CN115277048B - Instant messaging method, system, computer device and storage medium - Google Patents

Instant messaging method, system, computer device and storage medium Download PDF

Info

Publication number
CN115277048B
CN115277048B CN202210608495.0A CN202210608495A CN115277048B CN 115277048 B CN115277048 B CN 115277048B CN 202210608495 A CN202210608495 A CN 202210608495A CN 115277048 B CN115277048 B CN 115277048B
Authority
CN
China
Prior art keywords
request
network
networking
target network
login request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210608495.0A
Other languages
Chinese (zh)
Other versions
CN115277048A (en
Inventor
林皓
高曦
杨华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN202210608495.0A priority Critical patent/CN115277048B/en
Publication of CN115277048A publication Critical patent/CN115277048A/en
Application granted granted Critical
Publication of CN115277048B publication Critical patent/CN115277048B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to an instant messaging method, an instant messaging system, a computer device and a storage medium. The method comprises the following steps: the method comprises the steps of constructing a corresponding communication network according to a networking request sent by a target terminal, responding to the login request when the login request of a request object is received, adding the request object into the corresponding target network, starting the communication authority of the request object in the target network, and enabling a plurality of different request objects to perform communication interaction in the corresponding communication network.

Description

Instant messaging method, system, computer device and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to an instant messaging method, system, computer device, and storage medium.
Background
In the field of network instant messaging, concepts, methods, techniques and products of instant messaging robots are presented, mainly for helping people to automatically process part of messages. For example, on an e-commerce or information service website, an instant messaging robot is bound with a server and can automatically answer questions of a user according to a question list frequently asked by the user to provide product information or consultation services; the instant messaging robot bound at the user end is equivalent to an instant messaging secretary of an individual user, and can also process simple information.
In the field of intelligent home equipment, the concept, the method, the technology and the product of the intelligent home robot are also presented, mainly a module on hardware equipment or household appliances is used for controlling the intelligent home equipment such as the household appliances, but the control still stays in the past instruction level control, and the interaction information is very simple.
With the development of the mobile internet, humanized interactive operation is carried out with the intelligent home robot based on the instant messaging channel, so that the intelligent home robot is quite convenient, fast, efficient and full of imagination. However, at present, the smart home device cannot realize the function of instant messaging, and cannot provide anthropomorphic interaction service for users.
Disclosure of Invention
In order to solve the technical problems, the application provides an instant messaging method, an instant messaging system, a computer device and a storage medium.
In a first aspect, the present application provides an instant messaging method, applied to a server, where the method includes:
receiving a networking request sent by a target terminal, wherein the networking request comprises first identity information of a plurality of networking objects, and the networking objects comprise networking terminals and intelligent equipment;
constructing a corresponding communication network according to the first identity information of the networking objects;
When a login request of a request object is received, determining a corresponding target network according to the login request, wherein the request object is the networking terminal or the intelligent equipment, and the target network is the communication network containing the request object;
and taking the request object as the networking object of the target network, and starting the communication authority of the request object in the target network.
In a second aspect, the present application provides an instant messaging method applied to an intelligent device, where the method includes:
receiving a networking invitation sent by a target terminal, wherein the networking invitation comprises a second network tag of a target network, and the target network is a communication network to be added;
generating a login request according to the second network tag, and sending the login request to a server, wherein the login request is used for requesting to join the target network;
receiving session information in the target network when the server starts the communication right of the intelligent device in the target network according to the login request;
and determining corresponding feedback information according to the session information, and sending the feedback information to the target network.
In a third aspect, the present application provides an instant messaging method, applied to a terminal, where the method includes:
sending a networking invitation to a networking object, wherein the networking object comprises a networking terminal and intelligent equipment, the networking invitation comprises a network tag of a target network, and the networking invitation is used for requesting the networking object to join the target network;
acquiring and generating a networking request according to the first identity information of the networking object;
and sending a networking request to a server, wherein the networking request is used for requesting the server to form the target network.
In a fourth aspect, the present application provides an instant messaging system, including:
the terminal is used for sending a networking request to the server and sending a networking invitation to the networking object, wherein the networking invitation comprises a network tag of a target network;
the intelligent equipment is used for sending a login request for joining a target network to the server when receiving a networking invitation sent by the terminal as a networking object, and providing corresponding feedback information according to session information in the target network after joining the target network;
and the server is used for generating a corresponding communication network according to the networking request sent by the terminal and responding to the received login request.
In a fifth aspect, the present application provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the first to third aspects described above when the computer program is executed.
In a sixth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the first to third aspects described above.
The instant messaging method, the instant messaging system, the computer equipment and the storage medium, wherein the instant messaging method comprises the following steps: receiving a networking request sent by a target terminal, wherein the networking request comprises first identity information of a plurality of networking objects, and the networking objects comprise networking terminals and intelligent equipment; constructing a corresponding communication network according to the first identity information of the networking objects; when a login request of a request object is received, determining a corresponding target network according to the login request, wherein the request object is the networking terminal or the intelligent equipment, and the target network is the communication network containing the request object; and taking the request object as the networking object of the target network, and starting the communication authority of the request object in the target network.
Based on the instant messaging method, a corresponding communication network is built according to the networking request sent by the target terminal, when a login request of a request object is received, the request object is added into the corresponding target network in response to the login request, and the communication authority of the request object in the target network is opened, so that a plurality of different request objects can perform communication interaction in the corresponding communication network.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is an application environment diagram of an instant messaging method in one embodiment;
FIG. 2 is a flow chart of an instant messaging method according to an embodiment;
FIG. 3 is a flow chart of an instant messaging method according to an embodiment;
FIG. 4 is a flow chart of an instant messaging method according to an embodiment;
FIG. 5 is a block diagram of a server in one embodiment;
FIG. 6 is a block diagram of the architecture of a smart device in one embodiment;
FIG. 7 is a block diagram of a terminal in one embodiment;
fig. 8 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present application based on the embodiments herein.
Fig. 1 is an application environment diagram of an instant messaging method in one embodiment. Referring to fig. 1, the instant messaging method is applied to an instant messaging system. The instant communication system includes a terminal 110, an intelligent device 120, and a server 130. Terminal 110, smart device 120, and server 130 are connected via a network. The terminal 110 may be a desktop terminal or a mobile terminal, and the mobile terminal may be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The smart device 120 may be specifically a portable device or an intelligent home device, where the portable device may be specifically at least one of a watch, a bracelet, a foot ring, and the like, and the intelligent home device may be specifically at least one of an intelligent television, an intelligent sound box, an intelligent air conditioner, an intelligent lamp, and the like with a network function. The server 130 may be implemented as a stand-alone server or as a server cluster composed of a plurality of servers.
In one embodiment, fig. 2 is a flow chart of an instant messaging method in one embodiment, and referring to fig. 2, an instant messaging method is provided. The embodiment is mainly exemplified by the method applied to the server 130 in fig. 1, and the instant messaging method specifically includes the following steps:
step S210, a networking request sent by the target terminal 110 is received.
Wherein the networking request includes first identity information of a plurality of networking objects, and the networking objects include a networking terminal 110 and an intelligent device 120.
Specifically, the target terminal 110 is any terminal 110 that initiates a networking request, where the networking request is used to request the server 130 to establish a communication network, each communication network includes at least two networking objects, where the communication network includes the target terminal 110 that initiates the networking request, and communication information sent by any networking object in the communication network may be shared by all networking objects in the communication network, so as to speed up communication efficiency, and the target terminal 110 does not need to send the same communication information to objects that need to receive the information respectively.
The first identity information of the plurality of networking objects in the networking request is used for verifying the identity of the object in the networking network to which the subsequent application is added, and also informs the server 130 of which of the constituent members in the communication network are the networking terminal 110 and the intelligent device 120, where the networking terminal 110 at least includes the target terminal 110 and may also include other terminals 110 except the target terminal 110, and in this embodiment, the intelligent device 120 is made to be an intelligent home device, that is, the user invites the other terminals 110 and the intelligent home device to join in the communication network through the target terminal 110 for group communication.
Step S220, corresponding communication networks are built according to the first identity information of the networking objects.
Specifically, the server 130 constructs a communication network according to the first identity information of each networking object, but only the target terminal 110 is in an online state in the communication network constructed by the server 130, and only the networking objects in the online state in the communication network can receive the communication information in the communication network and send the communication information to the communication network, that is, only the networking objects in the online state can participate in communication interaction in the communication network.
Step S230, when receiving a login request of a request object, determining a corresponding target network according to the login request.
The request object is the networking terminal 110 or the intelligent device 120, and the target network is the communication network containing the request object.
Specifically, the login request is used for requesting to login to the corresponding communication network, i.e. requesting to modify the online state of the request object in the corresponding communication network. Since the server 130 can construct a plurality of different communication networks according to the networking request initiated by a plurality of different terminals 110, it is necessary to determine the communication network to which the request object requests to join when receiving the login request, that is, the login request includes network information of the communication network requested to login, and the server 130 determines a corresponding target network according to the network information.
And step S240, taking the request object as the networking object of the target network, and starting the communication authority of the request object in the target network.
Specifically, after determining that the communication network to which the request object requests to join is the target network, the request object is added to the target network in response to the login request, and the online state of the request object in the target network is updated to be online, so as to start the communication authority of the request object in the target network, the request object can successfully participate in communication interaction in the target network, in this way, a plurality of different request objects can perform communication interaction in the corresponding communication network, and because the request object can be the networking terminal 110 or the intelligent device 120, the communication network has not only the user but also the intelligent device 120 with the instant communication function, so that the intelligent device 120 has the humanized instant communication function and provides the anthropomorphic interaction service for the user.
In one embodiment, when receiving the login request of the request object, determining the corresponding target network according to the login request includes: when a login request of a request object is received, the communication network corresponding to the first network tag corresponding to the second network tag in the plurality of first network tags is used as the target network.
Wherein each of the first network tags is specific to one of the communication networks, and the login request includes the second network tag.
Specifically, each communication network constructed by the server 130 has a first network tag with a unique identifier, where the first network tag may be composed of at least one of a number, a capital letter, a small letter, or other characters, a plurality of first network tags stored in the server 130 are compared and matched with a second network tag, and a communication network corresponding to the first network tag that is completely matched with the second network tag is used as a target network.
In one embodiment, after the first network tag corresponding to the second network tag in the plurality of first network tags corresponds to the communication network as the target network, the method further includes: determining a request state of the request object according to the login request; when the request state is the first request, carrying out identity verification on the request object according to the login request to obtain a verification result; and when the verification result is that the verification is successful, executing the step of taking the request object as the networking object of the target network and starting the communication authority of the request object in the target network.
Wherein the request state includes a first request and a non-first request, and wherein the verification result includes a verification success and a verification failure.
Specifically, the server 130 locally counts the number of requests of the request object for initiating the login request of the login target network, and counts the number of successful responses to each login request, so as to determine the request state of the request object to the target network according to the number of requests and the number of successful responses, if the number of requests of the request object for initiating the login request of the login target network is 0, and if the number of natural successful responses is also 0, then determining that the current login request is the first request, that is, the corresponding request state is the first request; if the number of requests of the request object for the login request initiated by the login target network is not 0, and the number of successful response times is 0, which indicates that the current login request is not the first request, but the server 130 does not respond to the login request successfully before, the request state of the login request is still determined to be the first request; if the number of requests of the login request initiated by the request object for logging in the target network is not 0, the number of successful responses is not 0, and the number of requests is the same as the number of successful responses, which indicates that the current login request is not the first request, and the server 130 has successfully responded to each login request before, the request state of the login request is determined to be the non-first request.
When the request state is the first request, carrying out identity verification on the request object according to the login request to obtain a verification result, and executing the step of adding the request object into the target network as the networking object under the condition that the verification result is successful in verification. When the request state is not the first request, the request object can be directly used as a networking object of the target network, and the communication authority of the request object in the target network is started.
In one embodiment, the login request includes second identity information of the request object, and the authenticating the request object according to the login request, to obtain an authentication result, includes: the verification result is successful when the first identity information matched with the second identity information is found in the first identity information of each networking object in the target network; and when the first identity information matched with the second identity information is not found in the first identity information of each networking object in the target network, the obtained verification result is verification failure.
Specifically, since the server 130 constructs a communication network according to the first identity information of the plurality of networking objects sent by the target terminal 110, each communication network corresponds to the plurality of networking objects, each networking object has the corresponding first identity information, the information is stored locally in the server 130, when the login request needs to be authenticated, the second identity information in the login request is compared with the locally stored first identity information related to the target network, when the identity information matched with the second identity information is found in the first identity information related to the target network, the request object is the networking object in the target network, and the verification result is determined to be successful; when the identity information matched with the second identity information is not found in the first identity information related to the target network, the request object is not a networking object in the target network, namely, the request object is likely to be an illegal access object, the verification result is determined to be verification failure, and the server 130 refuses to respond to the login request with the failed identity verification, namely, the login request fails to respond.
When the identity information matched with the second identity information is not found in the first identity information related to the target network, generating an addition reminder according to the second identity information, and sending the addition reminder to an initiating object of the target network, wherein the initiating object is an object for initiating generation of the target network, in the embodiment, the initiating object is a target terminal for notifying a user to request to join the target network, and when receiving an addition instruction sent by the initiating object, the server adds the request object into the target network, and allows the request object to participate in group communication of the target network; if the server does not receive the adding instruction returned by the initiating object within the preset duration or receives the rejecting instruction returned by the initiating object, the login request responding to the request object is rejected.
Or when the identity information matched with the second identity information is not found in the first identity information related to the target network, the server does not locally have a communication network corresponding to the request object, a corresponding communication network is built for the request object according to the login request, the communication authority of the request object is opened in the communication network, the request object is subjected to attribute analysis so as to determine the request intention, and the related object is added into the communication network according to the request intention so as to meet the request of the request object for group communication.
Or, the identity information matched with the second identity information is not found in the first identity information related to the target network, which indicates that the request object is not a networking object of the target network, when the request object is a networking terminal, the control intention of the request object can be further judged, whether the request object is allowed to join the target network is finally determined according to the control intention, and then the intelligent equipment in the target network is controlled.
Optionally, determining the control intention of the request object, and finally determining whether to allow the request object to join the target network according to the control intention may include:
First, a virtual communication network is constructed based on a target network, and the virtual communication network has the same networking object (including a networking terminal and an intelligent device) and communication interaction mode as the target network. Optionally, the relevant parameters of each networking object in the virtual communication network are consistent with the corresponding networking object in the target network, but the unique identification code (e.g., IP address, MAC address, etc.) of each networking object in the virtual communication network is different from the corresponding networking object in the target network, that is, the unique identification code of each networking object in the virtual communication network is fictitious.
Then, a control request sent by the request object is received, and the control request is analyzed to obtain the control intention of the request object.
Then, whether or not the control intention is illegal is determined, for example, if the control intention is to open the intelligent door lock, open the window, or open the gas hood, or if there is a dangerous risk to the household property or personal safety, the control intention is to open the television, open the air conditioner, or open the water heater, or if the control intention is to open the television, open the air conditioner, or open the water heater, or the like, the control intention is to be legal.
Then, determining whether other networking terminals exist in the target network and are controlling one or more intelligent devices, and configuring temporary communication authorities matched with control intents for the request object when the other networking terminals do not exist.
And finally, adding the request object into the target network, wherein the request object has temporary communication authority as a temporary user of the target network.
The identity information specifically comprises a device tag, a login account, a login password, a login domain name, biological characteristics of a login user and the like, the biological characteristics can be specifically at least one of fingerprints, pupil marks, voiceprints and faces, for example, the fingerprints in the second identity information can be obtained to be compared with the fingerprints in the local first identity information, and when the fingerprint comparison is consistent, the first identity information is determined to be matched with the second identity information.
In one embodiment, as shown in fig. 3, the present embodiment provides an instant messaging method applied to an intelligent device 120, where the method includes:
step S310, receiving the networking invitation sent by the target terminal 110.
The networking invitation comprises a second network label of a target network, wherein the target network is a communication network to be added.
Specifically, the target terminal 110 sends a networking invitation to the intelligent device 120 through a peer-to-peer communication manner, where the networking invitation is used to invite the intelligent device 120 to join the target network.
Step S320, generating a login request according to the second network tag, and sending the login request to the server 130.
Wherein the login request is used for requesting to join the target network.
Specifically, after receiving the networking invitation, the intelligent device 120 generates a login request according to the second network tag in the networking invitation, and sends the login request to the server 130 to request to log in to the communication network corresponding to the second network tag, and the server 130 performs identity verification on the login request.
Step S330, when the server 130 starts the communication right of the intelligent device 120 in the target network according to the login request, session information in the target network is received.
Specifically, in the case that the server 130 successfully verifies the login request, the communication authority of the intelligent device 120 in the target network is opened, that is, the intelligent device 120 is added to the target network, so that the intelligent device 120 can participate in communication interaction in the target network.
Step S340, determining corresponding feedback information according to the session information, and sending the feedback information to the target network.
Specifically, the intelligent device 120 determines corresponding feedback information according to session information generated in the target network, and returns the feedback information to the target network, so as to complete communication interaction of the intelligent device 120 in the target network, that is, anthropomorphic communication interaction of the intelligent device 120 serving as an independent individual in the target network with other intelligent devices 120 or terminals 110 used by users, thereby improving interaction experience of the users on the intelligent device 120.
In one embodiment, the determining the corresponding feedback information according to the session information includes: carrying out semantic analysis on the session information to determine corresponding semantic intention; and acquiring corresponding feedback information from a local database and/or a server 130 according to the semantic intention.
Specifically, the intelligent device 120 has a function of analyzing session information, performs semantic analysis on the session information, and can obtain semantic intent corresponding to the session information, that is, knows intent expressed by the session information by a user, searches information related to the semantic intent from a local database as feedback information, stores expertise and life knowledge in a plurality of different fields, and when the information related to the semantic intent is not found in the local database, the intelligent device 120 can generate a corresponding data request according to the semantic intent and send the data request to the server 130, so as to request the server 130 to provide the information related to the semantic intent, and then sends the information returned by the server 130 as feedback information to the target network for interaction with the session information, that is, no matter whether the session information sent by the user in the target network is in any field, the intelligent device 120 can respond to the information from the local database or from the server 130, thereby improving the degree of interaction between the user and the intelligent device 120.
In one implementation, as shown in fig. 4, the present embodiment provides an instant messaging method, applied to a terminal 110, where the method includes:
step S410, sending a networking invitation to a networking object, where the networking object includes a networking terminal 110 and an intelligent device 120, the networking invitation includes a network tag of a target network, and the networking invitation is used to request the networking object to join the target network.
Specifically, the user sends a networking invitation to the other terminal 110 or the smart device 120 by operating the terminal 110, and the networking invitation is used to invite the other terminal 110 or the smart device 120 to enter the communication network indicated by the network tag. The terminal 110 may send a networking invitation to the designated terminal 110 and/or the intelligent device 120 through remote point-to-point communication according to an operation instruction of the user, and the terminal 110 may also send a networking invitation to a connection object of the gateway currently connected, that is, the terminal 110 automatically sends a networking invitation to other terminals 110 or the intelligent device 120 connected to the same gateway with itself, so that the terminal 110 and the intelligent device 120 connected to the same gateway form a communication network.
Step S420, a networking request is obtained and generated according to the first identity information of the networking object.
Specifically, the user may construct a plurality of different communication networks according to the types and the number of the networking objects, that is, the terminal 110 generates a corresponding networking request according to the first identity information of the networking object in each communication network that the user expects to construct, for example, the terminal 110 may generate a networking request related to an intelligent home communication network according to the identity information of the intelligent television, the intelligent washing machine, the intelligent air conditioner, and the intelligent sound box, and may also generate a networking request related to an intelligent office communication network according to the identity information of the intelligent lighting, the intelligent security, and the intelligent air conditioner.
Step S430, sending a networking request to the server 130, where the networking request is used to request the server 130 to form the target network.
Specifically, the terminal 110 sends a networking request to the server 130, the server 130 is requested to construct a corresponding communication network according to the networking request, the terminal 110 can send a plurality of different networking requests to the server 130, namely, the request is used for requesting to form a plurality of different communication networks, after the server 130 constructs the communication network, the terminal 110 can send a login request related to the communication network to the server 130 so as to request to enter the corresponding communication network, the terminal 110 can log in a plurality of different communication networks at the same time, and can participate in communication interaction of a plurality of communication networks at the same time, for example, a user 1 can log in an intelligent home network and an intelligent office network at the same time through the terminal 110, can perform communication interaction with each intelligent home device in the intelligent home network, can send session information containing control instructions to each intelligent home device, and can also receive feedback information returned by each intelligent home device; communication interaction can be performed with each intelligent office device in the intelligent office network, for example, communication interaction is performed with the intelligent printer, the working state of the intelligent printer is known, and session information containing control instructions is sent to the intelligent printer.
Fig. 2-4 are flow diagrams of an instant messaging method in an embodiment. It should be understood that, although the steps in the flowcharts of fig. 2-4 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-4 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the sub-steps or stages are performed necessarily occur in sequence, but may be performed alternately or alternately with at least a portion of the other steps or sub-steps of other steps.
In one embodiment, as shown in fig. 1, there is provided an instant messaging system comprising:
a terminal 110, configured to send a networking request to a server 130, and send a networking invitation to a networking object, where the networking invitation includes a network tag of a target network;
the intelligent device 120 is configured to send a login request for joining a target network to the server 130 when receiving a networking invitation sent by the terminal 110 as a networking object, and provide corresponding feedback information according to session information in the target network after joining the target network;
And the server 130 is configured to generate a corresponding communication network according to the networking request sent by the terminal 110, and respond to the received login request.
In one embodiment, as shown in fig. 5, the server 130 includes:
a first receiving module 510, configured to receive a networking request sent by a target terminal 110, where the networking request includes first identity information of a plurality of networking objects, and the networking objects include the networking terminal 110 and the intelligent device 120;
a networking module 520, configured to construct a corresponding communication network according to the first identity information of the plurality of networking objects;
a determining module 530, configured to determine, when a login request of a request object is received, a corresponding target network according to the login request, where the request object is the networking terminal 110 or the intelligent device 120, and the target network is the communication network including the request object;
the first communication module 540 is configured to take the request object as the networking object of the target network, and open a communication authority of the request object in the target network.
In one embodiment, the determining module 530 is specifically configured to:
when a login request of a request object is received, the communication network corresponding to a first network tag corresponding to a second network tag in a plurality of first network tags is used as the target network, wherein each first network tag corresponds to one communication network, and the login request comprises the second network tag.
In one embodiment, the first communication module 540 is specifically configured to:
determining a request state of the request object according to the login request, wherein the request state comprises a first request and a non-first request;
when the request state is the first request, carrying out identity verification on the request object according to the login request to obtain a verification result, wherein the verification result comprises verification success and verification failure;
and when the verification result is that the verification is successful, executing the step of taking the request object as the networking object of the target network and starting the communication authority of the request object in the target network.
In one embodiment, the first communication module 540 is specifically configured to:
the verification result is successful when the first identity information matched with the second identity information is found in the first identity information of each networking object in the target network;
and when the first identity information matched with the second identity information is not found in the first identity information of each networking object in the target network, the obtained verification result is verification failure.
In one embodiment, as shown in fig. 6, the smart device 120 includes:
a second receiving module 610, configured to receive a networking invitation sent by a target terminal 110, where the networking invitation includes a second network tag of a target network, and the target network is a communication network to be added;
a request module 620, configured to generate a login request according to the second network tag, and send the login request to the server 130, where the login request is used to request to join the target network;
a second communication module 630, configured to receive session information in the target network when the server 130 opens a communication right of the intelligent device 120 in the target network according to the login request;
and a feedback module 640, configured to determine corresponding feedback information according to the session information, and send the feedback information to the target network.
In one embodiment, the feedback module 640 is specifically configured to:
carrying out semantic analysis on the session information to determine corresponding semantic intention;
and acquiring corresponding feedback information from a local database and/or a server 130 according to the semantic intention.
In one embodiment, as shown in fig. 7, the terminal 110 includes:
An invitation module 710, configured to send a networking invitation to a networking object, where the networking object includes a networking terminal 110 and an intelligent device 120, the networking invitation includes a network tag of a target network, and the networking invitation is used to request the networking object to join the target network;
an obtaining module 720, configured to obtain and generate a networking request according to the first identity information of the networking object;
and a sending module 730, configured to send a networking request to the server 130, where the networking request is used to request the server 130 to form the target network.
FIG. 8 illustrates an internal block diagram of a computer device in one embodiment. The computer device may be in particular the server 130130 in fig. 1. As shown in fig. 8, the computer device includes a processor, a memory, a network interface, an input system, and a display screen connected by a system bus. The memory includes a nonvolatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system, and may also store a computer program that, when executed by a processor, causes the processor to implement an instant messaging method. The internal memory may also store a computer program that, when executed by the processor, causes the processor to perform the instant messaging method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, the input system of the computer equipment can be a touch layer covered on the display screen, can be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 8 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the instant messaging system provided herein may be implemented in the form of a computer program that is executable on a computer device such as that shown in fig. 8. The memory of the computer device may store various program modules constituting the instant communication system, such as the first receiving module 510, the networking module 520, the determining module 530, and the first communication module 540 shown in fig. 5. The computer program constituted by the respective program modules causes the processor to execute the steps in the instant messaging method of the respective embodiments of the present application described in the present specification.
The computer device shown in fig. 8 may perform receiving a networking request sent by the target terminal 110 through the first receiving module 510 in the instant communication system shown in fig. 5, where the networking request includes first identity information of a plurality of networking objects, and the networking objects include the networking terminal 110 and the intelligent device 120. The computer device may perform constructing a corresponding communication network according to the first identity information of the plurality of networking objects through the networking module 520. The computer device may determine, by the determining module 530, a corresponding target network according to the login request when the login request of the request object is received, where the request object is the networking terminal 110 or the intelligent device 120, and the target network is the communication network including the request object. The computer device may execute the request object as the networking object of the target network through the first communication module 540, and open a communication authority of the request object in the target network.
In one embodiment, a computer device is provided that includes a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the above embodiments when the computer program is executed.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored which, when executed by a processor, implements a method as described in any of the above embodiments.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program, which may be stored on a non-transitory computer readable storage medium, and which, when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. An instant messaging method, applied to a server, comprising:
receiving a networking request sent by a target terminal, wherein the networking request comprises first identity information of a plurality of networking objects, and the networking objects comprise networking terminals and intelligent equipment;
constructing a corresponding communication network according to the first identity information of the networking objects;
when a login request of a request object is received, determining a corresponding target network according to the login request, wherein the request object is the networking terminal or the intelligent equipment, and the target network is the communication network containing the request object;
taking the request object as the networking object of the target network, and starting the communication authority of the request object in the target network;
when receiving a login request of a request object, determining a corresponding target network according to the login request, including:
when a login request of a request object is received, the communication network corresponding to the first network tag corresponding to a second network tag in a plurality of first network tags is used as the target network, wherein each first network tag corresponds to one communication network, and the login request comprises the second network tag.
2. The method according to claim 1, wherein after the communication network corresponding to the first network tag corresponding to the second network tag among the plurality of first network tags is used as the target network, the method further comprises:
determining a request state of the request object according to the login request, wherein the request state comprises a first request and a non-first request;
when the request state is the first request, carrying out identity verification on the request object according to the login request to obtain a verification result, wherein the verification result comprises verification success and verification failure;
and when the verification result is that the verification is successful, executing the step of taking the request object as the networking object of the target network and starting the communication authority of the request object in the target network.
3. The method according to claim 2, wherein the login request includes second identity information of the request object, and the authenticating the request object according to the login request, to obtain an authentication result, includes:
the verification result is successful when the first identity information matched with the second identity information is found in the first identity information of each networking object in the target network;
And when the first identity information matched with the second identity information is not found in the first identity information of each networking object in the target network, the obtained verification result is verification failure.
4. An instant messaging method, characterized in that it is applied to an intelligent device, said method comprising:
receiving a networking invitation sent by a target terminal, wherein the networking invitation comprises a second network tag of a target network, and the target network is a communication network to be added;
generating a login request according to the second network tag, and sending the login request to a server, wherein the login request is used for requesting to join the target network; when the server receives the login request, the communication network corresponding to the first network tag corresponding to a second network tag in a plurality of first network tags is used as the target network, wherein each first network tag corresponds to one communication network, and the login request comprises the second network tag;
receiving session information in the target network when the server starts the communication right of the intelligent device in the target network according to the login request;
And determining corresponding feedback information according to the session information, and sending the feedback information to the target network.
5. The method of claim 4, wherein said determining the corresponding feedback information from the session information comprises:
carrying out semantic analysis on the session information to determine corresponding semantic intention;
and acquiring the corresponding feedback information from a local database and/or a server according to the semantic intention.
6. An instant messaging method, characterized in that it is applied to a terminal, said method comprising:
sending a networking invitation to a networking object, wherein the networking object comprises a networking terminal and intelligent equipment, the networking invitation comprises a network tag of a target network, and the networking invitation is used for requesting the networking object to join the target network;
generating a networking request according to the first identity information of the networking object;
sending a networking request to a server, wherein the networking request is used for requesting the server to form the target network;
sending a login request to a server, so that when the server receives the login request of a request object, determining a corresponding target network according to the login request, wherein the method comprises the following steps:
When a login request of a request object is received, a communication network corresponding to a first network tag corresponding to a second network tag in a plurality of first network tags is used as the target network, wherein each first network tag corresponds to one communication network, and the login request comprises the second network tag.
7. An instant messaging system, the system comprising:
the terminal is used for sending a networking request to the server and sending a networking invitation to the networking object, wherein the networking invitation comprises a network tag of a target network;
the intelligent equipment is used for sending a login request for joining a target network to the server when receiving a networking invitation sent by the terminal as a networking object, and providing corresponding feedback information according to session information in the target network after joining the target network;
the server is used for generating a corresponding communication network according to a networking request sent by the terminal, responding to the received login request, and determining a corresponding target network according to the login request when the login request of a request object is received, and comprises the following steps:
when a login request of a request object is received, the communication network corresponding to the first network tag corresponding to a second network tag in a plurality of first network tags is used as the target network, wherein each first network tag corresponds to one communication network, and the login request comprises the second network tag.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 6 when the computer program is executed by the processor.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any one of claims 1 to 6.
CN202210608495.0A 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium Active CN115277048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210608495.0A CN115277048B (en) 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210608495.0A CN115277048B (en) 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium

Publications (2)

Publication Number Publication Date
CN115277048A CN115277048A (en) 2022-11-01
CN115277048B true CN115277048B (en) 2023-12-29

Family

ID=83759632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210608495.0A Active CN115277048B (en) 2022-05-31 2022-05-31 Instant messaging method, system, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN115277048B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566223A (en) * 2016-06-30 2018-01-09 北京北信源软件股份有限公司 One kind personalizes smart home managing and control system and method
WO2018127200A1 (en) * 2017-01-09 2018-07-12 云丁网络技术(北京)有限公司 Method for smart device to access network, mobile terminal, cloud server, device, and system
CN110932953A (en) * 2019-12-24 2020-03-27 苏州思必驰信息科技有限公司 Intelligent household control method and device, computer equipment and storage medium
CN112187751A (en) * 2020-09-17 2021-01-05 海尔优家智能科技(北京)有限公司 Network access method and device for equipment, storage medium and electronic device
CN113132333A (en) * 2019-12-31 2021-07-16 佛山市云米电器科技有限公司 Networking login method, household appliance equipment, household appliance system and storage medium
CN113225744A (en) * 2021-05-08 2021-08-06 深圳市欧瑞博科技股份有限公司 Intelligent device ad hoc network method, intelligent networking system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566223A (en) * 2016-06-30 2018-01-09 北京北信源软件股份有限公司 One kind personalizes smart home managing and control system and method
WO2018127200A1 (en) * 2017-01-09 2018-07-12 云丁网络技术(北京)有限公司 Method for smart device to access network, mobile terminal, cloud server, device, and system
CN110932953A (en) * 2019-12-24 2020-03-27 苏州思必驰信息科技有限公司 Intelligent household control method and device, computer equipment and storage medium
CN113132333A (en) * 2019-12-31 2021-07-16 佛山市云米电器科技有限公司 Networking login method, household appliance equipment, household appliance system and storage medium
CN112187751A (en) * 2020-09-17 2021-01-05 海尔优家智能科技(北京)有限公司 Network access method and device for equipment, storage medium and electronic device
CN113225744A (en) * 2021-05-08 2021-08-06 深圳市欧瑞博科技股份有限公司 Intelligent device ad hoc network method, intelligent networking system and storage medium

Also Published As

Publication number Publication date
CN115277048A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
US9882885B2 (en) Systems and methods for login and authorization
US11496452B2 (en) Non-repeatable challenge-response authentication
CN103067378B (en) Log-in control method based on Quick Response Code and system
CN103609090B (en) Identity logs method and apparatus
Ellison Ceremony design and analysis
JP5514200B2 (en) Improved biometric authentication and identification
US9882790B2 (en) Method and apparatus for a recommendation system based on token exchange
US10503888B2 (en) Authentication system
CN102317903B (en) Use social information that user conversation is authenticated
CN110768968A (en) Authorization method, device, equipment and system based on verifiable statement
CN101771532A (en) Method, device and system for realizing resource sharing
CN104836782B (en) Server, client and data access method and system
US11349832B2 (en) Account recovery
CN108809969B (en) Authentication method, system and device
CN111191200B (en) Three-party linkage authentication page display method and device and electronic equipment
Schaffner Analysis and evaluation of blockchain-based self-sovereign identity systems
US20070005602A1 (en) Method, electronic device and computer program product for identifying entities based upon innate knowledge
CN115277048B (en) Instant messaging method, system, computer device and storage medium
CN107833166A (en) Login method, date storage method, learning terminal, server and storage medium
US20090025066A1 (en) Systems and methods for first and second party authentication
Aebischer et al. Pico in the wild: Replacing passwords, one site at a time
JP7317935B2 (en) User profile management method and device
CN115776548A (en) Double recording system
CN115225596A (en) Instant messaging method and device, intelligent household equipment and storage medium
CN113014540B (en) Data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant