Anti-scalping method and device for preventing scalping, storage medium and server

A technology of anti-swiping and order-swiping, applied in marketing and other directions, can solve problems such as wasting manpower and affecting user experience, and achieve the effects of reducing labor costs, excellent user experience, and avoiding missed judgments

Pending Publication Date: 2022-04-12
江苏银承网络科技股份有限公司
0 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a method, device, storage medium, and server for preventing fraudulent billing, so as to solve the problem of manually judging whether...
View more

Abstract

The invention discloses an anti-scalping method and device for preventing scalping, a storage medium and a server. The scalping prevention method for scalping prevention comprises the following steps: receiving a transaction order generated in a city-wide activity or a city-wide task; judging whether the transaction order meets click farming behavior limitation in a pre-configured risk control rule record or not; if yes, returning the transaction order to a risk control library; if not, reward issuing is limited according to rewards in the risk control rule record; according to the technical scheme, whether the click farming behavior exists or not can be judged through machine intelligent judgment instead of manual judgment, so that the situations of missed judgment and wrong judgment are effectively avoided, the labor cost is greatly reduced, and the user experience degree is extremely good. According to the method and the device, the technical problems that the manpower is wasted and the user experience is influenced due to the frequent occurrence of judgment missing and wrong judgment caused by judging whether the order suspected to swipe exists or not in a manual mode are solved.

Application Domain

Marketing

Technology Topic

Computer securityRisk Control +4

Image

  • Anti-scalping method and device for preventing scalping, storage medium and server
  • Anti-scalping method and device for preventing scalping, storage medium and server
  • Anti-scalping method and device for preventing scalping, storage medium and server

Examples

  • Experimental program(1)

Example Embodiment

[0026] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of the present application.
[0027] It should be noted that the terms "first", "second", etc. in the description and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances for the embodiments of the application described herein. Furthermore, the terms "comprising" and "having" and any variations thereof, are intended to cover non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units is not necessarily limited to those expressly listed Rather, those steps or units may include other steps or units not expressly listed or inherent to these processes, methods, products or devices.
[0028] In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", The orientation or positional relationship indicated by "vertical", "horizontal", "horizontal", "longitudinal", etc. is based on the orientation or positional relationship shown in the drawings. These terms are primarily used to better describe the present invention and its embodiments, and are not intended to limit the fact that the indicated device, element or component must have a particular orientation, or be constructed and operated in a particular orientation.
[0029] In addition, some of the above-mentioned terms may be used to express other meanings besides orientation or positional relationship. For example, the term "on" may also be used to express a certain attachment or connection relationship in some cases. For those of ordinary skill in the art, the specific meanings of these terms in the present invention can be understood according to specific situations.
[0030] Furthermore, the terms "installed", "set up", "provided with", "connected", "connected", "socketed" should be construed broadly. For example, it may be a fixed connection, a detachable connection, or an integral structure; it may be a mechanical connection, or an electrical connection; it may be directly connected, or indirectly connected through an intermediary, or between two devices, elements, or components. internal communication. For those of ordinary skill in the art, the specific meanings of the above terms in the present invention can be understood according to specific situations.
[0031] It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other in the case of no conflict. The present application will be described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
[0032] According to an embodiment of the present invention, an anti-swiping method for anti-swiping is provided, such as figure 1 As shown, the method includes the following steps S101 to S104:
[0033] Step S101, receiving the transaction order generated in the same-city activity or the same-city task;
[0034] Step S102, judging whether the transaction order satisfies the limit of the order brushing behavior in the record of the risk control rule;
[0035] Step S103, if satisfied, return the transaction order to the risk control library;
[0036] Step S104 , if not satisfied, issue a reward according to the reward restriction in the record of the risk control rule.
[0037]Using the pre-configured risk control rule records to limit the swiping behavior, it is possible to judge whether the transaction orders generated in the same-city activities or the same-city tasks are malicious swiping. , users on the transaction side will generate transaction orders when they participate in the activity; and then determine whether the transaction order meets the limit of the order brushing behavior through the judgment algorithm, that is, determine whether the transaction order meets the agreed IP of the buyer and the seller, the same IP for multiple accounts, ABA, etc.; if so, then It is believed that the transaction order has malicious swiping behavior, and the transaction order is placed in the risk control library, and personnel can check the transaction order with swiping behavior by calling the risk control library. In this way, the intelligent judgment replaces the manual judgment on whether there is a suspicion of fraudulent billing, which effectively avoids the situation of missed judgment and wrong judgment in the manual judgment, and can effectively save the labor cost. If not, the transaction order is considered to be a compliant order, and single-day rewards and periodic rewards are issued according to the reward restrictions in the risk control rules record. In this way, the intelligent distribution of rewards is realized.
[0038] According to the embodiment of the present invention, preferably, the configuration of the risk control rule record includes:
[0039] Receive the rule configuration request sent by the user on the terminal, and output the rule configuration interface on the terminal;
[0040] The terminal can be a smart device such as a mobile phone or a computer. Install the corresponding application processing software on the terminal, open the application processing software, and the user can issue a rule configuration request through operations. After the server receives the request, it will call the rule configuration interface and The output is displayed on the terminal.
[0041] In this embodiment, as image 3 In the rule configuration interface, other risk control rule records that already exist in the background are displayed; the interface is also pre-configured with function items such as rule input field, level selection field, status selection field, query, and new addition. The corresponding function is realized by operation.
[0042] Specifically, personnel can enter the name of the rule in the rule input column, and click query to filter out the risk control rule records of the corresponding name; they can also select the risk control level in the level selection column, and click query to filter out all the risk control rules. You can also select a state in the state selection column, and click the query machine to filter out all the risk control rule records of this state; you can also filter and display them in different lists according to the reward limit and the order brushing behavior limit. In this way, the screening of risk control rule records by different keywords is realized.
[0043] In addition, personnel can directly click Add, that is, the new rule column can be output in the rule configuration interface, so that personnel can configure new rules.
[0044] Step S102 , outputting a risk control rule record at the terminal according to the anti-swipe information configured by the user in the rule configuration interface.
[0045] like Figure 4 As shown in the figure, after the new column of the output rule is added, the user can configure the anti-swipe order information in the new column of the rule; preferably, according to the anti-swipe order information configured by the user in the rule configuration interface, the record of the risk control rule is output in the terminal Including: according to the rule name filled in by the user in the rule name column in the rule configuration interface, the risk control level selected in the level selection column in the rule configuration interface, and the reward added in the add column in the rule configuration interface Restriction information and order brushing behavior restriction information, and output the risk control rule record in the terminal.
[0046] In this embodiment, after configuring the rule name, risk control level, reward limit information and order brushing behavior limit information, click Save to output a new risk control rule record on the terminal. The risk control rules are abstracted into configurable items, and personnel can configure the risk control rules at will, so that operators can adjust the risk control efforts related to activities at any time.
[0047] From the above description, it can be seen that the present invention achieves the following technical effects:
[0048] In the embodiment of the present application, the method of anti-swipe judgment based on risk control rules is adopted, by receiving transaction orders generated in intra-city activities or intra-city tasks; it is judged whether the transaction order satisfies the pre-configured risk control rule records in the record of swiping. Single action limit; if it is satisfied, the transaction order will be returned to the risk control library; if not, the reward will be issued according to the reward limit in the record of the risk control rule; if it is reached, machine intelligence is used instead of manual judgment to determine whether there is a fraudulent order The purpose of the behavior is to effectively avoid missed judgments and wrong judgments, greatly reduce labor costs, and have excellent user experience. There is often a waste of manpower caused by missed judgments and wrong judgments, and it also affects the technical problems of user experience.
[0049] According to the embodiment of the present invention, preferably, according to the anti-swipe information configured by the user on the rule configuration interface, after the terminal outputs the record of the risk control rule, the following further includes:
[0050] Monitor whether the user's edit, delete, suspend or unsuspend operations exist in the risk control rule record;
[0051] If it exists, edit, delete, display or hide the risk control rule record according to the user's edit, delete, suspend or unsuspend operation.
[0052] After exporting the record of risk control rules, users can click to edit, delete, suspend or unsuspend according to the actual situation. In this way, it is possible to edit the anti-swipe information, and delete, hide or display the record; other management operations are provided to facilitate personnel to operate to achieve the corresponding purpose.
[0053] According to the embodiment of the present invention, preferably, before receiving the transaction order generated in the same-city activity or the same-city task, the method further includes:
[0054] Receive the rule application request sent by the user on the terminal, and output the risk control rule list and the same-city activity or task list on the terminal;
[0055] Monitor whether there is a user's selection operation in the risk control rule list and the same-city activity or task list;
[0056] If it exists, configure the selected risk control rule record in the risk control rule list to the intra-city activity or task record selected in the intra-city activity or task list.
[0057] Specifically, the user can send a rule application request through an operation. After receiving the request, the server retrieves the risk control rule list and the same-city activity or task list, and clicks to select a risk control rule in the risk control rule list and the same-city activity or task list. Records and a certain intra-city activity or task record, the server configures the risk control rule record into the intra-city activity or task record, so that when subsequent intra-city activities or tasks generate transactions, they can be refreshed through the configured corresponding risk control rule records. A single suspect judgment.
[0058] In this embodiment, the intra-city activity or task record in the intra-city activity or task list may be configured through an operation in advance.
[0059] According to the embodiment of the present invention, preferably, if it exists, after configuring the selected risk control rule record in the risk control rule list into the selected intra-city activity or task record in the same-city activity or task list, the following further includes:
[0060] Receive transaction orders generated from intra-city activities or intra-city tasks;
[0061] Determine whether the global risk control is effective;
[0062] If so, determine whether the transaction order meets the global risk control limit;
[0063] If satisfied, return the transaction order to the risk control library;
[0064] If it is not satisfied, judge whether the transaction order meets the limit of order brushing behavior in the record of risk control rules;
[0065] If satisfied, return the transaction order to the risk control library;
[0066] If it is not satisfied, the reward will be issued according to the reward limit recorded in the risk control rules.
[0067] Before judging, it is necessary to judge whether the global risk control is effective. If so, use the global risk control limit combined with the order brushing behavior limit in the configured risk control rule record to realize whether the transaction order generated in the same-city activity or the same-city task is Judgment of malicious swiping; specifically, intra-city activities or intra-city tasks are posted to the trading side according to their location, and users on the trading side will generate trading orders when they participate in the activities; The transaction order is directly attributed to the risk control library, and personnel can view the transaction order that has the behavior of brushing by calling the risk control library. If it is not satisfied, it is judged whether the transaction order meets the limit of swiping behavior, that is, it is judged whether the transaction order satisfies the agreed IP of buyers and sellers, the same IP for multiple accounts, ABA, etc.; if so, it is considered that the transaction order has malicious swiping behavior. The transaction order is assigned to the risk control library, and personnel can view the transaction order that has the behavior of brushing by calling the risk control library. In this way, intelligent judgment replaces manual judgment on whether there is a suspicion of fraudulent billing, which effectively avoids missed judgment and wrong judgment in manual judgment, and can effectively save labor costs. In addition, global risk control judgment is added. Only when the order brushing behavior is restricted is judged, which can effectively improve the accuracy of the judgement. If not, the transaction order is considered to be a compliant order, and single-day rewards and periodic rewards are issued according to the reward restrictions in the risk control rules record. In this way, the intelligent distribution of rewards is realized.
[0068] According to an embodiment of the present invention, preferably, after judging whether it is global risk control, the method further includes:
[0069] If not, determine whether the transaction order meets the limit of the order brushing behavior in the risk control rule record;
[0070] If satisfied, return the transaction order to the risk control library;
[0071] If it is not satisfied, the reward will be issued according to the reward limit recorded in the risk control rules.
[0072] Before judging, it is necessary to judge whether the global risk control is in effect. If not, use the limit of swiping behavior in the configured risk control rule record, which can realize the judgment of whether the transaction order generated in the same city activity or the same city task is malicious swiping. ; Specifically, intra-city activities or intra-city tasks are posted to the trading terminal according to their location, and users on the trading terminal will generate trading orders when they participate in the activities; and then determine whether the trading order meets the limit of the order brushing behavior through the judgment algorithm, that is, whether the trading order satisfies the buying and selling. Both parties agree on the IP, the same IP for multiple accounts, ABA, etc.; if so, it is considered that the transaction order has malicious swiping behavior, and the transaction order is placed in the risk control library. Personnel can check the behavior of swiping orders by calling the risk control library. transaction order. In this way, the intelligent judgment replaces the manual judgment on whether there is a suspicion of fraudulent billing, which effectively avoids the situation of missed judgment and wrong judgment in the manual judgment, and can effectively save the labor cost. If not, the transaction order is considered to be a compliant order, and single-day rewards and periodic rewards are issued according to the reward restrictions in the risk control rules record. In this way, the intelligent distribution of rewards is realized.
[0073] It should be noted that the steps shown in the flowcharts of the accompanying drawings may be executed in a computer system, such as a set of computer-executable instructions, and, although a logical sequence is shown in the flowcharts, in some cases, Steps shown or described may be performed in an order different from that herein.
[0074] According to an embodiment of the present invention, there is also provided an apparatus for implementing the above-mentioned anti-swiping method for anti-swiping, such as figure 2 As shown, the device includes:
[0075] The receiving module 10 is used to receive the transaction orders generated in the same-city activity or the same-city task;
[0076] The judgment module 20 is used for judging whether the transaction order satisfies the limit of the order brushing behavior in the pre-configured risk control rule record;
[0077] Returning module 30, for returning the transaction order to the risk control library if satisfied;
[0078]The reward module 40 is configured to issue a reward according to the reward limit in the record of the risk control rule if it is not satisfied.
[0079] Using the pre-configured risk control rule records to limit the swiping behavior, it is possible to judge whether the transaction orders generated in the same-city activities or the same-city tasks are malicious swiping. , users on the transaction side will generate transaction orders when they participate in the activity; and then determine whether the transaction order meets the limit of the order brushing behavior through the judgment algorithm, that is, determine whether the transaction order meets the agreed IP of the buyer and the seller, the same IP for multiple accounts, ABA, etc.; if so, then It is believed that the transaction order has malicious swiping behavior, and the transaction order is placed in the risk control library, and personnel can check the transaction order with swiping behavior by calling the risk control library. In this way, the intelligent judgment replaces the manual judgment on whether there is a suspicion of fraudulent billing, which effectively avoids the situation of missed judgment and wrong judgment in the manual judgment, and can effectively save the labor cost. If not, the transaction order is considered to be a compliant order, and single-day rewards and periodic rewards are issued according to the reward restrictions in the risk control rules record. In this way, the intelligent distribution of rewards is realized.
[0080] According to the embodiment of the present invention, preferably, the configuration of the risk control rule record includes:
[0081] Receive the rule configuration request sent by the user on the terminal, and output the rule configuration interface on the terminal;
[0082] The terminal can be a smart device such as a mobile phone or a computer. Install the corresponding application processing software on the terminal, open the application processing software, and the user can issue a rule configuration request through operations. After the server receives the request, it will call the rule configuration interface and The output is displayed on the terminal.
[0083] In this embodiment, as image 3 In the rule configuration interface, other risk control rule records that already exist in the background are displayed; the interface is also pre-configured with function items such as rule input field, level selection field, status selection field, query, and new addition. The corresponding function is realized by operation.
[0084] Specifically, personnel can enter the name of the rule in the rule input column, and click query to filter out the risk control rule records of the corresponding name; they can also select the risk control level in the level selection column, and click query to filter out all the risk control rules. You can also select a state in the state selection column, and click the query machine to filter out all the risk control rule records of this state; you can also filter and display them in different lists according to the reward limit and the order brushing behavior limit. In this way, the screening of risk control rule records by different keywords is realized.
[0085] In addition, personnel can directly click Add, that is, the new rule column can be output in the rule configuration interface, so that personnel can configure new rules.
[0086] According to the anti-swipe information configured by the user in the rule configuration interface, the risk control rule record is output at the terminal.
[0087] like Figure 4 As shown in the figure, after the new column of the output rule is added, the user can configure the anti-swipe order information in the new column of the rule; preferably, according to the anti-swipe order information configured by the user in the rule configuration interface, the record of the risk control rule is output in the terminal Including: according to the rule name filled in by the user in the rule name column in the rule configuration interface, the risk control level selected in the level selection column in the rule configuration interface, and the reward added in the add column in the rule configuration interface Restriction information and order brushing behavior restriction information, and output the risk control rule record in the terminal.
[0088] In this embodiment, after configuring the rule name, risk control level, reward limit information and order brushing behavior limit information, click Save to output a new risk control rule record on the terminal. The risk control rules are abstracted into configurable items, and personnel can configure the risk control rules at will, so that operators can adjust the risk control efforts related to activities at any time.
[0089] From the above description, it can be seen that the present invention achieves the following technical effects:
[0090] In the embodiment of the present application, the method of anti-swipe judgment based on risk control rules is adopted, by receiving transaction orders generated in intra-city activities or intra-city tasks; it is judged whether the transaction order satisfies the pre-configured risk control rule records in the record of swiping. Single action limit; if it is satisfied, the transaction order will be returned to the risk control library; if not, the reward will be issued according to the reward limit in the record of the risk control rule; if it is reached, machine intelligence is used instead of manual judgment to determine whether there is a fraudulent order The purpose of the behavior is to effectively avoid missed judgments and wrong judgments, greatly reduce labor costs, and have excellent user experience. There is often a waste of manpower caused by missed judgments and wrong judgments, and it also affects the technical problems of user experience.
[0091] According to the embodiment of the present invention, preferably, according to the anti-swipe information configured by the user on the rule configuration interface, after the terminal outputs the record of the risk control rule, the following further includes:
[0092] Monitor whether the user's edit, delete, suspend or unsuspend operations exist in the risk control rule record;
[0093] If it exists, edit, delete, display or hide the risk control rule record according to the user's edit, delete, suspend or unsuspend operation.
[0094] After exporting the record of risk control rules, users can click to edit, delete, suspend or unsuspend according to the actual situation. In this way, it is possible to edit the anti-swipe information, and delete, hide or display the record; other management operations are provided to facilitate personnel to operate to achieve the corresponding purpose.
[0095] According to the embodiment of the present invention, preferably, before receiving the transaction order generated in the same-city activity or the same-city task, the method further includes:
[0096] Receive the rule application request sent by the user on the terminal, and output the risk control rule list and the same-city activity or task list on the terminal;
[0097] Monitor whether there is a user's selection operation in the risk control rule list and the same-city activity or task list;
[0098] If it exists, configure the selected risk control rule record in the risk control rule list to the intra-city activity or task record selected in the intra-city activity or task list.
[0099] Specifically, the user can send a rule application request through an operation. After receiving the request, the server retrieves the risk control rule list and the same-city activity or task list, and clicks to select a risk control rule in the risk control rule list and the same-city activity or task list. Records and a certain intra-city activity or task record, the server configures the risk control rule record into the intra-city activity or task record, so that when subsequent intra-city activities or tasks generate transactions, they can be refreshed through the configured corresponding risk control rule records. A single suspect judgment.
[0100] In this embodiment, the intra-city activity or task record in the intra-city activity or task list may be configured through an operation in advance.
[0101] According to the embodiment of the present invention, preferably, if it exists, after configuring the selected risk control rule record in the risk control rule list into the selected intra-city activity or task record in the same-city activity or task list, the following further includes:
[0102] Receive transaction orders generated from intra-city activities or intra-city tasks;
[0103] Determine whether the global risk control is effective;
[0104] If so, determine whether the transaction order meets the global risk control limit;
[0105] If satisfied, return the transaction order to the risk control library;
[0106] If it is not satisfied, judge whether the transaction order meets the limit of order brushing behavior in the record of risk control rules;
[0107] If satisfied, return the transaction order to the risk control library;
[0108] If it is not satisfied, the reward will be issued according to the reward limit recorded in the risk control rules.
[0109] Before judging, it is necessary to judge whether the global risk control is effective. If so, use the global risk control limit combined with the order brushing behavior limit in the configured risk control rule record to realize whether the transaction order generated in the same-city activity or the same-city task is Judgment of malicious swiping; specifically, intra-city activities or intra-city tasks are posted to the trading side according to their location, and users on the trading side will generate trading orders when they participate in the activities; The transaction order is directly attributed to the risk control library, and personnel can view the transaction order that has the behavior of brushing by calling the risk control library. If it is not satisfied, it is judged whether the transaction order meets the limit of swiping behavior, that is, it is judged whether the transaction order satisfies the agreed IP of buyers and sellers, the same IP for multiple accounts, ABA, etc.; if so, it is considered that the transaction order has malicious swiping behavior. The transaction order is assigned to the risk control library, and personnel can view the transaction order that has the behavior of brushing by calling the risk control library. In this way, intelligent judgment replaces manual judgment on whether there is a suspicion of fraudulent billing, which effectively avoids missed judgment and wrong judgment in manual judgment, and can effectively save labor costs. In addition, global risk control judgment is added. Only when the order brushing behavior is restricted is judged, which can effectively improve the accuracy of the judgement. If not, the transaction order is considered to be a compliant order, and single-day rewards and periodic rewards are issued according to the reward restrictions in the risk control rules record. In this way, the intelligent distribution of rewards is realized.
[0110] According to an embodiment of the present invention, preferably, after judging whether it is global risk control, the method further includes:
[0111] If not, determine whether the transaction order meets the limit of the order brushing behavior in the risk control rule record;
[0112] If satisfied, return the transaction order to the risk control library;
[0113] If it is not satisfied, the reward will be issued according to the reward limit recorded in the risk control rules.
[0114] Before judging, it is necessary to judge whether the global risk control is in effect. If not, use the limit of swiping behavior in the configured risk control rule record, which can realize the judgment of whether the transaction order generated in the same city activity or the same city task is malicious swiping. ; Specifically, intra-city activities or intra-city tasks are posted to the trading terminal according to their location, and users on the trading terminal will generate trading orders when they participate in the activities; and then determine whether the trading order meets the limit of the order brushing behavior through the judgment algorithm, that is, whether the trading order satisfies the buying and selling. Both parties agree on the IP, the same IP for multiple accounts, ABA, etc.; if so, it is considered that the transaction order has malicious swiping behavior, and the transaction order is placed in the risk control library. Personnel can check the behavior of swiping orders by calling the risk control library. transaction order. In this way, the intelligent judgment replaces the manual judgment on whether there is a suspicion of fraudulent billing, which effectively avoids the situation of missed judgment and wrong judgment in the manual judgment, and can effectively save the labor cost. If not, the transaction order is considered to be a compliant order, and single-day rewards and periodic rewards are issued according to the reward restrictions in the risk control rules record. In this way, the intelligent distribution of rewards is realized.
[0115] Obviously, those skilled in the art should understand that the above-mentioned modules or steps of the present invention can be implemented by a general-purpose computing device, and they can be centralized on a single computing device or distributed in a network composed of multiple computing devices Alternatively, they can be implemented with program codes executable by a computing device, so that they can be stored in a storage device and executed by the computing device, or they can be made into individual integrated circuit modules, or they can be integrated into The multiple modules or steps are fabricated into a single integrated circuit module. As such, the present invention is not limited to any particular combination of hardware and software.
[0116] The above descriptions are only preferred embodiments of the present application, and are not intended to limit the present application. For those skilled in the art, the present application may have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included within the protection scope of this application.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Ice cream vending machine

Owner:GUANGZHOU GUANGSHEN ELECTRIC PROD CO LTD

Dedusting and cooling integrated device of solar photovoltaic panel

ActiveCN103268896AReduce labor costssave washing water
Owner:XI AN JIAOTONG UNIV

Method for cultivating kelp and asparagus alternately

Owner:YELLOW SEA FISHERIES RES INST CHINESE ACAD OF FISHERIES SCI

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products