CN113918934A - Application operation method and device, storage medium and electronic equipment - Google Patents

Application operation method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113918934A
CN113918934A CN202111517771.4A CN202111517771A CN113918934A CN 113918934 A CN113918934 A CN 113918934A CN 202111517771 A CN202111517771 A CN 202111517771A CN 113918934 A CN113918934 A CN 113918934A
Authority
CN
China
Prior art keywords
information
target
application
identification
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111517771.4A
Other languages
Chinese (zh)
Inventor
王群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Century TAL Education Technology Co Ltd
Original Assignee
Beijing Century TAL Education Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Century TAL Education Technology Co Ltd filed Critical Beijing Century TAL Education Technology Co Ltd
Priority to CN202111517771.4A priority Critical patent/CN113918934A/en
Publication of CN113918934A publication Critical patent/CN113918934A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Abstract

The embodiment of the disclosure discloses an application operation method, an application operation device, a storage medium and electronic equipment, wherein the method comprises the following steps: acquiring a target image; the method comprises the steps of identifying a target image by using an information identification model to obtain target information, wherein the target information comprises first information and second information, the first information is related to a target application, the second information is related to a target component of the target application, the information identification model is obtained by training based on a plurality of sample images in advance, each sample image comprises first sample information and second sample information, the first sample information is related to the application, and the second sample information is related to the component of the application; and starting the target application based on the first information, and enabling the target component to execute corresponding operation based on the second information.

Description

Application operation method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an application operating method, an application operating apparatus, and a computer-readable storage medium and an electronic device for implementing the application operating method.
Background
With the development of information technology, mobile terminals such as smart phones are becoming more and more popular and are widely used in various aspects of production and life. When a user needs to use a mobile terminal to log in an application program for operation, or needs to access a wireless network, the user is usually required to manually input a login user name and a login password, or an account and a password of the network, the operation process is complicated, and errors are easily caused when information is manually input, so that inconvenience in use is caused.
Disclosure of Invention
According to an aspect of the present disclosure, there is provided an application operating method including:
acquiring a target image;
the method comprises the steps of identifying a target image by using an information identification model to obtain target information, wherein the target information comprises first information and second information, the first information is related to a target application, the second information is related to a target component of the target application, the information identification model is obtained by training based on a plurality of sample images in advance, each sample image comprises first sample information and second sample information, the first sample information is related to the application, and the second sample information is related to the component of the application;
and starting the target application based on the first information, and enabling the target component to automatically execute corresponding operation based on the second information.
According to another aspect of the present disclosure, there is provided an application operating apparatus including:
the acquisition module is used for acquiring a target image;
the identification module is used for identifying and processing a target image by using an information identification model to obtain target information, wherein the target information comprises first information and second information, the first information is relevant to a target application, the second information is relevant to a target component of the target application, the information identification model is obtained by training based on a plurality of sample images in advance, each sample image comprises first sample information and second sample information, the first sample information is relevant to the application, and the second sample information is relevant to the component of the application;
and the execution module is used for starting the target application based on the first information and enabling the target component to execute corresponding operation based on the second information.
According to another aspect of the present disclosure, there is provided an electronic device including:
a processor; and
a memory storing a computer program for executing a computer program,
wherein the computer program, when executed by the processor, causes the processor to perform the method of any of the above embodiments.
According to another aspect of the present disclosure, a computer-readable storage medium is provided, wherein the computer-readable storage medium stores a computer program for causing a computer to perform the method of any of the above embodiments.
According to one or more technical schemes provided in the embodiments of the present disclosure, a target image is obtained, and then, an information recognition model is used to perform recognition processing on the target image to obtain target information, where the target information includes first information and second information, the first information is related to a target application, the second information is related to a target component of the target application, the information recognition model is obtained in advance based on training of a plurality of sample images, each sample image includes first sample information and second sample information, the first sample information is related to the application, and the second sample information is related to the component of the application; and finally, starting the target application based on the first information, and enabling the target component to execute corresponding operation based on the second information. Therefore, the target image is recognized based on the information recognition model obtained through pre-training to obtain the target information, the target component of the target application is enabled to execute corresponding operation based on the target information, the user does not need to manually input the target information to execute the corresponding operation, the user operation is simplified, meanwhile, the probability of target information input errors can be reduced, the corresponding operation can be executed relatively accurately, and misoperation is avoided.
Drawings
Further details, features and advantages of the disclosure are disclosed in the following description of exemplary embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 shows a flow chart of a method of operation of an application according to an example embodiment of the present disclosure;
FIG. 2 shows a flow diagram of a method of operation of an application according to another example embodiment of the present disclosure;
FIG. 3 illustrates an application operating scenario diagram in accordance with an exemplary embodiment of the present disclosure;
FIG. 4 illustrates an application operating scenario diagram in accordance with yet another exemplary embodiment of the present disclosure;
FIG. 5 illustrates another schematic diagram of an application operating scenario, according to yet another exemplary embodiment of the present disclosure;
FIG. 6 shows a flowchart of a method of operation of an application according to yet another example embodiment of the present disclosure;
FIG. 7 shows a schematic block diagram of an application operating device according to an exemplary embodiment of the present disclosure;
FIG. 8 illustrates a block diagram of an exemplary electronic device that can be used to implement embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description. It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The following describes a scheme of the present disclosure with reference to the accompanying drawings, and fig. 1 schematically illustrates a flowchart of an application operation method according to an embodiment of the present disclosure, where the application operation method may be executed by an electronic device such as a smart phone, a tablet computer, and the like, and specifically may include the following steps:
step S101: and acquiring a target image.
Optionally, in some embodiments of the present disclosure, for example, a camera of an electronic device, such as a smart phone, may be called to capture a target image, for example, a consumer bill of a coffee shop or a WiFi account area painted on a wall is captured to obtain the target image. Alternatively, a target image is selected from a set of images stored locally on an electronic device, such as a smartphone, which may have been previously taken, for example, but not limited to, an image of a coffee shop's consumer bill or a wall-graffiti WiFi account area.
Step S102: the method comprises the steps of utilizing an information identification model to identify and process a target image to obtain target information, wherein the target information comprises first information and second information, the first information is relevant to a target application, the second information is relevant to a target component of the target application, the information identification model is obtained through training based on a plurality of sample images in advance, each sample image comprises first sample information and second sample information, the first sample information is relevant to the application, and the second sample information is relevant to the component of the application.
Illustratively, the first information may be an identification name of the target application such as "WiFi" or the like. The target component of the target application, for example, a network access component of a WiFi client, or a login component or other functional operation component of a non-network access application, and the second information may be, for example, a WiFi account and a password, or the second information may be login information related to the login component of the non-network access application, such as a user name and a password, which is only an example, and is not limited in this embodiment.
For example, the first sample information may be an identification name of the application, and the like, and the second sample information may be information related to a component in the application, such as a login user name and a password related to a login component, or a network account and a password of a network access component, and the like.
The information recognition model can be an information recognition model based on a convolutional neural network, the original information recognition model is trained through a plurality of sample images, and the specific training process can refer to the scheme of the existing machine learning training model. Through the information recognition model obtained through pre-training, the first information in the target image, such as the identification name 'WiFi' of a network access application, such as a WiFi client, can be accurately recognized, and the second information, such as a WiFi account number, a password and the like, can be recognized.
Step S103: and starting the target application based on the first information, and enabling the target component to execute corresponding operation based on the second information.
For example, in one embodiment, after the target information, such as the first information and the second information, is obtained, the target application, such as a WiFi client, may be started based on the first information, such as the application identification name "WiFi", and then the network access component of the target component, such as the WiFi client, may perform the network access operation based on the second information, such as the WiFi account and the password. In other embodiments, the device system level setting application may also be called based on the first information, such as the application identification name "WiFi", so that the "wireless network" component in the setting application performs a network access operation based on the WiFi account and the password.
In the embodiment, the target image is recognized based on the information recognition model obtained through pre-training to obtain the target information, then the target component of the target application is enabled to execute corresponding operations such as network access operations based on the target information, the user does not need to manually input the target information such as WiFi account numbers and passwords to execute the corresponding operations, the user operations are simplified, meanwhile, the probability of target information input errors can be reduced, further, the corresponding operations are executed relatively accurately, and misoperation is avoided.
Optionally, in some embodiments of the present disclosure, as shown in fig. 2 and 3, the target application may include a first application for accessing a network, such as a WiFi client, the target component includes a first component for accessing the network, such as an access verification component, the first information in the first target image 301 includes a first application identifier of the first application, such as a name "WiFi", and the second information includes a network identifier, such as a WiFi account "xueersi" and a password "987654321". Correspondingly, starting the target application based on the first information, and causing the target component to execute a corresponding operation based on the second information, may specifically include the following steps:
step S201: and starting the first application and displaying a user interface of the first component based on the first application identification, wherein the user interface comprises a first input area and a second input area.
Illustratively, based on a first application identification, such as the name "WiFi," a WiFi client is launched and a user interface 302 of the access verification component is displayed, the user interface 302 including a first input field, such as an account entry field, and a second input field, such as a password entry field.
Step S202: and automatically inputting the network identification and the password into the first input area and the second input area so that the first component executes network access operation.
Illustratively, a network identifier, such as a WiFi account "xueersi" and a password "987654321" are automatically filled in an account input box and a password input box, and upon detecting a user clicking on the "connect WiFi" control 321, the access authentication component performs an operation of authenticating the access WiFi network. In other examples, the WiFi network may be automatically accessed after the WiFi account "xueersi" and the password "987654321" are automatically filled in without the user clicking the "connect WiFi" control 321.
Optionally, in some embodiments of the present disclosure, before the step S202 automatically inputs the network identifier and the password into the first input area and the second input area, the method includes: and caching the network identification and the password. For example, but not limited to, caching the network id such as WiFi account "xueersi" and password "987654321" into the memory.
In step S202, the network identifier and the password are automatically input into the first input area and the second input area, which may specifically include the following steps: a) reading the network identification and the password from the cache; b) inputting a network identification into a first input area; c) the password is entered into the second input area.
Illustratively, the cached network identifier, such as the WiFi account "xueersi" and the password "987654321" are read from the memory, the network identifier, such as the WiFi account "xueersi", is automatically filled in the account input box in fig. 3, and the password "987654321" is filled in the password input box.
Optionally, in other embodiments of the present disclosure, the target application includes a second application, the target component includes a second component, the first information includes a second application identifier of the second application, and the second information includes operation information related to the second component. For example, as shown in fig. 4, the second application is different from the first application, for example, the second application may be an "XX net school" application, such as a web lesson application, and the target component, i.e., the second component, may be a login component or some internal functional component of the "XX net school" application, without limitation.
The second target image 401 may include first information and second information, the first information, that is, the second application identification may be an application identification of the "XX network calibration" application, such as a name "XX network calibration", the second information may be login operation information related to the login component, such as a user name "outpatient" and a password "987654321", or the second information may be operation information of some other function component inside the "XX network calibration" application, such as operation instruction information instructing some function component to perform an operation, such as a retrieval operation.
Correspondingly, step S103 starts the target application based on the first information, and causes the target component to execute a corresponding operation based on the second information, which may specifically include the following steps: generating an application icon corresponding to the second application based on the second application identifier; in response to an operation to the icon, starting a second application; and enabling the second component to execute corresponding operation based on the operation information.
Specifically, as shown in fig. 4, based on the second application identifier, such as the name "XX network school", an XX network school application icon 402 corresponding to the "XX network school" application is generated, the XX network school application icon 402 is displayed, the XX network school application is started in response to an operation of the XX network school application icon 402, such as a click operation, by a user, and then the XX network school application causes the second component to perform a corresponding operation, such as a login operation or other operation after login, and the like, within the XX network school application based on the operation information.
Optionally, on the basis of the above embodiments, in some embodiments of the present disclosure, the operation information may include login information such as a user name "outpatient" and a password "987654321", the second component includes a login component, and in conjunction with fig. 5, the method further includes the following steps:
step i): a user interface 500 of the login component is displayed, wherein the user interface 500 comprises an information input area.
Illustratively, upon launching the XX net school application, a user interface 500 for the login component is displayed, which may include an information entry field. In one example, the information input field may include a username input field and a password input field.
Step ii): and inputting the login information into the information input area so as to enable the login component to execute corresponding login operation.
Illustratively, the user name "outpatient" is filled in the user name input area, the password "987654321" is filled in the password input area, then, after detecting that the user clicks the "login" control, the user logs in to the "XX network school" application, and then the user can perform further operations in the application, such as lecture selection and lecture listening, etc.
Optionally, on the basis of any of the above embodiments, in some embodiments of the present disclosure, as shown in fig. 6, the identifying the target image by using the information identification model to obtain the target information may specifically include the following steps:
step S601: and in response to the fact that one or more preset identification information is contained in the target image, the sub-image area corresponding to each preset identification information is selected.
For example, the preset identification information may include, but is not limited to, first identification information and second identification information, the first identification information being related to the target application, and the second identification information being related to the target component.
As a specific example, as shown in fig. 4, the first identification information may be identification information (not shown) such as a graphic, a pattern or a text of a target application such as an "XX cyber calibration" application, and the second identification information may be text identification information such as a "user name" and a "password" related to a target component of the target application, and these information are used as clue information for determining, for example, specific identification contents such as "outpent" and "987654321" when identifying. Specifically, the recognition result of the characters or the graphics in the target image can be recognized, and whether the first identification information of the target application, such as the "XX net school" application, and the second identification information, such as the "user name" and the "password", related to the login component are included is judged based on the recognition result.
Illustratively, when it is determined that the target image includes preset identification information such as that described above, referring to fig. 4, a sub-image area corresponding to each preset identification information in the target image 401, for example, a first sub-image area 411 corresponding to the first identification information of the "XX proofreading" application, and a second sub-image area 412 corresponding to the second identification information such as the "user name" and the "password" related to the login component, are framed.
Step S602: and identifying each sub-image area selected by the frame to obtain corresponding identification information.
Illustratively, the first sub-image area 411 of the frame is identified to obtain corresponding first identification information, such as "XX net school" character content, and the second sub-image area 411 of the frame is identified to obtain corresponding second identification information, such as "outpent" and "987654321".
Step S603: and determining the type of the identification information corresponding to each corresponding sub-image area based on each preset identification information.
For example, if the preset identification information is the first identification information, it is determined that the type of the identification information corresponding to the corresponding sub-image area is the first type. And if the preset identification information is second identification information, determining that the type of the identification information corresponding to the corresponding sub-image area is a second type.
Specifically, that is, when the first identification information is identification information (not shown) such as a graphic, a pattern, or a text of a target application, for example, an "XX net calibration" application, the first identification information corresponding to the identified first sub-image area 411, for example, the "XX net calibration" belongs to a first type, for example, an application type.
When the second identification information is the text identification information such as "user name" and "password" related to the target component of the target application, for example, the second identification information such as "outpatient" and "987654321" corresponding to the identified second sub-image area 411 belongs to the second type such as the component type of the application.
Step S604: and determining the target information based on the type of the identification information corresponding to each sub-image area and the identification information corresponding to each sub-image area.
For example, if the type of the identification information corresponding to the sub-image area is a first type, the identification information corresponding to the sub-image area is determined as first information; and if the type of the identification information corresponding to the sub-image area is a second type, determining the identification information corresponding to the sub-image area as the second information, wherein the first type is different from the second type.
That is, the first identification information such as "XX net calibration" corresponding to the first sub-image area 411 belongs to the first type such as the application class, and thus it is determined that the first identification information such as "XX net calibration" is the first information. The second identification information such as "outpatent" and "987654321" corresponding to the second sub-image area 411 belongs to the second type such as the component type of the application, and thus it is determined that the second identification information such as "outpatent" and "987654321" is the second information.
It is understood that in some other embodiments, the second image area 412 may be further framed, and the principle is the same as that of the above embodiments, the third sub-image area (containing the character "outpatent") containing the preset identification information, such as "user name", and the fourth sub-image area (containing the character "987654321") containing another preset identification information, such as "password", are framed, and then steps S603 to S605 are performed to obtain the second sub-information "outpatent" corresponding to the user name and another second sub-information "987654321" corresponding to the password.
In the embodiment, smaller local sub-image areas corresponding to the identification information are selected in the target image, and then image recognition processing is performed in the sub-image areas respectively to obtain the target information, so that the accuracy of information recognition can be improved, the probability of subsequent input errors of the target information can be further reduced, corresponding operations can be further accurately executed, and misoperation can be avoided.
According to another aspect of the present disclosure, there is provided an application operating apparatus, as shown in fig. 7, the application operating apparatus includes an obtaining module 701, an identifying module 702, and an executing module 703;
the obtaining module 701 is configured to obtain a target image.
The recognition module 702 is configured to perform recognition processing on a target image by using an information recognition model to obtain target information, where the target information includes first information and second information, the first information is related to a target application, the second information is related to a target component of the target application, the information recognition model is obtained in advance based on training of a plurality of sample images, each sample image includes first sample information and second sample information, the first sample information is related to the application, and the second sample information is related to the component of the application.
The executing module 703 is configured to start the target application based on the first information, and cause the target component to execute a corresponding operation based on the second information.
In the embodiment, the target image is recognized based on the information recognition model obtained through pre-training to obtain the target information, then the target component of the target application is enabled to execute corresponding operations such as network access operations based on the target information, the user does not need to manually input the target information such as WiFi account numbers and passwords to execute the corresponding operations, the user operations are simplified, meanwhile, the probability of target information input errors can be reduced, further, the corresponding operations are executed relatively accurately, and misoperation is avoided.
Optionally, in some embodiments of the present disclosure, the target application includes a first application for accessing a network, the target component includes a first component for accessing the network, the first information includes a first application identifier of the first application, and the second information includes a network identifier and a password.
The execution module 703 is configured to: starting the first application and displaying a user interface of the first component based on the first application identifier, wherein the user interface comprises a first input area and a second input area; and automatically inputting the network identification and the password into the first input area and the second input area so as to enable the first component to execute network access operation.
Optionally, in some embodiments of the present disclosure, the apparatus may further include a caching module, configured to cache the network identifier and the password before the execution module 703 automatically inputs the network identifier and the password into the first input area and the second input area. The execution module 703 is configured to read the network identifier and the password from the cache; inputting the network identification into the first input area; and inputting the password into the second input area.
Optionally, in some embodiments of the present disclosure, the target application includes a second application, the target component includes a second component, the first information includes a second application identifier of the second application, and the second information includes operation information related to the second component.
The executing module 703 is configured to: generating an application icon corresponding to the second application based on the second application identifier; responding to the operation of the application icon, and starting the second application; and enabling the second component to execute corresponding operation based on the operation information.
Optionally, in some embodiments of the present disclosure, the operation information includes login information, the second component includes a login component, and the execution module 703 is further configured to display a user interface of the login component, where the user interface includes an information input area; and inputting the login information into the information input area so as to enable the login component to execute corresponding login operation.
Optionally, in some embodiments of the present disclosure, the identifying module 702 is further configured to: in response to the fact that one or more preset identification information is contained in the target image, selecting a sub-image area corresponding to each preset identification information; identifying each sub-image area selected by the frame to obtain corresponding identification information; determining the type of the identification information corresponding to each corresponding sub-image area based on each piece of preset identification information; and determining the target information based on the type of the identification information corresponding to each sub-image area and the identification information corresponding to each sub-image area.
Optionally, in some embodiments of the present disclosure, the preset identification information includes first identification information and second identification information, where the first identification information is related to the target application, and the second identification information is related to the target component. The identification module 702 is configured to determine, by using the information identification model, that the type of the identification information corresponding to the corresponding sub-image region is the first type if the preset identification information is the first identification information; if the preset identification information is second identification information, determining that the type of the identification information corresponding to the corresponding sub-image area is a second type, wherein the first type is different from the second type; if the type of the identification information corresponding to the sub-image area is a first type, determining the identification information corresponding to the sub-image area as first information; and if the type of the identification information corresponding to the sub-image area is a second type, determining the identification information corresponding to the sub-image area as second information.
An exemplary embodiment of the present disclosure also provides an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor. The memory stores a computer program executable by the at least one processor, the computer program, when executed by the at least one processor, is for causing the electronic device to perform a method according to the above embodiments of the disclosure.
The disclosed exemplary embodiments also provide a non-transitory computer readable storage medium storing a computer program, wherein the computer program, when executed by a processor of a computer, is adapted to cause the computer to perform a method according to an embodiment of the present disclosure.
The exemplary embodiments of the present disclosure also provide a computer program product comprising a computer program, wherein the computer program, when executed by a processor of a computer, is adapted to cause the computer to perform a method according to an embodiment of the present disclosure.
Referring to fig. 8, a block diagram of a structure of an electronic device 800, which may be a server or a client of the present disclosure, which is an example of a hardware device that may be applied to aspects of the present disclosure, will now be described. Electronic device is intended to represent various forms of digital electronic computer devices, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other suitable computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, the electronic device 800 includes a computing unit 801 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 802 or a computer program loaded from a storage unit 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data required for the operation of the device 800 can also be stored. The calculation unit 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
A number of components in the electronic device 800 are connected to the I/O interface 805, including: an input unit 806, an output unit 807, a storage unit 808, and a communication unit 809. The input unit 806 may be any type of device capable of inputting information to the electronic device 800, and the input unit 806 may receive input numeric or character information and generate key signal inputs related to user settings and/or function controls of the electronic device. Output unit 807 can be any type of device capable of presenting information and can include, but is not limited to, a display, speakers, a video/audio output terminal, a vibrator, and/or a printer. The storage unit 804 may include, but is not limited to, a magnetic disk, an optical disk. The communication unit 809 allows the electronic device 800 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication transceivers and/or chipsets, such as bluetooth (TM) devices, WiFi devices, WiMax devices, cellular communication devices, and/or the like.
Computing unit 801 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 801 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and the like. The calculation unit 801 executes the respective methods and processes described above. For example, in some embodiments, the methods of the above embodiments may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 808. In some embodiments, part or all of the computer program can be loaded and/or installed onto the electronic device 800 via the ROM 802 and/or the communication unit 809. In some embodiments, the computing unit 801 may be configured to perform the methods of the embodiments described above in any other suitable manner (e.g., by means of firmware).
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
As used in this disclosure, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.

Claims (10)

1. An application operating method comprising:
acquiring a target image;
identifying the target image by using an information identification model to obtain target information, wherein the target information comprises first information and second information, the first information is related to a target application, the second information is related to a target component of the target application, the information identification model is obtained by training based on a plurality of sample images in advance, each sample image comprises first sample information and second sample information, the first sample information is related to the application, and the second sample information is related to the component of the application;
and starting the target application based on the first information, and enabling the target component to execute corresponding operation based on the second information.
2. The method of claim 1, wherein the target application comprises a first application for accessing a network, the target component comprises a first component for accessing a network, the first information comprises a first application identification of the first application, and the second information comprises a network identification and a password;
and wherein said launching said target application based on said first information and causing said target component to perform a corresponding operation based on said second information comprises:
starting the first application and displaying a user interface of the first component based on the first application identifier, wherein the user interface comprises a first input area and a second input area;
and automatically inputting the network identification and the password into the first input area and the second input area so as to enable the first component to execute network access operation.
3. The method of claim 2, wherein prior to said automatically entering said network identification and password into said first and second input fields, said method comprises:
caching the network identification and the password;
and wherein said automatically entering said network identification and password into said first and second input fields comprises:
reading the network identification and the password from the cache;
inputting the network identification into the first input area;
and inputting the password into the second input area.
4. The method of claim 1, wherein the target application comprises a second application, the target component comprises a second component, the first information comprises a second application identification of the second application, the second information comprises operational information related to the second component;
and wherein said launching said target application based on said first information and causing said target component to perform a corresponding operation based on said second information comprises:
generating an application icon corresponding to the second application based on the second application identifier;
responding to the operation of the application icon, and starting the second application;
and enabling the second component to execute corresponding operation based on the operation information.
5. The method of claim 4, wherein the operational information comprises login information, the second component comprises a login component,
and wherein the method further comprises:
displaying a user interface of the login component, wherein the user interface comprises an information input area;
and inputting the login information into the information input area so as to enable the login component to execute corresponding login operation.
6. The method according to any one of claims 1 to 5, wherein the identifying the target image by using the information identifying model to obtain the target information comprises:
in response to the fact that one or more preset identification information is contained in the target image, selecting a sub-image area corresponding to each preset identification information;
identifying each sub-image area selected by the frame to obtain corresponding identification information;
determining the type of the identification information corresponding to each corresponding sub-image area based on each piece of preset identification information;
and determining the target information based on the type of the identification information corresponding to each sub-image area and the identification information corresponding to each sub-image area.
7. The method of claim 6, wherein the preset identification information comprises first identification information and second identification information, the first identification information being related to the target application, the second identification information being related to the target component;
and wherein the determining the type of the identification information corresponding to each corresponding sub-image region based on each preset identification information includes:
if the preset identification information is first identification information, determining that the type of the identification information corresponding to the corresponding sub-image area is a first type;
if the preset identification information is second identification information, determining that the type of the identification information corresponding to the corresponding sub-image area is a second type, wherein the first type is different from the second type;
and wherein the determining the target information based on the type of the identification information corresponding to each sub-image region and the identification information corresponding to each sub-image region includes:
if the type of the identification information corresponding to the sub-image area is a first type, determining the identification information corresponding to the sub-image area as first information;
and if the type of the identification information corresponding to the sub-image area is a second type, determining the identification information corresponding to the sub-image area as second information.
8. An application operating device comprising:
the acquisition module is used for acquiring a target image;
the identification module is used for identifying the target image by using an information identification model to obtain target information, wherein the target information comprises first information and second information, the first information is relevant to a target application, the second information is relevant to a target component of the target application, the information identification model is obtained by training based on a plurality of sample images in advance, each sample image comprises first sample information and second sample information, the first sample information is relevant to the application, and the second sample information is relevant to the component of the application;
and the execution module is used for starting the target application based on the first information and enabling the target component to execute corresponding operation based on the second information.
9. An electronic device, comprising:
a processor; and
a memory storing a computer program for executing a computer program,
wherein the computer program, when executed by the processor, causes the processor to perform the method of any of claims 1-7.
10. A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for causing a computer to perform the method of any one of claims 1-7.
CN202111517771.4A 2021-12-13 2021-12-13 Application operation method and device, storage medium and electronic equipment Pending CN113918934A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111517771.4A CN113918934A (en) 2021-12-13 2021-12-13 Application operation method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111517771.4A CN113918934A (en) 2021-12-13 2021-12-13 Application operation method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113918934A true CN113918934A (en) 2022-01-11

Family

ID=79248974

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111517771.4A Pending CN113918934A (en) 2021-12-13 2021-12-13 Application operation method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113918934A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105144197A (en) * 2013-03-14 2015-12-09 高通股份有限公司 Image-based application launcher
CN107807808A (en) * 2016-09-08 2018-03-16 深圳市远行科技股份有限公司 The startup method and starter of a kind of mobile terminal and its application program
CN109120582A (en) * 2017-06-26 2019-01-01 陈余斌 A kind of system, method and intelligent terminal carrying out system login based on image recognition
CN110490238A (en) * 2019-08-06 2019-11-22 腾讯科技(深圳)有限公司 A kind of image processing method, device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105144197A (en) * 2013-03-14 2015-12-09 高通股份有限公司 Image-based application launcher
CN107807808A (en) * 2016-09-08 2018-03-16 深圳市远行科技股份有限公司 The startup method and starter of a kind of mobile terminal and its application program
CN109120582A (en) * 2017-06-26 2019-01-01 陈余斌 A kind of system, method and intelligent terminal carrying out system login based on image recognition
CN110490238A (en) * 2019-08-06 2019-11-22 腾讯科技(深圳)有限公司 A kind of image processing method, device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曾黄麟: "《智能计算——关于粗集理论、模糊逻辑、神经网络的理论及其应用》", 30 June 2004, 重庆大学出版社 *

Similar Documents

Publication Publication Date Title
US20200301663A1 (en) Interactive control method and device for voice and video communications
US10554805B2 (en) Information processing method, terminal, and computer-readable storage medium
CN104270404B (en) A kind of login method and device based on terminal iidentification
CN109993150B (en) Method and device for identifying age
US20120260202A1 (en) Customized launching of applications
US20160132866A1 (en) Device, system, and method for creating virtual credit card
CN107656866B (en) Method for testing application fluency, mobile terminal and computing device
US20200210644A1 (en) Removable spell checker device
US20180357404A1 (en) Information processing method and apparatus, and electronic device
CN111459364A (en) Icon updating method and device and electronic equipment
CN106789973B (en) Page security detection method and terminal equipment
CN111241043A (en) Multimedia file sharing method, terminal and storage medium
CN107862035A (en) Network read method, device, Intelligent flat and the storage medium of minutes
US11238754B2 (en) Editing tool for math equations
WO2020124454A1 (en) Font switching method and related product
CN113918934A (en) Application operation method and device, storage medium and electronic equipment
CN111614676B (en) Login method, device, equipment and medium
CN114760274A (en) Voice interaction method, device, equipment and storage medium for online classroom
CN110262856B (en) Application program data acquisition method, device, terminal and storage medium
CN109543398B (en) Application program account migration method and device and electronic equipment
CN111859322A (en) Identity verification method and device and electronic equipment
CN110865853A (en) Intelligent operation method and device of cloud service and electronic equipment
CN106373016A (en) Method and apparatus for establishing online social relations
CN117908736A (en) Interaction method, device, equipment and storage medium
CN113126865A (en) Note generation method and device in video learning process, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220111