CN114531290A - Login information management method, login information management device and electronic equipment - Google Patents

Login information management method, login information management device and electronic equipment Download PDF

Info

Publication number
CN114531290A
CN114531290A CN202210158103.5A CN202210158103A CN114531290A CN 114531290 A CN114531290 A CN 114531290A CN 202210158103 A CN202210158103 A CN 202210158103A CN 114531290 A CN114531290 A CN 114531290A
Authority
CN
China
Prior art keywords
target
application
short message
login information
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210158103.5A
Other languages
Chinese (zh)
Inventor
孙程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202210158103.5A priority Critical patent/CN114531290A/en
Publication of CN114531290A publication Critical patent/CN114531290A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/35Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Evolutionary Computation (AREA)
  • Signal Processing (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a login information management method, a login information management device and electronic equipment, and belongs to the field of artificial intelligence. The login information management method comprises the following steps: identifying an application identifier corresponding to a target application in the target short message information; receiving a first input of a user to a registration interface of a target application, wherein the first input is used for inputting login information of the target application; and responding to the first input, saving the application identification and the login information corresponding to the target application, wherein the application identification is associated with the login information.

Description

Login information management method, login information management device and electronic equipment
Technical Field
The application belongs to the field of artificial intelligence, and particularly relates to a login information management method, a login information management device and electronic equipment.
Background
With the increase of applications on electronic devices, more and more accounts and passwords are registered by users. In real life, users often face the situation of forgetting passwords, and in this situation, passwords need to be retrieved. In the related art, retrieving a password through a short message is a commonly used password retrieving method, but the method is not suitable for the situation that a user changes a telephone number.
Disclosure of Invention
An embodiment of the present application provides a login information management method, a login information management apparatus, and an electronic device, which can solve the problem that a user cannot log in an application after changing a phone number.
In a first aspect, an embodiment of the present application provides a login information management method, where the method includes:
identifying an application identifier corresponding to a target application in the target short message information;
receiving a first input of a user to a registration interface of a target application, wherein the first input is used for inputting login information of the target application;
and responding to the first input, saving the application identification and the login information corresponding to the target application, wherein the application identification is associated with the login information.
In a second aspect, an embodiment of the present application provides a login information management apparatus, including:
the first processing module is used for identifying an application identifier corresponding to a target application in the target short message information;
the system comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving first input of a registration interface of a target application from a user, and the first input is used for inputting login information of the target application;
and the first storage module is used for responding to the first input and storing the application identifier and the login information corresponding to the target application, wherein the application identifier is associated with the login information.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product, stored on a storage medium, for execution by at least one processor to implement the method according to the first aspect.
In the embodiment of the application, the application identifier corresponding to the target application in the target short message information is identified, the application identifier is associated with the login information input by the user on the registration interface, and the application identifier and the associated login information are stored in the terminal account together, so that the direct association relationship between the target application and the login information is favorably established, and the dependence of the login information on the mobile phone account is reduced.
Drawings
Fig. 1 is a schematic flowchart of a login information management method according to an embodiment of the present application;
fig. 2 is a second flowchart illustrating a login information management method according to an embodiment of the present application;
fig. 3 is a third schematic flowchart of a login information management method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a login information management apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 6 is a hardware schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The login information management method, the login information management apparatus, the electronic device, and the readable storage medium provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
The login information management method can be applied to the terminal, and can be specifically executed by hardware or software in the terminal.
The terminal includes, but is not limited to, a mobile phone or other portable communication device such as a tablet computer having a touch sensitive surface (e.g., a touch screen display and/or a touch pad). It should also be understood that in some embodiments, the terminal may not be a portable communication device, but rather a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the following various embodiments, a terminal including a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and joystick.
In the login information management method provided in the embodiment of the present application, an execution subject of the login information management method may be an electronic device or a functional module or a functional entity capable of implementing the login information management method in the electronic device, the electronic device mentioned in the embodiment of the present application includes, but is not limited to, a mobile phone, a tablet computer, a camera, a wearable device, and other terminals, and the login information management method provided in the embodiment of the present application is described below with the electronic device as the execution subject.
As shown in fig. 1, the login information management method includes: step 110, step 120 and step 130.
110, the terminal identifies an application identifier corresponding to the target application in the target short message information;
in this step, the target short message is a short message received by the terminal of the user when the user performs account registration.
The target application is an application corresponding to an account registered by the user.
The application identifier may be a name of the target application or an abbreviation of the target application.
It can be understood that, in the case that the user registers the account of the target application with the verification code, the user terminal receives the short message information including the verification code information, and the short message information is the target short message information.
The target short message information may include: and the application identifier and the verification code corresponding to the target application.
For example, when a user registers a social APP, the user selects to register with a mobile phone verification code, and the mobile phone receives a verification code short message: "[ XX socialize ] 23333 (authentication code for registration), valid within 15 minutes, and ignored if not self-operation. "
Wherein, the verification code short message is the target short message information.
After receiving the verification code short message, the mobile phone identifies the application identifier corresponding to the target application in the verification code short message as 'XX social contact'.
In the actual execution process, artificial intelligence technologies such as text recognition and the like may be adopted to perform feature extraction and text recognition on the target short message information, and in the subsequent embodiments, specific description will be given to the implementation manner of step 110, which is not repeated herein.
Step 120, the terminal receives a first input of a user to a registration interface of the target application, wherein the first input is used for inputting login information of the target application;
in this step, the registration interface is an interface for performing account registration.
The registration interface includes an area for entering login information.
The login information is necessary information which is set during registration and is required in the subsequent login process.
The login information may include, but is not limited to: account information and password information of the target application.
In this step, the first input is used to input login information for the target application.
Wherein, the first input may be at least one of the following modes:
first, the first input may be a touch operation, including but not limited to a click operation, a slide operation, a press operation, and the like.
In this embodiment, the receiving of the first input by the user may be receiving a touch operation of the user on a display area of a display screen of the terminal.
In order to reduce the misoperation rate of the user, the action area of the first input can be limited to a specific area, such as a target area of a registration interface; or under the state of displaying the registration interface, displaying the target control on the current interface, and touching the target control to realize the first input; or setting the first input as a continuous multi-tap operation on the display area within the target time interval.
Second, the first input may be a physical key input.
In this embodiment, the body of the terminal is provided with a physical key to receive a first input of the user, which may be a first input of the user pressing the corresponding physical key; the first input may also be a combined operation of pressing a plurality of physical keys at the same time.
Third, the first input may be a voice input.
In this embodiment, the terminal may perform voice recognition on the voice, convert the voice into text information, and input the text information to the registration interface when receiving the voice input.
Of course, in other embodiments, the first input may also be in other forms, including but not limited to a somatosensory gesture input, and the like, which may be determined according to actual needs, and the embodiments of the present application do not limit this.
Continuing to take the example of the user registering the social APP, in the registering process of the user, a registering interface of the XX social contact is displayed on a mobile phone screen, and the registering interface comprises an area for inputting account information, an area for inputting password information, an area for inputting mobile phone number information and an area for inputting a verification code.
The user inputs account information '12345' in the area for inputting account information and inputs password information '45678' in the area for inputting password information, namely, the first input is realized;
the mobile phone records the account information and the password information.
It is understood that the sequence of step 110 and step 120 may be performed simultaneously, or step 110 may precede step 120, or step 120 may precede step 110 and follow step 110, and the present application is not limited thereto.
And step 130, the terminal responds to the first input, stores the application identification and the login information corresponding to the target application, and associates the application identification with the login information.
In this step, the login information includes account information and password information input by the user. Account information "12345" as described above and password information "45678" as described above.
The application identifier is an identifier corresponding to the target application, and includes, but is not limited to, a full name or a short name of the target application. The "XX social contact" as described above.
The application identification and the login information have an association relationship, which is determined based on steps 110 and 120.
It can be understood that, in the subsequent use process, when the application identifier is input or the login interface of the target application is entered, the terminal can automatically call the login information corresponding to the application identifier.
For example, when the user opens a memo of the mobile phone and inputs an application identifier, the terminal displays login information of an application corresponding to the application identifier in the memo based on the application identifier input by the user.
For another example, when the user enters the login interface of the target application and inputs the application identifier in the input method, the input method may automatically call out the login information corresponding to the application identifier.
For another example, after the user enters the interface of the target application and clicks the area for inputting the login information, the terminal automatically calls the login information corresponding to the target application.
After receiving a first input of a user and recognizing the application identifier, the terminal responds to the first input, associates the application identifier with login information corresponding to a target application, and stores the application identifier, the content of the login information and the association relationship between the application identifier and the login information in local of the terminal.
In other embodiments, the content of the application identifier and the login information themselves and the association relationship between the application identifier and the login information may also be stored in an account of the input method application installed in the terminal.
Of course, in still other embodiments, the content of the application identifier and the login information themselves and the association relationship between the application identifier and the login information may also be stored in the cloud, which is not limited in the present application.
For example, the user inputs account information "12345" and password information "45678" in the social networking registration interface XX, and clicks a control for acquiring the verification code after inputting the mobile phone number.
In a similar time period when the user performs the first input, the mobile phone receives target short message information used for sending verification code information, identifies the target short message information, and identifies that an application identifier corresponding to a target application in the verification code short message is 'XX social contact'.
The mobile phone establishes an association relationship between "XX social contact" and account information "12345" and password information "45678", and stores "XX social contact", account information "12345", password information "45678" and an association relationship between the "XX social contact", the account information "45678" and the password information "45678" in the mobile phone account.
In the application, when a user performs account registration by inputting a mobile phone verification code, in the registration process, the terminal identifies an application identifier corresponding to a target application in target short message information, associates the application identifier with login information input by the user on a registration interface, stores the application identifier and the associated login information in a terminal account, and directly establishes an association relationship between the target application and the login information, thereby reducing the dependency of the login information on a mobile phone number. In the subsequent login process, the user does not need to log in or retrieve the password through the mobile phone number, only the application identifier needs to be input, and the terminal can automatically call the login information which is stored before and is associated with the application identifier to log in, so that the login efficiency is obviously improved, and the terminal has higher reliability and accuracy, and is favorable for improving the use experience of the user.
The terminal account can be a local account unrelated to the mobile phone number, such as a mobile phone local account or a tablet personal computer local account; alternatively, the terminal account may also be an account of another application installed in the terminal or in communication with the terminal, such as an input method account or a memo account.
According to the login information management method provided by the embodiment of the application, the application identifier corresponding to the target application in the target short message information is identified, the application identifier is associated with the login information input by the user on the registration interface, and the application identifier and the associated login information are stored in the terminal account together, so that the direct association relationship between the target application and the login information is favorably established, and the dependence of the login information on the mobile phone number is reduced.
According to some embodiments of the present application, after step 130, the method may further comprise:
receiving a second input of the user to a login interface of the target application;
and responding to the second input, and displaying login information corresponding to the target application on a login interface of the target application.
In this embodiment of the present invention,
the login interface is used for account login.
The login interface includes an area for inputting login information.
The login information comprises account information and password information.
The second input may be the same touch input, physical key input, voice input, and somatosensory gesture input as the first input, which are not described herein again.
For example, the user clicks an area for inputting login information on the login interface of the target application, that is, the second input can be realized, the terminal responds to the second input, obtains login information associated with the application identifier from the database in a matching manner, and fills the login information in the area for inputting login information on the login interface.
In some embodiments, the second input may also be used to input an application identification for the target application.
The application identifier may be a full name or a short name of the target application.
In actual implementation, the user may perform the second input through an input method installed on the terminal.
For example, the user clicks an area for inputting login information on a login interface of the target application, the terminal pops up an input box corresponding to the input method, and the user inputs an application identifier corresponding to the target application in the input box, so that the second input can be realized.
And the terminal responds to the second input, obtains login information associated with the application identification from the database in a matching mode, and fills the login information in an area used for inputting the login information on the login interface.
Of course, in other embodiments, the user may also make the second input by way of a voice input.
For example, after receiving voice information of a user, such as "XX software", the terminal automatically displays login information corresponding to the XX software on a login interface of the XX software.
Continuing with the example of a user registering social APP "XX social," the user has previously registered an account for this "XX social.
In the registration process, the mobile phone of the user establishes an association relationship between the "XX social contact" and account information "12345" and password information "45678" corresponding to the "XX social contact", and stores the "XX social contact", the account information "12345", the password information "45678" and the association relationship between the "XX social contact" and the password information "45678" in the mobile phone account.
In the subsequent use process, when the user needs to log in the "XX social contact", an input method is called out on the login interface of the "XX social contact", and the "XX social contact" is input in the input method, so that the input method in the mobile phone can automatically call the login information of the user corresponding to the "XX social contact", including: account information "12345" and password information "45678", and account information "12345" and password information "45678" are automatically populated into the respective areas of the login interface.
The user clicks the login control, and then the XX social application can be logged in.
In other embodiments, after the terminal automatically fills the account information "12345" and the password information "45678" into the corresponding area of the login interface, an automatic login operation can be directly performed without the user clicking a login control.
According to the login information management method provided by the embodiment of the application, the incidence relation between the application identifier of the target application and the corresponding login information is directly established in the registration process, and stores the application identification and the corresponding login information thereof and the association relationship between the application identification and the corresponding login information thereof, thereby reducing the dependency on the mobile phone number, enabling the terminal to automatically call the login information corresponding to the application identifier for automatic login only by inputting the application identifier of the target application by the user in the subsequent login process, the user does not need to verify the mobile phone number or retrieve the password, login steps are effectively simplified, login efficiency is improved, the problem that the user cannot login due to the fact that the mobile phone number is changed is solved, and the method and the device have high reliability and accuracy and are beneficial to improving use experience of the user.
According to some embodiments of the present application, after step 130, the method may further comprise:
receiving a third input of the memo by the user;
and responding to the third input, and displaying login information corresponding to the target application.
In this embodiment, the third input is used to input an identification of the target application to refer to the login information corresponding to the target application.
For example, the terminal has associated login information input by the user in the process of registering the XX social application with the application identifier "XX social", and stores the application identifier and the login information of the social APP in a memo of the mobile phone terminal.
In the actual execution process, the user needs to look up the login information of the XX social contact, and then the XX social application identifier can be input in the memo, so that the third input can be realized.
And the terminal responds to the third input, obtains the previously stored login information associated with the application identifier by screening, and displays the login information in the memorandum for the user to look up.
The implementation of step 110 is specifically described below by way of specific embodiments.
In some embodiments, step 110 may include:
extracting the features of the target short message information to generate a target feature vector;
determining the category of the target short message information based on the target feature vector;
and under the condition that the category is an application registration category, extracting an application identifier of the target application in the target short message information, wherein the application registration category short message information is short message information used for registering an application program account.
In this embodiment, the target feature vector is a word vector, which is a vector representation of a text of the target short message information.
In the actual implementation process, a term-frequency-inverse-text-frequency-index (TF-IDF) method may be adopted to represent the text of the target short message information by a vector to generate a target feature vector.
Wherein, tf (term frequency) is the word frequency and is used for representing the probability of occurrence of the entry t in the text;
the IDF (inverse document frequency) is an inverse text frequency and is used for representing the category distinguishing capability, and it should be noted that the fewer documents containing the term t, the larger the IDF, the better the category distinguishing capability of the term.
The basic principle of the TF-IDF algorithm is as follows: if a word occurs with a high frequency in one article and with a low frequency in other articles, the word is considered to have a good ability to distinguish and is suitable for classification.
After the processing of the TF-IDF algorithm, each piece of target short message information is displayed in a vector form.
After the target feature vector is generated, the category of the target short message information can be determined based on the target feature vector.
The category of the target short message information is used for representing the purpose of the target short message information.
The categories of the target short message information may include: an application registration class, a pickup class, an early warning alert class, a payment notification class, and other classes.
For example, the type of the target short message information is an application registration type, that is, the target short message information is represented for account registration; the type of the target short message information is a receiving and pickup type, namely the target short message information is represented for receiving and pickup; the type of the target short message is an early warning reminding type, namely the target short message is represented to be used for carrying out climate early warning or anti-cheating early warning and the like.
In the actual implementation process, the category of the target short message information can be determined based on the keyword vector in the target feature vector.
For example, when the keyword vector in the target feature vector includes related information such as "registration code" or "user registration verification code", the category of the target short message information corresponding to the target feature vector is determined as an application registration category; or under the condition that the keyword vector in the target characteristic vector comprises relevant information such as 'pickup code' and the like, determining the category of the target short message information corresponding to the target characteristic vector as a receiving pickup category; or under the condition that the keyword vector in the target feature vector includes the related information such as "high-temperature red warning", the category of the target short message information corresponding to the target feature vector is determined as a warning reminder category, which is not described herein.
And under the condition that the type of the target short message information is an application registration type, extracting an application identifier of the target application in the target short message information.
It can be understood that, in the case that the category of the target short message information is an application registration category, the target short message information includes an application identifier of a registered target application and verification code information for registration.
The application identifier of the target application may be a name or a short name of the target application.
For example, when the terminal receives the target short message: 23333 (identifying code is used for registration), the target short message information is effective within 15 minutes, if the operation is not neglected, feature extraction is carried out on the target short message information, and key words such as 'XX social', 'identifying code' and 'registration' are reserved;
the terminal converts the key words into target characteristic vectors by adopting a TF-IDF method, classifies the target short message information based on the target characteristic vectors, and determines the category of the target short message information as an application registration category based on the key word vector registration.
And then extracting a key word 'XX social contact' in the target short message information, and taking the key word as an application identifier of the social contact APP.
During the period, the terminal also receives a first input of the user, and responds to the first input, the login information input by the user is associated with the application identification 'XX social contact', and the application identification and the login information of the social APP are stored in an account of the mobile phone terminal.
As shown in fig. 2, in the actual implementation process, after the terminal obtains the real-time target short message information, the short message identification system may be used to classify the target short message information to determine the category of the target short message information.
In some embodiments, the short message recognition system may be accessed to an automatic verification code input function of an input method of the terminal, and after the terminal acquires the target short message information, the short message recognition system in the input method performs type recognition on the target short message information to generate a category of the target short message information.
And under the condition that the type of the target short message information is determined to be an application registration type, associating and recording the identification of the target application in the target short message information with the login information of the target application input by the user.
In addition, the automatically input triggering condition can be modified into a login interface for opening the application and an application identifier corresponding to the corresponding APP is input, so that account information and password information corresponding to the APP can be automatically input, and login is achieved.
According to the login information management method provided by the embodiment of the application, the target short message information is classified, the application identifier of the target application in the target short message information belonging to the application registration class is extracted, the subsequent association operation of the application identifier and the login information corresponding to the target application input by a user is facilitated, and the application identifier and the login information are recorded in the terminal, so that the automatic login can be realized without sending a verification code through a mobile phone number when the user logs in the target application subsequently, and the use of the user is facilitated.
In some embodiments, the method may further comprise:
extracting the features of the target short message information to generate a target feature vector;
determining the category of the target short message information based on the target feature vector;
and carrying out target processing on the target short message information based on the category of the target short message information.
In this embodiment, after determining the category of the target short message information, different operations may be performed based on different categories.
For example, when the target short message information is determined to be a spam short message, the target short message information is shielded; or, under the condition that the target short message information is determined to be customer complaint information, the target short message information is preferentially pushed to the user so that the user can perform feedback processing in time.
In the embodiment, the target short message information is identified to be classified and processed, and different operations are executed based on different types, so that the method is beneficial to assisting a user in efficiently managing the short message information, and the use experience of the user is improved.
It should be noted that, in an actual implementation, the target neural network may be used to perform the steps in step 110: and determining the category of the target short message information based on the target feature vector.
The target neural network may be a neural network based on machine learning or a neural network based on deep learning, which is not limited in the present application.
In the case that the target neural network is a machine learning-based neural network, a classical logistic regression model can be adopted, and training samples are input for parameter training.
In the case that the target neural network is a deep learning-based neural network, a recurrent neural network model may be employed for parameter training.
The following describes an implementation manner of performing the above-mentioned partial steps by a target neural network through a specific embodiment.
In some embodiments, determining the category of the target short message information based on the target feature vector may include:
inputting the target characteristic vector into a target neural network, and acquiring the category of target short message information output by the target neural network;
the target neural network is obtained by training by taking the sample characteristic vector as a sample and taking the category corresponding to the sample characteristic vector as a sample label.
In this embodiment, the target neural network is configured to perform classification and identification on the target feature vector, and generate a class of the target feature vector.
The training procedure of the target neural network is explained below.
It can be understood that the target neural network is trained by taking the sample feature vector as a sample and taking the class corresponding to the sample feature vector as a sample label.
And the sample feature vector and the class corresponding to the sample feature vector are training samples for training the target neural network.
The sample feature vector can be a feature vector generated by various types of short message information; the category corresponding to the sample feature vector is the category corresponding to the sample short message information, and is the type information to which the sample short message information belongs, and can be marked by a label.
In the embodiment, the target neural network is adopted to identify the category of the target characteristic vector to generate the category of the target short message information, the learning capability of the target neural network is strong, and the accuracy of the output identification result is high.
In some embodiments, the target neural network may be trained by:
obtaining a plurality of sample short message information and categories corresponding to the sample short message information;
extracting the characteristics of the sample short message information to generate a sample characteristic vector;
and taking the combination of each sample feature vector and the category corresponding to each sample feature vector as a training sample to obtain a plurality of training samples, and training the target neural network by using the plurality of training samples.
In this embodiment, the plurality of sample short message messages include a plurality of categories of sample short message messages, wherein each category includes a plurality of different sample short message messages of the same category.
The plurality of sample short message messages comprise sample short message messages of a registration class and sample short message messages of other classes, and part of the sample short message messages are shown in table 1.
TABLE 1
Figure BDA0003513551750000141
After obtaining a plurality of sample short message information, on one hand, marking the category of each sample short message information, thereby obtaining the category corresponding to the plurality of sample short message information;
and on the other hand, feature extraction is carried out on each sample short message information to generate a sample feature vector so as to obtain a plurality of sample feature vectors.
And taking the plurality of sample feature vectors and the corresponding categories of the plurality of sample feature vectors as a data set.
It will be appreciated that the data set includes a plurality of training samples, each training sample including a sample feature vector and a class to which the sample feature vector corresponds.
The target neural network can be trained using a plurality of training samples in the data set.
In some embodiments, performing feature extraction on the sample short message information to generate a sample feature vector may include:
carrying out data cleaning on the sample short message information to generate first short message information;
processing the first short message information to generate a first feature vector;
and performing noise reduction processing on the first feature vector to generate a sample feature vector.
In this embodiment, the first short message is a short message that does not include spaces and other data noise.
The first feature vector is a vector representation of the text of the first short message information, and may be a word vector.
And cleaning the sample short message data, wherein the cleaning can be expressed by removing blank spaces, x-series texts and the like in the sample short message data.
Wherein the x-series text is one of the data noises.
And after the sample short message information is subjected to data cleaning, first short message information can be generated.
And converting the text of the first short message information into a vector form to generate a first characteristic vector.
In actual implementation, the above-mentioned TF-IDF algorithm may be used for conversion to generate the first feature vector.
And then at least one of denoising processing, standardization processing and dimensionality reduction processing is carried out on the first feature vector to generate a sample feature vector.
In the embodiment, the sample characteristic vector is generated based on the sample short message information through data cleaning, text conversion, noise reduction and other processing, so that data noise and data redundancy in the sample short message information can be effectively removed, and the data calculation efficiency and the accuracy of the identification result in the subsequent identification process are improved.
In some embodiments, the data set may also be divided into a training set and a validation set, and the target neural network may be trained using the training set.
As shown in fig. 3, after the data set is obtained, preprocessing such as data cleaning is performed on the data set, and then training of the target neural network is performed based on the preprocessed data set, where the preprocessing manner is as described above and is not described herein again.
For example, in an actual implementation, after the data set is obtained, the data set may be divided into a training set and a verification set, for example, 80% of the data in the data set is used as the training set, and the other 20% of the data is used as the verification set, where the data set and the verification set are randomly extracted from the data in the data set.
And then, data cleaning is carried out on the data in the data set, and spaces, x-series texts and the like in the training set and the verification set are removed. Table 2 illustrates a set of data sets containing spaces and table 3 illustrates a data set containing x-series text.
TABLE 2
Serial number Content providing method and apparatus
0 Do you return
1 [ XX post ] taking XX express delivery from south to XH7886
…… ……
TABLE 3
Figure BDA0003513551750000161
After the data in the data set is cleaned, a preprocessed data set can be generated, and the preprocessed data set includes a plurality of training samples without spaces and other data noises, that is, a preprocessed training set.
And performing feature extraction on the preprocessed sample short message information in the preprocessed training set to generate a first feature vector, so that each piece of sample short message information is displayed in a vector form.
The first feature vector is then subjected to word vector denoising processing, for example, the first feature vector may be subjected to at least one of normalization processing or dimension reduction processing, so as to reduce data noise, and generate a sample feature vector.
Inputting the sample characteristic vector to a target neural network, identifying the category of the sample characteristic vector by the target neural network, outputting the category to which the sample characteristic vector belongs, training and adjusting the target neural network based on the category identified by the target neural network and the category corresponding to the sample short message information in the training sample, and ending the training until the target neural network can identify a more accurate category.
In some embodiments, after the training of the target neural network is completed, the verification set may be further used to verify the model classification accuracy of the target neural network, so as to ensure the accuracy of the output result.
It should be noted that, in the actual execution process, the target feature vector acquired by the terminal each time and the category to which the target feature vector belongs, which is determined based on the target feature vector, may be stored, so as to be used as a training sample for subsequently training the target neural network model.
With the increase of training samples, the intelligence degree of the target neural network is higher and higher, and the accuracy and precision of the recognition result are better and better.
According to the login information management method provided by the embodiment of the application, the target neural network is trained, the intelligence degree of the target neural network is higher and higher along with the increase of training samples, and the accuracy and precision of the recognition result are better and better, so that the accuracy and precision of the classification result can be improved when the target short message information is classified in the actual use process, and the use experience of a user in the application login process is further improved.
In the login information management method provided by the embodiment of the application, the execution subject can be a login information management device. In the embodiment of the present application, a method for executing login information management by a login information management apparatus is taken as an example, and a device for login information management provided in the embodiment of the present application is described.
The embodiment of the application also provides a login information management device.
As shown in fig. 4, the login information management apparatus includes: a first processing module 410, a first receiving module 420 and a first saving module 430.
A first processing module 410, configured to identify an application identifier corresponding to a target application in the target short message information;
the first receiving module 420 is configured to receive a first input of a registration interface of a target application from a user, where the first input is used to input login information of the target application;
the first saving module 430 is configured to, in response to the first input, save the application identifier and the login information corresponding to the target application, where the application identifier is associated with the login information.
According to the login information management device provided by the embodiment of the application, the application identifier corresponding to the target application in the target short message information is identified, the application identifier is associated with the login information input by the user on the registration interface, and the application identifier and the associated login information are stored in the terminal account together, so that the direct association relationship between the target application and the login information is favorably established, and the dependency of the login information on the mobile phone number is reduced.
In some embodiments, the first processing module 410 may be further configured to:
extracting the features of the target short message information to generate a target feature vector;
determining the category of the target short message information based on the target feature vector;
and under the condition that the category is an application registration category, extracting an application identifier of the target application in the target short message information, wherein the application registration category short message information is short message information used for registering an application program account.
In some embodiments, the apparatus may further include a second processing module to:
inputting the target characteristic vector into a target neural network, and acquiring the category of target short message information output by the target neural network;
the target neural network is obtained by training by taking the sample characteristic vector as a sample and taking the category corresponding to the sample characteristic vector as a sample label.
In some embodiments, the apparatus may further comprise:
the first acquisition module is used for acquiring a plurality of sample short message information and categories corresponding to the sample short message information;
the third processing module is used for extracting the characteristics of the sample short message information and generating a sample characteristic vector;
and the fourth processing module is used for taking the combination of each sample feature vector and the category corresponding to each sample feature vector as a training sample, obtaining a plurality of training samples, and training the target neural network by using the plurality of training samples.
In some embodiments, the third processing module may be further configured to:
carrying out data cleaning on the sample short message information to generate first short message information;
processing the first short message information to generate a first feature vector;
and performing noise reduction processing on the first feature vector to generate a sample feature vector.
In some embodiments, the apparatus may further comprise:
the second receiving module is used for receiving second input of the user to the login interface of the target application after the application identification and the login information corresponding to the target application are stored;
and the first display module is used for responding to the second input and displaying the login information corresponding to the target application on the login interface of the target application.
The login information management apparatus in the embodiment of the present application may be an electronic device, or may be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The login information management device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an IOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The login information management device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 to fig. 3, and is not described here again to avoid repetition.
Optionally, as shown in fig. 5, an electronic device 500 is further provided in this embodiment of the present application, and includes a processor 501, a memory 502, and a program or an instruction stored in the memory 502 and executable on the processor 501, where the program or the instruction is executed by the processor 501 to implement each process of the login information management method in the embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 6 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 600 includes, but is not limited to: a radio frequency unit 601, a network module 602, an audio output unit 603, an input unit 604, a sensor 605, a display unit 606, a user input unit 607, an interface unit 608, a memory 609, a processor 610, and the like.
Those skilled in the art will appreciate that the electronic device 600 may further comprise a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 610 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 6 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The processor 610 is configured to identify an application identifier corresponding to a target application in the target short message information;
the user input unit 607 is configured to receive a first input of a registration interface of a target application by a user, where the first input is used to input login information of the target application;
a memory 609, configured to store, in response to the first input, login information corresponding to the application identification and the target application, where the application identification is associated with the login information.
According to the electronic equipment provided by the embodiment of the application, the application identifier corresponding to the target application in the target short message information is identified, the application identifier is associated with the login information input by the user on the registration interface, and the application identifier and the associated login information are stored in the terminal account together, so that the direct association relationship between the target application and the login information is favorably established, and the dependency of the login information on the mobile phone number is reduced.
Optionally, the processor 610 is further configured to:
extracting the features of the target short message information to generate a target feature vector;
determining the category of the target short message information based on the target feature vector;
and under the condition that the category is an application registration category, extracting an application identifier of the target application in the target short message information, wherein the application registration category short message information is short message information used for registering an application program account.
Optionally, the processor 610 is further configured to:
inputting the target characteristic vector into a target neural network, and acquiring the category of target short message information output by the target neural network;
the target neural network is obtained by training by taking the sample characteristic vector as a sample and taking the category corresponding to the sample characteristic vector as a sample label.
Alternatively,
an input unit 604, configured to obtain a plurality of sample short message information and categories corresponding to the sample short message information;
a processor 610, further configured to:
extracting the characteristics of the sample short message information to generate a sample characteristic vector;
and taking the combination of each sample feature vector and the category corresponding to each sample feature vector as a training sample to obtain a plurality of training samples, and training the target neural network by using the plurality of training samples.
Optionally, the processor 610 is further configured to:
carrying out data cleaning on the sample short message information to generate first short message information;
processing the first short message information to generate a first feature vector;
and performing noise reduction processing on the first feature vector to generate a sample feature vector.
Optionally, the user input unit 607 is further configured to: after the application identification and the login information corresponding to the target application are saved, receiving second input of a user to a login interface of the target application;
and the display unit 606 is used for responding to the second input and displaying the login information corresponding to the target application on the login interface of the target application.
It is to be understood that, in the embodiment of the present application, the input Unit 604 may include a Graphics Processing Unit (GPU) 6041 and a microphone 6042, and the Graphics Processing Unit 6041 processes image data of a still picture or a video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The display unit 606 may include a display panel 6061, and the display panel 6061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 607 includes at least one of a touch panel 6071 and other input devices 6072. A touch panel 6071, also referred to as a touch screen. The touch panel 6071 may include two parts of a touch detection device and a touch controller. Other input devices 6072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 609 may be used to store software programs as well as various data. The memory 609 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, application programs or instructions required for at least one function (such as a sound playing function, an image playing function, etc.), and the like. Further, the memory 609 may include volatile memory or nonvolatile memory, or the memory 609 may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct Memory bus RAM (DRRAM). The memory 609 in the embodiments of the subject application include, but are not limited to, these and any other suitable types of memory.
Processor 610 may include one or more processing units; optionally, the processor 610 integrates an application processor, which primarily handles operations involving the operating system, user interface, and applications, and a modem processor, which primarily handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 610.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above login information management method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above login information management method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the description is omitted here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A login information management method, comprising:
identifying an application identifier corresponding to a target application in the target short message information;
receiving a first input of a user to a registration interface of a target application, wherein the first input is used for inputting login information of the target application;
and responding to the first input, saving the application identification and the login information corresponding to the target application, wherein the application identification is associated with the login information.
2. The login information management method of claim 1, wherein the identifying an application identifier corresponding to a target application in the target short message information comprises:
extracting the features of the target short message information to generate a target feature vector;
determining the category of the target short message information based on the target feature vector;
and under the condition that the category is an application registration category, extracting an application identifier of the target application in the target short message information, wherein the application registration category short message information is short message information used for registering an application program account.
3. The login information management method of claim 2, wherein the determining the category of the target short message information based on the target feature vector comprises:
inputting the target characteristic vector into a target neural network, and acquiring the category of target short message information output by the target neural network;
the target neural network is obtained by training by taking a sample feature vector as a sample and taking a category corresponding to the sample feature vector as a sample label.
4. The login information management method according to claim 3, wherein the target neural network is trained by:
obtaining a plurality of sample short message information and categories corresponding to the sample short message information;
extracting the characteristics of the sample short message information to generate a sample characteristic vector;
and taking the combination of each sample feature vector and the category corresponding to each sample feature vector as a training sample to obtain a plurality of training samples, and training the target neural network by using the plurality of training samples.
5. The login information management method according to any one of claims 1 to 4, wherein after the saving of the login information corresponding to the application identifier and the target application, the method further comprises:
receiving a second input of the user to the login interface of the target application;
and responding to the second input, and displaying login information corresponding to the target application on a login interface of the target application.
6. A login information management apparatus, comprising:
the first processing module is used for identifying an application identifier corresponding to a target application in the target short message information;
the system comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving first input of a registration interface of a target application from a user, and the first input is used for inputting login information of the target application;
and the first storage module is used for responding to the first input and storing the application identifier and the login information corresponding to the target application, wherein the application identifier is associated with the login information.
7. The login information management apparatus according to claim 6, wherein the first processing module is further configured to:
extracting the features of the target short message information to generate a target feature vector;
determining the category of the target short message information based on the target feature vector;
and under the condition that the category is an application registration category, extracting an application identifier of the target application in the target short message information, wherein the application registration category short message information is short message information used for registering an application program account.
8. The login information management device according to claim 7, further comprising a second processing module configured to:
inputting the target characteristic vector into a target neural network, and acquiring the category of target short message information output by the target neural network;
the target neural network is obtained by training by taking a sample feature vector as a sample and taking a category corresponding to the sample feature vector as a sample label.
9. The login information management apparatus according to any one of claims 6 to 8, further comprising:
the second receiving module is used for receiving second input of a user to the login interface of the target application after the application identifier and the login information corresponding to the target application are saved;
and the first display module is used for responding to the second input and displaying the login information corresponding to the target application on a login interface of the target application.
10. An electronic device comprising a processor and a memory, the memory storing a program or instructions executable on the processor, the program or instructions when executed by the processor implementing a login information management method according to any one of claims 1 to 5.
CN202210158103.5A 2022-02-21 2022-02-21 Login information management method, login information management device and electronic equipment Pending CN114531290A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210158103.5A CN114531290A (en) 2022-02-21 2022-02-21 Login information management method, login information management device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210158103.5A CN114531290A (en) 2022-02-21 2022-02-21 Login information management method, login information management device and electronic equipment

Publications (1)

Publication Number Publication Date
CN114531290A true CN114531290A (en) 2022-05-24

Family

ID=81625468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210158103.5A Pending CN114531290A (en) 2022-02-21 2022-02-21 Login information management method, login information management device and electronic equipment

Country Status (1)

Country Link
CN (1) CN114531290A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812554A (en) * 2016-03-01 2016-07-27 中山大学深圳研究院 Method and system for intelligently managing text messages in mobile phones
CN106302995A (en) * 2016-07-29 2017-01-04 维沃移动通信有限公司 The acquisition methods of a kind of log-on message and mobile terminal
CN106855929A (en) * 2016-12-07 2017-06-16 上海与德信息技术有限公司 Data managing method and device
US20210075890A1 (en) * 2019-09-10 2021-03-11 Arris Enterprises Llc User Interface for Configuring Device-Specific IoT Applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812554A (en) * 2016-03-01 2016-07-27 中山大学深圳研究院 Method and system for intelligently managing text messages in mobile phones
CN106302995A (en) * 2016-07-29 2017-01-04 维沃移动通信有限公司 The acquisition methods of a kind of log-on message and mobile terminal
CN106855929A (en) * 2016-12-07 2017-06-16 上海与德信息技术有限公司 Data managing method and device
US20210075890A1 (en) * 2019-09-10 2021-03-11 Arris Enterprises Llc User Interface for Configuring Device-Specific IoT Applications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李瑞峰编著: "《服务机器人人机交互的视觉识别技术》", 30 January 2021, 哈尔滨工业大学出版社, pages: 216 - 218 *

Similar Documents

Publication Publication Date Title
CN110597952A (en) Information processing method, server, and computer storage medium
CN108924381B (en) Image processing method, image processing apparatus, and computer readable medium
US20220391913A1 (en) Techniques to improve fraud detection at financial terminals
CN112995414B (en) Behavior quality inspection method, device, equipment and storage medium based on voice call
CN112908325B (en) Voice interaction method and device, electronic equipment and storage medium
CN112163239A (en) Privacy information protection method and device and electronic equipment
CN111191207A (en) Electronic file control method and device, computer equipment and storage medium
CN112307464A (en) Fraud identification method and device and electronic equipment
CN113568934B (en) Data query method and device, electronic equipment and storage medium
CN115618415A (en) Sensitive data identification method and device, electronic equipment and storage medium
CN111259216B (en) Information identification method, device and equipment
CN113869063A (en) Data recommendation method and device, electronic equipment and storage medium
CN110674123B (en) Data preprocessing method, device, equipment and medium
CN116703515A (en) Recommendation method and device based on artificial intelligence, computer equipment and storage medium
CN116610717A (en) Data processing method, device, electronic equipment and storage medium
CN114531290A (en) Login information management method, login information management device and electronic equipment
CN113138702B (en) Information processing method, device, electronic equipment and storage medium
CN115330522A (en) Credit card approval method and device based on clustering, electronic equipment and medium
CN113780318B (en) Method, device, server and medium for generating prompt information
CN113744030A (en) Recommendation method, device, server and medium based on AI user portrait
CN113691525A (en) Traffic data processing method, device, equipment and storage medium
CN113743721A (en) Marketing strategy generation method and device, computer equipment and storage medium
CN112256836A (en) Recording data processing method and device and server
CN112417095A (en) Voice message processing method and device
CN109379361B (en) Address label determination method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination