CN115550300A - Instant communication system login method, device, equipment and medium - Google Patents
Instant communication system login method, device, equipment and medium Download PDFInfo
- Publication number
- CN115550300A CN115550300A CN202211202273.5A CN202211202273A CN115550300A CN 115550300 A CN115550300 A CN 115550300A CN 202211202273 A CN202211202273 A CN 202211202273A CN 115550300 A CN115550300 A CN 115550300A
- Authority
- CN
- China
- Prior art keywords
- association
- instant messaging
- relation
- login
- ext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 58
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000013507 mapping Methods 0.000 claims abstract description 81
- 230000005540 biological transmission Effects 0.000 claims abstract description 65
- 238000000605 extraction Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 13
- 230000002354 daily effect Effects 0.000 description 44
- 101000972485 Homo sapiens Lupus La protein Proteins 0.000 description 9
- 102100022742 Lupus La protein Human genes 0.000 description 9
- 230000001186 cumulative effect Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000012216 screening Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/043—Real-time or near real-time messaging, e.g. instant messaging [IM] using or handling presence information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a method, a device, equipment and a medium for logging in an instant communication system, wherein the method comprises the following steps: acquiring a current login identifier for logging in the instant messaging system and a login identifier mapping relation of the instant messaging system; the login identification mapping relation comprises an instant communication identification, an instant communication account and a transmission authentication account; determining a registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification; and logging in the instant communication system according to the registration login identification. By the scheme, the instant messaging system with the login error is avoided, poor use feeling is brought to the user, and the accuracy of the instant messaging system logged in by the user is improved. Meanwhile, the richness and diversity of the determined registration login identification are improved, and the accuracy of the determined registration login identification is ensured.
Description
Technical Field
The embodiment of the invention relates to the technical field of internet, in particular to a method, a device, equipment and a medium for logging in an instant messaging system.
Background
With the development of internet technology, instant messaging systems are popular with users in terms of simple, convenient, simple and convenient communication.
In the prior art, the current login identification input by the user is mostly used as a mode for logging in the instant messaging system. Because the current login identification may be changed, when the user inputs the current login identification before being changed into the instant messaging system, a login error occurs, and the use experience of the user is reduced.
Disclosure of Invention
The invention provides a method, a device, equipment and a medium for logging in an instant messaging system, which are used for accurately logging in the instant messaging system and improving the use experience of a user.
According to an aspect of the present invention, there is provided an instant messaging system login method, including:
acquiring a current login identifier for logging in the instant messaging system and a login identifier mapping relation of the instant messaging system; the login identification mapping relation comprises an instant messaging identification, an instant messaging account and a mapping relation between transmission authentication accounts;
determining a registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification;
and logging in the instant communication system according to the registration login identification.
According to another aspect of the present invention, there is provided an instant messaging system login apparatus, including:
the current login identification acquisition module is used for acquiring a current login identification for logging in the instant communication system and a login identification mapping relation of the instant communication system; the login identification mapping relation comprises an instant communication identification, an instant communication account and a transmission authentication account;
the registration login identification determining module is used for determining the registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification;
and the instant communication system login module is used for logging in the instant communication system according to the registration login identification.
According to another aspect of the present invention, there is provided an electronic apparatus including:
one or more processors;
a memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are enabled to execute any one of the instant messaging system login methods provided by the embodiments of the present invention.
According to another aspect of the present invention, a computer-readable storage medium is provided, in which computer instructions are stored, and the computer instructions are used for causing a processor to implement any one of the instant messaging system login methods provided by the embodiments of the present invention when executed.
According to the instant messaging system login scheme provided by the embodiment of the invention, the current login identification for logging in the instant messaging system and the login identification mapping relation of the instant messaging system are obtained; the login identification mapping relation comprises an instant communication identification, an instant communication account and a transmission authentication account; determining a registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification; and logging in the instant communication system according to the registration login identification. According to the scheme, the login identification is determined according to the current login identification by introducing the login identification mapping relation, so that the instant messaging system with the login error is avoided, poor use feeling is brought to the user, and the accuracy of the instant messaging system logged in by the user is improved. Meanwhile, the instant messaging identifier, the instant messaging account and the transmission authentication account are strongly associated by setting a login identifier mapping relation, so that the richness and diversity of the determined login identifier are improved, and the accuracy of the determined login identifier is ensured.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a login method of an instant messaging system according to an embodiment of the present invention;
fig. 2 is a flowchart of a login method of an instant messaging system according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a login device of an instant messaging system according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device for implementing a login method of an instant messaging system according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings, not all of them.
Example one
Fig. 1 is a flowchart of an instant messaging system login method according to an embodiment of the present invention, where the instant messaging system login method is applicable to a case of logging in any instant messaging system, and the method may be executed by an instant messaging system login device, which may be implemented in a software and/or hardware manner and may be integrated in an electronic device bearing an instant messaging system login function, such as any instant messaging system.
Referring to fig. 1, the instant messaging system login method includes:
s110, acquiring a current login identifier for logging in the instant messaging system and a login identifier mapping relation of the instant messaging system; the login identification mapping relationship comprises an instant messaging identification, an instant messaging account and a transmission authentication account.
The instant messaging system is a system capable of sending and receiving services such as internet messages in time. The current login identification refers to identification information of a user logging in any instant messaging system at the current moment. For example, the current login identifier may be one of an instant messaging identifier, an instant messaging account, and a transfer authentication account.
The instant messaging identifier refers to an identity identifier of each instant messaging system aiming at any instant messaging system. Specifically, when any instant messaging system is registered, the instant messaging system is endowed with a unique instant messaging identifier, and the instant messaging identifier has uniqueness and invariance and is invisible to a user. The instant messaging account is account information used by a user when logging in any instant messaging system and is used as identification for identity recognition. For example, the instant messaging account number may be composed of at least one of numbers, letters, symbols, and the like. Specifically, the instant messaging account number can be changed and all users can see the instant messaging account number. The transmission authentication account refers to information used by the user to verify identity, and may be, for example, a mobile phone number of the user.
For example, the login identifier mapping relationship may include a mapping relationship between an instant messaging identifier and a transmission authentication account, a mapping relationship between an instant messaging account and a transmission authentication account, and a mapping relationship between an instant messaging identifier and an instant messaging account.
Specifically, for any instant messaging system, a current login identifier for logging in the instant messaging system and a preset login identifier mapping relationship of the instant messaging system are obtained.
And S120, determining the registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification.
The registered login identification refers to unique and unchangeable identification information of a user for logging in any instant messaging system. Illustratively, the login identifier may be one of an instant messenger identifier, an instant messenger account, and a transfer authentication account. It should be noted that the registration login identifier is unique and unchangeable identifier information determined from the login identifier mapping relationship according to the current login identifier, and therefore, the registration login identifier and the current login identifier may be the same or different.
Specifically, the login identifier mapping relationship includes an instant messaging identifier, a mapping relationship between an instant messaging account and a transmission authentication account, and unique and unchangeable identifier information is found from the login identifier mapping relationship according to the current login identifier and is used as a registration login identifier of the current login identifier.
And S130, logging in the instant communication system according to the registration login identification.
Specifically, the user logs in the instant messaging system according to the determined registration login identification.
According to the instant messaging system login scheme provided by the embodiment of the invention, the current login identification for logging in the instant messaging system and the login identification mapping relation of the instant messaging system are obtained; the login identification mapping relation comprises an instant communication identification, an instant communication account and a transmission authentication account; determining a registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification; and logging in the instant communication system according to the registration login identification. According to the scheme, the login identification is determined according to the current login identification by introducing the login identification mapping relation, so that the instant messaging system with the login error is avoided, poor use feeling is brought to the user, and the accuracy of the instant messaging system logged in by the user is improved. Meanwhile, the instant messaging identifier, the instant messaging account and the transmission authentication account are strongly associated by setting a login identifier mapping relation, so that the richness and diversity of the determined login identifier are improved, and the accuracy of the determined login identifier is ensured.
Example two
Fig. 2 is a flowchart of a login method of an instant messaging system according to a second embodiment of the present invention, where in this embodiment, on the basis of the above embodiment, a mapping relationship between "obtaining a current login identifier for logging in an instant messaging system and a login identifier of the instant messaging system" is further obtained; before the login identification mapping relation comprises an instant communication identification, an instant communication account and a mapping relation between transmission authentication accounts, adding 'acquiring instant communication data generated by an instant communication system'; the instant messaging data comprise first instant messaging data and second instant messaging data; aiming at each first instant messaging data, extracting an instant messaging identifier and a transmission authentication account in the first instant messaging data, and establishing a first association relation between extraction results; aiming at each second instant communication data, extracting the instant communication account number and the transmission authentication account number in the second instant communication data, and establishing a second association relation between the extraction results; and constructing a login identification mapping relation according to the first incidence relations and the second incidence relations so as to perfect a construction mechanism of the login identification mapping relation. In the embodiments of the present invention, reference may be made to the description of the foregoing embodiments, which are not described in detail.
Referring to fig. 2, the instant messaging system login method includes:
s210, acquiring instant messaging data generated by an instant messaging system; the instant messaging data comprise first instant messaging data and second instant messaging data.
The instant messaging data refers to historical data of any user, and the user logs in a certain instant messaging system. Specifically, the instant messaging data may be divided into a first type of instant messaging data and a second type of instant messaging data, where the first type of instant messaging data only includes the first instant messaging data, and the second type of instant messaging data only includes the second instant messaging data. It should be noted that the data included in the first instant messaging data and the second instant messaging data are at least partially different.
Specifically, the instant messaging data of any instant messaging system is acquired.
S220, aiming at each first instant communication data, extracting the instant communication identification and the transmission authentication account number in the first instant communication data, and establishing a first association relation between the extraction results.
The first association relationship refers to an association relationship between the instant messaging identifier and the transmission authentication account.
Specifically, an instant messaging identifier and a transmission authentication account are extracted from each first instant messaging data in the first type of instant messaging data, and a first association relationship between extraction results is established.
And S230, aiming at each second instant messaging data, extracting the instant messaging account and the transmission authentication account in the second instant messaging data, and establishing a second association relationship between the extraction results.
The second association relationship refers to an association relationship between the instant messaging account and the transmission authentication account.
Specifically, the instant messaging account and the transmission authentication account are extracted from each second instant messaging data in the second type of instant messaging data, and a second association relationship between extraction results is established.
S240, according to the first incidence relations and the second incidence relations, a login identification mapping relation is constructed.
In an optional embodiment, a mapping relationship between a first association relationship and a second association relationship where the same transmission authentication account exists may be established, and the mapping relationship may be used as a login identifier mapping relationship.
In another alternative embodiment, the login identification mapping relationship may be constructed by determining a confidence level of the first associative relationship and a confidence level of the second associative relationship.
Specifically, for any first association relationship, determining the confidence of the first association relationship according to the capturing times of the first association relationship and the capturing times of the first family association relationship of the first association relationship; the first family incidence relation of the first incidence relation is each first incidence relation which is the same as the transmission authentication account number of the first incidence relation; for any second incidence relation, determining the confidence of the second incidence relation according to the capturing times of the second incidence relation and the capturing times of the second family incidence relation of the second incidence relation; the second family incidence relation of the second incidence relation is each second incidence relation which is the same as the transmission authentication account number of the second incidence relation; and constructing a login identification mapping relation according to the confidence degrees of the first incidence relations and the second incidence relations.
The capturing times refer to the times of logging in the instant messaging system within the capturing days aiming at the users corresponding to the same association relation in the instant messaging system. The association relationship may be a first association relationship or a second association relationship. The capturing days can be set or adjusted by technicians according to experience or needs, and the embodiment of the invention does not limit the capturing days at all, but only ensures that the capturing days are greater than or equal to the lower limit of the capturing days and less than or equal to the upper limit of the capturing days. The lower limit of the capturing days and the upper limit of the capturing days can be set by technicians according to needs or experience values or set based on the identification change cycle of the instant messaging system.
It should be noted that, when the capturing days are less than the capturing days lower limit (for example, 7 days), the capturing times of the user logging in the instant messaging system in the capturing days are accidental due to too few capturing days; when the capturing days are larger than the capturing days upper limit (for example, 1 year), because the login identification in the instant messaging system has stage variability, partial failure of each login identification larger than the capturing days upper limit exists, the login identification has no referential property, the corresponding instant messaging data can be deleted uniformly, and new instant messaging data can be obtained again.
The confidence of the first association relation refers to a quantitative result of the association degree between the instant messaging identifier and the transmission authentication account. The higher the confidence of the first association relationship is, the higher the accuracy of the association relationship between the instant messaging identifier and the transmission authentication account is; the smaller the confidence of the first association relationship, the lower the accuracy of the association relationship between the instant messaging identifier and the transmission authentication account.
The confidence of the second association relationship refers to a quantitative result of the association degree between the instant messaging account and the transmission authentication account. The higher the confidence of the second association relationship is, the higher the accuracy of the association relationship between the instant messaging account and the transmission authentication account is; the smaller the confidence of the second association relationship, the lower the accuracy of the association relationship between the instant messaging account and the transmission authentication account.
It can be understood that the confidence degrees of the first incidence relation and the second incidence relation are respectively determined by introducing the capturing times, so that the close connection with the actual use condition of the instant messaging system by the user is realized, and the accuracy and the reliability of the confidence degree determination are improved. Meanwhile, confidence is introduced, each first incidence relation and each second incidence relation are quantized, criteria are provided for each first incidence relation and each second incidence relation, and accuracy of the first incidence relation and the second incidence relation is improved.
In the embodiment of the present invention, the capturing times of the first family association relationship and the second family association relationship may be cumulative capturing times within capturing days, or may be daily capturing times within capturing days.
In an alternative embodiment, the confidence levels of the first and second associations may be determined according to the accumulated number of captures of the first and second family associations.
Specifically, the ratio of the capturing frequency of the first association to the accumulated capturing frequency of the first family association of the first association may be used as the confidence of the first association.
TABLE 1 statistical table of first association
For example, refer to the first association relationship statistical table shown in table 1, where the first instant messaging flag includes 3 types, which are the instant messaging flags XX, YY, and ZZ, respectively, and correspondingly, the number of the first association relationships is 3, which are the first association relationship XX-a between the instant messaging flag XX and the transmission authentication account a, the first association relationship YY-a between the instant messaging flag YY and the transmission authentication account a, and the first association relationship ZZ-a between the instant messaging flag ZZ and the transmission authentication account a, respectively. Since the first association relationship XX-A, YY-A and ZZ-A are the first association relationship with the same transmission authentication account number A in Table 1, the first family association relationship of XX-A, YY-A or ZZ-A is (XX-A, YY-A and ZZ-A).
Continuing the previous example, when the capturing days are the same and are all 7 days, the capturing frequency of the first association XX-A is 1, the capturing frequency of the first association YY-A is 3, and the capturing frequency of the first association ZZ-A is 16, then the accumulated capturing frequency of the first family association is 1+3+16=20. Correspondingly, the confidence coefficient of the first association relationship XX-A is the ratio of the capturing frequency 1 of the first association relationship XX-A to the accumulated capturing frequency 20 of the first family association relationship, namely 1/20 × 100% =5%; the confidence of the first association YY-a is the ratio of the capture number 3 of the first association YY-a to the accumulated capture number 20 of the first family association, i.e. 3/20 × 100% =15%; the confidence of the first association ZZ-a is the ratio of the number of captures 16 of the first association ZZ-a to the cumulative number of captures 20 of the first family association, i.e. 16/20 × 100% =80%.
Specifically, the ratio of the capturing frequency of the second association to the accumulated capturing frequency of the second family association of the second association may be used as the confidence of the second association.
TABLE 2 statistical table of second association
Ext> forext> exampleext>,ext> referext> toext> aext> statisticalext> tableext> ofext> secondext> associationext> relationsext> shownext> inext> tableext> 2ext>,ext> whereext> theext> secondext> instantext> messagingext> accountext> includesext> twoext> typesext>,ext> i.e.ext>,ext> anext> instantext> messagingext> accountext> GGext> andext> anext> instantext> messagingext> accountext> HHext>,ext> andext> correspondinglyext>,ext> theext> numberext> ofext> theext> secondext> associationext> relationsext> isext> 2ext>,ext> i.e.ext>,ext> aext> secondext> associationext> relationext> GGext> -ext> aext> betweenext> theext> instantext> messagingext> accountext> GGext> andext> theext> transmissionext> authenticationext> accountext> aext>,ext> andext> aext> secondext> associationext> relationext> HHext> -ext> aext> betweenext> theext> instantext> messagingext> accountext> HHext> andext> theext> transmissionext> authenticationext> accountext> aext>.ext> Ext>ext>ext> sinceext>ext>ext> theext>ext>ext> secondext>ext>ext> correlationext>ext>ext> GGext>ext>ext> -ext>ext>ext> aext>ext>ext> andext>ext>ext> hhext>ext>ext> -ext>ext>ext> aext>ext>ext> areext>ext>ext> theext>ext>ext> secondext>ext>ext> correlationext>ext>ext> havingext>ext>ext> theext>ext>ext> sameext>ext>ext> transmissionext>ext>ext> authenticationext>ext>ext> accountext>ext>ext> aext>ext>ext> inext>ext>ext> tableext>ext>ext> 2ext>ext>ext>,ext>ext>ext> theext>ext>ext> secondext>ext>ext> familyext>ext>ext> correlationext>ext>ext> ofext>ext>ext> GGext>ext>ext> -ext>ext>ext> aext>ext>ext> orext>ext>ext> hhext>ext>ext> -ext>ext>ext> aext>ext>ext> isext>ext>ext> (ext>ext>ext> GGext>ext>ext> -ext>ext>ext> aext>ext>ext> andext>ext>ext> hhext>ext>ext> -ext>ext>ext> aext>ext>ext>)ext>ext>ext>.ext>ext>ext>
Ext> continuingext> theext> previousext> exampleext>,ext> whenext> theext> capturingext> daysext> areext> theext> sameext> andext> allext> areext> 7ext> daysext>,ext> theext> capturingext> frequencyext> ofext> theext> secondext> associationext> GGext> -ext> Aext> isext> 2ext>,ext> andext> theext> capturingext> frequencyext> ofext> theext> firstext> associationext> HHext> -ext> Aext> isext> 10ext>,ext> thenext> theext> cumulativeext> capturingext> frequencyext> ofext> theext> secondext> familyext> associationext> isext> 2ext> +ext> 10ext> =ext> 12ext>.ext> Ext>ext> correspondinglyext>ext>,ext>ext> theext>ext> confidenceext>ext> coefficientext>ext> ofext>ext> theext>ext> secondext>ext> associationext>ext> GGext>ext> -ext>ext> Aext>ext> isext>ext> theext>ext> ratioext>ext> ofext>ext> theext>ext> captureext>ext> frequencyext>ext> 2ext>ext> ofext>ext> theext>ext> secondext>ext> associationext>ext> GGext>ext> -ext>ext> Aext>ext> toext>ext> theext>ext> accumulatedext>ext> captureext>ext> frequencyext>ext> 12ext>ext> ofext>ext> theext>ext> secondext>ext> familyext>ext> associationext>ext>,ext>ext> namelyext>ext> 2ext>ext> /ext>ext> 12ext>ext> ×ext>ext> 100ext>ext>%ext>ext> =ext>ext> 16.67ext>ext>%ext>ext>;ext>ext> The confidence of the second association HH-a is the ratio of the number of captures 10 of the second association HH-a to the cumulative number of captures 12 of the second family association, i.e., 10/12 × 100% =83.33%.
It can be understood that by introducing the accumulated capturing times of the first family association relationship and the second family association relationship, the confidence degrees of the first association relationship and the second association relationship are respectively determined, so that under the condition that different instant messaging identifications corresponding to the same transmission authentication account and/or different instant messaging accounts corresponding to the same transmission authentication account are/is fully considered, the possibility of omission of the instant messaging identifications and/or the instant messaging accounts is avoided, and the accuracy of the confidence degree determination result is improved.
It should be noted that the setting of the initial capture time and the latest capture time in tables 1 and 2 is not essential, and the setting may not be performed in the tables. The benefits of setting the initial capture time and the most recent capture time are: the accuracy of recording the capturing days is improved. The number of columns in table 1 and table 2 is not limited at all, the number of columns in table 1 may be determined according to the number of instant messaging identifiers, and the number of columns in table 2 may be determined according to the number of instant messaging accounts.
In another alternative embodiment, the confidence degrees of the first and second association relationships may be determined according to the average number of times of day captures of the first and second family association relationships.
Specifically, the average daily capture number of the first association relationship may be determined according to the capture days and the capture number of the first association relationship; determining the daily accumulated capturing times of the first family incidence relation according to the capturing days and the capturing times of each first incidence relation in the first family incidence relation of the first incidence relation; and taking the ratio of the daily average capturing times of the first association relation and the daily average accumulated capturing times of the first family association relation as the confidence coefficient of the first association relation. The average daily capturing frequency of the first association relation refers to a ratio of the capturing frequency of the instant messaging identifier to the capturing days in the capturing days for any instant messaging identifier with the first association relation. The average daily accumulated capturing times refers to the sum of average daily capturing times corresponding to each instant messaging identifier with the first association relationship in any day of the capturing days.
TABLE 3 statistical table of first association
For example, refer to a statistical table of the first association relationship shown in table 3, where the first instant messaging identifier includes 3 types, that is, instant messaging identifiers RR, SS, and TT, and correspondingly, the number of the first association relationships is 3, that is, a first association relationship RR-B between the instant messaging identifier RR and the transmission authentication account B, a first association relationship SS-B between the instant messaging identifier SS and the transmission authentication account B, and a first association relationship TT-B between the instant messaging identifier TT and the transmission authentication account B. Since the first association relationships RR-B, SS-B and TT-B are the first association relationships with the same transmission authentication account number B in Table 3, the first family association relationship of RR-B, SS-B or TT-B is (RR-B, SS-B and TT-B).
Continuing the previous example, when the capturing days are different, the capturing days of the first association RR-B are 10 days, the capturing times are 1, and the average capturing times of the first association RR-B are the ratio of the capturing times to the capturing days, namely 1/10; the capturing days of the first association relation SS-B are 15 days, the capturing times are 3, and the daily average capturing times of the first association relation SS-B is the ratio of the capturing times to the capturing days, namely 3/15; the capturing days of the first association TT-B are 8 days, the capturing times are 12, and the daily average capturing times of the first association TT-B is the ratio of the capturing times to the capturing days, namely 12/8. Correspondingly, the daily accumulated capturing times is the sum of the daily capturing times corresponding to the three first correlations, i.e., 1/10+3/15+12/8=9/5.
Continuing the previous example, the confidence coefficient of the first association RR-B is 1/10 of the daily average capture frequency of the first association RR-B, and the ratio of the daily average cumulative capture frequency of the first association RR-B to 9/5 of the daily average cumulative capture frequency of the first association, namely (1/10)/(9/5) × 100% =5.56%; the confidence coefficient of the first association relation SS-B is the ratio of the daily average capturing frequency of the first association relation SS-B to the daily average accumulated capturing frequency of the first association relation SS-B to 9/5, namely (3/15)/(9/5) × 100% =11.11%; the confidence coefficient of the first association relation TT-B is 12/8 of daily average capture times of the first association relation TT-B, and the ratio of the daily average cumulative capture times of the first association relation to 9/5 of the daily average cumulative capture times of the first association relation, namely (12/8)/(9/5) × 100% =83.33%.
Specifically, the average daily capture number of the second association relationship may be determined according to the capture number of days and the capture number of the second association relationship; determining the day-to-day accumulated capturing times of the second family incidence relation according to the capturing days and the capturing times of each second incidence relation in the second family incidence relation of the second incidence relation; and taking the ratio of the daily average capturing times of the second incidence relation and the daily average accumulated capturing times of the second family incidence relation as the confidence coefficient of the second incidence relation. The average daily capturing times of the second association relation refer to a ratio of the capturing times of any instant messaging account with the second association relation to the capturing days in the capturing days. The average daily cumulative capturing times refers to the sum of the average daily capturing times corresponding to each instant messaging account having the second association relationship on any day in the capturing days.
TABLE 4 statistical table of second association
For example, refer to the statistical table of the second association relationship shown in table 4, where the second instant messaging account includes two types, that is, an instant messaging account MM and an instant messaging account NN, and correspondingly, the number of the second association relationships is 2, that is, a second association relationship MM-B between the instant messaging account MM and the transmission authentication account B, and a second association relationship NN-B between the instant messaging account NN and the transmission authentication account B. Since the second association relationship MM-A and NN-A is the second association relationship with the same transmission authentication account B in table 4, the second family association relationship of MM-B or NN-B is (MM-B and NN-B).
Continuing the previous example, when the capturing days are different, the capturing days of the second incidence relation MM-B are 8 days, and the capturing times are 4, the daily average capturing times of the second incidence relation MM-B is the ratio of the capturing times to the capturing days, namely 4/8; the number of acquisition days of the second incidence relation NN-B is 10 days, the number of acquisition times is 12, and the average number of acquisition times per day of the second incidence relation NN-B is the ratio of the number of acquisition times to the number of acquisition days, namely 12/10. Correspondingly, the daily accumulated capturing times is the sum of the daily accumulated capturing times corresponding to the two second association relations, namely 4/8+12/10=17/10.
Continuing the previous example, the confidence of the second association relationship MM-B is the ratio of the daily average capture number of 4/8 of the second association relationship MM-B to the daily cumulative capture number of 17/10 of the second family association relationship, i.e., (4/8)/(17/10) × 100% =29.41%; the confidence coefficient of the second association NN-B is the ratio of the daily average capturing times of the second association NN-B to the daily average accumulated capturing times of the second association NN-B, namely (12/10)/(17/10) × 100% =70.59%, of 17/10.
It can be understood that the confidence degrees of the first incidence relation and the second incidence relation are determined by introducing the daily average capturing times and the daily average accumulated capturing times, so that the problem that the confidence degree cannot be accurately obtained through the capturing times when the capturing days are different is avoided, and the accuracy of the confidence degree determination result is improved.
It should be noted that the initial capture time and the latest capture time may be set in tables 3 and 4. The benefits of setting the initial capture time and the most recent capture time are: the accuracy of recording the capturing days is improved. The number of columns in tables 3 and 4 is not limited at all, the number of columns in table 3 may be determined according to the number of instant messaging identifiers, and the number of columns in table 4 may be determined according to the number of instant messaging accounts.
According to the confidence degrees of the first association relations and the second association relations, a third association relation is constructed, wherein the third association relation can be constructed based on the confidence degrees determined by the capturing times and the accumulated capturing times, or based on the confidence degrees determined by the daily average capturing times and the daily average accumulated capturing times. And the third association relation refers to an association relation between the instant messaging identifier and the instant messaging account.
In the invention, a screening rule can be preset, and aiming at any confidence coefficient, if the confidence coefficient accords with the screening rule, an instant communication identifier or an instant communication account corresponding to the confidence coefficient can be used for constructing a third association relation; and if not, no third association relation is constructed. It should be noted that, in the embodiment of the present invention, the screening rule is not limited at all, and may be set by a technician according to experience.
In a specific implementation manner, the screening rule may be a confidence threshold, the confidence of any one first association relationship is compared with the first confidence threshold, and if the confidence of the first association relationship is greater than or equal to the first confidence threshold, the instant messaging identifier corresponding to the confidence of the first association relationship may be used to construct a third association relationship; and if the confidence of the first association is smaller than the first confidence threshold, the instant messaging identifier corresponding to the confidence of the first association does not construct a third association any more. Similarly, the confidence of any one second association relation is compared with a second confidence threshold, and if the confidence of the second association relation is greater than or equal to the second confidence threshold, the instant messaging account corresponding to the confidence of the second association relation can be used for constructing a third association relation; if not, then not. It should be noted that, in the embodiment of the present invention, the sizes of the first confidence threshold and the second confidence threshold are not limited at all, and may be set by a technician according to experience, or determined repeatedly by a large number of experiments. . In the embodiment of the present invention, the first confidence threshold and the second confidence threshold may be the same or different.
In an alternative embodiment, the third correlation may be recorded by a table as shown in table 5 below.
TABLE 5 third Association mapping Table
Instant messaging sign | Instant messaging account | Transmitting authentication accounts | Confidence level |
As shown in the third association mapping table in table 5, the first row in the table sets an instant messaging identifier, an instant messaging account, a transmission authentication account, and a confidence level. The confidence of the third association relation refers to a quantitative result of the association degree between the instant messaging identifier and the instant messaging account. The higher the confidence of the third association relationship is, the higher the accuracy of the association relationship between the instant messaging identifier and the instant messaging account is; the smaller the confidence of the third association relationship, the lower the accuracy of the association relationship between the instant messaging identifier and the instant messaging account.
It can be understood that the confidence of the third association relationship is determined according to the confidence of the first association relationship and the confidence of the second association relationship, so that the problem of less strong association data between the instant messaging identifier and the instant messaging account is solved, and data support is provided for the association relationship between the instant messaging identifier and the instant messaging account.
For example, referring to table 1 and table 2, when the first confidence threshold and the second confidence threshold are the same and both are 80%, the confidence of the first association greater than or equal to 80% and the confidence of the second association are determined from table 1 and table 2, the mean of the two confidences is obtained and used as the confidence of the third association to be filled in table 5, and the instant messaging identifier corresponding to the confidence of the first association and the instant messaging account corresponding to the confidence of the second association are filled in table 5. After completion of the filling, the results are shown in table 6.
Table 6 third association mapping table
Instant messaging sign | Instant messaging account | Transmitting authentication accounts | Confidence level |
ZZ | HH | A | 81.67% |
Referring to table 6, according to that the first confidence threshold and the second confidence threshold are both 80%, it is determined from table 1 and table 2 that the confidence of the first association greater than or equal to 80% is 80%, and the confidence of the second association is 83.33%, where the 80% corresponds to the instant messaging label ZZ, the 83.33% corresponds to the instant messaging account number HH, and the confidence of the third association between the instant messaging label ZZ and the instant messaging account number HH is (80% + 83.33%)/2 × 100% =81.67%.
Similarly, referring to table 3 and table 4, when the first confidence threshold is 80% and the second confidence threshold is 80%, the confidence of the first association greater than or equal to 80% is determined from table 3, and the confidence of the second association greater than or equal to 80% does not exist in table 4, so that the third association related to the transmission authentication account B is not constructed.
In another specific implementation manner, when the first confidence threshold is 80% and the second confidence threshold is 70%, the confidence of the first association greater than or equal to 80% is determined from table 3, the confidence of the second association greater than or equal to 70% is determined from table 4, an average value of the two confidences is obtained and is used as the confidence of the third association to be filled in table 5, and the instant messaging identifier corresponding to the confidence of the first association and the instant messaging account corresponding to the confidence of the second association are simultaneously filled in table 5. After completion of the filling, the results are shown in Table 7.
TABLE 7 statistics of third relations
Instant messaging sign | Instant messaging account | Transmitting authentication accounts | Confidence level |
TT | NN | B | 76.96% |
Referring to table 7, according to the first confidence threshold of 80%, the confidence of the first association greater than or equal to 80% is determined to be 83.33% from table 3, according to the second confidence threshold of 70%, the confidence of the second association greater than or equal to 70% is determined to be 70.59% from table 4, the instant messenger identifier corresponding to 83.33% is TT, the instant messenger account number corresponding to 70.59% is NN, and the confidence of the third association between the instant messenger identifier TT and the instant messenger account number NN is determined to be (83.33% + 70.59%)/2 × 100% =76.96%.
It should be noted that, when it is determined that at least two third association relationships exist according to the confidence threshold, the at least two third association relationships are sorted from large to small according to the confidence of the third association relationships, and the larger confidence of the third association relationships, the corresponding instant messaging identifier and the corresponding instant messaging account are selected as the actual instant messaging identifier and the corresponding instant messaging account of the user logging in the instant messaging system.
Integrating the confidence table A of the first association relation, the confidence table A of the second association relation and the confidence table A of the third association relation to construct a login identifier mapping relation; or, the confidence table B of the first association relation, the confidence table B of the second association relation and the confidence table B of the third association relation are integrated to construct a login identifier mapping relation.
It should be noted that, the calculation of the three confidences may adopt a background offline calculation, which is not limited in this embodiment of the present invention.
S250, acquiring a current login identifier for logging in the instant messaging system and a login identifier mapping relation of the instant messaging system; the login identification mapping relationship comprises an instant messaging identification, an instant messaging account and a transmission authentication account.
And S260, determining the registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification.
And S270, logging in the instant communication system according to the registration login identification.
According to the instant messaging system login scheme provided by the embodiment of the invention, instant messaging data generated by an instant messaging system is obtained by adding; the instant messaging data comprise first instant messaging data and second instant messaging data; aiming at each first instant messaging data, extracting an instant messaging identifier and a transmission authentication account in the first instant messaging data, and establishing a first association relation between extraction results; aiming at each second instant messaging data, extracting the instant messaging account and the transmission authentication account in the second instant messaging data, and establishing a second association relationship between extraction results; and constructing a login identifier mapping relation according to the first incidence relations and the second incidence relations. According to the scheme, the first incidence relation and the second incidence relation are introduced to construct the login identification mapping relation, the richness of the login identification mapping relation is improved, the condition that the login identification cannot be accurately determined according to the single login identification mapping relation is avoided, and the accuracy of determining the login identification is improved.
In the embodiment of the present invention, the storage manner of the data of the first association, the second association, and the third association is not limited at all, and for example, postgresql database (a distributed database) may be used for storage.
It should be noted that the extraction time may be preset, and when the extraction time is reached, the instant messaging identifier and the transmission authentication account are extracted from the first instant messaging data, and the instant messaging account and the transmission authentication account are extracted from the second instant messaging data. The extraction time in the embodiment of the present invention is not limited at all, and may be set by a technician according to an actual situation, for example, the extraction time may be zero point every day.
EXAMPLE III
Fig. 3 is a schematic structural diagram of an instant messaging system login device according to a third embodiment of the present invention, where the present embodiment is applicable to a case where the user logs in to any instant messaging system, and the method can be executed by the instant messaging system login device, and the device can be implemented in a software and/or hardware manner, and can be integrated into an electronic device bearing an instant messaging system login function, such as any instant messaging system.
As shown in fig. 3, the apparatus includes: a current login identification obtaining module 310, a registration login identification determining module 320 and an instant messaging system login module 330. Wherein,
a current login identifier obtaining module 310, configured to obtain a current login identifier for logging in the instant messaging system and a login identifier mapping relationship of the instant messaging system; the login identification mapping relation comprises an instant communication identification, an instant communication account and a transmission authentication account;
a login identifier determining module 320, configured to determine a login identifier of the current login identifier according to the current login identifier and the mapping relationship between login identifiers;
the instant messaging system login module 330 is configured to log in the instant messaging system according to the login registration identifier.
According to the instant messaging system login scheme provided by the embodiment of the invention, the current login identification for logging in the instant messaging system and the login identification mapping relation of the instant messaging system are obtained through the current login identification obtaining module; the login identification mapping relation comprises an instant communication identification, an instant communication account and a transmission authentication account; determining a registration login identifier of the current login identifier according to the mapping relation between the current login identifier and the login identifier by a registration login identifier determining module; and logging in the instant communication system through the instant communication system login module according to the login registration identifier. According to the scheme, the login identification is determined according to the current login identification by introducing the login identification mapping relation, so that the instant messaging system with the login error is avoided, poor use feeling is brought to the user, and the accuracy of the instant messaging system logged in by the user is improved. Meanwhile, the instant messaging identifier, the instant messaging account and the transmission authentication account are strongly associated by setting a login identifier mapping relation, so that the richness and diversity of the determined login identifier are improved, and the accuracy of the determined login identifier is ensured.
Optionally, in the apparatus, the login identifier mapping relationship is constructed in the following manner:
the instant communication data acquisition module is used for acquiring instant communication data generated by an instant communication system; the instant messaging data comprise first instant messaging data and second instant messaging data;
the first association relation establishing module is used for extracting the instant messaging identification and the transmission authentication account in the first instant messaging data aiming at each first instant messaging data and establishing a first association relation between extraction results;
a second association relationship establishing module, configured to, for each second instant messaging data, extract an instant messaging account and a transmission authentication account in the second instant messaging data, and establish a second association relationship between extraction results;
and the mapping relation construction module is used for constructing the login identification mapping relation according to the first incidence relations and the second incidence relations.
Optionally, the mapping relationship building module includes:
a first confidence degree determining unit, configured to determine, for any first association relationship, a confidence degree of the first association relationship according to the number of times of capturing the first association relationship and the number of times of capturing the first family association relationship of the first association relationship; the first family incidence relation of the first incidence relation is each first incidence relation which is the same as the transmission authentication account number of the first incidence relation;
a second relation degree determining unit, configured to determine, for any second association relation, a confidence degree of the second association relation according to the number of times of capturing the second association relation and the number of times of capturing a second family association relation of the second association relation; the second family incidence relation of the second incidence relation is each second incidence relation which is the same as the transmission authentication account number of the second incidence relation;
and the mapping relation construction unit is used for constructing the login identification mapping relation according to the confidence degrees of the first incidence relations and the confidence degrees of the second incidence relations.
Optionally, the first confidence determining unit is specifically configured to:
and taking the ratio of the capturing times of the first association relation to the accumulated capturing times of the first family association relation of the first association relation as the confidence coefficient of the first association relation.
Optionally, the second confidence determining unit is specifically configured to:
and taking the ratio of the capturing times of the second association relation to the accumulated capturing times of the second family association relation of the second association relation as the confidence coefficient of the second association relation.
Optionally, the first confidence determining unit is specifically configured to:
determining the average daily capture times of the first incidence relation according to the capture days and the capture times of the first incidence relation;
determining the daily accumulated capturing times of the first family incidence relation according to the capturing days and the capturing times of each first incidence relation in the first family incidence relation of the first incidence relation;
and taking the ratio of the daily average capturing times of the first association relation and the daily average accumulated capturing times of the first family association relation as the confidence coefficient of the first association relation.
Optionally, the second confidence determining unit is specifically configured to:
determining the average daily capture times of the second incidence relation according to the capture days and the capture times of the second incidence relation;
determining the day-to-day accumulated capturing times of the second family incidence relation according to the capturing days and the capturing times of each second incidence relation in the second family incidence relation of the second incidence relation;
and taking the ratio of the daily average capturing times of the second incidence relation to the daily average accumulated capturing times of the second family incidence relation as the confidence coefficient of the second incidence relation.
The instant messaging system login device provided by the embodiment of the invention can execute the instant messaging system login method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the instant messaging system login methods.
In the technical scheme of the invention, the related processing such as collection, storage, use, processing, transmission, provision, disclosure and the like of the current login identification, the login identification mapping relation, the instant communication identification, the instant communication account number, the transmission authentication account number, the registration login identification and the like all accord with the regulation of related laws and regulations and do not violate the public order and customs.
Example four
Fig. 4 is a schematic structural diagram of an electronic device for implementing a login method of an instant messaging system according to a fourth embodiment of the present invention. The electronic device 410 is intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 410 includes at least one processor 411, and a memory communicatively connected to the at least one processor 411, such as a Read Only Memory (ROM) 412, a Random Access Memory (RAM) 413, and the like, wherein the memory stores computer programs executable by the at least one processor, and the processor 411 may perform various appropriate actions and processes according to the computer programs stored in the Read Only Memory (ROM) 412 or the computer programs loaded from the storage unit 418 into the Random Access Memory (RAM) 413. In the RAM 413, various programs and data required for the operation of the electronic device 410 can also be stored. The processor 411, the ROM 412, and the RAM 413 are connected to each other through a bus 414. An input/output (I/O) interface 415 is also connected to bus 414.
Various components in the electronic device 410 are connected to the I/O interface 415, including: an input unit 416 such as a keyboard, a mouse, or the like; an output unit 417 such as various types of displays, speakers, and the like; a storage unit 418, such as a magnetic disk, optical disk, or the like; and a communication unit 419 such as a network card, modem, wireless communication transceiver, or the like. The communication unit 419 allows the electronic device 410 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
In some embodiments, the instant messaging system login method may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 418. In some embodiments, part or all of the computer program may be loaded and/or installed onto electronic device 410 via ROM 412 and/or communications unit 419. When loaded into RAM 413 and executed by processor 411, may perform one or more of the steps of the instant messaging system login method described above. Alternatively, in other embodiments, the processor 411 may be configured to perform the instant messaging system login method in any other suitable manner (e.g., by way of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for implementing the methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. An instant messaging system login method, comprising:
acquiring a current login identifier for logging in an instant messaging system and a login identifier mapping relation of the instant messaging system; the login identification mapping relation comprises an instant messaging identification, an instant messaging account and a transmission authentication account;
determining a registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification;
and logging in the instant communication system according to the registration login identification.
2. The method of claim 1, wherein the login identifier mapping relationship is constructed by:
acquiring instant messaging data generated by the instant messaging system; the instant messaging data comprise first instant messaging data and second instant messaging data;
aiming at each first instant messaging data, extracting an instant messaging identifier and a transmission authentication account in the first instant messaging data, and establishing a first association relation between extraction results;
aiming at each second instant messaging data, extracting the instant messaging account and the transmission authentication account in the second instant messaging data, and establishing a second association relationship between extraction results;
and constructing the login identifier mapping relation according to the first incidence relations and the second incidence relations.
3. The method according to claim 2, wherein the constructing the login identifier mapping relationship according to each of the first association relationships and each of the second association relationships comprises:
aiming at any one first incidence relation, determining the confidence of the first incidence relation according to the capturing times of the first incidence relation and the capturing times of the first family incidence relation of the first incidence relation; the first family incidence relation of the first incidence relation is each first incidence relation which is the same as the transmission authentication account number of the first incidence relation;
for any second incidence relation, determining the confidence of the second incidence relation according to the capturing times of the second incidence relation and the capturing times of the second family incidence relation of the second incidence relation; the second family incidence relation of the second incidence relation is each second incidence relation which is the same as the transmission authentication account number of the second incidence relation;
and constructing the login identification mapping relation according to the confidence degrees of the first incidence relations and the second incidence relations.
4. The method of claim 3, wherein determining the confidence level of the first association according to the number of captures of the first association and the number of captures of the first family association of the first association comprises:
and taking the ratio of the capturing times of the first association relation to the accumulated capturing times of the first family association relation of the first association relation as the confidence coefficient of the first association relation.
5. The method of claim 3, wherein determining the confidence level of the second association according to the capturing times of the second association and the capturing times of the second family association of the second association comprises:
and taking the ratio of the capturing times of the second association relation to the accumulated capturing times of the second family association relation of the second association relation as the confidence coefficient of the second association relation.
6. The method of claim 3, wherein determining the confidence level of the first association according to the number of captures of the first association and the number of captures of the first family association of the first association comprises:
determining the average daily capture times of the first incidence relation according to the capture days and the capture times of the first incidence relation;
determining the daily accumulated capturing times of the first family association relationship according to the capturing days and the capturing times of each first association relationship in the first family association relationship of the first association relationship;
and taking the ratio of the daily average capturing times of the first association relation and the daily average accumulated capturing times of the first family association relation as the confidence coefficient of the first association relation.
7. The method of claim 3, wherein determining the confidence level of the second association according to the capturing times of the second association and the capturing times of the second family association of the second association comprises:
determining the average daily capture times of the second incidence relation according to the capture days and the capture times of the second incidence relation;
determining the day-to-day accumulated capturing times of the second family incidence relation according to the capturing days and the capturing times of each second incidence relation in the second family incidence relation of the second incidence relation;
and taking the ratio of the daily average capturing times of the second incidence relation and the daily average accumulated capturing times of the second family incidence relation as the confidence coefficient of the second incidence relation.
8. An instant messaging system login device, comprising:
the system comprises a current login identification acquisition module, a current login identification acquisition module and a current login identification mapping relation acquisition module, wherein the current login identification acquisition module is used for acquiring a current login identification for logging in an instant communication system and the login identification mapping relation of the instant communication system; the login identification mapping relation comprises an instant messaging identification, an instant messaging account and a transmission authentication account;
the registration login identification determining module is used for determining the registration login identification of the current login identification according to the mapping relation between the current login identification and the login identification;
and the instant communication system login module is used for logging in the instant communication system according to the registration login identification.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement an instant messaging system login method as claimed in any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements an instant messaging system login method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211202273.5A CN115550300B (en) | 2022-09-29 | 2022-09-29 | Instant messaging system login method, device, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211202273.5A CN115550300B (en) | 2022-09-29 | 2022-09-29 | Instant messaging system login method, device, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115550300A true CN115550300A (en) | 2022-12-30 |
CN115550300B CN115550300B (en) | 2024-07-09 |
Family
ID=84731604
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211202273.5A Active CN115550300B (en) | 2022-09-29 | 2022-09-29 | Instant messaging system login method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115550300B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1471265A (en) * | 2003-06-13 | 2004-01-28 | ��Ѷ�Ƽ������ڣ�����˾ | Multi-mark logging-in method for instant communication system |
EP2317709A1 (en) * | 2009-10-28 | 2011-05-04 | Research In Motion Limited | Automatic user authentication and identification for mobile instant messaging application |
CN107318104A (en) * | 2017-05-25 | 2017-11-03 | 深圳市牛鼎丰科技有限公司 | Account register method, device, computer equipment and medium |
CN110855548A (en) * | 2019-10-18 | 2020-02-28 | 深圳前海微众银行股份有限公司 | Message pushing method and device |
CN112364322A (en) * | 2020-11-09 | 2021-02-12 | 深圳供电局有限公司 | Safety verification system and method for instant communication tool |
US10972444B1 (en) * | 2017-04-18 | 2021-04-06 | Amazon Technologies, Inc. | Mapping account information |
-
2022
- 2022-09-29 CN CN202211202273.5A patent/CN115550300B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1471265A (en) * | 2003-06-13 | 2004-01-28 | ��Ѷ�Ƽ������ڣ�����˾ | Multi-mark logging-in method for instant communication system |
EP2317709A1 (en) * | 2009-10-28 | 2011-05-04 | Research In Motion Limited | Automatic user authentication and identification for mobile instant messaging application |
US10972444B1 (en) * | 2017-04-18 | 2021-04-06 | Amazon Technologies, Inc. | Mapping account information |
CN107318104A (en) * | 2017-05-25 | 2017-11-03 | 深圳市牛鼎丰科技有限公司 | Account register method, device, computer equipment and medium |
CN110855548A (en) * | 2019-10-18 | 2020-02-28 | 深圳前海微众银行股份有限公司 | Message pushing method and device |
CN112364322A (en) * | 2020-11-09 | 2021-02-12 | 深圳供电局有限公司 | Safety verification system and method for instant communication tool |
Also Published As
Publication number | Publication date |
---|---|
CN115550300B (en) | 2024-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112560468A (en) | Meteorological early warning text processing method, related device and computer program product | |
CN113963197A (en) | Image recognition method and device, electronic equipment and readable storage medium | |
CN113657395A (en) | Text recognition method, and training method and device of visual feature extraction model | |
CN117952108A (en) | Entity identification method, device, electronic equipment and medium | |
CN114444514B (en) | Semantic matching model training method, semantic matching method and related device | |
CN115550300A (en) | Instant communication system login method, device, equipment and medium | |
CN115496916A (en) | Training method of image recognition model, image recognition method and related device | |
CN114490990A (en) | Method, device and equipment for determining text to be marked and storage medium | |
CN116628167B (en) | Response determination method and device, electronic equipment and storage medium | |
CN115331217B (en) | Dining settlement method, device, equipment and medium | |
CN115529271B (en) | Service request distribution method, device, equipment and medium | |
CN116132053A (en) | Identity information verification method, device, equipment, medium and program product | |
CN117272970B (en) | Document generation method, device, equipment and storage medium | |
CN115563964B (en) | Regular short message text generation method and device, electronic equipment and storage medium | |
CN113238765B (en) | Method, device, equipment and storage medium for distributing small program | |
CN113691442B (en) | Friend recommendation method, device, equipment, storage medium and program product | |
CN113342990B (en) | Knowledge graph construction method and device | |
CN117851599A (en) | Method, device, equipment and medium for extracting text of other elements of investment supervision | |
CN118227580A (en) | Log analysis method and device, electronic equipment and storage medium | |
CN117331924A (en) | Data model matching degree checking method, device, equipment and storage medium | |
CN114281988A (en) | Text processing method, text processing device, text processing apparatus, storage medium, and program product | |
CN117609311A (en) | Service degradation method, device, equipment and storage medium | |
CN115757951A (en) | Content recommendation method, device, equipment, computer readable storage medium and product | |
CN116455853A (en) | Instant messaging message content processing method and device, electronic equipment and storage medium | |
CN117453746A (en) | Method, device, equipment and medium for data cycle screening |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |