CN110874730B - Information processing method, information processing device and mobile terminal - Google Patents

Information processing method, information processing device and mobile terminal Download PDF

Info

Publication number
CN110874730B
CN110874730B CN201811023896.XA CN201811023896A CN110874730B CN 110874730 B CN110874730 B CN 110874730B CN 201811023896 A CN201811023896 A CN 201811023896A CN 110874730 B CN110874730 B CN 110874730B
Authority
CN
China
Prior art keywords
information identification
current information
strategy
identification
identification strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811023896.XA
Other languages
Chinese (zh)
Other versions
CN110874730A (en
Inventor
任利宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201811023896.XA priority Critical patent/CN110874730B/en
Publication of CN110874730A publication Critical patent/CN110874730A/en
Application granted granted Critical
Publication of CN110874730B publication Critical patent/CN110874730B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application is applicable to the technical field of communication, and provides an information processing method, an information processing device, a mobile terminal and a computer readable storage medium, comprising the following steps: acquiring a current information identification strategy of a preset application program, wherein the information identification strategy is used for identifying the type of information received by the preset application program and is stored in an extensible markup language (XML) file form; judging whether the current information identification strategy is invalid or not; and if the current information identification strategy is invalid, updating the current information identification strategy in the XML file, and taking the updated information identification strategy as the current information identification strategy. Through the method and the device, the information received by the preset application program can be identified more quickly and accurately.

Description

Information processing method, information processing device and mobile terminal
Technical Field
The present application belongs to the field of communication technologies, and in particular, relates to an information processing method, an information processing apparatus, a mobile terminal, and a computer-readable storage medium.
Background
With the wide popularization of mobile terminals such as smart phones and tablet computers, most mobile terminals are installed with application programs such as WeChat, microblog and QQ, and most of the application programs have the function of electronic red envelope robbing.
In the prior art, in order to improve the efficiency of electronic red packet robbing, a fixed electronic red packet identification strategy is usually adopted to identify the electronic red packet. However, when the application program is upgraded or the version of the application program is not matched with the electronic red packet identification policy, the electronic red packet identification policy is easily disabled, and the electronic red packet cannot be identified quickly and accurately.
Disclosure of Invention
In view of the above, the present application provides an information processing method, an information processing apparatus, a mobile terminal and a computer readable storage medium, which can improve the efficiency and accuracy of information (e.g. electronic red envelope) identification.
A first aspect of the present application provides an information processing method, including:
acquiring a current information identification strategy of a preset application program, wherein the information identification strategy is used for identifying the type of information received by the preset application program and is stored in an extensible markup language (XML) file form;
judging whether the current information identification strategy is invalid or not;
and if the current information identification strategy is invalid, updating the current information identification strategy in the XML file, and taking the updated information identification strategy as the current information identification strategy.
A second aspect of the present application provides an information processing apparatus comprising:
the information identification module is used for acquiring a current information identification strategy of a preset application program, wherein the information identification strategy is used for identifying the type of information received by the preset application program and is stored in an extensible markup language (XML) file form;
the judging module is used for judging whether the current information identification strategy is invalid or not;
and the processing module is used for updating the current information identification strategy in the XML file when the current information identification strategy fails, and taking the updated information identification strategy as the current information identification strategy.
A third aspect of the present application provides a mobile terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the information processing method according to the first aspect when executing the computer program.
A fourth aspect of the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the information processing method according to the first aspect described above.
A fifth aspect of the present application provides a computer program product comprising a computer program which, when executed by one or more processors, performs the steps of the information processing method as described in the first aspect above.
Compared with the prior art, the application has the beneficial effects that: the method and the device for identifying the information of the application program have the advantages that the current information identification strategy of the application program is obtained in advance, whether the current information identification strategy is invalid or not is judged, and the current information identification strategy is updated in time when the current information identification strategy is determined to be invalid, so that the efficiency and the accuracy of information identification can be effectively improved. Especially for the electronic red packet, when the application program is upgraded or the version of the application program is not matched with the electronic red packet identification strategy, the efficiency and the accuracy of electronic red packet identification can be ensured by updating the electronic red packet identification strategy in time, so that the user experience is greatly improved, and the electronic red packet identification method has high usability and practicability.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of an implementation of an information processing method according to an embodiment of the present application;
fig. 2 is a schematic implementation flowchart of an information processing method provided in the second embodiment of the present application;
fig. 3 is a schematic flow chart of an implementation of an information processing method provided in the third embodiment of the present application;
fig. 4 is a schematic implementation flowchart of an information processing method according to a fourth embodiment of the present application;
fig. 5 is a schematic diagram of an information processing apparatus provided in the fifth embodiment of the present application;
fig. 6 is a schematic diagram of a mobile terminal according to a sixth embodiment of the present application;
fig. 7 is a schematic diagram of a mobile terminal according to a seventh embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the mobile terminals described in embodiments of the present application include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a mobile terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the mobile terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The mobile terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a digital video camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the mobile terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
It should be understood that, the sequence numbers of the steps in this embodiment do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of this embodiment.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
Referring to fig. 1, which is a schematic diagram of an implementation flow of an information processing method provided in an embodiment of the present application, the information processing method may include the following steps:
and step S101, acquiring the current information identification strategy of the preset application program.
In the embodiment of the application, the current information identification policy of the preset application program can be acquired when the preset application program is started by the mobile terminal, or the current information identification policy of the preset application program can be acquired when the policy switching function of the preset application program is detected to be started.
The preset application program refers to an application program of a certain type or having a certain function selected by a user from application programs installed in the mobile terminal, for example, an application program having an electronic packet capturing/generating function, such as WeChat, Paibao, QQ, and the like. Optionally, the user may modify the selected application according to actual needs.
The information identification policy is used for identifying the type of the information received by the preset application program. Such as a policy identifying electronic red packets. Take the electronic red envelope identification strategy as an example for explanation:
whether the information contains a picture or not can be judged, and if the information contains the picture, a color histogram of the picture is obtained;
