CN112995018B - Message processing method, device, equipment and storage medium - Google Patents
Message processing method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN112995018B CN112995018B CN202110178910.9A CN202110178910A CN112995018B CN 112995018 B CN112995018 B CN 112995018B CN 202110178910 A CN202110178910 A CN 202110178910A CN 112995018 B CN112995018 B CN 112995018B
- Authority
- CN
- China
- Prior art keywords
- instant message
- target instant
- message
- identity
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 132
- 238000012795 verification Methods 0.000 claims description 43
- 238000000034 method Methods 0.000 claims description 37
- 238000001514 detection method Methods 0.000 claims description 34
- 238000012216 screening Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000006399 behavior Effects 0.000 description 15
- 230000008569 process Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000004148 unit process Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a message processing method, a message processing device, message processing equipment and a storage medium, relates to the technical field of computers, and further relates to an information flow technology. The specific implementation scheme is as follows: identifying an identity of a sender of the target instant message; the identity is an enterprise user or an individual user; and processing the target instant message according to the message processing logic associated with the identity recognition result, so that different requirements of different types of users can be met, and the user experience is improved.
Description
Technical Field
The application relates to the technical field of computers, in particular to an information flow technology.
Background
IM (Instant Messaging, instant Messaging or Instant Messaging) refers to a service capable of instantly sending and receiving internet messages and the like, and is a mainstream communication mode on the internet at present. However, the existing processing method of instant messages cannot meet the personalized requirements of different types of users, and needs to be improved urgently.
Disclosure of Invention
The application provides a message processing method, a message processing device, message processing equipment and a storage medium.
According to an aspect of the present application, there is provided a message processing method, including:
identifying an identity of a sender of the target instant message; the identity is an enterprise user or an individual user;
and processing the target instant message according to the message processing logic associated with the identity recognition result.
According to another aspect of the present application, there is provided a message processing apparatus, including:
the identity recognition module is used for recognizing the identity of the sender of the target instant message; the identity is an enterprise user or an individual user;
and the processing module is used for processing the target instant message according to the message processing logic associated with the identity recognition result.
According to another aspect of the present application, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a message processing method as described in any of the embodiments of the present application.
According to another aspect of the present application, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform a message processing method according to any one of the embodiments of the present application.
According to another aspect of the present application, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the message processing method according to any of the embodiments of the present application.
According to the technology of the application, different requirements of different types of users can be met, and user experience is improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 is a flowchart of a message processing method according to an embodiment of the present application;
fig. 2A is a flowchart of another message processing method provided in an embodiment of the present application;
fig. 2B is a schematic diagram of a message processing procedure provided according to an embodiment of the present application;
fig. 2C is a schematic structural diagram of a first processing unit according to an embodiment of the present disclosure;
fig. 3 is a flowchart of another message processing method provided according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a message processing apparatus according to an embodiment of the present application;
fig. 5 is a block diagram of an electronic device for implementing a message processing method according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a flowchart of a message processing method according to an embodiment of the present application. The embodiment of the application is suitable for the situation of how to process the messages (specifically, the messages can be instant messages) in the field of information flow so as to meet the requirements of different types of users (including enterprise users and individual users). The embodiment may be performed by a message processing apparatus, which may be implemented in software and/or hardware, and which may be integrated in an electronic device configured with message processing functions, such as a server. As shown in fig. 1, the message processing method includes:
s101, identify the identity of the sender of the target instant message.
Optionally, the target instant message in this embodiment may be obtained by the service party performing processing such as encapsulation on a message that needs to be sent by the sender according to a set message protocol. For example, when any sender has an instant message sending requirement, a message content may be input on an interface provided by a service side, and then the service side may determine a type of a message by identifying the message content input by the sender, determine a sending mode of the message by identifying a message receiver selected by the sender and a set reply mode, and the like, and simultaneously set a unique identifier for the message that the sender needs to send this time, and obtain identification information of the sender and identification information of the receiver, and the like, and then encapsulate the message content, the type of the message, the sending mode, the identifier of the message, the identification information of the sender, the identification information of the receiver, and the like based on a message structure in a set message protocol, so as to form a target instant message. The service party is an application terminal with an instant message sending function, such as an App terminal and a PC terminal; the identification information of the sender is used for uniquely identifying the sender and can be the id of the sender; correspondingly, the identification information of the receiver is used for uniquely identifying the receiver, and can be the id of the receiver.
Further, after obtaining the target instant message, the service party may request to execute the server of this embodiment, and then this embodiment may obtain the target instant message sent by the service party, and may identify the identity of the sender of the target instant message. Specifically, the identification information of the sender is obtained from the target instant message, the login account of the sender is obtained according to the identification information of the sender, then the obtained login account is used as an index, the inquiry is carried out from a pre-constructed enterprise user account library, and if no matched account exists in the enterprise user account library, the identity of the sender can be determined to be a personal user; if there is a matching account in the enterprise user account repository, the identity of the sender may be determined to be the enterprise user. In this embodiment, the name of the enterprise user refers to an account registered by the sender on behalf of an enterprise or a merchant; an individual user refers to an account that the sender is registered on behalf of.
