CN113794678A - Method and device compatible with multiple login modes and computer storage medium - Google Patents

Method and device compatible with multiple login modes and computer storage medium Download PDF

Info

Publication number
CN113794678A
CN113794678A CN202110869807.9A CN202110869807A CN113794678A CN 113794678 A CN113794678 A CN 113794678A CN 202110869807 A CN202110869807 A CN 202110869807A CN 113794678 A CN113794678 A CN 113794678A
Authority
CN
China
Prior art keywords
user
account
information
login
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110869807.9A
Other languages
Chinese (zh)
Inventor
王超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ideamake Software Technology Co Ltd
Original Assignee
Shenzhen Ideamake Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ideamake Software Technology Co Ltd filed Critical Shenzhen Ideamake Software Technology Co Ltd
Priority to CN202110869807.9A priority Critical patent/CN113794678A/en
Publication of CN113794678A publication Critical patent/CN113794678A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a method, a device and a computer storage medium compatible with multiple login modes, wherein the method comprises the following steps: acquiring a login mode selected by a user within an authorization range, and verifying a first account logged in by the user; if the verification of the logged first account is successful, generating verification information which passes the first information input by the user to carry out identity verification; the identity information of the user is identified according to the first information input by the user, and the first account and other accounts having the same user identity information with the first account are associated. According to the method and the device, the first account and other accounts with the same user identity information with the first account are associated, when the user logs in through accounts with different login modes, the platform can identify the identity of the user, the same user who logs in through accounts with different login modes is prevented from being regarded as different users.

Description

Method and device compatible with multiple login modes and computer storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for enabling multiple login modes to be compatible, and a computer storage medium.
Background
Many existing platforms can support various login modes for login, for example, many platforms can support micro signal login, QQ number login, micro blog number login, pay account login, micro blog number login, email address login, and the like, when a user logs in through login accounts of different login modes, the platform will regard each user who logs in through login accounts of different login modes as different users, and at the same time, the user logs in through a plurality of different login modes, and information retained in the platform is scattered.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide a method, an apparatus and a computer storage medium compatible with multiple login methods, which can identify the identity of a user when the user logs in different login methods.
In a first aspect, an embodiment of the present invention provides a method compatible with multiple login manners, including:
acquiring a login mode selected by a user within an authorization range, and verifying a first account logged in by the user;
if the verification of the logged first account is successful, generating verification information which passes the first information input by the user to carry out identity verification;
the identity information of the user is identified according to the first information input by the user, and the first account and other accounts having the same user identity information with the first account are associated.
According to the first aspect, in a possible implementation manner, the login manner at least includes a mobile phone number login, a certificate number login, a platform account login and other platform account logins; when the login mode selected by the user in the authorization range is obtained, the method comprises the following steps:
acquiring a specific login mode according to the format of a first account logged in by a user within an authorization range; or
Selecting other platform accounts within an authorization range to obtain a specific login mode according to the fact that a user logs in a first account; or
And checking the options of the specific login mode of the login interface to determine the specific login mode before the user logs in the first account.
According to the first aspect, in a possible implementation manner, the verification information at least includes one item of an authentication question and personal information supplementary air, and the identification of the user identity according to the first information input by the user includes the steps of:
when the authentication information has an authentication problem, deducing the identity information of the user according to the second information recorded in the first account and the first information input by the user;
and when the personal information is filled in the verification information, determining the identity information of the user according to the first information input by the user.
According to the first aspect, in a possible implementation manner, the associating the first account with other accounts having the same user identity information with the first account includes:
acquiring other account numbers associated with the identity information from a database according to the identity information of the identified user;
and establishing a mapping relation between the first account and other accounts with the same identity information as the first account so as to enable the first account and other accounts with the same identity information as the first account to be associated.
According to the first aspect, in a possible implementation manner, after associating the first account and other accounts having the same user identity information with the first account, the method further includes the steps of:
and acquiring third information recorded in other account numbers with the same user identity information as the first account number to integrate the second information and the third information of the first account number.
According to the first aspect, in a possible implementation manner, integrating the second information and the third information of the first account includes:
combining the repeated content in the second information and the third information;
screening out two items of contents with contradiction in the second information and the third information, reserving one verified content in the two items of contradictory contents, and removing one content which is not verified in the two items of contradictory contents.
In a second aspect, an embodiment of the present invention discloses an apparatus compatible with multiple login manners, where the apparatus includes at least one processor and a storage, where the storage is configured to store instructions, and the at least one processor is configured to execute the instructions, and further perform the following steps:
acquiring a login mode selected by a user within an authorization range, and verifying a first account logged in by the user;
if the verification of the logged first account is successful, generating verification information which passes the first information input by the user to carry out identity verification;
the identity information of the user is identified according to the first information input by the user, and the first account and other accounts having the same user identity information with the first account are associated.
According to the second aspect, in a possible implementation manner, the login manner at least includes a mobile phone number login, a certificate number login, a platform account login and other platform account logins; when the login mode selected by the user in the authorized range is obtained, the processor is configured to execute the following steps:
acquiring a specific login mode according to the format of a first account logged in by a user within an authorization range; or
Selecting other platform accounts within an authorization range to obtain a specific login mode according to the fact that a user logs in a first account; or
And checking the options of the specific login mode of the login interface to determine the specific login mode before the user logs in the first account.
According to the second aspect, in a possible implementation manner, the verification information at least includes one item of an authentication question and personal information filling the air, and when the user's identity is recognized according to the first information input by the user, the processor is configured to perform the following steps:
when the authentication information comprises an identity authentication problem, deducing the identity information of the user according to second information recorded in the first account and first information input by the user;
and when the verification information comprises personal information filling, determining the identity information of the user according to the first information input by the user.
In a third aspect, an embodiment of the present invention discloses a computer storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the method described above.
According to the embodiment of the application, after a user logs in a first account, verification information for verifying the identity of the user is generated, and after the identity of the user is obtained, the first account and other accounts having the same user identity information with the first account are associated, so that when the user logs in by adopting accounts of different login modes, the platform can identify the identity of the user, and the same user who logs in by using accounts of different login modes is prevented from being regarded as different users by the platform.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present invention, the drawings required to be used in the embodiments or the background art of the present invention will be described below.
Fig. 1 is an architecture diagram of a system compatible with multiple login methods according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a mapping relationship between user identity information and accounts of various login manners provided in the embodiment of the present invention;
fig. 3 is a main flow diagram of a method compatible with multiple login manners according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a login account performed by a user terminal according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention will be described below with reference to the drawings.
The terms "including" and "having," and any variations thereof, in the description and claims of this application and the drawings described above, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Many existing platforms can support multiple login modes for login, for example, many platforms can support micro signal login, QQ number login, micro blog number login, payroll account login, micro blog number login, mailbox account login, and the like, and when a user logs in through login accounts of different login modes, the platform regards each user who logs in through the login accounts of different login modes as different users.
Referring to fig. 1, fig. 1 is an architecture diagram of a system compatible with multiple login methods according to an embodiment of the present invention, the system includes a user terminal 200 and a device 100 compatible with multiple login methods, the user terminal 200 may communicate with the device 100 through the internet, specifically, the user terminal 200 may be connected to the device 100 through a data bus to implement communication, and the user terminal 200 may communicate with the device 100 through a wireless data bus or through a wired data bus.
The user terminal 200 may be an intelligent terminal, specifically, a mobile phone, a tablet computer, a home computer, and the like, and the user terminal 200 may communicate with the apparatus 100 by logging in an account to implement information or data interaction.
The device 100 may be a server, and may specifically be a computer, and when the user terminal 200 logs in to a login account within the platform authorization range, the server may interact information or data with the user terminal 200.
Referring to fig. 1, the apparatus 100 includes at least one processor 110 and a storage 120, the storage 120 is used for storing instructions, and the processor 110 is used for executing the instructions in the storage 120.
In the embodiment of the present Application, the processor 110 may be a Central Processing Unit (CPU), and the processor 110 may also be other general-purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), Field-Programmable Gate arrays (FPGA) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like.
These processors may include distributed processors or parallel processors in a machine or machines, and the processor 110 may be used to support a virtual processing environment. The processor 110 may include a state machine, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (PGA) including a field PGA or a state machine. Execution of code or instructions by the processor 110 in performing operations, actions, tasks, functions, steps, etc., may include the processor 110 directly performing the operations and/or assisting, directing, or cooperating with another device or component to perform the operations.
The storage 120 may be volatile storage or non-volatile storage, or may include both volatile and non-volatile storage. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile storage may be Random Access Memory (RAM) which acts as external cache Memory. By way of example and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchloined SDRAM (SLDRAM), and Direct memory bus RAM (DR RAM).
When the processor 110 is a general purpose processor, a DSP, an ASIC, an FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) is integrated into the processor 110.
It should be noted that the reservoir 120 described herein is intended to include, without being limited to, these and any other suitable types of reservoirs.
The device 100 further includes a communication link, which may be a network adapter 140, and the communication link may be a computer bus, the processor 110 in the device 100 is connected to the storage 120 through the network adapter 140 for data interaction, and the communication link may be a wired link such as an ethernet cable, and may also be a wireless link (Wi-Fi, bluetooth, SparkLink, universal wireless transmission, vehicle-mounted short-range communication technology, etc.).
The storage 120 includes computer-executable instructions or code. Computer-executable instructions are executed by the processor 110 to cause the processor 110, and thus the apparatus 100, to perform any combination of the functions described in this disclosure.
The device 100 further includes input/output (I/O) devices, such as wireless transceivers and/or wired communication ports. The I/O device 130 may comprise or be part of a tangible communication device. The processor 110 may send and receive information through the I/O device 130.
In some embodiments, the I/O devices 130 and the processor 110 are configured such that the processor 110 executing the instructions sends information to and receives information from one or more networks for communication with remote systems. Exemplary networks are the internet, local area networks and other computing networks, as well as corresponding network access devices such as cellular towers, satellites, and roadside short-range or mid-range beacons that facilitate vehicle communication with the infrastructure (V2I).
In one possible implementation, the at least one processor 110 is configured to execute instructions to perform the following steps:
acquiring a login mode selected by a user within an authorization range, and verifying a first account logged in by the user;
if the verification of the logged first account is successful, generating verification information which passes the first information input by the user to carry out identity verification;
the identity information of the user is identified according to the first information input by the user, and the first account and other accounts having the same user identity information with the first account are associated.
The different login modes are specifically that the user logs in by using accounts of different platforms authorized by the platform (system), for example, the user can log in on the platform by using a micro signal, a micro blog number and the like.
The identity information referred to in this embodiment refers to information that can definitely determine the identity of the user, for example, the identity information may be or include an identification number.
In one possible implementation manner, the login manner at least includes mobile phone number login, certificate number login, platform account login and other platform account login; when the login mode selected by the user within the authorization scope is obtained, the processor 110 is configured to execute the following steps:
acquiring a specific login mode according to the format of a first account logged in by a user within an authorization range; or
Selecting other platform accounts within an authorization range to obtain a specific login mode according to the fact that a user logs in a first account; or
And checking the options of the specific login mode of the login interface to determine the specific login mode before the user logs in the first account.
In a possible implementation manner, the verification information at least includes one of an authentication question and personal information, and when the identity of the user is recognized according to the first information input by the user, the processor 110 is configured to perform the following steps:
when the authentication information comprises an identity authentication problem, deducing the identity information of the user according to second information recorded in the first account and first information input by the user;
and when the verification information comprises personal information filling, determining the identity information of the user according to the first information input by the user.
In particular, the authentication questions are in particular questions generated by the device 100 about the identity of the user to determine identity information of the user.
In one possible implementation, the processor is configured to perform the steps of:
loading data content in a second account which has the same user identity information as the first account based on the identity information of the user;
analyzing the content in the second account to distinguish each data type of the data content;
and matching the data types into the related attribute categories of the first account.
In one possible implementation, the data type includes at least one of the following data: collection records, interaction records, subscription records, and personal requirements.
In a possible implementation manner, based on the data types, the matching is performed in the related attribute categories of the first account, and the processor is configured to perform the steps of:
and based on the preset mapping relation between each data type of the data content and each related attribute category of the first account, filling each data type of the data content into a preset storage space of the first account in a classified manner.
In a possible implementation manner, the supplementing each data type of the data content into a preset storage space of the first account, and the processor is configured to perform the steps of:
integrating the data type originally possessed by the first account in the preset storage space and the data type supplemented into the preset storage space of the first account;
and sorting according to the time sequence generated by the data types.
In a possible implementation manner, the integrating the data type originally owned in the preset storage space of the first account and the data type complemented into the preset storage space of the first account, the processor is configured to execute the following steps:
and combining the data type originally possessed by the preset storage space of the first account and the repeated content in the data type supplemented into the preset storage space of the first account.
In a possible implementation manner, based on the data type originally owned in the preset storage space of the integrated first account and the data type supplemented to the preset storage space of the first account, the processor is configured to execute the steps;
analyzing personal preferences of a user through a preset algorithm;
recommending information matched with the personal preference of the user based on the personal preference of the user.
Referring to fig. 3, fig. 3 is a main flow chart of a method compatible with multiple login manners according to an embodiment of the present invention, where the method includes, but is not limited to, the following steps:
s1, acquiring the login mode selected by the user in the authorized range, and verifying the first account logged in by the user;
in the method described in fig. 3, the different login manners specifically include that the user logs in by using accounts of different platforms authorized by the platform (system), for example, the user can log in on the platform by using a micro signal, a micro blog number, and the like.
Specifically, when the user performs login operation, the login mode authorized by the platform can be selected for login, and if the platform authorizes the mobile phone number, the micro signal, the micro blog number and the mailbox account number to perform login, the user can select any login mode within the authorization range to perform login.
When a user selects a login mode within an authorization range to log in, the platform needs to access other platforms corresponding to the login mode, and after authorization of the other platforms corresponding to the login mode is obtained, an account corresponding to the login mode is obtained, so that the first account of the login mode is verified.
For example, a possible implementation method includes that a user logs in on a platform by using a micro signal, the user selects the micro signal for logging in on a login interface, the platform sends an access request to a micro-trusted platform, specifically, a verification message can be sent to the micro-trusted platform of the user through the micro-trusted platform, and the user can perform login verification through the verification message; in another possible implementation manner, a user logs in on the platform by using the micro signal, the user checks the micro signal on a login interface, the login interface displays the two-dimensional code, and the user scans the two-dimensional code by using the micro signal to send permission for login to the platform, so that the platform completes verification of the micro signal.
S2, if the verification of the logged first account is successful, generating verification information which passes the first information input by the user for identity verification;
specifically, when a user logs in on the platform by using an account of another platform for the first time, the identity information of the user needs to be verified to determine the identity of the user.
In the embodiment provided by the application, the first information may specifically be an identification number, and the first information may also be other information which has official effect and can prove the identity of the user.
And S3, identifying the identity information of the user according to the first information input by the user, and associating the first account and other accounts with the same user identity information as the first account.
Specifically, after the user inputs the first information, the platform determines the identity information of the user, searches out other accounts with the same user identity information from the database, and establishes a mapping relationship between the first account and the other accounts with the same user identity information, so that the first account and the other accounts with the same user identity information are associated.
In the embodiment provided by the application, the platform can be a platform for facilitating the user to purchase a house, and after the platform determines the identity of the user, the platform can recommend house source information to the user in a targeted manner.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a mapping relationship between user identity information and an account of each login method according to an embodiment of the present invention.
For example, the user has a first account, a second account, through an nth account, and the identity information of the user corresponds to the first account, the second account, through the nth account.
In a possible implementation mode, a user logs in a platform for the first time by using a micro signal on the platform, after the user inputs first information, the platform determines identity information of the user, if the user has a login record on the platform by adopting a mailbox account before and the identity information of the user is reserved when the user logs in through the mailbox account for the first time, the platform searches the mailbox account when searching other accounts corresponding to the identity information of the same user in a database based on the identity information of the user, and at the moment, the platform establishes a mapping relation between the mailbox account and the micro signal so that the micro signal is associated with the mailbox account.
In one possible implementation manner, the login manner at least includes mobile phone number login, certificate number login, platform account login and other platform account login;
specifically, when a mobile phone number is used for logging in, a short message with a verification code is generally sent to a phone card corresponding to the mobile phone number by using a platform, and a user inputs the verification code in a login interface for logging in.
When the certificate number and the platform account number are used for login, login verification is generally performed in a password input mode, the password can comprise two types, the first type is one or more of numbers, letters and symbols; the second password is a biological password, and login verification is performed in a fingerprint or face recognition mode, for example.
When other platform account numbers are adopted for login, for example, a possible implementation method is that a user logs in on a platform by using a micro signal, the user selects the micro signal on a login interface for login, the platform sends an access request to a micro-trusted platform, specifically, a verification message can be sent to the micro-trusted platform of the user through the micro-trusted platform, and the user can perform login verification through the verification message; in another possible implementation manner, a user logs in on the platform by using the micro signal, the user checks the micro signal on a login interface, the login interface displays the two-dimensional code, and the user scans the two-dimensional code by using the micro signal to send permission for login to the platform, so that the platform completes verification of the micro signal.
When the login mode selected by the user in the authorization range is obtained, the method comprises the following steps:
acquiring a specific login mode according to the format of a first account logged in by a user within an authorization range; or
Selecting other platform accounts within an authorization range to obtain a specific login mode according to the fact that a user logs in a first account; or
And checking the options of the specific login mode of the login interface to determine the specific login mode before the user logs in the first account.
When a specific login mode is obtained according to the format of a first account which is logged in by a user within an authorization range, and the user logs in the account on a login interface, the platform can identify the login account of the user on the login interface, so that the format of the login account can be obtained, accounts of a plurality of other platforms have specific formats, for example, the user logs in a mailbox account in the platform, and when the user inputs the mailbox account on the login interface, the login interface can identify the account input by the user as the mailbox account according to the account format input by the user.
The verification information at least comprises one item of identity verification problem and personal information filling the air, and the identification of the identity of the user according to the first information input by the user comprises the following steps:
when the authentication information has an authentication problem, deducing the identity information of the user according to the second information recorded in the first account and the first information input by the user;
and when the personal information is filled in the verification information, determining the identity information of the user according to the first information input by the user.
When the first account number logged in by the user is not logged in for the first time, and the user is not subjected to identity authentication by the platform or is not provided with identity information by the user, wherein the first account number logged in by the user records second information, at the moment, the identity information of the user can be determined through the first information and the second information.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a login account performed by the user terminal 200 according to an embodiment of the present invention, a login interface of the user terminal 200 has login links of other platform accounts, and the platform obtains a specific login mode selected by the user according to the login link of the user.
The login interface of the user terminal 200 also has login options of other platform accounts, and the login mode of the user login is obtained according to the check of the user on the login interface.
One possible implementation manner, when associating the first account and other accounts having the same user identity information with the first account, includes the steps of:
acquiring other accounts related to the identity information of the user from a database according to the identified identity information of the user;
and establishing a mapping relation between the first account and other accounts with the same identity information as the first account so as to enable the first account and other accounts with the same identity information as the first account to be associated.
For example, the platform is application software for facilitating a user to purchase and watch a house, at present, in order to facilitate the user to use the platform, the platform authorizes account numbers of other platforms to directly log on the platform by associating with other platforms, so that the user is free from account number registration or account number registration more conveniently, when the platform authorizes account numbers of a plurality of other platforms to log on, the user may log on by using account numbers of different other platforms at different times, when the user logs on by using account numbers of different other platforms, the platform can identify the same user as a user with different identities, the collection record of the user watching or/and purchasing the house, the interaction record with sales staff, the subscription record on the platform and the personal demand of the user cannot be synchronized, and the platform cannot subscribe according to the collection record provided by the user, the interaction record with the sales staff, the collection record provided by the user, the subscription of the platform with the sales staff, Subscription records on the platform, lack of synchronization and recommendation of relevant premises by the user's personal needs.
According to the method and the system, the user can be associated with the recorded contents in the account numbers adopting different login modes by identifying the identity of the user, the user can mutually synchronize the data such as the collection records of watching or/and buying rooms, the interaction records with sales personnel, the subscription records on the platform, the personal requirements of the user and the like on the platform by adopting the login account numbers of different other platforms, the user can conveniently check the previous historical data, and meanwhile, the platform can conveniently recommend a house source more accurately according to the historical data of the user.
Specifically, the method for synchronizing the data contents of different login accounts of the user includes the following steps:
a1, loading data content in a second account having the same user identity information as the first account based on the identity information of the user;
a2, analyzing the content in the second account to distinguish various data types of the data content;
and A3, matching the data types into the related attribute categories of the first account.
Specifically, the same user has a first account and a second account, and data contents in the first account and the second account are synchronous; the first account and the second account have a mapping relation with the identity information of the user, and after logging in the first account, the data content of the second account is synchronized to the first account.
When the user uses the second account, the user has collection records, subscription records and interaction records, and when the user logs in the first account, the collection records, the subscription records and the interaction records of the user in the second account are also synchronized to the first account; the user can view the collection record, the subscription record and the interaction record in the second account in the first account.
For example, when a user logs in a house-buying platform in a micro signal, some house sources and some house providers are subscribed in the micro signal, and the user logs in the house-buying platform by using a micro blog number, data contents of some house sources and some house providers are synchronized to the micro blog number.
In one possible implementation, the data type includes at least one of the following data: collection records, interaction records, subscription records, and personal requirements.
In a possible implementation manner, the matching to each relevant attribute category of the first account based on each data type includes:
and based on the preset mapping relation between each data type of the data content and each related attribute category of the first account, filling each data type of the data content into a preset storage space of the first account in a classified manner.
In the embodiment provided by the application, in order to facilitate a user to view data types of a first account and a second account, the data types of the integrated first account and second account are classified, specifically, a collection record of the first account and a collection record of the second account are stored together, an interaction record of the first account and an interaction record of the second account are stored together, a subscription record of the first account and a subscription record of the second account are stored together, and a personal requirement of the first account and a personal requirement of the second account are stored together.
For example, the user has a microblog number and a micro signal which can log in a house purchasing platform, the user uses the micro signal to log in the house purchasing platform before, and performs message interaction (interaction record) with house selling personnel of the house purchasing platform at an interaction window, and when the user uses the microblog number to log in the house purchasing platform, the user can check the interaction record with the house selling personnel when the user uses the micro signal to log in before on the interaction window where the microblog number logs in.
In a possible implementation manner, the supplementing each data type of the data content into a preset storage space of the first account by classification includes:
integrating the data type originally possessed by the first account in the preset storage space and the data type supplemented into the preset storage space of the first account;
and sorting according to the time sequence generated by the data types.
Specifically, in order to facilitate the user to view the data types of the integrated first account and the integrated second account, the integrated numerical control types are sorted according to the time sequence.
In a possible implementation manner, the integrating the data type originally owned in the preset storage space of the first account and the data type complemented into the preset storage space of the first account includes:
and combining the data type originally possessed by the preset storage space of the first account and the repeated content in the data type supplemented into the preset storage space of the first account.
In a possible implementation manner, the data type originally owned in the preset storage space of the first account and the data type supplemented to the preset storage space of the first account are integrated;
analyzing personal preferences of a user through a preset algorithm;
recommending information matched with the personal preference of the user based on the personal preference of the user.
Taking the platform as an example of application software which is convenient for a user to purchase and see a house, when the user logs in a first account, the platform synchronizes data in other login modes of the user to the first account, for example, if the user sees a certain set of house in a second account and collects the set of house, when the user logs in the first account, a house source collected in the second account is synchronized to the first account; similarly, the user can synchronize the interactive information of the salesman in the sale room with the first account through the second account, so that the user can watch the interactive information conveniently.
The data contents of a plurality of login modes of the user are synchronized to the first account, the platform can analyze the personal preference of the user conveniently, so that the house source can be recommended conveniently, for example, the house source watched by the user is basically a large house type, the platform can judge that the user needs the large house type more through analyzing the record of the house source watched by the user, and the large house type can be recommended emphatically when the house source is recommended for the user.
In the embodiments provided herein, the database may be a part of the apparatus 100 or may be a device or component separate from the apparatus.
After the identity information of the user of the first account is determined, the platform searches other platform accounts related to the identity information of the user in the database according to the identity information of the user, for example, the user logs in the platform for the first time by using a micro signal on the platform, after the user inputs the first information, the platform determines the identity information of the user, if the user has a login record on the platform by adopting a mailbox account before, and the identity information of the user is reserved when the user logs in through the mailbox account for the first time, when the platform searches other accounts corresponding to the identity information of the same user in the database based on the identity information of the user, the mailbox account is searched, and at the moment, the platform establishes a mapping relation between the mailbox account and the micro signal, so that the micro signal is related to the mailbox account.
In a possible implementation manner, after associating the first account and other accounts having the same user identity information with the first account, the method further includes the steps of:
and acquiring third information recorded in other account numbers with the same user identity information as the first account number to integrate the second information and the third information of the first account number.
In the embodiments provided in the present application, the first information is information that can directly determine the identity of the user, such as an identification number or other certificate numbers. The second information and the third information are information associated with the identity of the user, for example, the second information and the third information may include one or more of name, gender, graduation institution, home address, and the like.
In a possible implementation manner, integrating the second information and the third information of the first account includes:
combining the repeated content in the second information and the third information;
screening out two items of contents with contradiction in the second information and the third information, reserving one verified content in the two items of contradictory contents, and removing one content which is not verified in the two items of contradictory contents.
Specifically, the platform associates accounts of the login modes, integrates the content recorded in the accounts of the login modes into personal data, and facilitates the platform to read the personal data of the user.
In this embodiment, the generated personal data is associated with the account numbers of the respective login manners, the user logs in by using the account number of any login manner, and the platform can acquire the personal data to know the identity information of the user.
In a possible implementation manner, the embodiment of the present invention further discloses a computer storage medium, which stores a computer program, and the computer program implements the method when being executed by the processor 110.
In summary, according to the embodiment of the application, after a user logs in a first account, verification information for verifying the identity of the user is generated, and after the identity of the user is obtained, the first account and other accounts having the same user identity information with the first account are associated, so that when the user logs in by using accounts of different login modes, the platform can identify the identity of the user, and the same user who logs in by using accounts of different login modes is prevented from being regarded as different users by the platform.
It should also be understood that reference herein to first, second, third, fourth, and various numerical designations is made only for ease of description and should not be used to limit the scope of the present application.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 110. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by the hardware processor 110, or may be implemented by a combination of hardware and software modules in the processor 110. The software module may be located in a random access memory, a flash memory, a read-only memory, a programmable read-only memory or an electrically erasable programmable memory, a register, etc. storage media that are well known in the art. The storage medium is located in a storage device, and the processor 110 reads information in the storage device and performs the steps of the method in combination with hardware thereof. To avoid repetition, it is not described in detail here.
In the embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various Illustrative Logical Blocks (ILBs) and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described embodiment of the apparatus 100 is merely illustrative, and for example, the division of the modules is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of modules or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules described as separate components may or may not be physically separate. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk), among others.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method compatible with multiple login modes is characterized by comprising the following steps:
acquiring a login mode selected by a user within an authorization range, and verifying a first account logged in by the user;
if the verification of the logged first account is successful, generating verification information which passes the first information input by the user to carry out identity verification;
the identity information of the user is identified according to the first information input by the user, and the first account and other accounts having the same user identity information with the first account are associated.
2. The method of claim 1, wherein the login manner at least comprises a mobile phone number login, a certificate number login, a platform account login and other platform account logins; when the login mode selected by the user in the authorization range is obtained, the method comprises the following steps:
acquiring a specific login mode according to the format of a first account logged in by a user within an authorization range; or
Selecting other platform accounts within an authorization range to obtain a specific login mode according to the fact that a user logs in a first account; or
And checking the options of the specific login mode of the login interface to determine the specific login mode before the user logs in the first account.
3. The method of claim 1, wherein the authentication information includes at least one of an authentication question and personal information to fill the air, and wherein identifying the identity of the user based on the first information input by the user comprises the steps of:
when the authentication information has an authentication problem, deducing the identity information of the user according to the second information recorded in the first account and the first information input by the user;
and when the personal information is filled in the verification information, determining the identity information of the user according to the first information input by the user.
4. A method according to claim 1 or 3, wherein associating the first account with other accounts having the same user identity information as the first account comprises the steps of:
acquiring other account numbers associated with the identity information from a database according to the identity information of the identified user;
and establishing a mapping relation between the first account and other accounts with the same identity information as the first account so as to enable the first account and other accounts with the same identity information as the first account to be associated.
5. The method of claim 4, wherein after associating the first account with other accounts having the same user identity information as the first account, further comprising the steps of:
and acquiring third information recorded in other account numbers with the same user identity information as the first account number to integrate the second information and the third information of the first account number.
6. The method of claim 5, wherein integrating the second information and the third information of the first account comprises:
combining the repeated content in the second information and the third information;
screening out two items of contents with contradiction in the second information and the third information, reserving one verified content in the two items of contradictory contents, and removing one content which is not verified in the two items of contradictory contents.
7. An apparatus compatible with multiple login methods, comprising at least one processor and a storage, wherein the storage is configured to store instructions, and wherein the at least one processor is configured to execute the instructions and further perform the following steps:
acquiring a login mode selected by a user within an authorization range, and verifying a first account logged in by the user;
if the verification of the logged first account is successful, generating verification information which passes the first information input by the user to carry out identity verification;
the identity information of the user is identified according to the first information input by the user, and the first account and other accounts having the same user identity information with the first account are associated.
8. The apparatus of claim 7, wherein the login manner at least comprises a mobile phone number login, a certificate number login, a platform account login and other platform account logins; when the login mode selected by the user in the authorized range is obtained, the processor is configured to execute the following steps:
acquiring a specific login mode according to the format of a first account logged in by a user within an authorization range; or
Selecting other platform accounts within an authorization range to obtain a specific login mode according to the fact that a user logs in a first account; or
And checking the options of the specific login mode of the login interface to determine the specific login mode before the user logs in the first account.
9. The apparatus of claim 7, wherein the authentication information comprises at least one of an authentication question and personal information, and wherein the processor is configured to perform the following steps when the user's identity is recognized based on the first information input by the user:
when the authentication information comprises an identity authentication problem, deducing the identity information of the user according to second information recorded in the first account and first information input by the user;
and when the verification information comprises personal information filling, determining the identity information of the user according to the first information input by the user.
10. A computer storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the method of any one of the preceding claims 1 to 6.
CN202110869807.9A 2021-07-29 2021-07-29 Method and device compatible with multiple login modes and computer storage medium Pending CN113794678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110869807.9A CN113794678A (en) 2021-07-29 2021-07-29 Method and device compatible with multiple login modes and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110869807.9A CN113794678A (en) 2021-07-29 2021-07-29 Method and device compatible with multiple login modes and computer storage medium

Publications (1)

Publication Number Publication Date
CN113794678A true CN113794678A (en) 2021-12-14

Family

ID=79181459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110869807.9A Pending CN113794678A (en) 2021-07-29 2021-07-29 Method and device compatible with multiple login modes and computer storage medium

Country Status (1)

Country Link
CN (1) CN113794678A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116192539A (en) * 2023-04-28 2023-05-30 北京轻松筹信息技术有限公司 Method, device, equipment and storage medium for merging data after user login

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268233A (en) * 2013-06-05 2013-08-28 四目信息科技(上海)有限公司 Method for combining account number of platform system and account number of third party system in computer system
CN104580451A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Method and system for achieving account number synchronization among multiple platforms, and electronic device
CN105306733A (en) * 2015-11-13 2016-02-03 深圳正品创想科技有限公司 Third-party login mobile phone number binding method based on mobile phone APP
CN108632291A (en) * 2018-05-16 2018-10-09 阿里巴巴集团控股有限公司 A kind of third party authorizes login method and system
WO2019056575A1 (en) * 2017-09-20 2019-03-28 青岛海信移动通信技术股份有限公司 Account login method, terminal and computer-readable non-volatile storage medium
CN110830463A (en) * 2019-10-30 2020-02-21 腾讯科技(深圳)有限公司 Third party authorized login method and device
CN110912893A (en) * 2019-11-26 2020-03-24 上海傅利叶智能科技有限公司 Account number merging method
CN112104612A (en) * 2020-08-24 2020-12-18 宁波奥克斯电气股份有限公司 Account number merging method and device and server
CN112115455A (en) * 2020-09-28 2020-12-22 中国银行股份有限公司 Setting method, device, server and medium for incidence relation of multiple user accounts
CN113179282A (en) * 2021-05-27 2021-07-27 北京创新乐知网络技术有限公司 Method and device for merging account numbers and server

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268233A (en) * 2013-06-05 2013-08-28 四目信息科技(上海)有限公司 Method for combining account number of platform system and account number of third party system in computer system
CN104580451A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Method and system for achieving account number synchronization among multiple platforms, and electronic device
CN105306733A (en) * 2015-11-13 2016-02-03 深圳正品创想科技有限公司 Third-party login mobile phone number binding method based on mobile phone APP
WO2019056575A1 (en) * 2017-09-20 2019-03-28 青岛海信移动通信技术股份有限公司 Account login method, terminal and computer-readable non-volatile storage medium
CN108632291A (en) * 2018-05-16 2018-10-09 阿里巴巴集团控股有限公司 A kind of third party authorizes login method and system
CN110830463A (en) * 2019-10-30 2020-02-21 腾讯科技(深圳)有限公司 Third party authorized login method and device
CN110912893A (en) * 2019-11-26 2020-03-24 上海傅利叶智能科技有限公司 Account number merging method
CN112104612A (en) * 2020-08-24 2020-12-18 宁波奥克斯电气股份有限公司 Account number merging method and device and server
CN112115455A (en) * 2020-09-28 2020-12-22 中国银行股份有限公司 Setting method, device, server and medium for incidence relation of multiple user accounts
CN113179282A (en) * 2021-05-27 2021-07-27 北京创新乐知网络技术有限公司 Method and device for merging account numbers and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116192539A (en) * 2023-04-28 2023-05-30 北京轻松筹信息技术有限公司 Method, device, equipment and storage medium for merging data after user login
CN116192539B (en) * 2023-04-28 2023-08-08 北京轻松筹信息技术有限公司 Method, device, equipment and storage medium for merging data after user login

Similar Documents

Publication Publication Date Title
CN107679868B (en) Rights and interests information management method, device and equipment and computer readable storage medium
CN106844372B (en) Logistics information query method and device
CN108701177A (en) The authentication that equipment enables
CN108171527B (en) Customer information management system and method
CN106779673B (en) Electronic payment method and system
CA3028753A1 (en) Wireless based methods and systems for federated key management, asset management, and financial transactions
CN112269926A (en) Data pushing method and related device
US20190149956A1 (en) Systems and methods for vehicle telematics registration
CN108702334A (en) The method and system of distributed testing for the network configuration for zero rate
US10796273B2 (en) Platform for management and organization of personal property
CN111476595A (en) Product pushing method and device, computer equipment and storage medium
JP2022056386A (en) Computer implementation method for automatically detecting and cataloging article or property at some place or of some object, system using computer, and computer program product (automatic identification on property by computer)
CN113794678A (en) Method and device compatible with multiple login modes and computer storage medium
CN109672694A (en) A kind of method, apparatus and associated component of information collection
CN112837147A (en) Business application handling implementation method and device and computer equipment
TWM569449U (en) Smart attendance system and its mobile device
CN111784931B (en) Method and apparatus for sharing distribution boxes
CN104243597A (en) Business card dispensing and collecting system and business card dispensing and collecting method based on WLAN (wireless local area network) environment
CN117034358A (en) Service certificate processing method and device and computer equipment
CN110942567A (en) Self-service equipment data processing method, device and system
CN113489714B (en) Multi-module-based intelligent message cross processing method and system
CN112561272B (en) Data processing method for electronic sign-in and related product
US20220358503A1 (en) Systems and methods for providing in-person status to a user device
CN114022256A (en) Information acquisition method, terminal, system and medium based on offline shopping
CN113783834B (en) Method and related device for integrating and compatible redundant data in multiple login modes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211214