CN115277048A - Instant messaging method, system, computer equipment and storage medium - Google Patents

Instant messaging method, system, computer equipment and storage medium Download PDF

Info

Publication number
CN115277048A
CN115277048A CN202210608495.0A CN202210608495A CN115277048A CN 115277048 A CN115277048 A CN 115277048A CN 202210608495 A CN202210608495 A CN 202210608495A CN 115277048 A CN115277048 A CN 115277048A
Authority
CN
China
Prior art keywords
request
networking
network
target network
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210608495.0A
Other languages
Chinese (zh)
Other versions
CN115277048B (en
Inventor
林皓
高曦
杨华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN202210608495.0A priority Critical patent/CN115277048B/en
Publication of CN115277048A publication Critical patent/CN115277048A/en
Application granted granted Critical
Publication of CN115277048B publication Critical patent/CN115277048B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present application relates to an instant messaging method, system, computer device and storage medium. The method comprises the following steps: the method comprises the steps of establishing a corresponding communication network according to a networking request sent by a target terminal, responding to the login request when the login request of a request object is received, adding the request object into the corresponding target network, starting the communication authority of the request object in the target network, and enabling a plurality of different request objects to carry out communication interaction in the corresponding communication network.

Description

Instant messaging method, system, computer equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to an instant messaging method, an instant messaging system, a computer device, and a storage medium.
Background
In the field of network instant messaging, concepts, methods, technologies and products of instant messaging robots appear, which are mainly used for helping people to automatically process partial messages. For example, on an e-commerce or information service website, the instant messaging robot is bound with the server, and can automatically respond to the questions of the user according to a frequently asked question list of the user and provide product information or consultation service; the instant messaging robot bound at the user side is equivalent to an instant messaging secretary of an individual user, and simple information can be processed.
In the field of smart home devices, concepts, methods, technologies and products of smart home robots also appear, and the smart home robots are mainly modules on hardware devices or home appliances and are used for controlling the smart home devices such as the home appliances, but the control still stays in the control of the past instruction level, and the interaction information is very simple.
Along with the development of mobile internet, carry out humanized interactive operation based on instant messaging passageway and intelligent house robot, undoubtedly very convenient high-efficient and full of imagination. However, at present, the smart home devices cannot realize the function of instant messaging, and cannot provide anthropomorphic interactive service for users.
Disclosure of Invention
In order to solve the technical problem, the application provides an instant messaging method, an instant messaging system, a computer device and a storage medium.
In a first aspect, the present application provides an instant messaging method, applied to a server, the method including:
receiving a networking request sent by a target terminal, wherein the networking request comprises first identity information of a plurality of networking objects, and the networking objects comprise networking terminals and intelligent equipment;
establishing a corresponding communication network according to the first identity information of the plurality of networking objects;
when a login request of a request object is received, determining a corresponding target network according to the login request, wherein the request object is the networking terminal or the intelligent equipment, and the target network is the communication network containing the request object;
and taking the request object as the networking object of the target network, and opening the communication authority of the request object in the target network.
In a second aspect, the present application provides an instant messaging method, which is applied to an intelligent device, and the method includes:
receiving a networking invitation sent by a target terminal, wherein the networking invitation comprises a second network tag of a target network, and the target network is a communication network to be joined;
generating a login request according to the second network tag, and sending the login request to a server, wherein the login request is used for requesting to join the target network;
when the server starts the communication right of the intelligent equipment in the target network according to the login request, receiving session information in the target network;
and determining corresponding feedback information according to the session information, and sending the feedback information to the target network.
In a third aspect, the present application provides an instant messaging method, which is applied to a terminal, and includes:
sending a networking invitation to a networking object, wherein the networking object comprises a networking terminal and intelligent equipment, the networking invitation comprises a network tag of a target network, and the networking invitation is used for requesting the networking object to join the target network;
acquiring and generating a networking request according to the first identity information of the networking object;
and sending a networking request to a server, wherein the networking request is used for requesting the server to form the target network.
In a fourth aspect, the present application provides an instant messaging system, comprising:
the terminal is used for sending a networking request to the server and sending a networking invitation to a networking object, wherein the networking invitation comprises a network tag of a target network;
the intelligent equipment is used for sending a login request for joining a target network to the server when receiving a networking invitation sent by the terminal as a networking object, and providing corresponding feedback information according to session information in the target network after joining the target network;
and the server is used for generating a corresponding communication network according to the networking request sent by the terminal and responding to the received login request.
In a fifth aspect, the present application provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the first to third aspects when executing the computer program.
In a sixth aspect, the present application provides a computer readable storage medium having a computer program stored thereon, which when executed by a processor, performs the steps of the first to third aspects.
The instant messaging method, the instant messaging system, the computer equipment and the storage medium comprise the following steps: receiving a networking request sent by a target terminal, wherein the networking request comprises first identity information of a plurality of networking objects, and the networking objects comprise networking terminals and intelligent equipment; establishing a corresponding communication network according to the first identity information of the plurality of networking objects; when a login request of a request object is received, determining a corresponding target network according to the login request, wherein the request object is the networking terminal or the intelligent equipment, and the target network is the communication network containing the request object; and taking the request object as the networking object of the target network, and starting the communication authority of the request object in the target network.
Based on the instant communication method, a corresponding communication network is established according to a networking request sent by a target terminal, when the login request of a request object is received, the login request is responded, the request object is added into the corresponding target network, the communication authority of the request object in the target network is opened, a plurality of different request objects can be made to carry out communication interaction in the corresponding communication network, and because the request object can be the networking terminal or the intelligent equipment, not only a user but also the intelligent equipment with the instant communication function is arranged in the communication network, so that the intelligent equipment has the humanized instant communication function and provides anthropomorphic interaction service for the user.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive labor.
FIG. 1 is a diagram of an application environment of the instant messaging method in one embodiment;
FIG. 2 is a flow diagram illustrating an embodiment of an instant messaging method;
FIG. 3 is a flow diagram illustrating an embodiment of an instant messaging method;
FIG. 4 is a flow diagram illustrating an embodiment of an instant messaging method;
FIG. 5 is a block diagram of a server in one embodiment;
FIG. 6 is a block diagram of an intelligent device in one embodiment;
fig. 7 is a block diagram of a terminal in one embodiment;
FIG. 8 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a diagram of an application environment of the instant messaging method in one embodiment. Referring to fig. 1, the instant messaging method is applied to an instant messaging system. The instant messaging system includes a terminal 110, a smart device 120, and a server 130. The terminal 110, the smart device 120, and the server 130 are connected through a network. The terminal 110 may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The smart device 120 may be a portable device or a smart home device, the portable device may be at least one of a watch, a bracelet, a foot ring, and the like, and the smart home device may be at least one of a smart television, a smart sound box, a smart air conditioner, a smart lamp, and the like, which have a network function. The server 130 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
In an embodiment, fig. 2 is a flowchart illustrating an instant messaging method according to an embodiment, and referring to fig. 2, an instant messaging method is provided. The embodiment mainly exemplifies that the method is applied to the server 130 in fig. 1, and the instant messaging method specifically includes the following steps:
step S210, receiving a networking request sent by the target terminal 110.
The networking request includes first identity information of a plurality of networking objects, and the networking objects include the networking terminal 110 and the smart device 120.
Specifically, the target terminal 110 is any one terminal 110 initiating a networking request, the networking request is used for requesting the server 130 to establish a communication network, each communication network includes at least two networking objects, including the target terminal 110 initiating the networking request, and communication information sent by any one networking object in the communication network can be shared by all networking objects in the communication network, so that the communication efficiency is accelerated, and the target terminal 110 does not need to send the same communication information to the object which needs to receive the information.
The first identity information of the multiple networking objects in the networking request is used to verify the identity of an object subsequently applying to join the networking network, and also notify the server 130 of which members in the communication network are constituent members, the networking objects may be the networking terminal 110 and the smart device 120, the networking terminal 110 at least includes the target terminal 110, and may also include other terminals 110 except the target terminal 110, in this embodiment, the smart device 120 is made to be a smart home device, that is, a user invites the other terminals 110 and the smart home device to join the communication network through the target terminal 110 to perform group communication.
Step S220, a corresponding communication network is established according to the first identity information of the plurality of networking objects.
Specifically, the server 130 constructs a communication network according to the first identity information of each networking object, but only the target terminal 110 is in an online state in the communication network constructed by the server 130, and only the networking object in the communication network is in the online state to receive the communication information in the communication network and send the communication information to the communication network, that is, only the networking object in the online state can participate in communication interaction in the communication network.
Step S230, when receiving a login request of a request object, determining a corresponding target network according to the login request.
The request object is the networking terminal 110 or the smart device 120, and the target network is the communication network including the request object.
Specifically, the login request is used to request to log in the corresponding communication network, i.e. to request to modify the online status of the requested object in the corresponding communication network. Since the server 130 may construct a plurality of different communication networks according to networking requests initiated by a plurality of different terminals 110, when receiving a login request, it is necessary to determine a communication network that a request object requests to join, that is, the login request includes network information of the communication network requested to be logged in, and the server 130 determines a corresponding target network according to the network information.
Step S240, using the request object as the networking object of the target network, and opening the communication right of the request object in the target network.
Specifically, after determining that the communication network requested to be added by the request object is the target network, responding to the login request, namely adding the request object into the target network, updating the online state of the request object in the target network to be online so as to start the communication authority of the request object in the target network, so that the request object can successfully participate in communication interaction in the target network, in this way, a plurality of different request objects can perform communication interaction in the corresponding communication network, and because the request objects can be the networking terminal 110 or the intelligent device 120, not only the user but also the intelligent device 120 with the instant communication function exist in the communication network, so that the intelligent device 120 has the humanized instant communication function, and the humanized interaction service is provided for the user.
In one embodiment, when receiving a login request for a request object, determining a corresponding target network according to the login request includes: and when a login request of a request object is received, taking the communication network corresponding to the first network tag corresponding to the second network tag in the plurality of first network tags as the target network.
Wherein each of the first network tags is for one of the communication networks and the login request includes the second network tag.
Specifically, each communication network constructed by the server 130 has a first network tag with a unique identifier, the first network tag may be composed of at least one of numbers, capital letters, lower case letters or other characters, the plurality of first network tags stored in the server 130 are compared and matched with the second network tags, the communication network corresponding to the first network tag completely matched with the second network tag is used as a target network, and since a request object may exist in a plurality of different communication networks, if the corresponding communication network is determined by using the identity information of the request object, a plurality of communication networks matched with the identity information of the request object may be obtained, so that the unique communication network can be accurately determined by using the second network tag related to the communication network in the login request, thereby improving the login efficiency and accuracy of the communication network.
In one embodiment, after the first network tag corresponding to the second network tag in the plurality of first network tags is associated with the communication network as the target network, the method further includes: determining the request state of the request object according to the login request; when the request state is a first request, performing identity authentication on the request object according to the login request to obtain an authentication result; and when the verification result is that the verification is successful, executing the step of taking the request object as the networking object of the target network and opening the communication authority of the request object in the target network.
The request state comprises a first request and a non-first request, and the verification result comprises verification success and verification failure.
Specifically, the server 130 locally counts the number of times that the request object initiates a login request for logging in to the target network in the past, and counts the number of successful responses to each login request, so as to determine the request state of the request object for the target network according to the number of times of requests and the number of successful responses, and if the number of times that the request object previously used for logging in to the login request initiated by the target network is 0, and the number of times of natural successful responses is also 0, it determines that the current login request is the first request, that is, the corresponding request state is the first request; if the request frequency of the request object used for logging in the login request initiated by the target network in the past is not 0, and the successful response frequency is 0, the current login request is not the first request, but the request state of the login request is still determined as the first request because the server 130 has not successfully responded to the login request before; if the request frequency of the request object used for logging in the login request initiated by the target network in the past is not 0, the successful response frequency is not 0, and the request frequency is the same as the successful response frequency, it indicates that the current login request is a non-initial request, and the server 130 has successfully responded to each login request before, the request state of the login request is determined as a non-initial request.
And when the request state is a first request, performing identity authentication on the request object according to the login request to obtain an authentication result, and executing the step of adding the request object into the target network as the networking object under the condition that the authentication result is successful. When the request state is not the first request, the request object can be directly used as the networking object of the target network, and the communication authority of the request object in the target network is opened.
In one embodiment, the login request includes second identity information of the request object, and the authenticating the request object according to the login request to obtain an authentication result includes: when the first identity information matched with the second identity information is found in the first identity information of each networking object in the target network, the obtained verification result is successful; and when the first identity information matched with the second identity information is not found in the first identity information of each networking object in the target network, obtaining the verification result as verification failure.
Specifically, since the server 130 constructs a communication network according to the first identity information of the multiple networking objects sent by the target terminal 110, each communication network corresponds to multiple networking objects, each networking object has corresponding first identity information, the information is stored locally in the server 130, when the login request needs to be authenticated, the second identity information in the login request is compared with the locally stored first identity information related to the target network, when the identity information matched with the second identity information is found in the first identity information related to the target network, the request object is the networking object in the target network, and the authentication result is determined to be successful; when the identity information matched with the second identity information is not found in the first identity information related to the target network, it indicates that the request object is not a networking object in the target network, that is, the request object is likely to be an illegal access object, it is determined that the authentication result is authentication failure, and the server 130 rejects a response to the login request with the authentication failure, that is, the login request fails to respond.
When identity information matched with second identity information is not found in first identity information related to a target network, generating an addition prompt according to the second identity information, sending the addition prompt to an initiating object of the target network, wherein the initiating object is an object for initiating generation of the target network, the initiating object is a target terminal in the embodiment to inform a user of requesting to join the target network, and when a server receives an addition instruction sent by the initiating object, the server adds the request object to the target network and allows the request object to participate in group communication of the target network; and if the server does not receive the adding instruction returned by the initiating object within the preset time length or receives the refusing instruction returned by the initiating object, refusing the login request of the response request object.
Or, when the identity information matched with the second identity information is not found in the first identity information related to the target network, the communication network corresponding to the request object does not exist locally in the server, a corresponding communication network is constructed for the request object according to the login request, the communication authority of the request object is started in the communication network, the request object is subjected to attribute analysis to determine the request intention of the request object, and the object related to the request object is added to the communication network according to the request intention so as to meet the request of the request object for group communication.
Or, the identity information matched with the second identity information is not found in the first identity information related to the target network, which indicates that the request object is not a networking object of the target network, when the request object is a networking terminal, the control intention of the request object can be further judged, whether the request object is allowed to join the target network is finally determined according to the control intention, and then the intelligent device in the target network is controlled.
Optionally, the determining the control intention of the request object, and the specific manner of finally determining whether to allow the request object to join the target network according to the control intention may include:
firstly, a virtual communication network is constructed based on a target network, and the virtual communication network has the same networking objects (including networking terminals and intelligent equipment) and communication interaction modes as the target network. Optionally, the relevant parameters of each networking object in the virtual communication network are consistent with the corresponding networking object in the target network, but the unique identification code (such as an IP address, a MAC address, and the like) of each networking object in the virtual communication network is different from the corresponding networking object in the target network, that is, the unique identification code of each networking object in the virtual communication network is fictional.
Then, a control request sent by the request object is received, and the control request is analyzed to obtain the control intention of the request object.
Then, it is determined whether the control intention is illegal, for example, when the control intention is an operation that has a risk on the home property or personal safety such as opening a smart door lock, opening a window, or opening a gas cover, it is determined to be illegal, and when the control intention is an operation that has nothing to do with the home property or personal safety such as opening a television, opening an air conditioner, or opening a water heater, it is determined to be legal.
And then, determining whether other networking terminals in the target network are controlling one or more intelligent devices, and configuring temporary communication permission matched with the control intention for the request object when the other networking terminals are not controlling one or more intelligent devices.
And finally, adding the request object into the target network to serve as a temporary user of the target network, wherein the request object has temporary communication authority.
The identity information specifically includes an equipment tag, a login account, a login password, a login domain name, a biological feature of a login user, and the like, and the biological feature may specifically be at least one of a fingerprint, a pupil line, a voiceprint, and a face, for example, by obtaining a comparison between a fingerprint in the second identity information and fingerprints in each local first identity information, when the fingerprints are compared to be consistent, it is determined that the first identity information is matched with the second identity information.
In one embodiment, as shown in fig. 3, the present embodiment provides an instant messaging method applied to an intelligent device 120, where the method includes:
step S310, receiving a networking invitation sent by the target terminal 110.
The networking invitation comprises a second network label of a target network, and the target network is a communication network to be joined.
Specifically, the target terminal 110 sends a networking invitation to the smart device 120 in a peer-to-peer communication manner, where the networking invitation is used to invite the smart device 120 to join the target network.
Step S320, generating a login request according to the second network tag, and sending the login request to the server 130.
Wherein the login request is used for requesting to join the target network.
Specifically, after receiving the networking invitation, the smart device 120 generates a login request according to the second network tag in the networking invitation, and sends the login request to the server 130 to request to login and join the communication network corresponding to the second network tag, and the server 130 performs identity authentication on the login request.
Step S330, when the server 130 opens the communication right of the intelligent device 120 in the target network according to the login request, receiving session information in the target network.
Specifically, when the server 130 successfully authenticates the identity of the login request, the communication right of the intelligent device 120 in the target network is opened, that is, the intelligent device 120 is added to the target network, so that the intelligent device 120 can participate in communication interaction in the target network.
Step S340, determining corresponding feedback information according to the session information, and sending the feedback information to the target network.
Specifically, the intelligent device 120 determines corresponding feedback information according to the session information generated in the target network, and returns the feedback information to the target network, so as to complete the communication interaction of the intelligent device 120 in the target network, that is, the intelligent device 120 performs anthropomorphic communication interaction with other intelligent devices 120 or the terminal 110 used by the user as an independent individual in the target network, thereby improving the interaction experience of the user on the intelligent device 120.
In one embodiment, the determining the corresponding feedback information according to the session information includes: performing semantic analysis on the session information to determine a corresponding semantic intention; and acquiring the corresponding feedback information from a local database and/or the server 130 according to the semantic intention.
Specifically, the intelligent device 120 has a session information analysis function, performs semantic analysis on the session information to obtain a semantic intention corresponding to the session information, that is, knows an intention expressed by the user through the session information, and then searches information related to the semantic intention from a local database as feedback information, where professional knowledge, common living knowledge, and the like in a plurality of different fields are stored in the local database, and when the information related to the semantic intention is not found in the local database, the intelligent device 120 may generate a corresponding data request according to the semantic intention and send the data request to the server 130 to request the server 130 to provide the information related to the semantic intention, and then the intelligent device 120 sends the information returned by the server 130 as feedback information to the target network to interact with the session information, that is, regardless of the problem that the session information sent by the user in the target network is in any field, the intelligent device 120 may respond to the session information from the local database or from the server 130, thereby improving the intelligent degree of interaction between the user and the intelligent device 120.
In one implementation, as shown in fig. 4, this embodiment provides an instant messaging method applied to a terminal 110, where the method includes:
step S410, sending a networking invitation to a networking object, wherein the networking object comprises a networking terminal 110 and an intelligent device 120, the networking invitation comprises a network tag of a target network, and the networking invitation is used for requesting the networking object to join the target network.
Specifically, the user sends a networking invitation to the other terminal 110 or the smart device 120 through the operation terminal 110, where the networking invitation is used to invite the other terminal 110 or the smart device 120 to enter the communication network indicated by the network tag. The terminal 110 may send a networking invitation to the designated terminal 110 and/or the smart device 120 through remote peer-to-peer communication according to an operation instruction of the user, and the terminal 110 may also send the networking invitation to a connection object of the currently connected gateway, that is, the terminal 110 automatically sends the networking invitation to another terminal 110 or the smart device 120 connected to the same gateway as the terminal 110, so as to connect the terminal 110 and the smart device 120 of the same gateway to form a communication network.
Step S420, a networking request is obtained and generated according to the first identity information of the networking object.
Specifically, the user may construct a plurality of different communication networks according to the type and number of the networking objects, that is, the terminal 110 generates a corresponding networking request according to the first identity information of the networking object in each communication network that the user expects to construct, for example, the terminal 110 may generate a networking request related to the smart home communication network according to the identity information of the smart television, the smart washing machine, the smart air conditioner, and the smart sound box, and may also generate a networking request related to the smart office communication network according to the identity information of the smart lighting, the smart security, and the smart air conditioner.
Step S430, sending a networking request to the server 130, where the networking request is used to request the server 130 to form the target network.
Specifically, the terminal 110 sends a networking request to the server 130, the request server 130 constructs a corresponding communication network according to the networking request, the terminal 110 may send a plurality of different networking requests to the server 130, that is, the requests are used for constructing a plurality of different communication networks, after the server 130 constructs a communication network, the terminal 110 may send a login request related to the communication network to the server 130 to request to enter the corresponding communication network, the terminal 110 may simultaneously log in a plurality of different communication networks and may simultaneously participate in communication interaction of the plurality of communication networks, for example, the user 1 may simultaneously log in an intelligent home network and an intelligent office network through the terminal 110, may perform communication interaction with each intelligent home device in the intelligent home network, may send session information including a control instruction to each intelligent home device, and may also receive feedback information returned by each intelligent home device; the intelligent office network can be in communication interaction with various intelligent office equipment, for example, the intelligent office network can be in communication interaction with the intelligent printer, and the working state of the intelligent printer is known and session information containing control instructions is sent to the intelligent printer.
Fig. 2-4 are flow diagrams illustrating an instant messaging method according to an embodiment. It should be understood that although the various steps in the flowcharts of fig. 2-4 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-4 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 1, there is provided an instant messaging system comprising:
the terminal 110 is configured to send a networking request to the server 130, and send a networking invitation to a networking object, where the networking invitation includes a network tag of a target network;
the intelligent device 120 is configured to send a login request for joining a target network to the server 130 when receiving a networking invitation sent by the terminal 110 as a networking object, and provide corresponding feedback information according to session information in the target network after joining the target network;
the server 130 is configured to generate a corresponding communication network according to the networking request sent by the terminal 110, and respond to the received login request.
In one embodiment, as shown in fig. 5, the server 130 includes:
a first receiving module 510, configured to receive a networking request sent by a target terminal 110, where the networking request includes first identity information of multiple networking objects, and the networking objects include the networking terminal 110 and the smart device 120;
a networking module 520, configured to establish a corresponding communication network according to the first identity information of the multiple networking objects;
a determining module 530, configured to determine, when a login request of a request object is received, a corresponding target network according to the login request, where the request object is the networking terminal 110 or the smart device 120, and the target network is the communication network including the request object;
a first communication module 540, configured to use the request object as the networking object of the target network, and open a communication right of the request object in the target network.
In an embodiment, the determining module 530 is specifically configured to:
when a login request of a request object is received, the communication network corresponding to a first network tag corresponding to a second network tag in a plurality of first network tags is used as the target network, wherein each first network tag is corresponding to one communication network, and the login request comprises the second network tag.
In one embodiment, the first communication module 540 is specifically configured to:
determining a request state of the request object according to the login request, wherein the request state comprises a first request and a non-first request;
when the request state is a first request, performing identity authentication on the request object according to the login request to obtain an authentication result, wherein the authentication result comprises authentication success and authentication failure;
and when the verification result is that the verification is successful, executing the step of taking the request object as the networking object of the target network and opening the communication authority of the request object in the target network.
In one embodiment, the first communication module 540 is specifically configured to:
when the first identity information matched with the second identity information is found in the first identity information of each networking object in the target network, the obtained verification result is successful;
and when the first identity information matched with the second identity information is not found in the first identity information of each networking object in the target network, obtaining the verification result as verification failure.
In one embodiment, as shown in fig. 6, the smart device 120 includes:
a second receiving module 610, configured to receive a networking invitation sent by the target terminal 110, where the networking invitation includes a second network tag of a target network, and the target network is a communication network to be joined;
a request module 620, configured to generate a login request according to the second network tag, and send the login request to the server 130, where the login request is used to request to join the target network;
the second communication module 630 is configured to receive session information in the target network when the server 130 starts the communication right of the intelligent device 120 in the target network according to the login request;
a feedback module 640, configured to determine corresponding feedback information according to the session information, and send the feedback information to the target network.
In an embodiment, the feedback module 640 is specifically configured to:
performing semantic analysis on the session information to determine a corresponding semantic intention;
and acquiring the corresponding feedback information from a local database and/or the server 130 according to the semantic intention.
In one embodiment, as shown in fig. 7, the terminal 110 includes:
the invitation module 710 is configured to send a networking invitation to a networking object, where the networking object includes the networking terminal 110 and the smart device 120, the networking invitation includes a network tag of a target network, and the networking invitation is used to request the networking object to join the target network;
an obtaining module 720, configured to obtain and generate a networking request according to the first identity information of the networking object;
a sending module 730, configured to send a networking request to the server 130, where the networking request is used to request the server 130 to form the target network.
FIG. 8 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be the server 130130 in fig. 1. As shown in fig. 8, the computer device includes a processor, a memory, a network interface, an input system, and a display screen connected by a system bus. The memory comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the instant messaging method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform the instant messaging method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input system of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the instant messaging system provided by the present application may be implemented in the form of a computer program that is executable on a computer device such as that shown in fig. 8. The memory of the computer device may store various program modules constituting the instant communication system, such as the first receiving module 510, the networking module 520, the determining module 530, and the first communication module 540 shown in fig. 5. The computer program constituted by the respective program modules causes the processor to execute the steps in the instant messaging method of the respective embodiments of the present application described in the present specification.
The computer device shown in fig. 8 may execute, by the first receiving module 510 in the instant messaging system shown in fig. 5, receiving a networking request sent by the target terminal 110, where the networking request includes first identity information of a plurality of networking objects, and the networking objects include the networking terminal 110 and the smart device 120. The computer device may perform the step of establishing a corresponding communication network according to the first identity information of the plurality of networking objects through the networking module 520. The computer device may determine, by the determining module 530, when a login request of a request object is received, a corresponding target network according to the login request, where the request object is the networking terminal 110 or the smart device 120, and the target network is the communication network including the request object. The computer device can perform the operation of setting the request object as the networking object of the target network through the first communication module 540, and open the communication right of the request object in the target network.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the above embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the method of any of the above embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by instructing relevant hardware through a computer program, and the program may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double-rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct bused dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM).
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The above description is merely illustrative of particular embodiments of the invention that enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. An instant messaging method, applied to a server, the method comprising:
receiving a networking request sent by a target terminal, wherein the networking request comprises first identity information of a plurality of networking objects, and the networking objects comprise networking terminals and intelligent equipment;
establishing a corresponding communication network according to the first identity information of the plurality of networking objects;
when a login request of a request object is received, determining a corresponding target network according to the login request, wherein the request object is the networking terminal or the intelligent equipment, and the target network is the communication network containing the request object;
and taking the request object as the networking object of the target network, and starting the communication authority of the request object in the target network.
2. The method of claim 1, wherein determining the corresponding target network according to the login request when receiving the login request of the request object comprises:
when a login request of a request object is received, the communication network corresponding to a first network tag corresponding to a second network tag in a plurality of first network tags is used as the target network, wherein each first network tag is corresponding to one communication network, and the login request comprises the second network tag.
3. The method of claim 2, wherein after the first network tag corresponding to the second network tag in the plurality of first network tags is associated with the communication network as the target network, the method further comprises:
determining a request state of the request object according to the login request, wherein the request state comprises a first request and a non-first request;
when the request state is a first request, performing identity authentication on the request object according to the login request to obtain an authentication result, wherein the authentication result comprises authentication success and authentication failure;
and when the verification result is that the verification is successful, executing the step of taking the request object as the networking object of the target network and opening the communication authority of the request object in the target network.
4. The method of claim 3, wherein the login request includes second identity information of the requested object, and wherein authenticating the requested object according to the login request to obtain an authentication result comprises:
when the first identity information matched with the second identity information is found in the first identity information of each networking object in the target network, the obtained verification result is successful;
and when the first identity information matched with the second identity information is not found in the first identity information of each networking object in the target network, obtaining the verification result as verification failure.
5. An instant messaging method is applied to intelligent equipment, and the method comprises the following steps:
receiving a networking invitation sent by a target terminal, wherein the networking invitation comprises a second network tag of a target network, and the target network is a communication network to be joined;
generating a login request according to the second network tag, and sending the login request to a server, wherein the login request is used for requesting to join the target network;
when the server starts the communication right of the intelligent equipment in the target network according to the login request, receiving session information in the target network;
and determining corresponding feedback information according to the session information, and sending the feedback information to the target network.
6. The method of claim 5, wherein the determining the corresponding feedback information according to the session information comprises:
performing semantic analysis on the session information to determine a corresponding semantic intention;
and acquiring corresponding feedback information from a local database and/or a server according to the semantic intention.
7. An instant messaging method, which is applied to a terminal, is characterized in that the method comprises the following steps:
sending a networking invitation to a networking object, wherein the networking object comprises a networking terminal and intelligent equipment, the networking invitation comprises a network tag of a target network, and the networking invitation is used for requesting the networking object to join the target network;
acquiring and generating a networking request according to the first identity information of the networking object;
and sending a networking request to a server, wherein the networking request is used for requesting the server to form the target network.
8. An instant messaging system, the system comprising:
the terminal is used for sending a networking request to the server and sending a networking invitation to the networking object, wherein the networking invitation comprises a network tag of a target network;
the intelligent equipment is used for sending a login request for joining a target network to the server when receiving a networking invitation sent by the terminal as a networking object, and providing corresponding feedback information according to session information in the target network after joining the target network;
and the server is used for generating a corresponding communication network according to the networking request sent by the terminal and responding to the received login request.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 7 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202210608495.0A 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium Active CN115277048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210608495.0A CN115277048B (en) 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210608495.0A CN115277048B (en) 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium

Publications (2)

Publication Number Publication Date
CN115277048A true CN115277048A (en) 2022-11-01
CN115277048B CN115277048B (en) 2023-12-29

Family

ID=83759632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210608495.0A Active CN115277048B (en) 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN115277048B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566223A (en) * 2016-06-30 2018-01-09 北京北信源软件股份有限公司 One kind personalizes smart home managing and control system and method
WO2018127200A1 (en) * 2017-01-09 2018-07-12 云丁网络技术(北京)有限公司 Method for smart device to access network, mobile terminal, cloud server, device, and system
CN110932953A (en) * 2019-12-24 2020-03-27 苏州思必驰信息科技有限公司 Intelligent household control method and device, computer equipment and storage medium
CN112187751A (en) * 2020-09-17 2021-01-05 海尔优家智能科技(北京)有限公司 Network access method and device for equipment, storage medium and electronic device
CN113132333A (en) * 2019-12-31 2021-07-16 佛山市云米电器科技有限公司 Networking login method, household appliance equipment, household appliance system and storage medium
CN113225744A (en) * 2021-05-08 2021-08-06 深圳市欧瑞博科技股份有限公司 Intelligent device ad hoc network method, intelligent networking system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566223A (en) * 2016-06-30 2018-01-09 北京北信源软件股份有限公司 One kind personalizes smart home managing and control system and method
WO2018127200A1 (en) * 2017-01-09 2018-07-12 云丁网络技术(北京)有限公司 Method for smart device to access network, mobile terminal, cloud server, device, and system
CN110932953A (en) * 2019-12-24 2020-03-27 苏州思必驰信息科技有限公司 Intelligent household control method and device, computer equipment and storage medium
CN113132333A (en) * 2019-12-31 2021-07-16 佛山市云米电器科技有限公司 Networking login method, household appliance equipment, household appliance system and storage medium
CN112187751A (en) * 2020-09-17 2021-01-05 海尔优家智能科技(北京)有限公司 Network access method and device for equipment, storage medium and electronic device
CN113225744A (en) * 2021-05-08 2021-08-06 深圳市欧瑞博科技股份有限公司 Intelligent device ad hoc network method, intelligent networking system and storage medium

Also Published As

Publication number Publication date
CN115277048B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
US10462118B2 (en) Systems and methods for login and authorization
CN107070945B (en) Identity login method and equipment
Ellison Ceremony design and analysis
US9178866B2 (en) Techniques for user authentication
CN103067378A (en) Log-in control method and system based on two-dimension code
US7117528B1 (en) Contested account registration
KR960035299A (en) A method for managing communication between a remote user and an application server, a subject authentication method for a remote user, a network and a program storage device providing a distributed computer environment
CN110689332B (en) Resource account binding method, storage medium and electronic device
CN105099707B (en) A kind of offline authentication method, server and system
KR20110020921A (en) Improved biometric authentication and identification
CN104917722B (en) The method, apparatus and system of authentication
CN109076080A (en) authentication method and system
CN110768968A (en) Authorization method, device, equipment and system based on verifiable statement
EP3100432A1 (en) Virtual identity of a user based on disparate identity services
CN104426659B (en) Dynamic password formation method, authentication method and system, relevant device
KR101814079B1 (en) Method, application, computer program and device for providing authentication service using mobile terminal
CN110232265A (en) Dual-identity authentication method, apparatus and system
CN108140079A (en) Device authentication system
CN108632271A (en) Identity identifying method and device
CN113645257B (en) Identity authentication method and device, electronic equipment and storage medium
CN111191200A (en) Page display method and device and electronic equipment
CN112929388B (en) Network identity cross-device application rapid authentication method and system, and user agent device
US20240146734A1 (en) Large language model-based authentication
CN115277048B (en) Instant messaging method, system, computer device and storage medium
US20090025066A1 (en) Systems and methods for first and second party authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant