CN114116096A - Information processing method, device, equipment and storage medium - Google Patents

Information processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN114116096A
CN114116096A CN202111342232.1A CN202111342232A CN114116096A CN 114116096 A CN114116096 A CN 114116096A CN 202111342232 A CN202111342232 A CN 202111342232A CN 114116096 A CN114116096 A CN 114116096A
Authority
CN
China
Prior art keywords
function
shortcut key
information
user
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111342232.1A
Other languages
Chinese (zh)
Inventor
范鹏博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN202111342232.1A priority Critical patent/CN114116096A/en
Publication of CN114116096A publication Critical patent/CN114116096A/en
Priority to PCT/CN2022/100539 priority patent/WO2023082645A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0238Programmable keyboards

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an information processing method, an information processing device, information processing equipment and a storage medium, wherein the method comprises the following steps: obtaining a user identification of a first user; obtaining a first set of information; determining a first function corresponding to a first input shortcut key based on the first information set; establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key. The scheme can automatically configure the shortcut key based on the collected first information set, so that the configuration efficiency of the shortcut key is improved; the automatic configuration of the shortcut key with the user as the dimension can be realized; the user experience is improved.

Description

Information processing method, device, equipment and storage medium
Technical Field
The present application relates to the field of data processing technology, and relates to, but is not limited to, an information processing method, apparatus, device, and storage medium.
Background
With the rapid development of computer technology, more and more technologies are applied in the financial field, and the traditional financial industry is gradually changing to financial technology (Fintech), but higher requirements are also put forward on the technologies due to the requirements of the financial industry on safety and real-time performance. Computer technology continues to evolve, and Development teams use Integrated Development Environment (IDE) software to build new software, web pages, services, and applications. Only one IDE tool is needed to provide all the required functionality for the developer.
The cloud IDE can realize real-time cooperation of developers in different places during code writing, and simplifies the processes of testing and deploying codes. The shortcut key configuration of the cloud IDE comprises two schemes, wherein one scheme is that a user performs manual configuration on the cloud IDE device according to own use habits; another solution is that the user directly uses the default configured shortcut key of the cloud IDE device. For the first scheme, the manual configuration process is complex and takes a long time; for another approach, default configured shortcut keys may not match the user's actual usage habits.
Disclosure of Invention
The application provides an information processing method, an information processing device, equipment and a storage medium, and the scheme can be used for automatically configuring the shortcut key based on the acquired first information set, so that the configuration efficiency of the shortcut key is improved; the automatic configuration of the shortcut key with the user as the dimension can be realized; the user experience is improved.
The technical scheme of the application is realized as follows:
the application provides an information processing method, which comprises the following steps:
obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user;
obtaining a first set of information; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period;
determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
The application provides an information processing apparatus, the apparatus includes:
a first obtaining unit, configured to obtain a user identifier of a first user, where the user identifier is used to point to the first user;
a second obtaining unit configured to obtain the first information set; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period;
the determining unit is used for determining a first function corresponding to the first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
the configuration unit is used for establishing an incidence relation between the first input shortcut key and the first function and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
The present application further provides an electronic device, including: a memory storing a computer program operable on a processor and a processor implementing the above-described information processing method when executing the program.
The present application also provides a storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described information processing method.
The information processing method, device, equipment and storage medium provided by the application comprise the following steps: obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first set of information; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key. The information processing method provided by the application can determine a first function corresponding to the first input shortcut key based on the collected first information set, establish an association relationship between the first function and the first input shortcut key, and bind the association relationship with the first user identifier. Therefore, the first point and the whole process of configuring the shortcut key are automatically completed by equipment without manual participation, so that human resources and time resources are reduced, and the configuration efficiency of the shortcut key is improved; the second point is that the configured shortcut key is configured based on the first information set, and the first information set is acquired based on the use habit of the user, so that the configured shortcut key can meet the use habit of the user; the third point is that the incidence relation between the first input shortcut key and the first function is bound with the first user identifier, so that the first function is responded under the condition that the first user inputs the first input shortcut key; the other users do not respond to inputting the first shortcut key; namely, the same input shortcut key can correspond to different functions aiming at different users, so as to adapt to habits of different users and improve the use experience of the users.
Drawings
FIG. 1 is a schematic diagram of an alternative configuration of an information handling system according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative configuration of an information handling system according to an embodiment of the present application;
fig. 3 is an optional schematic flow chart of the information processing method according to the embodiment of the present application
Fig. 4 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 5 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 6 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 7 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 8 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 9 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 10 is an alternative flow chart of an information processing method according to an embodiment of the present application;
fig. 11 is an alternative flow chart of an information processing method according to an embodiment of the present application;
fig. 12 is an alternative flowchart of an information processing method according to an embodiment of the present application;
fig. 13 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 14 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 15 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 16 is an alternative flow chart of the information processing method according to the embodiment of the present application;
fig. 17 is an alternative schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 18 is an alternative structural schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the following will describe the specific technical solutions of the present application in further detail with reference to the accompanying drawings in the embodiments of the present application. The following examples are intended to illustrate the present application but are not intended to limit the scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
In the following description, the terms "first \ second \ third" are used merely as examples to distinguish different objects, and do not represent a specific ordering for the objects, and do not have a definition of a sequential order. It is to be understood that the terms first, second, and third, if any, may be used interchangeably with the specified order or sequence to enable the embodiments of the application described herein to be practiced in other sequences than those illustrated or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
The embodiment of the application can provide an information processing method, an information processing device, information processing equipment and a storage medium. In practical applications, the information processing method may be implemented by an information processing apparatus, and each functional entity in the information processing apparatus may be cooperatively implemented by hardware resources of an electronic device, such as computing resources like a processor, and communication resources (e.g. for supporting various modes of communication such as optical cable and cellular).
The information processing method provided by the embodiment of the application is applied to an information processing system, and the information processing system comprises electronic equipment. The method comprises the steps that electronic equipment obtains a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first set of information; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
As an example, the structure of information handling system 10 may be as shown in FIG. 1, including: the electronic device 101, the electronic device 101 supports the first service 1011.
The electronic device 101 performs, via the supported first service 1011: obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first set of information; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
The first service 1011 may be any service. An exemplary first service 1011 may be an IDE service or a browser service.
As another example, the structure of information handling system 10 may be as shown in FIG. 2, including: the electronic device 101, the electronic device 101 support a first service 1011 and a second service 1012.
The method comprises the steps that under the coordination of a first service 1011 and a second service, the electronic equipment obtains a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first set of information; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
Wherein the first service 1011 is different from the second service 1012. In an example, the first service 1011 is an IDE service; the second service 1012 is a browser service.
The electronic device 101 may include a mobile terminal device (e.g., a cell phone, a tablet computer, etc.) or a non-mobile terminal device (e.g., a desktop computer, a server, etc.).
Embodiments of an information processing method, an information processing apparatus, an information processing device, and a storage medium according to the embodiments of the present application are described below with reference to schematic diagrams of information processing systems shown in fig. 1 or fig. 2.
In a first aspect, an embodiment of the present application provides an information processing method, which is applied to an information processing apparatus; the information processing apparatus may be disposed in the electronic device 101 in fig. 1 or fig. 2, among others. Next, an information processing procedure provided in the embodiment of the present application will be described.
Fig. 3 illustrates a flow chart of an alternative information processing method, which may include, but is not limited to, S301 to S304 shown in fig. 3.
S301, the electronic equipment obtains the user identification of the first user.
Wherein the user identification is used to point to the first user. The embodiment of the application does not specifically limit the specific form of the user identifier, and can be configured according to actual requirements. For example, the user identification may be a numeric number. For another example, the user identifier may be specific information characterizing the first user.
The implementation manner of obtaining the user identifier of the first user is not limited, and the user identifier can be configured according to actual requirements. For example, a user identifier may be generated according to the related information of the user equipment, or different identifiers may be configured for different user equipments in advance and notified to the user equipment, and then the electronic equipment receives the user identifier of the first user sent by the user equipment.
S302, the electronic equipment obtains a first information set.
The first information set comprises at least one first information subset; the first information subset includes at least one input shortcut key of a first user input acquired in an acquisition period and at least one function corresponding to each input shortcut key in the at least one input shortcut key.
The number of the first information subsets included in the first information set is not limited in the embodiment of the application, and the first information subsets may be configured according to actual requirements. Wherein the greater the number of first information subsets comprised by the first information set, the greater the accuracy of the configured shortcut key.
A shortcut key may refer to a single key or a combination of keys. For example, the key T may be a shortcut key, or a combination of the key Ctrl and the key S may be a shortcut key. The input shortcut key refers to the acquired shortcut key input by the user.
A function, an operation performed by an electronic device may be characterized by a function. For example, one function may correspond to an operation to open file 1, or one function may correspond to an operation to save file 1.
Example 1, the electronic device obtaining the first information set includes 5 first information subsets, respectively a first information subset 1, a first information subset 2, a first information subset 3, a first information subset 4, and a first information subset 5; the first set of information is; the first information subset 1 comprises in order: k1, a1, a2, a4, A6, A3, K3, a1, a2, a4, K2, A3; the first information subset 2 comprises in order: k2, A3, a2, a4, K3, a4, K6, a1, a2, a4, K1, a2, A3, a1, K5, a4, K4, A3; the first subset of information 3 comprises in order: k3, a1, a2, a4, a6, K1, a2, a5, a4, a 6; the first subset of information comprises in order 4: k1, a1, a2, a5, A6, A3, K3, a1, a2, a4, K2, A3, A6; the first subset of information comprises in order 5: k4, A3, a2, a4, A6, A3, K1, A3, a7, a4, K2, A3. Wherein, K plus different numbers represent different shortcut keys; a plus a number indicates different functions.
S303, the electronic equipment determines a first function corresponding to the first input shortcut key based on the first information set.
The first set of information includes at least one input shortcut key including a first input shortcut key and the first set of information includes at least one function including a first function.
The electronic equipment calculates the association degree of the first input shortcut key and the function in the at least one function included in the first information set, and determines the first function corresponding to the first input shortcut key based on the association degree of the function.
The embodiment of the present application does not limit the specific method and conditions for determining the first function, and may be configured according to actual requirements.
Illustratively, the first information set comprises 3 functions, function 1, function 2 and function 3, the electronic device determines that the first input shortcut key is most associated with function 1, and determines that function 1 is the first function.
S304, the electronic equipment establishes an incidence relation between the first input shortcut key and the first function, and binds the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
The method for establishing the association relationship between the first input shortcut key and the first function is not particularly limited in the embodiment of the application, and the method can be configured according to actual requirements. For example, the association relationship between the identifier of the first input shortcut key and the identifier of the first function may be established in the form of a table.
The information processing scheme provided by the embodiment of the application comprises the following steps: obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first set of information; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key. The information processing method provided by the application can determine a first function corresponding to the first input shortcut key based on the collected first information set, establish an association relationship between the first function and the first input shortcut key, and bind the association relationship with the first user identifier. Therefore, the first point and the whole process of configuring the shortcut key are automatically completed by equipment without manual participation, so that human resources and time resources are reduced, and the configuration efficiency of the shortcut key is improved; the second point is that the configured shortcut key is configured based on the first information set, and the first information set is acquired based on the use habit of the user, so that the configured shortcut key can meet the use habit of the user; the third point is that the incidence relation between the first input shortcut key and the first function is bound with the first user identifier, so that the first function is responded under the condition that the first user inputs the first input shortcut key; the other users do not respond to inputting the first shortcut key; namely, the same input shortcut key can correspond to different functions aiming at different users, so as to adapt to habits of different users and improve the use experience of the users.
The information processing method provided by the embodiment of the application further comprises an acquisition process of the first information set. The collection process may include, but is not limited to, embodiment 1 or embodiment 2 described below.
Embodiment 1, collecting first information for an application scenario of a service;
embodiment 2, first information is collected for an application scenario of two services.
Embodiment 1 may be implemented as: the method comprises the steps that under the condition that input shortcut keys are monitored, the input shortcut keys and functions input by a first user in an acquisition period are acquired and recorded through one service according to time sequence, the acquired input shortcut keys and functions input by the first user in the acquisition period are called a first information subset, and at least one acquired function between the first input shortcut key and a second input shortcut key is used as at least one function corresponding to the first shortcut key.
It can be understood that, in the case of monitoring the input shortcut key each time, the same processing method as the input shortcut key can be adopted to obtain a group of first information subset; thus, after multiple times of acquisition, a plurality of first information subsets can be obtained.
The first service is a browser service; in the case where the second service is an integrated development environment IDE service, embodiment 2 may be implemented as: in the case of monitoring a second input shortcut key input by the first user, the following processing is executed for the second input shortcut key: if the second input shortcut key does not belong to the shortcut key supported by the first service, acquiring a first information subset corresponding to the first acquisition period in the first acquisition period through the second service; if the second input shortcut key belongs to the shortcut key supported by the first service, acquiring the second input shortcut key through the first service, and acquiring information in a first acquisition period through the second service; and the second input shortcut key acquired by the first service and the information acquired by the second service form a first information subset corresponding to the first acquisition period.
The second input shortcut key is any input shortcut key.
It can be understood that under the condition that the input shortcut key is monitored each time, the same processing method as the second input shortcut key can be adopted to obtain a group of first information subset; thus, after multiple times of acquisition, a plurality of first information subsets can be obtained.
It should be noted that: under the condition that the second input shortcut key is the same as the default shortcut key of the first service, the second service cannot acquire the second input shortcut key due to the fact that the priority of the shortcut key of the first service is higher than that of the shortcut key of the second service, the first service acquires the second input shortcut key, and the second service is informed to acquire information of a user in the first acquisition period after the first service acquires the second input shortcut key.
Next, a process of determining, by the electronic device S303, a first function corresponding to the first input shortcut key based on the first information set is described.
S303 may include, but is not limited to, S3031 to S3034 shown in fig. 4.
S3031, the electronic equipment determines a function set corresponding to the first input shortcut key based on the first information set.
The function set comprises at least one function subset, and one function subset comprises functions corresponding to first input shortcut keys in one first information subset.
The electronic equipment identifies at least one function corresponding to each input shortcut key aiming at each first information subset in the first information set, and then determines a function set corresponding to the first input shortcut key.
Based on example 1, example 2 may include: in the case that the first input shortcut key is K1, the function set corresponding to the first input shortcut key may include 5 function subsets, which are function subset 1, function subset 2, function subset 3, and function subset 5, respectively; the function subset 1 sequentially comprises A1, A2, A4, A6 and A3, the function subset 2 sequentially comprises A2, A3 and A1, the function subset 3 sequentially comprises A2, A5, A4 and A6, the function subset 4 sequentially comprises A1, A2, A5, A6 and A3, and the function subset 5 sequentially comprises A3, A7 and A4.
S3032, the electronic device determines, based on the function subset included in the function set, a linked list corresponding to each function in the function set.
The linked list characterizes where functions appear in the function set.
Taking a linked list of the second function as an example, the electronic device determines, based on the function subsets included in the function set, an appearance position of the second function in each function subset, and uses the appearance position as a linked list corresponding to the second function.
Wherein the position of the second function in each subset of functions can be represented by a step size.
Based on example 2, example 3 may include: the linked list corresponding to the function a2 may be represented as a first step size, a second step size, a third step size and a fourth step size, where the first step size represents the position of the function a2 in the function subset 1, the second step size represents the position of the function a2 in the function subset 2, the third step size represents the position of the function a2 in the function subset 3, and the fourth step size represents the position of the function a2 in the function subset 4; and the value of the first step length can be 2, the values of the second step length and the third step length can be 3, and the value of the fourth step length can be 2.
S3033, the electronic device calculates, for each of the functions, a degree of association corresponding to the function.
The association degree corresponding to the function represents the association degree between the function and the first input shortcut key.
The embodiment of the application does not limit the specific way of calculating the correlation degree corresponding to the function, and can be configured according to actual requirements.
S3034, the electronic device determines that the second function is the first function when a difference between the association degree of the second function and the association degree of the third function is greater than a threshold value of the association degree difference.
The relevance degree of the second function is greater than the relevance degree of the functions except the second function in the functions included in the function set; the relevance degree of the third function is smaller than that of the second function and is larger than that of the functions other than the second function and the third function in the functions included in the function set.
The electronic device traverses the relevance degrees of all the functions included in the function set, and if the difference between the relevance degree of the second function (corresponding to the function with the maximum relevance degree) and the relevance degree of the third function (corresponding to the function with the second maximum relevance degree) is larger than the relevance degree threshold, the second function is determined to be the first function.
The specific value of the relevancy threshold is not limited, and the relevancy threshold can be configured according to actual requirements. For example, the correlation threshold may be 0.3.
It should be noted that, if there is no second function that satisfies the condition, it is indicated that the number of the first information subsets included in the first information set is not yet sufficient, and the first information subsets need to be further collected to determine the second function that satisfies the condition as the first function.
It is to be understood that, the electronic device may further determine, as the first function, a function with the largest corresponding association degree among the functions included in the function set.
Optionally, between performing S3031 and S3032, the information processing method provided in the embodiment of the present application may further include, but is not limited to, S3031A and S3031B shown below.
S3031A, the electronic equipment counts the frequency of each function included in the function set.
The frequency of functions is the ratio of the number of functions in the set of functions to the number of subsets of functions.
Based on 2, example 4 may include: the number of functions a2 in the function set is 4 and the number of energy subsets is 5, so the frequency of function a2 is 0.8, and in the same way, the frequency of function A3 is 0.8, the frequency of function A3 is 0.8, the frequency of function a1 is 0.6, the frequency of function a4 is 0.6, the frequency of function a6 is 0.6, the frequency of function a5 is 0.4, and the frequency of function a7 is 0.2.
S3031B, the electronic device deletes the fourth function in the function subset included in the function set.
The frequency of the fourth function is less than the frequency threshold.
The frequency threshold is not specifically limited in the embodiments of the present application, and may be configured according to actual requirements. In one example, the frequency threshold is 0.5.
Based on example 2, example 5 may include: in the case that the frequency threshold is 0.5, the fourth function includes a function a5 and a function a7, and the deleted function set includes 5 function subsets, namely a function subset 1, a function subset 2, a function subset 3, and a function subset 5; the function subset 1 sequentially comprises A1, A2, A4, A6 and A3, the function subset 2 sequentially comprises A2, A3 and A1, the function subset 3 sequentially comprises A2, A4 and A6, the function subset 4 sequentially comprises A1, A2, A6 and A3, and the function subset 5 sequentially comprises A3 and A4.
In this way, after the function smaller than the frequency threshold value is deleted, the data volume of the function set is reduced, the data volume of subsequent processing is reduced, and the complexity and time of the processing are reduced; while the accuracy of the first function can be improved.
Next, the electronic device S3033 calculates the association degree corresponding to each of the functions. The process of calculating the association degree corresponding to each function is similar, and now, taking one function as an example, the process is explained, which may include, but is not limited to, the following S30331 to S30333.
S30331, the electronic equipment divides the length of the linked list corresponding to the function by the reference length to obtain the length ratio of the linked list.
The length of the linked list characterizes the number of function subsets comprising functions in the function set.
The reference length value is not limited, and the reference length value can be configured according to actual requirements. In a possible embodiment, the reference length may be configured as an empirical value; in another possible implementation, the linked list length corresponding to one function in the function set may be used as the reference length.
For example, the largest length among the lengths of the linked lists corresponding to the functions in the function set may be used as the reference length.
Based on example 3, the length of the linked list corresponding to function 2 is 4, and the length of the linked list corresponding to function 2 is 4.
S30332, the electronic equipment divides the weight of the linked list corresponding to the function by the reference weight to obtain a weight ratio.
The weight of the linked list is related to the occurrence location of the linked list representation.
In a possible implementation, the weight of the linked list is the sum of the weights corresponding to a plurality of step sizes. The smaller the value of the step length is, the larger the weight corresponding to the step length is.
The embodiment of the application does not limit the specific value of the reference weight, and can be configured according to actual requirements.
In a possible embodiment, the reference weight may be configured as an empirical value; in another possible implementation, the reference length may be a weight corresponding to the smallest step size.
S30333, the electronic equipment multiplies the length ratio of the linked list by the weight ratio to obtain the correlation corresponding to the function.
It is understood that the association degree corresponding to the functions can be calculated in other manners. The correlation degree corresponding to the function is positively correlated with the frequency of the function, and the correlation degree is negatively correlated with the step length in the linked list corresponding to the function.
Next, a process of establishing the association relationship between the first input shortcut key and the first function by the electronic device S304 is described, which may include, but is not limited to, the following embodiment a1 or embodiment a 2.
Embodiment a1, establishing an association relationship for an application scenario of a service;
embodiment a2, an association is established for the application scenarios of two services.
Embodiment a1 may include, but is not limited to, S3041 to S3044 shown in fig. 5.
S3041, the electronic equipment obtains a first input shortcut key and a built-in shortcut key corresponding to the first function.
A first association relationship exists between the built-in shortcut key and the first function.
It is understood that the electronic device may be connected to the first function by means of the built-in shortcut key and the first association.
S3042, the electronic equipment matches the first input shortcut key with the expansion shortcut keys in the expansion shortcut key list.
The extended shortcut list may include at least one extended shortcut.
The electronic equipment matches the first input shortcut key with the extended shortcut keys in the extended shortcut key list one by one, judges whether the extended shortcut key with the same content as the first input shortcut key exists, if so, considers that the extended shortcut key in the extended shortcut key list is hit, and correspondingly executes the following S3043, and if not, considers that the extended shortcut key in the extended shortcut key list pool is not hit, executes the following S3044.
S3043, if the extended shortcut key in the extended shortcut key list is hit, the electronic equipment establishes a second association relationship between the hit extended shortcut key and the built-in shortcut key.
And if the extended shortcut key in the extended shortcut key list is hit, the electronic equipment establishes a second association relationship between the hit extended shortcut key and the built-in shortcut key, so that the electronic equipment can be connected to the built-in shortcut key through the second association relationship and the first input shortcut key.
S3044, if the extended shortcut keys in the extended shortcut key list pool are not hit, the electronic equipment adds the first input shortcut keys in the extended shortcut key list; and establishing a third association relation between the first input shortcut key and the built-in shortcut key.
If the electronic equipment does not hit the extended shortcut keys in the extended shortcut key list pool, adding the first input shortcut keys in the extended shortcut key list; establishing a third association relation between the first input shortcut key and the built-in shortcut key; so that the built-in shortcut can be connected to through the third association and the first input shortcut.
It should be noted that, if there is no first association relationship between the built-in shortcut and the first function, the electronic device directly establishes a fourth association relationship between the first input shortcut and the first function, so that the first function is linked through the first input shortcut and the fourth association relationship.
The first service is a browser service; in the case where the second service is an integrated development environment IDE service, embodiment a2 may be implemented as: the difference from the embodiment a1 is that the extended shortcut keys in the extended pool list are configured through the extended module of the browser, and a corresponding extended shortcut key is configured for each default shortcut key of the browser; and the browser modifies a trigger event of triggering the first function by the built-in shortcut key in a script mode and sends the trigger event to the IDE service.
Because the priority of the extended shortcut key configured by the extension module is higher than the priority of the default shortcut key of the browser, under the condition that the input shortcut key is the same as the default shortcut key of the browser, the extension module of the browser can monitor the input shortcut key, is connected to the corresponding extended shortcut key based on the input shortcut key, is linked to the corresponding built-in shortcut key through the second association relation or the third association relation between the extended shortcut key and the built-in shortcut key, and the IDE service triggers the function corresponding to the input shortcut key through the received trigger event.
The following describes a process of obtaining, by the electronic device S301, the user identifier of the first user, which may include, but is not limited to, the following S3011 and S3012.
S3011, the electronic device obtains device information of at least one dimension of the first user device.
The number of the dimensions of the acquired device information is not particularly limited, and the device information can be configured according to actual requirements. The larger the number of the dimensions of the acquired device information is, the higher the accuracy of the determined user identifier is; the accuracy of the user identification is used to characterize the accuracy with which the first user is identified by the user identification.
In an example, the electronic device obtaining device information for at least one dimension may include at least one of: basic information of the device (device information of the first dimension), configuration information of the device.
Illustratively, the basic information of the device may include one or more of the following: user Agent (User Agent) information, time zone information, screen size information, resolution information, font information, and plug-in information.
The configuration information of the device may include one or more of: graphics Processing Unit (GPU) feature information, image driver feature information, and graphics card feature information of the device. Wherein the characteristic information is used for characterizing the difference between the configuration information of different devices.
S3012, the electronic device combines the device information of the at least one dimension and then performs hash calculation to obtain the first user identifier.
After the electronic device combines the device information of at least one dimension, hash operation is performed on the combined information through a multiplication rotation (murmur3) algorithm to obtain a first user identifier.
Next, a process of acquiring device information of at least one dimension by the electronic device in S3011 will be described, and the process may include, but is not limited to, the following S30111 to S30113.
S30111, the electronic device draws a first image through the first user equipment.
The first image comprises at least one of a two-dimensional image or a three-dimensional image; the first image characterizes distinctive configuration information between the devices.
Illustratively, the first image may be a Canvas (Canvas) image or a gradient image.
In a possible implementation, the first image is a hidden image, i.e. the first image is not displayed.
The electronic device automatically draws the first image based on the pre-programmed script through the pre-configured configuration information of the electronic device.
S30112, the electronic device converts the first image into first data.
The first data is binary data representing the first image by a print character.
The electronic device converts the first image into binary data representing the first image by printing characters as first data.
S30113, the electronic device performs hash operation on the first data to obtain device information of a first dimension.
The device information of the first dimension represents device configuration information of a first user; the at least one dimension includes a first dimension.
Illustratively, the electronic device performs a hash operation on the first data through a murmur3 algorithm to obtain device information of a first dimension.
The information processing method provided by the embodiment of the present application is described below by taking an example in which the first service is a browser service and the second service is a cloud IDE service.
For ease of understanding, some technical terms are briefly explained.
Integrated Development Environment (IDE): is a software platform that can be used to eliminate various problems in a managed development environment. Among other things, the IDE provides programmers and developers with tools for software development in an "all-in-one system". They are intended to be used with specific application platforms to overcome the development lifecycle barriers of software.
And (3) cloud IDE: an integrated development cloud platform based on World Wide Web (Web) generally comprises a code editor, a compiler, a command line, a debugger, and an Application Programming Interface (API) or Graphical User Interface (GUI) builder.
Shortcut key: also called as a hot key or a hot key, means that an operation is performed by using a certain specific key, key sequence or key combination instead of a mouse.
Hash (Hash): an input of arbitrary length is changed by a hashing algorithm into an output of fixed length, which is a hash value.
A User Agent (UA) is a special string header, which enables a server to identify an operating system and version, a Central Processing Unit (CPU) type, a browser and version, etc. used by a client.
A Canvas: refers to a dynamic drawing tag in hypertext Markup Language (HTML) 5. Where advanced pictures can be generated or processed using Canvas.
Cyclic Redundancy Check (CRC) code: the method is a common check code with the capability of error detection and error correction.
Web Graphics Library (Web Graphics Library, Web GL): a three-dimensional (3-dimension, 3D) drawing standard for rendering 3D images on web pages.
Murmur Hash 3: a non-cryptographic hash function is suitable for general hash lookup. A 32-bit or 128-bit hash value may be generated.
Base64 encoding: a method of representing binary data based on 64 printable characters.
Google browser (chrome) extension: it can be used to customize the small software module, including user interface modification, advertisement interception and data (cookie) management stored on the user's local terminal.
chrome shortcut key: refers to the default shortcut key in the chrome browser.
Expanding shortcut keys: and (4) indicating a shortcut key for custom extension of the chrome browser. The corresponding extended shortcut key can be matched according to the using habit of the user.
User shortcut key: the method refers to shortcut keys set by a user according to daily use habits, and can also be called as key combination.
Shortcut function (Mouse Trap) library: and the java Script library is used for monitoring and processing keyboard shortcut keys.
Development teams typically use IDE software to build new software, web pages, services, and applications. Only one IDE tool is needed to provide the required functionality for the developer and no separate integration is required as they work across platforms. Therefore, it can be used to code java Script, My Sql, Python, and other programming languages into a particular platform. Among them, it is very common for a text editor to create a website from scratch, and with the rapid development of technologies such as mirroring and containers, many software are hosted in the cloud, and the IDE is no exception, and more cloud IDE applications are generated. A cloud IDE is a Web-based integrated development cloud platform, typically consisting of a code editor, compiler, command line, debugger, and API or GUI builder.
Cloud IDEs have many advantages, including no download and installation, simplifying real-time collaboration between developers writing code in different locations, making testing and deploying code easier, and they are well suited for developers who want to try new languages, frameworks, or tools without local installation.
In order to improve the use experience of developers, most of the existing cloud IDE systems provide default shortcut keys and also provide the function of self-defining shortcut keys. When the user uses the keyboard for the first time, the shortcut key which accords with the habit of the user needs to be configured. Part of the cloud IDE system for immediate coding has no self-defining function, and the user can only use the default shortcut key. In addition, due to the limitation of the default shortcut key of the browser, the default shortcut key of the partial function of the cloud IDE system may conflict with the native IDE system.
In the related technology, on one hand, for some cloud IDE systems with instant codes, in order to provide a function of coding and checking results anytime and anywhere, a login authentication module is abandoned, the same system configuration is provided for all developers, and the system has default shortcut keys which do not support user-defined shortcut keys. Thus, since the usage habits of each developer are different, some users must change the development habits to adapt to the cloud IDE system.
On the other hand, for other cloud IDE systems, although a user-defined shortcut key module is added, since a user still needs to spend a lot of time to configure a shortcut key that meets own habits in order to improve development efficiency after logging in the system for the first time, time consumed for configuring the shortcut key is also long.
On the other hand, because the cloud IDE system is also a web system in nature, some rules of the browser need to be adapted in the use of the shortcut key, when the shortcut key of the IDE system conflicts with the default shortcut key of the browser, the default behavior of the browser can be responded preferentially, and then the shortcut key of the cloud IDE system cannot respond. If some key shortcuts collide, unrecoverable side effects may result. The native IDE application may listen for freely combined shortcut keys in response to user behavior. The default shortcut keys of the existing cloud IDE actively avoid the default shortcut keys of the browser, and the conflicting shortcut keys are avoided when developers define the shortcut keys. This results in a need to force changes to usage habits for those developers who switch from native IDE to cloud IDE.
In brief, part of the instant coding IDE system does not log in an authentication module and does not provide a shortcut key self-defining function, and developers can only use the default shortcut key of the system to force users to change use habits. Part of the IDE has a login authentication module, and although a custom shortcut key function is provided, it takes a lot of time to configure a shortcut key that conforms to its own habit when switching from the native IDE to the cloud IDE system. In addition, when the user-defined shortcut key is configured, because the default shortcut key of the browser exists, the user needs to actively avoid the default shortcut key, so that conflicts are prevented, the user is forced to change the use habit from a certain angle, and the development efficiency is reduced.
The IDE system provided by the embodiment of the application has the following characteristics:
1. the shortcut keys are configured without consuming more time and energy, and the automatic configuration of the shortcut keys of the user is realized.
2. The method and the device do not need to log in, and realize the differentiated configuration of the shortcut keys of the users according to the use habits of different users.
3. The user is supported to use the shortcut keys which accord with the use habit of the user, the limitation of default shortcut keys of the browser is not considered, and the user can enjoy the same shortcut key use experience as the native IDE.
The automatic configuration scheme of the differentiated shortcut key provided by the embodiment of the application can carry out automatic configuration, namely, a user does not need to spend a large amount of time to configure the shortcut key when using the cloud IDE, and the system can actively complete the configuration work; and the configured differentiated shortcut keys can meet the use habits of different users, but not a set of unified default shortcut keys, so that the users can be more concentrated on the coding work of the users, and the efficiency is improved. According to the scheme, different users are identified based on the multi-dimensional attributes of the browser, then unique shortcut key behavior information of the users is collected, meanwhile, statistical analysis is carried out on the collected information, the shortcut key use habits of the users are obtained, and therefore automatic shortcut key configuration is completed.
The specific process may include, but is not limited to, the following steps:
1. and automatically identifying the accessed user based on the information of the browser through the cloud IDE service, and generating a unique identifier of the user.
For a cloud IDE without a login authentication module, if it is desired to provide differentiated shortcut key configurations for different users, it is first necessary to identify the different users. The user information is collected firstly, and the unique identification (user Id) of the user is generated according to the collected user information, so that different users are distinguished, and the user differential configuration information is stored.
The user information may include browser basic information (equivalent to device basic information), canvas information (equivalent to device configuration information), and Web GL information (equivalent to device configuration information).
Firstly, a cloud IDE system collects browser basic information; the browser basic information includes User Agent, time zone, screen size, resolution, font, plug-in, etc.
Second, the cloud IDE system collects canvas information.
Since Graphics Processing Units (GPUs), graphics drivers, and graphics display cards on different user devices are different, rendering parameters, anti-aliasing algorithms, and the like used by the system display card when rendering canvas graphics are different, and thus CRC check codes for rendering pictures are also different. Based on this principle, canvas information of the user device is collected as part of the user information.
Specifically, as shown in fig. 6, a hidden Canvas image (corresponding to a first graphic) is drawn by a script, and after the image is drawn, data information (dataurl) of its base64 is acquired. The dataurl string is then subjected to murmur3 digest calculation to obtain a 32-bit result, which is denoted as canvas information (also called canvas ID) as part of the user ID generation.
Web GL information is very similar to Canvas information in that they both use browsers to render text and images off-screen, which can be used to distinguish users according to their graphics drivers and device hardware. Based on this principle, Web GL information of the browser is collected.
Specifically, as shown in fig. 7, a shader is created, the shader created by the Web GL drawing technology is used to draw a hidden gradient image, then the gradient image is converted into a base64 string, then the string is integrated, some other basic information of the Web GL rendering including the Web GL version, the shader language version, the vendor and the supportable extension is enumerated, these additional information are added to the base64 string, and the murmurmurmur 3 digest calculation is performed on the integrated string to obtain a 32-bit result, which is marked as the Web GL information (also referred to as the Web GL ID), and the 32-bit result is used as a part for generating the user ID.
As shown in fig. 8, the browser basic information (for example, may include user agent, time zone, screen size, resolution, font and plug-in), canvas information and Web GL information are used as data source signals, and the whole is subjected to murmurr 3 digest calculation again, and finally a 32-bit hash value is generated as the user unique identifier.
2. And collecting shortcut keys of the user.
Since the data of the shortcut keys of the user is an important premise for setting the shortcut key configuration which accords with own habits for different users, the different users are identified, and then the different users are subjected to differentiated shortcut key configuration.
The main idea comprises the following steps: when a shortcut key is triggered to invoke a function of the cloud IDE, a mouse action is typically used to invoke the function of the system if the system does not respond or responds to other functions. Therefore, the input key combination is monitored, and after the key combination is monitored, the operation (mouse click, scroll or drag, etc.) of the next collection period and other shortcut keys (the operation and the shortcut keys together correspond to the first information subset) input in the collection period are collected and recorded. Other shortcut keys of the acquisition period are recorded, and interference on user behavior analysis in the follow-up process is mainly prevented. For example, when there is a trigger of another key combination within the collection period, the collection operation is not initiated again, preventing the sample from being repeated.
Specifically, the acquisition process may include:
firstly, a Mouse Trap library in the IDE service is adopted to monitor a common key combination, a monitoring buried point is added at the same time, (the monitoring buried point can be recorded as Ki, i represents different key combinations), the key combination is bound to a corresponding functional module, a shortcut key bound with the functional module is called as a built-in shortcut key, the specific configuration refers to other mature cloud IDE settings in the industry, and a triggering event buried point (an event buried point can be recorded as Aj, j represents different functions) is added at each function position bound with the built-in shortcut key.
Due to the existence of default shortcut keys of the browser, a user cannot use the shortcut keys as desired in the native IDE, and the default shortcut keys have a limitation condition: when a certain key combination input by a user is just matched with a certain default shortcut key of the browser, the function corresponding to the key combination in the browser is preferentially responded, and the function taking the shortcut key as a built-in shortcut key in the cloud IDE system is ignored. Built-in shortcut keys in part of the cloud IDE system avoid default shortcut keys of the browser. It is known that chrome browser extensions can set up shortcuts, called extension shortcuts, which can be used to override user input key combinations. When a user browses a webpage, the key combination is matched with a certain expansion shortcut key, the key combination can be intercepted by the expansion system, and the collection process of the user shortcut key is skillfully designed based on the characteristic.
When monitoring and counting the key combination of the user, the method is divided into two conditions according to whether the input shortcut key is overlapped with the default shortcut key of the browser: the first method is that a shortcut key input by a user is not overlapped with a default shortcut key of a browser, the key pressing behavior of the user is monitored through a cloud IDE service, and the operation of the next acquisition cycle is recorded; the second is that the shortcut key input by the user is overlapped with the default shortcut key of the browser, and the cloud IDE service cannot monitor the key combination, because the priority of the default shortcut key of the browser is higher, the cloud IDE cannot acquire the next behavior of the user. In this way, the operation of acquiring the next acquisition cycle can be assisted by an auto-configurator in the browser. Wherein the auto-configurator is implemented based on an extension module of the browser service (e.g., being a chrome browser). Specifically, an extended shortcut key list pool is configured in an automatic configurator of the browser service in advance to correspond to default shortcut keys of the browser one by one, when a user uses the cloud IDE, an input key combination is matched with a certain extended shortcut key and is intercepted by the automatic configurator, and the automatic configurator informs the cloud IDE service to capture the shortcut key input by the user and instructs the IDE service to collect the operation of the next collection period.
Whether the cloud IDE service actively collects or collects with the assistance of the browser's auto-configurator, a string of record codes beginning with the monitored key combination is finally obtained, such as: [ K2A1A3A4, K1A1A2A3K2A2 ] (representing shortcuts collected over one acquisition cycle).
3. The rules between the key combinations and the IDE service functions are analyzed by the browser service.
The behavior analyzer determines, among the collected information, a system function that is most relevant to the currently input key combination (corresponding to the first key combination), that is, a target system function (corresponding to the first function, which may also be referred to as a target function). Specifically, the following 4 points may be included but not limited:
first point, cutting and sorting of data.
It is mentioned above that each record acquired can be represented by an array, for example [ K1, a1, a2, a4, a6, A3, K3, a2, a4, K2. ], where K represents a key combination, a represents a system function, and the following numbers are used to distinguish different key combinations or system functions. And dividing the array into a plurality of sections according to the key combination as nodes, wherein each section comprises a key combination and a plurality of system functions, performing the same processing on the other records to obtain a plurality of groups of data, classifying according to the key combination, and finally obtaining a data set list of each key combination.
As shown in fig. 9, the collected data may include record 1 (corresponding to the first information subset 1), record 2 (corresponding to the first information subset 2), record 3 (corresponding to the first information subset 3), record 4 (corresponding to the first information subset 4), and record 5 (corresponding to the first information subset 5). Wherein record 1 comprises K1, a1, a2, a4, A6, A3, K3, a1, a2, a4, K2, A3; record 2 includes K2, A3, a2, a4, K3, a4, K6, a1, a2, a4, K1, a2, A3, a1, K5, a4, K4, A3; record 3 includes K3, a1, a2, a4, a6, K1, a2, a5, a4, a 6; record 4 includes K1, a1, a2, a5, A6, A3, K3, a1, a2, a4, K2, A3, A6; record 5 includes K4, A3, a2, a4, A6, A3, K1, A3, a7, a4, K2, A3.
After the collected data is cut and classified, the resulting data set list of K1 may be as shown in fig. 10, including: a1, a2, a4, a6, A3; a2, A3, a 1; a2, a5, a4, a 6; a1, a2, a5, a6, A3; a3, A7 and A4.
Second, a function of filtering out low frequencies.
Traversing the data set list of each key, searching all independent items (equivalent to functions) in the data set, wherein each independent item corresponds to different functions, calculating the frequency corresponding to each independent item, and deleting the independent items of which the frequency value is less than a frequency threshold value (Lmin) from the original data set so as to obtain a new data set.
For example, the frequencies corresponding to all the individual items in the data set list of K1 are as shown in fig. 11, the frequency of a2 is 0.8, the frequency of A3 is 0.8, the frequency of a1 is 0.6, the frequency of a4 is 0.6, the frequency of a6 is 0.6, the frequency of a5 is 0.4, and the frequency of a7 is 0.2; the frequency threshold is 0.5, then A5 and A7 are deleted. The filtered data set list of K1 is shown in fig. 12 and includes: a1, a2, a4, a6, A3; a2, A3, a 1; a2, a4, a 6; a1, a2, a6, A3; a3 and A4.
And thirdly, creating an independent necklace table group.
A single data linked list is created for each individual item in the filtered data set. Wherein, a single direction data chain table comprises at least one node; each node has a counter whose value is used to indicate the distance of the node under each individual entry in the filtered data set (which may also be referred to as the step size of the key combination) and a pointer for maintaining the order of the list. With the increase of time, the relevance of functions gradually decreases, and different weight values, 1- > s1, 2- > s2, 3- > s3, are mapped for each step length, wherein, n- > sn (s1> s2> s 3). Wherein n represents a step size; sn represents the corresponding weight value when the step size is n.
And (4) arranging all the independent item linked lists in a descending manner according to the length of the linked lists to obtain an independent necklace list group.
As shown in FIG. 13, the separate necklace table set of K1 may include the separate items A2 single data linked list, A3 single data linked list, A1 single data linked list, A4 single data linked list and A6 single data linked list. The one-way data link list of the independent item A2 comprises 4 nodes, namely a node A1, a node A2, a node A3 and a node A4, wherein the step length of the node A1 is 2, the step length of the node A2 is 1, the step length of the node A3 is 1, and the step length of the node A4 is 2; the one-way data link list of the independent item A3 includes 4 nodes, node B1, node B2, node B3 and node B4, the step size of node B1 is 5, the step size of node B2 is 2, the step size of node B3 is 4, and the step size of node B4 is 1; the one-way data link list of the independent item A1 comprises 3 nodes, namely a node C1, a node C2 and a node C3, wherein the step size of the node C1 is 1, the step size of the node C2 is 3, and the step size of the node C3 is 1; the one-way data link list of the independent item A4 comprises 3 nodes, namely a node D1, a node D2 and a node D3, wherein the step size of the node D1 is 3, the step size of the node D2 is 2, and the step size of the node D3 is 2; the one-way data link list of the independent item A6 includes 3 nodes, node E1, node E2 and node E3, the step size of node E1 is 4, the step size of node E2 is 3, and the step size of node E3 is 3.
And fourthly, determining the function of the target system.
And after the chain table group is obtained, calculating the association degrees of different independent items through the browser service. The higher the frequency of occurrence of the individual items and the closer the individual items are to the key combination (the shorter the step length), the stronger the degree of association.
And taking the length of the first linked list in the linked list group as a reference L, and calculating the association degree of each independent item. For example, the degree of association of the individual terms can be calculated by the following formula (1).
Figure BDA0003352585160000171
Wherein R isnRepresenting the relevance of the individual item n; p' represents the length ratio of the individual terms; w represents the weight of the individual term; ln represents the chain table length of n, and L represents the length of a reference chain table; sigma QnThe sum of the weights of each node representing an individual term n; s1 represents the weights of the reference linked list.
Finding out the first two relevance degrees with the largest relevance value from the relevance degrees of the independent items, and marking the first two relevance degrees as Rmax1 and Rmax2, and if the difference result between the Rmax1 and the Rmax2 is larger than the minimum interval threshold value, determining that the independent item corresponding to the Rmax1 is the target system function most relevant to the user input key combination; if the result of the difference between Rmax1 and Rmax2 is less than or equal to the minimum interval threshold, it is determined that the sample data is not enough to acquire the independent item with the strongest association, and the user behavior needs to be acquired continuously to expand the sample data.
And (3) subsequently, acquiring the action of repeating 1-2 of the user behavior record, creating a new one-way linked list for the newly added independent item, supplementing the new one-way linked list into a linked list group, adding new nodes into the original linked list for the repeated independent item, wherein the newly added nodes can be shown as dotted lines in fig. 14, and then recalculating the relevance of each independent item until the function of the target system can be determined.
4. And automatically configuring a user shortcut key.
When the behavior analyzer obtains a target system function corresponding to the user input key combination, the behavior analyzer informs the cloud IDE service to initiate a user shortcut key configuration request to a user center in the automatic configurator, and request parameters carry the user Id, the key combination and a built-in shortcut key corresponding to the target system function. As shown in fig. 15, after receiving the configuration request, the auto-configurator matches the key combination with the extended shortcut key list pool, and if a certain extended shortcut key is hit, binds the mapping relationship between the current key combination and the shortcut key built in the target system function with the user, and configures the mapping relationship below the current user Id. If the key combination is not hit, the key combination in the configuration request is monitored by the cloud IDE, in order to be intercepted by the automatic configurator subsequently and perform differentiation processing based on different users, the automatic configurator needs to add an extended shortcut key to the key combination to supplement the extended shortcut key to the list pool, the key value of the newly added extended shortcut key is equal to the key combination, then the steps are performed in the same way, the mapping relation between the key combination and the built-in shortcut key of the target system function is bound with the user, and the user is registered below the current user Id.
As shown in fig. 15, after the configuration is completed, the user center stores a mapping relationship between a current user (user a) and a built-in shortcut key of a target system function for a key combination (user shortcut key), and ensures that an extended shortcut key must be matched with an input key combination in an extended shortcut key list pool (for example, including an extended shortcut key K1, an extended shortcut key K2, an extended shortcut key K3, an extended shortcut key Kn, and the like). When a user inputs a shortcut key, the shortcut key is intercepted by the extended shortcut key, and a built-in shortcut key bound by the shortcut key is inquired in the mapping relation of the user A under the user center (for example, the mapping relation comprises the mapping relation of the user A, the mapping relation of the user B and the mapping relation of the user C) according to the key combination.
And then, a monitoring event of the built-in shortcut key needs to be reissued, so that the cloud IDE responds to the function of the target system. The method can be specifically realized by adopting a chrome extension through an automatic configurator. For example, content scripts in the chrome extension module are Java Script scripts running in a web page, and can obtain detailed information of a page accessed by a browser. And modifying the information, simulating and transmitting a built-in shortcut key monitoring event in a content script based on the characteristic, and responding to a target function by the cloud IDE when the event is monitored by the cloud IDE so as to finish the differentiated automatic configuration of the shortcut key.
The flow may be as shown in fig. 16, and the information processing procedure may include a user registration procedure, a first information collection procedure, a target function determination procedure, and an automatic configuration procedure.
The registration process for the user may include: and generating a user identifier under the condition that the user accesses for the first time, and storing the user identifier to the user center.
The process for acquiring the first information may include: when the input key combination is monitored, whether the input key combination is intercepted by the extended shortcut key list pool is judged, if yes, whether the input shortcut key is collected in the user center is judged aiming at the user, if yes, a built-in shortcut key triggering event is simulated and transmitted, and if not, the cloud IDE service is informed to collect user behaviors.
The target function determination process may include: cutting the collected user behavior data, deleting low-frequency independent items, creating a linked list group of the independent items, calculating the relevance of the independent items, and determining the target function.
For the auto-configuration process may include: the cloud IDE service initiates a configuration request, judges whether any extended shortcut key is hit, and if yes, establishes an association relation between the extended shortcut key and a built-in shortcut key corresponding to a target function; and if the target function is not hit, adding the extended shortcut keys and establishing the association relationship between the added extended shortcut keys and the built-in shortcut keys corresponding to the target function.
The shortcut key configuration scheme provided by the embodiment of the application has the following effects: the method has the advantages that login is not needed, and shortcut key differential configuration of different users is realized according to use habits of the different users; the method supports automatic configuration of the shortcut keys of the user, does not need to waste redundant time and energy to configure the shortcut keys, can enable the user to concentrate on coding work, and provides working efficiency; the user is supported to use the shortcut keys which accord with the use habit of the user, the limitation of default shortcut keys of the browser is not considered, and the user can enjoy the same shortcut key use experience as the native IDE.
In order to implement the above information processing method, an information processing apparatus according to an embodiment of the present application will be described with reference to a schematic configuration diagram of the information processing apparatus shown in fig. 17.
As shown in fig. 17, information processing apparatus 170 includes: a first obtaining unit 1701, a second obtaining unit 1702, a determining unit 1703, and a configuring unit 1704. Wherein:
a first obtaining unit 1701, configured to obtain a user identifier of a first user, where the user identifier is used to point to the first user;
a second obtaining unit 1702 for obtaining the first information set; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period;
a determining unit 1702, configured to determine, based on the first information set, a first function corresponding to a first input shortcut key; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
a configuration unit 1703, configured to establish an association relationship between the first input shortcut key and the first function, and bind the association relationship with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
In some embodiments, information processing device 170 further includes an acquisition unit,
the method comprises the following steps of monitoring a second input shortcut key input by the first user, and aiming at the second input shortcut key:
if the second input shortcut key does not belong to the shortcut key supported by the first service, acquiring a first information subset corresponding to the first acquisition period in the first acquisition period through a second service; the first service is a browser service; the second service is an Integrated Development Environment (IDE) service;
and if the second input shortcut key belongs to the shortcut key supported by the first service, acquiring the second input shortcut key through the first service, and acquiring information in the first acquisition period through the second service, wherein the second input shortcut key acquired by the first service and the information acquired by the second service form a first information subset corresponding to the first acquisition period.
In some embodiments, determining unit 1703 is further configured to:
determining a function set corresponding to the first input shortcut key based on the first information set, wherein the function set comprises at least one function subset, and one function subset comprises functions corresponding to the first input shortcut key in one first information subset;
determining a linked list corresponding to each function in the function set based on a function subset included in the function set, wherein the linked list represents the appearance position of the function in the function set;
for each function, calculating a corresponding association degree of the function, wherein the association degree characterizes the association degree between the function and the first input shortcut key;
determining that the second function is the first function when the difference between the association degree of the second function and the association degree of the third function is greater than an association degree difference threshold; the relevance degree of the second function is greater than the relevance degree of the functions except for the second function in the functions included in the function set; the relevance degree of the third function is smaller than the relevance degree of the second function and is larger than the relevance degree of the functions, except the second function and the third function, in the functions included in the function set.
In some embodiments, information processing apparatus 170 further includes a deletion unit,
before the determining unit 1702 performs the determining, based on the subset of functions included in the function set, a linked list corresponding to each function in the function set is determined, the frequency of each function included in the function set is counted; the frequency of the function is the ratio of the number of the functions in the set of functions to the number of the subset of functions;
deleting a fourth function in a function subset included in the function set; the frequency of the fourth function is less than a frequency threshold.
In some embodiments, the determination unit 1703 is further configured to:
dividing the length of the linked list corresponding to the function by the reference length to obtain the length ratio of the linked list; the length of the linked list characterizes the number of function subsets comprising the function in the function set;
dividing the weight of the linked list corresponding to the function by the reference weight to obtain a weight ratio; the weight of the linked list is related to the appearance position represented by the linked list;
and multiplying the length ratio of the linked list by the weight ratio to obtain the correlation corresponding to the function.
In some embodiments, configuration unit 1704 is further operable to: .
Acquiring a first input shortcut key and a built-in shortcut key corresponding to the first function; a first association relation exists between the built-in shortcut key and the first function;
matching the first input shortcut key with an extended shortcut key in an extended shortcut key list;
if the extended shortcut key in the extended shortcut key list is hit, establishing a second association relation between the hit extended shortcut key and the built-in shortcut key;
if the extended shortcut keys in the extended shortcut key list pool are not hit, adding the first input shortcut keys in the extended shortcut key list; and establishing a third association relation between the first input shortcut key and the built-in shortcut key.
In some embodiments, the first obtaining unit 1701,
acquiring equipment information of at least one dimension of first user equipment;
and combining the device information of at least one dimension and then performing hash calculation to obtain the first user identifier.
In some embodiments, the processing unit is further to:
drawing a first image by the first user equipment; the first image comprises at least one of a two-dimensional image or a three-dimensional image; the first image represents distinguishing configuration information between the devices;
converting the first image into first data; the first data is binary data representing the first image by printing characters;
performing hash operation on the first data to obtain equipment information of a first dimension; the device information of the first dimension represents device configuration information of the first user; the at least one dimension includes the first dimension.
The information processing apparatus provided in the embodiment of the present application includes units that can be implemented by a processor in an electronic device; of course, the implementation can also be realized through a specific logic circuit; in the implementation process, the Processor may be a Central Processing Unit (CPU), a microprocessor Unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
The above description of the apparatus embodiments, similar to the above description of the method embodiments, has similar beneficial effects as the method embodiments. For technical details not disclosed in the embodiments of the apparatus of the present application, reference is made to the description of the embodiments of the method of the present application for understanding.
In the embodiment of the present application, if the information processing method is implemented in the form of a software functional module and sold or used as a standalone product, the information processing method may also be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof contributing to the related art may be embodied in the form of a software product stored in a storage medium, and including several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, or an optical disk. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
In order to implement the information processing method, an embodiment of the present application provides an electronic device, which includes a memory and a processor, where the memory stores a computer program that is executable on the processor, and the processor implements the steps in the information processing method provided in the above embodiment when executing the program.
Next, a configuration of the electronic device will be described with reference to the electronic device 180 shown in fig. 18.
In an example, the electronic device 180 may be the electronic device described above. As shown in fig. 18, the electronic device 180 includes: a processor 1801, at least one communication bus 1802, a user interface 1803, at least one external communication interface 1804, and memory 1805. Wherein communications bus 1802 is configured to enable connective communications between these components. The user interface 1803 may include a display screen, and the external communication interface 1804 may include standard wired and wireless interfaces, among others.
The Memory 1805 is configured to store instructions and applications executable by the processor 1801, and may also buffer data (e.g., image data, audio data, voice communication data, and video communication data) to be processed or already processed by the processor 1801 and modules in the electronic device, and may be implemented by a FLASH Memory (FLASH) or a Random Access Memory (RAM).
In a fourth aspect, the present application provides a storage medium, that is, a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in the information processing method provided in the foregoing embodiments.
Here, it should be noted that: the above description of the storage medium and device embodiments is similar to the description of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the embodiments of the storage medium and apparatus of the present application, reference is made to the description of the embodiments of the method of the present application for understanding.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in some embodiments" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application. The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof contributing to the related art may be embodied in the form of a software product stored in a storage medium, and including several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a magnetic or optical disk, or other various media that can store program code.
The above description is only for the embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information processing method, characterized in that the method comprises:
obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user;
obtaining a first set of information; the first set of information comprises at least one first subset of information; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the at least one function is acquired in one acquisition period;
determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
establishing an incidence relation between the first input shortcut key and the first function, and binding the incidence relation with the first user; so that the operation corresponding to the first function is executed under the condition that the first user is monitored to trigger the first input shortcut key.
2. The method of claim 1, further comprising:
in the case of monitoring a second input shortcut key input by the first user, executing the following processing aiming at the second input shortcut key:
if the second input shortcut key does not belong to the shortcut key supported by the first service, acquiring a first information subset corresponding to the first acquisition period in the first acquisition period through a second service; the first service is a browser service; the second service is an Integrated Development Environment (IDE) service;
and if the second input shortcut key belongs to the shortcut key supported by the first service, acquiring the second input shortcut key through the first service, and acquiring information in the first acquisition period through the second service, wherein the second input shortcut key acquired by the first service and the information acquired by the second service form a first information subset corresponding to the first acquisition period.
3. The method of claim 1, wherein determining the first function corresponding to the first input shortcut key based on the first information set comprises:
determining a function set corresponding to the first input shortcut key based on the first information set, wherein the function set comprises at least one function subset, and one function subset comprises functions corresponding to the first input shortcut key in one first information subset;
determining a linked list corresponding to each function in the function set based on a function subset included in the function set, wherein the linked list represents the appearance position of the function in the function set;
for each function, calculating a corresponding association degree of the function, wherein the association degree characterizes the association degree between the function and the first input shortcut key;
determining that the second function is the first function when the difference between the association degree of the second function and the association degree of the third function is greater than an association degree difference threshold; the relevance degree of the second function is greater than the relevance degree of the functions except for the second function in the functions included in the function set; the relevance degree of the third function is smaller than the relevance degree of the second function and is larger than the relevance degree of the functions, except the second function and the third function, in the functions included in the function set.
4. The method according to claim 3, wherein before the determining the linked list corresponding to each function in the function set based on the function subset included in the function set, the method further comprises:
counting the frequency of each function included in the function set; the frequency of the function is the ratio of the number of the functions in the set of functions to the number of the subset of functions;
deleting a fourth function in a function subset included in the function set; the frequency of the fourth function is less than a frequency threshold.
5. The method according to claim 3, wherein the calculating the association degree corresponding to the function comprises:
dividing the length of the linked list corresponding to the function by the reference length to obtain the length ratio of the linked list; the length of the linked list characterizes the number of function subsets comprising the function in the function set;
dividing the weight of the linked list corresponding to the function by the reference weight to obtain a weight ratio; the weight of the linked list is related to the appearance position represented by the linked list;
and multiplying the length ratio of the linked list by the weight ratio to obtain the correlation corresponding to the function.
6. The method of claim 1, wherein the establishing the association between the first input shortcut key and the first function comprises:
acquiring a first input shortcut key and a built-in shortcut key corresponding to the first function; a first association relation exists between the built-in shortcut key and the first function;
matching the first input shortcut key with an extended shortcut key in an extended shortcut key list;
if the extended shortcut key in the extended shortcut key list is hit, establishing a second association relation between the hit extended shortcut key and the built-in shortcut key;
if the extended shortcut keys in the extended shortcut key list pool are not hit, adding the first input shortcut keys in the extended shortcut key list; and establishing a third association relation between the first input shortcut key and the built-in shortcut key.
7. The method of claim 1, wherein obtaining the user identification of the first user comprises:
acquiring equipment information of at least one dimension of first user equipment;
and combining the device information of at least one dimension and then performing hash calculation to obtain the first user identifier.
8. The method of claim 7, wherein obtaining device information for at least one dimension of the first user device comprises:
drawing a first image by the first user equipment; the first image comprises at least one of a two-dimensional image or a three-dimensional image; the first image represents distinguishing configuration information between the devices;
converting the first image into first data; the first data is binary data representing the first image by printing characters;
performing hash operation on the first data to obtain equipment information of a first dimension; the device information of the first dimension represents device configuration information of the first user; the at least one dimension includes the first dimension.
9. An electronic device comprising a memory and a processor, the memory storing a computer program operable on the processor, the processor implementing the information processing method of any one of claims 1 to 8 when executing the program.
10. A storage medium on which a computer program is stored, characterized in that the computer program, when executed by a processor, implements the information processing method of any one of claims 1 to 8.
CN202111342232.1A 2021-11-12 2021-11-12 Information processing method, device, equipment and storage medium Pending CN114116096A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111342232.1A CN114116096A (en) 2021-11-12 2021-11-12 Information processing method, device, equipment and storage medium
PCT/CN2022/100539 WO2023082645A1 (en) 2021-11-12 2022-06-22 Information processing method and apparatus, and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111342232.1A CN114116096A (en) 2021-11-12 2021-11-12 Information processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114116096A true CN114116096A (en) 2022-03-01

Family

ID=80379028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111342232.1A Pending CN114116096A (en) 2021-11-12 2021-11-12 Information processing method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN114116096A (en)
WO (1) WO2023082645A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023082645A1 (en) * 2021-11-12 2023-05-19 深圳前海微众银行股份有限公司 Information processing method and apparatus, and device and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108012174A (en) * 2017-12-20 2018-05-08 深圳创维-Rgb电子有限公司 Intelligent terminal shortcut customizing method, intelligent terminal and readable storage medium
CN113094248B (en) * 2021-04-28 2023-04-25 深圳市网旭科技有限公司 User behavior data analysis method and device, electronic equipment and medium
CN113556596A (en) * 2021-07-01 2021-10-26 深圳创维-Rgb电子有限公司 Shortcut key control method, device, equipment and storage medium
CN114116096A (en) * 2021-11-12 2022-03-01 深圳前海微众银行股份有限公司 Information processing method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023082645A1 (en) * 2021-11-12 2023-05-19 深圳前海微众银行股份有限公司 Information processing method and apparatus, and device and storage medium

Also Published As

Publication number Publication date
WO2023082645A1 (en) 2023-05-19

Similar Documents

Publication Publication Date Title
WO2018133452A1 (en) Webpage rendering method and related device
CN103777967B (en) Page returning method, page generation method and device
CN106970790B (en) Application program creating method, related equipment and system
US9032067B2 (en) Determining differences in an event-driven application accessed in different client-tier environments
EP3089055A1 (en) Method and device for displaying information flows in social network, and server
JP6500086B2 (en) Two-dimensional code analysis method and apparatus, computer-readable storage medium, computer program, and terminal device
CN107766344B (en) Template rendering method and device and browser
TW201441829A (en) Client side page processing
US20160246481A1 (en) Extraction of multiple elements from a web page
US20210256195A1 (en) Optimization for Browser Rendering During Navigation
US10015253B2 (en) System and method for preemptive request processing
JP2013084259A (en) Gradual visual comparison of web browser screen
WO2021184896A1 (en) Page screenshot method and device
CN111447107A (en) Network state determination method and device, storage medium and electronic equipment
CN110688121A (en) Code completion method, device, computer device and storage medium
CN106991110B (en) Webpage switching method and device
CN114116096A (en) Information processing method, device, equipment and storage medium
CN115398861B (en) Abnormal file detection method and related product
US20230262145A1 (en) Importation of analytics cloud content into custom location in destination tenant
CN106021279B (en) Information display method and device
CN112307386A (en) Information monitoring method, system, electronic device and computer readable storage medium
US10775966B2 (en) Customizable autocomplete option
CN107870805A (en) The information processing method and device of task system
WO2023209638A1 (en) Determining zone identification reliability
CN102930015A (en) Method and equipment for providing search results on mobile terminals

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination