CN112306596A - Information interaction method and device and electronic equipment - Google Patents

Information interaction method and device and electronic equipment Download PDF

Info

Publication number
CN112306596A
CN112306596A CN202010385847.1A CN202010385847A CN112306596A CN 112306596 A CN112306596 A CN 112306596A CN 202010385847 A CN202010385847 A CN 202010385847A CN 112306596 A CN112306596 A CN 112306596A
Authority
CN
China
Prior art keywords
contact
user
application
target
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010385847.1A
Other languages
Chinese (zh)
Inventor
马轩妮
张欣
和君
杨超凡
苑爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010385847.1A priority Critical patent/CN112306596A/en
Publication of CN112306596A publication Critical patent/CN112306596A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Abstract

The embodiment of the disclosure discloses an information interaction method, an information interaction device and electronic equipment. One embodiment of the method comprises: in response to receiving a request for accessing a first contact list of a first application, which is sent when a first user logs in a second application for the first time, determining a second contact from first contacts in the first contact list, wherein the second contact is a user of the second application; adding the second contact to a second contact list of the second application. The operation of adding the contact in the contact list by the user is simplified.

Description

Information interaction method and device and electronic equipment
Technical Field
The embodiment of the disclosure relates to the technical field of internet, in particular to an information interaction method, an information interaction device and electronic equipment.
Background
With the development of internet technology, users can communicate with other users through the internet. For example, the network multimedia conference can realize real-time transmission of communication information in the forms of moving images, voice, application data (electronic whiteboards, graphics) and the like between two points and multiple points.
Generally, a user can implement information communication using an application installed in a terminal device for implementing information communication. In the above application, the user may add the contact in the application by manually inputting the contact.
Disclosure of Invention
This disclosure presents concepts in a simplified form that are described in detail below in the detailed description. This disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the disclosure provide an information interaction method, an information interaction device and electronic equipment.
In a first aspect, some embodiments of the present disclosure provide an information interaction method, including: in response to receiving a request for accessing a first contact list of a first application, which is sent when a first user logs in a second application for the first time, determining a second contact from first contacts in the first contact list, wherein the second contact is a user of the second application; adding the second contact to a second contact list of the second application.
In a second aspect, some embodiments of the present disclosure provide an information interaction apparatus, including: the determining unit is used for responding to a request for accessing a first contact list of a first application sent when a first user logs in a second application for the first time, and determining a second contact from first contacts in the first contact list, wherein the second contact is a user of the second application; an adding unit, configured to add the second contact to a second contact list of the second application.
In a third aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to perform a method according to the first aspect.
In a fourth aspect, some embodiments of the disclosure provide a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements the method of the first aspect.
According to the information interaction method, the information interaction device and the electronic equipment, a second contact person is determined from first contact persons in a first contact person list by responding to a request for accessing the first contact person list of a first application, wherein the request is sent when the first user logs in a second application for the first time, and the second contact person is a user of the second application; adding the second contact to a second contact list of the second application. Compared with the scheme that in the prior art, the application information which becomes the second contact is required to be sent to each first contact, and the first contact is used as the second contact to be added to the second contact list according to the agreement of the first contact, the scheme simplifies the operation of adding the second contact in the second contact list by the first user, and saves the user time.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
FIG. 1 is a flow diagram of some embodiments of an information interaction method according to the present disclosure;
FIGS. 2A-2C are schematic diagrams of an application scenario of an information interaction method according to the present disclosure;
FIG. 3 is a flow diagram of further embodiments of information interaction methods according to the present disclosure;
FIG. 4 is a schematic block diagram of some embodiments of an information interaction device according to the present disclosure;
FIG. 5 is an exemplary system architecture to which the information interaction method of one embodiment of the present disclosure may be applied;
FIG. 6 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Referring to fig. 1, a flow diagram of some embodiments of an information interaction method according to the present disclosure is shown. The information interaction method comprises the following steps:
step 101, in response to receiving a request for accessing a first contact list of a first application when a first user logs in a second application for the first time, determining a second contact from first contacts in the first contact list.
The first user here may be any user. A plurality of Applications (APP) may be installed in a terminal device used by a first user. The first application may be an application installed in the terminal device. As an example, the first application may be, for example, a mobile phone address book.
The first contact list may be a contact list provided in the first application. The first contact list may include a plurality of first contacts and a contact address corresponding to each first contact.
The contact information corresponding to the first contact may include, for example, a phone number of the first contact, a mailbox account, a user account of an application used by the first contact (for example, including but not limited to an instant messaging application and/or a shopping application), and the like.
The second application here may be any application, such as a multimedia conferencing application or the like.
The first user may install the above-described second application in the terminal device that the first user uses. After installing the second application, the first user may input registration information through the second application client. The registration information may include, for example, a user account of the first user using the second application and a contact address bound to the user himself. The contact means bound to the user may include, for example, a telephone number of the user, a mailbox account, and the like. The terminal device may send the registration information of the first user to a server of a second application through a second application client, so that the server checks a user account, a contact way, and the like of the first user. After the verification is passed, the account server may perform association recording on the user account and the contact information of the first user. The first user can log in the second application by using the user account.
And when the first user logs in the second application for the first time, the second contact list of the second application is empty. The first user may add the second contact in the second contact list of the second application in various ways.
The second contact list refers to a contact list provided in the second application. The first contact list and the second contact list are used herein to distinguish between the contact list corresponding to the first application and the contact list corresponding to the second application. The second contact here refers to a contact appearing in the second contact list described above.
It will be appreciated that in the event that the second contact list of the first user is not empty, one or some of the contacts present in the first contact list of the first user may be present in the second contact list of the first user at the same time.
For example, the first user may select a method of sending sharing encoded information to a first contact corresponding to the first application, and invite the first contact to become a second contact of the first user. The encoded information may include user information of the first user. The encoded information may include bar code information, two-dimensional code information, link information, and the like.
The first user may issue a request to access the first contact list of the first application in a variety of ways.
And executing selection operations such as clicking and touch control on the identifier of the first application displayed on the second application interface, and further sending a request for accessing the first contact list of the first application to the terminal equipment.
The terminal device may determine the second contact from the first contact list by various methods. The second contact is a user of a second application. The user of the second application refers to a user who submits registration information through the client of the second application and passes the verification of the registration information.
In practice, the terminal device may send information of the first contact in the first contact list to the server, and the server determines the second contact from the first contact in the first contact list. For example, the server may use a contact in the first contact list whose contact address matches the contact address stored in the server as the second contact.
In an optional implementation manner of some embodiments, before the step 101, the method further includes the following steps:
firstly, in response to the fact that the first user logs in the second application for the first time, displaying a contact person adding control in a display interface of the second application after logging in.
The contact addition control herein may be any form of control for instructing the first user to add a contact.
And then, based on the preset operation of the first user on the contact adding control, presenting contact adding selection items, wherein the contact adding selection items comprise a first selection item for representing that a second contact is added by accessing the first contact list.
The contact addition option here may include a plurality of options for adding the second contact. The options may include, for example, a share code information option, a search option, and the first option.
The sharing code information selection item is used for providing a contact adding mode for inviting other users to become second contacts of the first user in a mode of sharing code information for the first user.
When the first user selects the sharing code information option, the code information corresponding to the first user can be sent to other users. The encoded information is used to invite other users to become second contacts of the second application of the first user. The encoded information may include, for example, a barcode, a two-dimensional code, a link, and the like of the user information of the first user. The user information of the first user may include, for example: a user account, a contact address, etc. of the first user.
The search selection item is used for providing a contact adding mode for the first user to add the contact of the second application to the other users by searching the information of the other users.
When the first user selects the search option, the first user can search by using the contact information and the user account of other users to obtain a search result. The first user may add contacts for which other users become the second application of the first user in a manner that the first user may click on information of other users that is visible to the search in the search results.
Further optionally, the above, in response to monitoring that the first user logs in the second application for the first time, displaying a contact addition control in a display interface of the second application after logging in, may include: and in response to the fact that the first user logs in the second application for the first time, displaying the contact person adding control and guiding information of the added contact person for guiding the first user to use the contact person adding control in a display interface of the second application after logging in.
The guidance information here may include a dynamic logo exposed around the contact addition control, a bubble map populated with information indicating that the user clicked on the contact addition control, and so on. The guidance information here may be any information for guiding the first user to add the second contact.
The first user can execute preset operation on the contact person adding control according to the guiding information. The second application can display the contact person adding selection item according to the preset operation executed by the first user on the contact person adding control. The preset operation may be, for example, a selection operation such as touch control and click.
The guide information guides the user to execute the preset operation on the contact adding control, and convenience is provided for the user who uses the second application for the first time to add the second contact.
Then, based on the selection operation of the first user on the first selection item, it is determined that a request sent by the first user to access the first contact list of the first application is received.
And setting a contact person adding control in the display interface of the second application, so that the operation complexity of adding the second contact person by the user can be reduced.
In an optional implementation manner of some embodiments, the determining, in response to receiving a request for accessing the first contact list of the first application when the first user logs in the second application for the first time, the second contact from the first contacts in the first contact list includes: and sending the contact information corresponding to the first contact in the first contact list to the server so as to indicate the server to determine the second contact from the first contact based on the contact information.
In these alternative implementations, the server may determine the second contact from the first contact based on the following steps:
first, whether the first contact is a user of the second application is determined according to the contact way of the first contact.
In these alternative implementations, the server may be a server of the second application. The server of the second application may store the user account list, or the server may access the user account list stored in the other electronic device through the communication connection. The user account list may store user accounts of a plurality of users and contact manners corresponding to the user accounts respectively in an associated manner. The contact information includes a telephone number, a mailbox account and the like.
The terminal device may send the contact information corresponding to each first contact in the first contact list to the server. The server may match the contact information of each first contact in the user account list. And if the matching is successful, determining that the first contact is the user of the second application. And if the matching is not successful, determining that the first contact person is not the user of the second application.
Second, the first contact determined to be the user of the second application is taken as a candidate second contact.
And thirdly, acquiring an attribute value of a first preset user attribute of the candidate second contact, and determining whether the attribute value meets a first preset condition.
Here, the first preset user attribute is used for characterizing the search visibility of other users of the second application searching candidate contacts through a preset contact way.
The attribute values may include attribute values indicating that the search for the visible attribute values is performed by the search method and attribute values indicating that the search for the invisible attribute values is performed by the search method.
Fourthly, in response to the fact that the attribute values meet the first preset condition, the candidate second contact is used as the second contact of the first user, and the second contact is added to the second contact list.
The first preset condition may be, for example, that the attribute value representation of the search visibility is found by being searched in the search mode.
The server side can feed back the contact information of the first contact person determined as the second contact person of the first user to the terminal equipment. The terminal device may search the first contact list for the user name of the first contact corresponding to the contact information. And the terminal equipment takes the searched user name corresponding to the contact way and the contact way as the information of the second contact person and adds the information into a second contact person list of the second application. Thereby enabling the addition of a second contact in the second contact list.
In some application scenarios, when the terminal device sends the contact information of each first contact in the first contact list to the server, the terminal device may also send the user name of each first contact to the server. The server may match the contact information of each first contact in the user account list. And if the matching is successful, determining that the first contact is the user of the second application, and determining the first contact as a candidate second contact of the first user. And if the matching is not successful, determining that the first contact person is not the user of the second application. And after determining the second contact from the candidate second contacts according to the attribute value of the first preset user attribute of each candidate second contact, sending the user name and the contact mode of the first contact determined as the second contact of the first user to the terminal equipment. The terminal device may directly add the user name and the contact address of the first contact as information of a second contact of a second application to the second contact list. In these application scenarios, the server directly returns the user name and the contact address of the second contact determined as the first user, and the terminal device may directly add the user name and the contact address of the second contact to the second contact list. The searching operation that the terminal equipment uses the contact way to search the contact user name in the first contact list after the contact way determined as the second contact is returned by the server side can be reduced. On the one hand, the burden of the terminal device can be reduced, and on the other hand, the efficiency of adding a plurality of second contacts in the second contact list can be improved.
In these alternative implementations, a first contact of a first application (the first contact being a user of a second application) whose attribute value of a first preset user attribute satisfies a preset condition may be added to the second contact list. Thereby enabling the addition of contacts based on the first preset user attribute settings of other users. On the one hand, the privacy of the other users can be maintained, and on the other hand, the other users can be prevented from unnecessary disturbance.
Step 102, adding the second contact to a second contact list of the second application.
In this embodiment, when a first user logs in a second application for the first time, a plurality of second contacts are determined from first contacts in a first contact list by calling the first contact list of the first application, and the plurality of second contacts are added to a second contact list of the second application at one time.
In some application scenarios, upon receiving a request from a first user to access a first contact list of a first application, the first contact list may be presented in a presentation interface of a second application.
After the second contact is added to the second contact of the second application, for any first contact added as the second contact of the second application, an identifier for characterizing the added second contact may be added to information of the first contact in the first contact list displayed on the second application display interface.
In the information interaction method provided by this embodiment, a second contact is determined from first contacts in a first contact list by responding to a request for accessing the first contact list of a first application, which is sent when a first user logs in a second application for the first time, and the second contact is a user of the second application; the second contact is added to a second contact list of a second application. According to the scheme, the plurality of second contacts can be determined from the first contacts in the first contact list, and the plurality of second contacts are added to the second contact list of the second application at one time. Compared with the scheme that the application information which becomes the second contact needs to be sent to each first contact, and the first contact is added to the second contact list as the second contact after the first contact agrees with the application information in the prior art, the scheme simplifies the operation of adding the second contact in the second contact list by the first user, and shortens the time of adding the second application contact by the user.
In an optional implementation manner of some embodiments, the information interaction method further includes the following steps:
firstly, whether an attribute value corresponding to a preset user attribute of a first user meets a preset condition is detected.
The preset user attribute here includes at least one of: the user attribute setting method comprises the steps of setting a first preset user attribute and a second preset user attribute.
The first preset user attribute is used for representing the searching visibility of the first user searched by other users of the second application through a preset contact way; the second preset user attribute is used for representing the communicability of other users of the second application for initiating real-time communication to the first user through the second application.
The attribute value of the first preset user may include a first attribute value that is visible for representing that the other users search for the first user through a preset contact manner, and a second attribute value that is invisible for representing that the other users search for the first user through the preset contact manner.
The attribute values of the second preset user attribute may include a third attribute value used for characterizing that other users of the second application may initiate real-time communication to the first user through the second application, and a fourth attribute value used for characterizing that other users of the second application may not initiate real-time communication to the first user through the second application.
The preset condition may be, for example, that the attribute value of the first preset user attribute is a first attribute value that is used for representing that the other users search for the first user through a preset contact manner and is visible for searching; and/or the attribute value of the second preset user attribute is a third attribute value used for representing that other users of the second application can initiate real-time communication to the first user through the second application.
And secondly, in response to the fact that the attribute value corresponding to the preset user attribute of the first user does not meet the preset condition, displaying attribute setting prompt information for prompting the first user to set the preset user attribute on a display interface of the second application.
In these optional implementation manners, when the attribute value of the preset user attribute of the first user does not satisfy the preset condition, the attribute setting prompt message may be displayed in a display interface of the second application. And prompting the first user to set the attribute value of the preset user attribute to meet the preset condition through the prompt messages.
When the attribute value of the preset user attribute of the first user meets the preset condition, for example, the attribute value of the first preset user attribute is a first attribute value, the second user may search the first user through a preset contact manner. The second user may add the first user to a second contact list of the second user for the second application. For another example, when the attribute value of the second preset user attribute is a third attribute value, the second user may be allowed to initiate a real-time call to the first user.
The attribute value can be set by the user through the preset user attribute, so as to determine whether the user is allowed to be searched by other users, and whether the other users are allowed to initiate real-time conversation to the user, and the personalized setting of the user can be realized.
Further, the information interaction method may further include the following steps:
and displaying a property setting control for setting the property of the preset user in response to receiving the selection operation of the first user on the property setting prompt message.
The property setting control here may include a selection item for presetting a property value corresponding to the user property. For example, the first attribute value selection item and the second attribute value selection item corresponding to the first preset user attribute, and the third attribute value selection item and the fourth attribute value selection item corresponding to the second preset user attribute. The user can set the attribute value of the preset user attribute through the selection operation performed on the above selection item. Thereby, the operation of setting the attribute values of the preset user attributes can be simplified.
In an optional implementation manner of some embodiments, the information interaction method further includes: presenting a current status of the second contact in a second contact list of the second application, the current status comprising one of: online, offline, busy. In some application scenarios, if the second application is a multimedia conference application, if the current state is busy, it may indicate that the user is currently in a multimedia conference. The multimedia conference here may be, for example, real-time multimedia communication with other users in a one-to-one manner, or multi-user real-time multimedia communication with other users.
In these alternative implementations, the first user may be made aware of the dynamics of the second contact in real time by presenting the current status of the second contact.
In an optional implementation manner of some embodiments, the information interaction method further includes: and determining a target first contact person from the first contact person list, and displaying the information of the target first contact person.
Here, the target first contact is a first contact of a user who is not the second application, and/or a first contact which is not visible in the second application through a preset contact method is set. The information of the target first contact is included in the number information of the searched target first contact in the first contact list.
In these alternative implementations, the information of the target first contact may be presented in a presentation interface of the second application.
For example, a first contact list may be presented in the presentation interface described above. Information of the target first contact may be presented in the first contact list. The information of the target first contact may be information of the number of the target first contacts searched in the first contact list. I.e. the number of second contacts in the first contact list that have not become the first user.
In an optional implementation manner of some embodiments, the information of the target first contact includes a name and a contact address of the target first contact, and the information of the target first contact is presented, including the following steps:
firstly, a plurality of target first contacts are sorted according to a preset rule.
Here, the sorting the plurality of target first contacts according to the preset rule may include, for example, sorting according to the length of time that the target first contacts become the contacts of the first user, sorting according to the names of the target first contacts, sorting according to the contact ways of the target first contacts, and the like.
And secondly, sequentially displaying the names and the contact ways of the target first contacts according to the sorting result.
Here, the names and the contact ways corresponding to the plurality of target first contacts may be sequentially presented in an order from a smaller ranking number to a larger ranking number.
In some application scenarios, the plurality of target first contacts may be ordered according to a historical frequency of common use of the second application.
As an example, the plurality of target first contacts may be ordered by at least an order of how often the first user and the target first contacts use the second application in common.
In these application scenarios, the target first contact with the high historical frequency of commonly using the second application is preferentially shown, increasing the probability that the target first contact with the high historical frequency of commonly using the second application is added as the second contact. Through the display mode of the target first contacts, the target first contact with high interaction frequency can be recommended to the first user to become the second contact. Further, the usage rate of the second application can be increased.
In an optional implementation of some embodiments, the information of the target first contact includes invitation prompt information for inviting the target first contact to become a user of the second application. The information interaction method further comprises the following steps:
and responding to the received selection operation of the first user on the invitation prompt information, and sending first invitation information for inviting the target first contact to become a user of the second application to the target first contact.
The invitation prompt message may be a prompt message prompting to invite the plurality of target first contacts to become users of the second application. In some application scenarios, when the first user performs selection operations such as clicking and touch on the invitation prompting message, the first invitation message may be sent to respective corresponding contact ways of the plurality of target first contacts at the same time.
In other application scenarios, when the first user performs selection operations such as clicking, touch and the like on the invitation prompt message, the target first contact list may be displayed on a display interface of the second application. The target first contact list comprises information of a plurality of target first contacts which are sequentially arranged. The information for each target first contact may include an invitation information sending control. When the first user performs a selection operation on the invitation information sending control corresponding to a target first contact, the first user may send the first invitation information to the target first contact.
The first invitation information may include a link, for example. The target first contact may become a user of the second application by clicking on the link and become a second contact of the first user.
Further, the sending, to the target first contact, the first invitation information for inviting the target first contact to become the user of the second application in response to receiving the selection operation performed by the user on the invitation prompt information includes:
firstly, in response to receiving a selection operation executed by a first user on invitation prompt information, showing an invitation channel selection item for sending the invitation information to a target first contact person, wherein the invitation channel selection item is used for representing at least one first contact way shown by the target first contact person in a first contact person list.
Here, the first contact means may include, but is not limited to, a contact phone, a mailbox account, and the like, for example.
Secondly, determining a target contact way from at least one first contact way according to the selection operation of the first user;
and thirdly, generating first invitation information based on an invitation information template corresponding to the target contact way, and sending the first invitation information to the target first contact person.
That is, for each first contact address, the first invitation information may be generated using an invitation information template matching the first contact address. The generated first invitation information has better readability and developability in the corresponding contact way. The method is beneficial to improving the user experience.
Further, the information interaction method further comprises the following steps: in response to receiving feedback information that the target first contact is a user of the second application according to the first invitation information, adding the target first contact as a second contact in a second contact list of the first user.
In practice, when the target first contact performs the selection operation on the first invitation information, it may be determined that the target first contact wishes to become a user of the second application. Further, the target first contact and the first user are mutually set as second contacts of respective second applications.
In these optional implementations, by sending the first invitation information to the target first contact to invite the target first contact to become a user of the second application and become a second contact of the first user, on one hand, the user group of the second application may be expanded, and on the other hand, information communication between the first user and the target first contact may be facilitated.
Please further refer to fig. 2A to 2C, which illustrate schematic diagrams of an application scenario of the information interaction method according to the present disclosure.
As shown in fig. 2A, a first user logs in a client of a second application by inputting a user account or other login manners for the first time by using the terminal device 201. The display interface of the terminal device may display a presentation interface 202 of the second application. A contact addition control "contact" 203 for indicating the addition of a contact may be displayed on the presentation interface 202. In addition, the presentation interface 202 can also present guidance information 204 that guides the first user to trigger the contact addition control 203, such as "add contact by click here" as shown in FIG. 2A. The first user may perform a selection operation on the contact addition control 203. After the first user can perform a selection operation on the contact adding control 203, a contact adding selection item can be presented on the presentation interface 202. The contact addition selection item may include a first selection item characterizing addition of a second contact by accessing the first contact list. The first application here is a local address book. The first contact list is a contact list in the local address book. The first option is to open the local address book 205 as shown in fig. 2B. When the user performs a selection operation on the "open local address book" 205, an access request for accessing the first contact list is initiated. The terminal equipment can call the local address book through a preset interface. The terminal device 201 may send information of each first contact in the local address book to the server. And determining which first contacts are users of the second application and which are not users of the second application by the server side. A first contact determined to be a second application user is determined to be a candidate second contact. And then determining whether the candidate second contact is the second contact of the first user according to the attribute value of the preset user attribute of the candidate second contact. And the server client sends the contact information of the first contact person which is determined to be the second contact person of the first user to the terminal equipment. The terminal device adds the information of the first contact corresponding to the contact information to the second contact list 206 of the second application. The second contact list 206 as shown in fig. 2C includes the second contacts a1, a2, A3 identified from the first contact list. The above-mentioned second contacts a1, a2, A3 are also simultaneously users of the second application. And the attribute values of the preset user attributes of a1, a2, A3 satisfy the preset conditions described in the above embodiments. Information prompting a target first contact of a user of a non-second application searched from the first contact list may also be presented in the second contact list. For example, the information "there are 10 first contacts to add" 207 shown in fig. 2C for characterizing the number of target first contacts. The information characterizing the number of the target first contacts may also be regarded as invitation prompt information for inviting the target first contacts to the user of the second application. When the first user performs a selection operation on the "10 first contacts are to be added" 207, invitation information of the user who becomes the second application may be transmitted to the target first contact. The target first contact may become a user of the second application based on the invitation information and become a second contact of the second application with the first user.
Referring to fig. 3, a flow diagram of some embodiments of an information interaction method according to the present disclosure is shown. The information interaction method comprises the following steps:
step 301, in response to receiving a request for accessing a first contact list of a first application when a first user logs in a second application for the first time, determining a second contact from first contacts in the first contact list.
Step 302, add the second contact to a second contact list of the second application.
Step 301 and step 302 are the same as or similar to step 101 and step 102 in the embodiment shown in fig. 1, and are not repeated here.
Step 303, in response to a request for accessing the first contact list of the first application, which is sent by the first user in a non-first login state of the second application, the first contact list is invoked.
And 304, displaying a first contact list to be added in a display interface of the second application, wherein the first contact list to be added comprises information of a target first contact which is not a second contact of the first user in the first contact list.
Each first contact in the first contact list to be added may be a target first contact that is not a second contact of the first user. The information of the target first contact, which can be displayed in the first contact list to be added, may include a name of the target first contact, a contact address, and an identifier of whether the target first contact is a user of the second application; for a target first contact that is not a user of the second application, invitation prompt information may be presented to invite the target first contact to the user of the second application.
And 305, sending first invitation information for inviting the target first contact to become a user of the second application to the target first contact in response to receiving the selection operation of the first user on the invitation prompt information.
In some application scenarios, the invitation prompt message may include an invitation control for inviting the target first contact to a user of the second application. The user may click the invitation control, and send the first invitation information to the target first contact to invite the target first contact to the user of the second application.
The invitation prompt message may be a prompt message prompting to invite the plurality of target first contacts to the user of the second application. In some application scenarios, when the first user performs selection operations such as clicking and touch on the invitation prompting message, the first invitation message may be sent to respective corresponding contact ways of the plurality of target first contacts at the same time.
In other application scenarios, when the first user performs selection operations such as clicking, touch and the like on the invitation prompt message, the target first contact list may be displayed on a display interface of the second application. The target first contact list comprises information of a plurality of target first contacts which are sequentially arranged. The information for each target first contact may include an invitation information sending control. When the first user performs a selection operation on the invitation information sending control corresponding to a target first contact, the first user may send the first invitation information to the target first contact.
The first invitation information may include a link, for example. The target first contact may become a user of the second application by clicking on the link and become a second contact of the first user.
Compared with the embodiment shown in fig. 1, the provision scheme of the embodiment highlights a method for the first user to not log in the second application for the first time and add the contact corresponding to the second application. Thereby allowing the first user to add more contacts for the second application.
In an alternative implementation manner of some embodiments, the step 305 includes the following steps:
firstly, in response to receiving a selection operation executed by a user on invitation prompt information, showing an invitation channel selection item for sending the invitation information to a target first contact person, wherein the invitation channel selection item is used for representing at least one first contact way shown by the target first contact person in a first contact person list.
And secondly, according to the selection operation of the first user, determining a target contact way from at least one first contact way.
And thirdly, generating first invitation information based on the invitation template corresponding to the target contact way, and sending the first invitation information to the target first contact person.
In an optional implementation manner of some embodiments, the information interaction method further includes: in response to receiving feedback information that the target first contact is a user of the second application according to the first invitation information, adding the target first contact as a second contact in a second contact list of the first user.
In some optional implementation manners of the embodiments of the information interaction method of the present application, the information interaction method of the embodiment shown in fig. 1 and the information interaction method of the embodiment shown in fig. 3 may further include the following steps:
and displaying failure prompt information in a display interface of the second application in response to receiving failure prompt information which is sent by the server and used for prompting that the first invitation information fails.
The failure prompt message is generated by the server based on the following determination steps:
and setting the first invitation information to be in a failure state in response to the fact that the number of users who perform preset operation on the first invitation information in a preset time period exceeds a preset number threshold, and generating failure prompt information.
The preset time period may be, for example, 10 minutes, half an hour, 1 hour, or the like. The preset time period may be set according to a specific application scenario, and is not limited herein. The preset number threshold may be, for example, 50, 100, etc. The preset number threshold may be set according to a specific application scenario, and is not limited herein.
In these alternative implementations, a large number of users perform selection operation on the first invitation information within a preset time period, which often means that the first invitation information of the first user is leaked, and a user who wishes to add the first user as a contact brings an unsafe factor to the first user. At this time, the first invitation information is set to be invalid, which means that other users cannot add the first user as a contact through the leaked first invitation information any more. Thereby protecting the security of the information of the first user.
Further, the information interaction method may further include: and the server updates the invalid first invitation information and sends the updated first invitation information to the target first contact.
In some application scenarios, the server may update the first invitation information by itself.
In some other application scenarios, the server may update the first invitation information according to an update operation performed by the first user.
After updating the first invitation information, the server may send the updated first invitation information to the target first contact.
After the previous first invitation information is leaked, the first invitation information may be updated, and the updated first invitation information may be sent to the target first contact. On one hand, the information security of the first user can be improved, and on the other hand, the effective first invitation information can be sent to the target first contact person, so that the invitation success rate of inviting the target first contact person is improved.
In some optional implementation manners of the embodiments of the information interaction method of the present application, the information interaction method of the embodiment shown in fig. 1 and the information interaction method of the embodiment shown in fig. 3 may further include the following steps:
firstly, in response to receiving a communication instruction sent by a first user, sending the communication instruction to a server, and executing the following communication connection establishment steps by the server: determining whether to establish a communication connection between the first user and the target second contact based on the attribute value of the second preset user attribute of the target second contact indicated by the communication instruction; the second preset user attribute is used for representing the communicability of the user of the second application for initiating real-time communication to the target second contact through the second application.
And secondly, receiving real-time communication information of the first user in response to receiving feedback information which is returned by the server and used for representing successful establishment of the communication connection.
As an example, the first user may perform a selection operation on one of the second contacts in the second contact list and initiate a voice call instruction on the selected target second contact. The terminal equipment can send the voice call instruction to the server side. And the server determines whether to establish communication connection between the first user and the target second contact according to the attribute value of the second preset user corresponding to the target second contact indicated by the voice call instruction. And when the attribute value of the second preset user attribute is a third attribute value used for representing that a user of the second application can initiate real-time communication to the target second contact through the second application, establishing communication connection between the first user and the target second contact. And sending feedback information for successful establishment of the characterized communication connection to the first user.
And when the attribute value of the second preset user attribute is a fourth attribute value used for representing that the user of the second application cannot initiate real-time communication to the target second contact through the second application, not establishing the communication connection between the first user and the target second contact. And sending feedback information to the first user characterizing the inability to establish a communication connection between the first user and the target second contact.
That is, when the attribute value of the second preset attribute of the target second contact is the third attribute value, the first user may initiate real-time communication to the target second contact through the second application regardless of whether the target second contact has used the first user as a contact of its second application.
Further, the communication connection establishing step further includes the following substeps:
first, in response to determining to establish a communication connection between the first user and the target second contact, determining whether the first user is a second contact of a second application to which the target second contact corresponds;
secondly, in response to determining that the first user is not a second contact of a second application corresponding to the target second contact, establishing a preset association relationship between the first user and the target second contact; and
and thirdly, sending a contact adding instruction to a second application client corresponding to the target second contact to instruct the second application client to add the first user as a second contact of the target second contact to a second contact list of the target second contact.
That is, after the first user initiates real-time communication to the target second contact through the second application, if the first user is not the contact of the second application of the target second contact, the server instructs the second application client of the target second contact to add the first user as the contact of the second application of the target second contact. Therefore, the contact person of the second application is added according to the initiated real-time communication, and the operation of adding the second contact person by the user is further reduced.
With further reference to fig. 4, as an implementation of the method shown in fig. 1, the present disclosure provides some embodiments of an information interaction apparatus, which correspond to those of the method shown in fig. 1, and which can be applied in various electronic devices.
As shown in fig. 4, the information interaction apparatus of some embodiments includes: a determination unit 401 and an adding unit 402. The determining unit 401 is configured to determine, in response to receiving a request for accessing a first contact list of a first application, which is sent when a first user logs in a second application for the first time, a second contact from first contacts in the first contact list, where the second contact is a user of the second application; an adding unit 402 for adding the second contact to a second contact list of the second application. In this embodiment, specific processing of the determining unit 401 and the adding unit 402 of the information interaction apparatus and technical effects thereof may refer to related descriptions of step 101 and step 102 in the corresponding embodiment of fig. 1, which are not described herein again.
In an optional implementation manner of some embodiments, the information interaction apparatus further includes a listening unit (not shown in the figure). The monitoring unit is used for: responding to the monitoring that the first user logs in the second application for the first time, and displaying a contact person adding control in a display interface of the second application after logging in; displaying contact person adding selection items based on preset operation of a first user on a contact person adding control, wherein the contact person adding selection items comprise first selection items used for representing that a second contact person is added by accessing a first contact person list; the method includes the steps of determining that a request sent by a first user to access a first contact list of a first application is received based on a selection operation of the first user on a first selection item.
In an optional implementation manner of some embodiments, the listening unit is further configured to: in response to the fact that the first user logs in the second application for the first time, displaying a contact person adding control and guiding information of an added contact person for guiding the first user to use the contact person adding control in a display interface of the second application after logging in; and displaying the contact person adding option based on the preset operation executed by the first user on the contact person adding control according to the guiding information.
In an optional implementation manner of some embodiments, the determining unit 401 is further configured to: and sending the contact information corresponding to the first contact in the first contact list to the server so as to indicate the server to determine the second contact from the first contact based on the contact information.
In an alternative implementation of some embodiments, the server determines the second contact from the first contacts based on: determining whether the first contact person is a user of the second application according to the contact way of the first contact person; determining a first contact that is a user of the second application as a candidate second contact; acquiring an attribute value of a first preset user attribute of a candidate second contact, and determining whether the attribute value meets a first preset condition; in response to determining that the attribute value satisfies a first preset condition, taking the candidate second contact as a second contact of the first user, and adding the second contact to a second contact list; the first preset user attribute is used for representing the searching visibility of the candidate contact persons searched by other users of the second application through the preset contact ways.
In an alternative implementation manner of some embodiments, the contact adding apparatus further includes an attribute setting unit (not shown in the figure). The attribute setting unit is used for: detecting whether an attribute value corresponding to a preset user attribute of a first user meets a preset condition or not; in response to the fact that the attribute value corresponding to the preset user attribute of the first user does not meet the preset condition, displaying attribute setting prompt information for prompting the first user to set the preset user attribute on a display interface of the second application; wherein the user attributes include at least one of: the first preset user attribute is used for representing the searching visibility of the first user searched by other users of the second application through a preset contact way; the second preset user attribute is used for representing the communicability of other users of the second application for initiating real-time communication to the first user through the second application.
In an optional implementation manner of some embodiments, the attribute setting unit is further configured to: and displaying a property setting control for setting the property of the preset user in response to receiving the selection operation of the first user on the property setting prompt message.
In an optional implementation manner of some embodiments, the information interaction apparatus further includes a state display unit (not shown in the figure). The state display unit is used for: presenting a current status of the second contact in a second contact list of the second application, the current status comprising one of: online, offline, busy.
In an optional implementation manner of some embodiments, the information interaction apparatus further includes an information presentation unit (not shown in the figure). The information display unit is used for: determining a target first contact person from the first contact person list, and displaying the information of the target first contact person; the target first contact is a first contact of a non-second application user and/or is provided with a first contact which is not visible in the second application through a preset contact method, the information of the target first contact is included in the first contact list, and the number information of the searched target first contact is set.
In an optional implementation of some embodiments, the information of the target first contact includes a name of the target first contact, a contact address; and the information presentation unit is further configured to: sequencing the target first contacts according to a preset rule; and sequentially displaying the names and the contact ways of the target first contacts according to the sorting result.
In an optional implementation of some embodiments, and the information presentation unit is further configured to: the plurality of target first contacts are ranked according to a historical frequency of common use of the second application.
In an optional implementation manner of some embodiments, the determining unit 401 is further configured to: responding to a request sent by a first user for accessing a first contact list of a first application in a non-first-time login state of the first user to a second application, and calling the first contact list; and displaying a first contact list to be added in a display interface of the second application, wherein the first contact list to be added comprises information of a target first contact which is not a second contact of the first user in the first contact list.
In an optional implementation of some embodiments, the information of the target first contact includes invitation prompt information for inviting the target first contact to become a user of the second application; the information interaction device further comprises an invitation information sending unit (not shown in the figure). The invitation information sending unit is used for: and in response to receiving the selection operation of the first user on the invitation prompt message, sending first invitation message to the target first contact for inviting the target first contact to become the user of the second application.
In an optional implementation manner of some embodiments, the invitation information sending unit is further configured to: in response to receiving a selection operation executed by a first user on the invitation prompt message, showing an invitation channel option for sending the invitation message to the target first contact person, wherein the invitation channel option is used for representing at least one first contact way shown by the target first contact person in the first contact person list; according to the selection operation of a first user, determining a target contact way from at least one first contact way; and generating first invitation information based on an invitation information template corresponding to the target contact way, and sending the first invitation information to the target first contact person.
In an optional implementation of some embodiments, the adding unit 402 is further configured to: in response to receiving feedback information that the target first contact is a user of the second application according to the first invitation information, adding the target first contact as a second contact in a second contact list of the first user.
In an optional implementation manner of some embodiments, the information interaction apparatus further includes a failure information display unit (not shown in the figure). The failure information display unit is used for: responding to receiving failure prompt information which is sent by a server and used for prompting that the first invitation information fails, and displaying the failure prompt information in a display interface of a second application, wherein the failure prompt information is generated by the server based on the following determination steps: and setting the first invitation information to be in a failure state in response to the fact that the number of users who perform preset operation on the first invitation information in a preset time period exceeds a preset number threshold, and generating failure prompt information.
In an optional implementation manner of some embodiments, the service end updates the invalidated first invitation information and sends the updated first invitation information to the target first contact.
In an alternative implementation of some embodiments, the information interaction device further includes a communication unit (not shown in the figures). The communication unit is used for: responding to a communication instruction sent by a first user, sending the communication instruction to a server, and executing the following communication connection establishment steps by the server: determining whether to establish a communication connection between the first user and the target second contact based on the attribute value of the second preset user attribute of the target second contact indicated by the communication instruction; the second preset user attribute is used for representing the communicability of the user of the second application for initiating real-time communication to the target second contact through the second application; and receiving real-time communication information of the first user in response to receiving feedback information which is returned by the server and used for representing successful establishment of the communication connection.
In an optional implementation manner of some embodiments, the communication connection establishing step further includes: in response to determining to establish a communication connection between the first user and the target second contact, determining whether the first user is a second contact of a second application to which the target second contact corresponds; in response to determining that the first user is not a second contact of the second application corresponding to the target second contact, establishing a preset association between the first user and the target second contact; and sending a contact adding instruction to a second application client corresponding to the target second contact to instruct the second application client to add the first user as a second contact of the target second contact to a second contact list of the target second contact.
With further reference to fig. 5, fig. 5 illustrates an exemplary system architecture to which the information interaction method or information interaction apparatus of some embodiments of the present disclosure may be applied.
As shown in fig. 5, the system architecture may include terminal devices 501, 502, 503, a network 504, and a server 505. The network 504 serves to provide a medium for communication links between the terminal devices 501, 502, 503 and the server 505. Network 504 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The terminal devices 501, 502, 503 may interact with a server 505 over a network 504 to receive or send messages or the like. The terminal devices 501, 502, 503 may have various client applications installed thereon, such as a web browser application, a search-type application, news information, a multimedia conference-type application, and the like. The client application in the terminal device 501, 502, 503 may receive the instruction of the user, and complete the corresponding function according to the instruction of the user, for example, add a contact according to the instruction of the user.
The terminal devices 501, 502, 503 may be hardware or software. When the terminal devices 501, 502, 503 are hardware, they may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal devices 501, 502, and 503 are software, they can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., software or software modules used to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 505 may be a server providing various services, for example, receiving information of the first contact sent by the terminal devices 501, 502, and 503, analyzing the information of the first contact, and sending a result of the analysis (for example, whether the first contact is a user of the second application) to the terminal devices 501, 502, and 503.
It should be noted that the information interaction method provided by the embodiment of the present disclosure may be executed by a terminal device, and accordingly, the information interaction apparatus may be disposed in the terminal device 501, 502, 503. In addition, the information interaction method provided by the embodiment of the present disclosure may also be executed by the server 505, and accordingly, the information interaction apparatus may be disposed in the server 505.
It should be understood that the number of terminal devices, networks, and servers in fig. 5 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to fig. 6, a schematic diagram of an electronic device (e.g., a server or terminal device of fig. 5) suitable for use in implementing some embodiments of the present disclosure is shown. The terminal device in some embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The terminal device/server shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; a storage device 608 including, for example, a magnetic tape, a hard disk, a memory card, or the like; and a communication device 609. The communication means 609 may allow the electronic device to communicate with other devices wirelessly or by wire to exchange data. While fig. 6 illustrates an electronic device having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 6 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through the communication device 609, or installed from the storage device 608, or installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: in response to receiving a request for accessing a first contact list of a first application sent when a first user logs in a second application for the first time, determining a second contact from first contacts in the first contact list, wherein the second contact is a user of the second application; the second contact is added to a second contact list of a second application.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. Where the name of the unit does not in some cases constitute a limitation of the unit itself, for example, adding the unit may also be described as "adding the second contact to the unit in the second contact list of the second application".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (22)

1. An information interaction method, comprising:
in response to receiving a request for accessing a first contact list of a first application, which is sent when a first user logs in a second application for the first time, determining a second contact from first contacts in the first contact list, wherein the second contact is a user of the second application;
adding the second contact to a second contact list of the second application.
2. The method of claim 1, wherein prior to determining the second contact from the first contacts in the first contact list in response to receiving a request to access the first contact list of the first application issued when the first user first logs into the second application, the method further comprises:
responding to the monitoring that the first user logs in the second application for the first time, and displaying a contact person adding control in a display interface of the second application after logging in;
displaying contact person adding selection items based on preset operation of the first user on the contact person adding control, wherein the contact person adding selection items comprise first selection items used for representing that the second contact person is added by accessing the first contact person list;
and determining that a request sent by the first user for accessing a first contact list of a first application is received based on a selection operation of the first user on the first selection item.
3. The method of claim 2, wherein in response to monitoring that the first user logs in the second application for the first time, presenting a contact addition control in a presentation interface of the second application after logging in comprises:
in response to the fact that the first user logs in the second application for the first time, displaying a contact person adding control and guiding information of an added contact person for guiding the first user to use the contact person adding control in a display interface of the second application after logging in; and
the displaying of the contact person adding option based on the preset operation executed by the first user on the contact person adding control includes:
and displaying a contact person adding option based on the preset operation of the first user on the contact person adding control according to the guiding information.
4. The method of claim 1, wherein determining the second contact from the first contacts in the first contact list in response to receiving a request to access the first contact list of the first application issued when the first user first logs into the second application comprises:
and sending the contact information corresponding to the first contact in the first contact list to a server so as to indicate the server to determine a second contact from the first contact based on the contact information.
5. The method of claim 4, wherein the server determines the second contact from the first contact based on:
determining whether a first contact is a user of the second application according to the contact way of the first contact;
determining a first contact that is determined to be a user of the second application as a candidate second contact;
acquiring an attribute value of a first preset user attribute of a candidate second contact, and determining whether the attribute value meets a first preset condition;
in response to determining that the attribute value satisfies the first preset condition, treating the candidate second contact as a second contact of the first user and adding the second contact to the second contact list; wherein
The first preset user attribute is used for representing the searching visibility of the candidate contact person searched by other users of the second application through a preset contact way.
6. The method of claim 1, further comprising:
detecting whether an attribute value corresponding to a preset user attribute of the first user meets a preset condition;
in response to the fact that the attribute value corresponding to the preset user attribute of the first user does not meet the preset condition, displaying attribute setting prompt information for prompting the first user to set the preset user attribute on a display interface of the second application; wherein
The user attributes include at least one of: the first preset user attribute is used for representing the searching visibility of the first user searched by other users of the second application through a preset contact way; the second preset user attribute is used for representing the communicability of other users of a second application for initiating real-time communication to the first user through the second application.
7. The method of claim 6, further comprising:
and displaying a property setting control for setting the property of the preset user in response to receiving the selection operation of the first user on the property setting prompt message.
8. The method of claim 1, further comprising:
presenting a current status of a second contact in a second contact list of the second application, the current status comprising one of: online, offline, busy.
9. The method of claim 1, further comprising:
determining a target first contact person from the first contact person list, and displaying the information of the target first contact person; the target first contact is a first contact which is not the second application user, and/or a first contact which is invisible to search in the second application through a preset contact way is set, and the information of the target first contact is included in the first contact list, and the number information of the searched target first contact is set.
10. The method of claim 9, wherein the information of the target first contact comprises a name, a contact address, and
the displaying the information of the target first contact comprises:
sequencing the target first contacts according to a preset rule;
and sequentially displaying the names and the contact ways of the plurality of target first contacts according to the sequencing result.
11. The method of claim 10, wherein the sorting the plurality of target first contacts according to the preset rule comprises:
the plurality of target first contacts are ranked according to a historical frequency of common use of the second application.
12. The method of claim 1, further comprising:
responding to a request sent by a first user for accessing a first contact list of a first application in a non-first-time login state of the first user to the second application, and calling the first contact list;
displaying a first contact list to be added in a display interface of the second application, wherein the first contact list to be added comprises information of a target first contact which is not a second contact of the first user in the first contact list.
13. The method of claim 9 or 12, wherein the information of the target first contact comprises invitation prompt information for inviting the target first contact to become a user of the second application; and
the method further comprises the following steps:
and responding to the received selection operation of the first user on the invitation prompt information, and sending first invitation information for inviting the target first contact to become a user of the second application to the target first contact.
14. The method of claim 13, wherein sending first invitation information to the target first contact to invite the target first contact to become a user of the second application in response to receiving a selection operation performed by the first user on the invitation prompt information comprises:
in response to receiving a selection operation of the first user on the invitation prompt message, showing an invitation channel option for sending the invitation message to the target first contact person, wherein the invitation channel option is used for representing at least one first contact way shown by the target first contact person in the first contact list;
according to the selection operation of the first user, determining a target contact way from the at least one first contact way;
and generating first invitation information based on an invitation information template corresponding to the target contact way, and sending the first invitation information to the target first contact person.
15. The method of claim 14, further comprising:
in response to receiving feedback information that the target first contact is a user of the second application according to the first invitation information, adding the target first contact as a second contact in the second contact list of the first user.
16. The method of claim 14, further comprising:
responding to failure prompt information which is sent by a server and prompts that the first invitation information fails, and displaying the failure prompt information in a display interface of the second application, wherein the failure prompt information is generated by the server based on the following determination steps:
and setting the first invitation information to be in a failure state and generating failure prompt information in response to the fact that the number of users who perform preset operation on the first invitation information in a preset time period exceeds a preset number threshold.
17. The method of claim 16, wherein the determining step further comprises:
and the server updates the invalid first invitation information and sends the updated first invitation information to the target first contact.
18. The method of claim 1, further comprising:
responding to a communication instruction sent by the first user, sending the communication instruction to a server, and executing the following communication connection establishment steps by the server: determining whether to establish a communication connection between the first user and a target second contact based on an attribute value of a second preset user attribute of the target second contact indicated by the communication instruction; the second preset user attribute is used for representing the communicability of a user of a second application for initiating real-time communication to the target second contact through the second application;
and receiving real-time communication information of the first user in response to receiving feedback information which is returned by the server and used for representing that the communication connection is successfully established.
19. The method of claim 18, wherein the communication connection establishing step further comprises:
in response to determining to establish a communication connection between the first user and the target second contact, determining whether the first user is a second contact of a second application to which the target second contact corresponds;
in response to determining that the first user is not a second contact of a second application corresponding to the target second contact, establishing a preset association relationship between the first user and the target second contact; and
and sending a contact adding instruction to a second application client corresponding to the target second contact to instruct the second application client to add the first user as a second contact of the target second contact to a second contact list of the target second contact.
20. An information interaction apparatus, comprising:
the determining unit is used for responding to a request for accessing a first contact list of a first application sent when a first user logs in a second application for the first time, and determining a second contact from first contacts in the first contact list, wherein the second contact is a user of the second application;
an adding unit, configured to add the second contact to a second contact list of the second application.
21. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-19.
22. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-19.
CN202010385847.1A 2020-05-09 2020-05-09 Information interaction method and device and electronic equipment Pending CN112306596A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010385847.1A CN112306596A (en) 2020-05-09 2020-05-09 Information interaction method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010385847.1A CN112306596A (en) 2020-05-09 2020-05-09 Information interaction method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN112306596A true CN112306596A (en) 2021-02-02

Family

ID=74336579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010385847.1A Pending CN112306596A (en) 2020-05-09 2020-05-09 Information interaction method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112306596A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113890772A (en) * 2021-04-29 2022-01-04 北京字跳网络技术有限公司 Information processing method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994206A (en) * 2015-05-26 2015-10-21 小米科技有限责任公司 Method and device for adding contact persons
CN105635061A (en) * 2014-10-30 2016-06-01 阿里巴巴集团控股有限公司 Application operation method and system based on contact person
CN108521504A (en) * 2018-03-21 2018-09-11 广州三星通信技术研究有限公司 Contact person's processing method and communication terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635061A (en) * 2014-10-30 2016-06-01 阿里巴巴集团控股有限公司 Application operation method and system based on contact person
CN104994206A (en) * 2015-05-26 2015-10-21 小米科技有限责任公司 Method and device for adding contact persons
CN108521504A (en) * 2018-03-21 2018-09-11 广州三星通信技术研究有限公司 Contact person's processing method and communication terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113890772A (en) * 2021-04-29 2022-01-04 北京字跳网络技术有限公司 Information processing method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN112311841B (en) Information pushing method and device, electronic equipment and computer readable medium
CN109873757A (en) Message display method, electronic equipment and readable medium for multi-conference
CN110781373B (en) List updating method and device, readable medium and electronic equipment
CN110658960A (en) Message processing method and device and electronic equipment
CN112395509A (en) Information display method, information providing method, apparatus, and computer-readable medium
US11758087B2 (en) Multimedia conference data processing method and apparatus, and electronic device
CN111596991A (en) Interactive operation execution method and device and electronic equipment
CN111506376A (en) Feedback information display method and device, readable medium and electronic equipment
CN111447191B (en) Information interaction method and device and electronic equipment
CN114338576A (en) Task participant adding method and device, electronic equipment and storage medium
CN113326013A (en) Information interaction method and device and electronic equipment
CN110674481B (en) Account registration method, device, equipment and storage medium of application program
CN112311750B (en) Interaction method and device and electronic equipment
CN112256372A (en) Information processing method and device and electronic equipment
CN110519373B (en) Method and device for pushing information
CN112925512A (en) Message sending method and device, electronic equipment and storage medium
CN112306596A (en) Information interaction method and device and electronic equipment
CN112822089B (en) Method and device for adding friends
CN113079085B (en) Business service interaction method, business service interaction device, business service interaction equipment and storage medium
CN115563134A (en) Interaction method, interaction device, electronic equipment and computer readable medium
CN112600978B (en) Information processing method and device and electronic equipment
CN115913803A (en) Information interaction method and device and electronic equipment
CN113890772A (en) Information processing method and device and electronic equipment
CN111897620A (en) Interaction method and device and electronic equipment
CN112968826A (en) Voice interaction method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination