Disclosure of Invention
An object of the embodiment of the present application is to provide a method for merging data after user login, which can achieve an effect of solving user login when a third party platform system fails through the technical scheme of the embodiment of the present application.
In a first aspect, an embodiment of the present application provides a method for merging data after a user logs in, including determining a global degraded state of a current system when the user enters a third party logging page, where the global degraded state includes a degraded state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined.
In the embodiment, when the system is in the degraded state, the standby login interface can be provided for the user to perform page login, so that waiting time of the user can be reduced, when the degraded state is restored to the normal state, multidimensional data generated after the user logs in the standby login interface can be combined with all multidimensional data generated after the third party logs in the page login, data loss is avoided, the problem of user login when the third party platform system fails can be solved, and meanwhile operation and data continuity of the user can be guaranteed.
In some embodiments, before determining the global degraded state of the current system when the user enters the third party log-in page, further comprising:
a login interface of a third party login page is called regularly;
when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state;
and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
In the embodiment, the login interface of the third party login page can be actively detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for a user according to the global degradation state of the system.
In some embodiments, before determining the global degraded state of the current system when the user enters the third party log-in page, further comprising:
collecting login data of part of user login logs in the system, and removing repeated IP login data;
when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state;
and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
In the embodiment, the log of the user login can be detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state according to the successful number of the user login, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for the user according to the global degradation state of the system.
In some embodiments, the multidimensional data comprises:
at least one of a user logged in device, a logged in region, and a logged in software environment version.
In the above embodiments, the multidimensional data may indicate user-related login data.
In some embodiments, after determining the global degraded state of the current system when the user enters the third party log-in page, further comprising:
when the global degradation state of the current system is determined to be a normal state, determining whether a unique code exists on the client;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
In the embodiment, the multidimensional data generated after the user logs in through the standby login interface can be read, the multidimensional data and all the multidimensional data generated after the user logs in the third party login page are combined, the integrity of the user login data is ensured, and the repeated reading of the next time can be avoided by deleting the unique code.
In some embodiments, when the global degraded state is restored to the normal state, the multi-dimensional data corresponding to the unique code is read, and the multi-dimensional data and all multi-dimensional data generated by the user after the third party login page is logged in are combined, including:
When the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
In the embodiment, when the system is restored to the normal state, the user can log in again through the third party logging-in page, multidimensional data generated after logging in different logging-in pages can be combined, the user can log in the third party logging-in page in time, and meanwhile, the continuity of the data is guaranteed.
In some embodiments, the method further comprises:
when the user fails to log in the third party logging-in page for a preset number of times continuously, switching to the standby logging-in page, and sending an instruction for logging in the standby logging-in page to the client.
In the embodiment, after the user fails to log in the third party logging-in page for multiple times, the user can also directly switch to the standby logging-in page to log in, so that the problem of timely logging in of the user is solved, and the waiting time is reduced.
In a second aspect, an embodiment of the present application provides an apparatus for merging data after user login, including:
The determining module is used for determining the global degradation state of the current system when the user enters the third party login page, wherein the global degradation state comprises a degradation state or a normal state;
the switching module is used for switching to the standby login page when the global degradation state of the current system is determined to be the degradation state, and generating a unique code according to multidimensional data generated after the user logs in the standby login page;
and the data merging module is used for reading the multidimensional data corresponding to the unique code when the global degraded state is restored to the normal state, and merging the multidimensional data with all multidimensional data generated after the user logs in the third party login page.
Optionally, the apparatus further includes:
the monitoring module is used for calling a login interface of the third party login page at regular time before the global degradation state of the current system is determined when the user enters the third party login page;
when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state;
and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the apparatus further includes:
the second monitoring module is used for collecting login data of part of user login logs in the system before the global degradation state of the current system is determined when the user enters the third party login page by the determining module, and removing repeated IP login data;
when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state;
and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the multidimensional data comprises:
at least one of a user logged in device, a logged in region, and a logged in software environment version.
Optionally, the apparatus further includes:
the merging module is used for determining whether the unique code exists at the client after determining the global degradation state of the current system when the user enters the third party login page and determining that the global degradation state of the current system is a normal state;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
Optionally, the data merging module is specifically configured to:
when the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained;
when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
Optionally, the apparatus further includes:
and the second switching module is used for switching to the standby login page and sending an instruction for logging in the standby login page to the client when the user fails to log in the third party login page for a continuous preset number of times.
In a third aspect, embodiments of the present application provide an electronic device comprising a processor and a memory storing computer readable instructions that, when executed by the processor, perform the steps of the method as provided in the first aspect above.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method as provided in the first aspect above.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the embodiments of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. The components of the embodiments of the present application, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
Some of the terms referred to in the embodiments of the present application will be described first to facilitate understanding by those skilled in the art.
Terminal equipment: the mobile terminal, stationary terminal or portable terminal may be, for example, a mobile handset, a site, a unit, a device, a multimedia computer, a multimedia tablet, an internet node, a communicator, a desktop computer, a laptop computer, a notebook computer, a netbook computer, a tablet computer, a personal communications system device, a personal navigation device, a personal digital assistant, an audio/video player, a digital camera/camcorder, a positioning device, a television receiver, a radio broadcast receiver, an electronic book device, a game device, or any combination thereof, including the accessories and peripherals of these devices, or any combination thereof. It is also contemplated that the terminal device can support any type of interface (e.g., wearable device) for the user, etc.
And (3) a server: the cloud server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and can also be a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, basic cloud computing services such as big data and artificial intelligent platforms and the like.
IP: refers to the acronym internetworking protocol, internet Protocol, is a network layer protocol in the TCP/IP architecture. The purpose of IP design is to improve network scalability: firstly, the problem of the Internet is solved, and the interconnection and intercommunication of large-scale heterogeneous networks are realized; and secondly, the coupling relation between the top network application and the bottom network technology is divided, so that the independent development of the top network application and the bottom network technology is facilitated. According to the end-to-end design principle, IP only provides a connectionless, unreliable, best effort packet transmission service for hosts. Token: the term "token" means a token (temporary) in computer authentication, and the term "tag" means a word analysis. Generally used as an invitation and login system.
The method and the device are applied to the scene of user login, and the specific scene is that when a user fails to log in a third party platform, the user can log in timely and the continuity of user data is ensured.
At present, with the popularization of mobile internet, a lot of third party platforms with huge flow are emerging, and when the third party platforms are accessed, user authentication services of the third party platforms are involved so as to acquire login information and user information of users. When the access third party platform generates faults, the server only passively waits until the fault repairing user can continue logging in. The method has great limitation that a user cannot log in a third party platform in time and information is lost after logging in.
For this purpose, when the user enters the third party login page, determining the global degradation state of the current system, wherein the global degradation state comprises a degradation state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined. When the system is in a degraded state, a standby login interface can be provided for a user to perform page login, waiting time of the user can be reduced, when the degraded state is restored to a normal state, multidimensional data generated after the user logs in the standby login interface can be combined with all multidimensional data generated after a third party login page logs in, loss of the data is avoided, the problem of user login when a third party platform system fails can be solved, and meanwhile operation and data continuity of the user are guaranteed.
In the embodiment of the present application, the execution body may be a user logged-in data merging device in the user logged-in data merging system, and in practical application, the user logged-in data merging device may be electronic devices such as a terminal device and a server, which is not limited herein.
The method for merging data after user login according to the embodiment of the present application is described in detail below with reference to fig. 1.
Referring to fig. 1, fig. 1 is a flowchart of a method for merging data after user login according to an embodiment of the present application, where the method for merging data after user login shown in fig. 1 includes:
step 110: when the user enters the third party logging page, the global degradation state of the current system is determined.
The global degraded state comprises a degraded state or a normal state, and the degraded state indicates that the third party logging page fails and the current system is in a fault state. The current system may be a login system used by the user to login to the third party platform and the third party login page may be a page to login to the third party platform.
In some embodiments of the present application, before determining the global degraded state of the current system when the user enters the third party log-in page, the method shown in fig. 1 further includes: a login interface of a third party login page is called regularly; when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state; and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
In the process, the login interface of the third party login page can be actively detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for a user according to the global degradation state of the system.
The login interface may be an interface connected to the third party platform, and the login interface may be called to return a corresponding return value or return a status code. The preset number of times may be set according to the need, for example, three times. The return value may be a specific value, and different values may represent call success or failure, for example, a return value of 1 indicates call success, a return value of 0 indicates login failure, a return value may be some code, letter, or the like, and may also indicate call success or failure. The preset time period may be set according to the need, for example, one minute. The preset value may be set according to the need, for example, 3. The status code indicates whether the corresponding return value can be received, the received return value indicates that the status code is correct, and otherwise, the status code is wrong.
For example, a timing detection task is started, a login interface of a third party is actively called once every minute, a return value of the login interface is obtained, if the call fails or a returned state code is incorrect, a detection failure is recorded, meanwhile, the number of detection failures in three minutes is obtained, and if the number of failures reaches three, the state is adjusted to be in a degraded state. When the system is in a degraded state, if all the last three detections are successful, the degraded state value is changed to normal. The method can automatically detect when the number of the user logins is small, and can avoid excessive influence on the user logins.
The method for monitoring the third party logging page fault according to the embodiment of the present application is described in detail below with reference to fig. 2.
Referring to fig. 2, fig. 2 is a flowchart of a method for monitoring a fault of a third party logging page according to an embodiment of the present application, where the method for monitoring a fault of a third party logging page shown in fig. 2 includes:
and starting the timing monitoring task, actively accessing the third-party interface every minute, judging whether the system is successful or not according to the return value or the dynamic code, adding one for the successful times, judging whether the system is in a degraded state, if the system is in the degraded state, and if the limited time is greater than three for three minutes, setting the degraded state as invalid to wait for next scheduling, otherwise, directly waiting for next scheduling.
And when the failure is judged according to the return value or the dynamic code, the error number is increased by one, whether the system is in a degradation state is judged, when the failure number of the limit time of three minutes is greater than three in the non-degradation state, the degradation state is set to be started and waiting for next scheduling, and otherwise, the next scheduling is directly waited.
In addition, the specific steps and methods shown in fig. 2 can refer to the methods shown in fig. 1, and are not described in detail herein.
In some embodiments of the present application, before determining the global degraded state of the current system when the user enters the third party log-in page, the method shown in fig. 1 further includes: collecting login data of part of user login logs in the system, and removing repeated IP login data; when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state; and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
In the process, the log of the user login can be detected, the global degradation state of the current system is adjusted to be the degradation state or the normal state according to the successful number of the user login, and the timely global degradation state of the switching system is ensured, so that the corresponding login page can be provided for the user according to the global degradation state of the system.
The partial users can be all users in the system or all users. The login data includes the logged-in IP, user basic information, and the like. The preset number may be set according to the need, for example, half the number of users of the part of users.
For example, monitoring user login abnormality, collecting user login log, removing duplication by taking IP as dimension, removing repeated IP login, when the login failure IP number is over 50%, judging that the third party is abnormal, changing the global degradation state value into degradation state, and when the login success IP number is over 50%, changing the system global degradation state into normal state. The method can enable the detection to be quicker and the degradation to be more timely when the users log in more.
In some embodiments of the present application, after determining the global degraded state of the current system when the user enters the third party log-in page, the method shown in fig. 1 further includes: when the global degradation state of the current system is determined to be a normal state, determining whether a unique code exists on the client; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
In the process, the multidimensional data generated after the user logs in through the standby login interface can be read, the multidimensional data and all multidimensional data generated after the user logs in the third party login page are combined, the integrity of the user login data is ensured, and the repeated reading of the next time can be avoided by deleting the unique code.
The unique code represents a unique identifier corresponding to multidimensional data generated by a user after the standby login page logs in.
In some embodiments of the present application, the multi-dimensional data includes: at least one of a user logged in device, a logged in region, and a logged in software environment version.
In the above process, the multidimensional data may indicate login data related to the user.
The multidimensional data may further include login information of the user, such as some basic information about the user, interface data accessed by the user, and the like, and the application is not limited thereto.
Step 120: when the global degradation state of the current system is determined to be the degradation state, switching to the standby login page, and generating a unique code according to multidimensional data generated by a user after logging in the standby login page.
The standby login page may be a standby mobile phone number login page, and guides the user to input a mobile phone number to obtain a verification code to complete login, or may be a verification login through mail or telephone. After successful login, a login Token can be provided for the user, and meanwhile, a unique code is generated according to multidimensional data generated after login and is used as a unique identifier.
Step 130: and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined.
All the multi-dimensional data identify all the historical login data generated by the user after the user logs in the third party login page, wherein the all the historical login data comprise equipment logged in by the user, logged in regions, logged in software environment versions and the like. The system can also detect the global degraded state again after the user succeeds in passing through the standby login page, and send a login instruction of the third party login page of the third party platform again to the user when the global degraded state is restored to the normal state.
In some embodiments of the present application, when the global degraded state is restored to the normal state, the multi-dimensional data corresponding to the unique code is read, and the multi-dimensional data and all multi-dimensional data generated by the user after the third party login page is logged in are combined, including: when the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
In the process, when the system is restored to a normal state, the user can log in again through the third party logging-in page, multidimensional data generated after logging in different logging-in pages can be combined, the user can log in the third party logging-in page in time, and meanwhile, the continuity of the data is guaranteed.
In some embodiments of the present application, the method shown in fig. 1 further includes: when the user fails to log in the third party logging-in page for a preset number of times continuously, switching to the standby logging-in page, and sending an instruction for logging in the standby logging-in page to the client.
In the process, after the user fails to log in the third party logging-in page for multiple times, the user can also directly switch to the standby logging-in page to log in, so that the problem of timely logging in of the user is solved, and the waiting time is reduced.
The preset times can be set according to requirements, for example, three times.
In the process shown in fig. 1, the global degradation state of the current system is determined when the user enters the third party login page, wherein the global degradation state comprises a degradation state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined. When the system is in a degraded state, a standby login interface can be provided for a user to perform page login, waiting time of the user can be reduced, when the degraded state is restored to a normal state, multidimensional data generated after the user logs in the standby login interface can be combined with all multidimensional data generated after a third party login page logs in, loss of the data is avoided, the problem of user login when a third party platform system fails can be solved, and meanwhile operation and data continuity of the user are guaranteed.
The method for merging data after user login is described through fig. 1, and the implementation method for merging data after user login in the embodiment of the present application is described in detail below with reference to fig. 3.
Referring to fig. 3, fig. 3 is a flowchart of an implementation method of data merging after user login according to an embodiment of the present application, where the implementation method of data merging after user login shown in fig. 3 includes:
when a user starts to log in, judging whether the current system is in a degraded state, and when the current system is in the degraded state, skipping to a standby login interface to log in again, generating a TOKEN (instruction) and a degraded unique_id (UNIQUE code) according to multidimensional data after the user logs in the standby login interface, and writing the TOKEN (instruction) and the degraded unique_id into a client, wherein the standby login interface is successful in logging in.
When the current system is not in a degraded state, a third party logging-in page is logged in through a third party logging-in platform, when the fact that a degraded UNIQUE_ID exists at a client is judged, user data corresponding to the UNIQUE_ID (namely, multidimensional data generated after a user logs in a standby logging-in page) are read, data (comprising the multidimensional data generated after the user logs in the standby logging-in page and historical multidimensional data generated after the user logs in the third party logging-in page) are combined, the UNIQUE_ID of the client is clear after the data are combined, TOKEN is generated, and logging in successfully through the third party logging-in page.
When the current system is not in a degraded state, judging that the client does not have a degraded UNIQUE_ID through the third party login platform, generating TOKEN, and logging successfully through the third party login page.
In addition, the specific method and step shown in fig. 3 may refer to the method shown in fig. 1, which is not described in detail herein.
The method of data merging after user login is described in the foregoing through fig. 1, and the apparatus for data merging after user login is described below with reference to fig. 4 to 5.
Referring to fig. 4, a schematic block diagram of anapparatus 400 for merging data after user login according to an embodiment of the present application is provided, where theapparatus 400 may be a module, a program segment, or a code on an electronic device. Theapparatus 400 corresponds to the embodiment of the method of fig. 1 described above, and is capable of performing the steps involved in the embodiment of the method of fig. 1. The specific functions of theapparatus 400 will be described below, and detailed descriptions thereof will be omitted herein as appropriate to avoid redundancy.
Optionally, theapparatus 400 includes:
a determiningmodule 410, configured to determine a global degraded state of the current system when the user enters the third party login page, where the global degraded state includes a degraded state or a normal state;
theswitching module 420 is configured to switch to the backup login page when it is determined that the global degradation state of the current system is a degradation state, and generate a unique code according to multidimensional data generated after the user logs in the backup login page;
And thedata merging module 430 is configured to read the multidimensional data corresponding to the unique code when the global degraded state is restored to the normal state, and merge the multidimensional data with all multidimensional data generated after the user logs in the third party login page.
Optionally, the apparatus further includes:
the monitoring module is used for calling a login interface of the third party login page at regular time before the global degradation state of the current system is determined when the user enters the third party login page; when a return value of successful call is received when the login interface is continuously called for preset times, the global degradation state of the current system is adjusted to be a normal state; and when the sum of the number of times of receiving the return value of the call failure and the number of times of receiving the return state code error when the login interface is called in the preset time period is greater than or equal to a preset value, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the apparatus further includes:
the second monitoring module is used for collecting login data of part of user login logs in the system before the global degradation state of the current system is determined when the user enters the third party login page by the determining module, and removing repeated IP login data; when the number of the IP which is successful in logging in the third party logging in page is larger than or equal to the preset number, the global degradation state of the current system is adjusted to be a normal state; and when the number of the IP failed to log in the third party logging page is smaller than the preset number, adjusting the global degradation state of the current system to be the degradation state.
Optionally, the multidimensional data comprises:
at least one of a user logged in device, a logged in region, and a logged in software environment version.
Optionally, the apparatus further includes:
the merging module is used for determining whether the unique code exists at the client after determining the global degradation state of the current system when the user enters the third party login page and determining that the global degradation state of the current system is a normal state; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined, and the unique code is deleted.
Optionally, the data merging module is specifically configured to:
when the global degraded state is restored to the normal state, an instruction for logging in the third party logging in page again is issued to the client, and all multidimensional data generated after the user logs in the third party logging in page are obtained; when the client is determined to have the unique code, the multidimensional data corresponding to the unique code is read, and all the multidimensional data and the multidimensional data are combined.
Optionally, the apparatus further includes:
and the second switching module is used for switching to the standby login page and sending an instruction for logging in the standby login page to the client when the user fails to log in the third party login page for a continuous preset number of times.
Referring to fig. 5, a schematic structural diagram of an apparatus for merging data after user login according to an embodiment of the present application may include amemory 510 and aprocessor 520. Optionally, the apparatus may further include: acommunication interface 530 and a communication bus 540. The apparatus corresponds to the embodiment of the method of fig. 1 described above, and is capable of performing the steps involved in the embodiment of the method of fig. 1, and specific functions of the apparatus may be found in the following description.
In particular, thememory 510 is used to store computer readable instructions.
Processor 520, for processing the memory-stored readable instructions, is capable of performing the various steps in the method of fig. 1.
Acommunication interface 530 for communicating signaling or data with other node devices. For example: for communication with a server or terminal, or with other device nodes, the embodiments of the application are not limited in this regard.
A communication bus 540 for implementing direct connection communication of the above components.
Thecommunication interface 530 of the device in the embodiment of the present application is used for performing signaling or data communication with other node devices. Thememory 510 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory.Memory 510 may also optionally be at least one storage device located remotely from the aforementioned processor. Thememory 510 has stored therein computer readable instructions which, when executed by theprocessor 520, perform the method process described above in fig. 1.Processor 520 may be used onapparatus 400 and to perform the functions herein. By way of example, theprocessor 520 described above may be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, and the embodiments are not limited in this regard.
Embodiments of the present application also provide a readable storage medium, which when executed by a processor, performs a method process performed by an electronic device in the method embodiment shown in fig. 1.
It will be clear to those skilled in the art that, for convenience and brevity of description, reference may be made to the corresponding procedure in the foregoing method for the specific working procedure of the apparatus described above, and this will not be repeated here.
In summary, the embodiments of the present application provide a method, apparatus, device, and storage medium for merging data after a user logs in, where the method includes determining a global degraded state of a current system when the user enters a third party logging in page, where the global degraded state includes a degraded state or a normal state; when the global degradation state of the current system is determined to be the degradation state, switching to a standby login page, and generating a unique code according to multidimensional data generated after a user logs in the standby login page; and when the global degraded state is restored to the normal state, the multidimensional data corresponding to the unique code is read, and the multidimensional data and all multidimensional data generated by the user after the third party login page is logged in are combined. The method can achieve the effect of solving the login of the user when the third party platform system fails.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other manners as well. The apparatus embodiments described above are merely illustrative, for example, flow diagrams and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present application may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application, and various modifications and variations may be suggested to one skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application. It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.