Identification information distribution method and device and electronic equipment

文档序号:68508 发布日期:2021-10-01 浏览:23次 中文

阅读说明:本技术 标识信息的分配方法、装置及电子设备 (Identification information distribution method and device and electronic equipment ) 是由 毛颖 吴帅 于 2021-05-31 设计创作,主要内容包括:本公开实施例提供了一种标识信息的分配方法、装置及电子设备。该方法包括:从第一簇中包括的账号中选出第一簇的第一关键账号;在至少一个第二簇中存在第一簇的候选继承簇时,从候选继承簇中包括的账号中选出候选继承簇的第二关键账号,其中,候选继承簇为包括第一关键账号的第二簇,第二簇中包括至少一个账号;当第一簇中包括第二关键账号时,确定第一簇的标识信息为候选继承簇的标识信息;当第一簇中不包括第二关键账号时,为第一簇分配新的标识信息。因此,本公开的实施例,可以实现自然人标识信息的高稳定性和继承的合理性。(The embodiment of the disclosure provides an identification information distribution method and device and electronic equipment. The method comprises the following steps: selecting a first key account number of a first cluster from account numbers included in the first cluster; when candidate inheritance clusters of the first cluster exist in at least one second cluster, selecting second key account numbers of the candidate inheritance clusters from the account numbers included in the candidate inheritance clusters, wherein the candidate inheritance clusters are second clusters including the first key account numbers, and the second clusters include at least one account number; when the first cluster comprises a second key account, determining the identification information of the first cluster as the identification information of the candidate inheritance cluster; and when the first cluster does not comprise the second key account, allocating new identification information for the first cluster. Therefore, the embodiment of the present disclosure can achieve high stability and inheritance rationality of natural person identification information.)

1. A method for allocating identification information, the method comprising:

selecting a first key account number of a first cluster from account numbers included in the first cluster;

when candidate inherited clusters of the first cluster exist in at least one second cluster, selecting second key account numbers of the candidate inherited clusters from the account numbers included in the candidate inherited clusters, wherein the candidate inherited clusters are second clusters including the first key account numbers, and the second clusters include at least one account number;

when the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster;

and when the first cluster does not comprise the second key account, allocating new identification information to the first cluster.

2. The method according to claim 1, wherein before determining that the identification information of the first cluster is the identification information of the candidate inherited cluster when the first cluster includes the second key account, the method further includes:

determining whether the second key account number is included in the first cluster;

wherein the determining whether the first cluster includes the second key account includes:

when the first key account number is the same as the second key account number, determining that the first cluster comprises the second key account number;

when the first key account number is different from the second key account number, establishing a mapping relation between other account numbers in the first cluster except the first key account number and the first key account number, as a mapping relation of the first cluster;

and determining whether the first cluster comprises the second key account according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.

3. The method according to claim 2, wherein the determining whether the first cluster includes the second key account according to the mapping relationship between the first cluster and the mapping relationship between the first key account and the second key account includes:

when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;

when the mapping relationship between the first key account and the second key account does not exist in the mapping relationship of the first cluster, determining that the second key account is not included in the first cluster.

4. The method for allocating identification information according to claim 1, wherein the method further comprises:

and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, allocating new identification information for the first cluster.

5. The method according to claim 1, wherein the selecting the first key account in the first cluster from the accounts included in the first cluster comprises:

selecting the first key account from the accounts in the first cluster according to the target parameters of the accounts in the first cluster;

the target parameters comprise at least one of the use frequency, the registration time and the use time of the account.

6. The method according to claim 5, wherein when the target parameters include frequency of use, registration duration, and usage duration of accounts, the selecting the first key account from the accounts included in the first cluster according to the target parameters of the accounts included in the first cluster includes:

selecting a first candidate account with the largest use frequency from the accounts included in the first cluster;

when one first candidate account exists, taking the first candidate account as the first key account;

when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;

when one second candidate account exists, taking the second candidate account as the first key account;

when a plurality of second candidate account numbers exist, selecting a third candidate account number with the largest use time length from the second candidate account numbers;

when one third candidate account exists, taking the third candidate account as the first key account;

when a plurality of the third candidate account numbers exist, the first key account number is randomly selected from the plurality of the third candidate account numbers.

7. An apparatus for distributing identification information, the apparatus comprising:

the system comprises a first key account number selection module, a first cluster selection module and a second cluster selection module, wherein the first key account number selection module is configured to select a first key account number of a first cluster from account numbers included in the first cluster;

a second key account selection module, configured to select a second key account of a candidate inherited cluster from accounts included in the candidate inherited cluster when the candidate inherited cluster of the first cluster exists in at least one second cluster, where the candidate inherited cluster is a second cluster including the first key account, and the second cluster includes at least one account;

an identification information inheritance module configured to determine, when the first cluster includes the second key account, that the identification information of the first cluster is the identification information of the candidate inheritance cluster;

a reassignment module configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.

8. An electronic device, comprising:

a processor;

a memory for storing the processor-executable instructions;

wherein the processor is configured to execute the instructions to implement the method of assigning identification information according to any one of claims 1 to 6.

9. A computer-readable storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to implement the method of assigning identification information according to any one of claims 1 to 6.

10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the method of assigning identification information according to any one of claims 1 to 6.

Technical Field

The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for allocating identification information, and an electronic device.

Background

In an actual application scenario, different application programs are convenient for service business, and users are required to register account numbers, so that natural people can register various social account numbers in the long term. Generally, different account numbers can represent partial attributes of natural people, and the account numbers have characteristics of use behavior extinction, use habit conversion and the like. These accounts can be aggregated in the natural human dimension to assist in the execution of the business of the application.

In the engineering applications of multi-metadata fusion, same-person identification and the like, a cluster of identity identification numbers (ID) is usually corresponding to the back of a natural person, and the cluster can be used as identification information of the natural person. However, when the cluster itself is directly used as the identification information, since the ID (i.e., the account number) in the cluster is often slightly changed and the corresponding cluster is changed, any change in the ID in the cluster causes the identification information of a natural person to be changed. Under the background, it is difficult to track the complete life cycle of a natural person, and the effects of stability and inheritance cannot be achieved.

As can be seen from the above, in the related art, the cluster itself is used as identification information of a natural person, and even if the cluster structure changes slightly, the identification information of the natural person changes accordingly, so that the identification information of the natural person changes frequently, i.e., the stability is poor.

Disclosure of Invention

In order to solve the technical problems described in the background art, embodiments of the present disclosure provide a method and an apparatus for allocating identification information, and an electronic device, where the technical scheme of the present disclosure is as follows:

according to a first aspect of the embodiments of the present disclosure, there is provided a method for allocating identification information, the method including:

selecting a first key account number of a first cluster from account numbers included in the first cluster;

when candidate inherited clusters of the first cluster exist in at least one second cluster, selecting second key account numbers of the candidate inherited clusters from the account numbers included in the candidate inherited clusters, wherein the candidate inherited clusters are second clusters including the first key account numbers, and the second clusters include at least one account number;

when the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster;

and when the first cluster does not comprise the second key account, allocating new identification information to the first cluster.

Optionally, when the first cluster includes the second key account, before determining that the identification information of the first cluster is the identification information of the candidate inherited cluster, the method further includes:

determining whether the second key account number is included in the first cluster;

wherein the determining whether the first cluster includes the second key account includes:

when the first key account number is the same as the second key account number, determining that the first cluster comprises the second key account number;

when the first key account number is different from the second key account number, establishing a mapping relation between other account numbers in the first cluster except the first key account number and the first key account number, as a mapping relation of the first cluster;

and determining whether the first cluster comprises the second key account according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.

Optionally, the determining, according to the mapping relationship between the first cluster and the mapping relationship between the first key account and the second key account, whether the first cluster includes the second key account includes:

when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;

when the mapping relationship between the first key account and the second key account does not exist in the mapping relationship of the first cluster, determining that the second key account is not included in the first cluster.

Optionally, the method further includes:

and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, allocating new identification information for the first cluster.

Optionally, the selecting a first key account in the first cluster from the accounts included in the first cluster includes:

selecting the first key account from the accounts in the first cluster according to the target parameters of the accounts in the first cluster;

the target parameters comprise at least one of the use frequency, the registration time and the use time of the account.

Optionally, the selecting the first key account from the accounts included in the first cluster according to the target parameters of the accounts included in the first cluster includes:

selecting a first candidate account with the largest use frequency from the accounts included in the first cluster;

when one first candidate account exists, taking the first candidate account as the first key account;

when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;

when one second candidate account exists, taking the second candidate account as the first key account;

when a plurality of second candidate account numbers exist, selecting a third candidate account number with the largest use time length from the second candidate account numbers;

when one third candidate account exists, taking the third candidate account as the first key account;

when a plurality of the third candidate account numbers exist, the first key account number is randomly selected from the plurality of the third candidate account numbers.

Optionally, the allocating new identification information to the first cluster includes:

and generating the identification information of the first cluster by adopting a 64-bit length integer coding method and in a distributed mode.

According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for allocating identification information, the apparatus including:

the system comprises a first key account number selection module, a first cluster selection module and a second cluster selection module, wherein the first key account number selection module is configured to select a first key account number of a first cluster from account numbers included in the first cluster;

a second key account selection module, configured to select a second key account of a candidate inherited cluster from accounts included in the candidate inherited cluster when the candidate inherited cluster of the first cluster exists in at least one second cluster, where the candidate inherited cluster is a second cluster including the first key account, and the second cluster includes at least one account;

an identification information inheritance module configured to determine, when the first cluster includes the second key account, that the identification information of the first cluster is the identification information of the candidate inheritance cluster;

a reassignment module configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.

Optionally, the apparatus further comprises: a determining module configured to determine whether the first cluster includes the second key account;

wherein, the judging module comprises:

a first determining submodule configured to determine that the second key account is included in the first cluster when the first key account is the same as the second key account;

a mapping sub-module, configured to establish, when the first key account number is different from the second key account number, a mapping relationship between other account numbers in the first cluster, except the first key account number, and the first key account number, as a mapping relationship of the first cluster;

a second determining submodule configured to determine whether the first cluster includes the second key account according to the mapping relationship of the first cluster and the mapping relationship between the first key account and the second key account.

Optionally, the second determining submodule is specifically configured to:

when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;

when the mapping relationship between the first key account and the second key account does not exist in the mapping relationship of the first cluster, determining that the second key account is not included in the first cluster.

Optionally, the reallocation module is further configured to:

and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, allocating new identification information for the first cluster.

Optionally, the first key account number selection module is specifically configured to:

selecting the first key account from the accounts in the first cluster according to the target parameters of the accounts in the first cluster;

the target parameters comprise at least one of the use frequency, the registration time and the use time of the account.

Optionally, when the target parameters include a usage frequency, a registration duration, and a usage duration of an account, the first key account selection module selects the first key account from the accounts included in the first cluster according to the target parameters of the accounts included in the first cluster, and is specifically configured to:

selecting a first candidate account with the largest use frequency from the accounts included in the first cluster;

when one first candidate account exists, taking the first candidate account as the first key account;

when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;

when one second candidate account exists, taking the second candidate account as the first key account;

when a plurality of second candidate account numbers exist, selecting a third candidate account number with the largest use time length from the second candidate account numbers;

when one third candidate account exists, taking the third candidate account as the first key account;

when a plurality of the third candidate account numbers exist, the first key account number is randomly selected from the plurality of the third candidate account numbers.

Optionally, when the reallocation module allocates new identification information to the first cluster, the reallocation module is specifically configured to:

and generating the identification information of the first cluster by adopting a 64-bit length integer coding method and in a distributed mode.

According to a third aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including:

a processor;

a memory for storing the processor-executable instructions;

wherein the processor is configured to execute the instructions to implement the allocation method of the identification information provided by the present disclosure.

According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium, wherein instructions of the storage medium, when executed by a processor of an electronic device, cause the electronic device to implement the method for allocating identification information provided by the present disclosure.

According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product comprising one or more instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the method of assigning identification information as provided by the present disclosure.

According to the technical scheme provided by the embodiment of the disclosure, first key account numbers of a first cluster are selected from account numbers included in the first cluster, and when candidate inheritance clusters of the first cluster exist in at least one second cluster, second key account numbers of the candidate inheritance clusters are selected from account numbers included in the candidate inheritance clusters, so that when the second key account numbers are included in the first cluster, identification information of the first cluster is determined to be identification information of the candidate inheritance clusters, and when the second key account numbers are not included in the first cluster, new identification information is distributed to the first cluster. The candidate inheritance cluster is a second cluster comprising the first key account, and the second cluster comprises at least one account.

The first cluster comprises a second key account number, which indicates that the first cluster is only slightly changed relative to the candidate inheritance cluster; the first cluster does not include the second key account, which means that the second key account is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, so that the first cluster does not include the second key account and also means that the first cluster is greatly changed relative to the candidate inheritance cluster.

Therefore, according to the technical scheme of the embodiment of the disclosure, when the first cluster is slightly changed relative to the candidate inherited cluster, the identification information of the candidate inherited cluster can be inherited, and when the first cluster is greatly changed relative to the candidate inherited cluster, new identification information is allocated to the first cluster again. That is, according to the technical scheme of the embodiment of the present disclosure, the degree of change of the first cluster with respect to the candidate inherited clusters thereof is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of a natural person to which an account in the cluster belongs. Therefore, according to the technical scheme of the embodiment of the disclosure, the frequency of the identification information of the natural person is reduced through the inheritance of the identification information of the cluster, and the wrong cluster relation can be avoided being inherited when the cluster structure is changed significantly, so that the high stability and the inheritance rationality of the identification information of the natural person are realized.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.

Drawings

FIG. 1 is a flow chart illustrating a method of assigning identification information according to an exemplary embodiment;

FIG. 2 is a flow diagram illustrating another method of assigning identification information in accordance with an exemplary embodiment;

FIG. 3 is a flow diagram illustrating a particular implementation of a method for assigning identification information in accordance with an illustrative embodiment;

FIG. 4 is a block diagram illustrating an apparatus for assigning identification information in accordance with an exemplary embodiment;

fig. 5 is a block diagram showing another configuration of an apparatus for distributing identification information according to an exemplary embodiment;

FIG. 6 is a block diagram illustrating an electronic device in accordance with an exemplary embodiment;

FIG. 7 is a block diagram illustrating another electronic device in accordance with an example embodiment.

Detailed Description

In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.

It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.

In order to solve the problem that in the prior art, a cluster itself is used as identification information of a natural person, so that any change of an account number in the cluster can cause the identification information of the natural person to change, and therefore the effect of stabilization and inheritance cannot be achieved, the embodiments of the present disclosure provide an identification information distribution method, an identification information distribution device and electronic equipment.

According to a first aspect of the embodiments of the present disclosure, a method for allocating identification information is provided, which may be applied to electronic devices, such as computers, mobile phones, servers, and other devices.

As shown in fig. 1, the method for allocating identification information may include the following steps:

step 101: selecting a first key account number of a first cluster from account numbers included in the first cluster.

Wherein the first cluster comprises at least one account.

In addition, natural people may have registered accounts on multiple social platforms that are all representative of natural people. Therefore, a plurality of account numbers belonging to the same natural person can form a cluster, that is, account numbers in the same cluster belong to the same natural person.

Therefore, in the embodiment of the present disclosure, a cluster refers to a set of social account numbers corresponding to a natural person.

In addition, the key account of a cluster represents an account in the cluster that is important to natural people, wherein the key account of the cluster can be determined according to the frequency of using accounts in the cluster, for example, the account in the cluster with the highest frequency is used as the key account of the cluster.

Step 102: when candidate inherited clusters of the first cluster exist in at least one second cluster, selecting second key account numbers of the candidate inherited clusters from the account numbers included in the candidate inherited clusters.

The candidate inheritance cluster is a second cluster comprising the first key account, wherein the second cluster comprises at least one account.

As shown in step 102, after determining the first key account number of the first cluster, a second cluster including the first key account number may be selected from the at least one second cluster as a candidate inherited cluster of the first cluster.

For example, A, B accounts are included in the first cluster, and there are two second clusters, where one second cluster includes A, B, C three accounts and the other second cluster includes D, E two accounts, then if the key account of the first cluster is a, the second cluster including A, B, C three accounts is a candidate inheritance cluster of the first cluster.

In addition, it should be noted that there are one or zero candidate inherited clusters for a cluster.

Step 103: when the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster.

The first cluster comprises second key account numbers, and the second key account numbers are not stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, namely the second key account numbers which are important to natural people are located in the candidate inheritance cluster and also located in the first cluster, so that when the first cluster comprises the second key account numbers, the first cluster is slightly changed relative to the candidate inheritance cluster. Therefore, after the candidate inherited cluster is changed into the first cluster, if the second key account of the candidate inherited cluster is still included in the first cluster, the first cluster can inherit the identification information of the candidate inherited cluster.

Step 104: and when the first cluster does not comprise the second key account, allocating new identification information to the first cluster.

The first cluster does not include the second key account, and the second key account is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, namely, the second key account which is important for natural people is only in the candidate inheritance cluster and is not in the first cluster, so that when the first cluster does not include the second key account, the first cluster is greatly changed relative to the candidate inheritance cluster. Therefore, after the candidate inherited cluster is changed into the first cluster, if the first cluster does not include the second key account of the candidate inherited cluster, new identification information needs to be allocated to the first cluster again.

For example, the first cluster includes A, B two accounts, the first key account of the first cluster is a, and the candidate inherited cluster of the first cluster includes A, B, C three accounts, so that if the second key account of the candidate inherited cluster is B, the first cluster can inherit the identification information of the candidate inherited cluster; if the second key account of the candidate inheritance cluster is C, the first cluster cannot inherit the identification information of the candidate inheritance cluster, that is, new identification information needs to be allocated to the first cluster again.

As can be seen from the above steps 103 and 104, when the first cluster includes the second key account, the identification information of the natural person to which the account in the first cluster belongs is not changed; when the second key account is not included in the first cluster, the identification information of the natural person to which the account in the first cluster belongs may be changed. That is, after the candidate inheritance cluster is changed into the first cluster, if the first cluster still includes the second key account of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is not changed; after the candidate inheritance cluster is changed into the first cluster, if the first cluster does not include the second key account of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is changed.

Therefore, according to the technical scheme of the embodiment of the disclosure, when the first cluster is slightly changed relative to the candidate inherited cluster, the identification information of the candidate inherited cluster can be inherited, and when the first cluster is greatly changed relative to the candidate inherited cluster, new identification information is allocated to the first cluster again. That is, according to the technical scheme of the embodiment of the present disclosure, the degree of change of the first cluster with respect to the candidate inherited clusters thereof is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of a natural person to which an account in the cluster belongs. Therefore, according to the technical scheme of the embodiment of the disclosure, the frequency of the identification information of the natural person is reduced through the inheritance of the identification information of the cluster, and the wrong cluster relation can be avoided being inherited when the cluster structure is changed significantly, so that the high stability and the inheritance rationality of the identification information of the natural person are realized.

In addition, in the related art, a certain account in the cluster may also be used as identification information of a natural person. However, when the cluster structure changes, the inheritance rationality cannot be effectively reflected. For example, when an element in the third cluster as the identification information is divided into the fourth cluster, but the element is not selected as the identification information of the fourth cluster, the two clusters cannot inherit the identification information. Therefore, by using a certain account number in the cluster as identification information of a natural person, although partial problems of stability and inheritance can be solved, the problem of rationality of inheritance is brought at the same time.

The identification information distribution method of the embodiment of the disclosure can keep identification information of natural people unchanged when the cluster structure changes slightly; when the cluster structure is changed greatly, new identification information is distributed to the changed cluster structure again, and therefore identification information of natural people is changed. Therefore, the method for distributing the identification information in the embodiment of the disclosure can realize the stability of the identification information and can also realize the reasonable inheritance of the identification information.

According to a second aspect of the embodiments of the present disclosure, there is provided a method for allocating identification information, which may be applied to an electronic device, such as a computer, a mobile phone, a server, and the like.

As shown in fig. 2, the method for allocating identification information may include the following steps:

step 201: selecting a first key account number of a first cluster from account numbers included in the first cluster.

Wherein the first cluster comprises at least one account.

In addition, natural people may have registered accounts on multiple social platforms that are all representative of natural people. Thus, multiple accounts belonging to the same natural person may form a cluster. I.e. the account numbers in the same cluster belong to the same natural person.

Therefore, in the embodiment of the present disclosure, a cluster refers to a set of social account numbers corresponding to a natural person. The account numbers in one cluster can respectively represent natural people from different dimensions.

In addition, the key account number of a cluster represents an account number in the cluster that is important to natural persons.

Step 202: when candidate inherited clusters of the first cluster exist in at least one second cluster, selecting second key account numbers of the candidate inherited clusters from the account numbers included in the candidate inherited clusters.

The candidate inheritance cluster is a second cluster comprising the first key account, wherein the second cluster comprises at least one account.

As shown in step 202, after determining the first key account number of the first cluster, a second cluster including the first key account number may be selected from the at least one second cluster as a candidate inherited cluster of the first cluster.

For example, A, B accounts are included in the first cluster, and there are two second clusters, where one second cluster includes A, B, C three accounts and the other second cluster includes D, E two accounts, then if the key account of the first cluster is a, the second cluster including A, B, C three accounts is a candidate inheritance cluster of the first cluster.

In addition, it should be noted that there are one or zero candidate inherited clusters for a cluster.

Step 203: and when the first key account number is the same as the second key account number, determining that the first cluster comprises the second key account number.

The first key account belongs to one of the accounts in the first cluster, so that when the first key account is the same as the second key account, it is indicated that the first cluster includes the second key account.

Step 204: when the first key account number is different from the second key account number, establishing a mapping relationship between other account numbers in the first cluster except the first key account number and the first key account number, so as to serve as the mapping relationship of the first cluster.

Step 205: and determining whether the first cluster comprises the second key account according to the mapping relation of the first cluster and the mapping relation between the first key account and the second key account.

As can be seen from steps 204 to 205, in the embodiment of the present disclosure, when the first key account number is different from the second key account number, mapping relationships between other account numbers in the first cluster except the first key account number and the first key account number may be established, so as to further determine whether the second key account number is included in the first cluster according to the mapping relationships and the mapping relationships between the first key account number and the second key account number.

Optionally, the determining, according to the mapping relationship between the first cluster and the mapping relationship between the first key account and the second key account, whether the first cluster includes the second key account includes:

when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;

when the mapping relationship between the first key account and the second key account does not exist in the mapping relationship of the first cluster, determining that the second key account is not included in the first cluster.

For example, the mapping relationship of the first cluster includes a mapping relationship between a and B, and the first key account number of the first cluster is a, if the second key account number of the candidate inheritance cluster is B, the mapping relationship of the first cluster includes a mapping relationship between the first key account number and the second key account number (i.e., the mapping relationship between a and B), and it may be determined that the first cluster includes the second key account number; if the second key account number of the candidate inheritance cluster is C, the mapping relationship of the first cluster does not include the mapping relationship between the first key account number and the second key account number (i.e., the mapping relationship between a and C), and it can be determined that the first cluster does not include the second key account number.

As can be seen from the above, in the embodiment of the present disclosure, when the first key account is the same as the second key account, it may be directly determined that the first cluster includes the second key account; when the first key account number is different from the second key account number, whether the second key account number is included in the first cluster can be determined by comparing the mapping relationship of the first cluster with the mapping relationship between the first key account number and the second key account number.

In addition, for the method of determining whether the first cluster includes the second key account, the method may also be a traversal manner as follows:

traversing account numbers in the first cluster, and comparing whether the traversed account numbers are the same as the second key account numbers, if the account numbers are the same as the second key account numbers, indicating that the second key account numbers exist in the first cluster; if the same account number as the second key account number is not encountered until the traversal is finished, it indicates that the second key account number is not included in the first cluster.

When judging whether the first cluster comprises the second key account, firstly judging whether the first key account is the same as the second key account, and if so, directly determining that the first cluster comprises the second key account; when the first key account number is different from the second key account number, establishing a mapping relationship between other account numbers in the first cluster except the first key account number and the first key account number, and then judging whether the mapping relationship comprises the mapping relationship between the first key account number and the second key account number. Compared with the traversing mode, the process of judging whether the first cluster comprises the second key account can judge whether the first cluster comprises the second key account more quickly.

Step 206: when the first cluster comprises the second key account, determining that the identification information of the first cluster is the identification information of the candidate inheritance cluster.

The first cluster comprises second key account numbers, and the second key account numbers are not stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, namely the second key account numbers which are important to natural people are located in the candidate inheritance cluster and also located in the first cluster, so that when the first cluster comprises the second key account numbers, the first cluster is slightly changed relative to the candidate inheritance cluster. Therefore, after the candidate inherited cluster is changed into the first cluster, if the second key account of the candidate inherited cluster is still included in the first cluster, the first cluster can inherit the identification information of the candidate inherited cluster.

Step 207: and when the first cluster does not comprise the second key account, allocating new identification information to the first cluster.

The first cluster does not include the second key account, and the second key account is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, namely, the second key account which is important for natural people is only in the candidate inheritance cluster and is not in the first cluster, so that when the first cluster does not include the second key account, the first cluster is greatly changed relative to the candidate inheritance cluster. Therefore, after the candidate inherited cluster is changed into the first cluster, if the first cluster does not include the second key account of the candidate inherited cluster, new identification information needs to be allocated to the first cluster again.

For example, the first cluster includes A, B two accounts, the first key account of the first cluster is a, and the candidate inherited cluster of the first cluster includes A, B, C three accounts, so that if the second key account of the candidate inherited cluster is B, the first cluster can inherit the identification information of the candidate inherited cluster; if the second key account of the candidate inheritance cluster is C, the first cluster cannot inherit the identification information of the candidate inheritance cluster, that is, new identification information needs to be allocated to the first cluster again.

As can be seen from the foregoing step 206 and step 207, when the first cluster includes the second key account, the identification information of the natural person to which the account in the first cluster belongs is not changed; when the second key account is not included in the first cluster, the identification information of the natural person to which the account in the first cluster belongs may be changed. That is, after the candidate inheritance cluster is changed into the first cluster, if the first cluster still includes the second key account of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is not changed; after the candidate inheritance cluster is changed into the first cluster, if the first cluster does not include the second key account of the candidate inheritance cluster, the identification information of the same natural person to which the candidate inheritance cluster and the first cluster belong is changed.

Therefore, according to the technical scheme of the embodiment of the disclosure, when the first cluster is slightly changed relative to the candidate inherited cluster, the identification information of the candidate inherited cluster can be inherited, and when the first cluster is greatly changed relative to the candidate inherited cluster, new identification information is allocated to the first cluster again. That is, according to the technical scheme of the embodiment of the present disclosure, the degree of change of the first cluster with respect to the candidate inherited clusters thereof is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of a natural person to which an account in the cluster belongs. Therefore, according to the technical scheme of the embodiment of the disclosure, the frequency of the identification information of the natural person is reduced through the inheritance of the identification information of the cluster, and the wrong cluster relation can be avoided being inherited when the cluster structure is changed significantly, so that the high stability and the inheritance rationality of the identification information of the natural person are realized.

Optionally, the method further includes:

and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, allocating new identification information for the first cluster.

Therefore, in the embodiment of the present disclosure, when the candidate inheritance cluster does not exist in the first cluster, that is, when the first key account is not included in the current second cluster, the identification information needs to be reallocated to the first cluster.

Optionally, the selecting a first key account in the first cluster from the accounts included in the first cluster includes:

selecting the first key account from the accounts in the first cluster according to the target parameters of the accounts in the first cluster;

the target parameters comprise at least one of the use frequency, the registration time and the use time of the account.

In addition, the average number of times of use of the account in a preset time period may be used as the frequency of use of the account. For example, the number of uses of the account may be collected over a predetermined period of time (e.g., within a week), and then the average of the number of uses may be calculated as the frequency of use of the account.

In addition, the use frequency degree, the registration duration and the use duration of the account can represent the importance degree of the account to natural people, so that the account which is important to natural people in the first cluster can be more accurately selected as a key account according to at least one of the use frequency degree, the registration duration and the use duration, and the stability of the selected key account is improved.

Optionally, when the target parameters include a usage frequency, a registration duration, and a usage duration of an account, the selecting the first key account from the accounts included in the first cluster according to the target parameters of the accounts included in the first cluster includes:

selecting a first candidate account with the largest use frequency from the accounts included in the first cluster;

when one first candidate account exists, taking the first candidate account as the first key account;

when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;

when one second candidate account exists, taking the second candidate account as the first key account;

when a plurality of second candidate account numbers exist, selecting a third candidate account number with the largest use time length from the second candidate account numbers;

when one third candidate account exists, taking the third candidate account as the first key account;

when a plurality of the third candidate account numbers exist, the first key account number is randomly selected from the plurality of the third candidate account numbers.

Therefore, in the embodiment of the disclosure, when the first key account is selected from the first cluster, the frequency of the account usage may be considered in priority, the registration duration may be considered, and the usage duration may be considered again. Of course, it is understood that the priority order of the three factors of the frequency of use, the duration of registration, and the duration of use may also be adjusted.

Optionally, the allocating new identification information to the first cluster includes:

and generating the identification information of the first cluster by adopting a 64-bit length integer coding method and in a distributed mode.

And generating the identification information of the first cluster by adopting a 64-bit long integer coding method, so that the uniqueness of the identification information can be ensured. And the identification information of the first cluster is generated in a distributed mode, so that the identification information of the first cluster can be generated quickly.

In addition, in the related art, when the cluster itself is used as the identification information of a natural person, since the cluster itself is a set, it is difficult to visually represent and transmit, and the efficiency of storage and calculation is low. In the embodiment of the application, the identification information generated by the 64-bit long-form coding method is used as the identification information of the cluster, namely, the identification information of the natural person to which the cluster belongs, so that the identification information of the natural person is simpler and more visual, the transmission is convenient, the storage space can be saved, and the calculation efficiency is improved.

To sum up, a specific implementation of the method for allocating identification information according to the embodiment of the present disclosure may be as shown in fig. 3, that is, as follows:

determining a first key account number of a first cluster; for example, the account use frequency, the account registration time and the use time can be comprehensively considered, so that the activity and the stability of natural people can be ensured;

determining a candidate inheritance cluster of the first cluster (namely, selecting a second cluster including the first key account from the current second cluster), and constructing a mapping relation between other accounts in the first cluster except the first key account and the first key account.

If the first cluster has the candidate inheritance cluster, comparing a second key account number of the candidate inheritance cluster with the first key account number, if the second key account number of the candidate inheritance cluster is consistent with the first key account number, or if the mapping relation between the first key account number and the second key account number exists in the first cluster, the first cluster inherits the identification information of the candidate inheritance cluster, otherwise, distributing new identification information for the first cluster; and if the candidate inheritance cluster of the first cluster does not exist, allocating new identification information for the first cluster. For convenience of representation and transmission and uniqueness guarantee, the identification information can be coded by 64-bit Long type codes and can be rapidly generated in a distributed mode.

Wherein the distributed mode is that: the plurality of devices may generate the identification information, respectively. Examples are as follows: if it is necessary to generate one new identification information for each of the six clusters A, B, C, D, E, F, then for a distributed cluster formed by two devices, new identification information may be generated for three clusters A, B, C on the first device and new identification information may be generated for three clusters D, E, F on the second device.

Therefore, a plurality of devices can generate new identification information by acting on different clusters, so that the generation time of the new identification information can be saved, namely, the generation speed of the identification information is increased.

Therefore, when the identification information is identified for natural people, the cluster before and after the change is connected by using the key account number in the natural people cluster as a bridge according to the identification information distribution method of the embodiment of the disclosure. The method comprises the steps of calculating a key account in the account forming a cluster, constructing the mapping relation between all accounts in the cluster and the key account, judging the relation between the cluster and the key account before and after change, and determining whether a new cluster can inherit the identification information of the original cluster. The method solves the problem of connection of the relationship before and after the cluster is slightly changed, and meanwhile, connection can be actively disconnected when the cluster is qualitatively changed, so that wrong relationship inheritance is avoided. Therefore, the identification information of the cluster obtained by the identification information distribution method of the embodiment of the disclosure, that is, the identification information of the natural person to which the account number in the cluster belongs, can meet the requirements of uniqueness and intuition, and can embody an accurate inheritance relationship and maintain stability.

In addition, the distribution method of the identification information of the embodiment of the disclosure has automation and process in the whole process, and does not need manual participation and maintenance. In addition, the whole process can efficiently and quickly complete the distribution and inheritance of the natural person identification information in a distributed mode.

In addition, accurate and stable identification information can conveniently show the complete life cycle of natural people.

According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for allocating identification information, as shown in fig. 4, the apparatus 400 for allocating identification information may include:

a first key account number selection module 401 configured to select a first key account number of a first cluster from account numbers included in the first cluster;

a second key account selecting module 402, configured to select a second key account of a candidate inherited cluster from accounts included in the candidate inherited cluster when the candidate inherited cluster of the first cluster exists in at least one second cluster, where the candidate inherited cluster is a second cluster including the first key account, and the second cluster includes at least one account;

an identification information inheritance module 403, configured to determine, when the second key account is included in the first cluster, that the identification information of the first cluster is the identification information of the candidate inheritance cluster;

a reassignment module 404 configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.

As can be seen from the above, in the identification information allocating apparatus provided in the embodiment of the present disclosure, first key account numbers of a first cluster are selected from account numbers included in the first cluster, and when candidate inherited clusters of the first cluster exist in at least one second cluster, second key account numbers of the candidate inherited clusters are selected from account numbers included in the candidate inherited clusters, so that when the second key account numbers are included in the first cluster, it is determined that the identification information of the first cluster is the identification information of the candidate inherited clusters, and when the second key account numbers are not included in the first cluster, new identification information is allocated to the first cluster. The candidate inheritance cluster is a second cluster comprising the first key account, and the second cluster comprises at least one account.

The first cluster comprises a second key account number, which indicates that the first cluster is only slightly changed relative to the candidate inheritance cluster; the first cluster does not include the second key account, which means that the second key account is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, so that the first cluster does not include the second key account and also means that the first cluster is greatly changed relative to the candidate inheritance cluster.

Therefore, the identification information allocating apparatus provided in the embodiments of the present disclosure can inherit the identification information of the candidate inherited cluster when the first cluster is slightly changed from the candidate inherited cluster, and reallocate new identification information for the first cluster when the first cluster is greatly changed from the candidate inherited cluster. That is, according to the technical scheme of the embodiment of the present disclosure, the degree of change of the first cluster with respect to the candidate inherited clusters thereof is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of a natural person to which an account in the cluster belongs. Therefore, the distribution device for identification information provided by the embodiment of the present disclosure, through inheritance of identification information of a cluster, reduces the frequency of identification information of a natural person, and can also avoid inheritance of a wrong cluster relationship when a cluster structure significantly changes, thereby achieving high stability and inheritance rationality of identification information of a natural person.

According to a fourth aspect of the embodiments of the present disclosure, there is provided an apparatus for allocating identification information, as shown in fig. 5, the apparatus 500 for allocating identification information may include:

a first key account number selection module 501, configured to select a first key account number of a first cluster from account numbers included in the first cluster;

a second key account selecting module 502, configured to select a second key account of a candidate inherited cluster from accounts included in the candidate inherited cluster when the candidate inherited cluster of the first cluster exists in at least one second cluster, where the candidate inherited cluster is a second cluster including the first key account, and the second cluster includes at least one account;

an identification information inheritance module 503, configured to determine, when the second key account is included in the first cluster, that the identification information of the first cluster is the identification information of the candidate inheritance cluster;

a reassignment module 504 configured to assign new identification information to the first cluster when the second key account is not included in the first cluster.

Optionally, the apparatus further comprises: a determining module 505 configured to determine whether the second key account is included in the first cluster;

wherein the determining module 505 comprises:

a first determining submodule 5051 configured to determine that the second key account is included in the first cluster when the first key account is the same as the second key account;

a mapping sub-module 5052, configured to, when the first key account number is different from the second key account number, establish a mapping relationship between other account numbers in the first cluster, except the first key account number, and the first key account number, as a mapping relationship of the first cluster;

the second determining sub-module 5053 is configured to determine whether the second key account is included in the first cluster according to the mapping relationship between the first cluster and the mapping relationship between the first key account and the second key account.

Optionally, the second determining submodule 5053 is specifically configured to:

when the mapping relation between the first key account and the second key account exists in the mapping relation of the first cluster, determining that the second key account is included in the first cluster;

when the mapping relationship between the first key account and the second key account does not exist in the mapping relationship of the first cluster, determining that the second key account is not included in the first cluster.

Optionally, the redistribution module 504 is further configured to:

and when the candidate inheritance cluster of the first cluster does not exist in the at least one second cluster, allocating new identification information for the first cluster.

Optionally, the first key account number selecting module 501 is specifically configured to:

selecting the first key account from the accounts in the first cluster according to the target parameters of the accounts in the first cluster;

the target parameters comprise at least one of the use frequency, the registration time and the use time of the account.

Optionally, when the target parameters include the usage frequency, the registration duration, and the usage duration of the account, the first key account selection module 501 selects the first key account from the accounts included in the first cluster according to the target parameters of the accounts included in the first cluster, and is specifically configured to:

selecting a first candidate account with the largest use frequency from the accounts included in the first cluster;

when one first candidate account exists, taking the first candidate account as the first key account;

when a plurality of first candidate accounts exist, selecting a second candidate account with the largest registration duration from the plurality of first candidate accounts;

when one second candidate account exists, taking the second candidate account as the first key account;

when a plurality of second candidate account numbers exist, selecting a third candidate account number with the largest use time length from the second candidate account numbers;

when one third candidate account exists, taking the third candidate account as the first key account;

when a plurality of the third candidate account numbers exist, the first key account number is randomly selected from the plurality of the third candidate account numbers.

Optionally, when allocating new identification information to the first cluster identification information, the reallocation module 505 is specifically configured to:

and generating the identification information of the first cluster by adopting a 64-bit length integer coding method and in a distributed mode.

Wherein the distributed mode is that: the plurality of devices may generate the identification information, respectively. Examples are as follows: if it is necessary to generate one new identification information for each of the six clusters A, B, C, D, E, F, then for a distributed cluster formed by two devices, new identification information may be generated for three clusters A, B, C on the first device and new identification information may be generated for three clusters D, E, F on the second device.

Therefore, a plurality of devices can generate new identification information by acting on different clusters in parallel, so that the generation time of the new identification information can be saved, namely, the generation speed of the identification information is increased

As can be seen from the above, the identification information allocating apparatus provided in the embodiment of the present disclosure selects a first key account of a first cluster from accounts included in the first cluster, and selects a second key account of a candidate inheritance cluster from accounts included in the candidate inheritance cluster when a candidate inheritance cluster of the first cluster exists in at least one second cluster, so that when the first cluster includes the second key account, it is determined that the identification information of the first cluster is the identification information of the candidate inheritance cluster, and when the first cluster does not include the second key account, new identification information is allocated to the first cluster. The candidate inheritance cluster is a second cluster comprising the first key account, and the second cluster comprises at least one account.

The first cluster comprises a second key account number, which indicates that the first cluster is only slightly changed relative to the candidate inheritance cluster; the first cluster does not include the second key account, which means that the second key account is stripped from the candidate inheritance cluster in the process of changing from the candidate inheritance cluster to the first cluster, so that the first cluster does not include the second key account and also means that the first cluster is greatly changed relative to the candidate inheritance cluster.

Therefore, the identification information allocating apparatus provided in the embodiments of the present disclosure can inherit the identification information of the candidate inherited cluster when the first cluster is slightly changed from the candidate inherited cluster, and reallocate new identification information for the first cluster when the first cluster is greatly changed from the candidate inherited cluster. That is, according to the technical scheme of the embodiment of the present disclosure, the degree of change of the first cluster with respect to the candidate inherited clusters thereof is distinguished, so that the identification information of the first cluster can be reasonably determined, and the identification information of one cluster is the identification information of a natural person to which an account in the cluster belongs. Therefore, the distribution device for identification information provided by the embodiment of the present disclosure, through inheritance of identification information of a cluster, reduces the frequency of identification information of a natural person, and can also avoid inheritance of a wrong cluster relationship when a cluster structure significantly changes, thereby achieving high stability and inheritance rationality of identification information of a natural person.

With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.

According to a fifth aspect of embodiments of the present disclosure, there is provided an electronic device. Referring to fig. 6, the electronic device includes:

a processor 610;

a memory 620 for storing the processor-executable instructions;

wherein the processor is configured to execute the instructions to implement the above-mentioned identification information distribution method.

According to a sixth aspect of the disclosed embodiments, there is also provided an electronic device. As shown in fig. 7, the electronic device 700 may be a mobile phone, a computer, a digital broadcast electronic device, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.

Referring to fig. 7, electronic device 700 may include one or more of the following components: a processing component 702, a memory 704, a power component 706, a multimedia component 708, an audio component 710, an input/output (I/O) interface 712, a sensor component 714, and a communication component 716.

The processing component 702 generally controls overall operation of the electronic device 700, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 702 may include one or more processors 720 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 702 may include one or more modules that facilitate interaction between the processing component 702 and other components. For example, the processing component 702 may include a multimedia module to facilitate interaction between the multimedia component 708 and the processing component 702.

The memory 704 is configured to store various types of data to support operations at the electronic device 700. Examples of such data include instructions for any application or method operating on the electronic device 700, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 704 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.

The power supply component 706 provides power to the various components of the electronic device 700. The power components 706 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the electronic device 700.

The multimedia component 708 includes a screen that provides an output interface between the electronic device 700 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 708 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 700 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.

The audio component 710 is configured to output and/or input audio signals. For example, the audio component 710 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 700 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 704 or transmitted via the communication component 716. In some embodiments, audio component 710 also includes a speaker for outputting audio signals.

The I/O interface 712 provides an interface between the processing component 702 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.

The sensor assembly 714 includes one or more sensors for providing various aspects of status assessment for the electronic device 700. For example, the sensor assembly 714 may detect an open/closed state of the electronic device 700, the relative positioning of components, such as a display and keypad of the electronic device 700, the sensor assembly 714 may also detect a change in the position of the electronic device 700 or a component of the electronic device 700, the presence or absence of user contact with the electronic device 700, orientation or acceleration/deceleration of the electronic device 700, and a change in the temperature of the electronic device 700. The sensor assembly 714 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 714 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 714 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.

The communication component 716 is configured to facilitate wired or wireless communication between the electronic device 700 and other devices. The electronic device 700 may access a wireless network based on a communication standard, such as WiFi, a carrier network (such as 2G, 3G, 8G, or 5G), or a combination thereof. In an exemplary embodiment, the communication component 716 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 716 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.

In an exemplary embodiment, the electronic device 700 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described identification information allocation method.

In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 704 comprising instructions, executable by the processor 720 of the electronic device 700 to perform the above-described method is also provided. Alternatively, for example, the storage medium may be a non-transitory computer-readable storage medium, which may be, for example, a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.

In yet another aspect of the present disclosure, the present disclosure also provides a storage medium, and when executed by a processor of an electronic device, the instructions in the storage medium enable the electronic device to execute the above-mentioned identification information allocation method.

According to yet another aspect of the embodiments of the present disclosure, there is provided a computer program product containing instructions/computer program, which when run on a computer, causes the computer to implement the above-mentioned method for allocating identification information.

The allocation scheme of identification information provided herein is not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The structure required to construct a system incorporating aspects of the present invention will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.

In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.

Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.

Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.

Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.

The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in an information extraction scheme according to embodiments of the present disclosure. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.

It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

23页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种单一客户端访问多个服务端的方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类