Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 2 is a management method of contact information provided in a first embodiment of the present application, which specifically includes the following steps:
s10: a first request for obtaining contact information of a requested person is received from a requesting person.
In the first embodiment of the present application, the requester and the requested person belong to a communication group, for example, the communication group is a communication group established by a company for its internal personnel to facilitate mutual communication, as shown in fig. 1.
Therefore, optionally, before S10, the method may further include: and distributing virtual contact information to all the objects belonging to the same group.
Each user in the communication group is distributed with virtual contact information corresponding to the real contact information, and the contact among the users in the communication group can be realized through the virtual contact information. Because the users in the communication group do not know the real contact information of other users, the problem that the real contact information of the staff in the enterprise is revealed by the internal staff can be avoided.
It should be noted that all users in the communication group form a white list, and the contact between all users in the white list can be completed through the virtual contact information. The virtual contact information comprises a virtual telephone number, a virtual instant messaging account and a virtual email address. For example, users who are white-listed with each other can dial a virtual number through a mobile phone or a system APP, and then can dial the number directly. However, if the true contact information is to be obtained, authorization of the requested person needs to be obtained.
Thus, when the outside staff needs to contact the inside staff, namely the outside staff needs to contact the users in the communication group, the outside staff does not have a contact way to directly contact the users in the communication group. Therefore, in order to realize the contact between the person outside the communication group and the user inside the communication group, the person outside the communication group needs to obtain the contact information of the user inside the communication group. The contact information is the real contact information of the users in the communication group. In the embodiment of the present application, a person who wants to acquire contact information of a user in a communication group, among persons outside the communication group, is referred to as a principal, and the principal does not belong to the communication group, as shown in fig. 1.
It should be further noted that the client requests contact information from a target user to be contacted through a user that can be contacted in the communication group, where the user that can be contacted is a user that the client already knows or has a contact mode, that is, the user is called a requestor in this step, and the target user is called a requested person in this step.
When the client needs to communicate with the requested person because of the business relationship, the request of the contact information of the requested person to be acquired is sent to the users known in the communication group, namely the requesting person. When the requester receives the request of the client to obtain the contact information of the users in the communication group, the requester applies for obtaining the contact information of the requested person from the requested person. It should be noted that, the application of the contact information of the requested person from the requested person by the requesting person needs to be completed through an information obtaining platform. The information acquisition platform can be a separate platform or can be integrated with an existing contact platform for the staff to contact.
After the requester sends a first request for acquiring contact information of the requester to the requester through the information acquisition platform, the information acquisition platform background server receives the first request. It should be noted that the first request carries user information of the requester and the requester, and information of the principal. The user information of the requester and the requester is pre-stored in a background server of the information acquisition platform. The user information includes: the name of the user, the work department, the virtual contact information, the real contact information corresponding to the virtual contact information and the like. The information of the consignor includes its work unit, contact purpose, real contact information, and the like.
Specifically, receiving a first request for obtaining contact information of a requested person, which is sent by a requester, specifically includes: and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person through the virtual contact information of the requested person.
For example, after the requester dials the virtual phone number of the requested person, the requester enters the voice prompt system to prompt the requester to perform a plurality of operation options including an operation option for acquiring the real phone number of the requested person, if the requester selects the operation option for acquiring the real phone number of the requested person, the requester continues to prompt the requester to submit relevant information including the requester and the offeror, and after the requester submits information of the requester and the offeror in a voice or short message manner, the server receives a first request of the requester for acquiring contact information of the requested person.
S30: and sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person.
In the first embodiment of the application, after receiving a first request of a requester for obtaining contact information of a requested person, the server sends a second request to the requested person. Specifically, the second request is a request for obtaining the authorization of the requested person to provide the contact information of the requested person to the requesting person. The second request carries user information of the requester and information of the principal.
S50: and receiving a processing result of the requested person for the second request.
In the first embodiment of the present application, the requested person can process the received second request according to the information of the offeror in the second request, that is, decide whether to provide the real contact information thereof to the requesting person according to the information of the offeror. When the requested person considers that the service contact requirement is certainly met with the requesting person, the requested person can provide the real contact information of the requested person to the requesting person. When the requested person does not think that the service contact requirement exists with the requesting person, the requested person does not provide the real contact information of the requested person to the requesting person. And after the requested person returns the confirmation result, the server receives the processing result of the requested person for the second request.
For example, the requested person receives a telephone call of the information acquisition platform, and the requested person can hear the related voice about the second request after receiving the telephone call and prompt the requested person for the next operation. As the 1-key can be pressed for agreeing to provide real contact information, the 2-key can be pressed for disagreement. In another case, the requested person may also receive a short message prompt of the information acquisition platform about acquiring the real contact information of the requested person, and the requested person may perform the next operation according to the specific content of the short message.
S70: and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
In the first embodiment of the present application, determining whether to transmit the contact information of the requested person to the requesting person according to the received processing result of the requested person specifically includes:
if receiving the message that the requested person provides the contact information confirmation, transmitting the contact information of the requested person to the requesting person;
if the message that the requested person provides the contact information confirmation is not received, the contact information of the requested person is not transmitted to the requesting person.
In the first embodiment of the application, after receiving the message for confirming provision of the contact information returned by the requested person, the server searches for the real contact information which corresponds to the virtual contact information of the requested person and can be directly contacted, and sends the searched real contact information to the requesting person. In this way, the requester can send the obtained real contact information to the requester, thereby realizing the contact between the requester and the requested person.
Fig. 3 is a method for managing contact information according to a second embodiment of the present application, including the following steps:
s10: and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person.
S20: and determining whether the requester has the acquisition right of directly acquiring the contact information of the requested person.
If the requestor has the acquisition right, step S22 is executed. If the requestor does not have the acquisition authority, step S30 is performed.
S22: directly sending the contact information of the requested person to the requesting person.
S30: and sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person.
S50: and receiving a processing result of the requested person for the second request.
S70: and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
Compared with the method for managing contact information provided in the first embodiment of the present application, the method for managing contact information provided in the second embodiment of the present application further includes steps S20 and S22 after step S10, and the following steps S20 and S22 are described in detail.
Step S20 is used to confirm whether the requester has the right to directly acquire the contact information of the requested person. In the communication group, if the requester is the direct person of the requested person, the requester has the right to obtain the real contact information of the requested person.
When the requester has the right to acquire, step S22 is executed, so that the server only needs to search the real contact information of the requester stored in the server in advance and directly send the real contact information of the requester to the requester without sending the second request to the requester. Therefore, the real contact information of the requested person can be quickly transmitted to the requesting person, the information acquisition time is saved, and the information acquisition efficiency is improved. When the requester has no acquisition right, the process proceeds to step S30.
Fig. 4 is a method for managing contact information according to a third embodiment of the present application, including the following steps:
s10: and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person.
S24: and confirming whether the requester has the request authority for acquiring the contact information to the requested person.
If the requestor has the request right, step S30 is performed. If the requestor does not have the request right, step S26 is executed.
S26: and returning a prompt of not obtaining the contact information of the requested person to the requesting person.
S30: and sending a second request to the requested person, wherein the second request is a request for obtaining the authorization of the requested person so as to provide the contact information of the requested person for the requesting person.
S50: and receiving a processing result of the requested person for the second request.
S70: and determining whether to transmit the contact information of the requested person to the requesting person according to the processing result.
In the third embodiment of the present application, in order to better protect the real contact information of users in a communication group, there is a limit to the requesters who obtain the contact information of the requested people, and not all requesters can obtain the contact information of the requested people. For example, the requester and the requested person belong to different departments without correlation, and the requester and the requested person may be set to have no request right. If the requester and the requested person belong to the same department or have an association, the requester can be set to have the request authority. Therefore, before executing step S30, step S24 is executed to confirm whether the requester has the right to initiate a request for obtaining contact information to the requester.
When the requester has the request right, the process proceeds to step S30.
When the requester does not have the request right, the process continues to step S26, and the requester cannot obtain the contact information of the requester.
In the method for managing contact information provided in the third embodiment of the present application, due to the existence of step S24, some requesters not related to the requested person can be prevented from easily obtaining the contact information of the requested person, so that the contact information of the users in the communication group can be well protected.
Based on the same idea, the method for managing contact information provided in the first to third embodiments of the present application is as shown in fig. 5 and 6.
Fig. 5 is a schematic structural diagram of a management apparatus for contact information provided in the present application, which specifically includes:
a first receiving unit 101, configured to receive a first request from a requester for obtaining contact information of a requested person;
a sending unit 103, configured to send a second request to the requested person, where the second request is a request for obtaining authorization of the requested person, so as to provide contact information of the requested person to the requesting person;
a second receiving unit 105, configured to receive a processing result of the requested person for the second request;
optionally, the apparatus further comprises: a determining unit 107, configured to determine whether to transmit the contact information of the requested person to the requesting person according to the processing result.
The contact information is real contact information which can be directly contacted with a requested person.
The contact information comprises at least one of a telephone number, an instant messaging account and an email address.
Optionally, the apparatus further comprises: and an assigning unit (not shown) for assigning virtual contact information to each object belonging to the same group.
The first receiving unit 101 is specifically configured to:
and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person through the virtual contact information of the requested person.
Optionally, the determining unit 107 is specifically configured to:
if a message that the requested person determines to provide contact information is received, the contact information of the requested person is transmitted to the requesting person;
if the message that the requested person determines to provide the contact information is not received, the contact information of the requested person is not transmitted to the requesting person.
Fig. 6 is a schematic structural diagram of another contact information management apparatus provided in the present application, which specifically includes:
a first receiving unit 101, configured to receive a first request from a requester for obtaining contact information of a requested person;
a confirming unit 102, configured to confirm whether the requesting person has an acquisition right to directly acquire the contact information of the requested person, or confirm whether the requesting person has a request right to initiate acquisition of the contact information to the requested person
A sending unit 103, configured to send a second request to the requested person, where the second request is a request for obtaining authorization of the requested person, so as to provide contact information of the requested person to the requesting person;
a second receiving unit 105, configured to receive a processing result of the requested person for the second request;
a determining unit 107, configured to determine whether to transmit the contact information of the requested person to the requesting person according to the processing result.
The contact information is real contact information which can be directly contacted with a requested person.
The contact information comprises at least one of a telephone number, an instant messaging account and an email address.
The first receiving unit 101 is specifically configured to:
and receiving a first request for acquiring the contact information of the requested person, which is sent by the requesting person through the virtual contact information of the requested person.
The determining unit 107 is specifically configured to:
if a message that the requested person determines to provide contact information is received, the contact information of the requested person is transmitted to the requesting person;
if the message that the requested person determines to provide the contact information is not received, the contact information of the requested person is not transmitted to the requesting person.
According to the method and the device for managing the contact information, before the contact information of the requested person is obtained, the contact information of the requested person can be obtained only by the agreement of the requested person.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.