CN113468503B - Identification information distribution method and device and electronic equipment - Google Patents

Identification information distribution method and device and electronic equipment Download PDF

Info

Publication number
CN113468503B
CN113468503B CN202110603924.0A CN202110603924A CN113468503B CN 113468503 B CN113468503 B CN 113468503B CN 202110603924 A CN202110603924 A CN 202110603924A CN 113468503 B CN113468503 B CN 113468503B
Authority
CN
China
Prior art keywords
cluster
account
candidate
identification information
key account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110603924.0A
Other languages
Chinese (zh)
Other versions
CN113468503A (en
Inventor
毛颖
吴帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN202110603924.0A priority Critical patent/CN113468503B/en
Publication of CN113468503A publication Critical patent/CN113468503A/en
Application granted granted Critical
Publication of CN113468503B publication Critical patent/CN113468503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the disclosure provides an identification information distribution method and device and electronic equipment. The method comprises the following steps: selecting a first key account number of the first cluster from account numbers included in the first cluster; selecting a second key account number of the candidate inheritance cluster from accounts included in the candidate inheritance cluster when the candidate inheritance cluster of the first cluster exists in at least one second cluster, wherein the candidate inheritance cluster is the second cluster including the first key account number, and the second cluster includes at least one account number; when the first cluster comprises a second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster; and when the second key account number is not included in the first cluster, new identification information is allocated to the first cluster. Thus, the embodiment of the present disclosure can realize high stability and inheritance rationality of natural person identification information.

Description

Identification information distribution method and device and electronic equipment
Technical Field
The disclosure relates to the field of computer technology, and in particular, to a method and a device for distributing identification information, and an electronic device.
Background
In the practical application scenario, different application programs are convenient for service business, and a user is required to register accounts, so that a plurality of social accounts and a plurality of social accounts can be registered by natural people over time. Usually, different accounts can represent part of attributes of natural people, and the accounts have the characteristics of use behavior death, use habit conversion and the like. These accounts can be aggregated in the natural human dimension to assist in the execution of the business of the application.
In engineering applications such as multi-data fusion and same person identification, an identity number (ID) cluster corresponding to the back of a natural person is often used, and the cluster can be used as identification information of the natural person. However, when the cluster itself is directly used as the identification information, since the intra-cluster ID (i.e., account number) is often changed slightly, the corresponding cluster is changed, and thus any change in the intra-cluster ID causes the identification information of the natural person to be changed. Under the background, it is difficult to track a complete life cycle of a natural person, and the effects of stability and inheritance cannot be achieved.
As can be seen from the above description, in the related art, the cluster itself is used as one type of identification information of the natural person, and even if the cluster structure is slightly changed, the identification information of the natural person is changed, so that the identification information of the natural person is frequently changed, that is, the stability is poor.
Disclosure of Invention
In order to solve the technical problems described in the background art, the embodiments of the present disclosure provide a method, an apparatus, and an electronic device for distributing identification information, where the technical solution of the present disclosure is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided a method for allocating identification information, the method including:
Selecting a first key account number of a first cluster from account numbers included in the first cluster;
selecting a second key account number of the candidate inheritance cluster from accounts included in the candidate inheritance cluster when the candidate inheritance cluster of the first cluster exists in at least one second cluster, wherein the candidate inheritance cluster is the second cluster including the first key account number, and the second cluster includes at least one account number;
when the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster;
and when the second key account number is not included in the first cluster, new identification information is allocated to the first cluster.
Optionally, before determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster when the second key account is included in the first cluster, the method further includes:
determining whether the second key account number is included in the first cluster;
wherein the determining whether the first cluster includes the second key account includes:
when the first key account number is the same as the second key account number, determining that the second key account number is included in the first cluster;
When the first key account is different from the second key account, establishing a mapping relation between other accounts except the first key account in the first cluster and the first key account as the mapping relation of the first cluster;
and determining whether the first cluster comprises the second key account or not according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.
Optionally, the determining whether the first cluster includes the second key account according to the mapping relationship of the first cluster and the mapping relationship between the first key account and the second key account includes:
when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;
and when the mapping relation between the first key account and the second key account does not exist in the mapping relation of the first cluster, determining that the second key account is not included in the first cluster.
Optionally, the method further comprises:
and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, new identification information is allocated for the first cluster.
Optionally, the selecting the first key account number of the first cluster from the account numbers included in the first cluster includes:
selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster;
the target parameters comprise at least one of the using frequency degree, the registration duration and the using duration of the account.
Optionally, the selecting, according to the target parameters of the accounts included in the first cluster, the first key account from the accounts included in the first cluster includes:
selecting a first candidate account number with the greatest frequency of use from account numbers included in the first cluster;
when one first candidate account exists, the first candidate account is used as the first key account;
when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;
when one second candidate account exists, the second candidate account is taken as the first key account;
when a plurality of second candidate accounts exist, selecting a third candidate account with the largest using time from the plurality of second candidate accounts;
When one third candidate account exists, the third candidate account is used as the first key account;
and when a plurality of third candidate accounts exist, randomly selecting the first key account from the plurality of third candidate accounts.
Optionally, the allocating new identification information to the first cluster includes:
and generating the identification information of the first cluster in a distributed mode by adopting a 64-bit long integer coding method.
According to a second aspect of embodiments of the present disclosure, there is provided an apparatus for distributing identification information, the apparatus including:
the first key account selection module is configured to select a first key account of a first cluster from accounts included in the first cluster;
a second key account selection module configured to select, when at least one second cluster includes a candidate inheritance cluster of the first cluster, a second key account of the candidate inheritance cluster from accounts included in the candidate inheritance cluster, where the candidate inheritance cluster is a second cluster including the first key account, and the second cluster includes at least one account;
the identification information inheritance module is configured to determine that the identification information of the first cluster is the identification information of the candidate inheritance cluster when the second key account is included in the first cluster;
And the reassignment module is configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.
Optionally, the apparatus further includes: a determining module configured to determine whether the second key account is included in the first cluster;
wherein, the judging module includes:
a first determining submodule configured to determine that the second key account is included in the first cluster when the first key account is the same as the second key account;
the mapping sub-module is configured to establish a mapping relationship between other accounts except the first key account in the first cluster and the first key account as a mapping relationship of the first cluster when the first key account is different from the second key account;
and the second determining submodule is configured to determine whether the first cluster comprises the second key account or not according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.
Optionally, the second determining submodule is specifically configured to:
when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;
And when the mapping relation between the first key account and the second key account does not exist in the mapping relation of the first cluster, determining that the second key account is not included in the first cluster.
Optionally, the reassignment module is further configured to:
and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, new identification information is allocated for the first cluster.
Optionally, the first key account selection module is specifically configured to:
selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster;
the target parameters comprise at least one of the using frequency degree, the registration duration and the using duration of the account.
Optionally, when the target parameters include a usage frequency, a registration duration, and a usage duration of the account, the first key account selection module is specifically configured to, when selecting the first key account from the accounts included in the first cluster according to the target parameters of the account included in the first cluster:
selecting a first candidate account number with the greatest frequency of use from account numbers included in the first cluster;
When one first candidate account exists, the first candidate account is used as the first key account;
when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;
when one second candidate account exists, the second candidate account is taken as the first key account;
when a plurality of second candidate accounts exist, selecting a third candidate account with the largest using time from the plurality of second candidate accounts;
when one third candidate account exists, the third candidate account is used as the first key account;
and when a plurality of third candidate accounts exist, randomly selecting the first key account from the plurality of third candidate accounts.
Optionally, the reassignment module, when assigning new identification information to the first cluster, is specifically configured to:
and generating the identification information of the first cluster in a distributed mode by adopting a 64-bit long integer coding method.
According to a third aspect of embodiments of the present disclosure, there is provided an electronic device comprising:
a processor;
a memory for storing the processor-executable instructions;
Wherein the processor is configured to execute the instructions to implement the method of assigning identification information provided by the present disclosure.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium, which when executed by a processor of an electronic device, causes the electronic device to implement the method of distributing identification information provided by the present disclosure.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product comprising one or more instructions which, when executed by a processor of an electronic device, enable the electronic device to perform a method of assigning identification information as provided by the present disclosure.
According to the technical scheme provided by the embodiment of the disclosure, first, a first key account number of a first cluster is selected from accounts included in the first cluster, and when a candidate inheritance cluster of the first cluster exists in at least one second cluster, a second key account number of the candidate inheritance cluster is selected from accounts included in the candidate inheritance cluster, so that when the second key account number is included in the first cluster, identification information of the first cluster is determined to be the identification information of the candidate inheritance cluster, and when the second key account number is not included in the first cluster, new identification information is allocated to the first cluster. The candidate inheritance cluster is a second cluster comprising a first key account, and the second cluster comprises at least one account.
The first cluster comprises a second key account number, which indicates that the first cluster only has small change relative to the candidate inheritance cluster; the first cluster does not include the second key account number, which indicates that the second key account number is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, so that the first cluster does not include the second key account number, which also indicates that the first cluster has relatively large change relative to the candidate inheritance cluster.
Therefore, the technical scheme of the embodiment of the disclosure can inherit the identification information of the candidate inheritance cluster when the first cluster changes slightly relative to the candidate inheritance cluster, and reassign new identification information to the first cluster when the first cluster changes greatly relative to the candidate inheritance cluster. In other words, according to the technical scheme of the embodiment of the disclosure, the change degree of the first cluster relative to the candidate inheritance cluster is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of the natural person to which the account number in the cluster belongs. Therefore, according to the technical scheme of the embodiment of the disclosure, through inheritance of the identification information of the clusters, the frequency of the identification information of the natural person is reduced, and the cluster relation of inheritance errors can be avoided when the cluster structure is changed greatly, so that the high stability and the inheritance rationality of the identification information of the natural person are realized.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
FIG. 1 is a flow chart illustrating a method of assigning identification information according to an exemplary embodiment;
FIG. 2 is a flow chart illustrating another method of allocation of identification information according to an exemplary embodiment;
FIG. 3 is a flow chart illustrating a particular implementation of a method of assigning identification information according to an exemplary embodiment;
FIG. 4 is a block diagram illustrating an identification information distribution device according to an exemplary embodiment;
FIG. 5 is a block diagram illustrating another configuration of an identification information distribution device according to an exemplary embodiment;
FIG. 6 is a block diagram of an electronic device, shown in accordance with an exemplary embodiment;
fig. 7 is a block diagram of another electronic device, shown in accordance with an exemplary embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
In order to solve the problem that in the prior art, a cluster is taken as identification information of a natural person, so that any change of account numbers in the cluster can cause the identification information of the natural person to change, and thus the stability and inheritance effects cannot be achieved, the embodiment of the disclosure provides an identification information distribution method, an identification information distribution device and electronic equipment.
According to a first aspect of the embodiments of the present disclosure, a method for distributing identification information is provided, where the method may be applied to an electronic device, such as a computer, a mobile phone, a server, and so on.
As shown in fig. 1, the method for allocating the identification information may include the steps of:
step 101: and selecting a first key account number of the first cluster from account numbers included in the first cluster.
Wherein the first cluster includes at least one account.
In addition, a natural person may have registered accounts on multiple social platforms, each of which is a representation of the natural person. Thus, multiple accounts belonging to the same natural person may form a cluster, i.e., accounts in the same cluster belong to the same natural person.
It can be seen that, in the embodiment of the present disclosure, a cluster refers to a set of social account numbers corresponding to a natural person.
In addition, the key account number of a cluster represents an account number which is important to natural people in the cluster, wherein the key account number of the cluster can be determined according to the use frequency of the account number in the cluster, for example, the account number with the largest use frequency in the cluster is used as the key account number of the cluster.
Step 102: and when the candidate inheritance cluster of the first cluster exists in at least one second cluster, selecting a second key account number of the candidate inheritance cluster from account numbers included in the candidate inheritance cluster.
The candidate inheritance cluster is a second cluster comprising the first key account, wherein the second cluster comprises at least one account.
As known from step 102, after determining the first key account of the first cluster, a second cluster including the first key account may be selected from the at least one second cluster, so as to serve as a candidate inheritance cluster of the first cluster.
For example, the first cluster includes A, B two accounts, and there are two second clusters currently existing, where one second cluster includes A, B, C three accounts, and the other second cluster includes D, E two accounts, and if the key account of the first cluster is a, the second cluster including A, B, C three accounts is a candidate inheritance cluster of the first cluster.
In addition, it should be noted that one cluster has one or zero candidate inheritance clusters.
Step 103: and when the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster.
The first cluster includes a second key account number, which indicates that the second key account number is not stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, that is, the second key account number which is important to the natural person is located in the candidate inheritance cluster and also located in the first cluster, so when the first cluster includes the second key account number, the first cluster is only slightly changed relative to the candidate inheritance cluster. Therefore, after the candidate inheritance cluster is changed into the first cluster, if the first cluster still comprises the second key account number of the candidate inheritance cluster, the first cluster can inherit the identification information of the candidate inheritance cluster.
Step 104: and when the second key account number is not included in the first cluster, new identification information is allocated to the first cluster.
The first cluster does not include the second key account number, which means that the second key account number is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, namely, the second key account number which is important to the natural person is only in the candidate inheritance cluster but not in the first cluster, so that when the first cluster does not include the second key account number, the first cluster is greatly changed relative to the candidate inheritance cluster. Therefore, after the candidate inheritance cluster is changed into the first cluster, if the first cluster does not include the second key account number of the candidate inheritance cluster, new identification information needs to be allocated to the first cluster again.
For example, the first cluster includes A, B two accounts, the first key account of the first cluster is a, the candidate inheritance cluster of the first cluster includes A, B, C three accounts, and if the second key account of the candidate inheritance cluster is B, the first cluster can inherit the identification information of the candidate inheritance cluster; if the second key account number of the candidate inheritance cluster is C, the first cluster cannot inherit the identification information of the candidate inheritance cluster, namely new identification information needs to be allocated to the first cluster again.
As can be seen from the above steps 103 and 104, when the first cluster includes the second key account, the identification information of the natural person to which the account in the first cluster belongs is unchanged; when the first cluster does not include the second key account, the identification information of the natural person to which the account in the first cluster belongs is changed. That is, after the candidate inheritance cluster is changed into the first cluster, if the first cluster still comprises the second key account number of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is unchanged; after the candidate inheritance cluster is changed into the first cluster, if the first cluster does not comprise the second key account number of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is changed.
Therefore, the technical scheme of the embodiment of the disclosure can inherit the identification information of the candidate inheritance cluster when the first cluster changes slightly relative to the candidate inheritance cluster, and reassign new identification information to the first cluster when the first cluster changes greatly relative to the candidate inheritance cluster. In other words, according to the technical scheme of the embodiment of the disclosure, the change degree of the first cluster relative to the candidate inheritance cluster is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of the natural person to which the account number in the cluster belongs. Therefore, according to the technical scheme of the embodiment of the disclosure, through inheritance of the identification information of the clusters, the frequency of the identification information of the natural person is reduced, and the cluster relation of inheritance errors can be avoided when the cluster structure is changed greatly, so that the high stability and the inheritance rationality of the identification information of the natural person are realized.
In addition, in the related art, a certain account number in the cluster may also be used as identification information of a natural person. However, when the cluster structure changes, the inheritance rationality cannot be effectively embodied. For example, when an element serving as identification information in the third cluster is divided into the fourth cluster, but the element is not selected as the identification information of the fourth cluster, the two clusters cannot inherit the identification information. Therefore, an account number in the cluster is used as identification information of a natural person, and the problem of inheritance rationality is brought about at the same time although the problems of partial stability and inheritance can be solved.
The method for distributing the identification information can enable the identification information of the natural person to be unchanged when the cluster structure is changed slightly; when the cluster structure is changed greatly, new identification information is allocated to the changed cluster structure again, so that the identification information of the natural person is changed. Therefore, the identification information distribution method of the embodiment of the disclosure can realize the stability of the identification information and the reasonable inheritance of the identification information.
According to a second aspect of the embodiments of the present disclosure, there is provided a method for distributing identification information, where the method may be applied to an electronic device, for example, a computer, a mobile phone, a server, and so on.
As shown in fig. 2, the method for allocating the identification information may include the steps of:
step 201: and selecting a first key account number of the first cluster from account numbers included in the first cluster.
Wherein the first cluster includes at least one account.
In addition, a natural person may have registered accounts on multiple social platforms, each of which is a representation of the natural person. Thus, a plurality of account numbers belonging to the same natural person may constitute one cluster. I.e. the account numbers in the same cluster belong to the same natural person.
It can be seen that, in the embodiment of the present disclosure, a cluster refers to a set of social account numbers corresponding to a natural person. Each account included in one cluster can respectively image and represent natural people from different dimensions.
In addition, the key account number of a cluster represents the account number of the cluster that is important to natural people.
Step 202: and when the candidate inheritance cluster of the first cluster exists in at least one second cluster, selecting a second key account number of the candidate inheritance cluster from account numbers included in the candidate inheritance cluster.
The candidate inheritance cluster is a second cluster comprising the first key account, wherein the second cluster comprises at least one account.
As known from step 202, after determining the first key account of the first cluster, a second cluster including the first key account may be selected from at least one second cluster, so as to be used as a candidate inheritance cluster of the first cluster.
For example, the first cluster includes A, B two accounts, and there are two second clusters currently existing, where one second cluster includes A, B, C three accounts, and the other second cluster includes D, E two accounts, and if the key account of the first cluster is a, the second cluster including A, B, C three accounts is a candidate inheritance cluster of the first cluster.
In addition, it should be noted that one cluster has one or zero candidate inheritance clusters.
Step 203: and when the first key account number is the same as the second key account number, determining that the second key account number is included in the first cluster.
The first key account belongs to one account in the first cluster, so when the first key account is the same as the second key account, the first cluster includes the second key account.
Step 204: when the first key account is different from the second key account, establishing a mapping relation between other accounts except the first key account in the first cluster and the first key account as the mapping relation of the first cluster.
Step 205: and determining whether the first cluster comprises the second key account or not according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.
As can be seen from steps 204 to 205, in the embodiment of the present disclosure, when the first key account and the second key account are different, mapping relationships between other accounts in the first cluster except the first key account and the first key account may be established, so as to further determine whether the first cluster includes the second key account according to the mapping relationships and the mapping relationships between the first key account and the second key account.
Optionally, the determining whether the first cluster includes the second key account according to the mapping relationship of the first cluster and the mapping relationship between the first key account and the second key account includes:
when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;
and when the mapping relation between the first key account and the second key account does not exist in the mapping relation of the first cluster, determining that the second key account is not included in the first cluster.
For example, the mapping relationship of the first cluster includes a mapping relationship between a and B, and the first key account of the first cluster is a, if the second key account of the candidate inheritance cluster is B, the mapping relationship of the first cluster includes a mapping relationship between the first key account and the second key account (i.e., a mapping relationship between a and B), and it may be determined that the first cluster includes the second key account; if the second key account number of the candidate inheritance cluster is C, the mapping relationship between the first key account number and the second key account number (i.e., the mapping relationship between a and C) is not included in the mapping relationship of the first cluster, and it may be determined that the second key account number is not included in the first cluster.
As can be seen from the foregoing, in the embodiment of the present disclosure, when the first key account is the same as the second key account, it may be directly determined that the first cluster includes the second key account; and when the first key account is different from the second key account, whether the first cluster comprises the second key account or not can be determined by comparing the mapping relation of the first cluster with the mapping relation between the first key account and the second key account.
In addition, for the method of determining whether the first cluster includes the second key account, the following traversal method may be further adopted:
traversing the accounts in the first cluster, comparing whether the traversed accounts are the same as the second key account, and if yes, indicating that the second key account exists in the first cluster; if the same account number as the second key account number is not encountered until the traversal is finished, the second key account number is not included in the first cluster.
In the embodiment of the disclosure, when judging whether the first cluster includes the second key account, firstly judging whether the first key account is the same as the second key account, if so, directly determining that the first cluster includes the second key account; when the first key account is different from the second key account, mapping relations between other accounts except the first key account in the first cluster and the first key account are established, and then whether the mapping relations comprise the mapping relations between the first key account and the second key account is judged. Compared with the traversing mode, the process of judging whether the first cluster comprises the second key account can judge whether the first cluster comprises the second key account more quickly.
Step 206: and when the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster.
The first cluster includes a second key account number, which indicates that the second key account number is not stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, that is, the second key account number which is important to the natural person is located in the candidate inheritance cluster and also located in the first cluster, so when the first cluster includes the second key account number, the first cluster is only slightly changed relative to the candidate inheritance cluster. Therefore, after the candidate inheritance cluster is changed into the first cluster, if the first cluster still comprises the second key account number of the candidate inheritance cluster, the first cluster can inherit the identification information of the candidate inheritance cluster.
Step 207: and when the second key account number is not included in the first cluster, new identification information is allocated to the first cluster.
The first cluster does not include the second key account number, which means that the second key account number is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, namely, the second key account number which is important to the natural person is only in the candidate inheritance cluster but not in the first cluster, so that when the first cluster does not include the second key account number, the first cluster is greatly changed relative to the candidate inheritance cluster. Therefore, after the candidate inheritance cluster is changed into the first cluster, if the first cluster does not include the second key account number of the candidate inheritance cluster, new identification information needs to be allocated to the first cluster again.
For example, the first cluster includes A, B two accounts, the first key account of the first cluster is a, the candidate inheritance cluster of the first cluster includes A, B, C three accounts, and if the second key account of the candidate inheritance cluster is B, the first cluster can inherit the identification information of the candidate inheritance cluster; if the second key account number of the candidate inheritance cluster is C, the first cluster cannot inherit the identification information of the candidate inheritance cluster, namely new identification information needs to be allocated to the first cluster again.
As can be seen from the above steps 206 and 207, when the first cluster includes the second key account, the identification information of the natural person to which the account in the first cluster belongs is unchanged; when the first cluster does not include the second key account, the identification information of the natural person to which the account in the first cluster belongs is changed. That is, after the candidate inheritance cluster is changed into the first cluster, if the first cluster still comprises the second key account number of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is unchanged; after the candidate inheritance cluster is changed into the first cluster, if the first cluster does not comprise the second key account number of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is changed.
Therefore, the technical scheme of the embodiment of the disclosure can inherit the identification information of the candidate inheritance cluster when the first cluster changes slightly relative to the candidate inheritance cluster, and reassign new identification information to the first cluster when the first cluster changes greatly relative to the candidate inheritance cluster. In other words, according to the technical scheme of the embodiment of the disclosure, the change degree of the first cluster relative to the candidate inheritance cluster is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of the natural person to which the account number in the cluster belongs. Therefore, according to the technical scheme of the embodiment of the disclosure, through inheritance of the identification information of the clusters, the frequency of the identification information of the natural person is reduced, and the cluster relation of inheritance errors can be avoided when the cluster structure is changed greatly, so that the high stability and the inheritance rationality of the identification information of the natural person are realized.
Optionally, the method further comprises:
and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, new identification information is allocated for the first cluster.
It can be seen that, in the embodiment of the present disclosure, when the first cluster does not have the candidate inheritance cluster, that is, when neither of the second clusters includes the first key account, the identification information needs to be reassigned to the first cluster.
Optionally, the selecting the first key account number of the first cluster from the account numbers included in the first cluster includes:
selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster;
the target parameters comprise at least one of the using frequency degree, the registration duration and the using duration of the account.
In addition, the average usage frequency of the account number in a preset time period can be used as the usage frequency of the account number. For example, the number of times of using the account number in a plurality of preset time periods (such as a week) may be collected, and then an average value of the number of times of using is calculated as the usage frequency of the account number.
In addition, the usage frequency degree, the registration duration and the usage duration of the account numbers can represent the importance degree of the account numbers to the natural person, so that the account numbers which are important to the natural person in the first cluster can be selected more accurately as key account numbers according to at least one of the usage frequency degree, the registration duration and the usage duration, and the stability of the selected key account numbers can be improved.
Optionally, when the target parameters include a usage frequency, a registration duration, and a usage duration of the account numbers, the selecting, according to the target parameters of the account numbers included in the first cluster, the first key account number from the account numbers included in the first cluster includes:
Selecting a first candidate account number with the greatest frequency of use from account numbers included in the first cluster;
when one first candidate account exists, the first candidate account is used as the first key account;
when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;
when one second candidate account exists, the second candidate account is taken as the first key account;
when a plurality of second candidate accounts exist, selecting a third candidate account with the largest using time from the plurality of second candidate accounts;
when one third candidate account exists, the third candidate account is used as the first key account;
and when a plurality of third candidate accounts exist, randomly selecting the first key account from the plurality of third candidate accounts.
It can be known that, in the embodiment of the present disclosure, when the first key account is selected from the first cluster, the account usage frequency may be prioritized, the registration duration is taken into consideration, and the usage duration is taken into consideration again. Of course, it is understood that the priority order of the three factors of the usage frequency, the registration duration, and the usage duration may also be adjusted.
Optionally, the allocating new identification information to the first cluster includes:
and generating the identification information of the first cluster in a distributed mode by adopting a 64-bit long integer coding method.
The identification information of the first cluster is generated by adopting a 64-long integer coding method, so that the uniqueness of the identification information can be ensured. And the identification information of the first cluster is generated in a distributed mode, so that the identification information of the first cluster can be quickly generated.
In addition, in the related art, when the cluster itself is used as the identification information of the natural person, since the cluster itself is a set, it is difficult to visually represent and transfer, and the efficiency of storage and calculation is low. In the embodiment of the application, the identification information generated by the 64-bit long integer coding method is used as the identification information of the cluster, namely, the identification information of the natural person to which the cluster belongs, so that the identification information of the natural person is simpler and more visual, the transmission is convenient, the storage space can be saved, and the calculation efficiency is improved.
In summary, a specific implementation manner of the method for allocating identification information according to the embodiments of the present disclosure may be as shown in fig. 3, which is as follows:
determining a first key account number of a first cluster; for example, the account number using frequency, the account number registering time and the using time can be comprehensively considered, so that the activity and the stability of the natural people cluster can be ensured;
And determining candidate inheritance clusters of the first cluster (namely selecting a second cluster comprising the first key account from the second cluster at present), and constructing the mapping relation between other accounts except the first key account in the first cluster and the first key account.
If the first cluster has a candidate inheritance cluster, comparing a second key account number of the candidate inheritance cluster with the first key account number, if the second key account number is consistent with the first key account number, or if a mapping relation between the first key account number and the second key account number exists in the first cluster, the first cluster inherits the identification information of the candidate inheritance cluster, otherwise, new identification information is allocated to the first cluster; if there is no candidate inheritance cluster of the first cluster, new identification information is allocated to the first cluster. The identification information can be coded by a 64-bit Long type code and can be generated rapidly in a distributed mode for the convenience of representation and transmission and the guarantee of uniqueness.
Wherein the distributed means: the identification information can be generated on each of the plurality of devices. Examples are as follows: if it is necessary to generate new identification information for each of the six clusters A, B, C, D, E, F, for a distributed cluster formed by two devices, new identification information may be generated for the three clusters A, B, C on the first device and new identification information may be generated for the three clusters D, E, F on the second device.
Therefore, a plurality of devices can generate new identification information for different clusters in parallel, so that the generation time of the new identification information can be saved, namely the generation speed of the identification information is improved.
Therefore, when the identification information is carried out on the natural person, the key account numbers in the natural person clusters are used as bridges to connect the clusters before and after the change. Namely, calculating a key account number in the group account numbers of the clusters, constructing the mapping relation between all account numbers in the clusters and the key account numbers, judging the relation between the clusters and the key account numbers of the clusters before and after the change, and determining whether the new cluster can inherit the identification information of the original cluster. The method solves the problem of connection of the relations before and after the cluster is slightly changed, and can actively disconnect the connection when the quality of the cluster is changed, thereby avoiding error relation inheritance. Therefore, the identification information of the cluster, namely the identification information of the natural person to which the account belongs in the cluster, obtained by adopting the identification information distribution method of the embodiment of the present disclosure can meet the requirements of uniqueness and intuitiveness, can embody an accurate inheritance relationship, and maintains stability.
In addition, the method for distributing the identification information in the embodiment of the disclosure has the advantages of automation and flow of the whole process, and no manual participation and maintenance are needed. And the whole process can also efficiently and rapidly complete the distribution and inheritance of the natural person identification information in a distributed mode.
In addition, accurate and stable identification information can conveniently show the complete life cycle of a natural person.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for distributing identification information, as shown in fig. 4, the apparatus 400 for distributing identification information may include:
a first key account selection module 401 configured to select a first key account of a first cluster from accounts included in the first cluster;
a second key account selection module 402, configured to select, when there is a candidate inheritance cluster of the first cluster in at least one second cluster, a second key account of the candidate inheritance cluster from accounts included in the candidate inheritance cluster, where the candidate inheritance cluster is a second cluster including the first key account, and the second cluster includes at least one account;
an identification information inheritance module 403 configured to determine that identification information of the first cluster is identification information of the candidate inheritance cluster when the second key account is included in the first cluster;
a reassignment module 404 is configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.
As can be seen from the foregoing, in the identifier information distributing device provided in the embodiment of the present disclosure, first, a first key account number of a first cluster is selected from accounts included in the first cluster, and when at least one candidate inheritance cluster of the first cluster exists in at least one second cluster, a second key account number of the candidate inheritance cluster is selected from accounts included in the candidate inheritance cluster, so that when the second key account number is included in the first cluster, it is determined that the identifier information of the first cluster is the identifier information of the candidate inheritance cluster, and when the second key account number is not included in the first cluster, new identifier information is distributed to the first cluster. The candidate inheritance cluster is a second cluster comprising a first key account, and the second cluster comprises at least one account.
The first cluster comprises a second key account number, which indicates that the first cluster only has small change relative to the candidate inheritance cluster; the first cluster does not include the second key account number, which indicates that the second key account number is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, so that the first cluster does not include the second key account number, which also indicates that the first cluster has relatively large change relative to the candidate inheritance cluster.
It can be seen that, by the identifier information distributing device provided by the embodiment of the disclosure, when the first cluster changes slightly relative to the candidate inheritance cluster, the identifier information of the candidate inheritance cluster is inherited, and when the first cluster changes greatly relative to the candidate inheritance cluster, new identifier information is distributed to the first cluster again. In other words, according to the technical scheme of the embodiment of the disclosure, the change degree of the first cluster relative to the candidate inheritance cluster is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of the natural person to which the account number in the cluster belongs. Therefore, the identifier information distribution device provided by the embodiment of the disclosure reduces the frequency of the identifier information of the natural person through inheritance of the identifier information of the cluster, and can avoid inheritance of wrong cluster relation when the cluster structure is changed greatly, thereby realizing high stability and inheritance rationality of the identifier information of the natural person.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an identification information distribution apparatus, as shown in fig. 5, the identification information distribution apparatus 500 may include:
a first key account selection module 501 configured to select a first key account of a first cluster from accounts included in the first cluster;
a second key account selection module 502 configured to select, when there is a candidate inheritance cluster of the first cluster in at least one second cluster, a second key account of the candidate inheritance cluster from accounts included in the candidate inheritance cluster, where the candidate inheritance cluster is a second cluster including the first key account, and the second cluster includes at least one account;
an identification information inheritance module 503 configured to determine that the identification information of the first cluster is the identification information of the candidate inheritance cluster when the second key account is included in the first cluster;
a reassignment module 504 is configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.
Optionally, the apparatus further includes: a determining module 505 configured to determine whether the second key account is included in the first cluster;
Wherein, the judging module 505 includes:
a first determining submodule 5051 configured to determine that the second key account is included in the first cluster when the first key account is the same as the second key account;
a mapping submodule 5052 configured to establish a mapping relationship between other accounts except the first key account in the first cluster and the first key account as a mapping relationship of the first cluster when the first key account is different from the second key account;
the second determining submodule 5053 is configured to determine whether the first cluster includes the second key account according to the mapping relationship of the first cluster and the mapping relationship between the first key account and the second key account.
Optionally, the second determining submodule 5053 is specifically configured to:
when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;
and when the mapping relation between the first key account and the second key account does not exist in the mapping relation of the first cluster, determining that the second key account is not included in the first cluster.
Optionally, the reassigning module 504 is further configured to:
and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, new identification information is allocated for the first cluster.
Optionally, the first key account selection module 501 is specifically configured to:
selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster;
the target parameters comprise at least one of the using frequency degree, the registration duration and the using duration of the account.
Optionally, when the target parameters include a usage frequency of the account, a registration duration, and a usage duration, the first key account selecting module 501 is specifically configured to, according to the target parameters of the account included in the first cluster, select the first key account from the accounts included in the first cluster:
selecting a first candidate account number with the greatest frequency of use from account numbers included in the first cluster;
when one first candidate account exists, the first candidate account is used as the first key account;
when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;
When one second candidate account exists, the second candidate account is taken as the first key account;
when a plurality of second candidate accounts exist, selecting a third candidate account with the largest using time from the plurality of second candidate accounts;
when one third candidate account exists, the third candidate account is used as the first key account;
and when a plurality of third candidate accounts exist, randomly selecting the first key account from the plurality of third candidate accounts.
Optionally, the reassignment module 505, when assigning new identification information to the first cluster identification information, is specifically configured to:
and generating the identification information of the first cluster in a distributed mode by adopting a 64-bit long integer coding method.
Wherein the distributed means: the identification information can be generated on each of the plurality of devices. Examples are as follows: if it is necessary to generate new identification information for each of the six clusters A, B, C, D, E, F, for a distributed cluster formed by two devices, new identification information may be generated for the three clusters A, B, C on the first device and new identification information may be generated for the three clusters D, E, F on the second device.
Therefore, a plurality of devices can generate new identification information for different clusters in parallel, so that the generation time of the new identification information can be saved, namely the generation speed of the identification information is improved
As can be seen from the foregoing, the identifier information distributing device provided in the embodiment of the present disclosure selects a first key account number of a first cluster from accounts included in the first cluster, and selects a second key account number of a candidate inheritance cluster from accounts included in the candidate inheritance cluster when at least one candidate inheritance cluster of the first cluster exists in the second cluster, so that when the second key account number is included in the first cluster, it is determined that the identifier information of the first cluster is the identifier information of the candidate inheritance cluster, and when the second key account number is not included in the first cluster, new identifier information is distributed to the first cluster. The candidate inheritance cluster is a second cluster comprising a first key account, and the second cluster comprises at least one account.
The first cluster comprises a second key account number, which indicates that the first cluster only has small change relative to the candidate inheritance cluster; the first cluster does not include the second key account number, which indicates that the second key account number is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, so that the first cluster does not include the second key account number, which also indicates that the first cluster has relatively large change relative to the candidate inheritance cluster.
It can be seen that, by the identifier information distributing device provided by the embodiment of the disclosure, when the first cluster changes slightly relative to the candidate inheritance cluster, the identifier information of the candidate inheritance cluster is inherited, and when the first cluster changes greatly relative to the candidate inheritance cluster, new identifier information is distributed to the first cluster again. In other words, according to the technical scheme of the embodiment of the disclosure, the change degree of the first cluster relative to the candidate inheritance cluster is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of the natural person to which the account number in the cluster belongs. Therefore, the identifier information distribution device provided by the embodiment of the disclosure reduces the frequency of the identifier information of the natural person through inheritance of the identifier information of the cluster, and can avoid inheritance of wrong cluster relation when the cluster structure is changed greatly, thereby realizing high stability and inheritance rationality of the identifier information of the natural person.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
According to a fifth aspect of embodiments of the present disclosure, an electronic device is provided. Referring to fig. 6, the electronic device includes:
a processor 610;
a memory 620 for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the above-described method of assigning identification information.
According to a sixth aspect of embodiments of the present disclosure, there is also provided an electronic device. As shown in fig. 7, the electronic device 700 may be a mobile phone, a computer, a digital broadcast electronic device, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, or the like.
Referring to fig. 7, an electronic device 700 may include one or more of the following components: a processing component 702, a memory 704, a power component 706, a multimedia component 708, an audio component 710, an input/output (I/O) interface 712, a sensor component 714, and a communication component 716.
The processing component 702 generally controls overall operation of the electronic device 700, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 702 may include one or more processors 720 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 702 can include one or more modules that facilitate interaction between the processing component 702 and other components. For example, the processing component 702 may include a multimedia module to facilitate interaction between the multimedia component 708 and the processing component 702.
The memory 704 is configured to store various types of data to support operations at the electronic device 700. Examples of such data include instructions for any application or method operating on the electronic device 700, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 704 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 706 provides power to the various components of the electronic device 700. Power supply components 706 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for electronic device 700.
The multimedia component 708 includes a screen between the electronic device 700 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 708 includes a front-facing camera and/or a rear-facing camera. When the electronic device 700 is in an operational mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 710 is configured to output and/or input audio signals. For example, the audio component 710 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 700 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 704 or transmitted via the communication component 716. In some embodiments, the audio component 710 further includes a speaker for outputting audio signals.
The I/O interface 712 provides an interface between the processing component 702 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 714 includes one or more sensors for providing status assessment of various aspects of the electronic device 700. For example, the sensor assembly 714 may detect an on/off state of the electronic device 700, a relative positioning of the components, such as a display and keypad of the electronic device 700, a change in position of the electronic device 700 or a component of the electronic device 700, the presence or absence of a user's contact with the electronic device 700, an orientation or acceleration/deceleration of the electronic device 700, and a change in temperature of the electronic device 700. The sensor assembly 714 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 714 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 714 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 716 is configured to facilitate communication between the electronic device 700 and other devices, either wired or wireless. The electronic device 700 may access a wireless network based on a communication standard, such as WiFi, an operator network (e.g., 2G, 3G, 8G, or 5G), or a combination thereof. In one exemplary embodiment, the communication component 716 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 716 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 700 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for performing the above-described method of assigning identification information.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 704, including instructions executable by processor 720 of electronic device 700 to perform the above-described method. Alternatively, for example, the storage medium may be a non-transitory computer-readable storage medium, which may be, for example, ROM, random-access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
In yet another aspect of the disclosure implementation, the disclosure embodiment further provides a storage medium, where the instructions in the storage medium are executed by a processor of an electronic device, so that the electronic device can perform the above-mentioned method for distributing identification information.
According to a further aspect of embodiments of the present disclosure, there is provided a computer program product comprising instructions/computer programs which, when run on a computer, cause the computer to implement the above-described method of assigning identification information.
The allocation scheme of identification information provided herein is not inherently related to any particular computer, virtual system, or other apparatus. Various general-purpose systems may also be used with the teachings herein. The required structure for a system constructed with aspects of the present invention will be apparent from the description above. In addition, the present invention is not directed to any particular programming language. It will be appreciated that the teachings of the present invention described herein may be implemented in a variety of programming languages, and the above description of specific languages is provided for disclosure of enablement and best mode of the present invention.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be construed as reflecting the intention that: i.e., the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the apparatus of the embodiments may be adaptively changed and disposed in one or more apparatuses different from the embodiments. The modules or units or components of the embodiments may be combined into one module or unit or component and, furthermore, they may be divided into a plurality of sub-modules or sub-units or sub-components. Any combination of all features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be used in combination, except insofar as at least some of such features and/or processes or units are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
Various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functions of some or all of the components in an information extraction scheme according to embodiments of the present disclosure may be implemented in practice using a microprocessor or Digital Signal Processor (DSP). The present invention can also be implemented as an apparatus or device program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present invention may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.

Claims (16)

1. A method of assigning identification information, the method comprising:
selecting a first key account number of a first cluster from account numbers included in the first cluster;
selecting a second key account number of the candidate inheritance cluster from accounts included in the candidate inheritance cluster when the candidate inheritance cluster of the first cluster exists in at least one second cluster, wherein the candidate inheritance cluster is the second cluster including the first key account number, and the second cluster includes at least one account number;
When the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster;
and when the second key account number is not included in the first cluster, new identification information is allocated to the first cluster.
2. The method for allocating identification information according to claim 1, wherein before determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster when the second key account is included in the first cluster, the method further comprises:
determining whether the second key account number is included in the first cluster;
wherein the determining whether the first cluster includes the second key account includes:
when the first key account number is the same as the second key account number, determining that the second key account number is included in the first cluster;
when the first key account is different from the second key account, establishing a mapping relation between other accounts except the first key account in the first cluster and the first key account as the mapping relation of the first cluster;
and determining whether the first cluster comprises the second key account or not according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.
3. The method for distributing identification information according to claim 2, wherein determining whether the first cluster includes the second key account according to the mapping relationship between the first cluster and the mapping relationship between the first key account and the second key account includes:
when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;
and when the mapping relation between the first key account and the second key account does not exist in the mapping relation of the first cluster, determining that the second key account is not included in the first cluster.
4. The method of assigning identification information according to claim 1, wherein the method further comprises:
and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, new identification information is allocated for the first cluster.
5. The method for distributing identification information according to claim 1, wherein the selecting a first key account number of a first cluster from account numbers included in the first cluster includes:
Selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster;
the target parameters comprise at least one of the using frequency degree, the registration duration and the using duration of the account.
6. The method for distributing identification information according to claim 5, wherein when the target parameters include a usage frequency, a registration duration, and a usage duration of the account numbers, the selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster includes:
selecting a first candidate account number with the greatest frequency of use from account numbers included in the first cluster;
when one first candidate account exists, the first candidate account is used as the first key account;
when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;
when one second candidate account exists, the second candidate account is taken as the first key account;
when a plurality of second candidate accounts exist, selecting a third candidate account with the largest using time from the plurality of second candidate accounts;
When one third candidate account exists, the third candidate account is used as the first key account;
and when a plurality of third candidate accounts exist, randomly selecting the first key account from the plurality of third candidate accounts.
7. The method for allocating identification information according to claim 1 or 4, wherein allocating new identification information to the first cluster comprises:
and generating the identification information of the first cluster in a distributed mode by adopting a 64-bit long integer coding method.
8. An apparatus for distributing identification information, the apparatus comprising:
the first key account selection module is configured to select a first key account of a first cluster from accounts included in the first cluster;
a second key account selection module configured to select, when at least one second cluster includes a candidate inheritance cluster of the first cluster, a second key account of the candidate inheritance cluster from accounts included in the candidate inheritance cluster, where the candidate inheritance cluster is a second cluster including the first key account, and the second cluster includes at least one account;
the identification information inheritance module is configured to determine that the identification information of the first cluster is the identification information of the candidate inheritance cluster when the second key account is included in the first cluster;
And the reassignment module is configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.
9. The apparatus for distributing identification information of claim 8, wherein the apparatus further comprises: a determining module configured to determine whether the second key account is included in the first cluster;
wherein, the judging module includes:
a first determining submodule configured to determine that the second key account is included in the first cluster when the first key account is the same as the second key account;
the mapping sub-module is configured to establish a mapping relationship between other accounts except the first key account in the first cluster and the first key account as a mapping relationship of the first cluster when the first key account is different from the second key account;
and the second determining submodule is configured to determine whether the first cluster comprises the second key account or not according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.
10. The identification information distribution device according to claim 9, characterized in that the second determination submodule is specifically configured to:
When the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;
and when the mapping relation between the first key account and the second key account does not exist in the mapping relation of the first cluster, determining that the second key account is not included in the first cluster.
11. The apparatus for distributing identification information of claim 8, wherein the reassignment module is further configured to:
and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, new identification information is allocated for the first cluster.
12. The identification information distribution device according to claim 8, wherein the first key account selection module is specifically configured to:
selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster;
the target parameters comprise at least one of the using frequency degree, the registration duration and the using duration of the account.
13. The apparatus for distributing identification information according to claim 12, wherein when the target parameters include a usage frequency, a registration duration, and a usage duration of the account numbers, the first key account number selecting module is specifically configured to, when selecting the first key account number from the account numbers included in the first cluster according to the target parameters of the account numbers included in the first cluster:
Selecting a first candidate account number with the greatest frequency of use from account numbers included in the first cluster;
when one first candidate account exists, the first candidate account is used as the first key account;
when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;
when one second candidate account exists, the second candidate account is taken as the first key account;
when a plurality of second candidate accounts exist, selecting a third candidate account with the largest using time from the plurality of second candidate accounts;
when one third candidate account exists, the third candidate account is used as the first key account;
and when a plurality of third candidate accounts exist, randomly selecting the first key account from the plurality of third candidate accounts.
14. The apparatus for allocating identification information according to claim 8 or 11, wherein the reallocation module, when allocating new identification information for the first cluster, is specifically configured to:
and generating the identification information of the first cluster in a distributed mode by adopting a 64-bit long integer coding method.
15. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the method of assigning identification information as claimed in any one of claims 1 to 7.
16. A computer-readable storage medium, characterized in that instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to implement the method of assigning identification information according to any one of claims 1 to 7.
CN202110603924.0A 2021-05-31 2021-05-31 Identification information distribution method and device and electronic equipment Active CN113468503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110603924.0A CN113468503B (en) 2021-05-31 2021-05-31 Identification information distribution method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110603924.0A CN113468503B (en) 2021-05-31 2021-05-31 Identification information distribution method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113468503A CN113468503A (en) 2021-10-01
CN113468503B true CN113468503B (en) 2024-02-06

Family

ID=77871881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110603924.0A Active CN113468503B (en) 2021-05-31 2021-05-31 Identification information distribution method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113468503B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107111710A (en) * 2014-09-13 2017-08-29 先进元素科技公司 For the method and system based on safety and the calculating of dependable identification
CN111695019A (en) * 2020-06-11 2020-09-22 腾讯科技(深圳)有限公司 Method and device for identifying associated account
CN111701247A (en) * 2020-07-13 2020-09-25 腾讯科技(深圳)有限公司 Method and equipment for determining unified account

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2632167B1 (en) * 2016-03-07 2018-03-09 Shokesu, S.L. SYSTEM OF MONITORING AND EXTRACTION OF PUBLIC INFORMATION OF USERS REGISTERED IN SOCIAL NETWORKS, ACCOMMODATED IN SERVERS AND CLOUDS OF SOCIAL NETWORK DATA

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107111710A (en) * 2014-09-13 2017-08-29 先进元素科技公司 For the method and system based on safety and the calculating of dependable identification
CN111695019A (en) * 2020-06-11 2020-09-22 腾讯科技(深圳)有限公司 Method and device for identifying associated account
CN111701247A (en) * 2020-07-13 2020-09-25 腾讯科技(深圳)有限公司 Method and equipment for determining unified account

Also Published As

Publication number Publication date
CN113468503A (en) 2021-10-01

Similar Documents

Publication Publication Date Title
CN107370772B (en) account login method and device and computer readable storage medium
CN106919629B (en) Method and device for realizing information screening in group chat
US20180342029A1 (en) Method, apparatus terminal device, and computer readable storage medium for invoking a virtual public transport card
CN113315869B (en) Content display method, content display device, electronic equipment, content display system and storage medium
CN111190710A (en) Task allocation method and device
CN111865630B (en) Topological information acquisition method, device, terminal and storage medium
CN104951522B (en) Method and device for searching
CN108241515B (en) Application shortcut establishing method and terminal
CN110913276B (en) Data processing method, device, server, terminal and storage medium
EP3190555A1 (en) Method for operating a display device and display
CN113468503B (en) Identification information distribution method and device and electronic equipment
CN107885464B (en) Data storage method, device and computer readable storage medium
CN113254726B (en) Account grouping method and device, electronic equipment and storage medium
CN108234752A (en) Communication information methods of exhibiting, device, computer installation and computer storage media
CN111144845B (en) Mobile terminal meeting reminding method and device
CN114186894A (en) Project risk detection method and device, electronic equipment and storage medium
CN113242171A (en) Method and related device for managing session messages
CN112102081B (en) Method, device, readable storage medium and blockchain network for generating blockchain
CN112182027B (en) Information query method, device, electronic equipment and storage medium
CN117278710B (en) Call interaction function determining method, device, equipment and medium
CN111241097B (en) Method for processing object, device for processing object and storage medium
CN108153822A (en) A kind of correlating method and device, terminal and readable storage medium storing program for executing
CN111767249B (en) Method and device for determining self-running time of function
CN110166505B (en) Session record storage method, device, equipment and storage medium
CN114385380A (en) Message processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant