CN116155846A - Data migration method, device and storage medium - Google Patents

Data migration method, device and storage medium Download PDF

Info

Publication number
CN116155846A
CN116155846A CN202310075612.6A CN202310075612A CN116155846A CN 116155846 A CN116155846 A CN 116155846A CN 202310075612 A CN202310075612 A CN 202310075612A CN 116155846 A CN116155846 A CN 116155846A
Authority
CN
China
Prior art keywords
application program
information
target
user
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310075612.6A
Other languages
Chinese (zh)
Inventor
张向文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Midea Group Co Ltd
GD Midea Air Conditioning Equipment Co Ltd
Original Assignee
Midea Group Co Ltd
GD Midea Air Conditioning Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Midea Group Co Ltd, GD Midea Air Conditioning Equipment Co Ltd filed Critical Midea Group Co Ltd
Priority to CN202310075612.6A priority Critical patent/CN116155846A/en
Publication of CN116155846A publication Critical patent/CN116155846A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses a data migration method, which comprises the following steps: receiving target verification information which is sent by a client device and obtained through a first application program; checking target verification information to obtain a verification result; if the verification result is that the verification is passed, determining that the first user identification information is matched with the second user identification information; the target verification information comprises first user identification information of a second application program, and the second user identification information is user identification information corresponding to the first application program; acquiring target user data corresponding to the first user identification information from a first database corresponding to the second application program; the target user data is user operation parameters or setting parameters which are bound and correspond through the second application program; and storing the target user data and the second user identification information into a second database corresponding to the first application program. The embodiment of the application also discloses a server device, a client device and a storage medium.

Description

Data migration method, device and storage medium
Description of the division
The present disclosure is a divisional application of chinese patent application with application date 2021, 11-19, application number 202111375499.0, and title of "a data migration method, apparatus, and storage medium".
Technical Field
The present disclosure relates to the field of air conditioning technologies, and in particular, to a data migration method, a device, and a storage medium.
Background
With the continuous improvement of domestic production technology, domestic produced commodities are widely applied abroad based on the advantages of high quality and low cost. In order to ensure the intelligent application of the provided commodity and the user experience effect, each manufacturer also provides a corresponding intelligent management application program for foreign users.
At present, aiming at the intelligent management application program of the commodity, a manufacturer can allow foreign users to log in through corresponding third party application programs such as an instant chat application program, but the third party application program extremely protects the privacy of the users, so that the intelligent management application program cannot directly store the account information of the third party user. While for some business or other considerations, manufacturers may develop new intelligent management applications for goods. Thus, when the same user logs in a new intelligent management application program by using the same third party application program, the user data of the old intelligent management application program cannot be synchronized to the new intelligent management application program, so that the user data migration efficiency is lower.
Content of the application
In order to solve the technical problems, the embodiments of the present application expect to provide a data migration method, device and storage medium, which solve the problem that data migration cannot be effectively performed when a foreign third party application program logs in an intelligent management application program at present, provide a method for performing data migration when a foreign third party application program logs in an intelligent management application program, and improve user data migration efficiency.
The technical scheme of the application is realized as follows:
in a first aspect, a data migration method, the method comprising:
receiving target verification information which is sent by a client device and obtained through a first application program; the target verification information is generated by a second application program running in the client device according to login attribute parameters;
checking the target verification information to obtain a checking result;
if the verification result is that verification is passed, determining that the first user identification information is matched with the second user identification information; the target verification information comprises the first user identification information of the second application program, and the second user identification information is user identification information corresponding to the first application program;
Acquiring target user data corresponding to the first user identification information from a first database corresponding to the second application program; the target user data are user operation parameters or setting parameters which are bound and correspond to the second application program;
and storing the target user data and the second user identification information into a second database corresponding to the first application program.
In a second aspect, a data migration method, the method comprising:
if an information acquisition instruction generated by the first application program is detected, responding to the information acquisition instruction, and acquiring target verification information through the first application program; the target verification information is generated by a second application program running in the client device according to the login attribute parameters;
sending the target verification information to a server device through the first application program; after the verification is passed, the target verification information is used for enabling the server device to migrate target user data corresponding to first user identification information in a first database corresponding to the second application program to a second database corresponding to the first application program; the target user data is user operation parameters or setting parameters corresponding to the binding of the second application program.
In a third aspect, a server device, the server device includes: a first memory, a first communication bus, and a first processor; wherein:
the first memory is used for storing executable instructions;
the first communication bus is used for realizing communication connection between the first processor and the first memory;
the first processor is configured to at least implement the steps of the data migration method as described in any one of the above.
In a fourth aspect, a client device, the client device comprising: a second memory, a second communication bus, and a second processor; wherein:
the second memory is used for storing executable instructions;
the second communication bus is used for realizing communication connection between the second processor and the second memory;
the second processor is at least configured to implement the steps of the data migration method as described in any one of the above.
In a fifth aspect, a storage medium has stored thereon a data migration program, which when executed by a processor, implements the steps of the data migration method as set forth in any one of the preceding claims.
In the embodiment of the application, if an information acquisition instruction generated by a first application program is detected, the client device responds to the information acquisition instruction, after target verification information is acquired through the first application program, the client device sends the target verification information to the server device through the first application program, after the server device receives the target verification information acquired through the first application program and sent by the client device, the server device verifies the target verification information to obtain a verification result, if the verification result is that verification is passed, the server device determines that the first user identification information is matched with the second user identification information, the server device acquires target user data corresponding to the first user identification information from a first database corresponding to the second application program, and stores the target user data and the second user identification information into a second database corresponding to the first application program. In this way, after the client device collects the target verification information generated by the second application program through the first application program, the target verification information is sent to the server device, so that the server device verifies the target verification information, when the first user identification information is confirmed to be matched with the second user identification information, the target user data corresponding to the first user identification information in the first database is stored in the second database, the problem that data migration cannot be effectively performed when the foreign third party application program logs in the intelligent management application program at present is solved, the method for performing data migration when the foreign third party application program logs in the intelligent management application program is provided, and the user data migration efficiency is improved.
Drawings
Fig. 1 is a schematic flow chart of a data migration method according to an embodiment of the present application;
fig. 2 is a second flow chart of a data migration method according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a data migration method according to an embodiment of the present application;
fig. 4 is a flow chart diagram of a data migration method according to an embodiment of the present application;
fig. 5 is a flowchart fifth of a data migration method according to an embodiment of the present application;
fig. 6 is a schematic flow chart of an application implementation of a data migration method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a server device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a client device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
An embodiment of the present application provides a data migration method, referring to fig. 1, where the method is applied to a server device, and the method includes the following steps:
step 101, receiving target verification information which is sent by a client device and obtained through a first application program.
Wherein the target authentication information is generated by a second application running in the client device according to the login attribute parameter.
In the embodiment of the application, the client device is simultaneously provided with the first application program and the second application program, and the server device is mainly used for storing user data corresponding to the first application program and the second application program. The second application may refer to an old application that the developer intelligently manages for the product development, while the first application is a new application that the developer intelligently manages for the product development. The target verification information is identity verification information generated by the second application program based on login attribute parameters of the second application program.
And 102, checking target verification information to obtain a verification result.
In the embodiment of the application, verification processing is performed on the target verification information to obtain a verification result.
Step 103, if the verification result is that the verification is passed, determining that the first user identification information is matched with the second user identification information.
The target verification information comprises first user identification information of a second application program, and the second user identification information is user identification information corresponding to the first application program.
In the embodiment of the application, the first user identification information is user identification information randomly allocated to the first user account of the third party application by the second application when the user logs in the second application through the first user account of the third party application for the first time; the second user identification information is user identification information which is randomly analyzed by the first application program for the second user account of the third party application program when the user logs in the first application program through the second user account of the third party application program for the first time. The first user account and the second user account may be the same or different. And when the verification result is that the verification is passed, the first user identification information is determined to be matched with the second user identification information, and the first user account number of the third party application program logging in the first application program is identical to the second user account number of the third party application program logging in the second application program.
Step 104, obtaining target user data corresponding to the first user identification information from a first database corresponding to the second application program.
The target user data is user operation parameters or setting parameters corresponding to the binding of the second application program.
In this embodiment of the present application, the target user data is a setting parameter set by the user through binding a corresponding product, for example, a home device, by using the second application, or an operation parameter of the user. And under the condition that the first user identification information is matched with the second user identification information, acquiring target user data corresponding to the first user identification information from a first database corresponding to the second application program.
Step 105, storing the target user data and the second user identification information into a second database corresponding to the first application program.
In the embodiment of the application, the obtained target user data is stored in a second database corresponding to the first application program, and an association relationship between the target user data and second user identification information is established.
In the embodiment of the application, after receiving target verification information sent by a client device and obtained through a first application program, a server device verifies the target verification information to obtain a verification result, if the verification result is that verification is passed, the server device determines that the first user identification information is matched with the second user identification information, obtains target user data corresponding to the first user identification information from a first database corresponding to the second application program, and stores the target user data and the second user identification information into a second database corresponding to the first application program. In this way, after the client device collects the target verification information generated by the second application program through the first application program, the target verification information is sent to the server device, so that the server device verifies the target verification information, when the first user identification information is confirmed to be matched with the second user identification information, the target user data corresponding to the first user identification information in the first database is stored in the second database, the problem that data migration cannot be effectively performed when the foreign third party application program logs in the intelligent management application program at present is solved, the method for performing data migration when the foreign third party application program logs in the intelligent management application program is provided, and the user data migration efficiency is improved.
Based on the foregoing embodiments, embodiments of the present application provide a data migration method, referring to fig. 2, where the method is applied to a client device, the method includes the following steps:
step 201, if an information acquisition instruction generated by a first application program is detected, responding to the information acquisition instruction, and acquiring target verification information through the first application program.
Wherein the target authentication information is generated by a second application running in the client device according to the login attribute parameter.
In the embodiment of the present application, the information acquisition instruction is an instruction for instructing acquisition of target authentication information. And the user operates the first application program installed in the client device to enable the information acquisition instruction generated by the first application program, so that the target verification information generated by the second application program is acquired through the first application program.
Step 202, sending target verification information to a server device through a first application program.
The target verification information is used for migrating target user data corresponding to the first user identification information in the first database corresponding to the second application program to the second database corresponding to the first application program after verification of the server device is passed; the target user data is user operation parameters or setting parameters corresponding to the binding of the second application program.
In the embodiment of the application, the client device sends the target verification information acquired by the first application program to the server device, so that the server device performs verification processing on the target verification information to realize migration of the first user identification information of the second application program corresponding to the target user data to the second database corresponding to the first application program, and data migration operation is realized.
In the embodiment of the application, if an information acquisition instruction generated by a first application program is detected, after the client device responds to the information acquisition instruction and acquires target verification information through the first application program, the client device sends the target verification information to the server device through the first application program, so that the server device checks the target verification information after receiving the target verification information acquired through the first application program and sent by the client device, and obtains a check result, if the check result is that the check is passed, the server device determines that the first user identification information is matched with the second user identification information, the server device acquires target user data corresponding to the first user identification information from a first database corresponding to the second application program, and stores the target user data and the second user identification information into a second database corresponding to the first application program. In this way, after the client device collects the target verification information generated by the second application program through the first application program, the target verification information is sent to the server device, so that the server device verifies the target verification information, when the first user identification information is confirmed to be matched with the second user identification information, the target user data corresponding to the first user identification information in the first database is stored in the second database, the problem that data migration cannot be effectively performed when the foreign third party application program logs in the intelligent management application program at present is solved, the method for performing data migration when the foreign third party application program logs in the intelligent management application program is provided, and the user data migration efficiency is improved.
Based on the foregoing embodiments, embodiments of the present application provide a data migration method, referring to fig. 3, the method includes the following steps:
step 301, if a data migration instruction generated by the second application program is detected, the client device obtains a login attribute parameter of the second application program through the second application program.
In this embodiment of the present application, the data migration instruction generated by the second application may be generated by a user operating the client device, for example, the second application generates migration prompt information for prompting the user that account data needs to be migrated, after the migration prompt information is displayed, the user agrees with the operation of account data migration on the displayed migration prompt information, and then the second application generates the data migration instruction. The login attribute parameters of the second application program mainly comprise some user attribute information stored locally in the client device when the second application program performs registration login when the user uses the second application program.
Step 302, the client device generates target verification information based on the login attribute parameter through the second application program.
In the embodiment of the application, the client device processes the login attribute parameter through the second application program to generate and obtain the target verification information.
Step 303, the client device stores the target verification information into the target storage area through the second application program.
In the embodiment of the application, the client device stores target verification information generated by the second application program into the target storage area through the second application program.
Step 304, if an information acquisition instruction generated by the first application program is detected, the client device responds to the information acquisition instruction and acquires target verification information through the first application program.
Wherein the target authentication information is generated by a second application running in the client device according to the login attribute parameter.
In this embodiment of the present application, after a second application in a client device generates target verification information, the second application may generate application switching prompt information that prompts a user to open a first application, where the user performs a corresponding operation on the application switching information, after switching from the second application to the first application, the second application generates acquisition prompt information that prompts the user to acquire the target verification information, and if the user performs a corresponding control operation for acquiring the target verification information based on the acquisition prompt information, for example, the user opens a window for the user to read the target verification information of the first application, at this time, the first application generates an information acquisition instruction, and the client device responds to the information acquisition instruction to acquire the target verification information from the target storage area through the first application.
Step 305, the client device sends target verification information to the server device through the first application program.
After the verification is passed, the target verification information is used to enable the server device to migrate target user data corresponding to the first user identification information in the first database corresponding to the second application program to the second database corresponding to the first application program, where the target user data is user operation parameters or setting parameters corresponding to the binding of the second application program.
In the embodiment of the application, after the first application program obtains the target verification information, the target verification information is connected with the server device through the client device in a communication mode, and then the target verification information is sent to the server device through the client device.
Step 306, the server device receives the target verification information obtained by the first application program and sent by the client device.
Wherein the target authentication information is generated by a second application running in the client device according to the login attribute parameter.
Step 307, the server device verifies the target verification information to obtain a verification result.
Step 308, if the verification result is that the verification is passed, the server side device determines that the first user identification information is matched with the second user identification information.
The target verification information comprises first user identification information of a second application program, and the second user identification information is user identification information corresponding to the first application program.
Step 309, the server device obtains target user data corresponding to the first user identification information from a first database corresponding to the second application program.
The target user data is user operation parameters or setting parameters corresponding to the binding of the second application program.
Step 310, the server device stores the target user data and the second user identification information in a second database corresponding to the first application program.
Based on the foregoing embodiment, in other embodiments of the present application, referring to fig. 4, after the server device performs step 310, the method is further used to perform step 311:
step 311, the server device sends the target user data to the client device, so that the target user data is synchronized to the first application program.
In this embodiment of the present application, after the server device stores the target user data in the second database, the target user data is further sent to the client device, so that the target user data is synchronized to the first application program installed in the client device, and thus, the user may not need to perform operations such as device binding for the first application program, and re-manage setting for setting. Thus, the use experience effect of the user is improved.
Based on the foregoing embodiments, in other embodiments of the present application, step 301 may be implemented by steps 301 a-301 b:
step 301a, the client device obtains, through the second application program, a first login type corresponding to a first user account for logging in the second application program.
In the embodiment of the application, during the login process, the second application program in the client device determines a first login type of the first user account on which the second application program logs. For example, if the user logs in with a mailbox account recommended by the second application, for example, the logged-in type may be recorded as a mailbox login type, and if the user logs in with a third party application, for example, an instant chat application allowed by the second application, the logged-in type may be recorded as a third party login type.
Step 301b, if the first login type is the target login type, the client device obtains the first identity parameter and the first user identification information through the second application program.
The first identity parameter is identity information distributed to the client device by a third party application program to which the first user account belongs, the first user identification information is user identification information distributed to the first user account by a second application program, and the login attribute parameter comprises the first identity parameter and the first user identification information.
In the embodiment of the present application, the target login type is a type of login performed by using a third party application program. When the first user account corresponding to the second application program is the user account information of the third party application program, the client device acquires the first identity parameter and the first user identification information. The first identity parameter may be a digital identification framework (OpenID) allocated by a third party application program to the first application program, and the first user identification information is user identification information randomly allocated by the second application program when the second application program registers for the first user account, for example, may be a virtual mailbox number.
Based on the foregoing embodiments, in other embodiments of the present application, referring to fig. 5, before the client device performs step 301, the method is further used to perform steps 312 to 313:
step 312, the client device obtains, through the first application, a second login type corresponding to a second user account for logging in the first application.
Step 313, if the second login type is the target login type, the client device generates a prompt message through the first application program, and displays the prompt message.
The prompt information is used for prompting the user to execute target operation for acquiring target verification information.
In the embodiment of the application, the client device analyzes a second login type of a second user account logged in the first application program, and when the second login type is determined to be a target login type, the first application program generates prompt information for prompting the user to execute target operation for acquiring target verification information, and displays the prompt information so that the user can execute target operation for acquiring the target verification information after seeing the prompt information.
Based on the foregoing embodiments, in other embodiments of the present application, the target verification information is two-dimensional code information.
In this embodiment of the present application, when the target verification information is two-dimensional code information, the corresponding target storage area may be an image storage unit used by the client device to store an image.
Based on the foregoing embodiments, in other embodiments of the present application, the target verification information includes at least the following information: user token identification, check code, aging identification and security identification.
In this embodiment of the present application, the user token identifier is used to identify the identity of the user, the check code is mainly used to check whether the first user identifier information of the second application program is matched with the second user identifier information of the first application program, the aging identifier is mainly used to identify whether the target verification information is aged, for example, the effective duration of the target verification information is 3 minutes or 5 minutes, and the security identifier is mainly used to represent the security of the target verification information.
Based on the foregoing embodiments, the embodiments of the present application provide a data migration method, which is described by taking target verification information as two-dimensional code information as an example, where the scenario is: when the user F logs in to the first client application using a third party application account, such as an instant chat software account F, and the user logs in to the first client application using the instant chat software account F, the instant chat software does not allow the first client application and the second client application to save the instant chat software account F because the instant chat software has privacy protection, so that the first client application may randomly generate a user mail (userEmail), such as aaa, for the instant chat software account F, and the second client application may randomly generate a userEmail, such as bbb, for the instant chat software account F. The server device is provided with a first database for storing user data corresponding to the first client application program and a second database for storing user data corresponding to the second client application program. When the target user data corresponding to the user F in the first database needs to be migrated to the second database, the corresponding implementation flow may be as shown in fig. 6, and specifically includes the following steps:
In step 401, the user authorizes the chat software account f of the instant chat software to log in the first client application program, and determines that the fixed OpenID allocated by the instant chat software to the first client application program is 6666.
Step 402, the first client application generates first user identification information aaa for the chat software account f.
Step 403, the first client application receives the operation of the user, binds the corresponding device, and updates the user data corresponding to the first user identification information aaa to the first database.
In step 404, when the first client application detects the data migration instruction, the first client application determines a locally stored login type (loginType).
Step 405, if it is determined that the user f currently logged in the first client application is a third party user according to the loginType, the first client application generates two-dimensional code information.
Wherein, the two-dimensional code information includes at least: and storing the two-dimensional code information of the information such as the user token identification, the check code (check_code), the aging identification, the security identification and the like into a gallery storage area of the client device.
In step 406, the user authorizes the chat software account f of the instant chat software to log in the second client application program, and determines that the fixed OpenID allocated by the instant chat software to the second client application program is 9999.
Step 407, the second client application generates second user identification information bbb for the chat software account f.
Step 408, the user opens the two-dimension code scanning function of the second client application program, and scans the two-dimension code information generated by the first client application program.
And 409, the second client application program analyzes the scanned two-dimensional code information to obtain a user token identifier, a check_code, an aging identifier and a security identifier.
In step 410, the second client application program sends information such as the user token identifier, the check_code, the aging identifier, the security identifier, and the like to the server device corresponding to the second client application program.
The server device may be a service cloud.
In step 411, the server device checks the user token identifier, the check_code, the aging identifier and the security identifier, and if the user token identifier, the check_code, the aging identifier and the security identifier pass the check, it is determined that the first user identifier aaa is matched with the second user identifier bbb.
And if at least one of the user token identifier, the check_code, the aging identifier and the security identifier fails to pass the verification, the subsequent operation is not executed.
Step 412, the server device synchronizes all target user data corresponding to the first user identification information aaa in the first database to a position corresponding to the second user identification information bbb in the second database.
In step 413, the second client application program acquires the user data corresponding to the second user identification information from the second database, and synchronizes to the second client application program.
It should be noted that, in this embodiment, the descriptions of the same steps and the same content as those in other embodiments may refer to the descriptions in other embodiments, and are not repeated here.
In the embodiment of the application, if an information acquisition instruction generated by a first application program is detected, the client device responds to the information acquisition instruction, after target verification information is acquired through the first application program, the client device sends the target verification information to the server device through the first application program, after the server device receives the target verification information acquired through the first application program and sent by the client device, the server device verifies the target verification information to obtain a verification result, if the verification result is that verification is passed, the server device determines that the first user identification information is matched with the second user identification information, the server device acquires target user data corresponding to the first user identification information from a first database corresponding to the second application program, and stores the target user data and the second user identification information into a second database corresponding to the first application program. In this way, after the client device collects the target verification information generated by the second application program through the first application program, the target verification information is sent to the server device, so that the server device verifies the target verification information, when the first user identification information is confirmed to be matched with the second user identification information, the target user data corresponding to the first user identification information in the first database is stored in the second database, the problem that data migration cannot be effectively performed when the foreign third party application program logs in the intelligent management application program at present is solved, the method for performing data migration when the foreign third party application program logs in the intelligent management application program is provided, and the user data migration efficiency is improved.
Based on the foregoing embodiments, embodiments of the present application provide a server device, referring to fig. 7, the server device 5 may include: a first memory 51, a first communication bus 52, and a first processor 53; wherein:
a first memory 51 for storing executable instructions;
a first communication bus 52 for enabling a communication connection between the first processor 53 and the first memory 51;
a first processor for implementing the steps of:
receiving target verification information which is sent by a client device and obtained through a first application program; the target verification information is generated by a second application program running in the client device according to the login attribute parameters;
checking target verification information to obtain a verification result;
if the verification result is that the verification is passed, determining that the first user identification information is matched with the second user identification information; the target verification information comprises first user identification information of a second application program, wherein the second user identification information is user identification information corresponding to the first application program;
acquiring target user data corresponding to the first user identification information from a first database corresponding to the second application program; the target user data are user operation parameters or setting parameters which are bound and correspond through the second application program;
And storing the target user data and the second user identification information into a second database corresponding to the first application program.
In other embodiments of the present application, after the first processor performs the step of storing the target user data and the second user identification information in the second database corresponding to the first application, the first processor is further configured to perform the following steps:
and sending the target user data to the client device so as to synchronize the target user data into the first application program.
It should be noted that, in the embodiments of the present application, one or more programs may be explained by steps of one or more processors, and the implementation process of the method provided by the corresponding embodiments of fig. 1 and fig. 3 to 5 may be referred to, which is not repeated herein.
In the embodiment of the application, after receiving target verification information sent by a client device and obtained through a first application program, a server device verifies the target verification information to obtain a verification result, if the verification result is that verification is passed, the server device determines that the first user identification information is matched with the second user identification information, obtains target user data corresponding to the first user identification information from a first database corresponding to the second application program, and stores the target user data and the second user identification information into a second database corresponding to the first application program. In this way, after the client device collects the target verification information generated by the second application program through the first application program, the target verification information is sent to the server device, so that the server device verifies the target verification information, when the first user identification information is confirmed to be matched with the second user identification information, the target user data corresponding to the first user identification information in the first database is stored in the second database, the problem that data migration cannot be effectively performed when the foreign third party application program logs in the intelligent management application program at present is solved, the method for performing data migration when the foreign third party application program logs in the intelligent management application program is provided, and the user data migration efficiency is improved.
Based on the foregoing embodiments, embodiments of the present application provide a client device, as shown with reference to fig. 8, the client device 6 may include: a second memory 61, a second communication bus 62, and a second processor 63; wherein:
a second memory 61 for storing executable instructions;
a second communication bus 62 for implementing a communication connection between the second processor 63 and the second memory 61;
a second processor 63 for implementing the steps of:
if an information acquisition instruction generated by the first application program is detected, responding to the information acquisition instruction, and acquiring target verification information through the first application program; the target verification information is generated by a second application program running in the client device according to the login attribute parameters;
sending target verification information to the server device through the first application program; after the verification is passed, the target verification information is used to enable the server device to migrate target user data corresponding to the first user identification information in the first database corresponding to the second application program to the second database corresponding to the first application program, where the target user data is user operation parameters or setting parameters corresponding to the binding of the second application program.
In other embodiments of the present application, the second processor is configured to execute the following steps if an information acquisition instruction generated by the first application is detected, and before the target verification information is acquired by the first application in response to the information acquisition instruction:
if a data migration instruction generated by the second application program is detected, acquiring login attribute parameters of the second application program through the second application program;
generating target verification information based on the login attribute parameters through a second application program;
and storing the target verification information into the target storage area through the second application program.
In other embodiments of the present application, the second processor is configured to execute the step of, if a data migration instruction generated by the second application is detected, obtaining, by the second application, a login attribute parameter, where the login attribute parameter is obtained by:
acquiring a first login type corresponding to a first user account logged in a second application program through the second application program;
if the first login type is the target login type, acquiring a first identity parameter and first user identification information through a second application program; the first identity parameter is identity information distributed to the client device by a third party application program to which the first user account belongs, the first user identification information is user identification information distributed to the first user account by a second application program, and the login attribute parameter comprises the first identity parameter and the first user identification information.
In other embodiments of the present application, the second processor is configured to execute the following steps if an information acquisition instruction generated by the first application is detected, and before the target verification information is acquired by the first application in response to the information acquisition instruction:
acquiring a second login type corresponding to a second user account logged in the first application program through the first application program;
if the second login type is the target login type, generating prompt information through the first application program, and displaying the prompt information; the prompt information is used for prompting the user to execute target operation for acquiring target verification information.
In other embodiments of the present application, the target verification information is two-dimensional code information.
In other embodiments of the present application, the target verification information includes at least the following information: user token identification, check code, aging identification and security identification.
It should be noted that, in the embodiments of the present application, one or more programs may be explained by steps of one or more processors, and the implementation process of the method may be provided with reference to the corresponding embodiments of fig. 2 to 5, which is not repeated herein.
In the embodiment of the application, if an information acquisition instruction generated by a first application program is detected, after the client device responds to the information acquisition instruction and acquires target verification information through the first application program, the client device sends the target verification information to the server device through the first application program, so that the server device checks the target verification information after receiving the target verification information acquired through the first application program and sent by the client device, and obtains a check result, if the check result is that the check is passed, the server device determines that the first user identification information is matched with the second user identification information, the server device acquires target user data corresponding to the first user identification information from a first database corresponding to the second application program, and stores the target user data and the second user identification information into a second database corresponding to the first application program. In this way, after the client device collects the target verification information generated by the second application program through the first application program, the target verification information is sent to the server device, so that the server device verifies the target verification information, when the first user identification information is confirmed to be matched with the second user identification information, the target user data corresponding to the first user identification information in the first database is stored in the second database, the problem that data migration cannot be effectively performed when the foreign third party application program logs in the intelligent management application program at present is solved, the method for performing data migration when the foreign third party application program logs in the intelligent management application program is provided, and the user data migration efficiency is improved.
Based on the foregoing embodiments, the embodiments of the present application provide a computer readable storage medium, simply referred to as a storage medium, where one or more programs are stored, and the one or more programs may be executed by one or more processors, so as to implement the data migration method implementation process provided in the embodiments corresponding to fig. 1 and 3 to 5 or fig. 2 to 5, which are not described herein again.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, magnetic disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is merely a preferred embodiment of the present application, and is not intended to limit the scope of the present application.

Claims (11)

1. A method of data migration, the method comprising:
receiving target verification information which is sent by a client device and obtained through a first application program; the target verification information is generated by a second application program running in the client device according to login attribute parameters;
Checking the target verification information to obtain a checking result;
if the verification result is that verification is passed, determining that the first user identification information is matched with the second user identification information; the target verification information comprises the first user identification information of the second application program, and the second user identification information is user identification information corresponding to the first application program;
acquiring target user data corresponding to the first user identification information from a first database corresponding to the second application program; the target user data are user operation parameters or setting parameters which are bound and correspond to the second application program;
and storing the target user data and the second user identification information into a second database corresponding to the first application program.
2. The method of claim 1, wherein after storing the target user data and the second user identification information in a second database corresponding to the first application, the method further comprises:
and sending the target user data to the client device so as to synchronize the target user data into the first application program.
3. A method of data migration, the method comprising:
if an information acquisition instruction generated by a first application program is detected, responding to the information acquisition instruction, and acquiring target verification information through the first application program; the target verification information is generated by a second application program running in the client device according to the login attribute parameters;
sending the target verification information to a server device through the first application program; after the verification is passed, the target verification information is used to transfer target user data corresponding to first user identification information in a first database corresponding to the second application program to a second database corresponding to the first application program, where the target user data is a user operation parameter or a setting parameter corresponding to the binding of the second application program.
4. The method of claim 3, wherein if the information collection instruction generated by the first application is detected, the method further comprises, before the target verification information is obtained by the first application in response to the information collection instruction:
If a data migration instruction generated by the second application program is detected, acquiring login attribute parameters of the second application program through the second application program;
generating, by the second application, the target authentication information based on the login attribute parameter;
and storing the target verification information to a target storage area through the second application program.
5. The method according to claim 4, wherein the obtaining, by the second application, the login attribute parameter if the data migration instruction generated by the second application is detected includes:
acquiring a first login type corresponding to a first user account logged in a second application program through the second application program;
if the first login type is the target login type, acquiring a first identity parameter and first user identification information through the second application program; the first identity parameter is identity information allocated to the client device by a third party application program to which the first user account belongs, the first user identification information is user identification information allocated to the first user account by the second application program, and the login attribute parameter comprises the first identity parameter and the first user identification information.
6. The method of claim 3, wherein if the information collection instruction generated by the first application is detected, the method further comprises, before the target verification information is obtained by the first application in response to the information collection instruction:
acquiring a second login type corresponding to a second user account logged in the first application program through the first application program;
if the second login type is the target login type, generating prompt information through the first application program, and displaying the prompt information; the prompt information is used for prompting a user to execute target operation for acquiring the target verification information.
7. The method according to any one of claims 3 to 6, wherein the target authentication information is two-dimensional code information.
8. The method according to any one of claims 3 to 6, wherein the target authentication information includes at least the following information: user token identification, check code, aging identification and security identification.
9. A server device, wherein the server device comprises: a first memory, a first communication bus, and a first processor; wherein:
The first memory is used for storing executable instructions;
the first communication bus is used for realizing communication connection between the first processor and the first memory;
the first processor is configured to at least implement the steps of the data migration method according to any one of claims 1 to 2.
10. A client device, the client device comprising: a second memory, a second communication bus, and a second processor; wherein:
the second memory is used for storing executable instructions;
the second communication bus is used for realizing communication connection between the second processor and the second memory;
the second processor is configured to at least implement the steps of the data migration method according to any one of claims 3 to 8.
11. A storage medium having stored thereon a data migration program which, when executed by a processor, implements the steps of the data migration method according to any one of claims 1 to 2 or claims 3 to 8.
CN202310075612.6A 2021-11-19 2021-11-19 Data migration method, device and storage medium Pending CN116155846A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310075612.6A CN116155846A (en) 2021-11-19 2021-11-19 Data migration method, device and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111375499.0A CN114070809B (en) 2021-11-19 2021-11-19 Data migration method, equipment and storage medium
CN202310075612.6A CN116155846A (en) 2021-11-19 2021-11-19 Data migration method, device and storage medium

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202111375499.0A Division CN114070809B (en) 2021-11-19 2021-11-19 Data migration method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116155846A true CN116155846A (en) 2023-05-23

Family

ID=80278512

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310075612.6A Pending CN116155846A (en) 2021-11-19 2021-11-19 Data migration method, device and storage medium
CN202111375499.0A Active CN114070809B (en) 2021-11-19 2021-11-19 Data migration method, equipment and storage medium

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202111375499.0A Active CN114070809B (en) 2021-11-19 2021-11-19 Data migration method, equipment and storage medium

Country Status (1)

Country Link
CN (2) CN116155846A (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7669177B2 (en) * 2003-10-24 2010-02-23 Microsoft Corporation System and method for preference application installation and execution
US8108783B2 (en) * 2008-05-20 2012-01-31 International Business Machines Corporation System and method of GUI overlaying for migrating from a first application to a second application
JP5293141B2 (en) * 2008-12-16 2013-09-18 日本電気株式会社 Redundant system
US8924273B2 (en) * 2010-10-28 2014-12-30 Oracle International Corporation Simplifying migration from one financial consolidation application to another
CN107291336A (en) * 2017-07-13 2017-10-24 北京元心科技有限公司 Method and device for starting application programs among multiple systems and terminal equipment
CN107450998B (en) * 2017-07-31 2020-06-02 北京三快在线科技有限公司 Method, device, medium and electronic equipment for synchronizing information among multiple applications in real time
CN108429806A (en) * 2018-03-09 2018-08-21 深圳市富途网络科技有限公司 A kind of setting option synchronization system and method based on cloud service

Also Published As

Publication number Publication date
CN114070809A (en) 2022-02-18
CN114070809B (en) 2023-03-21

Similar Documents

Publication Publication Date Title
CN109471865B (en) Offline data management method, system, server and storage medium
CN109525540B (en) Intelligent device binding method and device
CN108063714B (en) Network request processing method and device
CN105468948A (en) Method for identifying identity through social relation
CN106656927B (en) Method and device for adding Linux account into AD domain
CN104954506B (en) A kind of account management method, terminal device and system
CN106469068A (en) The dispositions method of application program and system
CN105635036B (en) A kind of verification system and method for electronic ID card
CN107104923B (en) Account binding and service processing method and device
CN111193602A (en) Automatic operation and maintenance management system and method
CN109726545B (en) Information display method, equipment, computer readable storage medium and device
CN107659579B (en) On-site certificate storing method and device and related certificate storing system
EP3905591A1 (en) Server abnormality processing method and management device
CN103164324A (en) Microblog test method and device
CN111935260B (en) Account synchronization method and device, electronic equipment and storage medium
CN114070809B (en) Data migration method, equipment and storage medium
CN112818016A (en) API-based real-time and off-line data query method and system
CN111008209B (en) Data reconciliation method, device and system, storage medium and electronic device
CN114726664B (en) Binding method and binding equipment for household equipment
CN101674327A (en) Heterogeneous system message integration method, framework and system
CN111818025A (en) User terminal detection method and device
CN106790269B (en) Recovery method and device for overtime login of application program
CN110781481A (en) Single sign-on method, client, server, and storage medium
CN113242551A (en) Mobile banking login verification method and device
CN104717080A (en) Detection method and system for broadband dialing faults

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination