Embodiment
Below through specific instantiation execution mode of the present invention is described, those skilled in the art can understand other advantages of the present invention and effect easily by the content that this specification disclosed.The present invention can also implement or use through other different embodiment, and each item details in this specification also can be based on different viewpoints and application, carries out various modifications or change under the spirit of the present invention not deviating from.
See also Fig. 1 to Fig. 2.Need to prove; The diagram that is provided in the present embodiment is only explained basic conception of the present invention in a schematic way; Satisfy only show in graphic with the present invention in relevant assembly but not component count, shape and plotted when implementing according to reality; Kenel, quantity and the ratio of each assembly can be a kind of random change during its actual enforcement, and its assembly layout kenel also maybe be more complicated.
As shown in the figure, the present invention provides a kind of method of interchange information.Wherein, method of the present invention is mainly carried out by the information exchange system, and said information exchange system is installed in application module in the computer equipment etc.This computer equipment is a kind ofly can carry out the modernized intelligent electronic device of massive values computation and various information processings automatically, at high speed according to prior program stored, and its hardware includes but not limited to microprocessor, FPGA, DSP, embedded device etc.Said computer equipment includes but not limited to server group that single network server, a plurality of webserver are formed or based on the cloud that is made up of the great amount of calculation machine or the webserver of cloud computing (Cloud Computing); Wherein, cloud computing is a kind of super virtual machine of being made up of the loosely-coupled computer collection of a group of Distributed Calculation.
In step S1, said information exchange system opens up temporary storage location based on user's the solicited message of opening up, and temporary said user's user profile is in said temporary storage location.
Wherein, said open up solicited message comprise any request open up one be used for the temporary storage location of temporary transient stored information solicited message.For example; User A31 imports the pairing website information of said information exchange system in the browser interface that mobile phone showed; And based on receive whether need open up the feedback information of temporary storage location after; Selection is, then said information exchange system opens up temporary storage location based on the solicited message of opening up of user A31.
Wherein, said user profile comprises that this user wants to offer other users' information, preferably, includes but not limited to information on this user's business card image information or the business card that this user is recorded in self etc.
Wherein, the said information exchange system mode of obtaining said user profile includes but not limited to: the user offers said information exchange system etc. voluntarily.For example, the user is through offering said information exchange system such as modes such as the memory addresss of uploading or provide user profile with self user profile.
Particularly, said information exchange system based on the user open up solicited message by the computer equipment under self such as opening up a memory space as temporary storage location in the memory banks such as internal memory, hard disk, SD storage card; Perhaps by with self under computer equipment communicate by letter and open up a memory space as temporary storage location in the memory bank of the equipment that is connected.
For example, said information exchange system is based on the D dish new folder a1 that opens up the computer equipment of solicited message under self of user A1, and this document is pressed from both sides a1 as temporary storage location.
Again for example, said information exchange system opening up solicited message and will communicate by letter in the memory bank of the equipment that is connected the memory space of address between 000111-FFF000 as temporary storage location based on user A2 with the computer equipment under self.
Need to prove, it should be appreciated by those skilled in the art that and only just list shown in above-mentioned, but not limitation of the present invention, in fact, any mode that solicited message is opened up temporary storage location of opening up based on the user all should be within the scope of the present invention.
In step S2; Said information exchange system is based on other users' accessing request information; These other users' user profile is temporary in said temporary storage location; And this other users' user profile offered each user at the said temporary storage location of visit, simultaneously each user profile of being kept in the said temporary storage location is offered this other users.
For example; Kept in the said temporary storage location user A11, A12, A13 user profile has separately been arranged; Said information exchange system is based on the accessing request information of user A14; The user profile of this user A14 is temporary in said temporary storage location, and the user profile of this user A14 is offered user A11 and the A12 that visits said temporary storage location, simultaneously the user A11 that is kept in the said temporary storage location, A12, A13 user profile are separately offered this user A14.Preferably, said information exchange system also is temporarily stored in the contact method in the user profile of said temporary storage location based on the user A13 that does not visit said temporary storage location, and the user profile of the user A14 that user A13 is not also obtained offers this user A13.
Wherein, it is same or similar that said information exchange system obtains the mode of obtaining the user profile of opening up the pairing user of solicited message among this other users' mode and the abovementioned steps S1 of user profile, and be contained in this by reference, no longer details.
In step S3, when not having the said temporarily providing room of user capture, the information in the said temporary storage location of then said information exchange system-kill.
Particularly, pairing such as addresses such as network address when there not being the user to be linked at said information exchange system more, then said information exchange system confirms not had the said temporarily providing room of user capture, the information in the said temporary storage location of then said information exchange system-kill.
Need to prove; Those skilled in the art should understand that; Abovementioned steps S1, S2 and S3 carry out by the time real-time continuous, for example, and after the operation of the said information exchange execution in step S1 of system; Until there being other users need visit temporary storage location, the just operation of execution in step S2 of said information exchange system; Have again, after the operation of the said information exchange execution in step S2 of system, after the usefulness of all-access temporary storage location has withdrawed from visit per family, the just operation of execution in step S3 of said information exchange system.
As a kind of preferred version, also comprise step S4 (not giving diagram) according to the method for the invention, step S2 also comprises step S2 ' (not giving diagram).
In step S4, said information exchange system is based on the access rights that the said temporary storage location of visit is set from the said information that is provided with of opening up the pairing user of solicited message.
Wherein, the said information that is provided with comprises any information that is used to be provided with access rights, preferably, includes but not limited to: the attribute information of encrypted message, calling party etc.The attribute information of said calling party comprises grade, occupation, technical ability of calling party or the like.
For example, said information exchange system is based on being " 123 " from the said access code that password " 123 " is provided with the said temporary storage location of visit that is provided with of opening up the pairing user A21 of solicited message.
Again for example, said information exchange system is required to be the user of " grade three " based on the calling party that the said temporary storage location of visit is set from the said attribute information " grade three " of opening up the calling party of the pairing user A22 of solicited message.
Need to prove; Those skilled in the art should understand that; Only just list shown in above-mentioned, but not limitation of the present invention, in fact; Any mode based on the access rights that the said temporary storage location of visit is set from the said information that is provided with of opening up the pairing user of solicited message, all within the scope of the present invention.
In step S2 '; Said information exchange system confirms based on said other users' accessing request information whether these other users have the authority of visit temporary storage location; And when these other users have the authority of visit temporary storage location; And these other users' user profile offered each user who visits said temporary storage location, simultaneously each user profile of being kept in the said temporary storage location is offered this other users.
Particularly, said information exchange system confirms based on information relevant with access rights in said other users' the accessing request information whether these other users have the authority of visit temporary storage location.
For example, said information exchange system confirms based on the access code that is provided with among the access code information in said other users' the accessing request information and the step S4 is whether consistent whether these other users have the authority of visit temporary storage location.
Again for example, said information exchange system confirms for the occupation of the calling party of the said temporary storage location of visit that is provided with among " teacher " and the step S4 is whether consistent whether these other users have the authority of visiting temporary storage location based on the occupation of the user in said other users' the accessing request information.
When these other users have the authority of visit temporary storage location; Said information exchange system offers each user who visits said temporary storage location with these other users' user profile; Simultaneously each user profile of being kept in the said temporary storage location is offered this other users; The operation of this exchange message is detailed in step S2, and is contained in this by reference, no longer repeats.
As another kind of preferred version, according to the method for the invention, also comprise step S5 (not giving diagram), step S2 also comprises step S2 " (not giving diagram).
In step S5, said information exchange system obtains the said geographical location information of opening up the pairing user of solicited message place, and with the access rights of said geographical location information as the said temporary storage location of visit.
Wherein, said information exchange system obtains said mode of opening up the geographical location information at the pairing user of solicited message place and includes but not limited to: opened up the pairing user of solicited message and provided etc. by said.For example; Said information exchange system imports " meeting-place 1 of electronic product exhibition " based on user A32 in the geographical location information inputting interface that self provided, obtain the said geographical location information of opening up the pairing user of solicited message place and be " meeting-place 1 of electronic product exhibition ".Again for example, after the GPS module that user A33 starts self entrained mobile phone is confirmed the geographical location information of self, this geographical location information is offered said information exchange system.
At step S2 " in; said information exchange system confirms based on the geographical location information at said other users places whether these other users have the authority of visit temporary storage location; and when these other users have the authority of visiting temporary storage location; these other users' user profile is offered each user who visits said temporary storage location, simultaneously each user profile of being kept in the said temporary storage location is offered this other users.
Wherein, Said information exchange system obtains the mode of geographical location information at said other users places with aforementioned to obtain said mode of opening up the geographical location information that the pairing user of solicited message belongs to same or similar; And be contained in this by reference, no longer detail.
When these other users have the authority of visit temporary storage location; Said information exchange system offers each user who visits said temporary storage location with these other users' user profile; Simultaneously each user profile of being kept in the said temporary storage location is offered this other users; The operation of this exchange message is detailed in step S2, and is contained in this by reference, no longer repeats.
As shown in Figure 2, the present invention provides a kind of information exchange system of interchange information.Wherein, said information exchange system 1 comprises: open up module 11, exchange module 12 and removing module 13.
The said module 11 of opening up is opened up temporary storage location based on user's the solicited message of opening up, and temporary said user's user profile is in said temporary storage location.
Wherein, said open up solicited message comprise any request open up one be used for the temporary storage location of temporary transient stored information solicited message.For example; User A31 imports said information exchange system 1 pairing website information in the browser interface that mobile phone showed; And based on receive whether need open up the feedback information of temporary storage location after; Selection is that the then said module 11 of opening up is opened up temporary storage location based on the solicited message of opening up of user A31.
Wherein, said user profile comprises that this user wants to offer other users' information, preferably, includes but not limited to information on this user's business card image information or the business card that this user is recorded in self etc.
Wherein, the said module 11 of opening up is obtained the mode of said user profile and included but not limited to: the user offers said information exchange system etc. voluntarily.For example, the user is through offering the said module 11 of opening up such as the modes such as memory address of uploading or provide user profile with self user profile.
Particularly, said open up module 11 based on the user open up solicited message by the computer equipment under self such as opening up a memory space as temporary storage location in the memory banks such as internal memory, hard disk, SD storage card; Perhaps by with self under computer equipment communicate by letter and open up a memory space as temporary storage location in the memory bank of the equipment that is connected.
For example, the said D dish new folder a1 that opens up the computer equipment of solicited message under self that opens up module 11 based on user A1, and this document pressed from both sides a1 as temporary storage location.
Again for example, saidly open up module 11 opening up solicited message and will communicate by letter in the memory bank of the equipment that is connected the memory space of address between 000111-FFF000 as temporary storage location based on user A2 with the computer equipment under self.
Need to prove, it should be appreciated by those skilled in the art that and only just list shown in above-mentioned, but not limitation of the present invention, in fact, any mode that solicited message is opened up temporary storage location of opening up based on the user all should be within the scope of the present invention.
Said exchange module 12 is based on other users' accessing request information; These other users' user profile is temporary in said temporary storage location; And this other users' user profile offered each user at the said temporary storage location of visit, simultaneously each user profile of being kept in the said temporary storage location is offered this other users.
For example; Kept in the said temporary storage location user A11, A12, A13 user profile has separately been arranged; Said exchange module 12 is based on the accessing request information of user A14; The user profile of this user A14 is temporary in said temporary storage location, and the user profile of this user A14 is offered user A11 and the A12 that visits said temporary storage location, simultaneously the user A11 that is kept in the said temporary storage location, A12, A13 user profile are separately offered this user A14.Preferably, said exchange module 12 also is temporarily stored in the contact method in the user profile of said temporary storage location based on the user A13 that does not visit said temporary storage location, and the user profile of the user A14 that user A13 is not also obtained offers this user A13.
Wherein, the mode and aforementioned that said exchange module 12 is obtained these other users' user profile is opened up module 11, and to obtain the mode of the user profile of opening up the pairing user of solicited message same or similar, and be contained in this by reference, no longer details.
When not having the said temporarily providing room of user capture, the information in the said temporary storage location of then said removing module 13 deletions.
Particularly, pairing such as addresses such as network address when there not being the user to be linked at said information exchange system 1 more, then said removing module 13 confirms not had the said temporarily providing room of user capture, the information in the said temporary storage location of then said removing module 13 deletions.
Need to prove; Those skilled in the art should understand that; It is aforementioned that to open up the performed operation of module 11, exchange module 12 performed operation and removing module 13 performed operations be not to carry out by the time real-time continuous, for example, and said opening up after module 11 performed operations accomplish; Until there being other users need visit temporary storage location, said exchange module 12 is just carried out the operation of information exchange; Have, after said exchange module 12 was carried out the operation of information exchange, after the usefulness of all-access temporary storage location had withdrawed from visit per family, said removing module 13 was just carried out the information deletion operation again.
As a kind of preferred version, said information exchange system also comprises: first is provided with module (not giving diagram), and said exchange module 12 also comprises first exchange unit (not giving diagram).
Said first is provided with module based on the access rights that the said temporary storage location of visit is set from the said information that is provided with of opening up the pairing user of solicited message.
Wherein, the said information that is provided with comprises any information that is used to be provided with access rights, preferably, includes but not limited to: the attribute information of encrypted message, calling party etc.The attribute information of said calling party comprises grade, occupation, technical ability of calling party or the like.
For example, said first be provided with module based on from said open up the pairing user A21 of solicited message access code that password " 123 " is provided with the said temporary storage location of visit is set for " 123 ".
Again for example, said first module is required to be " grade three " based on the calling party that the said temporary storage location of visit is set from the said attribute information " grade three " of opening up the calling party of the pairing user A22 of solicited message user is set.
Need to prove; Those skilled in the art should understand that; Only just list shown in above-mentioned, but not limitation of the present invention, in fact; Any mode based on the access rights that the said temporary storage location of visit is set from the said information that is provided with of opening up the pairing user of solicited message, all within the scope of the present invention.
Said first exchange unit confirms based on said other users' accessing request information whether these other users have the authority of visit temporary storage location; And when these other users have the authority of visit temporary storage location; And these other users' user profile offered each user who visits said temporary storage location, simultaneously each user profile of being kept in the said temporary storage location is offered this other users.
Particularly, said first exchange unit confirms based on information relevant with access rights in said other users' the accessing request information whether these other users have the authority of visit temporary storage location.
For example, said first exchange unit is provided with based on the access code information in said other users' the accessing request information and first that the access code of module setting is whether consistent confirms whether these other users have the authority of visit temporary storage location.
Again for example, said first exchange unit is provided with for " teacher " and first based on the user in said other users' accessing request information occupation that the occupation of calling party of the said temporary storage location of visit of module setting is whether consistent confirms whether these other users have the authority of visiting temporary storage location.
When these other users have the authority of visit temporary storage location; Said first exchange unit offers each user who visits said temporary storage location with these other users' user profile; Simultaneously each user profile of being kept in the said temporary storage location is offered this other users; The operation of the operation of this exchange message and said exchange module 12 is same or similar, and is contained in this by reference, no longer repeats.
As another kind of preferred version, said information exchange system 1 comprises that also second is provided with module (not giving diagram), and said exchange module 12 also comprises second exchange unit (not giving diagram).
Said second is provided with module obtains the said geographical location information of opening up the pairing user of solicited message place, and with the access rights of said geographical location information as the said temporary storage location of visit.
Wherein, said second module is set obtains said mode of opening up the geographical location information at the pairing user of solicited message place and include but not limited to: open up the pairing user of solicited message and provide etc. by said.For example; Said second is provided with module imports " meeting-place 1 of electronic product exhibition " based on user A32 in the geographical location information inputting interface that self provided, obtain the said geographical location information of opening up the pairing user of solicited message place and be " meeting-place 1 of electronic product exhibition ".Again for example, after the GPS module of the entrained mobile phone of user A33 startup self is confirmed the geographical location information of self, this geographical location information is offered said second module is set.
Said second exchange unit confirms based on the geographical location information at said other user places whether these other users have the authority of visit temporary storage location; And when these other users have the authority of visit temporary storage location; These other users' user profile is offered each user at the said temporary storage location of visit, simultaneously each user profile of being kept in the said temporary storage location is offered this other users.
Wherein, The mode and aforementioned second that said second exchange unit is obtained the geographical location information at said other users place is provided with module, and to obtain said mode of opening up the geographical location information that the pairing user of solicited message belongs to same or similar; And be contained in this by reference, no longer detail.
When these other users have the authority of visit temporary storage location; Said second exchange unit offers each user who visits said temporary storage location with these other users' user profile; Simultaneously each user profile of being kept in the said temporary storage location is offered this other users; Same or similar with the operation of said exchange module 12, and be contained in this by reference, no longer repeat.
In sum; The business card exchange scene of the method and system simulating reality of interchange information of the present invention; On network, created the temporary storage location of a business card exchange; Be not only a group user that in reality, gets together can be easily based on the temporary storage location information of exchanging visiting cards; Also extended the room and time of the information of exchanging visiting cards, made to attend a party for some reason or other user that need exchange visiting cards also can break through the restriction in space through this temporary storage location, obtain the experience identical with the user who exchanges visiting cards at the scene; Simultaneously, even the party in the reality finishes, as long as also have the user at this temporary storage location of visit, the restriction that the user just can the break through information of exchanging visiting cards; After all users withdrawed from this temporary storage location of visit, the information in this temporary storage location was deleted, and was similar to the situation that party finishes in the reality, made card information can in network, not propagate arbitrarily, had protected user's privacy.So the present invention has effectively overcome various shortcoming of the prior art and the tool high industrial utilization.
The foregoing description is illustrative principle of the present invention and effect thereof only, but not is used to limit the present invention.Any be familiar with this technological personage all can be under spirit of the present invention and category, the foregoing description is modified or is changed.Therefore, have common knowledge the knowledgeable in the affiliated such as technical field, must contain by claim of the present invention not breaking away from all equivalence modifications of being accomplished under disclosed spirit and the technological thought or changing.