calculating the similarity between the color histogram of the picture and a preset color histogram (the color histogram of a standard electronic red packet);
and if the similarity between the color histogram of the picture and the preset color histogram exceeds a preset threshold value, determining that the type of the information is an electronic red packet.
Alternatively, the first and second electrodes may be,
judging whether the information contains a picture, if so, calculating the ratio of the length to the width of the picture;
and comparing the ratio of the length to the width of the picture with the ratio of the length to the width of the picture of the standard red packet, and if the ratio is the same, determining that the type of the information is the electronic red packet.
The electronic red envelope identification policy may further include: when a preset application program receives information, acquiring ID information of a control to which the information belongs, and if the ID information of the control to which the information belongs is matched with pre-stored ID information, determining that the information is electronic red packet information; or acquiring text information of a control to which the information belongs; if the text information of the control exists in the prestored text information, determining that the information is electronic red packet information; or acquiring the position information of the control to which the information belongs in the current display interface of the preset application program; and if the acquired position information is matched with the position information stored in advance, determining that the information is electronic red packet information and the like.
The information described in the present application is not limited to the electronic red packet, and the information may also be characters, animal images, and person images.
Preferably, in order to enhance the portability of data and facilitate and update the data quickly, the information identification policy is stored in the form of an extensible markup language XML file.
Step S102, judging whether the current information identification strategy is invalid.
In the embodiment of the application, whether the current information identification strategy is invalid or not can be judged according to the historical identification accuracy of the current information identification strategy; or after a preset application program receives information, determining whether the current information identification strategy is invalid by judging whether the current information identification strategy identifies the type of the information received by the preset application program within a first preset time. Of course, other methods for determining whether the current information identification policy is invalid may also be used, which is not limited herein.
Step S103, if the current information identification strategy is invalid, updating the current information identification strategy in the XML file, and taking the updated information identification strategy as the current information identification strategy.
In this embodiment of the application, the updating the current information identification policy in the XML file may include: and updating the characteristic information in the current information identification strategy, or replacing the current information identification strategy with other information identification strategies.
The feature information may include, but is not limited to, ID information, text information, attribute information, location information, and the like of the control to which the information belongs. For example, taking an electronic red packet as an example, when an image of the electronic red packet is updated, the ratio of the length to the width of the image may change, so that attribute information in an electronic red packet identification policy, that is, the ratio of the length to the width of the image, needs to be updated in time to ensure the accuracy of electronic red packet identification.
Optionally, in the embodiment of the present application, after it is determined that the current information identification policy is invalid, the user may be further prompted, and after an update instruction sent by the user is received, the current information identification policy in the XML file is updated. The prompting mode may be a voice prompt or a text prompt, which is not limited herein.
According to the embodiment of the application, the current information identification strategy of the application program is obtained in advance, whether the current information identification strategy is invalid or not is judged, and the current information identification strategy is updated in time when the current information identification strategy is determined to be invalid, so that the efficiency and the accuracy of information identification can be effectively improved.
Referring to fig. 2, it is a schematic diagram of an implementation flow of an information processing method provided in the second embodiment of the present application, where the information processing method may include the following steps:
step S201, acquiring a current information identification policy of a preset application.
The step is the same as step S101, and reference may be made to the related description of step S101, which is not repeated herein.
Step S202, obtaining the identification accuracy of the current information identification strategy from the historical identification record.
Specifically, the number of times that the identification result of the current information identification policy is correct in the preset identification number of times is obtained from a historical identification record, and the ratio of the number of times that the identification result is correct to the preset identification number of times is used as the identification accuracy of the current information identification policy.
Taking an electronic red packet as an example, the obtaining of the identification accuracy of the current electronic red packet identification policy may include:
and acquiring the times that the identification result of the current electronic red packet identification strategy is correct in preset identification times, and taking the ratio of the times that the identification result is correct to the preset identification times as the identification accuracy of the electronic red packet identification strategy.
Optionally, the embodiment of the present application may further include:
detecting whether the current electronic red packet identification strategy identifies the electronic red packet at the current moment, and simultaneously detecting whether the electronic red packet is disassembled within a first preset time;
if it is detected that the current electronic red packet identification strategy identifies the electronic red packet at the current moment and it is detected that the electronic red packet is disassembled within a first preset time, or it is detected that the current electronic red packet identification strategy does not identify the electronic red packet at the current moment and it is detected that the electronic red packet is not disassembled within the first preset time, it is determined that the identification result of the current electronic red packet identification strategy is correct;
and if the current electronic red packet identification strategy is detected to identify the electronic red packet at the current moment and no electronic red packet is detected to be disassembled within the first preset time, or the current electronic red packet identification strategy is detected to identify no electronic red packet at the current moment and no electronic red packet is detected to be disassembled within the first preset time, determining that the identification result of the current electronic red packet identification strategy is incorrect.
Step S203, if the identification accuracy is lower than the preset accuracy, determining that the current information identification strategy is invalid, updating the current information identification strategy in the XML file, and taking the updated information identification strategy as the current information identification strategy.
Wherein the updating the current information identification policy in the XML file may include: and updating the characteristic information in the current information identification strategy, or replacing the current information identification strategy with other information identification strategies. The feature information may include, but is not limited to, ID information, text information, attribute information, location information, etc. of the control to which the information belongs. For example, taking an electronic red packet as an example, when an image of the electronic red packet is updated, the ratio of the length to the width of the image may change, so that attribute information in an electronic red packet identification policy, that is, the ratio of the length to the width of the image, needs to be updated in time to ensure the accuracy of electronic red packet identification.
According to the embodiment of the application program identification method and device, whether the current information identification strategy of the preset application program is effective or not can be accurately judged according to the historical identification accuracy of the current information identification strategy of the preset application program.
Referring to fig. 3, it is a schematic diagram of an implementation flow of an information processing method provided in the third embodiment of the present application, where the information processing method may include the following steps:
step S301, acquiring a current information identification strategy of the preset application program.
The step is the same as step S101, and reference may be made to the related description of step S101, which is not repeated herein.
Step S302, acquiring the number N of the recognition results of which the feedback time is within a second preset time from the M recognition results fed back by the current information recognition policy.
Wherein M is an integer greater than zero, and N is greater than or equal to zero and less than or equal to M.
Step S303, calculating the ratio of N to M
Figure BDA0001788056330000091
Step S304, if the ratio is not equal to the predetermined value
Figure BDA0001788056330000092
And if the current information identification strategy is less than the preset threshold value, determining that the current information identification strategy is invalid, updating the current information identification strategy in the XML file, and taking the updated information identification strategy as the current information identification strategy.
The above process is described by taking the information as an electronic red packet as an example, when a preset application program performs electronic red packet identification on received information by using a current electronic red packet identification strategy, an identification result is usually fed back, when the preset application program is upgraded or an application program version is not matched with the current electronic identification strategy, the time for feeding back the identification result by using the current electronic red packet identification strategy is possibly long, the identification efficiency of the electronic red packet is low, and in order to improve the identification efficiency of the electronic red packet, a user can conveniently quickly rob the electronic red packet, and at this moment, the current electronic red packet identification strategy can be switched to the electronic red packet identification strategy with high identification efficiency of the preset application program. The method comprises the steps of starting timing by using a timer when a preset application program receives information, finishing timing when an identification result fed back by the current electronic red packet identification strategy is received, and taking the timing duration of the timer as the feedback time of the identification result.
In order to accurately obtain the identification efficiency of the current electronic red packet identification strategy, the identification results of the current electronic red packet identification strategy on the M information can be counted, since one information usually corresponds to one identification result, the M information corresponds to the M identification results, the number N of the identification results of the M identification results fed back by the current electronic red packet identification strategy, the feedback time of which is within the second preset time, is obtained, and the ratio of the N to the M is calculated
Figure BDA0001788056330000093
As the recognition efficiency of the current electronic red packet recognition strategy, if the ratio is
Figure BDA0001788056330000094
If the current electronic red packet identification strategy is smaller than a preset threshold value, determining that the current electronic red packet identification strategy is invalid, wherein the identification efficiency of the current electronic red packet identification strategy on the electronic red packet is low, and switching the current electronic red packet identification strategy to the electronic red packet identification strategy with high identification efficiency; if the ratio is
Figure BDA0001788056330000101
If the current electronic red packet identification strategy is larger than or equal to the preset threshold value, determining that the current electronic red packet identification strategy is not invalid, wherein the identification efficiency of the current electronic red packet identification strategy on the electronic red packet is higher, and the current electronic red packet identification strategy can be continuously used for identifying the electronic red packet. The preset threshold value is used for indicating whether the current electronic red packet identification strategy is invalid or not.
According to the embodiment of the application program identification method and device, whether the current information identification strategy of the preset application program is effective or not can be judged according to the identification efficiency of the current information identification strategy of the preset application program.
Referring to fig. 4, it is a schematic diagram of an implementation flow of an information processing method provided in the fourth embodiment of the present application, where the information processing method may include the following steps:
in step S401, weights of a plurality of information identification policies of a preset application program are set.
In the embodiment of the application, a plurality of information identification policies may be set for a preset application program in advance, the weight of each information identification policy may be set, and when information identification is performed on information received by the preset application program, an information identification policy with a higher weight is preferentially used.
And step S402, acquiring the current information identification strategy of the preset application program.
The step is the same as step S101, and reference may be made to the related description of step S101, which is not repeated herein.
Step S403, determining whether the current information identification policy is invalid.
The step is the same as step S102, and reference may be made to the related description of step S102, which is not repeated herein.
Step S404, if the current information identification policy fails, detecting whether there is an information identification policy having a weight higher than that of the current information identification policy among the plurality of information identification policies.
Step S405, if a plurality of information identification strategies with weights higher than the weight of the current information identification strategy exist, replacing the current information identification strategy with the highest weight, or replacing the current information identification strategy with two information identification strategies with the sum of the weights larger than a preset threshold value.
For example, if the weight of the first information identification policy is 0.7, the weight of the second information identification policy is 0.8, the weight of the third information identification policy is 0.3, and the weight of the current information identification policy is 0.6. The weight of the first and second information recognition policies is higher than the weight of the current information recognition policy, and the second information recognition policy with the highest weight may be selected instead of the current information recognition policy, or (first, third), (second, third) or (first, second) two information recognition policies may be selected instead of the current information recognition policy. Because the sum of the weights of (first, third), (second, third) or (first, second) both information recognition strategies is greater than a preset threshold value 1.
The method and the device for identifying the information of the application program have the advantages that the weights of the information identification strategies of the preset application program are preset, and when the current information identification strategy is invalid, the information identification strategy meeting the preset conditions can be selected to replace the current information identification strategy according to the weights.
Fig. 5 is a schematic diagram of an information processing apparatus provided in the fifth embodiment of the present application, and for convenience of description, only the parts related to the embodiments of the present application are shown.
The information processing apparatus 5 may be a software unit, a hardware unit, or a combination of software and hardware unit built in a terminal device such as a mobile phone, a tablet computer, or a notebook computer, or may be integrated as an independent pendant into the terminal device such as the mobile phone, the tablet computer, or the notebook computer.
The information processing apparatus 5 may include:
an obtaining module 51, configured to obtain a current information identification policy of a preset application, where the information identification policy is used to identify a type of information received by the preset application, and the information identification policy is stored in an extensible markup language XML file form;
a judging module 52, configured to judge whether the current information identification policy fails;
and the processing module 53 is configured to update the current information identification policy in the XML file when the current information identification policy fails, and use the updated information identification policy as the current information identification policy.
Optionally, the determining module 52 is specifically configured to:
judging whether the type of the information received by the preset application program is identified by the current information identification strategy within first preset time;
if the type of the information received by the preset application program is not identified or the identified type of the information is not correct within the first preset time, determining that the current information identification strategy is invalid.
Optionally, the determining module 52 is specifically configured to:
acquiring the identification accuracy of the current information identification strategy from a historical identification record;
and if the identification accuracy is lower than the preset accuracy, determining that the current information identification strategy is invalid.
Optionally, the determining module 52 is specifically configured to:
and acquiring the times that the identification result of the current information identification strategy is correct in preset identification times from a historical identification record, and taking the ratio of the times that the identification result is correct to the preset identification times as the identification accuracy of the current information identification strategy.
Optionally, the determining module 52 is specifically configured to:
acquiring the number N of identification results of which the feedback time is within a second preset time from M identification results fed back by the current information identification strategy, wherein M is an integer larger than zero, and N is larger than or equal to zero and smaller than or equal to M;
calculating the ratio of N to M
Figure BDA0001788056330000121
If the ratio is
Figure BDA0001788056330000122
And if the current information identification strategy is less than the preset threshold value, determining that the current information identification strategy is invalid.
Optionally, the processing module 53 is specifically configured to:
and updating the characteristic information in the current information identification strategy, or replacing the current information identification strategy with other information identification strategies.
Optionally, the information processing apparatus 5 further includes:
and the setting module is used for setting the weights of the information identification strategies.
Correspondingly, the processing module 53 is specifically configured to:
detecting whether an information identification strategy with a weight higher than that of the current information identification strategy exists in the plurality of information identification strategies;
and if a plurality of information identification strategies with weights higher than that of the current information identification strategy exist, replacing the current information identification strategy with the highest weight, or replacing the current information identification strategy with two information identification strategies with the sum of the weights larger than a preset threshold value.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the above division of the functional modules is only used as an example, and in practical applications, the above function distribution may be performed by different functional units and modules as needed, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above described functions. Each functional module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional modules are only used for distinguishing one functional module from another, and are not used for limiting the protection scope of the application. For the information interaction, execution process, and other contents between the modules, the specific functions and technical effects of the embodiments of the method of the present application are based on the same concept, and specific reference may be made to the section of the embodiments of the method, which is not described herein again.
Fig. 6 is a schematic diagram of a mobile terminal according to a sixth embodiment of the present application. The mobile terminal as shown in the figure may include: one or more processors 601 (only one shown); one or more input devices 602 (only one shown), one or more output devices 603 (only one shown), and memory 604. The processor 601, input device 602, output device 603, and memory 604 described above are connected by a bus 605. The memory 604 is used for storing instructions and the processor 601 is used for executing instructions stored by the memory 604. Wherein:
the processor 601 is configured to obtain a current information identification policy of a preset application program, and determine whether the current information identification policy is invalid; and if the current information identification strategy is invalid, updating the current information identification strategy in the XML file, and using the updated information identification strategy as the current information identification strategy, wherein the information identification strategy is used for identifying the type of the information received by the preset application program, and the information identification strategy is stored in an extensible markup language XML file form.
Optionally, the processor 601 is specifically configured to:
judging whether the type of the information received by the preset application program is identified by the current information identification strategy within first preset time;
if the type of the information received by the preset application program is not identified or the identified type of the information is not correct within the first preset time, determining that the current information identification strategy is invalid.
Optionally, the processor 601 is specifically configured to:
acquiring the identification accuracy of the current information identification strategy from a historical identification record;
and if the identification accuracy is lower than the preset accuracy, determining that the current information identification strategy is invalid.
Optionally, the processor 601 is specifically configured to:
and acquiring the times that the identification result of the current information identification strategy is correct in preset identification times from a historical identification record, and taking the ratio of the times that the identification result is correct to the preset identification times as the identification accuracy of the current information identification strategy.
Optionally, the processor 601 is specifically configured to:
acquiring the number N of identification results of which the feedback time is within a second preset time from M identification results fed back by the current information identification strategy, wherein M is an integer larger than zero, and N is larger than or equal to zero and smaller than or equal to M;
calculating the ratio of N to M
Figure BDA0001788056330000141
If the ratio is
Figure BDA0001788056330000142
And if the current information identification strategy is less than the preset threshold value, determining that the current information identification strategy is invalid.
Optionally, the processor 601 is specifically configured to:
and updating the characteristic information in the current information identification strategy, or replacing the current information identification strategy with other information identification strategies.
Optionally, the processor 601 is further configured to:
setting weights of a plurality of information identification strategies;
correspondingly, optionally, the processor 601 is specifically configured to:
detecting whether an information identification strategy with a weight higher than that of the current information identification strategy exists in the plurality of information identification strategies;
if a plurality of information identification strategies with weights higher than the weight of the current information identification strategy exist, the information identification strategy with the highest weight is adopted to replace the current information identification strategy, or two information identification strategies with the sum of the weights larger than a preset threshold value are adopted to replace the current information identification strategy.
It should be understood that, in the embodiment of the present Application, the Processor 601 may be a Central Processing Unit (CPU), and the Processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 602 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a microphone, a data receiving interface, and the like. The output device 603 may include a display (LCD, etc.), speakers, a data transmission interface, and the like.
The memory 604, which may include both read-only memory and random-access memory, provides instructions and data to the processor 601. A portion of the memory 604 may also include non-volatile random access memory. For example, the memory 604 may also store device type information.
Fig. 7 is a schematic diagram of a mobile terminal according to a seventh embodiment of the present application. As shown in fig. 7, the mobile terminal 7 of this embodiment includes: a processor 70, a memory 71 and a computer program 72 stored in said memory 71 and executable on said processor 70. The processor 70, when executing the computer program 72, implements the steps in the various information processing method embodiments described above, such as the steps S101 to S103 shown in fig. 1. Alternatively, the processor 70, when executing the computer program 72, implements the functions of the modules/units in the above-mentioned device embodiments, such as the functions of the modules 51 to 53 shown in fig. 5.
Illustratively, the computer program 72 may be partitioned into one or more modules/units that are stored in the memory 71 and executed by the processor 70 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 72 in the mobile terminal 7. For example, the computer program 72 may be divided into an acquisition module, a determination module, and a processing module, and each module specifically functions as follows:
the information identification module is used for acquiring a current information identification strategy of a preset application program, wherein the information identification strategy is used for identifying the type of information received by the preset application program and is stored in an extensible markup language (XML) file form;
the judging module is used for judging whether the current information identification strategy is invalid or not;
and the processing module is used for updating the current information identification strategy in the XML file when the current information identification strategy fails and taking the updated information identification strategy as the current information identification strategy.
The mobile terminal 7 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The mobile terminal may include, but is not limited to, a processor 70, a memory 71. It will be appreciated by those skilled in the art that fig. 7 is only an example of a mobile terminal 7 and does not constitute a limitation of the mobile terminal 7, and that it may comprise more or less components than those shown, or some components may be combined, or different components, e.g. the mobile terminal may further comprise input output devices, network access devices, buses, etc.
The processor 70 may be a central processing unit CPU, but may also be other general purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate arrays FPGA or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 71 may be an internal storage unit of the mobile terminal 7, such as a hard disk or a memory of the mobile terminal 7. The memory 71 may also be an external storage device of the mobile terminal 7, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the mobile terminal 7. Further, the memory 71 may also include both an internal storage unit and an external storage device of the mobile terminal 7. The memory 71 is used for storing the computer program and other programs and data required by the mobile terminal. The memory 71 may also be used to temporarily store data that has been output or is to be output.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one type of logical function division, and other division manners may be available in actual implementation, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the embodiments of the present application, and they should be construed as being included in the present application.

Claims (9)

1. An information processing method characterized by comprising:
acquiring a current information identification strategy of a preset application program, wherein the information identification strategy is used for identifying the type of information received by the preset application program and is stored in an extensible markup language (XML) file form; the preset application program is selected by a user;
judging whether the current information identification strategy is invalid or not;
if the current information identification strategy is invalid, updating the current information identification strategy in the XML file, and taking the updated information identification strategy as the current information identification strategy;
the updating the current information identification policy in the XML file includes:
and updating the characteristic information in the current information identification strategy, or replacing the current information identification strategy with other information identification strategies.
2. The information processing method of claim 1, wherein the determining whether the current information identification policy has failed comprises:
judging whether the current information identification strategy identifies the type of the information received by the preset application program within a first preset time;
and if the type of the information received by the preset application program is not identified or the identified type of the information is not correct within the first preset time, determining that the current information identification strategy is invalid.
3. The information processing method of claim 1, wherein the determining whether the current information identification policy has failed further comprises:
acquiring the identification accuracy of the current information identification strategy from a historical identification record;
and if the identification accuracy is lower than the preset accuracy, determining that the current information identification strategy is invalid.
4. The information processing method according to claim 3, wherein said obtaining the identification accuracy of the current information identification policy from the history identification record comprises:
and acquiring the times that the identification result of the current information identification strategy is correct in preset identification times from a historical identification record, and taking the ratio of the times that the identification result is correct to the preset identification times as the identification accuracy of the current information identification strategy.
5. The information processing method of claim 1, wherein the determining whether the current information identification policy has failed further comprises:
acquiring the number N of identification results of which the feedback time is within a second preset time from M identification results fed back by the current information identification strategy, wherein M is an integer larger than zero, and N is larger than or equal to zero and smaller than or equal to M;
calculating the ratio of N to M
Figure FDA0003713437010000021
If the ratio is
Figure FDA0003713437010000022
And if the current information identification strategy is smaller than a preset threshold value, determining that the current information identification strategy is invalid.
6. The information processing method of any one of claims 1 to 5, further comprising, before replacing the current information identification policy with another information identification policy:
setting weights of a plurality of information identification strategies;
correspondingly, the replacing the current information identification policy with another information identification policy includes:
detecting whether an information identification strategy with a weight higher than that of the current information identification strategy exists in the plurality of information identification strategies;
and if a plurality of information identification strategies with weights higher than that of the current information identification strategy exist, replacing the current information identification strategy with the highest weight, or replacing the current information identification strategy with two information identification strategies with the sum of the weights larger than a preset threshold value.
7. An information processing apparatus characterized by comprising:
the information identification module is used for acquiring a current information identification strategy of a preset application program, wherein the information identification strategy is used for identifying the type of information received by the preset application program and is stored in an extensible markup language (XML) file form; the preset application program is selected by a user;
the judging module is used for judging whether the current information identification strategy is invalid or not;
the processing module is used for updating the current information identification strategy in the XML file when the current information identification strategy fails and taking the updated information identification strategy as the current information identification strategy;
the updating the current information identification policy in the XML file includes:
and updating the characteristic information in the current information identification strategy, or replacing the current information identification strategy with other information identification strategies.
8. A mobile terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the information processing method according to any one of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of an information processing method according to any one of claims 1 to 6.
CN201811023896.XA 2018-09-04 2018-09-04 Information processing method, information processing device and mobile terminal Active CN110874730B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811023896.XA CN110874730B (en) 2018-09-04 2018-09-04 Information processing method, information processing device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811023896.XA CN110874730B (en) 2018-09-04 2018-09-04 Information processing method, information processing device and mobile terminal

Publications (2)

Publication Number Publication Date
CN110874730A CN110874730A (en) 2020-03-10
CN110874730B true CN110874730B (en) 2022-09-06

Family

ID=69716206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811023896.XA Active CN110874730B (en) 2018-09-04 2018-09-04 Information processing method, information processing device and mobile terminal

Country Status (1)

Country Link
CN (1) CN110874730B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111967017B (en) * 2020-07-28 2023-06-02 深圳开源互联网安全技术有限公司 Method, device, terminal equipment and storage medium for generating dependency relationship

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324617A (en) * 2012-03-20 2013-09-25 腾讯科技(深圳)有限公司 Identification method and system for history waste information
JP5736056B2 (en) * 2012-06-22 2015-06-17 グリー株式会社 Information providing apparatus, information providing method, and program
CN105898811A (en) * 2016-04-01 2016-08-24 宇龙计算机通信科技(深圳)有限公司 Terminal communication method, terminal communication device and terminal
CN106407950A (en) * 2016-09-30 2017-02-15 维沃移动通信有限公司 Facial information identification method and mobile terminal
CN107679034A (en) * 2017-09-21 2018-02-09 北京金山安全软件有限公司 Information processing method and device
CN107948149B (en) * 2017-11-21 2021-02-26 杭州安恒信息技术股份有限公司 Random forest based strategy self-learning and optimizing method and device

Also Published As

Publication number Publication date
CN110874730A (en) 2020-03-10

Similar Documents

Publication Publication Date Title
CN107181858B (en) Method and terminal for displaying notification message
CN108038112B (en) File processing method, mobile terminal and computer readable storage medium
CN107193598B (en) Application starting method, mobile terminal and computer readable storage medium
CN108629727A (en) Method, terminal and the medium of watermark are generated according to color
US9098196B2 (en) Touch system inadvertent input elimination
CN111597009B (en) Application program display method and device and terminal equipment
CN110874729B (en) Switching method and switching device for electronic red packet identification strategy and mobile terminal
CN107679222B (en) Picture processing method, mobile terminal and computer readable storage medium
CN107368735B (en) Application installation method, mobile terminal and computer readable storage medium
CN112055156B (en) Preview image updating method and device, mobile terminal and storage medium
CN110874730B (en) Information processing method, information processing device and mobile terminal
CN109104481B (en) File integrity detection method, file integrity detection device and terminal equipment
CN109492249B (en) Rapid generation method and device of design drawing and terminal equipment
CN109271266B (en) File transmission method and device and terminal equipment
CN108521460B (en) Information pushing method and device, mobile terminal and computer readable storage medium
CN107609119B (en) File processing method, mobile terminal and computer readable storage medium
CN110874723B (en) Electronic red envelope detection method, electronic red envelope detection device and mobile terminal
CN110688035B (en) Photo album processing method, photo album processing device and mobile terminal
CN108021648B (en) Question searching method and device and intelligent terminal
CN110874725B (en) Electronic red packet identification strategy selection method and device and mobile terminal
CN110875875B (en) Electronic red packet message detection method and device and terminal equipment
CN110888660B (en) Electronic red envelope detection strategy updating method and device and terminal equipment
CN110855822A (en) Strange number remarking method, strange number remarking device and mobile terminal
US20220107915A1 (en) File overwrite protection
CN110875873B (en) Information monitoring method, information monitoring device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant