Background technology
Nowadays the QR sign indicating number is applied to the electronic bill field more and more widely, and like film ticket, electronic coupons, electronics member card etc., it brings countless facilities to daily life.E-ticket is boarded and has been popularized abroad, and China is also promoting E-ticket.Electronic bill generally is to send two-dimension code (China generally is a QR sign indicating number) picture that comprises relevant information to user mobile phone through short message mode; During use; The QR sign indicating number image that is shown on the two-dimension code identification terminal scanning user mobile phone screen of appointed place; Can obtain the relevant information that this QR sign indicating number is comprised, come to confirm user's authority thus.
Although mobile phone brings a lot of facilities for people's life, yet it is very inconvenient that the cellphone subscriber intercourses personal information.For example; User A and user B want to exchange individual relevant information; The personal information of user A or own input user B then perhaps asks user B through modes such as notes its people's relevant information to be sent to oneself mobile phone, equally; The personal information of user B or oneself input user A perhaps asks user A its people's relevant information to be sent to the mobile phone of oneself through modes such as notes.
And along with development of internet technology, each cellphone subscriber can leave personal information at a lot of social network sites usually, like domestic QQ; Happy net, external facebook, twitter, MSN etc. have a lot of registered users; Each registered user has the space of oneself, has wherein preserved a lot of individual relevant information of oneself, like contact details; Photo, video, model of delivering or the like; The part that the registered user can oneself be provided with in these information of decision can openly be shared to everyone, and a part browses for the people of appointment, and some is underground information of secret or the like.
And how to make full use of the individual relevant information of staying each website, and make the cellphone subscriber can utilize network to exchange individual relevant information, become the technical task that those skilled in the art need solve.
Embodiment
Fig. 1 is the flow chart of the method for the individual relevant information of exchange Network Based of the present invention.Wherein, requesting service 1 includes but not limited to: mobile phone, PDA or the like; The network equipment 2 includes but not limited to: the webserver etc.
At first, in step S1, requesting service 1 obtains the coded image that comprises contact identity information.Wherein, said coded image includes but not limited to: bar code image or two-dimensional barcode image etc.More concrete, for example, QR sign indicating number image etc.Said contact identity information includes but not limited to: 1) contact person's name; 2) contact person's telephone number; 3) contact person's e-mail address; 4) contact person's instant messaging number of the account, like the QQ number, MSN account number etc.; 5) contact person's Business Name; 6) contact person's department; 7) contact person's post; 8) address of contact person or the like.
Wherein, described request equipment 1 mode of obtaining coded image includes but not limited to: 1) by obtaining the coded image that comprises contact identity information in the note that receives; 2) absorb or the like by self-contained camera.
Then, in step S2,1 pair of this coded image of described request equipment is decoded to obtain said contact identity information.This decode procedure is known by those skilled in the art, so be not described in detail in this.
Then, in step S3,1 request of sending of described request equipment provides contact person's individual request-related information information, wherein, comprises contact identity information and claimant's information in the described request information.Wherein, claimant's information includes but not limited to following at least one: 1) claimant's name; 2) claimant's telephone number; 3) claimant's e-mail address; 4) claimant's instant messaging number of the account, like the QQ number, MSN account number etc.; 5) claimant's Business Name; 6) claimant's department; 7) claimant's post; 8) address of claimant or the like.
For example; The contact identity information that described request equipment 1 obtains in step S2 is " QQ number is 1234 "; The user of requesting service 1 imports claimant's information and is " manager Zhang San ", comprises contact identity information " QQ number is 1234 " and claimant's information " manager Zhang San " in the solicited message that then described request equipment 1 sends.
Then, in step S4, the said network equipment 2 receives the individual request-related information information that the request of sending from requesting service provides the contact person, wherein, comprises claimant's information and contact identity information in the described request information.
Then, in step S5, the said network equipment 2 is inquired about in the information bank of the individual relevant information that stores a plurality of contact persons, to select the matching associated person that comprises said contact identity information in the individual relevant information.
For example; The solicited message that the said network equipment 2 receives from requesting service X in step S4 comprises: claimant's information " opens five " and contact identity information " name is king three "; After the then said network equipment 2 was inquired about in said information bank, the match contacts that obtains to comprise in the individual relevant information " name is king three " was artificial: contact person a and contact person b.
Again for example; The solicited message that the said network equipment 2 receives from requesting service Y in step S4 comprises: claimant's information " opens six " and contact identity information " the QQ number is 123456 "; After the then said network equipment 2 was inquired about in said information bank, the match contacts people who obtains to comprise in the individual relevant information " the QQ number is 123456 " was contact person c.
Need to prove; Those skilled in the art should understand that; Said information bank can be arranged on the information bank in 2 equipment that can visit of any said network equipment, and for example, said information bank is arranged on the information bank in 2 webservers that can visit of the network equipment; For example said again information bank is arranged on the information bank in the network equipment 2 self EMS memories etc.
Then, in step S6, the said network equipment 2 judges whether the quantity of said matching associated person is 1.
For example, the said network equipment 2 obtains to comprise in the personal information match contacts of " name is king three " in step S5 artificial: contact person a and contact person b, and totally two contact persons, the then said network equipment 2 judges that the quantity of matching associated persons is not 1.
As a kind of optimal way, when the said network equipment 2 judged that the quantity of said matching associated person is not 1, the said network equipment 2 sent the information of confirming the contact identity failure to described request equipment 1.
Again for example, the said network equipment 2 in step S5, obtain to comprise in the personal information " be 123456 for QQ number " and matching associated person comprise: contact person c, the then said network equipment 2 judges that the quantity of matching associated persons is 1.
Then; In step S7; When the said network equipment 2 judges that the quantity of said matching associated person is 1; The said network equipment 2 is based on the contact method of said matching associated person, sends to be used to inquire whether said matching associated person is agreed to exchange the inquiry message of individual relevant information with the pairing claimant of described request people information.Wherein, the said network equipment 2 mode of obtaining the contact method of said matching associated person includes but not limited to: 1) directly obtain in the individual relevant information by said matching associated person; 2) be scheduled to obtain appointed contact method etc. based on said matching associated person.
For example; The match contacts people that the said network equipment 2 is selected in step S5 is contact person c; The then said network equipment 2 is based on the phone number of the contact person c that obtains in the individual relevant information by contact person c, sends to be used to inquire whether contact person c agrees to exchange the inquiry message of individual relevant information with the pairing claimant of described request people information.
Then; In step S8, the said network equipment 2 determines whether that based on the reply message of being received to said inquiry message the individual relevant information that individual relevant information with said matching associated person offers described request equipment 1 and whether will comprise claimant's information offers said matching associated person.Wherein, individual relevant information includes but not limited to following at least one: 1) contact method information; Like telephone number, Email, such as QQ number instant messaging number of the account, address or the like.2) head image information; 3) business card image information; 4) audio/video information or the like.
For example; The said network equipment 2 mobile phone to contact person c in step S7 sends the note that comprises inquiry message; And receive the note that comprises reply message; Wherein comprise in the reply message " agreement ", the then said network equipment 2 sends to the requesting service 1 that sends solicited message with the individual relevant information of contact person c, simultaneously the individual relevant information that comprises claimant's information in the information bank is offered contact person c.Wherein, the said network equipment 2 individual relevant information that will the comprise claimant's information mode that offers contact person c includes but not limited to: note, Email or the like.
In addition; Those skilled in the art should understand that; If the said network equipment 2 has a plurality of or when organizing by obtaining the individual relevant information that comprises claimant's information in the information bank more; The then said network equipment 2 provides the solicited message of in-depth identity information to described request people equipment 1 request of sending, and after coming accurately to confirm claimant's identity based on the return information that claimant's equipment 1 is beamed back, the individual relevant information with the claimant offers said matching associated person again.
Again for example; The said network equipment 2 e-mail address to contact person d in step S7 sends the Email that comprises inquiry message; And receive the Email that comprises reply message; Wherein, comprise " disagreeing with " in the said reply message, the then said network equipment 2 sends the information of informing that refusal provides individual relevant information to the requesting service that sends solicited message 1.
In sum; After the agreement of the method for the individual relevant information of exchange Network Based of the present invention based on claimant's request and contact person; Automatically the individual relevant information with the contact person who is stored in institute's information bank offers the claimant; Individual relevant information with the claimant offers the contact person simultaneously, realizes the exchange of individual relevant information thus, makes the user obtain very big facility.
The foregoing description is just listed expressivity principle of the present invention and effect is described, but not is used to limit the present invention.Any personnel that are familiar with this technology all can make amendment to the foregoing description under spirit of the present invention and scope.Therefore, rights protection scope of the present invention should be listed like claims.