Detailed description of the invention
For making the purpose of the application, technical scheme and advantage clearer, specifically real below in conjunction with the application
Execute example and technical scheme is clearly and completely described by corresponding accompanying drawing.Obviously, described
Embodiment is only some embodiments of the present application rather than whole embodiments.Based on the enforcement in the application
Example, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of the application protection.
The management method of the contact information that Fig. 2 provides for the application first embodiment, specifically includes following step
Rapid:
S10: receive the first request obtaining requested people's contact information from claimant.
In the application first embodiment, claimant and requested people belong in a communication group jointly,
Such as this communication group be company be the communication group got in touch with each other of convenience that its internal staff sets up, as
Shown in Fig. 1.
Therefore, alternatively, can also include before S10: each object for belonging in same group divides
Join the step of virtual contact information.
Each using in communication group is assigned the virtual contact corresponding with its true contact information per family
Information, can realize in communication group the contact between user by virtual contact information.Due to communication group
In user be not aware that the true contact information of other users, therefore can avoid that employee's in enterprise is true
The problem that contact information is leaked out by internal staff.
It should be noted that all users formed one white list, institute in white list in communication group
There is the contact between user can be completed by virtual contact information.This virtual contact information includes virtual telephony
Number, virtual instant messaging account number, virtual electronic mail box address.Such as, the user of white list is permissible each other
Virtual-number is dialed, it is possible to directly put through number by mobile phone or system APP.But, if it is desired to
Obtain true contact information and then need to obtain the mandate of requested people.
So, when company external staff needs to get in touch with intra-company personnel, i.e. personnel outside communication group
When needing to get in touch with the user in communication group, the personnel outside communication group then do not have contact information with logical
User in letter group directly gets in touch with.Therefore, to realize the personnel outside communication group and communication group
In user between contact, the personnel outside communication group need to obtain the contact letter of user in communication group
Breath.This contact information is the true contact information of user in communication group.In the embodiment of the present application, communication
Personnel outside group want to obtain the personnel of user's contact information in communication group and is referred to as trustee, trustee
It is not belonging in communication group, as shown in Figure 1.
Need to be it is further noted that trustee passes through a user that can get in touch with in communication group to needing
Targeted customer to be got in touch with asks for contact information, the user that said one can be got in touch with recognized for trustee or
Having the user of contact information, be in this step alleged claimant, targeted customer is alleged in this step
Requested people.
During as trustee because business relations need to carry out business communication with requested people, the quilt that can will obtain
The user that the request of claimant's contact information recognizes in being sent to communication group, i.e. claimant.When claimant connects
In trustee's communication group to be obtained during the contact information of user, claimant can apply for obtaining to requested people
The contact information of requested people.It should be noted that claimant applies for obtaining requested people's to requested people
Contact information needs to be completed by an information acquisition platform.This information acquisition platform can be the most flat
Platform, it is also possible to be integrated with the already present contact platform for employee's contact.
The of requested people's contact information is obtained when claimant is sent to requested people by information acquisition platform
After one request, information acquisition platform background server can receive this first request.It should be noted that should
First request carries the user profile of claimant and requested people, and the information of trustee.Claimant with
The user profile of requested people pre-saves the background server in information acquisition platform.User profile includes:
The true contact information that the name of user, department, virtual contact information and virtual contact information are corresponding
Deng.The information of trustee includes its work unit, contact purpose, true contact information etc..
Specifically, receive the first request obtaining requested people's contact information that claimant sends, particularly as follows:
Receive claimant and obtain the of requested people's contact information by what the virtual contact information of requested people sent
One request.
Such as, after claimant dials the virtual phone number of requested people, claimant can enter voice message system
System, prompting claimant can carry out some option of operation, including obtaining requested people's actual telephone number
Option of operation, if claimant select requested people to be obtained actual telephone number option of operation after, then
May proceed to point out claimant to submit the relevant information including claimant and trustee to, claimant passes through language
After the mode such as sound or note submits the information of claimant and trustee to, server has been received by obtaining of claimant
Take the first request of requested people's contact information.
S30: second request that sends is to described requested people, and described second request is for obtaining described requested people
The request authorized, to provide the contact information of described requested people to described claimant.
In the application first embodiment, server gets in touch with letter the acquisition requested people that have received claimant
After first request of breath, second request that will send is to requested people.Specifically, the second request is for obtaining quilt
Claimant authorizes the request of the contact information to provide requested people to claimant.Wherein, the second request is carried
The user profile of claimant and the information of trustee.
S50: receive the described requested people result for described second request.
In the application first embodiment, requested people can according to second request in trustee information at
The second request that reason receives, i.e. decides whether to provide its true contact information according to the information of trustee
To claimant.When requested people thinks and truly has business contact demand with trustee, requested people then can be by it
True contact information is supplied to claimant.When requested people is not considered as having business contact demand with trustee
Time, its true contact information then will not be supplied to claimant by requested people.Confirm when requested people returns it
After result, server can receive requested people's result for the second request.
Such as, requested people receives information acquisition platform call, and requested people receives above-mentioned call
After can hear about second request related voice, and point out requested people next step operation.As agreed to carry
1 key can be pressed for true contact information, dissenting 2 keys can be pressed.Another kind of situation, requested people
Can also receive the short message prompt about its true contact information of acquisition of information acquisition platform, requested people can
Next step operation is carried out with the particular content according to note.
S70: according to described result, it is determined whether send the contact information of described requested people to institute
State claimant.
In the application first embodiment, according to the result of the requested people received, it is determined whether will
The contact information of requested people sends claimant to, specifically includes:
If receiving the message that requested people provides contact information to confirm, then the contact information of requested people is passed
Give claimant;
If not receiving the message that requested people provides contact information to confirm, the contact of requested people is not believed
Breath sends claimant to.
In the application first embodiment, server receives the confirmation offer contact information that requested people returns
Message after, the true connection that can directly contact that contact information virtual with requested people is corresponding will be searched
Network information, and the true contact information found is sent to claimant.So, claimant can will obtain again
The true contact information obtained is sent to trustee, thus realizes the contact between trustee and requested people.
The management method of the contact information that Fig. 3 provides for the application the second embodiment, comprises the following steps:
S10: receive the first request obtaining requested people's contact information that claimant sends.
Whether S20: confirmation request people has the acquisition authority of the contact information directly obtaining requested people.
If claimant has acquisition authority, then perform step S22.If claimant does not have acquisition authority, then
Perform step S30.
S22: directly the contact information of requested people is sent to claimant.
S30: second request that sends is to described requested people, and described second request is for obtaining described requested people
The request authorized, to provide the contact information of described requested people to described claimant.
S50: receive the described requested people result for described second request.
S70: according to described result, it is determined whether send the contact information of requested people to claimant.
Compared with the management method of the contact information that the application first embodiment provides, the application the second embodiment
The management method of contact information provided S20, S22 the most in steps after step S10, it is below for step
Rapid S20, S22 elaborate.
Whether step S20 has the acquisition power of the contact information directly obtaining requested people for confirmation request people
Limit.In above-mentioned communication group, if claimant be requested people directly under supervisor, then claimant then has
There is the acquisition authority of the true contact information obtaining requested people.
When claimant has acquisition authority, then performing step S22, such server is no need for please by second
Ask and be sent to requested people, it is only necessary to find the requested people that pre-saves in server truly gets in touch with letter
Cease, and the true contact information of direct requested people is sent to claimant.So, it is possible quickly will to be asked
The true contact information asked for help sends claimant to, has saved the time of acquisition of information, has improve acquisition of information
Efficiency.When claimant does not have acquisition authority, then continue executing with step S30.
The management method of the contact information that Fig. 4 provides for the application the 3rd embodiment, comprises the following steps:
S10: receive the first request obtaining requested people's contact information that claimant sends.
Whether S24: confirmation request people has has the request permissions initiating to obtain contact information to requested people.
If claimant has request permissions, then perform step S30.If claimant does not have request permissions, then
Perform step S26.
S26: return have no right obtain requested people's contact information be prompted to claimant.
S30: second request that sends is to described requested people, and described second request is for obtaining described requested people
The request authorized, to provide the contact information of described requested people to described claimant.
S50: receive the described requested people result for described second request.
S70: according to described result, it is determined whether send the contact information of requested people to claimant.
In the application the 3rd embodiment, in order to preferably protect user's in communication group truly to get in touch with letter
Breath, has permission restriction, and not all claimant for obtaining the claimant of the contact information of requested people
The contact information of requested people can be obtained.Such as, claimant adheres to different departments separately from requested people,
And onrelevant therebetween, then claimant then can be set to do not have request permissions.If claimant
Belong to identical department with requested people or there is relatedness, then claimant then can be set with please
Seek authority.Therefore before performing step S30, needing to first carry out step S24, i.e. whether confirmation request people
Have and there is the request permissions initiating to obtain contact information to requested people.
When claimant has request permissions, then continue executing with step S30.
When claimant does not has request permissions, then continuing executing with step S26, claimant then cannot obtain quilt
The contact information of claimant.
In the management method of the contact information of the application the 3rd embodiment offer, due to depositing of step S24
, some and the not related claimant of requested people can be avoided can to obtain the contact of requested people easily
Information, so that the contact information of the user in communication group can be protected well.
The management method of the contact information that example provides is executed above, based on same think of for the application first to the 3rd
Road, the managing device of the contact information that the application provides, as shown in Figures 5 and 6.
The structural representation of the managing device of a kind of contact information that Fig. 5 provides for the application, specifically includes:
First receives unit 101, for receiving first of the acquisition requested people's contact information from claimant
Request;
Transmitting element 103, asks to described requested people for sending second, and described second request is for obtaining
The request that described requested people authorizes, to provide the contact information of described requested people to described claimant;
Second receives unit 105, for receiving the described requested people result for described second request;
Alternatively, described device also comprises determining that unit 107, for according to described result, determines
Whether send the contact information of described requested people to described claimant.
Described contact information be can directly and requested people contact true contact information.
Described contact information includes at least one in telephone number, instant messaging account, E-mail address.
Alternatively, described device also includes: allocation unit (not shown), for for belonging in same group
Each object distribute virtual contact information.
Described first receives unit 101, specifically for:
Receive the acquisition requested people that described claimant is sent by the virtual contact information of described requested people
First request of contact information.
Alternatively, described determine unit 107, specifically for:
If receiving requested people to determine the message providing contact information, then the contact information of requested people is passed
Give claimant;
If not receiving requested people to determine the message providing contact information, the contact of requested people is not believed
Breath sends claimant to.
The structural representation of the managing device of the another kind of contact information that Fig. 6 provides for the application, specifically wraps
Include:
First receives unit 101, for receiving first of the acquisition requested people's contact information from claimant
Request;
Whether confirmation unit 102, have obtaining of the direct contact information obtaining requested people for confirmation request people
Weighting limit, or for confirmation request people whether have have to requested people initiate obtain contact information request
Authority
Transmitting element 103, asks to described requested people for sending second, and described second request is for obtaining
The request that described requested people authorizes, to provide the contact information of described requested people to described claimant;
Second receives unit 105, for receiving the described requested people result for described second request;
Determine unit 107, for according to described result, it is determined whether by the contact of described requested people
Information sends described claimant to.
Described contact information be can directly and requested people contact true contact information.
Described contact information includes at least one in telephone number, instant messaging account, E-mail address.
Described first receives unit 101, specifically for:
Receive the acquisition requested people that described claimant is sent by the virtual contact information of described requested people
First request of contact information.
Described determine unit 107, specifically for:
If receiving requested people to determine the message providing contact information, then the contact information of requested people is passed
Give claimant;
If not receiving requested people to determine the message providing contact information, the contact of requested people is not believed
Breath sends claimant to.
The management method of a kind of contact information that the embodiment of the present application provides and device, obtaining requested people's connection
Before network information, need could obtain the contact information of requested people through the agreement of requested people, by this
The method and device that application provides so that the true contact information of the personnel of enterprises is before without permission
Will not be compromised, it also is able to ensure that communication is smooth and easy simultaneously.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot
The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more
Computer-usable storage medium containing computer usable program code (include but not limited to disk memory,
CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention
The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and
/ or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding
The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating
The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one
The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set
In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory
Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart
The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes
Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices
Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one
The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
In a typical configuration, calculating equipment includes one or more processor (CPU), input/defeated
Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
(RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flash
RAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that removable media permanent and non-permanent, removable and non-can be by appointing
Where method or technology realize information storage.Information can be computer-readable instruction, data structure, program
Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory
(PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its
The random access memory (RAM) of his type, read only memory (ROM), electrically erasable are read-only
Memorizer (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory
(CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic
Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated
The information that equipment accesses.According to defining herein, computer-readable medium does not include temporary computer-readable matchmaker
Body (transitory media), such as data signal and the carrier wave of modulation.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non-
Comprising of exclusiveness, so that include that the process of a series of key element, method, commodity or equipment not only wrap
Include those key elements, but also include other key elements being not expressly set out, or also include for this process,
The key element that method, commodity or equipment are intrinsic.In the case of there is no more restriction, statement " include
One ... " key element that limits, it is not excluded that including the process of described key element, method, commodity or setting
Other identical element is there is also in Bei.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey
Sequence product.Therefore, the application can use complete hardware embodiment, complete software implementation or combine software and
The form of the embodiment of hardware aspect.And, the application can use and wherein include calculating one or more
The computer-usable storage medium of machine usable program code (include but not limited to disk memory, CD-ROM,
Optical memory etc.) form of the upper computer program implemented.
The foregoing is only embodiments herein, be not limited to the application.For this area skill
For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle
Any modification, equivalent substitution and improvement etc. made, within the scope of should be included in claims hereof.