CN106557374B - Method and device for processing information interaction between two parties - Google Patents

Method and device for processing information interaction between two parties Download PDF

Info

Publication number
CN106557374B
CN106557374B CN201610987463.0A CN201610987463A CN106557374B CN 106557374 B CN106557374 B CN 106557374B CN 201610987463 A CN201610987463 A CN 201610987463A CN 106557374 B CN106557374 B CN 106557374B
Authority
CN
China
Prior art keywords
user account
application program
data information
instruction
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610987463.0A
Other languages
Chinese (zh)
Other versions
CN106557374A (en
Inventor
陈杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TVM Beijing Technology Co Ltd
Original Assignee
TVM Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TVM Beijing Technology Co Ltd filed Critical TVM Beijing Technology Co Ltd
Priority to CN201610987463.0A priority Critical patent/CN106557374B/en
Publication of CN106557374A publication Critical patent/CN106557374A/en
Application granted granted Critical
Publication of CN106557374B publication Critical patent/CN106557374B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]

Abstract

The invention discloses a method and a device for processing information interaction between two parties. The method comprises the following steps: analyzing, by the first application, the data information transmitted by the second application; generating a corresponding feedback instruction through the first application program; modifying data information of the user account through the feedback instruction; when it is monitored that the data information of the user account is cancelled in the second application program, a cancelling instruction is sent to the user account through the first application program; when the data information of the user account meets the condition of executing the revocation instruction, automatically executing the revocation instruction; and when the data information of the user account does not meet the condition of executing the revocation instruction, marking the user account as the user account to be unlocked. The invention overcomes the defect that the user in the interactive system of the two parties cheats the feedback information of the first application program, improves the robustness of the system and further improves the user experience.

Description

Method and device for processing information interaction between two parties
Technical Field
The invention relates to the technical field of interactive systems, in particular to a method and a device for processing information interaction between two parties.
Background
In some application scenarios, information interaction through two applications is often encountered. In the information interaction process, after a certain user account submits data information in a second application program, the second application program sends the submitted data information of the user account to a first application program, the first application program carries out corresponding processing on the data information of the user account according to a preset rule, and then feeds back the processed result to the user and/or the second application program. After the user account receives the processed result of the first application, the processed result is usually a modification of the data information of the user account, and the user account then revokes the previously submitted data information in the second application, so that the user account does not actually submit any data in the second application, and also obtains the processed result of the first application, thereby causing the system to be lost. How to properly deal with the above problems becomes a problem to be solved in the industry.
Disclosure of Invention
The invention provides a method and a device for processing information interaction of two parties, which are used for overcoming the defect that a user in an interactive system of the two parties cheats feedback information of a first application program, and improving the robustness of the system, thereby improving the user experience.
According to a first aspect of the embodiments of the present invention, a method for processing information interaction between two parties is provided, including:
analyzing, by the first application, the data information transmitted by the second application;
generating a corresponding feedback instruction through the first application program;
modifying data information of the user account through the feedback instruction;
when it is monitored that the data information of the user account is cancelled in the second application program, a cancelling instruction is sent to the user account through the first application program;
when the data information of the user account meets the condition of executing the revocation instruction, automatically executing the revocation instruction;
and when the data information of the user account does not meet the condition of executing the revocation instruction, marking the user account as the user account to be unlocked.
In one embodiment, the modifying the data information of the user account through the feedback instruction includes:
and modifying the data information of the user account which has a binding relation with the second application program through the feedback instruction.
In one embodiment, when it is monitored that the data information is revoked in the second application program by the user account, sending a revocation instruction to the user account by the first application program includes:
monitoring the data information in the second application program in real time;
when it is monitored that the user account cancels the data information in the second application program, transmitting information that the data information is cancelled to the first application program in real time;
and sending a revocation instruction to the user account through the first application program in real time, wherein the revocation instruction is used for counteracting the content of the feedback instruction on the modification of the data information of the user account.
In one embodiment, further comprising:
when the user account to be unlocked logs in the second application program, immediately jumping to a third-party page;
and sending prompt information to the user account to be unlocked through the third-party page.
In one embodiment, further comprising:
and prohibiting the user account to be unlocked from submitting new data information in the second application program.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus for processing information interaction between two parties, including:
the analysis module is used for analyzing the data information sent by the second application program through the first application program;
the generating module is used for generating a corresponding feedback instruction through the first application program;
the modification module is used for modifying the data information of the user account through the feedback instruction;
the first sending module is used for sending a cancelling instruction to the user account through the first application program when the situation that the data information is cancelled in the second application program of the user account is monitored;
the execution module is used for automatically executing the revocation instruction when the data information of the user account meets the condition of executing the revocation instruction;
and the marking module is used for marking the user account as the user account to be unlocked when the data information of the user account does not meet the condition of executing the revocation instruction.
In one embodiment, the modification module includes:
and the modification submodule is used for modifying the data information of the user account which has a binding relationship with the second application program through the feedback instruction.
In one embodiment, the execution module includes:
the monitoring submodule is used for monitoring the data information in the second application program in real time;
the first sending sub-module is used for sending information that the data information is cancelled to the first application program in real time when it is monitored that the data information is cancelled in the second application program by the user account;
and the second sending submodule is used for sending a revocation instruction to the user account through the first application program in real time, wherein the revocation instruction is used for counteracting the content of the feedback instruction on the data information modification of the user account.
In one embodiment, further comprising:
the skipping module is used for instantly skipping to a third-party page when the user account to be unlocked logs in the second application program;
and the second sending module is used for sending prompt information to the user account to be unlocked through the third-party page.
In one embodiment, further comprising:
and the forbidding module is used for forbidding the user account to be unlocked to submit new data information in the second application program.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a flowchart illustrating a method for handling information interaction between two parties according to an exemplary embodiment of the present invention;
FIG. 2 is a flowchart illustrating step S13 of a method for processing mutual information interaction according to an exemplary embodiment of the present invention;
FIG. 3 is a flowchart illustrating step S15 of a method for processing mutual information interaction according to an exemplary embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for handling information interaction between two parties according to another exemplary embodiment of the present invention;
FIG. 5 is a flowchart illustrating a method for handling information interaction between two parties according to yet another exemplary embodiment of the present invention;
FIG. 6 is a block diagram illustrating an apparatus for handling information interaction between two parties according to an exemplary embodiment of the present invention;
FIG. 7 is a block diagram of a modification module 63 of an apparatus for processing information interaction between two parties according to an exemplary embodiment of the present invention;
fig. 8 is a block diagram of an execution module 65 of an apparatus for processing information interaction between two parties according to an exemplary embodiment of the present invention;
FIG. 9 is a block diagram of an apparatus for handling information interaction between two parties according to another exemplary embodiment of the present invention;
fig. 10 is a block diagram illustrating an apparatus for handling information interaction between two parties according to still another exemplary embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Fig. 1 is a flowchart illustrating a method for processing mutual information interaction, according to an exemplary embodiment, where the method for processing mutual information interaction, as shown in fig. 1, includes the following steps S11-S16:
analyzing, by the first application, the data information transmitted by the second application in step S11;
in step S12, generating a corresponding feedback instruction by the first application program;
in step S13, modifying the data information of the user account through the feedback instruction;
in step S14, when it is detected that the data information is revoked in the second application program by the user account, sending a revocation instruction to the user account through the first application program;
in step S15, when the data information of the user account satisfies the condition for executing the revocation instruction, automatically executing the revocation instruction;
in step S16, when the data information of the user account does not satisfy the condition for executing the revocation instruction, the user account is marked as a user account to be unlocked.
In one embodiment, in some application scenarios, information interaction through two applications is often encountered. In the information interaction process, after a certain user account submits data information in a second application program, the second application program sends the submitted data information of the user account to a first application program, the first application program carries out corresponding processing on the data information of the user account according to a preset rule, and then feeds back the processed result to the user and/or the second application program. After the user account receives the processed result of the first application, the processed result is usually a modification of the data information of the user account, and the user account then revokes the previously submitted data information in the second application, so that the user account does not actually submit any data in the second application, and also obtains the processed result of the first application, thereby causing the system to be lost. The technical scheme in the embodiment can properly solve the problems.
The detailed steps are as follows: and analyzing the data information sent by the second application program through the first application program, generating a corresponding feedback instruction through the first application program, and modifying the data information of the user account which has a binding relationship with the second application program through the feedback instruction.
And when it is monitored that the data information is cancelled in the second application program by the user account, sending a cancelling instruction to the user account through the first application program.
The first condition is as follows: and when it is monitored that the user account cancels the data information in the second application program, transmitting the information that the data information is cancelled to the first application program in real time. And sending a revocation instruction to the user account through the first application program in real time, wherein the revocation instruction is used for counteracting the content of the feedback instruction on the modification of the data information of the user account.
Case two: and when the current data information of the user account does not meet the condition of executing the revocation instruction, marking the user account as the user account to be unlocked. In some cases, the operation of revoking the data information is performed after the user account modifies the data information of the user account through the feedback instruction, and a period of time elapses. During the period of time, the data information in the user account may have been changed otherwise, so that when the user account revokes the data information, the current data information of the user account is already smaller than the data information modified by the feedback instruction. And when the user account to be unlocked logs in the second application program, immediately jumping to a third-party page. And sending prompt information to the user account to be unlocked through the third-party page, wherein the prompt information is used for prompting the user account to improve the numerical value of data information so as to ensure that the condition of executing the cancellation instruction can be met. And meanwhile, prohibiting the user account to be unlocked from submitting new data information in the second application program.
For example, a user account A submits data information in the second application program B, and the data information is the credit with the amount of 1000. The first application program A generates a corresponding feedback instruction according to a preset feedback rule, and the feedback instruction is used for increasing the credit degree of the user account A by 10. It is not assumed that the credit value cannot be negative. After the credit degree of the user account A is increased by 10, after a time interval t elapses, the user account A revokes the data information in the second application program, that is, revokes the data information of the credit with the amount of 1000. When the system monitors that the data information is cancelled by the user account A in real time, a cancelling instruction is sent to the user account A in real time through the first application program A, and the cancelling instruction is used for deducting the credit degree with the value of 10 from the user account A. However, the user account a has consumed a credit value of 15 during the time interval t. If the current credit rating value of the user account A is more than or equal to 10, the system automatically and immediately deducts the credit rating with the value of 10 in the user account A; if the current credit value of the user account A is less than 10, the system cannot automatically and immediately deduct the credit value of the user account A with the value of 10 because the current credit value of the user account A cannot be a negative number, and the system marks the user account A as the user account to be unlocked. When the user account to be unlocked logs in the second application program, the user account to be unlocked jumps to a third-party page immediately, prompt information is sent to the user account to be unlocked through the third-party page, the prompt and the information are used for informing the user account A, and the current credit value of the user account A is increased to be more than 10. Meanwhile, the system prohibits the user account to be unlocked from submitting new data information in the second application program.
The invention overcomes the defect that the user in the interactive system of the two parties cheats the feedback information of the first application program, improves the robustness of the system and further improves the user experience.
In one embodiment, as shown in FIG. 2, step S13 includes the following step S21:
in step S21, the data information of the user account having the binding relationship with the second application program is modified through the feedback instruction.
In one embodiment, the user account and the second application program have a binding relationship, and when the first application program and the second application program perform mutual information interaction, the first application program feeds back an instruction to the second application program, and the system can modify the data information of the user account having the binding relationship with the second application program.
In one embodiment, as shown in FIG. 3, step S15 includes the following steps S31-S33:
in step S31, monitoring the data information in the second application program in real time;
in step S32, when it is detected that the user account revokes the data information in the second application program, sending information that the data information is revoked to the first application program in real time;
in step S33, sending, by the first application program, an undo instruction to the user account in real time, where the undo instruction is used to offset the content of the data information modification of the user account by the feedback instruction.
In one embodiment, the data message submitted by the user account in the second application program has a preset revocable time interval. And monitoring the state of the data information in the second application program in real time within the revocable time interval. And when the situation that the user account withdraws the data information in the second application program is monitored, the system sends the information that the data information is withdrawn by the user account to the first application program in real time. And the system sends a revocation instruction to the user account in real time through the first application program, wherein the revocation instruction is used for counteracting the content of the feedback instruction on the modification of the data information of the user account.
For example, the user account b submits the data information α in the second application D, without assuming a preset revocable time interval of 12 days, the system monitors the status of the data information α in the second application D in real time within the next 12 days when the submission is started when the system is next, the system sends the data information α revoked by the user account b to the first application C in real time when it is monitored that the data information α is revoked in the second application D, the system sends a revocation instruction to the user account b through the first application C in real time, and the revocation instruction is used for counteracting the content of the data information α of the user account b modified by the feedback instruction.
In one embodiment, as shown in FIG. 4, the following steps S41-S42 are also included:
in step S41, when the user account to be unlocked logs in to the second application program, immediately jumping to a third-party page;
in step S42, a prompt message is sent to the user account to be unlocked through the third-party page.
In one embodiment, the system logs in to the second application for the user account marked to be unlocked and immediately jumps from the second application to the third-party page. And the third-party page pops up or displays reminding information, and the reminding information is used for reminding the user account to improve the value of the data information so as to ensure that the condition of executing the revocation instruction can be met.
In one embodiment, as shown in fig. 5, the following step S51 is further included:
in step S51, the user account to be unlocked is prohibited from submitting new data information in the second application.
In one embodiment, the user account marked to be unlocked is prohibited from submitting new data information in the second application program, so that the user account marked to be unlocked is prevented from continuously cheating the feedback information of the first application program, the system is prevented from suffering more loss, and the robustness of the system is improved.
In one embodiment, fig. 6 is a block diagram illustrating an apparatus for handling information interaction between two parties according to an example embodiment. As shown in fig. 6, the apparatus comprises an analyzing module 61, a generating module 62, a modifying module 63, a first sending module 64, an executing module 65 and a marking module 66.
The analysis module 61 is used for analyzing the data information sent by the second application program through the first application program;
the generating module 62 is configured to generate a corresponding feedback instruction through the first application;
the modification module 63 is configured to modify the data information of the user account through the feedback instruction;
the first sending module 64 is configured to send a revocation instruction to the user account through the first application program when it is monitored that the data information is revoked in the second application program by the user account;
the execution module 65 is configured to automatically execute the revocation instruction when the data information of the user account satisfies a condition for executing the revocation instruction;
the marking module 66 is configured to mark the user account as a user account to be unlocked when the current data information of the user account does not satisfy the condition for executing the revocation instruction.
As shown in fig. 7, the modification module 63 includes a modification submodule 71.
The modification submodule 71 is configured to modify, through the feedback instruction, the data information of the user account having a binding relationship with the second application program.
As shown in fig. 8, the execution module 65 includes a monitoring submodule 81, a first transmission submodule 82, and a second transmission submodule 83.
The monitoring submodule 81 is configured to monitor the data information in the second application program in real time;
the first sending sub-module 82 is configured to send information that the data information is revoked to the first application program in real time when it is monitored that the data information is revoked in the second application program by the user account;
the second sending submodule 83 is configured to send, in real time, a revocation instruction to the user account through the first application program, where the revocation instruction is used to cancel content of the feedback instruction modifying the data information of the user account.
As shown in fig. 9, the apparatus further includes a skip module 91 and a second sending module 92:
the skip module 91 is configured to skip to a third-party page immediately when the user account to be unlocked logs in the second application program;
the second sending module 92 is configured to send a prompt message to the user account to be unlocked through the third-party page.
As shown in fig. 10, a disabling module 101 is also included.
The prohibiting module 101 is configured to prohibit the user account to be unlocked from submitting new data information in the second application program.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (8)

1. A method for processing information interaction between two parties is characterized by comprising the following steps:
analyzing, by the first application, the data information transmitted by the second application;
generating a corresponding feedback instruction through the first application program;
modifying data information of the user account through the feedback instruction;
when it is monitored that the data information of the user account is cancelled in the second application program, a cancelling instruction is sent to the user account through the first application program;
when the data information of the user account meets the condition of executing the revocation instruction, automatically executing the revocation instruction;
when the data information of the user account does not meet the condition of executing the revocation instruction, marking the user account as a user account to be unlocked;
when it is monitored that the data information is cancelled in the second application program by the user account, sending a cancelling instruction to the user account through the first application program, including:
monitoring the data information in the second application program in real time;
when it is monitored that the user account cancels the data information in the second application program, transmitting information that the data information is cancelled to the first application program in real time;
and sending a revocation instruction to the user account through the first application program in real time, wherein the revocation instruction is used for counteracting the content of the feedback instruction on the modification of the data information of the user account.
2. The method of claim 1, wherein the modifying the data information of the user account through the feedback instruction comprises:
and modifying the data information of the user account which has a binding relation with the second application program through the feedback instruction.
3. The method of claim 1, further comprising:
when the user account to be unlocked logs in the second application program, immediately jumping to a third-party page;
and sending prompt information to the user account to be unlocked through the third-party page.
4. The method of claim 1, further comprising:
and prohibiting the user account to be unlocked from submitting new data information in the second application program.
5. An apparatus for processing information interaction between two parties, comprising:
the analysis module is used for analyzing the data information sent by the second application program through the first application program;
the generating module is used for generating a corresponding feedback instruction through the first application program;
the modification module is used for modifying the data information of the user account through the feedback instruction;
the first sending module is used for sending a cancelling instruction to the user account through the first application program when the situation that the data information is cancelled in the second application program of the user account is monitored;
the execution module is used for automatically executing the revocation instruction when the data information of the user account meets the condition of executing the revocation instruction;
the marking module is used for marking the user account as a user account to be unlocked when the data information of the user account does not meet the condition of executing the cancelling instruction;
the execution module includes:
the monitoring submodule is used for monitoring the data information in the second application program in real time;
the first sending sub-module is used for sending information that the data information is cancelled to the first application program in real time when it is monitored that the data information is cancelled in the second application program by the user account;
and the second sending submodule is used for sending a revocation instruction to the user account through the first application program in real time, wherein the revocation instruction is used for counteracting the content of the feedback instruction on the data information modification of the user account.
6. The apparatus of claim 5, wherein the modification module comprises:
and the modification submodule is used for modifying the data information of the user account which has a binding relationship with the second application program through the feedback instruction.
7. The apparatus of claim 5, further comprising:
the skipping module is used for instantly skipping to a third-party page when the user account to be unlocked logs in the second application program;
and the second sending module is used for sending prompt information to the user account to be unlocked through the third-party page.
8. The apparatus of claim 5, further comprising:
and the forbidding module is used for forbidding the user account to be unlocked to submit new data information in the second application program.
CN201610987463.0A 2016-11-09 2016-11-09 Method and device for processing information interaction between two parties Expired - Fee Related CN106557374B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610987463.0A CN106557374B (en) 2016-11-09 2016-11-09 Method and device for processing information interaction between two parties

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610987463.0A CN106557374B (en) 2016-11-09 2016-11-09 Method and device for processing information interaction between two parties

Publications (2)

Publication Number Publication Date
CN106557374A CN106557374A (en) 2017-04-05
CN106557374B true CN106557374B (en) 2020-06-09

Family

ID=58444099

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610987463.0A Expired - Fee Related CN106557374B (en) 2016-11-09 2016-11-09 Method and device for processing information interaction between two parties

Country Status (1)

Country Link
CN (1) CN106557374B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075201A (en) * 2007-06-26 2007-11-21 北京邮电大学 Method for realizing unified universal message bus between different assembly process
CN102819875A (en) * 2012-08-01 2012-12-12 福州瑞芯微电子有限公司 Attendance system and attendance method based on face recognition and GPS (global positioning system)
CN104572315A (en) * 2013-10-23 2015-04-29 华为技术有限公司 Inter-subsystem communication method, communication entities and distributed communication system
CN105306733A (en) * 2015-11-13 2016-02-03 深圳正品创想科技有限公司 Third-party login mobile phone number binding method based on mobile phone APP

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8984531B2 (en) * 2011-06-01 2015-03-17 Microsoft Technology Licensing, Llc Episodic coordination model for distributed applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075201A (en) * 2007-06-26 2007-11-21 北京邮电大学 Method for realizing unified universal message bus between different assembly process
CN102819875A (en) * 2012-08-01 2012-12-12 福州瑞芯微电子有限公司 Attendance system and attendance method based on face recognition and GPS (global positioning system)
CN104572315A (en) * 2013-10-23 2015-04-29 华为技术有限公司 Inter-subsystem communication method, communication entities and distributed communication system
CN105306733A (en) * 2015-11-13 2016-02-03 深圳正品创想科技有限公司 Third-party login mobile phone number binding method based on mobile phone APP

Also Published As

Publication number Publication date
CN106557374A (en) 2017-04-05

Similar Documents

Publication Publication Date Title
GB2564299A (en) Blockchain implemented counting system and method for use in secure voting and distribution
US8607193B2 (en) Tracking stale comments in source code listings
JP2020201679A5 (en)
CN104536776A (en) Method and device for running plug-in application in plug-in running environment at host end
CN106557374B (en) Method and device for processing information interaction between two parties
CN107798128B (en) Data import method, device, medium and electronic equipment
JP2008191711A5 (en)
US7934196B2 (en) Software component and software component management system
US10922387B2 (en) Method and control system for controlling an execution of a software application on an execution platform
CN105335673A (en) Information safety processing method and device
CN104572036B (en) Event processing method and device
CN107545170A (en) System right management method, apparatus and intelligent terminal
CN111352395A (en) Certificate making equipment scheduling method and device
CN106095875B (en) Method and device for improving ID of live broadcast terminal
CN111090575A (en) Test method
CN111382054A (en) File-based test flow processing method and device and computer storage medium
JP4935555B2 (en) Alarm engineering support device
CN115242349B (en) Enterprise-level data verification method, enterprise-level data verification device, computer equipment and storage medium
Novak et al. On solving non-preemptive mixed-criticality match-up scheduling problem with two and three criticality levels
CN106411714B (en) A kind of method and device of processing both sides interaction
CN114124540B (en) IPS (in-plane switching) blocking method and device
Novak et al. Exact approach to the scheduling of F-shaped tasks with two and three criticality levels
CN107527237A (en) A kind of task sending method and device
CN111949984B (en) Vulnerability defense method and electronic device
CN112055005B (en) Identity authentication method, device, system, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method and device for processing information interaction between two parties

Effective date of registration: 20210104

Granted publication date: 20200609

Pledgee: Inner Mongolia Huipu Energy Co.,Ltd.

Pledgor: Tvmining (BEIJING) Technology Co., Ltd.

Registration number: Y2020990001518

PE01 Entry into force of the registration of the contract for pledge of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200609

Termination date: 20211109

CF01 Termination of patent right due to non-payment of annual fee