Or, the identification information of the sender may be obtained from the target instant message, and then an identity query request including the identification information of the sender may be sent to the service provider, so as to request the service provider to feed back the identity of the sender, and the like.
And S102, processing the target instant message according to the message processing logic associated with the identity recognition result.
In this embodiment, the message processing logic is a way to process a message; optionally, the message processing logic for different identity associations is different. Further, the message processing logic associated with the enterprise user may include message participant identity verification logic, message verification logic, and the like. The individual user associated message processing logic may include message verification logic and the like. It should be noted that, in this embodiment, the message verification logic associated with the enterprise user relates to the verification of the service level, and the message verification logic associated with the individual user relates to the basic content verification, and the verification of the two on the message is completely different.
Optionally, if the identity of the sender is a personal user, the target instant message may be processed according to a message processing logic associated with the personal user. If the identity of the sender is an enterprise user, the target instant message can be processed according to at least one of the identity verification logic and the message verification logic of the message participant associated with the enterprise user. For example, the targeted instant message may be processed according to message participant identity verification logic associated with the enterprise user. Specifically, the identification information of the sender and the identification information of the receiver may be obtained from the target instant message, the identity information (such as an identification number) of the sender is obtained according to the identification information of the sender, the identity information of the receiver is obtained according to the identification information of the receiver, and further, the validity of the identity of the sender and the validity of the identity of the receiver may be identified according to the identity information of the sender and the identity information of the receiver, and further, if the identity of any one of the sender and the receiver is illegal, the target instant message is shielded.
It should be noted that, the existing instant message processing method does not distinguish the user identity, and uniformly chats with other users by using the consumer identity, so that for enterprise users, the general instant message processing method cannot meet the special requirements (such as the requirement of operating the account); the embodiment of the application provides an instant message processing logic for distinguishing user identities, and different requirements of users with different identities can be met by processing the instant message by adopting different message processing logics aiming at the users with different identities, for example, the requirement of enterprise users for operating accounts can be met, and the user experience is improved.
According to the technical scheme of the embodiment of the application, the target instant message is processed by identifying the identity of the sender of the target instant message and adopting the message processing logic associated with the identity identification result. Compared with the prior art, the embodiment of the application provides the instant message processing logic for distinguishing the user identities, and different requirements of users with different identities can be met by processing the instant messages by adopting different message processing logics aiming at the users with different identities, for example, the requirements of enterprise users for operating accounts can be met, and the user experience is improved.
It is worth noting that, in combination with an actual scene, an enterprise user generally has a requirement for managing a self account number at a PC terminal, for example, a gourmet blogger needs to write a gourmet article at the PC terminal; and enterprise users and personal users have the requirements of instant message private communication at the App end, and the like, so that the whole message processing process can be packaged in the form of SDK and provided to a server of a service party in the form of an API interface in the embodiment. Because the service party can be an App terminal and a PC terminal, the messages processed by the server can be synchronously displayed at the App terminal and the PC terminal.
Optionally, as an optional manner of the embodiment of the present application, after processing the target instant message, if it is detected that the sender or the receiver of the target instant message is associated with at least two login terminals, the target instant message may be synchronized to the at least two login terminals in a long connection manner.
Specifically, the embodiment may record the information of the related devices logged at each end, and establish a long connection with the recorded related devices; and further detecting whether a sender and a receiver associated with the update event are associated with at least two login ends when the message update event is detected (namely, a new instant message exists), and synchronizing the target instant message to the associated login ends in a long connection mode if the sender and the receiver of the target instant message are detected to have any party associated with at least two login ends. The embodiment has the advantages that the target instant messages are synchronized to the login ends, the phenomenon that the display content of the App end is different from that of the PC end is avoided, and the user experience is improved.
Fig. 2A is a flowchart of another message processing method provided in an embodiment of the present application. On the basis of the above embodiments, the embodiments of the present application further explain the processing of the target instant message according to the identity recognition result and the message processing logic associated with the identity recognition result. As shown in fig. 2A, the message processing method includes:
s201, obtaining the target instant message.
S202, identify the identity of the sender of the target instant message. If the identity of the sender is the enterprise user, executing S203; if the identity of the sender is a personal user, S204 is performed.
S203, according to the message verification logic associated with the enterprise user, performing service verification on the target instant message.
Optionally, in this embodiment, a first processing unit and a second processing unit may be introduced, where the first processing unit may also be referred to as a service processing unit, and is mainly used for processing an instant message of an enterprise user; the second processing unit, which may also be referred to as a personal message processing unit, is used for receiving and sending instant messages and for processing instant messages for individual users. Further, the message processing method in this embodiment may be executed by servers with different functions in the server cluster in a coordinated manner, for example, S201 and S202 may be executed by servers configured with an identity recognition function, and the first processing unit and the second processing unit may be configured in different servers in the server cluster, so as to ensure high efficiency of message processing.
Specifically, with reference to fig. 2B, the server with an identity recognition function may obtain the target instant message, identify the identity of the sender of the target instant message, and send the target instant message to the server configured with the first processing unit through the instant message fusion interface when the identity of the sender of the target instant message is identified as the enterprise user, and the first processing unit processes the target instant message.
Optionally, the first processing unit is configured with a message processing logic associated with the enterprise user, and may be specifically located in a business layer of the first processing unit. As shown in fig. 2C, the message processing logic associated with the enterprise user includes data checking logic configured in the service layer, and specifically may include identity checking logic, message checking logic, and the like, where the message checking logic may further include message deduplication logic, message blocking detection logic, and the like. Further, the first processing unit further has a function of identifying a type and a sending method of the message, a domain to which the enterprise user belongs, and the like, and as shown in fig. 2C, at least the type and the sending method of the message are configured in the first processing unit, and processing of the instant message is affected by different domains, types and sending methods of the message, and the like. In this embodiment, the type of the message includes, but is not limited to, text, pictures, links, graphics, audio, and the like, and the sending mode of the message includes private mail, mass texting, automatic reply, and the like. In addition, the first processing unit is also provided with a storage layer, and the storage layer can be provided with different storage units, such as a database mysql for storing instant messages, a database redis which can be used for data caching and deduplication checking of messages, and a database es for retrieval and the like.
Optionally, in this embodiment, if the identity of the sender is an enterprise user, the first processing unit may perform service verification on the target instant message based on at least one of the configured identity verification logic and the configured message verification logic associated with the enterprise user. For example, the service verification of the target instant message by the first processing unit based on the configured message verification logic associated with the enterprise user may be to identify an identifier of the message from the target instant message, and then perform deduplication verification on the target instant message according to the identifier of the message. Specifically, the identifier of the message is identified from the target instant message, hash operation is performed on the identifier of the message to obtain a hash value associated with the target instant message, then a value at the position of the hash value associated with the target instant message in the pre-established binary queue is identified, and whether to shield the target instant message is determined according to the identification result. Optionally, if the value is 1, it is determined that the target instant message already exists, and at this time, the target instant message obtained this time may be shielded, that is, the target instant message obtained this time is not sent to the receiver of the target instant message, so as to improve the experience of the receiver; if the value is 1, it indicates that the target instant message does not exist, and at this time, the target instant message is not shielded, and the acquired target instant message can be sent to the receiver of the target instant message in a set manner.
For example, because different fields, message types, sending modes, and the like affect processing of the instant message, and further, the first processing unit performs service verification on the target instant message based on the configured message verification logic associated with the enterprise user, it may also perform shielding detection on the target instant message according to at least one of the field to which the enterprise user belongs, the type of the target instant message, and the sending mode. For example, if the domain to which the enterprise user belongs is different from the domain to which the target instant message relates, the target instant message is shielded; for another example, if the type of the message that the enterprise user belongs to does not include the type of the target instant message, the target instant message is shielded; for another example, if the sending method that can be adopted in the field to which the enterprise user belongs does not include the sending method of the target instant message, the target instant message is shielded, and the like.
It should be noted that, in the prior art, the user identities are not differentiated, and the same processing logic is set for all users, for example, only 10 instant messages can be sent in one hour, and only a private message manner can be used, and the processing logic of step S203 is introduced in this embodiment, so that under the condition that private message chat requirements of an enterprise user and other enterprise users or individual users can be met, the enterprise user can also send instant messages to the individual user and other enterprise users who concern about the enterprise user in a group sending or automatic reply manner, and further the requirement that the enterprise user operates his account can be met.
S204, the basic check is carried out on the target instant message according to the message check logic associated with the individual user, and whether the service check is carried out on the target instant message is determined according to the basic check result and the identity of the receiver of the target instant message.
Optionally, in the case that the identity of the sender of the target instant message is identified as the individual user, the target instant message may be processed based on the message verification logic associated with the individual user. Specifically, with reference to fig. 2B, when the identity of the sender of the target instant message is identified as the personal user, the target instant message is sent to the server configured with the second processing unit, the second processing unit performs basic verification on the target instant message, and if the basic verification passes and the identity of the recipient of the target instant message is the personal user, the target instant message may be directly sent to the recipient; if the basic verification is passed and the identity of the receiver of the target instant message is an enterprise user, the second processing unit can send the target instant message to the first processing unit, and the first processing unit performs service verification on the target instant message. Further, if the basic check fails, the target instant message may be masked.
In this embodiment, the personal associated message check logic may also include a message deduplication logic, a message mask detection logic, and the like, and the enterprise user associated message deduplication logic may be the same as or different from the personal user associated message deduplication logic; the enterprise user associated message mask detection logic is different from the individual user associated message mask detection logic. Optionally, according to the message verification logic associated with the individual user, the basic verification of the target instant message may be that, according to the identifier of the target instant message, the deduplication verification of the target instant message is performed, and this process may refer to the description in S203, which is not described herein again; or, according to the Huang Fanjian measurement rule, performing yellow-inverse detection on the target instant message to determine whether to shield the target instant message; and determining whether to shield the target instant message or not according to the number of times of sending the instant message by the sender and the sending number of times within a preset period of time.
It should be noted that the process of performing service check on the target instant message in S204 is the same as that in step S203. In this embodiment, when the basic verification is passed and the identity of the receiver of the target instant message is the enterprise user, the service verification is performed on the target instant message, so that it can be ensured that the target instant message sent by the individual user to the enterprise user is processable by the enterprise user, and thus, the instant message irrelevant to the field to which the enterprise user relates is prevented from being sent to the enterprise user, and the enterprise user resources are not occupied. In this embodiment, when the identity of the sender is the personal user, the processing logic of step S204 is adopted, so that the private letter chat between the personal user and other personal users and the private letter chat between the personal user and the enterprise user can be satisfied.
According to the technical scheme, the instant messages with different user identities are processed by introducing different message processing logics, compared with the prior art, the instant message processing logics capable of distinguishing the user identities are provided, the requirement that an individual user can chat with different individual users and enterprise users in a private mode can be met, the requirement that the enterprise user chat with other users (including other enterprise users and individual users) in a private mode can be met, the requirement that the enterprise user operates an account of the enterprise user can be particularly met, and user experience is greatly improved.
Optionally, on the basis of the foregoing embodiment, as an optional manner of the embodiment of the present application, after performing service verification on the target instant message, the method may further include: if the service check is passed, determining a target message pushing interface according to the identity of the sender and/or the identity of the receiver of the target instant message; and sending the target instant message to the receiver through the target message pushing interface. In this embodiment, the first processing unit may be configured with different message pushing interfaces, and is configured to send the instant message to the receiving party. Alternatively, the first processing unit may set different message push interfaces based on the identity of the sender, or may also set different message push interfaces based on the identity of the receiver, or may also set different message push interfaces based on the identity of the sender and the identity of the receiver. For example, the first processing unit may be configured with a B2B message push interface, configured to send an instant message to the receiver when the identity of the sender and the identity of the receiver are both enterprise users; a B2C message pushing interface can be configured for sending the instant message to the receiver under the condition that the identity of the sender is an enterprise user and the identity of the receiver is a personal user; and a C2B message pushing interface can be configured for sending the instant message to the receiver under the condition that the identity of the sender is a personal user and the identity of the receiver is an enterprise user.
Optionally, the first processing unit configures the message push interfaces according to different criteria, and determines that the criteria of the target message push interfaces are also different. For example, if the first processing unit configures the message pushing interface based on the identity of the sender and the identity of the receiver, the target message pushing interface may be determined according to the identity of the sender and the identity of the receiver of the target instant message; if the first processing unit configures the message pushing interface based on the identity of the sender, the target message pushing interface can be further determined according to the identity of the sender of the target instant message; if the first processing unit configures the message push interface based on the identity of the receiver, the target message push interface may be determined according to the identity of the receiver of the target instant message.
In this embodiment, a message pushing interface is configured by the first processing unit based on the identity of the sender and the identity of the receiver. Specifically, with reference to fig. 2B, if the identity of the sender is an enterprise user and the service verification passes, the first processing unit may select a target message push interface from the configured multiple message push interfaces according to the identity of the receiver of the target instant message, and send the target instant message to the receiver through the target message push interface. For example, in the case that the identity of the sender is an enterprise user, if the identity of the receiver is a personal user, the first processing unit may send the target instant message to the second processing unit through the B2C message push interface, and the second processing unit issues the target instant message to the device held by the receiver, so that the receiver may pull the target instant message from the device held by the receiver; if the identity of the receiver is an enterprise user, the first processing unit can send the target instant message to the second processing unit through the B2B message pushing interface, and the second processing unit informs the receiver through a long connection mode. Further, as shown in fig. 2C, an access layer may be further configured in the first processing unit, where the access layer is implemented in a long connection manner, and if the identity of the receiving party is an enterprise user, the first processing unit may notify the receiving party through the B2B message push interface based on the long connection manner.
If the identity of the sender is a personal user, the identity of the receiver is an enterprise user, and the service verification is passed, the first processing unit may use the C2B message push interface as a target message push interface according to the identity of the sender and the identity of the receiver of the target instant message, and notify the receiver based on a long connection mode through the C2B message push interface.
It should be noted that, in this embodiment, the first processing unit sets different message pushing interfaces based on the identity of the sender and/or the identity of the receiver, and sends a message to the receiver, so that the message is convenient to manage.
Fig. 3 is a flowchart of another message processing method provided in an embodiment of the present application. On the basis of the above embodiments, the embodiment of the present application takes the example of performing the shielding detection on the target instant message, and further explains the processing of the target instant message according to the identity recognition result and the message processing logic associated with the identity recognition result. As shown in fig. 3, the message processing method includes:
s301, acquiring the target instant message.
S302, identify the sender of the target instant message. If the identity of the sender is the enterprise user, executing S303; if the identity of the sender is a personal user, S304 is performed.
S303, shielding and detecting the target instant message according to at least one of the field of the enterprise user, the type and the sending mode of the target instant message.
Optionally, in this embodiment, the shielding detection on the target instant message according to at least one of the field to which the enterprise user belongs, the type of the target instant message, and the sending method may include the following several cases:
first, it can check whether the domain of the enterprise user is the same as the domain related to the target instant message, if not, then the target instant message is shielded. For example, if the enterprise user is a food blogger, it may be determined that the domain to which the enterprise user belongs is a food domain, and if the target instant message sent by the enterprise user is related to the medical domain, the enterprise user may be considered as a cheating account, so that the target instant message sent by the enterprise user may be shielded to avoid causing trouble to the recipient.
Second, the target instant message can be shielded and detected according to the field of the enterprise user and the type of the target instant message. For example, if the type of the target instant message is text, whether to perform the shielding processing on the target instant message may be determined according to the shielding word list in the field to which the enterprise user belongs. Specifically, the word segmentation processing is performed on the target instant message to obtain a core word of the target instant message, the obtained core word is used as an index word, the core word is searched from a pre-constructed shielding word list in the field to which the enterprise user belongs, and if the core word is hit, the shielding processing is performed on the target instant message; in this embodiment, the shielding word list in the field to which the enterprise user belongs may be an inverted index based on the shielding core word, which is convenient for quick search.
For another example, if the type of the target instant message is a picture, whether the target instant message is to be masked or not may be determined according to a mask image feature library of the field to which the enterprise user belongs. Specifically, when the type of the target instant message is a picture, the features may be extracted from the picture, the extracted features may be input into a mask image feature library in the field to which the enterprise user belongs, and if the features are hit, the target instant message may be masked.
For another example, if the type of the target instant message is a link, whether to perform the shielding processing on the target instant message may be determined according to the link format type in the field to which the enterprise user belongs. Specifically, the format type of the link may be identified when the type of the target instant message is the link, and if the link format type in the field to which the enterprise user belongs does not include the identified link format type, the target instant message is masked.
For another example, if the type of the target instant message includes at least two of a picture, a text and a link, it may be determined whether to perform a blocking process on the target instant message in combination with the above manner. For example, when the type of the target instant message includes a text and a picture, whether to perform a shielding process on the target instant message may be determined according to a shielding word list in the field to which the enterprise user belongs; under the condition that the target instant message is determined not to be shielded based on the text, whether the target instant message is shielded or not is determined according to a shielding image feature library of the field to which the enterprise user belongs; and if the target instant message is determined to need to be shielded based on the picture, shielding the target instant message.
It should be noted that, in this embodiment, whether to shield the target instant message is determined by combining the field to which the enterprise user belongs and the type of the target instant message, so that accuracy of information shielding processing is ensured, trouble caused by disordered information by a receiver can also be avoided, and flexibility of a scheme is increased.
Thirdly, if the sending mode which can be adopted in the field to which the enterprise user belongs does not include the sending mode of the target instant message, the target instant message is shielded.
Fourthly, if the type of the target instant message is not in the preset message type range, shielding the target instant message; further, if the type of the message that the enterprise user belongs to does not include the type of the target instant message, the target instant message is shielded.
Fifthly, if the sending mode of the target instant message is not within the range of the preset sending mode of the message, shielding the target instant message; or, the number of times that the enterprise user can send a message to the receiving party by a sending method (such as group sending) of the target instant message within a period of time may be preset, and if it is recognized that the number of times that the enterprise user sends the instant message by the sending method is not within the set range of times, the target instant message is shielded, and the like.
In addition, the target instant message can be shielded and detected according to the type and the sending mode of the target instant message. For example, the number of times that the enterprise user can send a message of a target instant message type (such as a picture) to the receiving party by a sending method (such as group sending) of the target instant message within a period of time may be preset, and if it is recognized that the enterprise user is not in a set range of times by the number of times that the enterprise user currently sends the instant message of the type by the sending method, the target instant message is shielded, and the like.
In order to ensure the accuracy of the shielding processing, the embodiment preferably performs shielding detection on the target instant message according to the field to which the enterprise user belongs, the type of the target instant message, and the sending mode. For example, a first-level shielding detection may be performed on the target instant message based on the field of the enterprise user and the type of the target message, and then a second-level shielding detection may be performed on the target instant message based on the sending method of the target instant message when the shielding detection result of the first-level shielding detection is that the shielding processing on the target instant message is not required, and the shielding detection result of the second-level shielding detection is the final shielding detection result of the target instant message.
S304, performing basic check on the target instant message according to the message check logic associated with the individual user, and determining whether to perform shielding detection on the target instant message according to the basic check result and the identity of the receiver of the target instant message.
It should be noted that the process of performing the shielding detection on the target instant message in S304 is the same as that in step S303, and is not described herein again.
According to the technical scheme of the embodiment of the application, under the condition that the identity of the sender is identified as the enterprise user, the target instant message is shielded and detected by combining the field to which the enterprise user belongs, the type and the sending mode of the target instant message, the accuracy of information shielding processing is ensured, and under the condition that the requirements that the enterprise user can perform private information chat with other users (including other enterprise users and personal users), the enterprise user can operate an account of the enterprise user and the like are met, troubles caused by messy information of a receiver can be avoided, and the flexibility of the scheme is increased; meanwhile, under the condition that the identity of the sender is identified as a personal user, the basic verification is passed, and the identity of the receiver of the target instant message is an enterprise user, the target instant message is shielded and detected again, so that the receiver is greatly prevented from being interfered by messy information, and the user experience is improved.
Illustratively, when the identity of the sender is an enterprise user, or the identity of the sender is a personal user and the identity of the receiver is an enterprise user, since parameters in the message screening detection logic are affected by the field to which the enterprise user belongs, the type and the sending mode of the message, and the like, as an optional mode of the embodiment of the present application, the screening detection of the target instant message may be performed according to at least one of the field to which the enterprise user belongs, the type and the sending mode of the target instant message, or the frequency control threshold may be determined according to at least one of the field to which the enterprise user belongs, the type and the sending mode of the target instant message; and according to the frequency control threshold value, carrying out shielding detection on the target instant message. In this embodiment, the frequency control threshold is one of the message screening detection logic parameters, and includes a behavior frequency threshold, which is used to limit the number of times that an enterprise user can send an instant message within a period of time; the method can also comprise a behavior proportion threshold value which is used for limiting the maximum rate that the enterprise user can view the instant message under the condition of obtaining the instant message; a behavior distribution threshold may also be included for defining time periods and locations for enterprise users to view instant messages, and the like.
Optionally, the frequency control thresholds in different fields are different; in the same field, the frequency control threshold values corresponding to different types are different; the frequency control threshold values corresponding to different sending modes are different in the same field and the same type; furthermore, the frequency control thresholds corresponding to different sending modes are different in the same type; the frequency control threshold values corresponding to different types are different in the same field and the same transmission mode. Furthermore, the frequency control threshold value can be determined according to at least one of the field of the enterprise user, the type and the sending mode of the target instant message; and according to the frequency control threshold value, shielding and detecting the target instant message. For example, a frequency control threshold (which may include at least one of a behavior frequency threshold, a behavior proportion threshold, and a behavior distribution threshold) may be determined according to the domain to which the enterprise user belongs, and then the number of times that the enterprise user has reached the current instant message sending time (in the case that the enterprise user is the sender, the target instant message may be included) may be determined, and if the determined number of times is greater than the behavior frequency threshold, it is determined that the target instant message needs to be masked; if the determined times are less than the behavior frequency threshold, calculating the average rate of the enterprise users viewing the instant messages within a period of time, and if the calculated average rate is more than the behavior proportion threshold, determining that the target instant messages need to be shielded; if the calculated rate average value is smaller than the behavior proportion threshold value, the time period of the enterprise user viewing the instant messages in a period of time can be counted, if the counted time period is not within the behavior distribution threshold value range, the target instant messages are determined to need to be shielded, and otherwise, the target instant messages do not need to be shielded.
It should be noted that, in this embodiment, in combination with multidimensional data such as the field to which the enterprise user belongs, the type of the target instant message, and the sending method, a parameter frequency control threshold is introduced, fine-grained division of the shielding detection on different dimensional data is realized, accuracy of information shielding processing is ensured, and flexibility of the scheme is increased.
Further, the message screening detection logic parameter may further include a behavior pattern, and as yet another optional mode of the embodiment of the present application, the screening detection of the target instant message may be performed according to at least one of the field to which the enterprise user belongs, the type of the target instant message, and the sending mode, or the behavior pattern may be determined according to at least one of the field to which the enterprise user belongs, the type of the target instant message, and the sending mode; and according to the behavior mode, carrying out shielding detection on the target instant message. In this embodiment, the behavioral patterns are used to characterize the tendency of the enterprise user to view the content of the instant message (e.g., enterprise user A likes to view news-like messages). Optionally, a situation that the enterprise user views the content of the instant message within a period of time may be identified, and if the identified situation is not within the range of the behavior pattern determined based on at least one of the domain to which the enterprise user belongs, the type and the sending mode of the target instant message, the target instant message is masked.
Fig. 4 is a schematic structural diagram of a message processing apparatus according to an embodiment of the present application. The embodiment of the application is suitable for the situation of how to process the messages (specifically, the messages can be instant messages) in the field of information flow so as to meet the requirements of different types of users (including enterprise users and individual users). The device can implement the message processing method described in any embodiment of the present application. As shown in fig. 4, the message processing apparatus includes:
an identity recognition module 401, configured to recognize an identity of a sender of the target instant message; the identity is an enterprise user or an individual user;
and the processing module 402 is configured to process the target instant message according to the message processing logic associated with the identity recognition result.
According to the technical scheme of the embodiment of the application, the target instant message is processed by identifying the identity of the sender of the target instant message and adopting the message processing logic associated with the identity identification result. Compared with the prior art, the embodiment of the application provides the instant message processing logic for distinguishing the user identities, and different requirements of users with different identities can be met by processing the instant messages by adopting different message processing logics aiming at the users with different identities, for example, the requirements of enterprise users for operating accounts can be met, and the user experience is improved.
Illustratively, the processing module 402 includes:
the first processing unit is used for carrying out service verification on the target instant message according to message verification logic associated with the enterprise user if the identity of the sender is the enterprise user;
and the second processing unit is used for carrying out basic check on the target instant message according to the message check logic associated with the individual user if the identity of the sender is the individual user, and determining whether to carry out service check on the target instant message according to the basic check result and the identity of the receiver of the target instant message.
Illustratively, the first processing unit includes:
and the shielding detection subunit is used for shielding and detecting the target instant message according to at least one of the field to which the enterprise user belongs, the type of the target instant message and the sending mode.
Illustratively, the mask detection subunit is specifically configured to:
determining a frequency control threshold value according to at least one of the field to which the enterprise user belongs, the type and the sending mode of the target instant message;
and according to the frequency control threshold value, carrying out shielding detection on the target instant message.
Illustratively, the mask detection subunit is further specifically configured to:
if the type of the target instant message is a text, determining whether to shield the target instant message according to a shielding word list in the field to which the enterprise user belongs;
and if the type of the target instant message is a picture, determining whether to shield the target instant message or not according to a shielding image feature library of the field to which the enterprise user belongs.
Exemplarily, the apparatus further includes:
the interface determining unit is used for determining a target message pushing interface according to the identity of the sender and/or the identity of the receiver of the target instant message if the service check is passed;
and the message sending unit is used for sending the target instant message to the receiver through the target message pushing interface.
Exemplarily, the apparatus further includes:
and the synchronization module is used for synchronizing the target instant message to the at least two login ends in a long connection mode if detecting that the sender or the receiver of the target instant message is associated with the at least two login ends.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 5 shows a schematic block diagram of an example electronic device 400 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not intended to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 5, the electronic device 500 includes a computing unit 501, which can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 502 or a computer program loaded from a storage unit 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 can also be stored. The calculation unit 501, the ROM 502, and the RAM 503 are connected to each other by a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
A number of components in electronic device 400 are connected to I/O interface 505, including: an input unit 506 such as a keyboard, a mouse, or the like; an output unit 507 such as various types of displays, speakers, and the like; a storage unit 508, such as a magnetic disk, optical disk, or the like; and a communication unit 509 such as a network card, modem, wireless communication transceiver, etc. The communication unit 509 allows the electronic device 500 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The computing unit 501 may be a variety of general-purpose and/or special-purpose processing components having processing and computing capabilities. Some examples of the computing unit 501 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 501 executes the respective methods and processes described above, such as the message processing method. For example, in some embodiments, the message processing method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 508. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 500 via the ROM 502 and/or the communication unit 509. When the computer program is loaded into the RAM 503 and executed by the computing unit 501, one or more steps of the message processing method described above may be performed. Alternatively, in other embodiments, the computing unit 501 may be configured to perform the message processing method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user may provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.
Claims (12)
1. A method of message processing, comprising:
identifying an identity of a sender of the target instant message; the identity is an enterprise user or an individual user;
processing the target instant message according to the message processing logic associated with the identity recognition result;
wherein, according to the message processing logic associated with the identity recognition result, the processing of the target instant message comprises:
if the identity of the sender is an enterprise user, performing service verification on the target instant message according to the message verification logic associated with the enterprise user;
if the identity of the sender is the personal user, performing basic check on the target instant message according to message check logic associated with the personal user, and determining whether to perform service check on the target instant message according to a basic check result and the identity of a receiver of the target instant message;
wherein, according to the message verification logic associated with the enterprise user, performing service verification on the target instant message comprises:
and shielding and detecting the target instant message according to at least one of the field to which the enterprise user belongs, the type and the sending mode of the target instant message.
2. The method of claim 1, wherein the detecting the target instant message according to at least one of the domain to which the enterprise user belongs, the type of the target instant message and the sending mode comprises:
determining a frequency control threshold value according to at least one of the field to which the enterprise user belongs, the type and the sending mode of the target instant message;
and shielding and detecting the target instant message according to the frequency control threshold value.
3. The method of claim 1, wherein the screening detection of the target instant message according to the domain to which the enterprise user belongs and the type of the target instant message comprises:
if the type of the target instant message is a text, determining whether to shield the target instant message according to a shielding word list in the field to which the enterprise user belongs;
and if the type of the target instant message is a picture, determining whether to shield the target instant message or not according to a shielding image feature library of the field to which the enterprise user belongs.
4. The method of claim 1, further comprising:
if the service check is passed, determining a target message pushing interface according to the identity of the sender and/or the identity of the receiver of the target instant message;
and sending the target instant message to the receiver through the target message pushing interface.
5. The method of claim 1, further comprising:
and if the condition that the sender or the receiver of the target instant message is associated with at least two login ends is detected, synchronizing the target instant message to the at least two login ends in a long connection mode.
6. A message processing apparatus comprising:
the identity recognition module is used for recognizing the identity of a sender of the target instant message; the identity is an enterprise user or an individual user;
the processing module is used for processing the target instant message according to the message processing logic associated with the identity recognition result;
wherein the processing module comprises:
the first processing unit is used for carrying out service verification on the target instant message according to the message verification logic associated with the enterprise user if the identity of the sender is the enterprise user;
a second processing unit, configured to perform, if the identity of the sender is a personal user, a basic check on the target instant message according to a message check logic associated with the personal user, and determine whether to perform a service check on the target instant message according to a basic check result and an identity of a recipient of the target instant message;
wherein the first processing unit comprises:
and the shielding detection subunit is used for shielding and detecting the target instant message according to at least one of the field to which the enterprise user belongs, the type of the target instant message and the sending mode.
7. The apparatus of claim 6, wherein the mask detection subunit is specifically configured to:
determining a frequency control threshold value according to at least one of the field to which the enterprise user belongs, the type and the sending mode of the target instant message;
and shielding and detecting the target instant message according to the frequency control threshold value.
8. The apparatus of claim 6, wherein the mask detection subunit is further specifically configured to:
if the type of the target instant message is a text, determining whether to shield the target instant message according to a shielding word list in the field to which the enterprise user belongs;
and if the type of the target instant message is a picture, determining whether to shield the target instant message or not according to a shielding image feature library of the field to which the enterprise user belongs.
9. The apparatus of claim 6, further comprising:
an interface determining unit, configured to determine a target message push interface according to an identity of a sender and/or an identity of a receiver of the target instant message if the service check passes;
and the message sending unit is used for sending the target instant message to the receiver through the target message pushing interface.
10. The apparatus of claim 6, further comprising:
and the synchronization module is used for synchronizing the target instant message to at least two login ends in a long connection mode if detecting that the sender or the receiver of the target instant message is associated with at least two login ends.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the message processing method of any one of claims 1-5.
12. A non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the message processing method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110178910.9A CN112995018B (en) | 2021-02-09 | 2021-02-09 | Message processing method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110178910.9A CN112995018B (en) | 2021-02-09 | 2021-02-09 | Message processing method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112995018A CN112995018A (en) | 2021-06-18 |
CN112995018B true CN112995018B (en) | 2023-02-21 |
Family
ID=76392711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110178910.9A Active CN112995018B (en) | 2021-02-09 | 2021-02-09 | Message processing method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112995018B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114979983B (en) * | 2022-04-18 | 2023-08-15 | 中移互联网有限公司 | Message processing method and device and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101047662A (en) * | 2006-04-20 | 2007-10-03 | 华为技术有限公司 | Method and system for implementing multi-identity immediate message communication and present service of single account number |
US8331618B1 (en) * | 2008-12-16 | 2012-12-11 | Symantec Corporation | Method and apparatus for monitoring instant messaging with visual identification |
CN109005104A (en) * | 2018-07-19 | 2018-12-14 | 腾讯科技(深圳)有限公司 | A kind of instant communicating method, device, server and storage medium |
CN112115511A (en) * | 2020-09-17 | 2020-12-22 | 政采云有限公司 | Authority verification method, device and system, and service authority configuration method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7512662B2 (en) * | 2003-12-19 | 2009-03-31 | International Business Machines Corporation | System and method for user registry management of messages |
WO2014172881A1 (en) * | 2013-04-25 | 2014-10-30 | Tencent Technology (Shenzhen) Company Limited | Preventing identity fraud for instant messaging |
-
2021
- 2021-02-09 CN CN202110178910.9A patent/CN112995018B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101047662A (en) * | 2006-04-20 | 2007-10-03 | 华为技术有限公司 | Method and system for implementing multi-identity immediate message communication and present service of single account number |
US8331618B1 (en) * | 2008-12-16 | 2012-12-11 | Symantec Corporation | Method and apparatus for monitoring instant messaging with visual identification |
CN109005104A (en) * | 2018-07-19 | 2018-12-14 | 腾讯科技(深圳)有限公司 | A kind of instant communicating method, device, server and storage medium |
CN112115511A (en) * | 2020-09-17 | 2020-12-22 | 政采云有限公司 | Authority verification method, device and system, and service authority configuration method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112995018A (en) | 2021-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104539514B (en) | Information filtering method and device | |
US9131341B2 (en) | System and method for locating a mobile device | |
JP2015513133A (en) | Spam detection system and method using character histogram | |
CN108595448B (en) | Information pushing method and device | |
CN112561332B (en) | Model management method, device, electronic equipment, storage medium and program product | |
CN112995018B (en) | Message processing method, device, equipment and storage medium | |
CN115423030A (en) | Equipment identification method and device | |
CN114091704B (en) | Alarm suppression method and device | |
CN107835115A (en) | A kind of information operation method, equipment and medium | |
CN110619253B (en) | Identity recognition method and device | |
CN108090193B (en) | Abnormal text recognition method and device | |
CN105490913B (en) | Instant message processing method and device | |
US20180139160A1 (en) | Method, system and server for removing alerts | |
CN106487653B (en) | Message processing method and server | |
CN117093627A (en) | Information mining method, device, electronic equipment and storage medium | |
US9722956B2 (en) | Managing electronic mail for an end-user that is unavailable | |
CN109087097B (en) | Method and device for updating same identifier of chain code | |
CN109214846B (en) | Information storage method and device | |
CN114449031B (en) | Information acquisition method, device, equipment and storage medium | |
CN113676531B (en) | E-commerce flow peak clipping method and device, electronic equipment and readable storage medium | |
CN113114557B (en) | Message sending method and device, electronic equipment and storage medium | |
CN115080003A (en) | Zero code platform operation method and device, electronic equipment and storage medium | |
CN114064803A (en) | Data synchronization method and device | |
CN113642919A (en) | Risk control method, electronic device, and storage medium | |
CN113723090A (en) | Position data acquisition method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |