CN114116096B - Information processing method, device, equipment and storage medium - Google Patents
Information processing method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN114116096B CN114116096B CN202111342232.1A CN202111342232A CN114116096B CN 114116096 B CN114116096 B CN 114116096B CN 202111342232 A CN202111342232 A CN 202111342232A CN 114116096 B CN114116096 B CN 114116096B
- Authority
- CN
- China
- Prior art keywords
- function
- shortcut key
- information
- user
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 66
- 238000003672 processing method Methods 0.000 title claims abstract description 44
- 238000000034 method Methods 0.000 claims abstract description 61
- 230000006870 function Effects 0.000 claims description 380
- 238000011161 development Methods 0.000 claims description 19
- 238000012545 processing Methods 0.000 claims description 17
- 238000012544 monitoring process Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 5
- 238000007639 printing Methods 0.000 claims description 4
- 238000012512 characterization method Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 description 27
- 230000006399 behavior Effects 0.000 description 11
- 238000013507 mapping Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 9
- 238000013515 script Methods 0.000 description 9
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 239000003795 chemical substances by application Substances 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000009877 rendering Methods 0.000 description 3
- 101000713935 Mus musculus Tudor domain-containing protein 7 Proteins 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 239000012141 concentrate Substances 0.000 description 2
- 125000004122 cyclic group Chemical group 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 230000001502 supplementing effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
- G06F3/0238—Programmable keyboards
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The application discloses an information processing method, an information processing device, information processing equipment and a storage medium, wherein the method comprises the following steps: obtaining a user identification of a first user; obtaining a first information set; determining a first function corresponding to a first input shortcut key based on the first information set; establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key. According to the scheme, the automatic configuration of the shortcut key can be performed based on the collected first information set, so that the configuration efficiency of the shortcut key is improved; the automatic configuration of the shortcut key with the user as the dimension can be realized; and the user experience is improved.
Description
Technical Field
The present application relates to the field of data processing technology, and relates to, but is not limited to, information processing methods, apparatuses, devices, and storage media.
Background
With the rapid development of computer technology, more and more technologies are applied in the financial field, and the traditional financial industry is gradually changed to the financial technology (Fintech), but due to the requirements of safety and real-time performance of the financial industry, higher requirements are also put on the technologies. Computer technology continues to evolve and development teams use integrated development environment (INTEGRATED DEVELOPMENT ENVIRONMENT, IDE) software to build new software, web pages, services, and applications. Only one IDE tool is needed to provide all the required functions for the developer.
The cloud IDE can realize real-time collaboration of developers in different places when writing codes, and simplify the process of testing and deploying codes. The shortcut key configuration of the cloud IDE comprises two schemes, wherein one scheme is that a user manually configures the cloud IDE device according to own use habits; another solution is for the user to directly use the cloud IDE device to default to configured shortcuts. For the first scheme, the manual configuration process is complex and takes a long time; for another approach, the default configured shortcuts may not match the actual usage habits of the user.
Disclosure of Invention
The application provides an information processing method, an information processing device, equipment and a storage medium, wherein the scheme can automatically configure a shortcut key based on a collected first information set, so that the configuration efficiency of the shortcut key is improved; the automatic configuration of the shortcut key with the user as the dimension can be realized; and the user experience is improved.
The technical scheme of the application is realized as follows:
the application provides an information processing method, which comprises the following steps:
Obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user;
Obtaining a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period;
Determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
Establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
The present application provides an information processing apparatus, the apparatus including:
the first obtaining unit is used for obtaining a user identifier of a first user, wherein the user identifier is used for pointing to the first user;
A second obtaining unit configured to obtain a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period;
the determining unit is used for determining a first function corresponding to the first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
The configuration unit is used for establishing an association relation between the first input shortcut key and the first function and binding the association relation with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
The application also provides an electronic device, comprising: the information processing system comprises a memory and a processor, wherein the memory stores a computer program capable of running on the processor, and the processor realizes the information processing method when executing the program.
The present application also provides a storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described information processing method.
The information processing method, device, equipment and storage medium provided by the application comprise the following steps: obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key. The information processing method provided by the application can determine the first function corresponding to the first input shortcut key based on the collected first information set, establish the association relationship between the first function and the first input shortcut key, and bind the association relationship with the first user identifier. In this way, the process of configuring the shortcut key at the first point is automatically completed by the equipment without manual participation, so that the manpower resource and time resource are reduced, and the configuration efficiency of the shortcut key is improved; the second point and the configured shortcut key are configured based on a first information set, and the first information set is acquired based on the use habit of the user, so that the configured shortcut key can meet the use habit of the user; the third point is that the association relation between the first input shortcut key and the first function is bound with the first user identifier, so that the first function is responded under the condition that the first user inputs the first input shortcut key; the first shortcut key is not input by other users; that is, the same input shortcut key can correspond to different functions for different users so as to adapt to habits of different users, and the use experience of the users is improved.
Drawings
FIG. 1 is a schematic diagram of an alternative architecture of an information handling system according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative information handling system according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application
FIG. 4 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 5 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 6 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 7 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 8 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 9 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 10 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 11 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 12 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 13 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 14 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 15 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 16 is a schematic flow chart of an alternative information processing method according to an embodiment of the present application;
FIG. 17 is a schematic diagram showing an alternative configuration of an information processing apparatus according to an embodiment of the present application;
Fig. 18 is a schematic structural diagram of an alternative electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more clear, the specific technical solutions of the application will be described in further detail below with reference to the accompanying drawings in the embodiments of the present application. The following examples are illustrative of the application and are not intended to limit the scope of the application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
In the following description, the term "first\second\third" is merely used for example to distinguish different objects, and does not represent a specific ordering for the objects, and does not have a limitation of precedence order. It is to be understood that the "first-/second-/third-" may interchange specific orders or precedence when allowed to enable embodiments of the application described herein to be implemented in other than those illustrated or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the application only and is not intended to be limiting of the application.
The embodiment of the application can provide an information processing method, an information processing device, information processing equipment and a storage medium. In practical application, the information processing method may be implemented by an information processing apparatus, and each functional entity in the information processing apparatus may be cooperatively implemented by a hardware resource of an electronic device, such as a computing resource of a processor, and a communication resource (for example, for supporting communications in various manners such as implementing an optical cable and a cellular).
The information processing method provided by the embodiment of the application is applied to an information processing system, and the information processing system comprises electronic equipment. The method comprises the steps that the electronic equipment obtains a user identifier of a first user, wherein the user identifier is used for pointing to the first user; obtaining a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
As an example, the structure of information handling system 10 may be as shown in FIG. 1, including: the electronic device 101, the electronic device 101 supports the first service 1011.
The electronic device 101 performs, through the supported first service 1011: obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
Wherein the first service 1011 may be any service. The exemplary first service 1011 may be an IDE service or a browser service.
As another example, the structure of information handling system 10 may be as shown in fig. 2, including: the electronic device 101, the electronic device 101 supports a first service 1011 and a second service 1012.
The electronic equipment obtains a user identifier of a first user under the cooperation of a first service 1011 and a second service, wherein the user identifier is used for pointing to the first user; obtaining a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
Wherein the first service 1011 is different from the second service 1012. In an example, the first service 1011 is an IDE service; the second service 1012 is a browser service.
The electronic device 101 may comprise a mobile terminal device (e.g., a cell phone, tablet, etc.) or a non-mobile terminal device (e.g., a desktop computer, server, etc.).
Embodiments of an information processing method, an apparatus, a device, and a storage medium according to embodiments of the present application are described below with reference to a schematic diagram of an information processing system shown in fig. 1 or fig. 2.
In a first aspect, an embodiment of the present application provides an information processing method, which is applied to an information processing apparatus; the information processing apparatus may be disposed in the electronic device 101 in fig. 1 or fig. 2. Next, an information processing procedure provided by an embodiment of the present application will be described.
Fig. 3 illustrates a flowchart of an alternative information processing method, which may include, but is not limited to, S301 to S304 shown in fig. 3, according to an embodiment of the present application.
S301, the electronic equipment obtains a user identification of a first user.
Wherein the user identification is for pointing to the first user. The embodiment of the application does not limit the specific form of the user identifier, and can be configured according to actual requirements. For example, the user identification may be a numerical number. For another example, the user identification may also be a specific information characterizing the first user.
The embodiment of the application does not limit the implementation manner of obtaining the user identification of the first user, and can be configured according to actual requirements. For example, a user identifier may be generated according to related information of the user device, or different identifiers may be configured for different user devices in advance, and the user device may be notified, and then the electronic device receives the user identifier of the first user sent by the user device.
S302, the electronic equipment obtains a first information set.
The first set of information comprises at least one first subset of information; the first subset of information includes at least one input shortcut key entered by the first user and collected during a collection period and at least one function corresponding to each of the at least one input shortcut key.
The number of the first information subsets included in the first information set is not limited, and the configuration can be carried out according to actual requirements. Wherein the greater the number of first information subsets included in the first information set, the greater the accuracy of the configured shortcut key.
A shortcut key may refer to a key or a combination of keys. For example, the key T may be used as one shortcut key, or a combination of the key Ctrl and the key S may be used as one shortcut key. The input shortcut key refers to the collected shortcut key input by the user.
The functions, by which operations performed by the electronic device may be characterized. For example, one function may correspond to an operation of opening the file 1, or one function may correspond to an operation of saving the file 1.
Example 1, the electronic device obtaining a first set of information includes 5 first subsets of information, first subset of information 1, first subset of information 2, first subset of information 3, first subset of information 4, and first subset of information 5, respectively; the first information set is; the first subset of information 1 comprises in order: k1, A1, A2, A4, A6, A3, K3, A1, A2, A4, K2, A3; the first subset of information 2 comprises in order: k2, A3, A2, A4, K3, A4, K6, A1, A2, A4, K1, A2, A3, A1, K5, A4, K4, A3; the first subset of information 3 comprises in order: k3, A1, A2, A4, A6, K1, A2, A5, A4, A6; the first subset of information comprises in order 4: k1, A1, A2, A5, A6, A3, K3, A1, A2, A4, K2, A3, A6; the first subset of information comprises in order 5: k4, A3, A2, A4, A6, A3, K1, A3, A7, A4, K2, A3. Wherein K is added with different numbers to represent different shortcut keys; a plus a number indicates a different function.
S303, the electronic equipment determines a first function corresponding to the first input shortcut key based on the first information set.
The at least one input shortcut key included in the first set of information comprises a first input shortcut key and the at least one function included in the first set of information comprises a first function.
The electronic equipment calculates the association degree of the first input shortcut key and at least one function in the functions included in the first information set, and determines a first function corresponding to the first input shortcut key based on the association degree of the functions.
The embodiment of the application does not limit the specific method and conditions for determining the first function, and can be configured according to actual requirements.
For example, the first information set includes 3 functions, function 1, function 2 and function 3, and the electronic device determines that the association degree of the first input shortcut key and function 1 is the largest, and determines that function 1 is the first function.
S304, the electronic equipment establishes an association relation between the first input shortcut key and the first function, and binds the association relation with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
The method for establishing the association relationship between the first input shortcut key and the first function is not particularly limited, and the configuration can be carried out according to actual requirements. For example, an association relationship may be established between the identification of the first input shortcut key and the identification of the first function through a form of a table.
The information processing scheme provided by the embodiment of the application comprises the following steps: obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user; obtaining a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period; determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function; establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key. The information processing method provided by the application can determine the first function corresponding to the first input shortcut key based on the collected first information set, establish the association relationship between the first function and the first input shortcut key, and bind the association relationship with the first user identifier. In this way, the process of configuring the shortcut key at the first point is automatically completed by the equipment without manual participation, so that the manpower resource and time resource are reduced, and the configuration efficiency of the shortcut key is improved; the second point and the configured shortcut key are configured based on a first information set, and the first information set is acquired based on the use habit of the user, so that the configured shortcut key can meet the use habit of the user; the third point is that the association relation between the first input shortcut key and the first function is bound with the first user identifier, so that the first function is responded under the condition that the first user inputs the first input shortcut key; the first shortcut key is not input by other users; that is, the same input shortcut key can correspond to different functions for different users so as to adapt to habits of different users, and the use experience of the users is improved.
The information processing method provided by the embodiment of the application further comprises the acquisition process of the first information set. The collection may include, but is not limited to, embodiment 1 or embodiment 2 described below.
In embodiment 1, first information is collected for an application scenario of a service;
embodiment 2, first information is collected for application scenarios of two services.
Embodiment 1 can be implemented as: under the condition that the electronic equipment monitors the input shortcut keys, the input shortcut keys and the functions of the first user input in one acquisition period are acquired and recorded according to time sequence through the service, the acquired input shortcut keys and functions of the first user input in the one acquisition period are called a first information subset, and at least one function between the acquired first input shortcut keys and the second input shortcut keys is used as at least one function corresponding to the first shortcut keys.
It can be appreciated that, in each case of monitoring an input shortcut key, the same processing method as that of the input shortcut key may be adopted to obtain a first information subset; thus, after multiple acquisitions, multiple first subsets of information may be obtained.
The first service is a browser service; in the case where the second service is an integrated development environment IDE service, embodiment 2 may be implemented as: in the case of monitoring a second input shortcut key input by the first user, the following processing is performed for the second input shortcut key: if the second input shortcut key does not belong to the shortcut key supported by the first service, acquiring a first information subset corresponding to the first acquisition period in the first acquisition period through the second service; if the second input shortcut key belongs to the shortcut key supported by the first service, acquiring the second input shortcut key through the first service, and acquiring information in a first acquisition period through the second service; the second input shortcut key collected by the first service and the information collected by the second service form a first information subset corresponding to the first collection period.
Wherein the second input shortcut key is any input shortcut key.
It can be appreciated that the same processing method as the second input shortcut key can be adopted to obtain a group of first information subsets under the condition of monitoring the input shortcut key each time; thus, after multiple acquisitions, multiple first subsets of information may be obtained.
It should be noted that: under the condition that the second input shortcut key is the same as the default shortcut key of the first service, the second service cannot collect the second input shortcut key because the priority of the shortcut key of the first service is higher than that of the shortcut key of the second service, so the first service collects the second input shortcut key, and after the first service collects the second input shortcut key, the second service is informed of collecting information of a user in a first collection period.
Next, a process of determining, by the electronic device, the first function corresponding to the first input shortcut key based on the first information set will be described.
S303 may include, but is not limited to, S3031 to S3034 shown in fig. 4.
S3031, the electronic equipment determines a function set corresponding to the first input shortcut key based on the first information set.
The function set comprises at least one function subset, and one function subset comprises a function corresponding to a first input shortcut key in the first information subset.
The electronic device identifies at least one function corresponding to each input shortcut key for each first subset of information in the first set of information, and then determines a set of functions corresponding to the first input shortcut key.
Based on example 1, example 2 may include: in the case that the first input shortcut key is K1, the function set corresponding to the first input shortcut key may include 5 function subsets, which are a function subset 1, a function subset 2, a function subset 3, and a function subset 5, respectively; function subset 1 includes A1, A2, A4, A6, A3 in turn, function subset 2 includes A2, A3, A1 in turn, function subset 3 includes A2, A5, A4, A6 in turn, function subset 4 includes A1, A2, A5, A6, A3 in turn, function subset 5 includes A3, A7, A4 in turn.
S3032, the electronic equipment determines a linked list corresponding to each function in the function set based on the function subset included in the function set.
The linked list characterizes the location of the presence of a function in the set of functions.
Taking a linked list of the second function as an example, the electronic device determines an appearance position of the second function in each function subset based on the function subsets included in the function set, and takes the appearance position as a linked list corresponding to the second function.
Wherein the position of occurrence of the second function in each subset of functions may be represented by a step size.
Based on example 2, example 3 may include: the linked list corresponding to the function A2 can be expressed as a first step size, a second step size, a third step size and a fourth step size, wherein the first step size represents the position of the function A2 in the function subset 1, the second step size represents the position of the function A2 in the function subset 2, the third step size represents the position of the function A2 in the function subset 3, and the fourth step size represents the position of the function A2 in the function subset 4; and the value of the first step length can be 2, the value of the second step length and the third step length can be 3, and the value of the fourth step length can be 2.
S3033, the electronic equipment calculates the association degree corresponding to each function.
The degree of association corresponding to the function represents the degree of association between the function and the first input shortcut key.
The embodiment of the application does not limit the specific mode of calculating the corresponding association degree of the functions, and can be configured according to actual requirements.
S3034, the electronic device determines that the second function is the first function when the correlation degree difference between the second function and the third function is greater than a correlation degree difference threshold.
The association degree of the second function is larger than that of functions except the second function in the functions included in the function set; the association degree of the third function is smaller than that of the second function and is larger than that of functions other than the second function and the third function among the functions included in the function set.
And traversing the relevance of all the functions included in the function set by the electronic equipment, and determining the second function as the first function if the difference between the relevance of the second function (the function with the largest relevance) and the relevance of the third function (the function with the second largest relevance) is larger than a relevance threshold value.
The embodiment of the application does not limit the specific value of the association degree threshold, and can be configured according to actual requirements. For example, the association threshold may be 0.3.
If the second function satisfying the condition is not available, the first information subset needs to be further collected to determine the second function satisfying the condition as the first function if the number of the first information subsets included in the first information set is not enough.
It can be understood that the electronic device may further determine, as the first function, a function with the greatest association degree, from among functions included in the function set.
Optionally, between executing S3031 and S3032, the information processing method provided by the embodiment of the present application may further include, but is not limited to, S3031A and S3031B shown below.
S3031A, the electronic equipment counts the frequency of each function included in the function set.
The frequency of a function is the ratio of the number of functions in the set of functions to the number of subsets of functions.
Based on 2, example 4 may include: the number of functions A2 in the function set is 4 and the number of the energy subsets is 5, so that the frequency of the function A2 is 0.8, the frequency of the function A3 is 0.8, the frequency of the function A1 is 0.6, the frequency of the function A4 is 0.6, the frequency of the function A6 is 0.6, the frequency of the function A5 is 0.4, and the frequency of the function A7 is 0.2 by adopting the same method.
S3031B, the electronic device deletes the fourth function in the function subset included in the function set.
The frequency of the fourth function is less than the frequency threshold.
The frequency threshold is not particularly limited, and the frequency threshold can be configured according to actual requirements. In one example, the frequency threshold is 0.5.
Based on example 2, example 5 may include: in the case that the frequency threshold is 0.5, the fourth function comprises a function A5 and a function A7, and the deleted function set comprises 5 function subsets, namely a function subset 1, a function subset 2, a function subset 3 and a function subset 5; function subset 1 includes A1, A2, A4, A6, A3 in proper order, function subset 2 includes A2, A3, A1 in proper order, function subset 3 includes A2, A4, A6 in proper order, function subset 4 includes A1, A2, A6, A3 in proper order, function subset 5 includes A3, A4 in proper order.
Thus, after deleting the function smaller than the frequency threshold, the data volume of the function set is reduced, the data volume of subsequent processing is reduced, and the processing complexity and time are reduced; at the same time the accuracy of the first function can also be improved.
Next, the S3033 electronic device calculates, for each of the functions, a degree of association corresponding to the function. Here, the process of calculating the association degree corresponding to each function is similar, and a function will be explained by taking an example, and may include, but not limited to, S30331 to S30333 described below.
S30331, the electronic equipment divides the length of the linked list corresponding to the function by the reference length to obtain the length ratio of the linked list.
The length of the linked list characterizes the number of subsets of functions included in the set of functions.
The embodiment of the application does not limit the value of the reference length, and can be configured according to actual requirements. In one possible implementation, the reference length may be configured as an empirical value; in another possible implementation manner, a linked list length corresponding to one function in the function set may be used as the reference length.
For example, the maximum length of the linked list corresponding to the functions in the function set may be used as the reference length.
Based on example 3, the length of the linked list corresponding to function 2 is 4 and the length of the linked list corresponding to function 2 is 4.
S30332, the electronic equipment divides the weight of the linked list corresponding to the function by the reference weight to obtain a weight ratio.
The weight of the linked list is related to the appearance position of the linked list characterization.
In one possible implementation, the weight of the linked list is the sum of weights corresponding to the plurality of steps. The smaller the value of the step length is, the larger the weight corresponding to the step length is.
The embodiment of the application does not limit the specific value of the reference weight, and can be configured according to actual requirements.
In one possible implementation, the reference weight may be configured as an empirical value; in another possible embodiment, the weight of the reference length corresponding to the minimum step length may be taken as the reference length.
S30333, the electronic equipment multiplies the length ratio of the linked list by the weight ratio to obtain the association degree corresponding to the function.
It will be appreciated that the degree of association of the functional correspondence may also be calculated in other ways. The correlation degree corresponding to the function and the frequency positive correlation of the occurrence of the function are only required to be satisfied, and the correlation degree and the step size negative correlation in the linked list corresponding to the function are only required to be satisfied.
Next, a process of establishing an association relationship between the first input shortcut key and the first function by the S304 electronic device will be described, and may include, but is not limited to, embodiment A1 or embodiment A2 described below.
In the embodiment A1, an association relationship is established for an application scenario of a service;
In embodiment A2, an association relationship is established for application scenarios of two services.
Embodiment A1 may include, but is not limited to, S3041 to S3044 shown in fig. 5.
S3041, the electronic device acquires a first input shortcut key and an embedded shortcut key corresponding to the first function.
A first association exists between the built-in shortcut key and the first function.
It is understood that the electronic device may be connected to the first function by having a shortcut key and a first association relationship built in.
S3042, the electronic device matches the first input shortcut key with the expansion shortcut key in the expansion shortcut key list.
The extended shortcut list may include at least one extended shortcut.
The electronic device performs one-to-one matching on the first input shortcut key and the extended shortcut keys in the extended shortcut key list, judges whether the extended shortcut keys with the same content as the first input shortcut exist, considers that the extended shortcut keys in the extended shortcut key list are hit if the extended shortcut keys exist, correspondingly executes the following S3043, and considers that the extended shortcut keys in the extended shortcut key list pool are not hit if the extended shortcut keys are not found, and executes the following S3044.
S3043, if the expansion shortcut key in the expansion shortcut key list is hit, the electronic device establishes a second association relationship between the hit expansion shortcut key and the built-in shortcut key.
If the extended shortcut key in the extended shortcut key list is hit, the electronic device establishes a second association relationship between the hit extended shortcut key and the built-in shortcut key so that the built-in shortcut key can be connected through the second association relationship and the first input shortcut key.
S3044, if the expansion shortcut key in the expansion shortcut key list pool is not hit, the electronic equipment adds the first input shortcut key in the expansion shortcut key list; and establishing a third association relation between the first input shortcut key and the built-in shortcut key.
If the electronic equipment does not hit the expansion shortcut key in the expansion shortcut key list pool, adding the first input shortcut key into the expansion shortcut key list; establishing a third association relationship between the first input shortcut key and the built-in shortcut key; so that the built-in shortcut key can be connected through the third association relationship and the first input shortcut key.
It should be noted that, if there is no first association relationship between the built-in shortcut and the first function, the electronic device directly establishes a fourth association relationship between the first input shortcut and the first function, so that the electronic device is connected to the first function through the first input shortcut and the fourth association relationship.
The first service is a browser service; in the case where the second service is an integrated development environment IDE service, embodiment A2 may be implemented as: the difference from the embodiment A1 is that the expansion shortcut key in the expansion pool list is configured by the expansion module of the browser, and a corresponding expansion shortcut key is configured for each default shortcut key of the browser; and the browser modifies the trigger event of the built-in shortcut key to trigger the first function in a script mode and sends the trigger event to the IDE service.
Because the priority of the extended shortcut configured by the extended module is higher than the priority of the default shortcut of the browser, the extended module of the browser can monitor the input shortcut and is connected to the corresponding extended shortcut based on the input shortcut under the condition that the input shortcut is the same as the default shortcut of the browser, and is connected to the corresponding built-in shortcut through a second association relationship or a third association relationship between the extended shortcut and the built-in shortcut, and the IDE service triggers a function corresponding to the input shortcut through the received trigger event.
A process of obtaining a user identification of a first user by the electronic device at S301 is described below, and may include, but is not limited to, S3011 and S3012 described below.
S3011, the electronic device acquires device information of at least one dimension of the first user device.
The embodiment of the application does not limit the number of dimensions of the acquired equipment information, and can be configured according to actual requirements. The larger the number of dimensions of the acquired device information is, the higher the accuracy of the determined user identification is; the accuracy of the user identification is used to characterize the accuracy of the identification of the first user by the user identification.
In an example, the electronic device obtaining device information of at least one dimension may include at least one of: basic information of the device (device information of the first dimension), configuration information of the device.
By way of example, the underlying information of the device may include one or more of the following: user Agent (User Agent) information, time zone information, screen size information, resolution information, font information, and plug-in information.
The configuration information of the device may include one or more of the following: graphics processor (graphics processing unit, GPU) feature information, image driver feature information, and graphics card feature information of the device. Wherein the characteristic information is used to characterize the differences between the configuration information of the different devices.
S3012, the electronic device combines the device information of the at least one dimension and then carries out hash calculation to obtain the first user identification.
After the electronic equipment combines the equipment information of at least one dimension, hash operation is carried out on the combined information through a multiplication rotation (murmur) algorithm, and a first user identification is obtained.
Next, a process of acquiring device information of at least one dimension by the S3011 electronic device is explained, and may include, but is not limited to, S30111 to S30113 described below.
S30111, the electronic equipment draws a first image through the first user equipment.
The first image comprises at least one of a two-dimensional image or a three-dimensional image; the first image characterizes the distinguishing configuration information between the devices.
The first image may be a Canvas (Canvas) image or a gradient image, for example.
In one possible implementation, the first image is a hidden image, i.e. the first image is not displayed.
The electronic device automatically draws the first image through configuration information preconfigured by the electronic device based on a pre-written script.
S30112, the electronic device converts the first image into first data.
The first data is binary data representing the first image by printing characters.
The electronic device converts the first image into binary data representing the first image by printing characters as first data.
S30113, the electronic device performs hash operation on the first data to obtain device information in a first dimension.
The equipment information of the first dimension represents the equipment configuration information of the first user; the at least one dimension includes a first dimension.
The electronic device performs hash operation on the first data through murmur algorithm to obtain device information in the first dimension.
In the following, an information processing method provided by the embodiment of the present application will be described by taking a browser service as a first service and a cloud IDE service as a second service as an example.
For ease of understanding, some technical terms are briefly explained.
Integrated development environment (INTEGRATED DEVELOPMENT ENVIRONMENT, IDE): is a software platform that can be used to eliminate various problems in a managed development environment. Among other things, IDEs provide programmers and developers with tools for software development in an "integrated system". They are intended for use with specific application platforms to overcome the barriers to the development lifecycle of software.
Cloud IDE: an integrated development cloud platform based on the World Wide Web (Web) is typically composed of code editors, compilers, command lines, debuggers and application program interfaces (Application Programming Interface, APIs) or graphical user interface (GRAPHICAL USER INTERFACE, GUI) constructors.
Shortcut key: also known as a quick key or hot key, refers to an operation performed by replacing the mouse with some specific key, sequence of keys, or combination of keys.
Hash (Hash): an arbitrary length input is changed by a hashing algorithm into a fixed length output, which is the hash value.
A User Agent (UA), which is a special string header, can enable a server to identify the operating system and version, the type of central processing unit (central processing unit, CPU), the browser and version, etc. used by a client.
Canvas: refers to a dynamically drawn tag in hypertext (Hyper Text Markup Language, HTML) 5. Wherein advanced pictures can be generated or processed using Canvas.
Cyclic redundancy check (Cyclic Redundancy Check, CRC) codes: is a common check code with the capability of error detection and correction.
Network (Web) graphics library (Web Graphics Library, web GL): a three-dimensional (3D) drawing standard for rendering 3D images on web pages.
Murmur hash 3: a non-cryptographic hash function is suitable for general hash lookups. A 32-bit or 128-bit hash value may be generated.
Base64 coding: a method of representing binary data based on 64 printable characters.
Google browser (chrome) extension: the system can be used for customizing small software modules, including functions of user interface modification, advertisement interception, data (cookie) management stored on a local terminal of a user and the like.
Chrome shortcut: refers to the default shortcut in the chrome browser.
Expansion shortcut key: the chrome browser is referred to as extending custom shortcuts. Wherein, the corresponding expansion shortcut key can be matched according to the using habit of the user.
User shortcut keys: the shortcut key set by the user according to the daily use habit can also be called as a key combination.
A shortcut function (Mouse Trap) library: and a java Script library for monitoring and processing the keyboard shortcut.
Development teams typically use IDE software to build new software, web pages, services, and applications. Only one IDE tool is needed to provide the developer with the required functionality and no separate integration is required as they work across platforms. Therefore, the method can be used for encoding the java Script, my Sql, python and other programming languages to a specific platform. Among them, it is common for text editors to create websites from scratch, and with the rapid development of technologies such as mirroring and containers, many software is hosted in the cloud, and IDE is no exception, and more cloud IDE applications are generated. Cloud IDE is a Web-based integrated development cloud platform, typically consisting of a code editor, compiler, command line, debugger, and API or GUI builder.
Cloud IDE has many advantages, including no need for downloading and installation, simplifying real-time collaboration between developers writing code in different locations, making it easier to test and deploy code, which are well suited for developers who want to try new languages, frameworks or tools without having to be installed locally.
In order to improve the use experience of developers, most cloud IDE systems now provide default shortcuts and custom shortcuts. When the user uses the key for the first time, the user needs to configure the shortcut key conforming to the habit of the user. Some cloud IDE systems used for just-in-time coding have no custom function, and users can only use their default shortcuts. In addition, due to the limitation of default shortcut keys of the browser, default shortcut keys of partial functions of the cloud IDE system may conflict with the native IDE system.
In the related technology, on one hand, for some cloud IDE systems with instant coding, in order to provide the function of coding and checking results anytime and anywhere, a login authentication module is abandoned, the same system configuration is provided for all developers, and the system default shortcut key is not supported. Thus, since the usage habits of each developer are different, some users must change the development habits to adapt to the cloud IDE system.
On the other hand, although the user-defined shortcut key module is added to other cloud IDE systems, a great amount of time is still required to configure the shortcut key conforming to the habit of the user in order to improve the development efficiency after the user logs in the system for the first time, so that the time for configuring the shortcut key is also longer.
In yet another aspect, since the cloud IDE system is essentially a web system, some rules of the browser are adapted to the use of the shortcut keys, when the shortcut keys of the IDE system collide with default shortcut keys of the browser, the default behavior of the browser is preferentially responded, and further the shortcut keys of the cloud IDE system will not respond. If some of the critical shortcuts conflict, unrecoverable negative effects may result. The native IDE application may listen for freely combined shortcuts in response to user behavior. The default shortcut keys of the existing cloud IDE actively avoid the default shortcut keys of the browser, and the developer also avoids the conflicting shortcut keys when going to the custom shortcut key. Thus, there is a need for a forced change in usage habits for those developers that switch from native to cloud IDE.
In short, some instant coding IDE systems have no login authentication module, do not provide a shortcut key custom function, and a developer can only use a default shortcut key of the system to force a user to change the use habit. Some IDEs have login authentication modules, which, although providing custom shortcut functions, take a lot of time to configure a shortcut that conforms to their own habits when switching from a native IDE to a cloud IDE system. In addition, when the user-defined shortcut key is configured, because the default shortcut key of the browser exists, active avoidance is needed, conflict is prevented, and the user is forced to change the use habit from a certain angle, so that the development efficiency is reduced.
The IDE system provided by the embodiment of the application has the following characteristics:
1. and the shortcut key is configured without consuming more time and energy, so that the automatic configuration of the shortcut key of the user is realized.
2. And login is not needed, and the user shortcut key differentiated configuration is realized according to the use habits of different users.
3. The user is supported to use the shortcut key conforming to the self use habit, the limitation of the default shortcut key of the browser is not needed to be considered, and the user enjoys the same shortcut key use experience as the original IDE.
The differential shortcut key automatic configuration scheme provided by the embodiment of the application can be used for automatic configuration, namely, a user does not need to spend a great deal of time to configure the shortcut key when using the cloud IDE, and the system can actively complete the configuration work; and the configured differentiated shortcut keys can meet the use habit of different users instead of a set of unified default shortcut keys, so that the users can concentrate on the coding work of the users more, and the efficiency is improved. According to the scheme, different users are identified based on the browser multidimensional attribute, then unique shortcut key behavior information of the users is collected, and meanwhile, statistical analysis is carried out on the collected information to obtain the usage habit of the shortcut keys of the users, so that automatic configuration of the shortcut keys is completed.
The specific flow may include, but is not limited to, the following steps:
1. And automatically identifying the accessed user based on the browser information through the cloud IDE service, and generating a unique identifier of the user.
For cloud IDEs without login authentication module, if it is desired to provide differentiated shortcut configurations for different users, it is first necessary to identify the different users. User information is collected first, and a unique identifier (user Id) of the user is generated according to the collected user information, so that different users are distinguished, and user differentiated configuration information is stored.
The user information may include browser base information (corresponding to device base information), canvas information (corresponding to device configuration information), and Web GL information (corresponding to device configuration information), among others.
Firstly, a cloud IDE system collects basic information of a browser; the browser basic information comprises User Agent, time zone, screen size, resolution, fonts, plug-ins and the like.
Second, the cloud IDE system collects canvas information.
Because graphics processors (graphics processing unit, GPUs), graphics drivers, and graphics cards on different user devices differ, the rendering parameters, antialiasing, etc. algorithms used by the system graphics card when drawing canvas graphics are different, and therefore the CRC check codes drawn into the pictures are also different. Based on this principle, canvas information of the user equipment is collected as part of the user information.
Specifically, as shown in fig. 6, a hidden Canvas image (corresponding to the first graphic) is drawn through a script, and after the image is drawn, the base64 data information is acquired (dataurl). This string is then murmur digest computed on dataurl to yield a 32-bit result, denoted canvas information (also referred to as canvas ID), which is used as part of the generation of the user identification (user ID).
Web GL information is very similar to Canvas information in that they both use a browser to render text and images off-screen that can be used to distinguish users based on their graphics driver and device hardware. Based on this principle, web GL information of the browser is collected.
Specifically, as shown in fig. 7, a shader is created first, a hidden gradient image is drawn by the shader created by using the Web GL drawing technology, then the gradient image is converted into a base64 character string, then the character string is integrated, some other basic information of Web GL rendering including a Web GL version, a shader language version, a vendor and supportable extensions are enumerated, these additional information are added to the base64 character string, and murmur digest calculation is performed on the integrated character string, so that a 32-bit result is obtained and recorded as Web GL information (which may also be referred to as Web GL ID), and the Web GL information is used as a part for generating a user ID.
As shown in fig. 8, the browser basic information (for example, may include a user agent, a time zone, a screen size, a resolution, a font, and a plug-in), canvas information, and Web GL information are taken as data source signals, and the overall abstract calculation is performed again murmur, so that a 32-bit hash value is finally generated and is taken as a unique identifier of the user.
2. And collecting user shortcut keys.
Because collecting the data of the shortcut key of the user is an important precondition for making the shortcut key configuration conforming to the habit of the user for different users, different users are identified, and differentiated shortcut key configuration is carried out for different users.
The main thought comprises the following steps: when a shortcut key is triggered to invoke a function of the cloud IDE, a mouse action is typically used to invoke a system function if the system does not respond or responds to other functions. Therefore, the input key combination is monitored, and after the key combination is monitored, the operation (mouse click, scroll or drag, etc.) of the next acquisition period and other shortcuts input in the acquisition period (the operation and the shortcuts are equivalent to the first information subset together) are acquired and recorded. Other shortcut keys for recording the acquisition period mainly prevent interference to analysis of user behaviors in the follow-up process. For example, when there is a trigger of other key combinations in the acquisition period, the acquisition operation is not initiated again, so as to prevent the repetition of the sample.
Specifically, the acquisition process may include:
Firstly, a Mouse Trap library in IDE service is adopted to monitor common key combinations, and meanwhile, monitoring buried points are added (the monitoring buried points can be recorded as Ki, i represents different key combinations), the key combinations are bound to corresponding functional modules, shortcut keys bound with the functional modules are called built-in shortcut keys, specific configuration refers to other cloud IDE settings which are mature in the industry, and trigger event buried points are added at the function of each binding built-in shortcut key (the event buried points can be recorded as Aj, j represents different functions).
Because of the existence of default shortcuts in the browser, the user cannot use the shortcuts as desired in the native IDE, which has a limitation: when a certain key combination input by a user is exactly matched with a certain default shortcut key of the browser, the function corresponding to the key combination in the browser is preferentially responded, and the function of the shortcut key as a built-in shortcut key in the cloud IDE system is ignored. Built-in shortcuts in the part cloud IDE system avoid default shortcuts of the browser. It is well known that chrome browser extensions can be provided with shortcuts, referred to as extended shortcuts, which can be used to overlay user input key combinations. When a user browses a webpage, the key combination is intercepted by an expansion system when being matched with a certain expansion shortcut key, and the collection flow of the user shortcut key is skillfully designed based on the characteristic.
When monitoring and counting the user key combinations, according to whether the input shortcut key is overlapped with the default shortcut key of the browser, two conditions are divided: the first is that the user input shortcut key is not overlapped with the default shortcut key of the browser, the cloud IDE service monitors the key-press behavior of the user, and the operation of the next acquisition period is recorded; the second is that the user input shortcut key overlaps with the default browser shortcut key, and the cloud IDE service cannot monitor the key combination, because the default browser shortcut key has higher priority, and the cloud IDE cannot collect the next actions of the user. In this way, the operation of collecting the next collection period can be assisted by an auto-configurator in the browser. Wherein the auto-configurator is implemented based on an extension module of the browser service (e.g. a chrome browser). Specifically, an extended shortcut key list pool is configured in advance in an automatic configurator of the browser service to correspond to default shortcut keys of the browser one by one, when a user uses a cloud IDE, an input key combination is matched to a certain extended shortcut key, the extended shortcut key is intercepted by the automatic configurator, the automatic configurator informs the cloud IDE service to capture the shortcut key input by the user, and the IDE service is instructed to collect the operation of the next collection period.
Whether the cloud IDE service actively collects or the browser automatically configurates to assist in collection, a series of record codes starting with the monitored key combination are finally obtained, for example: [ K2A1A3A4, K1A1A2A3K2A 2] (representing shortcuts collected during one acquisition cycle).
3. Rules between key combinations and IDE service functions are analyzed by the browser service.
The system function most relevant to the currently input key combination (corresponding to the first key combination), i.e., the target system function (corresponding to the first function, which may also be referred to as the target function), is determined in the acquired information by the behavior analyzer. Specifically, but not limited to, the following 4 points:
first point, cutting and sorting of data.
Each record collected as mentioned above may be represented by an array, e.g., [ K1, A2, A4, A6, A3, K3, A2, A4, K2. ]. Dividing the array into a plurality of sections according to the key combination as nodes, wherein each section comprises one key combination and a plurality of system functions, carrying out the same processing on other records to obtain a plurality of groups of data, classifying according to the key combination, and finally obtaining a data set list of each key combination.
As shown in fig. 9, the collected data may include record 1 (corresponding to the first information subset 1), record 2 (corresponding to the first information subset 2), record 3 (corresponding to the first information subset 3), record 4 (corresponding to the first information subset 4), and record 5 (corresponding to the first information subset 5). Wherein record 1 comprises K1, A2, A4, A6, A3, K3, A1, A2, A4, K2, A3; record 2 includes K2, A3, A2, A4, K3, A4, K6, A1, A2, A4, K1, A2, A3, A1, K5, A4, K4, A3; record 3 includes K3, A1, A2, A4, A6, K1, A2, A5, A4, A6; record 4 includes K1, A2, A5, A6, A3, K3, A1, A2, A4, K2, A3, A6; record 5 includes K4, A3, A2, A4, A6, A3, K1, A3, A7, A4, K2, A3.
After the collected data is cut and classified, the obtained K1 dataset list may be as shown in fig. 10, including: a1, A2, A4, A6, A3; a2, A3 and A1; a2, A5, A4, A6; a1, A2, A5, A6, A3; a3, A7, A4.
And the second point, filtering out the low frequency functions.
Traversing the data set list of each key, searching all independent items (equivalent to functions) in the data set, wherein each independent item corresponds to different functions, calculating the frequency corresponding to each independent item, and deleting the independent item with the frequency value smaller than a frequency threshold (Lmin) from the original data set, so that a new data set is obtained.
For example, as shown in fig. 11, the frequencies corresponding to all the individual items in the data set list of K1 are 0.8 for A2, 0.8 for A3, 0.6 for A1, 0.6 for A4, 0.6 for A6, 0.4 for A5, and 0.2 for A7; and if the frequency threshold is 0.5, deleting A5 and A7. The filtered K1 dataset list is shown in fig. 12, comprising: a1, A2, A4, A6, A3; a2, A3 and A1; a2, A4 and A6; a1, A2, A6, A3; a3 and A4.
And thirdly, creating a separate item linked list group.
A single linked list of data is created for each individual item in the filtered dataset. Wherein, a unidirectional data linked list comprises at least one node; each node has a counter whose value is used to indicate the distance (which may also be referred to as the step size of the key combination) of the node under each individual item in the filtered dataset and a pointer to preserve the order of the list. The relevance of the functions gradually decreases with time, mapping different weight values for each step size, 1- > s1,2- > s2,3- > s3,... Wherein n represents the step size; sn represents the corresponding weight value when the step size is n.
And arranging all the independent necklace tables in a descending manner according to the length of the linked list to obtain an independent item linked list group.
As shown in fig. 13, the independent necklace list set of K1 may include a single data linked list of independent item A2, a single data linked list of A3, a single data linked list of A1, a single data linked list of A4, and a single data linked list of A6. The unidirectional data link list of the independent item A2 comprises 4 nodes, wherein the step length of the node A1 is 2, the step length of the node A2 is 1, the step length of the node A3 is 1, and the step length of the node A4 is 2; the unidirectional data link list of the independent item A3 comprises 4 nodes, namely node B1, node B2, node B3 and node B4, wherein the step length of the node B1 is 5, the step length of the node B2 is 2, the step length of the node B3 is 4, and the step length of the node B4 is 1; the unidirectional data linked list of the independent item A1 comprises 3 nodes, wherein the step length of the node C1 is 1, the step length of the node C2 is 3, and the step length of the node C3 is 1; the unidirectional data link list of the independent item A4 comprises 3 nodes, namely a node D1, a node D2 and a node D3, wherein the step length of the node D1 is 3, the step length of the node D2 is 2, and the step length of the node D3 is 2; the unidirectional data link table of the independent item A6 comprises 3 nodes, namely a node E1, a node E2 and a node E3, wherein the step length of the node E1 is 4, the step length of the node E2 is 3, and the step length of the node E3 is 3.
Fourth, determining the target system function.
And after the linked list group is obtained, calculating the association degree of different independent items through the browser service. Wherein, the higher the frequency of the appearance of the independent items, the closer to the key combination (the shorter the step length), the stronger the association degree.
And taking the length of a first linked list in the linked list group as a reference L, and calculating the association degree of each independent item. For example, the degree of association of the individual terms can be calculated by the following formula (1).
Wherein R n represents the association degree of the independent term n; p' represents the length ratio of the independent items; w represents the weight of the independent term; ln represents the length of a linked list of n, and L represents the length of a reference linked list; Σq n represents the sum of the weights of each node of the independent term n; s1 represents the weight of the reference linked list.
Finding out the first two association degrees with the maximum association degree value from the association degrees of a plurality of independent items, marking the association degrees as Rmax1 and Rmax2, and if the result of the difference between Rmax1 and Rmax2 is larger than a minimum interval threshold value, determining that the independent item corresponding to Rmax1 is the most relevant target system function combined with the user input key; if the result of the difference between Rmax1 and Rmax2 is smaller than or equal to the minimum interval threshold, determining that the sample data is insufficient to obtain the independent item with the strongest association, and continuing to acquire user behaviors to expand the sample data.
And (3) repeating the actions of 1-2 after the user behavior records are collected, creating a new one-way linked list for the newly added independent items, supplementing the new one-way linked list into the linked list group, adding new nodes into the original linked list for the repeated independent items, enabling the newly added nodes to be shown as a broken line in fig. 14, and then recalculating the association degree of each independent item until the target system function can be determined.
4. User shortcuts are automatically configured.
When the behavior analyzer obtains the target system function corresponding to the user input key combination, the cloud IDE service is informed to initiate a user shortcut key configuration request to a user center in the automatic configurator, and the request parameter carries a user Id, the key combination and a built-in shortcut key corresponding to the target system function. As shown in fig. 15, after receiving the configuration request, the auto configurator matches the key combination with the list pool of extended shortcuts, if a certain extended shortcut is hit, binds the mapping relationship between the current key combination and the shortcut built in the target system function with the user, and configures the mapping relationship under the current user Id. If the key combination in the configuration request is not hit, the key combination is monitored by the cloud IDE, in order to be intercepted by the automatic configurator, based on the differentiated processing of different users, the automatic configurator needs to add an expansion shortcut key to the list pool for the key combination, the key value of the newly added expansion shortcut key is equal to the key combination, then the above steps are carried out, the mapping relation between the key combination and the built-in shortcut key of the target system function is bound with the user, and the mapping relation is registered under the current user Id.
After the configuration is completed, as shown in fig. 15, the user center stores a mapping relationship between the current user (user a) and the built-in shortcut key of the target system function for the key combination (user shortcut key), and ensures that the extended shortcut key list pool (including, for example, the extended shortcut key K1, the extended shortcut key K2, the extended shortcut key K3, the extended shortcut key Kn, and the like) must have an extended shortcut key matched with the input key combination. When a user inputs a shortcut key, the shortcut key is intercepted by the extended shortcut key, and the built-in shortcut key bound by the shortcut key is queried in the mapping relation of the user A under the user center (comprising the mapping relation of the user A, the mapping relation of the user B and the mapping relation of the user C) according to the key combination.
Then, the monitoring event of the built-in shortcut key needs to be reissued, so that the cloud IDE responds to the target system function. The method can be realized by adopting a chrome extension through an automatic configurator. For example, content scripts in the chrome extension module are Java Script scripts running within a web page, and can obtain detailed information of pages accessed by the browser. Modifying the information, simulating and transmitting a built-in shortcut key monitoring event in content scripts based on the characteristic, monitoring the event by the cloud IDE, and responding to a target function, thereby completing the shortcut key differential automatic configuration.
The flow may be as shown in fig. 16, and the information processing process may include a user registration process, a first information collection process, a target function determination process, and an automatic configuration process.
The registration process for the user may include: and under the condition that the user accesses for the first time, generating a user identifier and storing the user identifier into a user center.
The process for collecting the first information may include: when the input key combination is monitored, judging whether the input key combination is intercepted by an extended shortcut key list pool, if so, judging whether the input shortcut key is acquired in the user center by aiming at the user center, if so, simulating to transmit a built-in shortcut key triggering event, and if not, or if not, notifying the cloud IDE service to acquire user behaviors.
The determining process for the target function may include: cutting the collected user behavior data, deleting low-frequency independent items, creating a linked list group of the independent items, calculating the association degree of the independent items, and determining a target function.
For the auto-configuration process may include: the cloud IDE service initiates a configuration request, judges whether any extension shortcut key is hit, and if so, establishes an association relationship between the extension shortcut key and a built-in shortcut key corresponding to a target function; if the target function is not hit, the expansion shortcut key is added, and the association relationship between the added expansion shortcut key and the built-in shortcut key corresponding to the target function is established.
The shortcut key configuration scheme provided by the embodiment of the application has the following effects: the shortcut key differential configuration of different users is realized according to the use habits of different users without logging in; the automatic configuration of the shortcut key of the user is supported, unnecessary time and effort are not consumed for configuring the shortcut key, the user can concentrate on coding work, and the work efficiency is provided; the user is supported to use the shortcut key conforming to the self use habit, the limitation of the default shortcut key of the browser is not needed to be considered, and the user enjoys the same shortcut key use experience as the original IDE.
In order to implement the above information processing method, an information processing apparatus according to an embodiment of the present application is described below with reference to a schematic configuration diagram of the information processing apparatus shown in fig. 17.
As shown in fig. 17, the information processing apparatus 170 includes: a first obtaining unit 1701, a second obtaining unit 1702, a determining unit 1703, and a configuring unit 1704. Wherein:
A first obtaining unit 1701, configured to obtain a user identifier of a first user, where the user identifier is used to point to the first user;
A second obtaining unit 1702 configured to obtain a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period;
A determining unit 1703, configured to determine, based on the first information set, a first function corresponding to a first input shortcut key; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
A configuration unit 1704, configured to establish an association relationship between the first input shortcut key and the first function, and bind the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
In some embodiments, the information processing apparatus 170 further comprises an acquisition unit,
In a case of monitoring a second input shortcut key input by the first user, performing the following processing for the second input shortcut key:
if the second input shortcut key does not belong to the shortcut key supported by the first service, acquiring a first information subset corresponding to the first acquisition period through the second service in the first acquisition period; the first service is a browser service; the second service is an integrated development environment IDE service;
And if the second input shortcut key belongs to the shortcut key supported by the first service, acquiring the second input shortcut key through the first service, and acquiring information in the first acquisition period through the second service, wherein the information acquired by the first service and the information acquired by the second service form a first information subset corresponding to the first acquisition period.
In some embodiments, the determining unit 1703 is further configured to:
Determining a function set corresponding to the first input shortcut key based on the first information set, wherein the function set comprises at least one function subset, and one function subset comprises functions corresponding to the first input shortcut key in one first information subset;
Determining a linked list corresponding to each function in the function set based on the function subset included in the function set, wherein the linked list represents the appearance position of the function in the function set;
calculating a degree of association corresponding to each function, wherein the degree of association characterizes the degree of association between the function and the first input shortcut key;
Determining that the second function is the first function when the difference between the association degree of the second function and the association degree of the third function is greater than an association degree difference threshold; the association degree of the second function is larger than that of functions except the second function in the functions included in the function set; the association degree of the third function is smaller than that of the second function and is larger than that of functions other than the second function and the third function in the functions included in the function set.
In some embodiments, the information processing apparatus 170 further includes a deletion unit,
Before the determining unit 1703 executes the function subset included in the function set to determine a linked list corresponding to each function in the function set, counting a frequency of each function included in the function set; the frequency of the functions is the ratio of the number of functions in the set of functions to the number of subsets of functions;
Deleting a fourth function in a function subset included in the function set; the frequency of the fourth function is less than a frequency threshold.
In some embodiments, the determining unit 1703 is further configured to:
Dividing the length of the linked list corresponding to the function by the reference length to obtain the length ratio of the linked list; the length of the linked list represents the number of the function subsets comprising the functions in the function set;
dividing the weight of the linked list corresponding to the function by a reference weight to obtain a weight ratio; the weight of the linked list is related to the appearance position of the linked list representation;
Multiplying the length ratio of the linked list with the weight ratio to obtain the association degree corresponding to the function.
In some embodiments, the configuration unit 1704 is further configured to: .
Acquiring a first input shortcut key and an embedded shortcut key corresponding to the first function; a first association relationship exists between the built-in shortcut key and the first function;
matching the first input shortcut key with an expansion shortcut key in an expansion shortcut key list;
if the expansion shortcut key in the expansion shortcut key list is hit, a second association relationship between the hit expansion shortcut key and the built-in shortcut key is established;
if the expanded shortcut key in the expanded shortcut key list pool is not hit, adding the first input shortcut key in the expanded shortcut key list; and establishing a third association relation between the first input shortcut key and the built-in shortcut key.
In some embodiments, the first obtaining unit 1701,
Acquiring equipment information of at least one dimension of first user equipment;
And combining the equipment information of at least one dimension, and then carrying out hash calculation to obtain the first user identification.
In some embodiments, the processing unit is further to:
Drawing a first image by the first user equipment; the first image includes at least one of a two-dimensional image or a three-dimensional image; distinguishing configuration information between the first image characterization devices;
Converting the first image into first data; the first data is binary data representing the first image by printing characters;
Performing hash operation on the first data to obtain equipment information in a first dimension; the device information of the first dimension characterizes the device configuration information of the first user; the at least one dimension includes the first dimension.
It should be noted that, the information processing apparatus provided in the embodiment of the present application includes each unit included, which may be implemented by a processor in an electronic device; of course, the method can also be realized by a specific logic circuit; in an implementation, the Processor may be a central processing unit (CPU, central Processing Unit), a microprocessor (MPU, micro Processor Unit), a digital signal Processor (DSP, digital Signal Processor), or a Field-Programmable gate array (FPGA), etc.
The description of the apparatus embodiments above is similar to that of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the embodiments of the apparatus of the present application, please refer to the description of the embodiments of the method of the present application.
In the embodiment of the present application, if the above-described information processing method is implemented in the form of a software functional module and sold or used as a separate product, it may also be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be embodied essentially or in a part contributing to the related art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, an optical disk, or other various media capable of storing program codes. Thus, embodiments of the application are not limited to any specific combination of hardware and software.
In order to implement the above information processing method, an embodiment of the present application provides an electronic device, including a memory and a processor, where the memory stores a computer program that can be run on the processor, and the processor implements the steps in the information processing method provided in the above embodiment when executing the program.
Next, a structural diagram of the electronic device will be described with reference to the electronic device 180 shown in fig. 18.
In one example, the electronic device 180 may be the electronic device described above. As shown in fig. 18, the electronic device 180 includes: a processor 1801, at least one communication bus 1802, a user interface 1803, at least one external communication interface 1804, and a memory 1805. Wherein the communication bus 1802 is configured to enable connected communication between these components. The user interface 1803 may include a display screen, among other things, and the external communication interface 1804 may include standard wired and wireless interfaces.
The memory 1805 is configured to store instructions and applications executable by the processor 1801, and may also cache data (e.g., image data, audio data, voice communication data, and video communication data) to be processed or processed by the respective modules in the processor 1801 and the electronic device, which may be implemented by a FLASH memory (FLASH) or a random access memory (Random Access Memory, RAM).
In a fourth aspect, an embodiment of the present application provides a storage medium, that is, a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the information processing method provided in the above embodiment.
It should be noted here that: the description of the storage medium and apparatus embodiments above is similar to that of the method embodiments described above, with similar benefits as the method embodiments. For technical details not disclosed in the embodiments of the storage medium and the apparatus of the present application, please refer to the description of the method embodiments of the present application.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in some embodiments" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application. The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a magnetic disk or an optical disk, or the like, which can store program codes.
Or the above-described integrated units of the application may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solution of the embodiments of the present application may be embodied essentially or in a part contributing to the related art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage device, a ROM, a magnetic disk, or an optical disk.
The foregoing is merely an embodiment of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. An information processing method, characterized in that the method comprises:
Obtaining a user identification of a first user, wherein the user identification is used for pointing to the first user;
Obtaining a first information set; the first information set comprises at least one first information subset; the first information subset comprises at least one input shortcut key input by the first user and at least one function corresponding to each input shortcut key in the at least one input shortcut key, wherein the input shortcut key is acquired in one acquisition period;
Determining a first function corresponding to a first input shortcut key based on the first information set; the at least one input shortcut key included in the first information set comprises the first input shortcut key, and the at least one function included in the first information set comprises the first function;
Establishing an association relationship between the first input shortcut key and the first function, and binding the association relationship with the first user; and executing the operation corresponding to the first function under the condition that the first user is monitored to trigger the first input shortcut key.
2. The method according to claim 1, wherein the method further comprises:
In the case of monitoring a second input shortcut key input by the first user, the following processing is performed for the second input shortcut key:
If the second input shortcut key does not belong to the shortcut key supported by the first service, acquiring a first information subset corresponding to the first acquisition period through the second service in the first acquisition period; the first service is a browser service; the second service is an integrated development environment IDE service;
And if the second input shortcut key belongs to a shortcut key supported by the first service, acquiring the second input shortcut key through the first service, and acquiring information in the first acquisition period through the second service, wherein the first information subset corresponding to the first acquisition period is formed by the second input shortcut key acquired by the first service and the information acquired by the second service.
3. The method of claim 1, wherein determining, based on the first set of information, a first function corresponding to a first input shortcut key comprises:
Determining a function set corresponding to the first input shortcut key based on the first information set, wherein the function set comprises at least one function subset, and one function subset comprises functions corresponding to the first input shortcut key in one first information subset;
Determining a linked list corresponding to each function in the function set based on the function subset included in the function set, wherein the linked list represents the appearance position of the function in the function set;
calculating a degree of association corresponding to each function, wherein the degree of association characterizes the degree of association between the function and the first input shortcut key;
Determining that the second function is the first function when the difference between the association degree of the second function and the association degree of the third function is greater than an association degree difference threshold; the association degree of the second function is larger than that of functions except the second function in the functions included in the function set; the association degree of the third function is smaller than that of the second function and is larger than that of functions other than the second function and the third function in the functions included in the function set.
4. A method according to claim 3, wherein before said determining a linked list for each function in said set of functions based on a subset of functions comprised by said set of functions, said method further comprises:
Counting the frequency of each function included in the function set; the frequency of the functions is the ratio of the number of functions in the set of functions to the number of subsets of functions;
Deleting a fourth function in a function subset included in the function set; the frequency of the fourth function is less than a frequency threshold.
5. A method according to claim 3, wherein said calculating the degree of association of the functional correspondence comprises:
Dividing the length of the linked list corresponding to the function by the reference length to obtain the length ratio of the linked list; the length of the linked list represents the number of the function subsets comprising the functions in the function set;
dividing the weight of the linked list corresponding to the function by a reference weight to obtain a weight ratio; the weight of the linked list is related to the appearance position of the linked list representation;
Multiplying the length ratio of the linked list with the weight ratio to obtain the association degree corresponding to the function.
6. The method of claim 1, wherein the establishing an association between the first input shortcut and the first function comprises:
Acquiring a first input shortcut key and an embedded shortcut key corresponding to the first function; a first association relationship exists between the built-in shortcut key and the first function;
matching the first input shortcut key with an expansion shortcut key in an expansion shortcut key list;
if the expansion shortcut key in the expansion shortcut key list is hit, a second association relationship between the hit expansion shortcut key and the built-in shortcut key is established;
if the expanded shortcut key in the expanded shortcut key list pool is not hit, adding the first input shortcut key in the expanded shortcut key list; and establishing a third association relation between the first input shortcut key and the built-in shortcut key.
7. The method of claim 1, wherein obtaining the user identification of the first user comprises:
acquiring equipment information of at least one dimension of first user equipment;
And combining the equipment information of at least one dimension, and then carrying out hash calculation to obtain the first user identification.
8. The method of claim 7, wherein the obtaining device information for at least one dimension of the first user device comprises:
Drawing a first image by the first user equipment; the first image includes at least one of a two-dimensional image or a three-dimensional image; distinguishing configuration information between the first image characterization devices;
Converting the first image into first data; the first data is binary data representing the first image by printing characters;
Performing hash operation on the first data to obtain equipment information in a first dimension; the device information of the first dimension characterizes the device configuration information of the first user; the at least one dimension includes the first dimension.
9. An electronic device comprising a memory and a processor, the memory storing a computer program executable on the processor, the processor implementing the information processing method of any one of claims 1 to 8 when the program is executed.
10. A storage medium having stored thereon a computer program which, when executed by a processor, implements the information processing method of any of claims 1 to 8.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111342232.1A CN114116096B (en) | 2021-11-12 | 2021-11-12 | Information processing method, device, equipment and storage medium |
PCT/CN2022/100539 WO2023082645A1 (en) | 2021-11-12 | 2022-06-22 | Information processing method and apparatus, and device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111342232.1A CN114116096B (en) | 2021-11-12 | 2021-11-12 | Information processing method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114116096A CN114116096A (en) | 2022-03-01 |
CN114116096B true CN114116096B (en) | 2024-10-18 |
Family
ID=80379028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111342232.1A Active CN114116096B (en) | 2021-11-12 | 2021-11-12 | Information processing method, device, equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114116096B (en) |
WO (1) | WO2023082645A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114116096B (en) * | 2021-11-12 | 2024-10-18 | 深圳前海微众银行股份有限公司 | Information processing method, device, equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105573748A (en) * | 2015-12-11 | 2016-05-11 | 北京元心科技有限公司 | Shortcut key customization method and intelligent terminal |
CN108012174A (en) * | 2017-12-20 | 2018-05-08 | 深圳创维-Rgb电子有限公司 | Intelligent terminal shortcut customizing method, intelligent terminal and readable storage medium |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9292156B2 (en) * | 2012-01-09 | 2016-03-22 | International Business Machines Corporation | Enabling a user to invoke a function via a shortcut key in a multi-window computing environment |
GB201523166D0 (en) * | 2015-12-31 | 2016-02-17 | Jones Maria F | Direct integration system |
WO2018027874A1 (en) * | 2016-08-11 | 2018-02-15 | 张焰焰 | Method for setting universal shortcut key and operating system |
CN111290623A (en) * | 2020-03-12 | 2020-06-16 | 南京酷朗电子有限公司 | User data input method for public information platform data input |
CN111459298B (en) * | 2020-03-30 | 2023-04-07 | 招商局金融科技有限公司 | Shortcut key control method, electronic device and storage medium |
CN113094248B (en) * | 2021-04-28 | 2023-04-25 | 深圳市网旭科技有限公司 | User behavior data analysis method and device, electronic equipment and medium |
CN113556596A (en) * | 2021-07-01 | 2021-10-26 | 深圳创维-Rgb电子有限公司 | Shortcut key control method, device, equipment and storage medium |
CN114116096B (en) * | 2021-11-12 | 2024-10-18 | 深圳前海微众银行股份有限公司 | Information processing method, device, equipment and storage medium |
-
2021
- 2021-11-12 CN CN202111342232.1A patent/CN114116096B/en active Active
-
2022
- 2022-06-22 WO PCT/CN2022/100539 patent/WO2023082645A1/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105573748A (en) * | 2015-12-11 | 2016-05-11 | 北京元心科技有限公司 | Shortcut key customization method and intelligent terminal |
CN108012174A (en) * | 2017-12-20 | 2018-05-08 | 深圳创维-Rgb电子有限公司 | Intelligent terminal shortcut customizing method, intelligent terminal and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114116096A (en) | 2022-03-01 |
WO2023082645A1 (en) | 2023-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103777967B (en) | Page returning method, page generation method and device | |
US9032067B2 (en) | Determining differences in an event-driven application accessed in different client-tier environments | |
CN110659057B (en) | Application program hot updating method and device, storage medium and computer equipment | |
US10175954B2 (en) | Method of processing big data, including arranging icons in a workflow GUI by a user, checking process availability and syntax, converting the workflow into execution code, monitoring the workflow, and displaying associated information | |
JP6500086B2 (en) | Two-dimensional code analysis method and apparatus, computer-readable storage medium, computer program, and terminal device | |
US11520969B2 (en) | Optimization for browser rendering during navigation | |
US20160246481A1 (en) | Extraction of multiple elements from a web page | |
US10015253B2 (en) | System and method for preemptive request processing | |
US12061859B2 (en) | Markdown data content with action binding | |
CN112956157A (en) | System and method for tracking client device events | |
CN114116096B (en) | Information processing method, device, equipment and storage medium | |
US11689630B2 (en) | Request processing method and apparatus, electronic device, and computer storage medium | |
US20230379394A1 (en) | Tracking session events for a webpage iframe | |
CN112307386A (en) | Information monitoring method, system, electronic device and computer readable storage medium | |
JP2018506783A (en) | Generating element identifiers | |
WO2023209638A1 (en) | Determining zone identification reliability | |
CN112905931B (en) | Page information display method and device, electronic equipment and storage medium | |
CN115686506A (en) | Data display method and device, electronic equipment and storage medium | |
CN115525305A (en) | Data processing method, application starting method, device, computer equipment and storage medium | |
CN112182083A (en) | File generation method, device, equipment and storage medium | |
US11841891B2 (en) | Mapping webpages to page groups | |
US11947620B1 (en) | Interfaces for automatically mapping webpages to page groups | |
US11947573B2 (en) | Determining zone identification reliability | |
CN110427935B (en) | Webpage element identification method and server | |
WO2024039986A1 (en) | Contextual test code generation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |