CN103227796A - Method and system of sharing contact network based on two-dimensional code - Google Patents
Method and system of sharing contact network based on two-dimensional code Download PDFInfo
- Publication number
- CN103227796A CN103227796A CN2013101618083A CN201310161808A CN103227796A CN 103227796 A CN103227796 A CN 103227796A CN 2013101618083 A CN2013101618083 A CN 2013101618083A CN 201310161808 A CN201310161808 A CN 201310161808A CN 103227796 A CN103227796 A CN 103227796A
- Authority
- CN
- China
- Prior art keywords
- dimension code
- good friend
- user
- circle
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a method and a system of sharing a contact network based on a two-dimensional code. The method of sharing the contact network based on the two-dimensional code comprises the steps of obtaining a request transmitted by a user after scanning the two-dimensional code to apply to join in a two-dimensional code friend circle corresponding to the two-dimensional code, verifying the identity of the user according to the request of applying to join in the two-dimensional code friend circle corresponding to the two-dimensional code, and if the verification is passed, displaying information of the two-dimensional code friend circle corresponding to the two-dimensional code and information of members in the two-dimensional code friend circle on a client of the user. The method and the system has the benefits that the user can join in the circle by scanning the two-dimensional code, information of all participants is checked quickly, an organizer is not required to maintain user information manually, and after the user modifies the information, a server updates the new information to the client of each member in the circle. With the adoption of a session negotiation mechanism, the user initiates a code scanning request to the server through the client, and the server verifies the identity of the user.
Description
Technical field
The present invention relates to areas of information technology, relate in particular to a kind of method and system of sharing contacts network based on two-dimension code.
Background technology
Two-dimension code is as the inlet of mobile Internet, in the work life that is used in us more and more widely.Softwares such as instant messaging, social networks, mobile payment have all released one after another and have used the convenient function of two-dimension code, as sweep a yard plusing good friend, sweep sign indicating number and pay close attention to, sweep sign indicating number shopping payment etc.Two-dimension code have contain much information, characteristics such as error correcting capability is strong, fast, the comprehensive recognition of recognition speed, strong security, utilize two-dimension code to carry out the exchange and interdynamic of various information, not only efficient but also low-carbon environment-friendly is that a significant innovation in the Mobile business field is used.
Softwares such as present little letter, microblogging provide the scanning two-dimension code to pay close attention to, add functions such as the group chats, but under many circumstances, people are except needs are understood public information, also need the interchange of more a plurality of people's private informations, as contact method, address, mailbox etc.; Traditional instant messaging and social networks software, in order to keep the privacy of circle, the personnel that need keeper's manual examination and verification application to add have not only increased keeper's workload, and the application personnel need also to wait for that the keeper examines passes through, and increase time cost; And based on the static state issue of information, the applicant can not the dynamically autonomous in real time information of initiating the secret activity and revising oneself often for circle.
As fully visible, the need to be resolved hurrily automatic audit of circle member identity and the technical problem that on-the-fly modifies of member's identity information of this area.
Summary of the invention
The embodiment of the invention provides a kind of method and system based on the shared contacts network of two-dimension code, with the automatic audit of realization circle member identity and on-the-fly modifying of member's identity information.
On the one hand, the embodiment of the invention provides a kind of method based on the shared contacts network of two-dimension code, and described method based on the shared contacts network of two-dimension code comprises:
Obtain the request of the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence;
Add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined;
If audit is passed through, then show that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing.
Optionally, in an embodiment of the present invention, before the described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, described method also comprises: be made into two-dimension code according to movable theme, content, location information, and set review mechanism; Server generates the two-dimension code good friend circle of described two-dimension code correspondence and returns client according to the described review mechanism of described two-dimension code and setting; Setting at described two-dimension code good friend circle includes but not limited to: and someone is not simultaneously in a certain contact coil; Withdraw from good friend's circle; Member's message in the shielding good friend encloses; Forbid adding any good friend's circle; Setting at userspersonal information's visibility includes but not limited to: agree that the stranger delivers business card; Forbid receiving stranger's message; In enclosing, a certain good friend announces part or all of information; Issue described two-dimension code.
Optionally, in an embodiment of the present invention, described review mechanism comprises: sweep a yard time limit, user identity ID scope; The described request that adds the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined, comprise: add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined.
Optionally, in an embodiment of the present invention, the described two-dimension code of described issue comprises: choose corresponding two-dimension code published method according to the character of activity, described two-dimension code published method comprises: on-the-spot issue, or utilize microblogging, internet site, newspaper, advertising media's mode to issue.
Optionally, in an embodiment of the present invention, described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, comprise: when the user adopts third party's tool scans two-dimension code, then by the conversation mechanism of oauth, send conversation request to server, server judges that the user is a nonregistered user, to return webpage version customer terminal webpage, remind user's registration; The user is by filling in cell-phone number, and receives the short-message verification sign indicating number and finish registration, then improve card information after, add the request of the two-dimension code good friend circle of described two-dimension code correspondence by the application of webpage version client; If the user utilizes client-side program that two-dimension code is scanned, the identification 2 D code information, application adds good friend's circle of described two-dimension code correspondence, then sets up interim conversation by the oauth agreement, utilizes server that described user is carried out authentication; The described request that adds the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined, comprise: add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, judge whether the two-dimension code good friend circle of described two-dimension code correspondence exists; If the two-dimension code good friend of described two-dimension code correspondence encloses existence, then add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined; Describedly show that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing, comprise: the member in described two-dimension code good friend encloses can deliver or ask for business card mutually, the member of described two-dimension code good friend in enclosing upgrades after the card information, utilizes card information after the server active push is upgraded each member's client in enclosing to described two-dimension code good friend.
On the other hand, the embodiment of the invention provides a kind of system based on the shared contacts network of two-dimension code, and described system based on the shared contacts network of two-dimension code comprises: client and server, wherein,
Described server is used to obtain the request of the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence; Add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined;
Described client is used for after audit is passed through, and shows that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing.
Optionally, in an embodiment of the present invention, before the described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, described client, also be used for being made into two-dimension code, and set review mechanism according to movable theme, content, location information; Server generates the two-dimension code good friend circle of described two-dimension code correspondence and returns client according to the described review mechanism of described two-dimension code and setting; Setting at described two-dimension code good friend circle includes but not limited to: and someone is not simultaneously in a certain contact coil; Withdraw from good friend's circle; Member's message in the shielding good friend encloses; Forbid adding any good friend's circle; Setting at userspersonal information's visibility includes but not limited to: agree that the stranger delivers business card; Forbid receiving stranger's message; In enclosing, a certain good friend announces part or all of information; Issue described two-dimension code.
Optionally, in an embodiment of the present invention, described review mechanism comprises: sweep a yard time limit, user identity ID scope; Described server is further used for adding according to described application the request of the two-dimension code good friend circle of described two-dimension code correspondence, utilizes the described review mechanism that presets that described user identity is examined.
Optionally, in an embodiment of the present invention, described client is further used for choosing corresponding two-dimension code published method according to the character of activity, described two-dimension code published method comprises: on-the-spot issue, or utilize microblogging, internet site, newspaper, advertising media's mode to issue.
Optionally, in an embodiment of the present invention, described client, be further used for when the user adopts third party's tool scans two-dimension code, then by the conversation mechanism of oauth, send conversation request to server, server judges that the user is a nonregistered user, to return webpage version customer terminal webpage, remind user's registration; The user is by filling in cell-phone number, and receives the short-message verification sign indicating number and finish registration, then improve card information after, add the request of the two-dimension code good friend circle of described two-dimension code correspondence by the application of webpage version client; If the user utilizes client-side program that two-dimension code is scanned, the identification 2 D code information, application adds good friend's circle of described two-dimension code correspondence, then sets up interim conversation by the oauth agreement, utilizes server that described user is carried out authentication; Described server is further used for adding according to described application the request of the two-dimension code good friend circle of described two-dimension code correspondence, judges whether the two-dimension code good friend circle of described two-dimension code correspondence exists; If the two-dimension code good friend of described two-dimension code correspondence encloses existence, then add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined; Described client, be used for two-dimension code good friend in the described two-dimension code correspondence of described user's demonstration and enclose information and the described two-dimension code good friend information about firms in enclosing, further comprise: the member in described two-dimension code good friend encloses can deliver or ask for business card mutually, the member of described two-dimension code good friend in enclosing upgrades after the card information, utilizes card information after the server active push is upgraded each member's client in enclosing to described two-dimension code good friend.
Technique scheme has following beneficial effect: (1) user adds circle, the information of fast checking all participants by the scanning two-dimension code; The side of holding is without manual maintenance user's information simultaneously, and after user's modification information, server is with new information update each member's to the circle client.(2) adopt session negotiation mechanism, when the user initiated to sweep the sign indicating number request by user end to server, server carried out authentication to the user; Employing expired time mechanism is set and is swept a yard time limit; And member's verification mechanism in the circle, set circle member scope, guarantee user information safety.(3) user can individual character be provided with the visibility of personal information and freely select to withdraw from added circle, the protection individual privacy.(4) support any third party's two-dimension code tool scans, utilize phone number and the short-message verification sign indicating number that issues is at random guaranteed the identity authenticity.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of method flow diagram of sharing contacts network based on two-dimension code of the embodiment of the invention;
Fig. 2 is a kind of system's composition schematic diagram of sharing contacts network based on two-dimension code of the embodiment of the invention;
Fig. 3 makes the schematic diagram of two-dimension code for application example client of the present invention;
Fig. 4 adds the schematic diagram of good friend's circle for application example client scan two-dimension code of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
As shown in Figure 1, be a kind of method flow diagram of the embodiment of the invention based on the shared contacts network of two-dimension code, described method based on the shared contacts network of two-dimension code comprises:
101, obtain the request of the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence;
102, add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined;
103, if audit is passed through, then show that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing.
Optionally, before the described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, described method also comprises: be made into two-dimension code according to movable theme, content, location information, and set review mechanism; Server generates the two-dimension code good friend circle of described two-dimension code correspondence and returns client according to the described review mechanism of described two-dimension code and setting; Setting at described two-dimension code good friend circle includes but not limited to: and someone is not simultaneously in a certain contact coil; Withdraw from good friend's circle; Member's message in the shielding good friend encloses; Forbid adding any good friend's circle; Setting at userspersonal information's visibility includes but not limited to: agree that the stranger delivers business card; Forbid receiving stranger's message; In enclosing, a certain good friend announces part or all of information; Issue described two-dimension code.
Optionally, described review mechanism comprises: sweep a yard time limit, user identity ID scope; The described request that adds the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined, comprise: add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined.
Optionally, the described two-dimension code of described issue comprises: choose corresponding two-dimension code published method according to the character of activity, described two-dimension code published method comprises: on-the-spot issue, or utilize microblogging, internet site, newspaper, advertising media's mode to issue.
Optionally, described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, comprise: when the user adopts third party's tool scans two-dimension code, the conversation mechanism by oauth then, send conversation request to server, server judges that the user is a nonregistered user, will return webpage version customer terminal webpage, reminds user's registration; The user is by filling in cell-phone number, and receives the short-message verification sign indicating number and finish registration, then improve card information after, add the request of the two-dimension code good friend circle of described two-dimension code correspondence by the application of webpage version client; If the user utilizes client-side program that two-dimension code is scanned, the identification 2 D code information, application adds good friend's circle of described two-dimension code correspondence, then sets up interim conversation by the oauth agreement, utilizes server that described user is carried out authentication; The described request that adds the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined, comprise: add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, judge whether the two-dimension code good friend circle of described two-dimension code correspondence exists; If the two-dimension code good friend of described two-dimension code correspondence encloses existence, then add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined; Describedly show that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing, comprise: the member in described two-dimension code good friend encloses can deliver or ask for business card mutually, the member of described two-dimension code good friend in enclosing upgrades after the card information, utilizes card information after the server active push is upgraded each member's client in enclosing to described two-dimension code good friend.
Corresponding to said method embodiment, as shown in Figure 2, a kind of system based on the shared contacts network of two-dimension code forms schematic diagram for the embodiment of the invention, and described system based on the shared contacts network of two-dimension code comprises: client 21 and server 22, wherein,
Described server 22 is used to obtain the request of the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence; Add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined;
Described client 21 is used for after audit is passed through, and shows that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing.
Optionally, before the described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, described client also is used for being made into two-dimension code according to movable theme, content, location information, and sets review mechanism; Server generates the two-dimension code good friend circle of described two-dimension code correspondence and returns client according to the described review mechanism of described two-dimension code and setting; Setting at described two-dimension code good friend circle includes but not limited to: and someone is not simultaneously in a certain contact coil; Withdraw from good friend's circle; Member's message in the shielding good friend encloses; Forbid adding any good friend's circle; Setting at userspersonal information's visibility includes but not limited to: agree that the stranger delivers business card; Forbid receiving stranger's message; In enclosing, a certain good friend announces part or all of information; Issue described two-dimension code.
Optionally, described review mechanism comprises: sweep a yard time limit, user identity ID scope; Described server is further used for adding according to described application the request of the two-dimension code good friend circle of described two-dimension code correspondence, utilizes the described review mechanism that presets that described user identity is examined.
Optionally, described client 21 is further used for choosing corresponding two-dimension code published method according to the character of activity, and described two-dimension code published method comprises: on-the-spot issue, or utilize microblogging, internet site, newspaper, advertising media's mode to issue.
Optionally, described client 21 is further used for when the user adopts third party's tool scans two-dimension code, then by the conversation mechanism of oauth, send conversation request to server, server judges that the user is a nonregistered user, to return webpage version customer terminal webpage, remind user's registration; The user is by filling in cell-phone number, and receives the short-message verification sign indicating number and finish registration, then improve card information after, add the request of the two-dimension code good friend circle of described two-dimension code correspondence by the application of webpage version client; If the user utilizes client-side program that two-dimension code is scanned, the identification 2 D code information, application adds good friend's circle of described two-dimension code correspondence, then sets up interim conversation by the oauth agreement, utilizes server that described user is carried out authentication; Described server 22 is further used for adding according to described application the request of the two-dimension code good friend circle of described two-dimension code correspondence, judges whether the two-dimension code good friend circle of described two-dimension code correspondence exists; If the two-dimension code good friend of described two-dimension code correspondence encloses existence, then add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined; Described client 21, be used for two-dimension code good friend in the described two-dimension code correspondence of described user's demonstration and enclose information and the described two-dimension code good friend information about firms in enclosing, further comprise: the member in described two-dimension code good friend encloses can deliver or ask for business card mutually, the member of described two-dimension code good friend in enclosing upgrades after the card information, utilizes card information after the server active push is upgraded each member's client in enclosing to described two-dimension code good friend.
Embodiment of the invention technique scheme has following beneficial effect: (1) user adds circle, the information of fast checking all participants by the scanning two-dimension code; The side of holding is without manual maintenance user's information simultaneously, and after user's modification information, server is with new information update each member's to the circle client.(2) adopt session negotiation mechanism, when the user initiated to sweep the sign indicating number request by user end to server, server carried out authentication to the user; Employing expired time mechanism is set and is swept a yard time limit; And member's verification mechanism in the circle, set circle member scope, guarantee user information safety.(3) user can individual character be provided with the visibility of personal information and freely select to withdraw from added circle, the protection individual privacy.(4) support any third party's two-dimension code tool scans, utilize phone number and the short-message verification sign indicating number that issues is at random guaranteed the identity authenticity.
Below lifting application example is elaborated to the described scheme of the invention described above:
The described scheme of application example of the present invention adopts the C/S(client and server) framework, mainly form by client and server.Client is installed on user's the mobile communication equipment, is mainly used to make and the scanning two-dimension code, creates and adds the good friend and enclose, and communicates by letter with server end; Server is to be arranged in the Internet, is mainly used to the leading subscriber data, with client communication etc.Make, sweep mainly that sign indicating number adds good friend's circle and user's scene describes with regard to two-dimension code.
As shown in Figure 3, make the schematic diagram of two-dimension code for application example client of the present invention: the user edits relevant information, including but not limited to theme, place, unit and personal information etc., generate two-dimension code, and set and sweep a yard time limit, and set circle member scope, the scope relevant review mechanisms such as (including but not limited to these) as user identity ID uploads onto the server; Server is created good friend's circle in view of the above and is returned client.Subscription client shows new good friend's circle of creating, and founder's information (mainly be card information, comprise contact method, mail, address etc.) is only arranged in good friend's circle this moment; At last, the user can adopt multiple mode to issue two-dimension code.
As shown in Figure 4, the schematic diagram that adds good friend's circle for application example client scan two-dimension code of the present invention: during user B scanning circle two-dimension code, if user B adopts other two-dimension code scanning tools of non-client, then send conversation request to server, (the oauth agreement provides a safety, open and easy standard for the mandate of user resources by the oauth agreement.With in the past authorization difference be that the mandate of oauth can not make the third party touch user's account (as user name and password), be that the third party need not to use user's user name and the mandate that password just can apply for obtaining these user resources, therefore oauth is safe) conversation mechanism, server judges that the user is a nonregistered user, to return webpage version customer terminal webpage, remind user's registration.The user finishes registration by filling in cell-phone number and receiving the short-message verification sign indicating number, then improves card information, can add circle by the application of webpage version client software, and its flow process is the same with client application adding circle, and idiographic flow as shown in Figure 4.
If user B utilizes client-side program that two-dimension code is scanned, the identification 2 D code information, application adds good friend's circle, set up interim conversation by the oauth agreement, the authentication of server by user B, and check circle and whether exist, if do not exist, then return error result; If circle information confirmation, the identity ID(that client is swept yard time and user with transmission can be cell-phone number, the pet name of registered user etc.) verify to server, if the application time is in the scope that keeper's (founder of good friend's circle is user A) sets, then continue identity verification ID, if identity ID is in limited range, apply for then that successfully the client of user B shows information about firms in good friend's circle and the circle.If one of them audit failure of application time and identity ID, then submit to the good friend to enclose founder (keeper) manual examination and verification, the good friend encloses the term of validity and the identity ID scope that founder (keeper) can adjust the two-dimension code circle, and return auditing result and give server, return application result by server to customer end B.Member in the good friend encloses can deliver or ask for business card mutually, and the member upgrades after the business card in the circle, and the server active push is updated to each member's client in the circle.
The user can personal settings information visibility, the protection individual privacy.Setting at good friend's circle includes but not limited to: and someone is not simultaneously in a certain contact coil; Withdraw from good friend's circle; Member's message in the shielding good friend encloses; Forbid adding any good friend's circle etc.Setting at the personal information visibility includes but not limited to: agree that the stranger delivers business card; Forbid receiving stranger's message; In enclosing, a certain good friend announces part or all of information etc.
Common user's scene is given an example: meeting, party, movable interchange, business promotion etc., and hold root and become two-dimension code, and set review mechanism, for example expired time limit mechanism, identity ID scope etc. according to information issuings such as movable theme, content, places; The user chooses the two-dimension code published method according to the character of activity, and for example media modes issues such as microblogging, internet site, newspaper, advertisement are issued, utilized at the scene.The application of scanning input two-dimension code adds good friend's circle, and server then successfully adds good friend's circle according to the predefined review mechanism audit of keeper user identity if meet, and subscription client shows good friend's circle and information about firms thereof; Otherwise, then wait for keeper's auditing result.Member in the good friend encloses can deliver or ask for business card, and information about firms is revised and also can be upgraded in time to subscription client in the circle, and movable multidate information also can upgrade in time to each subscription client.
Application example of the present invention proposes a kind of scheme that makes up and share contacts network based on two-dimension code for the problem that on-the-fly modifies of the automatic audit that solves circle member identity and member's identity information.Be that registered user A utilizes client software editor relevant information (for example Session Topic, place, unit and personal information etc.) generation activity two-dimension code, set and sweep a yard time limit, add the review mechanism of circle etc., and upload server.(support random two-dimensional sign indicating number scanning tools) when user B scans this two-dimension code, i.e. application adds this circle, and whether the identity information of server authentication user B is the registered user promptly; Check circle information to be added availability and integrality, sweep yard time whether within the time limit that registered user A sets; And judge that user B identity is whether in the scope that registered user A sets.User B successfully adds after this circle, can see other movable participants' information; The advantage of application example of the present invention is:
(1) user adds circle, the information of fast checking all participants by the scanning two-dimension code; The side of holding is without manual maintenance user's information simultaneously, and after user's modification information, server is with new information update each member's to the circle client.
(2) adopt session negotiation mechanism, when the user initiated to sweep the sign indicating number request by user end to server, server carried out authentication to the user; Employing expired time mechanism is set and is swept a yard time limit; And member's verification mechanism in the circle, set circle member scope, guarantee user information safety.
(3) user can individual character be provided with the visibility of personal information and freely select to withdraw from added circle, the protection individual privacy.
(4) support any third party's two-dimension code tool scans, utilize phone number and the short-message verification sign indicating number that issues is at random guaranteed the identity authenticity.
Those skilled in the art can also recognize the various illustrative components, blocks (illustrative logical block) that the embodiment of the invention is listed, and unit and step can be passed through electronic hardware, computer software, or both combinations realize.Be the clear replaceability (interchangeability) of showing hardware and software, above-mentioned various illustrative components (illustrative components), unit and step have been described their function generally.Such function is to realize depending on the specific application and the designing requirement of whole system by hardware or software.Those skilled in the art can be for every kind of specific application, and can make ins all sorts of ways realizes described function, but this realization should not be understood that to exceed the scope of embodiment of the invention protection.
Various illustrative logical block described in the embodiment of the invention, or the unit can pass through general processor, digital signal processor, application-specific integrated circuit (ASIC) (ASIC), field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the design of above-mentioned any combination realizes or operates described function.General processor can be microprocessor, and alternatively, this general processor also can be any traditional processor, controller, microcontroller or state machine.Processor also can realize by the combination of calculation element, for example digital signal processor and microprocessor, a plurality of microprocessors, Digital Signal Processor Core of one or more microprocessors associatings, or any other similarly configuration realize.
The method described in the embodiment of the invention or the step of algorithm can directly embed hardware, the software module of processor execution or the two combination.Software module can be stored in the storage medium of other arbitrary form in RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this area.Exemplarily, storage medium can be connected with processor, so that processor can read information from storage medium, and can deposit write information to storage medium.Alternatively, storage medium can also be integrated in the processor.Processor and storage medium can be arranged among the ASIC, and ASIC can be arranged in the user terminal.Alternatively, processor and storage medium also can be arranged in the different parts in the user terminal.
In one or more exemplary designs, the described above-mentioned functions of the embodiment of the invention can realize in hardware, software, firmware or this three's combination in any.If realize in software, these functions can be stored on the media with computer-readable, or are transmitted on the media of computer-readable with one or more instructions or code form.The computer-readable media comprises the computer storage medium and is convenient to make allows computer program transfer to other local communication medium from a place.Storage medium can be the useable medium that any general or special computer can access.For example, such computer readable media can include but not limited to RAM, ROM, EEPROM, CD-ROM or other optical disc storage, disk storage or other magnetic storage device, or other anyly can be used to carry or store the media that can be read the program code of form with instruction or data structure and other by general or special computer or general or special processor.In addition, any connection can suitably be defined as the computer-readable media, for example, if software is by a coaxial cable, fiber optic cables, twisted-pair feeder, Digital Subscriber Line (DSL) or also being comprised in the defined computer-readable media with wireless mode transmission such as for example infrared, wireless and microwaves from a web-site, server or other remote resource.Described video disc (disk) and disk (disc) comprise Zip disk, radium-shine dish, CD, DVD, floppy disk and Blu-ray Disc, and disk is usually with the magnetic duplication data, and video disc carries out the optical reproduction data with laser usually.Above-mentioned combination also can be included in the computer-readable media.
Above-described embodiment; purpose of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the above only is the specific embodiment of the present invention; and be not intended to limit the scope of the invention; within the spirit and principles in the present invention all, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. the method based on the shared contacts network of two-dimension code is characterized in that, described method based on the shared contacts network of two-dimension code comprises:
Obtain the request of the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence;
Add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined;
If audit is passed through, then show that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing.
2. share the method for contacts network according to claim 1 based on two-dimension code, it is characterized in that, before the described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, described method also comprises:
Be made into two-dimension code according to movable theme, content, location information, and set review mechanism;
Server generates the two-dimension code good friend circle of described two-dimension code correspondence and returns client according to the described review mechanism of described two-dimension code and setting; Setting at described two-dimension code good friend circle includes but not limited to: and someone is not simultaneously in a certain contact coil; Withdraw from good friend's circle; Member's message in the shielding good friend encloses; Forbid adding any good friend's circle; Setting at userspersonal information's visibility includes but not limited to: agree that the stranger delivers business card; Forbid receiving stranger's message; In enclosing, a certain good friend announces part or all of information;
Issue described two-dimension code.
3. as share the method for contacts network as described in the claim 2 based on two-dimension code, it is characterized in that described review mechanism comprises: sweep a yard time limit, user identity ID scope; Describedly add the request of the two-dimension code good friend circle of described two-dimension code correspondence, described user identity examined, comprising according to described application:
Add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined.
4. as share the method for contacts network as described in the claim 2 based on two-dimension code, it is characterized in that the described two-dimension code of described issue comprises:
Choose corresponding two-dimension code published method according to the character of activity, described two-dimension code published method comprises: on-the-spot issue, or utilize microblogging, internet site, newspaper, advertising media's mode to issue.
5. described in claim 3, share the method for contacts network, it is characterized in that based on two-dimension code,
Described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence, comprise: when the user adopts third party's tool scans two-dimension code, the conversation mechanism by oauth then, send conversation request to server, server judges that the user is a nonregistered user, to return webpage version customer terminal webpage, remind user's registration; The user is by filling in cell-phone number, and receives the short-message verification sign indicating number and finish registration, then improve card information after, add the request of the two-dimension code good friend circle of described two-dimension code correspondence by the application of webpage version client; If the user utilizes client-side program that two-dimension code is scanned, the identification 2 D code information, application adds good friend's circle of described two-dimension code correspondence, then sets up interim conversation by the oauth agreement, utilizes server that described user is carried out authentication;
The described request that adds the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined, comprise: add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, judge whether the two-dimension code good friend circle of described two-dimension code correspondence exists; If the two-dimension code good friend of described two-dimension code correspondence encloses existence, then add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined;
Describedly show that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing, comprise: the member in described two-dimension code good friend encloses can deliver or ask for business card mutually, the member of described two-dimension code good friend in enclosing upgrades after the card information, utilizes card information after the server active push is upgraded each member's client in enclosing to described two-dimension code good friend.
6. the system based on the shared contacts network of two-dimension code is characterized in that, described system based on the shared contacts network of two-dimension code comprises: client and server, wherein,
Described server is used to obtain the request of the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence; Add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, described user identity is examined;
Described client is used for after audit is passed through, and shows that in described user client the two-dimension code good friend of described two-dimension code correspondence encloses information and the described two-dimension code good friend information about firms in enclosing.
7. as share the system of contacts network as described in the claim 6 based on two-dimension code, it is characterized in that, before the described request of obtaining the two-dimension code good friend circle that the application that sends behind the scanning input two-dimension code adds described two-dimension code correspondence,
Described client also is used for being made into two-dimension code according to movable theme, content, location information, and sets review mechanism; Server generates the two-dimension code good friend circle of described two-dimension code correspondence and returns client according to the described review mechanism of described two-dimension code and setting; Setting at described two-dimension code good friend circle includes but not limited to: and someone is not simultaneously in a certain contact coil; Withdraw from good friend's circle; Member's message in the shielding good friend encloses; Forbid adding any good friend's circle; Setting at userspersonal information's visibility includes but not limited to: agree that the stranger delivers business card; Forbid receiving stranger's message; In enclosing, a certain good friend announces part or all of information; Issue described two-dimension code.
8. as share the system of contacts network as described in the claim 7 based on two-dimension code, it is characterized in that described review mechanism comprises: sweep a yard time limit, user identity ID scope;
Described server is further used for adding according to described application the request of the two-dimension code good friend circle of described two-dimension code correspondence, utilizes the described review mechanism that presets that described user identity is examined.
9. as share the system of contacts network as described in the claim 7 based on two-dimension code, it is characterized in that,
Described client is further used for choosing corresponding two-dimension code published method according to the character of activity, and described two-dimension code published method comprises: on-the-spot issue, or utilize microblogging, internet site, newspaper, advertising media's mode to issue.
10. described in claim 8, share the system of contacts network, it is characterized in that based on two-dimension code,
Described client is further used for when the user adopts third party's tool scans two-dimension code, then the conversation mechanism by oauth, send conversation request to server, server judges that the user is a nonregistered user, will return webpage version customer terminal webpage, reminds user's registration; The user is by filling in cell-phone number, and receives the short-message verification sign indicating number and finish registration, then improve card information after, add the request of the two-dimension code good friend circle of described two-dimension code correspondence by the application of webpage version client; If the user utilizes client-side program that two-dimension code is scanned, the identification 2 D code information, application adds good friend's circle of described two-dimension code correspondence, then sets up interim conversation by the oauth agreement, utilizes server that described user is carried out authentication;
Described server is further used for adding according to described application the request of the two-dimension code good friend circle of described two-dimension code correspondence, judges whether the two-dimension code good friend circle of described two-dimension code correspondence exists; If the two-dimension code good friend of described two-dimension code correspondence encloses existence, then add the request of the two-dimension code good friend circle of described two-dimension code correspondence according to described application, utilize the described review mechanism that presets that described user identity is examined;
Described client, be used for two-dimension code good friend in the described two-dimension code correspondence of described user's demonstration and enclose information and the described two-dimension code good friend information about firms in enclosing, further comprise: the member in described two-dimension code good friend encloses can deliver or ask for business card mutually, the member of described two-dimension code good friend in enclosing upgrades after the card information, utilizes card information after the server active push is upgraded each member's client in enclosing to described two-dimension code good friend.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101618083A CN103227796A (en) | 2013-05-06 | 2013-05-06 | Method and system of sharing contact network based on two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013101618083A CN103227796A (en) | 2013-05-06 | 2013-05-06 | Method and system of sharing contact network based on two-dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103227796A true CN103227796A (en) | 2013-07-31 |
Family
ID=48838057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013101618083A Pending CN103227796A (en) | 2013-05-06 | 2013-05-06 | Method and system of sharing contact network based on two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103227796A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103490985A (en) * | 2013-09-18 | 2014-01-01 | 天脉聚源(北京)传媒科技有限公司 | Method and device for processing picture messages |
CN103490984A (en) * | 2013-09-17 | 2014-01-01 | 天脉聚源(北京)传媒科技有限公司 | Method and device for obtaining user information |
CN103501265A (en) * | 2013-09-17 | 2014-01-08 | 天脉聚源(北京)传媒科技有限公司 | Method and device for acquiring user information |
CN103532971A (en) * | 2013-10-24 | 2014-01-22 | 北京星网锐捷网络技术有限公司 | Authentication method, device and system based on two-dimensional code |
CN103685526A (en) * | 2013-12-17 | 2014-03-26 | 小米科技有限责任公司 | Network business card information identification method and device and server |
CN104484342A (en) * | 2014-11-24 | 2015-04-01 | 广州华多网络科技有限公司 | Contact data sharing system as well as method and relevant apparatus |
CN104637010A (en) * | 2015-03-16 | 2015-05-20 | 上海摩拜信息技术有限公司 | Method and device for classroom interaction question answering between computer and mobile terminal based on two-dimensional code |
CN104766231A (en) * | 2015-04-29 | 2015-07-08 | 朱海清 | Real-time communication information transmission method for the same commodity |
CN104869143A (en) * | 2014-02-26 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Data sharing method and device, client and server |
CN106202407A (en) * | 2016-07-11 | 2016-12-07 | 郑巍 | User profile based on virtual scene is issued and store method |
CN107016420A (en) * | 2016-12-08 | 2017-08-04 | 阿里巴巴集团控股有限公司 | A kind of method for processing business and device |
CN107491993A (en) * | 2017-08-29 | 2017-12-19 | 重庆科技学院 | A kind of shared system promoted of alliance tissue |
CN108055297A (en) * | 2017-11-30 | 2018-05-18 | 贝壳旅行科技(深圳)有限公司 | For going out the interim dialogue method of administrative staff and device |
CN108111490A (en) * | 2017-12-07 | 2018-06-01 | 中仁车汇科技发展(深圳)有限公司 | Relation establishing method and equipment and computer storage media between a kind of user |
CN109063968A (en) * | 2018-07-04 | 2018-12-21 | 武汉百智诚远科技有限公司 | A kind of intelligence law enforcement management method |
CN109766499A (en) * | 2018-10-26 | 2019-05-17 | 深圳壹账通智能科技有限公司 | Adding Way, device and the computer equipment of group |
CN110619097A (en) * | 2019-09-12 | 2019-12-27 | 北京达佳互联信息技术有限公司 | Two-dimensional code generation method and device, electronic equipment and storage medium |
CN111479222A (en) * | 2020-03-12 | 2020-07-31 | 巧爱恋爱顾问有限公司 | Method for establishing social network connection, electronic device and storage medium |
CN112367244A (en) * | 2020-10-28 | 2021-02-12 | 每日互动股份有限公司 | Communication method, terminal, server, and computer-readable storage medium |
CN112733105A (en) * | 2021-01-22 | 2021-04-30 | 南京生兴有害生物防治技术股份有限公司 | Personnel invitation registration management method applied to construction management software for preventing and controlling pine wilt disease |
US11178519B2 (en) | 2015-06-25 | 2021-11-16 | Kakao Corp. | Message service provision method for providing message service via open chat room corresponding to link information, and message server and terminal for executing same |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132293A (en) * | 2007-08-24 | 2008-02-27 | 华为技术有限公司 | Individual information processing method, system and device |
CN102567857A (en) * | 2012-01-18 | 2012-07-11 | 北京友录在线科技发展有限公司 | Method for quickly joining into organization by photographing with handheld mobile terminal |
CN102647478A (en) * | 2012-05-16 | 2012-08-22 | 深圳市乐唯科技开发有限公司 | Automatic updating method for electronic name card, server and system |
CN102867165A (en) * | 2012-09-19 | 2013-01-09 | 腾讯科技(深圳)有限公司 | Method and associated device for providing and storing two-dimension code information, and associated device |
CN102905232A (en) * | 2012-09-20 | 2013-01-30 | 北京灵创众和科技有限公司 | Method, device and system based on contacts person network of mobile communication terminal |
CN103051764A (en) * | 2012-09-26 | 2013-04-17 | 宜兴市中碳科技有限公司 | Method for sharing information of contact persons in mobile phone |
-
2013
- 2013-05-06 CN CN2013101618083A patent/CN103227796A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132293A (en) * | 2007-08-24 | 2008-02-27 | 华为技术有限公司 | Individual information processing method, system and device |
CN102567857A (en) * | 2012-01-18 | 2012-07-11 | 北京友录在线科技发展有限公司 | Method for quickly joining into organization by photographing with handheld mobile terminal |
CN102647478A (en) * | 2012-05-16 | 2012-08-22 | 深圳市乐唯科技开发有限公司 | Automatic updating method for electronic name card, server and system |
CN102867165A (en) * | 2012-09-19 | 2013-01-09 | 腾讯科技(深圳)有限公司 | Method and associated device for providing and storing two-dimension code information, and associated device |
CN102905232A (en) * | 2012-09-20 | 2013-01-30 | 北京灵创众和科技有限公司 | Method, device and system based on contacts person network of mobile communication terminal |
CN103051764A (en) * | 2012-09-26 | 2013-04-17 | 宜兴市中碳科技有限公司 | Method for sharing information of contact persons in mobile phone |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103501265B (en) * | 2013-09-17 | 2017-01-25 | 天脉聚源(北京)传媒科技有限公司 | Method and device for acquiring user information |
CN103490984A (en) * | 2013-09-17 | 2014-01-01 | 天脉聚源(北京)传媒科技有限公司 | Method and device for obtaining user information |
CN103501265A (en) * | 2013-09-17 | 2014-01-08 | 天脉聚源(北京)传媒科技有限公司 | Method and device for acquiring user information |
CN103490984B (en) * | 2013-09-17 | 2016-08-17 | 天脉聚源(北京)传媒科技有限公司 | A kind of method and apparatus obtaining user profile |
CN103490985B (en) * | 2013-09-18 | 2017-06-06 | 天脉聚源(北京)传媒科技有限公司 | A kind for the treatment of method and apparatus of image information |
CN103490985A (en) * | 2013-09-18 | 2014-01-01 | 天脉聚源(北京)传媒科技有限公司 | Method and device for processing picture messages |
CN103532971A (en) * | 2013-10-24 | 2014-01-22 | 北京星网锐捷网络技术有限公司 | Authentication method, device and system based on two-dimensional code |
CN103532971B (en) * | 2013-10-24 | 2017-01-25 | 北京星网锐捷网络技术有限公司 | Authentication method, device and system based on two-dimensional code |
CN103685526A (en) * | 2013-12-17 | 2014-03-26 | 小米科技有限责任公司 | Network business card information identification method and device and server |
WO2015127784A1 (en) * | 2014-02-26 | 2015-09-03 | Tencent Technology (Shenzhen) Company Limited | Method and system for sharing data between social networking platforms |
CN104869143A (en) * | 2014-02-26 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Data sharing method and device, client and server |
CN104484342B (en) * | 2014-11-24 | 2018-09-21 | 广州华多网络科技有限公司 | A kind of contact data shared system and method, relevant device |
CN104484342A (en) * | 2014-11-24 | 2015-04-01 | 广州华多网络科技有限公司 | Contact data sharing system as well as method and relevant apparatus |
CN104637010A (en) * | 2015-03-16 | 2015-05-20 | 上海摩拜信息技术有限公司 | Method and device for classroom interaction question answering between computer and mobile terminal based on two-dimensional code |
CN104766231A (en) * | 2015-04-29 | 2015-07-08 | 朱海清 | Real-time communication information transmission method for the same commodity |
US11778429B2 (en) | 2015-06-25 | 2023-10-03 | Kakao Corp. | Message service provision method for providing message service via open chat room corresponding to link information, and message server and terminal for executing same |
CN115242567A (en) * | 2015-06-25 | 2022-10-25 | 可可株式会社 | Message service providing method, host terminal and client terminal for executing the message service providing method |
US11178519B2 (en) | 2015-06-25 | 2021-11-16 | Kakao Corp. | Message service provision method for providing message service via open chat room corresponding to link information, and message server and terminal for executing same |
CN106202407A (en) * | 2016-07-11 | 2016-12-07 | 郑巍 | User profile based on virtual scene is issued and store method |
CN107016420A (en) * | 2016-12-08 | 2017-08-04 | 阿里巴巴集团控股有限公司 | A kind of method for processing business and device |
US10902233B2 (en) | 2016-12-08 | 2021-01-26 | Advanced New Technologies Co., Ltd. | Service processing using a digital object identifier |
US10977465B2 (en) | 2016-12-08 | 2021-04-13 | Advanced New Technologies Co., Ltd. | Service processing using a digital object identifier |
US10977464B2 (en) | 2016-12-08 | 2021-04-13 | Advanced New Technologies Co., Ltd. | Service processing using a digital object identifier |
US10607050B2 (en) | 2016-12-08 | 2020-03-31 | Alibaba Group Holding Limited | Service processing using a digital object identifier |
CN107491993A (en) * | 2017-08-29 | 2017-12-19 | 重庆科技学院 | A kind of shared system promoted of alliance tissue |
CN108055297A (en) * | 2017-11-30 | 2018-05-18 | 贝壳旅行科技(深圳)有限公司 | For going out the interim dialogue method of administrative staff and device |
CN108111490B (en) * | 2017-12-07 | 2021-06-01 | 中仁车汇科技发展(深圳)有限公司 | Method and equipment for establishing relationship between users and computer storage medium |
CN108111490A (en) * | 2017-12-07 | 2018-06-01 | 中仁车汇科技发展(深圳)有限公司 | Relation establishing method and equipment and computer storage media between a kind of user |
CN109063968A (en) * | 2018-07-04 | 2018-12-21 | 武汉百智诚远科技有限公司 | A kind of intelligence law enforcement management method |
CN109766499A (en) * | 2018-10-26 | 2019-05-17 | 深圳壹账通智能科技有限公司 | Adding Way, device and the computer equipment of group |
CN109766499B (en) * | 2018-10-26 | 2023-04-21 | 深圳壹账通智能科技有限公司 | Group joining method and device and computer equipment |
CN110619097A (en) * | 2019-09-12 | 2019-12-27 | 北京达佳互联信息技术有限公司 | Two-dimensional code generation method and device, electronic equipment and storage medium |
CN111479222A (en) * | 2020-03-12 | 2020-07-31 | 巧爱恋爱顾问有限公司 | Method for establishing social network connection, electronic device and storage medium |
CN112367244A (en) * | 2020-10-28 | 2021-02-12 | 每日互动股份有限公司 | Communication method, terminal, server, and computer-readable storage medium |
CN112733105A (en) * | 2021-01-22 | 2021-04-30 | 南京生兴有害生物防治技术股份有限公司 | Personnel invitation registration management method applied to construction management software for preventing and controlling pine wilt disease |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103227796A (en) | Method and system of sharing contact network based on two-dimensional code | |
US11310189B1 (en) | Method and system to converse across fragmented messaging services based on discussion topics | |
US10922772B2 (en) | Copyright authorization management method and system | |
US10779134B2 (en) | Method of sending messages to devices not configured to receive them | |
CN103986688B (en) | Method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus | |
US10306002B2 (en) | Must-reply mobile questionnaire system and method | |
JP2014505291A (en) | Coupon notification and provision system using SNS information and method thereof | |
CN105897704B (en) | The methods, devices and systems of permission addition, permission addition request | |
US20200137004A1 (en) | Systems, methods and computer program products for providing enhanced chat services | |
US9516009B2 (en) | Authenticating redirection service | |
CN115668185A (en) | Method and apparatus for managing external approval provisioning and external messaging communication requests in a group-based communication system | |
US20180210964A1 (en) | Third-party database interaction to provision users | |
CN103491156A (en) | Method and system for enabling circles and groups to be synchronous based on converged communication | |
US9929995B2 (en) | Third party messaging system for monitoring and managing domain names and websites | |
CN104618322A (en) | Data processing method and device based on instant communication tool | |
CN105354700A (en) | Forum type interaction and management method and system for building information documents | |
CN111181833B (en) | Enterprise interconnection realization method and device | |
CN102905232B (en) | Method based on communication terminal address book contact network, Apparatus and system | |
CN109040331B (en) | Electronic business card processing method and device, computing equipment and storage medium | |
US10749850B2 (en) | Method for checking a parameter indicating a confidence level associated with a user account of an online service | |
CN115130012A (en) | Method and device for joining group, electronic equipment and storage medium | |
CN110097202B (en) | Hotel reservation management method, system, device and computer storage medium | |
CN104901869A (en) | Online group member interaction method | |
TWI614623B (en) | System and operating method of questionnaire sticker applying to various communication software programs | |
CN114338059B (en) | Application opening method, device, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130731 |
|
RJ01 | Rejection of invention patent application after publication |