the user disagrees, the code scanning operation and the acquired code scanning information may not be stored as the data.

The code scanning behaviors and the code scanning results of every time can be stored as a record, and the method belongs to the correlated storage for aggregating the code scanning behaviors and the code scanning results of the same category of articles. Because there will be multiple records, these code scanning behaviors and code scanning results can be counted to form an overall judgment of the merchant and the goods. For example, a true rate of items sold in a certain store, a failure rate of a certain batch of items, or the like may be generated, or the number of times a certain item is scanned may be counted, and the like may be returned as a statistical result. Or aggregating a plurality of records to obtain a statistical result indexed by different subjects, where the subjects may include but are not limited to at least one of the following: production main part, supply of goods main part, transportation main part, sell the main part.

The user can inquire the information through the second client, and for the server, the user can acquire an inquiry triggering request for the target object; responding to the query trigger request, and matching to obtain the checking information of the target object; returning the checking information; the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

The query trigger request may include, but is not limited to, at least one of: the query request is triggered based on text input, the query request is triggered based on picture identification, the query request is triggered based on clicking behavior, and the query request is triggered based on browsing behavior. For example, a user may directly input a product name for query, may input a product picture for query, may input a product number for query, or the like, or after the user searches for a certain product, the user directly displays the inspection information on the detail interface, and does not need to actively trigger by the user himself or herself, and actively triggers based on the browsing behavior, and the specific triggering mode may be selected according to actual needs, which is not limited in the present application. Wherein, the ping information of the target object may include, but is not limited to, at least one of the following: traceability information, authenticity information and security information.

The inspection information may be not only intrinsic information of the product itself, but also statistical information including, but not limited to, at least one of the following: the total evaluation information of the manufacturer to which the inspection object belongs, the total evaluation information of the vendor to which the inspection object belongs, and the total evaluation information of the logistics provider to which the inspection object belongs.

For the server, the query information of the query object obtained from the query platform in response to the query request may be identification information of the query object extracted from the query request; matching the identification information serving as an index from a database of the query platform to obtain a plurality of pieces of code scanning information associated with the identification information; and using the plurality of pieces of code scanning information associated with the identification information as the inspection information of the inspection object. Or extracting the identification information of the class to which the inspection object belongs from the query request; matching the identification information serving as an index from a database of the query platform to obtain a plurality of pieces of code scanning information associated with the identification information; aggregating the plurality of pieces of code scanning information associated with the identification information; the aggregation processing result is used as the inspection information of the inspection object.

In one embodiment, the code scanned by the code scanning behavior may include, but is not limited to, at least one of the following: tracing code and cipher.

In the implementation process, a query platform may be provided, and code scanning information of various products is aggregated in the query platform, for example, query of vaccines may be supported simultaneously, and query of goods to be purchased may also be supported. Alternatively, each platform provides its own database or query mechanism, for example, to buy something on a certain shopping platform, the platform can divide a part of resources by itself for acquiring code scanning behaviors of shopping on the platform, and use these behavior data as query or viewing resources of other non-code scanning users. For example, if the user purchases a product a, the code scanning result or the statistical result of the code scanning result of other users for the product belonging to the same category as the product may be directly displayed on the purchase page of the product. The specific implementation manner can be selected according to actual needs, and the application does not limit the implementation manner.

The above method is described below with reference to several specific scenarios, however, it should be noted that these several specific scenarios are only used to better illustrate the present application and should not be construed as limiting the present application.

Scenario example 1:

the user has been vaccinated, but the bacterin has the particularity, and the bacterin packing has the particularity on the one hand, and the bacterin exists many people and splits the condition of vaccinating a packing unit, leads to some users to can not take the extranal packing, and on the other hand the inoculation action has the specificity, and the bacterin packing is generally that the user can not be taken during the inoculation, and child cries and scries when vaccinating, does not have the time to ask for the packing to scan the sign indicating number and examine. Because these particularities result in the inability of the user to perform a code-scanning verification at the time of vaccination, there is no package and no way to verify the vaccinated vaccine after leaving the vaccination unit.

Alternatively, the user may wish to verify the authenticity of the institution and vaccine in advance before proceeding to vaccinate the vaccine, but at this time the user does not have the identification code on the pack and cannot verify it.

In order to solve these problems in this scenario, the above-described inspection method of the present application is possible to solve. Specifically, as shown in fig. 2, the data of the code scanning verification of the user at the user end is counted, and then the statistical result is shared with the user who does not scan the code, so that the code scanning behavior is separated from the checking behavior, and the statistical result of the vaccination organization and the vaccine is used as the queriable content that can be queried in a non-code scanning manner.

For example, the user X is a user who cannot perform code scanning operation in the scene, or a user who intends to view a user of an inoculated organization to vaccinate, and then the user X can query details of the inoculated organization through the query platform, and can view information such as the total number of code scanning times, abnormal proportion, normal proportion, abnormal vaccine ranking and the like of the vaccine of the inoculated organization in different time ranges according to statistical data. The information can be obtained by counting data from other users who inject and scan a code to check in the mechanism.

Further, the user X may also inquire about a certain vaccine that the user or family member has (or will) vaccinated in the vaccination structure, and may inquire about the certain vaccine by inputting the name or lot number of the vaccine. When vaccine details are inquired, statistics, abnormal proportion and the like of code scanning of other users of the vaccine in different time periods can be checked, and abnormal items can be highlighted, so that the users can know risks and problems.

The user X may also query code scanning results of other users within a certain time range (for example, a time period in which the user or the family has been vaccinated) as required, where the code scanning results may be a record of one code, and when a specific code scanning result record is clicked and viewed, specific information in the code scanning result may be seen, for example: cold chain information, recalls, number of code scans, etc.

Through the setting of the checking mode, the user can complete code scanning under the condition that no vaccine external package exists, so that the user can know the conditions of the vaccine and the vaccination mechanism, the effectiveness of the vaccinated vaccine can be confirmed, and then remedial measures such as consultation, observation, reseeding and the like can be taken. For the uninoculated users, after the examination is completed, the worry can be relieved, so that the inoculation can be completed as soon as possible, and other inoculation routes or vaccine varieties can be selected.

Scenario example 2:

when a user purchases a commodity on line, the user does not know which piece of the received commodity before the commodity is not received, and if the commodity has a tracing code, the user cannot acquire the tracing code of the commodity to be received when the commodity is not acquired, so that the user cannot check the commodity to be purchased, and the user cannot make a decision.

In contrast, as shown in fig. 3, data generated by code scanning behaviors of a plurality of purchased users may be accumulated in a database, and then the data is counted, and a shopping interface or a query interface is powered on line to be displayed to the browsing user, so as to provide a purchase decision for subsequent shopping, thereby promoting the user to place an order or supervising the merchant to perform security quality control.

Specifically, when a user purchases and browses a certain commodity on an e-commerce platform, when the user sees the commodity, the code scanning information of the user who belongs to the same category as the commodity and purchases the commodity from the platform or a shop can be displayed in an aggregated manner, so that the user can see the related information of the commodity when purchasing the commodity.

Further, as shown in fig. 3, if the user clicks the statistical result, the user may view specific details, and in the detail page, code scanning results, abnormal proportions, and the like of the linked product purchased by other users in different time periods may be displayed. The details of each code scanning result can be further checked.

Scenario example 3:

the tracing codes of a plurality of commodities are plain codes and secret codes, basic information of the commodities can be obtained by scanning the plain codes, and the authenticity of the commodities can be inquired by scanning the secret codes. However, in general, the password is inside the coating layer, and the password can be seen only by scraping the coating layer, and the scraping of the coating layer is a destructive operation, which cannot be performed by the user before purchasing the product, and therefore, the authenticity of the product cannot be checked. This is mainly because the code scraping and ping actions are integrated, thus making early ping impossible.

The tracing code is one-to-one corresponding to the minimum selling unit of the commodity, the medicine, the vaccine and the like, is pasted on the outer package, and can be used for checking information such as tracing, authenticity, safety and the like through mobile phone code scanning. The presentation mode can be two-dimensional codes, bar codes and the like, or other codes, and only the information of the box of commodities can be inquired through one code.

The plain code refers to a code displayed on a commodity without blocking, for example, a commodity on a shelf overtime, and a user can scan the plain code at will to view basic information of the commodity; the secret code refers to a code which can be viewed by a user after the user buys a commodity by scraping the coating, and the secret code can be input into the code scanning result of the plain code to check the authenticity, or the authenticity can be directly checked through the secret code.

In order to solve the problem, the user verification data of the coating verification can be scraped by sharing other commodities which belong to the same category as the commodity and are purchased from the platform or the store, so that the unpurchased user can verify the overall situation of the commodity in the store, and decision basis is provided for the purchase of the commodity.

As shown in fig. 4, after a user selects a certain commodity on the shelf of a brick-and-mortar store, the user can scan the plain code on the package of the commodity through a mobile phone, so as to obtain a statistical result, for example, a statistical result of other results that the commodity is purchased at the store and the coating is scraped off for checking is displayed on the top of the page.

The user can click on the statistical result viewing details to show the result items of the code-scraping examination of the linked commodity purchased by other users and detailed lists of abnormal proportions and the like in different time periods, and can further specifically see the details of each code-scanning result. Further, as shown in fig. 4, when viewing the scratch code record, the scratch code query record in a certain time period may be selected, for example: seven days, thirty days, etc., the time range may also be customized.

In the above example, the inspection behavior is separated from the code scanning behavior, so that the inspection is never limited by time and place, and the article can be inspected even if the user has no identification code in his hand. For the user side, the inspection result generated by one code scanning operation of the user side is no longer valuable to the user side, and the inspection data generated by the users who have scanned the codes are shared, so that each inspection result can generate value again, and other users do not provide auxiliary information. By counting and summarizing a large number of code scanning behaviors of users, overall evaluation of a certain merchant, a certain period and a certain product can be formed.

The method embodiments provided in the above embodiments of the present application may be executed in a server, a cloud, or a similar computing device. Taking the example of running on the server side, fig. 5 is a hardware structure block diagram of a server of an inquiry method according to an embodiment of the present invention. As shown in fig. 5, the server 10 may include one or more (only one shown) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission module 106 for communication functions. It will be understood by those skilled in the art that the structure shown in fig. 5 is only an illustration and is not intended to limit the structure of the electronic device. For example, the server 10 may also include more or fewer components than shown in FIG. 5, or have a different configuration than shown in FIG. 5.

The memory 104 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the query method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by executing the software programs and modules stored in the memory 104, that is, implementing the query method of the application program. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.

The transmission module 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission module 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission module 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.

On the software level, the above apparatus may be as shown in fig. 6, and includes:

an obtaining module 601, configured to obtain a query trigger request for a target object;

the matching module 602 is configured to obtain, in response to the query trigger request, the inspection information of the target object through matching;

a returning module 603, configured to return the inspection information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

In one embodiment, the query trigger request may include, but is not limited to, at least one of: the query request is triggered based on text input, the query request is triggered based on picture identification, the query request is triggered based on clicking behavior, and the query request is triggered based on browsing behavior.

In one embodiment, the ping information of the target object may include, but is not limited to, at least one of the following: traceability information, authenticity information and security information.

In one embodiment, the ping information of the target object may include, but is not limited to, at least one of: the total evaluation information of manufacturers to which the target object belongs, the total evaluation information of sellers to which the target object belongs, and the total evaluation information of logistics merchants to which the target object belongs.

In an embodiment, the matching module 602 may specifically extract identification information of a target object from the query trigger request; matching the identification information serving as an index from a database of an inquiry platform to obtain code scanning information of a plurality of articles belonging to the same category as the target object; and using the code scanning information of the plurality of articles belonging to the same category as the target object as the checking information.

In an embodiment, the matching module 602 may specifically extract identification information of a target object from the query trigger request; matching the identification information serving as an index from a database of an inquiry platform to obtain code scanning information of a plurality of articles belonging to the same category as the target object; collecting the code scanning information of the plurality of articles belonging to the same category as the target object; and using the summary processing result as the inspection information.

In one embodiment, the code scanned by the code scanning query may include, but is not limited to, at least one of the following: tracing code and cipher.

At a software level, there is also provided a data processing apparatus, as shown in fig. 7, which may include:

a first obtaining module 701, configured to obtain a code scanning behavior of a target object;

a second obtaining module 702, configured to obtain a query result in response to the code scanning behavior, where the query result is inherent information of the target object;

the storage module 703 is configured to perform associated storage on the code scanning behavior and the query result of the target object as records and the class identifier of the class to which the target object belongs;

and the code scanning behavior and the query result which are stored in an associated mode are used for matching and returning when receiving a query request of the item belonging to the item identification.

In one embodiment, the intrinsic information may include, but is not limited to, at least one of: traceability information, authenticity information and security information.

In an embodiment, the second obtaining module 702 may specifically extract an identification code from the code scanning behavior; associating the identification code with the query address of the target object; acquiring inherent information of the target object from the query address; and taking the inherent information as the query result.

In one embodiment, the data processing apparatus may further perform, after storing the code scanning behavior and the query result of the target object as a record in association with a class identifier of a class to which the target object belongs, an aggregation process on the record and a plurality of records in a memory, which are associated with the class identifier of the class to which the target object belongs.

In one embodiment, the body may include, but is not limited to, at least one of: production main part, supply of goods main part, transportation main part, sell the main part.

The method is applied in different scenes, and can be appropriately adjusted according to the used scenes, for example, if in a vaccine query scene, the query method can include:

s1: acquiring a vaccine query request of a user based on a non-code scanning behavior;

s2: responding to the vaccine query request, and matching and obtaining checking information of the queried vaccine from a query platform;

s3: returning the ping information to the user;

wherein, the checking information is statistical information of the query result obtained by the target group scanning the vaccine.

Accordingly, the vaccine query request may include, but is not limited to, at least one of: vaccine lot number, vaccine name, vaccination site. The ping information may include, but is not limited to, at least one of: abnormal proportion, recall information, cold chain information, failure information of the vaccination site, number of times the vaccine was code scanned.

The method is used in a commodity shopping scene, and the query method can comprise the following steps:

s1: acquiring a query request carrying an inspection object;

s2: matching and obtaining the checking information of the checking object from a checking platform in response to the query request;

s3: returning the checking information of the checking object;

the checking information in the checking platform is obtained by aggregating the query results obtained by scanning and querying the articles belonging to the same category as the checking object according to the target group.

Accordingly, the query request may be a clear code for scanning the ping object, and then a scan query operation on the ping object scans the secret code of the ping object.

Or, the query request is to input a picture of the inspection object or to input a name of a shop where the inspection object is located.

The query method is used in an e-commerce platform, and may include:

s1: receiving a query request for a target object;

s2: displaying detail information of the target object in response to the query request;

s3: and simultaneously displaying the checking information of the target object on a display interface, wherein the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

An embodiment of the present application further provides a specific implementation manner of an electronic device, which is capable of implementing all steps in the query method in the foregoing embodiment, where the electronic device specifically includes the following contents: a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the processor is configured to call a computer program in the memory, and when executing the computer program, the processor implements all the steps in the query method in the above embodiments, for example, when executing the computer program, the processor implements the following steps:

step 1: acquiring a query trigger request for a target object;

step 2: responding to the query trigger request, and matching to obtain the checking information of the target object;

and step 3: returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

As can be seen from the above description, in the embodiment of the present application, by aggregating code scanning data obtained by code scanning behaviors of users who purchase or use products belonging to the same category before the product is used as a query basis, in a case that other users cannot scan codes, approximate information after code scanning of the product can be queried, and the information is used as reference information to guide whether the product is selected or not, or to determine whether the product used by the user is safe and reliable. By means of the method, the technical problem that information is not equal due to the fact that the existing code scanning behavior and the existing query behavior are integrated and cannot be scanned under the condition that no code exists is solved, and the technical effects of effectively improving the information utilization rate and improving the user experience are achieved.

Embodiments of the present application further provide a computer-readable storage medium capable of implementing all steps in the query method in the above embodiments, where the computer-readable storage medium stores thereon a computer program, and when the computer program is executed by a processor, the computer program implements all steps of the query method in the above embodiments, for example, when the processor executes the computer program, the processor implements the following steps:

step 1: acquiring a query trigger request for a target object;

step 2: responding to the query trigger request, and matching to obtain the checking information of the target object;

and step 3: returning the checking information;

the checking information is obtained by aggregating code scanning behaviors and/or query results of code scanning query on the articles belonging to the same category as the target object.

As can be seen from the above description, in the embodiment of the present application, by aggregating code scanning data obtained by code scanning behaviors of users who purchase or use products belonging to the same category before the product is used as a query basis, in a case that other users cannot scan codes, approximate information after code scanning of the product can be queried, and the information is used as reference information to guide whether the product is selected or not, or to determine whether the product used by the user is safe and reliable. By means of the method, the technical problem that information is not equal due to the fact that the existing code scanning behavior and the existing query behavior are integrated and cannot be scanned under the condition that no code exists is solved, and the technical effects of effectively improving the information utilization rate and improving the user experience are achieved.

The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.

The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.

Although the present application provides method steps as described in an embodiment or flowchart, additional or fewer steps may be included based on conventional or non-inventive efforts. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or client product executes, it may execute sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the figures.

The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a vehicle-mounted human-computer interaction device, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.

Although embodiments of the present description provide method steps as described in embodiments or flowcharts, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or end product executes, it may execute sequentially or in parallel (e.g., parallel processors or multi-threaded environments, or even distributed data processing environments) according to the method shown in the embodiment or the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded.

For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the embodiments of the present description, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of multiple sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.

Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.

The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.

The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.

Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.

As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.

The embodiments of this specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The described embodiments may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.

The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of an embodiment of the specification. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.

The above description is only an example of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure. Various modifications and variations to the embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included in the scope of the claims of the embodiments of the present specification.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:多终端查询系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!