CN107180049A - Searching method and device - Google Patents

Searching method and device Download PDF

Info

Publication number
CN107180049A
CN107180049A CN201610139744.0A CN201610139744A CN107180049A CN 107180049 A CN107180049 A CN 107180049A CN 201610139744 A CN201610139744 A CN 201610139744A CN 107180049 A CN107180049 A CN 107180049A
Authority
CN
China
Prior art keywords
internet resources
password
application
search
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610139744.0A
Other languages
Chinese (zh)
Other versions
CN107180049B (en
Inventor
孙东方
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610139744.0A priority Critical patent/CN107180049B/en
Publication of CN107180049A publication Critical patent/CN107180049A/en
Application granted granted Critical
Publication of CN107180049B publication Critical patent/CN107180049B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a kind of searching method and device.Searching method includes:When the second application is opened, the Internet resources password provided in automatic detection password space with the presence or absence of the first application, the first application refers to other application in advance with the second application binding;If testing result scans for exist according to Internet resources password, to obtain the same or analogous Internet resources of Internet resources identified with Internet resources password.The application can simplify search operation, improve search efficiency.

Description

Searching method and device
【Technical field】
The application is related to Internet technical field, more particularly to a kind of searching method and device.
【Background technology】
In Internet era, Internet resources increasingly enrich.User is when obtaining Internet resources, it is possible to Operation can be scanned for across application.For example, user above recognizes a film in forum's application, then go The resource downloading application searches film is simultaneously downloaded.In another example, user is respectively in shopping application A and purchase Same commodity are searched in thing application B, after the rate of exchange are carried out, are somebody's turn to do from by the purchase of a wherein shopping application Commodity.
In the prior art, when user is needed when application scans for operation, it is necessary to exit the first application, Subsequently into the second application, relevant search word is inputted in the search box that the second application is provided, is then clicked on Search button, so that the second application is scanned for and returns to search result.This way of search operation is more It is cumbersome, it is less efficient.
【The content of the invention】
The many aspects of the application provide a kind of searching method and device, to simplify search operation, improve Search efficiency.
The one side of the application there is provided a kind of searching method, including:
When the second application is opened, the net provided in automatic detection password space with the presence or absence of the first application Network resource password, first application refers to the advance other application with the described second application binding;
If testing result scans for exist according to the Internet resources password, to obtain and the net The same or analogous Internet resources of Internet resources of network resource password mark.
It is described to be scanned for according to the Internet resources password in an optional embodiment, with obtain with Before the same or analogous Internet resources of Internet resources of the Internet resources password mark, including:
On the interface of the described second application, show that the Internet resources password and search instruction enter to user Mouthful;
When receiving the search instruction that the user is sent by the search instruction entrance, basis is performed The Internet resources password is scanned for, to obtain the Internet resources phase identified with the Internet resources password The operation of same or similar Internet resources.
It is described to be scanned for according to the Internet resources password in an optional embodiment, with obtain with The same or analogous Internet resources of Internet resources of the Internet resources password mark, including:
The Internet resources password is identified, provided with the network for obtaining the Internet resources password mark The attribute tags in source;
The attribute tags of the Internet resources identified according to the Internet resources password, in the described second application pair Scanned in the network resources system answered, to obtain the Internet resources phase identified with the Internet resources password Same or similar Internet resources.
In an optional embodiment, before the described second application is opened, including:
The Internet resources password that described first application is shared is copied in the password space;Or
The first application generation simultaneously stores the Internet resources password into the password space.
It is described to be scanned for according to the Internet resources password in an optional embodiment, with obtain with After the same or analogous Internet resources of Internet resources of the Internet resources password mark, including:
The Internet resources password is deleted from the password space.
In an optional embodiment, first application is Taobao's application, and second application is Ali 1688 applications, the Internet resources password is to wash in a pan password.
The another aspect of the application is realized, the dress there is provided a kind of searcher in the second application Put including:
Detection module, for when the described second application is opened, whether automatic detection password to be deposited in space In the first Internet resources password for applying offer, first application refers to that advance applied with described second is tied up Fixed other application;
Search module, in the presence of being in the testing result of the detection module, is provided according to the network Source password is scanned for, same or analogous with acquisition and the Internet resources of Internet resources password mark Internet resources.
In an optional embodiment, described device also includes:
Display module, at the interface of the described second application, the Internet resources mouthful to be shown to user Order and search instruction entrance;
Judge module, for judging whether to receive what the user was sent by the search instruction entrance Search instruction, and when receiving the search instruction, trigger the search module and perform according to the net Network resource password is scanned for, to obtain or phase identical with the Internet resources of Internet resources password mark As Internet resources operation.
In an optional embodiment, the search module specifically for:
The Internet resources password is identified, provided with the network for obtaining the Internet resources password mark The attribute tags in source;
The attribute tags of the Internet resources identified according to the Internet resources password, in the described second application pair Scanned in the network resources system answered, to obtain the Internet resources phase identified with the Internet resources password Same or similar Internet resources.
In an optional embodiment, described device also includes:
Memory module, for the Internet resources password that the described first application is shared to be copied into the password In space.
In an optional embodiment, described device also includes:
Removing module, for the Internet resources password to be deleted from the password space.
In an optional embodiment, first application is Taobao's application, and second application is Ali 1688 applications, the Internet resources password is to wash in a pan password.
In this application, the first application and the second application share password space, when the second application is opened, The Internet resources password provided in automatic detection password space with the presence or absence of the first application;If testing result is In the presence of, then scanned for according to Internet resources password, with obtain with the Internet resources password identify network The same or analogous Internet resources of resource.As can be seen here, using technical scheme, when user across should During with scanning for operation, only the second application need to be opened, you can be automatically performed search, without user's input Relevant search word simultaneously clicks on search button, and user's operation is relatively easy, and search efficiency is higher.
【Brief description of the drawings】
, below will be to embodiment or existing in order to illustrate more clearly of the technical scheme in the embodiment of the present application The accompanying drawing used required in technology description is briefly described, it should be apparent that, in describing below Accompanying drawing is some embodiments of the present application, for those of ordinary skill in the art, is not paying creation Property work on the premise of, other accompanying drawings can also be obtained according to these accompanying drawings.
The schematic flow sheet for the searching method that Fig. 1 provides for the embodiment of the application one;
The schematic diagram of the details page for the hot item that Fig. 2 provides for another embodiment of the application;
Fig. 3 washes in a pan the interface schematic diagram of password for the generation that another embodiment of the application is provided;
The interface schematic diagram that naughty password is shown to user that Fig. 4 provides for another embodiment of the application;
The schematic diagram for the homepage of Ali 1688 that Fig. 5 provides for another embodiment of the application;
The schematic diagram for the search result that Fig. 6 provides for another embodiment of the application;
The schematic diagram of the commodity details page for user's selection purchase that Fig. 7 provides for another embodiment of the application;
The structural representation for the searcher that Fig. 8 provides for the another embodiment of the application;
The structural representation for the searcher that Fig. 9 provides for the another embodiment of the application.
【Embodiment】
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with this Shen Accompanying drawing that please be in embodiment, the technical scheme in the embodiment of the present application is clearly and completely described, Obviously, described embodiment is some embodiments of the present application, rather than whole embodiments.It is based on Embodiment in the application, those of ordinary skill in the art are obtained under the premise of creative work is not made The every other embodiment obtained, belongs to the scope of the application protection.
The schematic flow sheet for the searching method that Fig. 1 provides for the embodiment of the application one.As shown in figure 1, should Method includes:
101st, when the second application is opened, carried in automatic detection password space with the presence or absence of the first application The Internet resources password of confession, the first application refers to the other application of pre- second application binding in advance.
If the 102, testing result scans for exist according to Internet resources password, to obtain and the net The same or analogous Internet resources of Internet resources of network resource password mark.
The present embodiment provides a kind of searching method, can be performed by searcher, in the feelings across application Search is automatically performed under condition, simplifies user's operation, improves search efficiency.
In the present embodiment, it is described to scan for being primarily referred to as user's needs based in the first application across application In the information recognized and scan in being applied second.The present embodiment should not to the first application and second With being limited, but the first application and the second application need binding in advance, to share password space.Under Face is illustrated:
For example, the first application is forum's class application, such as ends of the earth forum, Mao Pu forums or forum of Netease, These forums are that a kind of interactivity is strong on internet, abundant in content and timely electronic message service system, User can obtain various information services in these forums, release news, discuss, chat etc.. Accordingly, the second application can be resource downloading class application, should such as there is provided electric donkey, BT, a sudden peal of thunder With.User recognizes some resources, such as film, it is necessary to should to resource downloading class in forum's class application With middle these resources of download.
In another example, first application and second application be different shopping class applications, be designated as shopping application A and Shopping application B.First application and the second application, as shopping class application, can be that same electric business is provided The shopping class application that difference shopping class application or different electric business are provided.It is preferred that, the first application The different shopping class applications provided with the second application for same electric business.For example, shopping application A can be naughty One in treasured, day cat, poly- to one's profit and Ali 1688 etc., accordingly, shopping application B can be It is different from one of shopping application A in Taobao, day cat, poly- to one's profit, Ali 1688 etc..Answered with doing shopping With A be Taobao apply, shopping application B be Ali 1688 apply exemplified by, user as Taobao seller, Compare and concern which type of commodity is hot item in Taobao, therefore can be scanned in Taobao To confirm hot item, then carry out according to searching for same money or similar money on hot item to Ali 1688 Buying.
In above-mentioned application scenarios, the resource searching problem across application is directed to.Can for the ease of user Internet resources needed for searching oneself in quickly being applied second, are the first application and the second application configuration Password space, the first application and the second Application share password space, the password space is used to store first Using the Internet resources password provided with the second application.Here Internet resources password is mainly used in identifying net Network resource, the corresponding Internet resources password of heterogeneous networks resource is typically different.Internet resources password is actually It is the snapshot of Internet resources details page, can be specifically generated by being replicated to Internet resources details page Internet resources password.For example, it is a kind of relatively conventional Internet resources password to wash in a pan password.
In a kind of application scenarios, the information of awareness network resource during the first user applies first, and lead to The first application generation Internet resources password is crossed, the Internet resources password is then shared with second user, example Internet resources password can be sent to second by the such as first application by wechat, QQ immediate communication tools User.For second user, first can be received by instant communication clients such as its wechat, QQ Using the Internet resources password shared, if second user is needed based on the Internet resources password in the first application Or second application in scan for, it is necessary to which the Internet resources password is copied in password space.
In another application scenarios, the information of awareness network resource during same user applies first, and Internet resources password is generated by the first application, stored Internet resources into password space by the first application, Internet resources search is carried out in subsequently being applied in order to the user based on the Internet resources password second.
When user (user here can be second user in the first above-mentioned application scenarios, or on State the user in second of application scenarios) need by during the second application searches Internet resources, it is necessary to open Second application.In the present embodiment, when the second application is opened, searcher can automatic detection password The Internet resources password provided in space with the presence or absence of the first application.If testing result is has, i.e. then mouth Make and there is the Internet resources password that the first application is provided in space, then searcher is according to the Internet resources Password is scanned for, to obtain the same or analogous network of Internet resources identified with the Internet resources password Resource.
As seen from the above analysis, in the present embodiment, the password based on the first application and the second Application share Space, when user scans for operation across application, need to only open the second application, searcher can be certainly It is dynamic to complete search, input relevant search word without user and click on search button, user's operation is relatively easy, Search efficiency is higher.
In an embodiment, above-mentioned steps 102, i.e., in the presence of testing result is, according to net Network resource password is scanned for, same or similar with acquisition and the Internet resources of Internet resources password mark Internet resources before, can show and Internet resources password and search to user on the interface of the second application Rope command entry.The search instruction entrance is used to send search instruction for user.It is more preferred, it is described Search instruction entrance, can be disposed on the search button on Internet resources password.
Further alternative, searcher can also be to user's display suppression command entry, for supplying user Send cancellation search instruction.More preferred, the cancellation command entry can be disposed on network money A cancel button on the password of source.
Based on above-mentioned, if user needs to carry out Internet resources in applying second based on the Internet resources password Search, can send search instruction by above-mentioned search instruction entrance;If user is not needed upon the network Resource password carries out Internet resources search in being applied second, can be sent by above-mentioned cancellation command entry Cancel instruction.For searcher, judge whether to receive what user was sent by search instruction entrance Search instruction, if receiving the search instruction that user is sent by search instruction entrance, is performed according to net Network resource password is scanned for, same or similar with acquisition and the Internet resources of Internet resources password mark Internet resources operation;If do not receive search instruction that user sent by search instruction entrance or Receive user and instructed by cancelling cancellation that command entry is sent, then hide the Internet resources password and Search instruction entrance.
It is further alternative, waiting time is pre-set, such as 2 seconds, 3 seconds or 5 seconds.Search dress Put after Internet resources password and search instruction entrance is shown to user, wait what user to be received sent to search Suo Zhiling cancels instruction, if not receiving the search instruction or take that user sends within default waiting time Disappear instruction, is considered as user and cancels search, then hides the Internet resources password and search instruction entrance. By setting waiting time, the time for sending search instruction or cancelling instruction is on the one hand reserved to user, just Selected in user;On the other hand it is also possible to prevent that searcher is unrestricted etc. to stay, is easy to user The second application is timely used, Consumer's Experience is improved on the whole.
In an embodiment, above-mentioned steps 102, i.e., in the presence of testing result is, according to net Network resource password is scanned for, same or similar with acquisition and the Internet resources of Internet resources password mark The implementations of Internet resources include:
Internet resources password is identified, with the attribute for the Internet resources for obtaining Internet resources password mark Label;
The attribute tags of the Internet resources identified according to Internet resources password, corresponding network is applied second Scanned in resources bank, to obtain the same or analogous net of Internet resources identified with Internet resources password Network resource.
Specifically, Internet resources password is actually the snapshot of Internet resources details page, therefore network is provided The process that source details page is identified.Described in Internet resources details page the details and advantage of Internet resources. By taking commodity details page as an example, the commodity details page mainly includes but is not limited to following information:Commodity it is basic Information table, overall displaying:Scene display, displaying etc. of posing for photograph, details displaying:Each several part material, pattern, Workmanship, function etc., product specification size, brand introduction, collocation are recommended, sales promotion information, buyer Feedback information, presentation, shopping need to know that (postage, delivery, goods return and replacement, clothes washing are maintained, sold Problem etc. afterwards), and other associated articles, hot item recommend etc..As can be seen here, can be from network The various attribute tags such as the title, classification, picture of Internet resources are identified in resource details page.
What deserves to be explained is, Internet resources may have multiple attribute tags, in search, can select All or part of attribute tags that Internet resources have are as objective attribute target attribute label, then using Internet resources Objective attribute target attribute label, second application corresponding network resources system in scan for.
The same or analogous Internet resources of Internet resources identified in above-mentioned acquisition and Internet resources password In description, the identical network resource refers to that (attribute tags here refer to use during search attribute tags Attribute tags) with Internet resources password identify Internet resources identical Internet resources;It is described similar Internet resources refer to attribute tags (attribute tags here refer to the attribute tags used during search) middle part The Internet resources identical Internet resources for dividing attribute tags to be identified with Internet resources password.As for need which Attribute tags are identical with the Internet resources that Internet resources password is identified, and can flexibly be set according to application scenarios.
Further, after Internet resources password of the searcher according to password space is scanned for, Internet resources password can be deleted from password space, can so avoid subsequently be again turned on second should Used time recycling Internet resources password is scanned for, and mitigates the burden of searcher, it is to avoid the wasting of resources.
In a concrete application scene, the first application is Taobao, and the second application is Ali 1688, network Resource password is to wash in a pan password, and user is as the seller in Taobao, it is necessary to be arrived based on the hot item in Taobao Ali 1688 purchases hot item.The flow realized using the present embodiment method is as follows:
The first step, user opens Taobao's client, is scanned in Taobao, confirms hot item.It is false If the hot item that user searches is the sweet woollen overcoat of the big code women's dress of autumn and winter money shown in Fig. 2.Fig. 2 institutes It is shown as the details page of the hot item.
Second step, user's click shares option and shares instruction to send, and Taobao's client receives point of user Instruction is enjoyed, instruction is shared according to this details page of commodity is replicated, so as to generate commodity correspondence Naughty password, as shown in Figure 3.This can be washed in a pan password by " going to paste " option and paste mouth by user Make in space, password space here is specially the pasting boards on user terminal.
3rd step, user opens the client of Ali 1688, and the client automatic detection password of Ali 1688 is empty Interior whether there is washes in a pan password;If testing result is has, to user's exhibition in the homepage of Ali 1688 Show naughty password, as shown in Figure 4;If testing result be in the absence of, show the homepage of Ali 1688, such as Shown in Fig. 5.
4th step, if user clicks on " looking for same money and similar money " button hair washed in a pan shown in Fig. 4 on password Go out search instruction, the client of Ali 1688 is corresponding in Ali 1688 automatically according to password is washed in a pan shown in Fig. 4 Commodity are scanned in storehouse, with obtain it is identical with the sweet woollen overcoat of big code women's dress of autumn and winter money shown in Fig. 2 or Similar overcoat is used as search result.A kind of search result is as shown in Figure 6.
5th step, user selects the commodity oneself admired to be placed an order from search result.Assuming that user selects First overcoat in search result shown in Fig. 6 is selected, into the details page of the overcoat, as shown in fig. 7, Placed an order in details page and complete the procurement process of the overcoat.
As can be seen here, the method provided using the present embodiment, when user is carried out across Taobao and Ali 1688 During search operation, after Ali 1688 is opened, Ali 1688 can be automatically performed search, without user Input relevant search word simultaneously clicks on search button, and user's operation is relatively easy, and search efficiency is higher, and then Improve the efficiency of user's commodities purchased.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore by its all table State as a series of combination of actions, but those skilled in the art should know, the application is not by being retouched The limitation for the sequence of movement stated, because according to the application, some steps can be using other orders or same Shi Jinhang.Secondly, those skilled in the art should also know, embodiment described in this description belongs to In preferred embodiment, necessary to involved action and module not necessarily the application.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment The part of detailed description, may refer to the associated description of other embodiment.
The structural representation for the searcher that Fig. 8 provides for the another embodiment of the application.The searcher can Search is being automatically performed in the case of application, is simplifying user's operation, improves search efficiency.It is described across should Needed with scanning for being primarily referred to as user based on the information recognized in being applied first in the second application In scan for.The present embodiment is not limited the first application and the second application.Specifically, search dress Put to be located in the second application and realize.As shown in figure 8, the device includes:Detection module 81 and search Module 82.
Detection module 81, for when the second application is opened, whether there is the in automatic detection password space The Internet resources password that one application is provided, the first application refers to other application in advance with the second application binding.
Search module 82, in the presence of being in the testing result of detection module 81, according to Internet resources mouthful Order is scanned for, to obtain the same or analogous Internet resources of Internet resources identified with Internet resources password.
In an optional embodiment, as shown in figure 9, the searcher also includes:Display module 83 With judge module 84.
Display module 83, in the presence of being in the testing result of detection module 81, on the boundary of the second application On face, Internet resources password and search instruction entrance are shown to user.
Judge module 84, for judging whether to receive the search instruction that user is sent by search instruction entrance, And when receiving search instruction, triggering search module 82 is performed to be scanned for according to Internet resources password, with Obtain the operation of the same or analogous Internet resources of Internet resources identified with Internet resources password.
In an optional embodiment, search module 82 is particularly used in:
Internet resources password is identified, with the attribute mark for the Internet resources for obtaining Internet resources password mark Label;
The attribute tags of the Internet resources identified according to Internet resources password, are provided in the second corresponding network of application Source is scanned in storehouse, is provided with obtaining the same or analogous network of Internet resources identified with Internet resources password Source.
In an optional embodiment, as shown in figure 9, the searcher also includes:Memory module 85.
Memory module 85, for before the second application is opened, by first using the Internet resources shared Password is copied in password space, is that detection module 81 provides Internet resources password.
In an optional embodiment, as shown in figure 9, the searcher also includes:Removing module 86.
Removing module 86, for being scanned in search module 82 according to Internet resources password, with obtain with Internet resources password mark the same or analogous Internet resources of Internet resources after, by Internet resources password from Deleted in password space.
Optionally, first application and second application be different shopping class applications, be designated as shopping application A and Shopping application B.First application and the second application, as shopping class application, can be that same electric business is provided The shopping class application that difference shopping class application or different electric business are provided.It is preferred that, the first application The different shopping class applications provided with the second application for same electric business.For example, shopping application A can be naughty One in treasured, day cat, poly- to one's profit and Ali 1688 etc., accordingly, shopping application B can be It is different from one of shopping application A in Taobao, day cat, poly- to one's profit, Ali 1688 etc..
In a concrete application scene, the first application is Taobao, and the second application is Ali 1688, network Resource password is to wash in a pan password, and user is as the seller in Taobao, the search that can be provided by the present embodiment Device purchases hot item based on the hot item in Taobao to Ali 1688.
The searcher that the present embodiment is provided, is realized in the second application, when the second application is opened, The Internet resources password provided in automatic detection password space with the presence or absence of the first application;If testing result is In the presence of, then scanned for according to Internet resources password, with obtain with the Internet resources password identify network The same or analogous Internet resources of resource.As can be seen here, when user scans for operation across application, use Family need to only open the second application, and the searcher that the present embodiment is provided can be automatically performed search, without use Family inputs relevant search word and clicks on search button, and user's operation is relatively easy, and search efficiency is higher.
It is apparent to those skilled in the art that, it is for convenience and simplicity of description, above-mentioned to retouch The specific work process for the system, apparatus, and unit stated, may be referred to the correspondence in preceding method embodiment Process, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, device and Method, can be realized by another way.For example, device embodiment described above is only to show Meaning property, for example, the division of the unit, only a kind of division of logic function can when actually realizing To there is other dividing mode, such as multiple units or component can combine or be desirably integrated into another System, or some features can be ignored, or not perform.It is another, it is shown or discussed each other Coupling or direct-coupling or communication connection can be the INDIRECT COUPLING of device or unit by some interfaces Or communication connection, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, make It can be for the part that unit is shown or may not be physical location, you can with positioned at a place, Or can also be distributed on multiple NEs.Can select according to the actual needs part therein or Person's whole units realize the purpose of this embodiment scheme.
In addition, each functional unit in the application each embodiment can be integrated in a processing unit In or unit be individually physically present, can also two or more units be integrated in one In individual unit.Above-mentioned integrated unit can both be realized in the form of hardware, it would however also be possible to employ hardware adds The form of SFU software functional unit is realized.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in a computer In read/write memory medium.Above-mentioned SFU software functional unit is stored in a storage medium, including some fingers Order is to cause a computer equipment (can be personal computer, server, or network equipment etc.) Or processor (processor) performs the part steps of each embodiment methods described of the application.And it is foregoing Storage medium include:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, ROM), Random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various Can be with the medium of store program codes.
Finally it should be noted that:Above example is only to the technical scheme for illustrating the application, rather than to it Limitation;Although the application is described in detail with reference to the foregoing embodiments, the ordinary skill of this area Personnel should be understood:It can still modify to the technical scheme described in foregoing embodiments, or Person carries out equivalent substitution to which part technical characteristic;And these modifications or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of each embodiment technical scheme of the application.

Claims (12)

1. a kind of searching method, it is characterised in that including:
When the second application is opened, the network provided in automatic detection password space with the presence or absence of the first application Resource password, first application refers to the advance other application with the described second application binding;
If testing result scans for exist according to the Internet resources password, to obtain and the network The same or analogous Internet resources of Internet resources of resource password mark.
2. according to the method described in claim 1, it is characterised in that described according to the Internet resources password Scan for, to obtain the same or analogous Internet resources of Internet resources identified with the Internet resources password Before, including:
On the interface of the described second application, the Internet resources password and search instruction entrance are shown to user;
When receiving the search instruction that the user is sent by the search instruction entrance, perform according to institute Internet resources password is stated to scan for, with obtain with the Internet resources password mark Internet resources it is identical or The operation of similar Internet resources.
3. according to the method described in claim 1, it is characterised in that described according to the Internet resources password Scan for, to obtain the same or analogous Internet resources of Internet resources identified with the Internet resources password, Including:
The Internet resources password is identified, to obtain the Internet resources of the Internet resources password mark Attribute tags;
The attribute tags of the Internet resources identified according to the Internet resources password, in the described second application correspondence Network resources system in scan for, with obtain with the Internet resources password mark Internet resources it is identical or Similar Internet resources.
4. according to the method described in claim 1, it is characterised in that before the described second application is opened, Including:
The Internet resources password that described first application is shared is copied in the password space;Or
The first application generation simultaneously stores the Internet resources password into the password space.
5. according to the method described in claim 1, it is characterised in that described according to the Internet resources password Scan for, to obtain the same or analogous Internet resources of Internet resources identified with the Internet resources password Afterwards, including:
The Internet resources password is deleted from the password space.
6. the method according to claim any one of 1-5, it is characterised in that first application is naughty Baoying County is used, and second application is applied for Ali 1688, and the Internet resources password is to wash in a pan password.
7. a kind of searcher, is realized, it is characterised in that described device includes in the second application:
Detection module, for when the described second application is opened, automatic detection password to whether there is in space The Internet resources password that first application is provided, first application refers to advance and the described second application binding Other application;
Search module, in the presence of being in the testing result of the detection module, according to the Internet resources Password is scanned for, to obtain the same or analogous network of Internet resources identified with the Internet resources password Resource.
8. device according to claim 7, it is characterised in that also include:
Display module, at the interface of the described second application, the Internet resources password to be shown to user With search instruction entrance;
Judge module, for judging whether that receiving the user passes through searching that the search instruction entrance is sent Suo Zhiling, and when receiving the search instruction, trigger the search module and perform according to network money Source password is scanned for, to obtain the same or analogous net of Internet resources identified with the Internet resources password The operation of network resource.
9. device according to claim 7, it is characterised in that the search module specifically for:
The Internet resources password is identified, to obtain the Internet resources of the Internet resources password mark Attribute tags;
The attribute tags of the Internet resources identified according to the Internet resources password, in the described second application correspondence Network resources system in scan for, with obtain with the Internet resources password mark Internet resources it is identical or Similar Internet resources.
10. device according to claim 7, it is characterised in that also include:
Memory module, for the Internet resources password that the described first application is shared to be copied into the password In space.
11. device according to claim 7, it is characterised in that also include:
Removing module, for the Internet resources password to be deleted from the password space.
12. the device according to claim any one of 7-11, it is characterised in that first application is Taobao is applied, and second application is applied for Ali 1688, and the Internet resources password is to wash in a pan password.
CN201610139744.0A 2016-03-11 2016-03-11 Searching method and device Active CN107180049B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610139744.0A CN107180049B (en) 2016-03-11 2016-03-11 Searching method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610139744.0A CN107180049B (en) 2016-03-11 2016-03-11 Searching method and device

Publications (2)

Publication Number Publication Date
CN107180049A true CN107180049A (en) 2017-09-19
CN107180049B CN107180049B (en) 2020-12-18

Family

ID=59830385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610139744.0A Active CN107180049B (en) 2016-03-11 2016-03-11 Searching method and device

Country Status (1)

Country Link
CN (1) CN107180049B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108710699A (en) * 2018-05-23 2018-10-26 陈达康 Dynamic password formation method, apparatus and system
CN109933728A (en) * 2019-03-25 2019-06-25 北京达佳互联信息技术有限公司 Method, apparatus, system, electronic equipment and the storage medium of commending contents
CN110011896A (en) * 2018-11-06 2019-07-12 阿里巴巴集团控股有限公司 A kind of data processing method and device, a kind of calculating equipment and storage medium
CN110866796A (en) * 2018-08-28 2020-03-06 阿里巴巴集团控股有限公司 Information display method, information acquisition method, system and equipment
WO2020220782A1 (en) * 2019-04-29 2020-11-05 北京字节跳动网络技术有限公司 Information sharing method and apparatus, and device and medium
CN111966506A (en) * 2020-07-22 2020-11-20 招联消费金融有限公司 Content sharing method based on different application programs and computer equipment
WO2022166690A1 (en) * 2021-02-08 2022-08-11 支付宝(杭州)信息技术有限公司 Information processing method, apparatus and device, and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065178A (en) * 2012-12-14 2013-04-24 北京奇虎科技有限公司 Share device, visit device and share method of two-dimension code
CN103458057A (en) * 2013-09-30 2013-12-18 小米科技有限责任公司 Resource acquiring method, device and server
CN104182521A (en) * 2014-08-25 2014-12-03 北京奇虎科技有限公司 Method and device for searching information and electronic equipment
CN104572969A (en) * 2014-12-31 2015-04-29 乐视致新电子科技(天津)有限公司 Cross-application related resource information acquisition method and device
CN104641613A (en) * 2012-02-24 2015-05-20 韦斯技术有限公司 Information sharing using token received using visual tag
CN104657423A (en) * 2015-01-16 2015-05-27 北京合辉信息技术有限公司 Method and device thereof for sharing contents of applications
CN105100141A (en) * 2014-05-04 2015-11-25 腾讯科技(深圳)有限公司 Multimedia content network sharing method, multimedia content network sharing device and multimedia content network sharing system
CN105122237A (en) * 2013-02-27 2015-12-02 奎克西公司 Sharing application states
CN105224674A (en) * 2015-10-16 2016-01-06 惠州Tcl移动通信有限公司 A kind of intelligent search method based on mobile device and system
US20160007387A1 (en) * 2014-06-29 2016-01-07 Tetherball Technology, LLC Automatic Wireless Grid Access Sharing and Monetization from a Mobile Device App

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104641613A (en) * 2012-02-24 2015-05-20 韦斯技术有限公司 Information sharing using token received using visual tag
CN103065178A (en) * 2012-12-14 2013-04-24 北京奇虎科技有限公司 Share device, visit device and share method of two-dimension code
CN105122237A (en) * 2013-02-27 2015-12-02 奎克西公司 Sharing application states
CN103458057A (en) * 2013-09-30 2013-12-18 小米科技有限责任公司 Resource acquiring method, device and server
CN105100141A (en) * 2014-05-04 2015-11-25 腾讯科技(深圳)有限公司 Multimedia content network sharing method, multimedia content network sharing device and multimedia content network sharing system
US20160007387A1 (en) * 2014-06-29 2016-01-07 Tetherball Technology, LLC Automatic Wireless Grid Access Sharing and Monetization from a Mobile Device App
CN104182521A (en) * 2014-08-25 2014-12-03 北京奇虎科技有限公司 Method and device for searching information and electronic equipment
CN104572969A (en) * 2014-12-31 2015-04-29 乐视致新电子科技(天津)有限公司 Cross-application related resource information acquisition method and device
CN104657423A (en) * 2015-01-16 2015-05-27 北京合辉信息技术有限公司 Method and device thereof for sharing contents of applications
CN105224674A (en) * 2015-10-16 2016-01-06 惠州Tcl移动通信有限公司 A kind of intelligent search method based on mobile device and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108710699A (en) * 2018-05-23 2018-10-26 陈达康 Dynamic password formation method, apparatus and system
CN110866796A (en) * 2018-08-28 2020-03-06 阿里巴巴集团控股有限公司 Information display method, information acquisition method, system and equipment
CN110011896A (en) * 2018-11-06 2019-07-12 阿里巴巴集团控股有限公司 A kind of data processing method and device, a kind of calculating equipment and storage medium
CN109933728A (en) * 2019-03-25 2019-06-25 北京达佳互联信息技术有限公司 Method, apparatus, system, electronic equipment and the storage medium of commending contents
WO2020220782A1 (en) * 2019-04-29 2020-11-05 北京字节跳动网络技术有限公司 Information sharing method and apparatus, and device and medium
CN111966506A (en) * 2020-07-22 2020-11-20 招联消费金融有限公司 Content sharing method based on different application programs and computer equipment
CN111966506B (en) * 2020-07-22 2024-03-22 招联消费金融股份有限公司 Content sharing method based on different application programs and computer equipment
WO2022166690A1 (en) * 2021-02-08 2022-08-11 支付宝(杭州)信息技术有限公司 Information processing method, apparatus and device, and medium

Also Published As

Publication number Publication date
CN107180049B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN107180049A (en) Searching method and device
CN107340944B (en) The display methods and device of interface
CN104778621B (en) Clap the implementation method for selling business and client and server-side
CN107622434B (en) Information processing method, system and intelligent device
CN106408367A (en) Order information obtaining method and device
CN109325776A (en) Return of goods code generates and return of goods method, apparatus, equipment and its storage medium
CN114726947B (en) Message display method, device, user terminal and readable storage medium
CN108804456A (en) Chat sessions based on the knowledge base specific to object
CN105894256A (en) Portable online-shopping goods real-time getting system
CN111476637A (en) Commodity information management method, host platform and commodity information management assembly
CN111428131A (en) Information pushing method, device and system
CN112740228A (en) Visual search engine
CN108805577A (en) Information processing method, device, system, computer equipment and storage medium
CN108304120B (en) Information component processing method and device
CN105787777A (en) Information processing method and apparatus
CN109218507A (en) The methods, devices and systems of task execution
CN110084675A (en) Commodity selling method, the network terminal and the device with store function on a kind of line
CN107784541A (en) The method and device of data object information is provided
CN106528753A (en) Data searching method and apparatus
CN111274105B (en) Webpage operation playback and collection method, computing device, storage medium and system
CN110427144A (en) Virtual examination cosmetic method and device
KR102411402B1 (en) Integrated image retrieval system
US20200342522A1 (en) System and Method for Developing Voice Interactive Ecommerce Store
CN111199443A (en) Commodity information processing method, commodity information processing device and computer-readable storage medium
CN109285057A (en) Applied to the dress ornament acquisition methods of express delivery cabinet, device, express delivery cabinet and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1244326

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant