Movatterモバイル変換


[0]ホーム

URL:


CN116192539A - Method, device, equipment and storage medium for merging data after user login - Google Patents

Method, device, equipment and storage medium for merging data after user login
Download PDF

Info

Publication number
CN116192539A
CN116192539ACN202310474777.0ACN202310474777ACN116192539ACN 116192539 ACN116192539 ACN 116192539ACN 202310474777 ACN202310474777 ACN 202310474777ACN 116192539 ACN116192539 ACN 116192539A
Authority
CN
China
Prior art keywords
user
login
page
state
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310474777.0A
Other languages
Chinese (zh)
Other versions
CN116192539B (en
Inventor
刘俊石
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Easy Yikang Information Technology Co ltd
Original Assignee
Beijing Qingsongchou Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qingsongchou Information Technology Co ltdfiledCriticalBeijing Qingsongchou Information Technology Co ltd
Priority to CN202310474777.0ApriorityCriticalpatent/CN116192539B/en
Publication of CN116192539ApublicationCriticalpatent/CN116192539A/en
Application grantedgrantedCritical
Publication of CN116192539BpublicationCriticalpatent/CN116192539B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The application provides a method, a device, equipment and a storage medium for merging data after user login, wherein the method comprises the steps of determining a global degradation state of a current system when a user enters a third party login page, wherein the global degradation state comprises a degradation state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined. The method can achieve the effect of solving the login of the user when the third party platform system fails.

Description

Method, device, equipment and storage medium for merging data after user login
Technical Field
The present invention relates to the field of user login, and in particular, to a method, an apparatus, a device, and a storage medium for merging data after user login.
Background
At present, with the popularization of mobile internet, a lot of third party platforms with huge flow are emerging, and when the third party platforms are accessed, user authentication services of the third party platforms are involved so as to acquire login information and user information of users. When the access third party platform generates faults, the server only passively waits until the fault repairing user can continue logging in.
The method has great limitation that a user cannot log in a third party platform in time and information is lost after logging in.
Therefore, how to solve the login of the user when the third party platform system fails is a technical problem to be solved.
Disclosure of Invention
An object of the embodiment of the present application is to provide a method for merging data after user login, which can achieve an effect of solving user login when a third party platform system fails through the technical scheme of the embodiment of the present application.
In a first aspect, an embodiment of the present application provides a method for merging data after a user logs in, including determining a global degraded state of a current system when the user enters a third party logging page, where the global degraded state includes a degraded state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined.
In the embodiment, when the system is in the degraded state, the standby login interface can be provided for the user to perform page login, so that waiting time of the user can be reduced, when the degraded state is restored to the normal state, multidimensional data generated after the user logs in the standby login interface can be combined with all multidimensional data generated after the third party logs in the page login, data loss is avoided, the problem of user login when the third party platform system fails can be solved, and meanwhile operation and data continuity of the user can be guaranteed.
In some embodiments, before determining the global degraded state of the current system when the user enters the third party log-in page, further comprising:
a login interface of a third party login page is called regularly;
when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state;
and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
In the embodiment, the login interface of the third party login page can be actively detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for a user according to the global degradation state of the system.
In some embodiments, before determining the global degraded state of the current system when the user enters the third party log-in page, further comprising:
collecting login data of part of user login logs in the system, and removing repeated IP login data;
when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state;
and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
In the embodiment, the log of the user login can be detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state according to the successful number of the user login, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for the user according to the global degradation state of the system.
In some embodiments, the multidimensional data comprises:
at least one of a user logged in device, a logged in region, and a logged in software environment version.
In the above embodiments, the multidimensional data may indicate user-related login data.
In some embodiments, after determining the global degraded state of the current system when the user enters the third party log-in page, further comprising:
when the global degradation state of the current system is determined to be a normal state, determining whether a unique code exists on the client;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
In the embodiment, the multidimensional data generated after the user logs in through the standby login interface can be read, the multidimensional data and all the multidimensional data generated after the user logs in the third party login page are combined, the integrity of the user login data is ensured, and the repeated reading of the next time can be avoided by deleting the unique code.
In some embodiments, when the global degraded state is restored to the normal state, the multi-dimensional data corresponding to the unique code is read, and the multi-dimensional data and all multi-dimensional data generated by the user after the third party login page is logged in are combined, including:
When the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
In the embodiment, when the system is restored to the normal state, the user can log in again through the third party logging-in page, multidimensional data generated after logging in different logging-in pages can be combined, the user can log in the third party logging-in page in time, and meanwhile, the continuity of the data is guaranteed.
In some embodiments, the method further comprises:
when the user fails to log in the third party logging-in page for a preset number of times continuously, switching to the standby logging-in page, and sending an instruction for logging in the standby logging-in page to the client.
In the embodiment, after the user fails to log in the third party logging-in page for multiple times, the user can also directly switch to the standby logging-in page to log in, so that the problem of timely logging in of the user is solved, and the waiting time is reduced.
In a second aspect, an embodiment of the present application provides an apparatus for merging data after user login, including:
The determining module is used for determining the global degradation state of the current system when the user enters the third party login page, wherein the global degradation state comprises a degradation state or a normal state;
the switching module is used for switching to the standby login page when the global degradation state of the current system is determined to be the degradation state, and generating a unique code according to multidimensional data generated after the user logs in the standby login page;
and the data merging module is used for reading the multidimensional data corresponding to the unique code when the global degraded state is restored to the normal state, and merging the multidimensional data with all multidimensional data generated after the user logs in the third party login page.
Optionally, the apparatus further includes:
the monitoring module is used for calling a login interface of the third party login page at regular time before the global degradation state of the current system is determined when the user enters the third party login page;
when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state;
and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the apparatus further includes:
the second monitoring module is used for collecting login data of part of user login logs in the system before the global degradation state of the current system is determined when the user enters the third party login page by the determining module, and removing repeated IP login data;
when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state;
and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the multidimensional data comprises:
at least one of a user logged in device, a logged in region, and a logged in software environment version.
Optionally, the apparatus further includes:
the merging module is used for determining whether the unique code exists at the client after determining the global degradation state of the current system when the user enters the third party login page and determining that the global degradation state of the current system is a normal state;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
Optionally, the data merging module is specifically configured to:
when the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
Optionally, the apparatus further includes:
and the second switching module is used for switching to the standby login page and sending an instruction for logging in the standby login page to the client when the user fails to log in the third party login page for a continuous preset number of times.
In a third aspect, embodiments of the present application provide an electronic device comprising a processor and a memory storing computer readable instructions that, when executed by the processor, perform the steps of the method as provided in the first aspect above.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method as provided in the first aspect above.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the embodiments of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for merging data after user login according to an embodiment of the present application;
FIG. 2 is a flowchart of a method for monitoring a third party logging page fault according to an embodiment of the present application;
FIG. 3 is a flowchart of an implementation method for data merging after user login according to an embodiment of the present application;
FIG. 4 is a schematic block diagram of an apparatus for data merging after user login according to an embodiment of the present application;
Fig. 5 is a schematic structural diagram of a device for merging data after user login according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. The components of the embodiments of the present application, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
Some of the terms referred to in the embodiments of the present application will be described first to facilitate understanding by those skilled in the art.
Terminal equipment: the mobile terminal, stationary terminal or portable terminal may be, for example, a mobile handset, a site, a unit, a device, a multimedia computer, a multimedia tablet, an internet node, a communicator, a desktop computer, a laptop computer, a notebook computer, a netbook computer, a tablet computer, a personal communications system device, a personal navigation device, a personal digital assistant, an audio/video player, a digital camera/camcorder, a positioning device, a television receiver, a radio broadcast receiver, an electronic book device, a game device, or any combination thereof, including the accessories and peripherals of these devices, or any combination thereof. It is also contemplated that the terminal device can support any type of interface (e.g., wearable device) for the user, etc.
And (3) a server: the cloud server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and can also be a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, basic cloud computing services such as big data and artificial intelligent platforms and the like.
IP: refers to the acronym internetworking protocol, internet Protocol, is a network layer protocol in the TCP/IP architecture. The purpose of IP design is to improve network scalability: firstly, the problem of the Internet is solved, and the interconnection and intercommunication of large-scale heterogeneous networks are realized; and secondly, the coupling relation between the top network application and the bottom network technology is divided, so that the independent development of the top network application and the bottom network technology is facilitated. According to the end-to-end design principle, IP only provides a connectionless, unreliable, best effort packet transmission service for hosts. Token: the term "token" means a token (temporary) in computer authentication, and the term "tag" means a word analysis. Generally used as an invitation and login system.
The method and the device are applied to the scene of user login, and the specific scene is that when a user fails to log in a third party platform, the user can log in timely and the continuity of user data is ensured.
At present, with the popularization of mobile internet, a lot of third party platforms with huge flow are emerging, and when the third party platforms are accessed, user authentication services of the third party platforms are involved so as to acquire login information and user information of users. When the access third party platform generates faults, the server only passively waits until the fault repairing user can continue logging in. The method has great limitation that a user cannot log in a third party platform in time and information is lost after logging in.
For this purpose, when the user enters the third party login page, determining the global degradation state of the current system, wherein the global degradation state comprises a degradation state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined. When the system is in a degraded state, a standby login interface can be provided for a user to perform page login, waiting time of the user can be reduced, when the degraded state is restored to a normal state, multidimensional data generated after the user logs in the standby login interface can be combined with all multidimensional data generated after a third party login page logs in, loss of the data is avoided, the problem of user login when a third party platform system fails can be solved, and meanwhile operation and data continuity of the user are guaranteed.
In the embodiment of the present application, the execution body may be a user logged-in data merging device in the user logged-in data merging system, and in practical application, the user logged-in data merging device may be electronic devices such as a terminal device and a server, which is not limited herein.
The method for merging data after user login according to the embodiment of the present application is described in detail below with reference to fig. 1.
Referring to fig. 1, fig. 1 is a flowchart of a method for merging data after user login according to an embodiment of the present application, where the method for merging data after user login shown in fig. 1 includes:
step 110: when the user enters the third party logging page, the global degradation state of the current system is determined.
The global degraded state comprises a degraded state or a normal state, and the degraded state indicates that the third party logging page fails and the current system is in a fault state. The current system may be a login system used by the user to login to the third party platform and the third party login page may be a page to login to the third party platform.
In some embodiments of the present application, before determining the global degraded state of the current system when the user enters the third party log-in page, the method shown in fig. 1 further includes: a login interface of a third party login page is called regularly; when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state; and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
In the process, the login interface of the third party login page can be actively detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for a user according to the global degradation state of the system.
The login interface may be an interface connected to the third party platform, and the login interface may be called to return a corresponding return value or return a status code. The preset number of times may be set according to the need, for example, three times. The return value may be a specific value, and different values may represent call success or failure, for example, a return value of 1 indicates call success, a return value of 0 indicates login failure, a return value may be some code, letter, or the like, and may also indicate call success or failure. The preset time period may be set according to the need, for example, one minute. The preset value may be set according to the need, for example, 3. The status code indicates whether the corresponding return value can be received, the received return value indicates that the status code is correct, and otherwise, the status code is wrong.
For example, a timing detection task is started, a login interface of a third party is actively called once every minute, a return value of the login interface is obtained, if the call fails or a returned state code is incorrect, a detection failure is recorded, meanwhile, the number of detection failures in three minutes is obtained, and if the number of failures reaches three, the state is adjusted to be in a degraded state. When the system is in a degraded state, if all the last three detections are successful, the degraded state value is changed to normal. The method can automatically detect when the number of the user logins is small, and can avoid excessive influence on the user logins.
The method for monitoring the third party logging page fault according to the embodiment of the present application is described in detail below with reference to fig. 2.
Referring to fig. 2, fig. 2 is a flowchart of a method for monitoring a fault of a third party logging page according to an embodiment of the present application, where the method for monitoring a fault of a third party logging page shown in fig. 2 includes:
and starting the timing monitoring task, actively accessing the third-party interface every minute, judging whether the system is successful or not according to the return value or the dynamic code, adding one for the successful times, judging whether the system is in a degraded state, if the system is in the degraded state, and if the limited time is greater than three for three minutes, setting the degraded state as invalid to wait for next scheduling, otherwise, directly waiting for next scheduling.
And when the failure is judged according to the return value or the dynamic code, the error number is increased by one, whether the system is in a degradation state is judged, when the failure number of the limit time of three minutes is greater than three in the non-degradation state, the degradation state is set to be started and waiting for next scheduling, and otherwise, the next scheduling is directly waited.
In addition, the specific steps and methods shown in fig. 2 can refer to the methods shown in fig. 1, and are not described in detail herein.
In some embodiments of the present application, before determining the global degraded state of the current system when the user enters the third party log-in page, the method shown in fig. 1 further includes: collecting login data of part of user login logs in the system, and removing repeated IP login data; when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state; and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
In the process, the log of the user login can be detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state according to the successful number of the user login, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for the user according to the global degradation state of the system.
The partial users can be all users in the system or all users. The login data includes the logged-in IP, user basic information, and the like. The preset number may be set according to the need, for example, half the number of users of the part of users.
For example, monitoring user login abnormality, collecting user login log, removing duplication by taking IP as dimension, removing repeated IP login, when the login failure IP number is over 50%, judging that the third party is abnormal, changing the global degradation state value into degradation state, and when the login success IP number is over 50%, changing the system global degradation state into normal state. The method can enable the detection to be quicker and the degradation to be more timely when the users log in more.
In some embodiments of the present application, after determining the global degraded state of the current system when the user enters the third party log-in page, the method shown in fig. 1 further includes: when the global degradation state of the current system is determined to be a normal state, determining whether a unique code exists on the client; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
In the process, the multidimensional data generated after the user logs in through the standby login interface can be read, the multidimensional data and all multidimensional data generated after the user logs in the third party login page are combined, the integrity of the user login data is ensured, and the repeated reading of the next time can be avoided by deleting the unique code.
The unique code represents a unique identifier corresponding to multidimensional data generated by a user after the standby login page logs in.
In some embodiments of the present application, the multi-dimensional data includes: at least one of a user logged in device, a logged in region, and a logged in software environment version.
In the above process, the multidimensional data may indicate login data related to the user.
The multidimensional data may further include login information of the user, such as some basic information about the user, interface data accessed by the user, and the like, and the application is not limited thereto.
Step 120: when the global degradation state of the current system is determined to be the degradation state, switching to the standby login page, and generating a unique code according to multidimensional data generated by a user after logging in the standby login page.
The standby login page may be a standby mobile phone number login page, and guides the user to input a mobile phone number to obtain a verification code to complete login, or may be a verification login through mail or telephone. After successful login, a login Token can be provided for the user, and meanwhile, a unique code is generated according to multidimensional data generated after login and is used as a unique identifier.
Step 130: and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined.
All the multi-dimensional data identify all the historical login data generated by the user after the user logs in the third party login page, wherein the all the historical login data comprise equipment logged in by the user, logged in regions, logged in software environment versions and the like. The system can also detect the global degraded state again after the user succeeds in passing through the standby login page, and send a login instruction of the third party login page of the third party platform again to the user when the global degraded state is restored to the normal state.
In some embodiments of the present application, when the global degraded state is restored to the normal state, the multi-dimensional data corresponding to the unique code is read, and the multi-dimensional data and all multi-dimensional data generated by the user after the third party login page is logged in are combined, including: when the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
In the process, when the system is restored to a normal state, the user can log in again through the third party logging-in page, multidimensional data generated after logging in different logging-in pages can be combined, the user can log in the third party logging-in page in time, and meanwhile, the continuity of the data is guaranteed.
In some embodiments of the present application, the method shown in fig. 1 further includes: when the user fails to log in the third party logging-in page for a preset number of times continuously, switching to the standby logging-in page, and sending an instruction for logging in the standby logging-in page to the client.
In the process, after the user fails to log in the third party logging-in page for multiple times, the user can also directly switch to the standby logging-in page to log in, so that the problem of timely logging in of the user is solved, and the waiting time is reduced.
The preset times can be set according to requirements, for example, three times.
In the process shown in fig. 1, the global degradation state of the current system is determined when the user enters the third party login page, wherein the global degradation state comprises a degradation state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined. When the system is in a degraded state, a standby login interface can be provided for a user to perform page login, waiting time of the user can be reduced, when the degraded state is restored to a normal state, multidimensional data generated after the user logs in the standby login interface can be combined with all multidimensional data generated after a third party login page logs in, loss of the data is avoided, the problem of user login when a third party platform system fails can be solved, and meanwhile operation and data continuity of the user are guaranteed.
The method for merging data after user login is described through fig. 1, and the implementation method for merging data after user login in the embodiment of the present application is described in detail below with reference to fig. 3.
Referring to fig. 3, fig. 3 is a flowchart of an implementation method of data merging after user login according to an embodiment of the present application, where the implementation method of data merging after user login shown in fig. 3 includes:
when a user starts to log in, judging whether the current system is in a degraded state, and when the current system is in the degraded state, skipping to a standby login interface to log in again, generating a TOKEN (instruction) and a degraded unique_id (UNIQUE code) according to multidimensional data after the user logs in the standby login interface, and writing the TOKEN (instruction) and the degraded unique_id into a client, wherein the standby login interface is successful in logging in.
When the current system is not in a degraded state, a third party logging-in page is logged in through a third party logging-in platform, when the fact that a degraded UNIQUE_ID exists at a client is judged, user data corresponding to the UNIQUE_ID (namely, multidimensional data generated after a user logs in a standby logging-in page) are read, data (comprising the multidimensional data generated after the user logs in the standby logging-in page and historical multidimensional data generated after the user logs in the third party logging-in page) are combined, the UNIQUE_ID of the client is clear after the data are combined, TOKEN is generated, and logging in successfully through the third party logging-in page.
When the current system is not in a degraded state, judging that the client does not have a degraded UNIQUE_ID through the third party login platform, generating TOKEN, and logging successfully through the third party login page.
In addition, the specific method and step shown in fig. 3 may refer to the method shown in fig. 1, which is not described in detail herein.
The method of data merging after user login is described in the foregoing through fig. 1, and the apparatus for data merging after user login is described below with reference to fig. 4 to 5.
Referring to fig. 4, a schematic block diagram of anapparatus 400 for merging data after user login according to an embodiment of the present application is provided, where theapparatus 400 may be a module, a program segment, or a code on an electronic device. Theapparatus 400 corresponds to the embodiment of the method of fig. 1 described above, and is capable of performing the steps involved in the embodiment of the method of fig. 1. The specific functions of theapparatus 400 will be described below, and detailed descriptions thereof will be omitted herein as appropriate to avoid redundancy.
Optionally, theapparatus 400 includes:
a determiningmodule 410, configured to determine a global degraded state of the current system when the user enters the third party login page, where the global degraded state includes a degraded state or a normal state;
theswitching module 420 is configured to switch to the backup login page when it is determined that the global degradation state of the current system is a degradation state, and generate a unique code according to multidimensional data generated after the user logs in the backup login page;
And thedata merging module 430 is configured to read the multidimensional data corresponding to the unique code when the global degraded state is restored to the normal state, and merge the multidimensional data with all multidimensional data generated after the user logs in the third party login page.
Optionally, the apparatus further includes:
the monitoring module is used for calling a login interface of the third party login page at regular time before the global degradation state of the current system is determined when the user enters the third party login page; when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state; and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the apparatus further includes:
the second monitoring module is used for collecting login data of part of user login logs in the system before the global degradation state of the current system is determined when the user enters the third party login page by the determining module, and removing repeated IP login data; when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state; and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the multidimensional data comprises:
at least one of a user logged in device, a logged in region, and a logged in software environment version.
Optionally, the apparatus further includes:
the merging module is used for determining whether the unique code exists at the client after determining the global degradation state of the current system when the user enters the third party login page and determining that the global degradation state of the current system is a normal state; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
Optionally, the data merging module is specifically configured to:
when the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
Optionally, the apparatus further includes:
and the second switching module is used for switching to the standby login page and sending an instruction for logging in the standby login page to the client when the user fails to log in the third party login page for a continuous preset number of times.
Referring to fig. 5, a schematic structural diagram of an apparatus for merging data after user login according to an embodiment of the present application may include amemory 510 and aprocessor 520. Optionally, the apparatus may further include: acommunication interface 530 and a communication bus 540. The apparatus corresponds to the embodiment of the method of fig. 1 described above, and is capable of performing the steps involved in the embodiment of the method of fig. 1, and specific functions of the apparatus may be found in the following description.
In particular, thememory 510 is used to store computer readable instructions.
Processor 520, for processing the memory-stored readable instructions, is capable of performing the various steps in the method of fig. 1.
Acommunication interface 530 for communicating signaling or data with other node devices. For example: for communication with a server or terminal, or with other device nodes, the embodiments of the application are not limited in this regard.
A communication bus 540 for implementing direct connection communication of the above components.
Thecommunication interface 530 of the device in the embodiment of the present application is used for performing signaling or data communication with other node devices. Thememory 510 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory.Memory 510 may also optionally be at least one storage device located remotely from the aforementioned processor. Thememory 510 has stored therein computer readable instructions which, when executed by theprocessor 520, perform the method process described above in fig. 1.Processor 520 may be used onapparatus 400 and to perform the functions herein. By way of example, theprocessor 520 described above may be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, and the embodiments are not limited in this regard.
Embodiments of the present application also provide a readable storage medium, which when executed by a processor, performs a method process performed by an electronic device in the method embodiment shown in fig. 1.
It will be clear to those skilled in the art that, for convenience and brevity of description, reference may be made to the corresponding procedure in the foregoing method for the specific working procedure of the apparatus described above, and this will not be repeated here.
In summary, the embodiments of the present application provide a method, apparatus, device, and storage medium for merging data after a user logs in, where the method includes determining a global degraded state of a current system when the user enters a third party logging in page, where the global degraded state includes a degraded state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined. The method can achieve the effect of solving the login of the user when the third party platform system fails.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other manners as well. The apparatus embodiments described above are merely illustrative, for example, flow diagrams and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present application may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application, and various modifications and variations may be suggested to one skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application. It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

CN202310474777.0A2023-04-282023-04-28Method, device, equipment and storage medium for merging data after user loginActiveCN116192539B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202310474777.0ACN116192539B (en)2023-04-282023-04-28Method, device, equipment and storage medium for merging data after user login

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202310474777.0ACN116192539B (en)2023-04-282023-04-28Method, device, equipment and storage medium for merging data after user login

Publications (2)

Publication NumberPublication Date
CN116192539Atrue CN116192539A (en)2023-05-30
CN116192539B CN116192539B (en)2023-08-08

Family

ID=86452741

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202310474777.0AActiveCN116192539B (en)2023-04-282023-04-28Method, device, equipment and storage medium for merging data after user login

Country Status (1)

CountryLink
CN (1)CN116192539B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070277235A1 (en)*1999-04-222007-11-29Barrett Paul DSystem and method for providing user authentication and identity management
CN104518876A (en)*2013-09-292015-04-15腾讯科技(深圳)有限公司Service login method and device
CN105450666A (en)*2015-12-302016-03-30百度在线网络技术(北京)有限公司Login verification method and device
CN112104612A (en)*2020-08-242020-12-18宁波奥克斯电气股份有限公司Account number merging method and device and server
CN113794678A (en)*2021-07-292021-12-14深圳思为科技有限公司Method and device compatible with multiple login modes and computer storage medium
CN114915439A (en)*2021-10-272022-08-16杭州拼便宜网络科技有限公司E-commerce platform identity verification method and device, electronic equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070277235A1 (en)*1999-04-222007-11-29Barrett Paul DSystem and method for providing user authentication and identity management
CN104518876A (en)*2013-09-292015-04-15腾讯科技(深圳)有限公司Service login method and device
CN105450666A (en)*2015-12-302016-03-30百度在线网络技术(北京)有限公司Login verification method and device
CN112104612A (en)*2020-08-242020-12-18宁波奥克斯电气股份有限公司Account number merging method and device and server
CN113794678A (en)*2021-07-292021-12-14深圳思为科技有限公司Method and device compatible with multiple login modes and computer storage medium
CN114915439A (en)*2021-10-272022-08-16杭州拼便宜网络科技有限公司E-commerce platform identity verification method and device, electronic equipment and storage medium

Also Published As

Publication numberPublication date
CN116192539B (en)2023-08-08

Similar Documents

PublicationPublication DateTitle
US10445197B1 (en)Detecting failover events at secondary nodes
US11126513B2 (en)Disaster recovery service
US8108715B1 (en)Systems and methods for resolving split-brain scenarios in computer clusters
US20050188052A1 (en)Performing threshold based connection status responses
KR101513863B1 (en)Method and system for network element service recovery
CN111046310B (en)Page processing method, device, server and computer readable storage medium
CN110471906B (en)Database switching method, device and equipment
US10778648B2 (en)Systems and methods for regional data storage and data anonymization
CN107666493B (en)Database configuration method and equipment thereof
CN107733662B (en)Group recovery method and device
US20240244414A1 (en)Session binding relationship processing method and apparatus, electronic device, and readable medium
US9858152B2 (en)Collaborative information source recovery
CN107580032B (en)Data processing method, device and equipment
CN110311855B (en)User message processing method and device, electronic equipment and storage medium
CN109165112B (en)Fault recovery method, system and related components of metadata cluster
CN111464534A (en)Session keeping method and device in distributed system
CN114756410A (en) Data recovery method, device and medium for dual-computer hot standby system
CN110768844A (en)Authentication server switching method and device
CN116192539B (en)Method, device, equipment and storage medium for merging data after user login
CN108256311B (en)Authorization authentication method and device and electronic equipment
CN119583655A (en) Routing method, device, equipment and storage medium for service request
CN111078437B (en)Remote calling method and device for verification codes, electronic equipment and readable storage medium
CN117118814A (en)Cloud resource switching method, device, equipment and medium based on multi-cloud management platform
CN114205210B (en)Fault exercise method and device, electronic equipment and storage medium
US11640410B1 (en)Distributed log processing for data replication groups

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
CP01Change in the name or title of a patent holder

Address after:Room 716, floor 7, building 2, No. 28 Andingmen East Street, Dongcheng District, Beijing 100010

Patentee after:Beijing Easy Yikang Information Technology Co.,Ltd.

Address before:Room 716, floor 7, building 2, No. 28 Andingmen East Street, Dongcheng District, Beijing 100010

Patentee before:BEIJING QINGSONGCHOU INFORMATION TECHNOLOGY Co.,Ltd.

CP01Change in the name or title of a patent holder

[8]ページ先頭

©2009-2025 Movatter.jp