Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in mode is applied, the technical solution in the application embodiment is clearly and completely described, it is clear that described
Embodiment is only a part of embodiment of the application, rather than whole embodiments.Based on the embodiment party in the application
Formula, every other embodiment obtained by those of ordinary skill in the art without making creative efforts, is all answered
When the range for belonging to the application protection.
The application embodiment provides a kind of method of information exchange, and the method for the information exchange can be applied to client
In the system architecture of end and server.The equipment that the server can be storage user information.Specifically, the server can
Think the electronic equipment with data operation, store function and network interaction function;Or run on the electronics
In equipment, the software of support is provided for data processing, storage and network interaction.In the present embodiment described in not specific restriction
The quantity of server.The server can be a server, can also be several servers, alternatively, several server shapes
At server cluster.
In the present embodiment, the client can be the electronic equipment of the account information for login user.Specifically
Ground, the client for example can be desktop computer, tablet computer, laptop, smart phone, digital assistants, intelligence can
Wearable device, television set with network access functions etc..Alternatively, the client may be that can run on above-mentioned electronics
Software in equipment.Specifically, the client can be the mobile application in electronic equipment, and the mobile application for example can be with
It is wechat, QQ, Anychat etc..
The application embodiment provides a kind of method of information exchange, and the method for the information exchange can be applied to above-mentioned
Server in.The account information of user can be provided in the server, and related to the account information of the user
The authentication information of connection.The account information and the authentication information can be disposed on storage medium in the server.
In the present embodiment, the account information of the user can refer to the account letter in that the user uses
Breath.Specifically, for example, the application that the user uses can be wechat, QQ, Anychat etc..The account information may include
The pet name that uses, the account of registration and cell-phone number etc. of the user in the application.
In the present embodiment, the authentication information can be the information of the identity for characterizing the user.For example, institute
Stating authentication information may include at least one of license plate number, social security account, inhabitation address and passport No. information, these authentication informations
It is generally necessary to be registered on third-party platform.For example, the third party is flat if the authentication information is license plate number
Platform can be vehicle administration office's information management platform, when registering the license plate number of user on vehicle administration office's information management platform, it will usually will
License plate number and the cell-phone number of user are mutually bound.
In the present embodiment, the authentication information can be associated with the account information.Specifically, it is logged in described
After the client of the account information of user receives the authentication information of the user, association request can be issued to server.Its
In, including the authentication information and the communication information mutually bound with the authentication information in the association request.The communication
Information for example can be cell-phone number and Email Accounts etc..The server, can be to association after receiving the association request
There is the given client end of the communication information to send the verification information for being directed to the association request.The verification information for example can be with
It is identifying code.In this way, the user is after the application upper input verification information, it can be interior by the certification in the application
Information is associated with the account information.For example, the authentication information is license plate number, user can apply interior input license plate
Number, and the cell-phone number with license plate number binding, so as to issue association request to server.Server receives the association
After request, identifying code is sent to the smart phone for being associated with the cell-phone number, at this moment, user sees that the smart phone connects
The identifying code received, and by the identifying code input application it is interior after, can it is described application it is interior by license plate number and the account
Information is associated.
Referring to Fig. 1, the method may include following steps.
S11:The interaction request of the first user of the first client sending is received, is wrapped in the interaction request of first user
Appointed authentication information is included, the appointed authentication information is associated with the account information of second user.
In the present embodiment, it is logged in the account information of first user in first client, and be provided with
The information input page.The information input page keys in text information for being supplied to user.First user is in the letter
The appointed authentication information is inputted on breath input page, in this way, first client can be believed according to the specified certification
It ceases to the server and sends interaction request.
In the present embodiment, the interaction request can be the character string write according to preset rules.Wherein, institute
Stating preset rules can be the network communication protocol followed between first client and the server.For example, the friendship
Mutually request can be the character string write according to http protocol.The preset rules can limit each in interaction request
Putting in order between component part and each component part.For example, may include request identifier word in the interaction request
Section, source IP address field and purpose IP address field.The request identification can fill first user's respectively
The mark of mark and the appointed authentication information.The source IP address field can fill in the IP address of first client,
The destination IP address field can fill in the IP address of the server.In this way, the interaction request can be from described
One client is sent at the server.
In the present embodiment, the appointed authentication information can be the authentication information of the second user, can be with institute
The account information for stating second user is associated.In this way, after server receives the interaction request, it can be from the interaction request
The middle mark for extracting the appointed authentication information, and after the mark for extracting the appointed authentication information, it can read and have
The appointed authentication information of the mark and account information with the associated second user of the appointed authentication information.
S13:Checking request is sent to the second client of the account information for being logged in the second user, the verifying is asked
It include the account information of first user in asking.
In the present embodiment, after receiving the interaction request, described can be extracted from the interaction request
The mark of one user and the mark of the appointed authentication information.In the mark and the specified certification letter for extracting first user
After the mark of breath, server can read the account information for having the first user of mark of first user, tool respectively
The appointed authentication information of the mark of the standby appointed authentication information and with the associated second user of the appointed authentication information
Account information.It is asked to which server can send verifying to the second client of the account information for being logged in the second user
It asks.
In the present embodiment, the checking request can be the character string write according to preset rules.Wherein, institute
Stating preset rules can be the network communication protocol followed between the server and second client.For example, described test
Card request can be the character string write according to http protocol.The preset rules can limit each in checking request
Putting in order between component part and each component part.For example, may include request identifier word in the checking request
Section, source IP address field and purpose IP address field.The request identification can fill the mark of first user.
The source IP address field can fill in the IP address of the server, and the destination IP address field can fill in described second
The IP address of client.In this way, the checking request can be sent to from second client from the server.
It in the present embodiment, may include the account information of first user in the checking request.In this way, institute
It states after the second client receives the checking request, the account letter of first user can be extracted from the checking request
Breath.Moreover, it can also include the authentication information of first user in the checking request, be terminated in second client
After receiving the checking request, the authentication information of first user can also be extracted from the checking request.
S15:The confirmation message for the checking request of second client feedback is received, and is based on the confirmation
Information establishes the information exchange relationship between first user and the second user.
In the present embodiment, the confirmation link for the checking request can be shown in second client.Institute
Stating confirmation link can be Text Link or image link.The second user is by clicking the link, so as to institute
It states server feedback and links corresponding confirmation message with the confirmation.
In the present embodiment, the confirmation message can refer to the finger that the second user agrees to that the checking request passes through
Determine character string.For example, the designated character string can be " true " or " agree " etc..
In the present embodiment, after server receives the confirmation message, it can be generated and be handed over based on the confirmation message
Mutual relation establishes information, and establishes believe to interactive relation described in first client and second client feedback respectively
Breath, with the information exchange relationship established between first user and the second user.
In the present embodiment, the information exchange relationship can refer to account information based on first user and described
In the corresponding application of the account information of second user, information interchange can be carried out between first user and the second user
Relationship.For example, the information exchange relationship can be this using upper friend relation.
In a concrete application scene, the authentication information for example can be license plate number, and the account information for example may be used
To be wechat account, first client and second client for example can be the first smart phone and the second intelligence respectively
It can mobile phone.First user prepares to remove the vehicle of oneself from parking stall, but finds that another car bumper has lived outlet, at this moment, first
It is wechat good friend that user can add second user by the license plate number of the vehicle.Specifically, as shown in Fig. 2, in the two users
All by the wechat account of itself situation associated with license plate number, the first user can log in certainly on the first smart phone
Oneself wechat account, and wechat application the page on input second user license plate number.At this moment, the first smart phone can be to
The interaction request that server is sent, include in the interaction request the first user mark and second user license plate number mark,
After server receives the interaction request, the mark of the first user and the license plate of second user can be extracted from the interaction request
Number mark, and extract these mark after, the wechat account of the first user of the mark for having the first user can be read respectively
Number, have the license plate number of second user of mark of license plate number of second user and associated with the license plate number of second user
Wechat account.In this way, server can send checking request to the second smart phone of the wechat account for being logged in second user,
It include the wechat account of the first user in the checking request.After second smart phone receives the checking request, if second user
Agree to that confirmation link can be clicked on the second smart phone by the checking request, to pass through the second smart phone to service
Device sends the confirmation message for being directed to the checking request.After server receives the confirmation message, the confirmation letter can be based on
Breath, establishes the information exchange relationship between the first user and second user.In this way, the first user drives the vehicle can not obtain
In the case of the cell-phone number or wechat account of second user, it still can directly pass through the license plate number of second user and addition second user
For wechat good friend, consequently facilitating the first user notifies second user to come to move vehicle in time.Moreover, in other cases, this
The mode of kind of addition good friend is not necessarily to reveal the wechat account or cell-phone number of user both sides, and so as to protect, user both sides' is hidden
It is private.
In another specific implementation scene, the authentication information for example can be social security account, the account information example
It such as can be wechat account, first client and second client are respectively the first smart phone and the second intelligent hand
Machine.First user finds second user and falls social security card in roadside, at this moment, in the two users all by the wechat account of itself
In situation associated with social security account, in order to which the social security card of second user is returned to second user in time, the first user can
Second user is added as wechat good friend using the social security account by second user.The reality of specific implementation process and above-mentioned implement scene
It is similar to apply process, no longer repeats one by one herein.Moreover, the implement scene be equally applicable to the authentication information be passport or
The specific implementation scene of inhabitation address etc..
In one embodiment of the application, in practical applications, there may be some user and not have and the user
Account information associated authentication information the case where, in order to refuse the Client-initiated interaction request, in the interaction request
It can also include the user identifier of first user for identification, in the interaction for receiving the first user that the first client issues
After request, the method can also include the following steps.
S111:Based on the user identifier, judges whether first user has and believe with the account of first user
The associated authentication information of manner of breathing.
In the present embodiment, after server receives the interaction request, the use in the interaction request can be extracted
Family mark.After extracting the user identifier, server can read the user's letter for having the first user of the user identifier
Breath.In this way, server can judge whether first user has the account with first user according to the user information
Number associated authentication information of information.
S113:Do not have the feelings of authentication information associated with the account information of first user in first user
Under condition, refuse the interaction request.
In the present embodiment, server judges whether first user has the account information with first user
After associated authentication information, judging result is obtained.It is that first user does not have and first user in judging result
The associated authentication information of account information in the case where, server can refuse the interaction request.
In one embodiment of the application, in practical applications, the second user may not want that other users are logical
It crosses authentication information and adds oneself as good friend.In order to realize this function, in the friendship for receiving the first user that the first client issues
Mutually after request, the method also includes following steps.
S121:Judge in the account information of the second user whether to include given settings information, the given settings letter
The interaction request that breath is initiated for characterizing refusal by authentication information.
In the present embodiment, after server receives the interaction request, it can extract in the interaction request and include
Appointed authentication information associated with the account information of the second user mark.Extracting the appointed authentication information
After mark, server can read the account information for having the second user of mark of the appointed authentication information.In this way, service
Whether it includes given settings information that device may determine that in the account information of the second user.Wherein, the given settings information
It can be used for characterizing the interaction request that refusal is initiated by authentication information.
S123:In the case where including the given settings information in the account information of the second user, described in refusal
Interaction request.
In the present embodiment, whether server judges in the account information of the second user to include given settings information
Afterwards, judging result is obtained.Including the feelings of the given settings information in the account information that judging result is the second user
Under condition, server can refuse the interaction request.
In one embodiment of the application, in practical applications, the second user is not intended to designated user by recognizing
Card information adds oneself as good friend.In order to realize this function, asked in the interaction for receiving the first user that the first client issues
After asking, the method also includes following steps.
S131:Judge in the account information of the second user whether to include the authentication information for being directed toward first user
Set information.
In the present embodiment, after server receives the interaction request, it can extract in the interaction request and include
Appointed authentication information associated with the account information of the second user mark.Extracting the appointed authentication information
After mark, server can read the account information for having the second user of mark of the appointed authentication information.In this way, service
Whether it includes the setting letter for being directed toward the authentication information of first user that device may determine that in the account information of the second user
Breath.
S133:In the case where including the set information in the account information of the second user, refusal described first
The interaction request of user.
In the present embodiment, whether server judges in the account information of the second user to include being directed toward described first
After the set information of the authentication information of user, judging result is obtained.In the account information that judging result is the second user
In the case where the set information, server can refuse the interaction request.
In one embodiment of the application, server to the account information for being logged in the second user second visitor
After family end sends checking request, the second user can also be refused to add the first user to be good friend.Specifically, in server
After sending checking request to the second client of the account information for being logged in the second user, the method also includes:It connects
The refusal information for the checking request of second client feedback is received, and is based on the refusal information, described in refusal
Interaction request.
In the present embodiment, the refusal information can refer to the finger that the second user agrees to that the checking request passes through
Determine character string.For example, the designated character string can be " false " or " disagree " etc..
In the present embodiment, it after server receives the refusal information, can be refused based on refusal information generation
Break off relations mutual notice, and to refusal interaction notice described in first client feedback, to refuse the interaction request.
In one embodiment of the application, server to the account information for being logged in the second user second visitor
After family end sends checking request, it can also be carried out in the case where waiting to be confirmed, between second user and the first user of short duration
Exchange.Specifically, described after sending checking request to the second client of the account information for being logged in the second user
Method further includes:Receive the return information for the checking request of second client feedback.In this way, second visitor
After family termination receives the checking request, the return information of the checking request, service can be directly directed to server feedback
After device receives the return information, to return information described in first client feedback, in this way, first user and institute
Of short duration exchange can still be carried out between second user for the case where friend relation being not added with by stating.
In the present embodiment, the return information can be the standard being set in advance and reply text or standard reply language
Sound is also possible to the character of the specified quantity of user's input or the voice of specified duration.The specified quantity and it is described specified when
Length can specifically be set according to actual needs.
In the present embodiment, it is related to it in the information exchange established between first user and the second user
Before, the information exchange of predetermined number of times can be carried out between first user and the second user.The predetermined number of times is specific
It can be set according to actual needs.
In the present embodiment, the function of realizing in above method step, can be realized by computer program, the calculating
Machine program can be stored in computer storage medium.Specifically, the computer storage medium can be carried out with processor
Coupling, processor is so as to reading the computer program in computer storage medium.The computer storage medium can be used
Account information, authentication information associated with the account information of the user in storage user.The computer program is located
When managing device execution, following steps may be implemented:
S11:The interaction request of the first user of the first client sending is received, is wrapped in the interaction request of first user
Appointed authentication information is included, the appointed authentication information is associated with the account information of second user;
S13:Checking request is sent to the second client of the account information for being logged in the second user, the verifying is asked
It include the account information of first user in asking;
S15:The confirmation message for the checking request of second client feedback is received, and is based on the confirmation
Information establishes the information exchange relationship between first user and the second user.
In one embodiment, the authentication information include in license plate number, social security account, inhabitation address and passport No. extremely
A kind of few information.
It in one embodiment, can also include the authentication information of first user in the checking request.
It in one embodiment, further include the user identifier of first user for identification in the interaction request;
When the computer program is executed by the processor, following steps can also be realized:
Based on the user identifier, it is related to the account information of first user to judge whether first user has
The authentication information of connection;
In the case where first user does not have authentication information associated with the account information of first user,
Refuse the interaction request.
It should be noted that function achieved by computer program in above-mentioned computer storage medium, can join
Implement embodiment according to method above-mentioned, the technical effect of realization also with the technical effect class realized in preceding method embodiment
Seemingly, it just repeats no more here.
Referring to Fig. 3, the application also provides a kind of server, the server includes memory and processor, described to deposit
Account information, authentication information associated with the account information of the user and the computer journey of user are stored in reservoir
Sequence when the computer program is executed by the processor, realizes following steps:
Step S11:Receive the interaction request of the first user of the first client sending, the interaction request of first user
In include appointed authentication information, the appointed authentication information is associated with the account information of second user;
Step S13:Checking request is sent to the second client of the account information for being logged in the second user, it is described to test
It include the account information of first user in card request;
Step S15:The confirmation message for the checking request of second client feedback is received, and based on described
Confirmation message establishes the information exchange relationship between first user and the second user.
In the present embodiment, the memory may include the physical unit for storing information, usually by information
It is stored again with the media using the methods of electricity, magnetic or optics after digitlization.Memory described in present embodiment again may be used
To include:The device of information, such as RAM, ROM are stored in the way of electric energy;The device of information is stored in the way of magnetic energy, it is such as hard
Disk, floppy disk, tape, core memory, magnetic bubble memory, USB flash disk;Using the device of optical mode storage information, such as CD or DVD.
Certainly, there are also memories of other modes, such as quantum memory, graphene memory etc..
In the present embodiment, the processor can be implemented in any suitable manner.For example, the processor can be with
Take such as microprocessor or processor and storage can by (micro-) processor execute computer readable program code (such as
Software or firmware) computer-readable medium, logic gate, switch, specific integrated circuit (Application Specific
Integrated Circuit, ASIC), programmable logic controller (PLC) and the form etc. for being embedded in microcontroller.
In one embodiment, the authentication information include in license plate number, social security account, inhabitation address and passport No. extremely
A kind of few information.
It in one embodiment, can also include the authentication information of first user in the checking request.
It in one embodiment, further include the user identifier of first user for identification in the interaction request;
When the computer program is executed by the processor, following steps can also be realized:
Based on the user identifier, it is related to the account information of first user to judge whether first user has
The authentication information of connection;
In the case where first user does not have authentication information associated with the account information of first user,
Refuse the interaction request.
The concrete function that the server that this specification embodiment provides, memory and processor are realized, can be with this
Aforementioned embodiments in specification contrast explanation, and can reach the technical effect of aforementioned embodiments, here just no longer
It repeats.
The application also provides a kind of information interacting method, and the method can be applied in the client.Please refer to figure
4, the method may include following steps.
S21:The interaction request of the first user is issued to server, includes appointed authentication information, institute in the interaction request
It is associated with the account information of second user to state appointed authentication information, so that the server is to being logged in the second user
The second client of account information send checking request, include the account information of first user in the checking request.
S23:It receives the interactive relation that the server generates and establishes information, wherein the interactive relation establishes information root
It is generated according to the confirmation message for the checking request of second client feedback, the interactive relation is established information and is used for
Characterization establishes the information exchange relationship between first user and the second user.
It further include the user of first user for identification in the interaction request in one embodiment of the application
Mark;The method also includes:Receive the refusal information that the server generates, the refusal information is according to based on the user
The designated result of mark judgement generates, and the designated result does not have for characterizing first user with first user's
The associated authentication information of account information.
Therefore the implementation procedure of each step in present embodiment is similar with the description in aforementioned embodiments,
Only the executing subject of the part steps in aforementioned embodiments is changed into client from server.The specific reality of each step
Existing mode, may refer to the description of aforementioned embodiments, just repeats no more here.
The application also provides a kind of client, and the client includes memory and processor, stores in the memory
Computer program when the computer program is executed by the processor, realizes following steps:
S21:The interaction request of the first user is issued to server, includes appointed authentication information, institute in the interaction request
It is associated with the account information of second user to state appointed authentication information, so that the server is to being logged in the second user
The second client of account information send checking request, include the account information of first user in the checking request.
S23:It receives the interactive relation that the server generates and establishes information, wherein the interactive relation establishes information root
It is generated according to the confirmation message for the checking request of second client feedback, the interactive relation is established information and is used for
Characterization establishes the information exchange relationship between first user and the second user.
In the present embodiment, the memory may include the physical unit for storing information, usually by information
It is stored again with the media using the methods of electricity, magnetic or optics after digitlization.Memory described in present embodiment again may be used
To include:The device of information, such as RAM, ROM are stored in the way of electric energy;The device of information is stored in the way of magnetic energy, it is such as hard
Disk, floppy disk, tape, core memory, magnetic bubble memory, USB flash disk;Using the device of optical mode storage information, such as CD or DVD.
Certainly, there are also memories of other modes, such as quantum memory, graphene memory etc..
In the present embodiment, the processor can be implemented in any suitable manner.For example, the processor can be with
Take such as microprocessor or processor and storage can by (micro-) processor execute computer readable program code (such as
Software or firmware) computer-readable medium, logic gate, switch, specific integrated circuit (Application Specific
Integrated Circuit, ASIC), programmable logic controller (PLC) and the form etc. for being embedded in microcontroller.
It further include the user of first user for identification in the interaction request in one embodiment of the application
Mark;When the computer program is executed by the processor, following steps can also be realized:Receive what the server generated
Refuse information, the refusal information is generated according to the designated result judged based on the user identifier, and the designated result is used for
First user is characterized without authentication information associated with the account information of first user.
The concrete function that the client that this specification embodiment provides, memory and processor are realized, can be with this
Aforementioned embodiments in specification contrast explanation, and can reach the technical effect of aforementioned embodiments, here just no longer
It repeats.
The application also provides a kind of system of information exchange, and the system comprises the first clients, the second client kimonos
Business device;Wherein, the server is provided with the account information of user, and certification associated with the account information of the user
Information.
First client is used to issue the interaction request of the first user, the friendship of first user to the server
It include mutually appointed authentication information in request, the appointed authentication information is associated with the account information of second user.
The server is for receiving the interaction request, and to the second of the account information for being logged in the second user
Client sends checking request;It wherein, include the account information of first user in the checking request;And described in receiving
The confirmation message for the checking request of second client feedback, and it is based on the confirmation message, it establishes described first and uses
Information exchange relationship between family and the second user.
Second client is used to generate the confirmation message based on the checking request, and the confirmation message is anti-
It feeds the server.
The system for the information exchange that this specification embodiment provides, server, the first client and the second client
The concrete function of realization can contrast explanation with the aforementioned embodiments in this specification, and can reach aforementioned embodiment party
The technical effect of formula, just repeats no more here.
Therefore in this application, the first user can be objective by being logged in the first of the account information of the first user
Family end issues interaction request to server, includes that specify associated with the account information of second user is recognized in the interaction request
Information is demonstrate,proved, for example, the license plate number for the second user that the first user sees in roadside, the account information of the license plate number and second user
It is associated.Server, can be to the second client of the account information for being logged in second user after receiving the interaction request
End sends checking request, includes the account information of the first user in the checking request.So, institute is received in the second client
After stating checking request, second user can feed back corresponding confirmation by the second user end to server for the checking request
Information, so that server can establish the pass of the information exchange between the first user and second user based on the confirmation message
System.In this way, even if the first user still can be by being easy acquisition in the case where that can not obtain the account information of second user
Authentication information carries out information exchange with second user for example, license plate number so that connecting each other between user and
It is more convenient to exchange.
The application also provides a kind of method of information exchange, and the method for the information exchange can be applied to above-mentioned service
In device.It can be provided with the account information of user in the server, and associated with the account information of the user recognize
Demonstrate,prove information.The account information and the authentication information can be disposed on storage medium in the server.
Referring to Fig. 5, the method may include following steps.
S31:The interaction request of the first user of the first client sending is received, is wrapped in the interaction request of first user
Appointed authentication information and specified interactive information are included, the appointed authentication information is associated with the account information of second user.
In the present embodiment, it is logged in the account information of first user in first client, and be provided with
The information input page.The information input page keys in text information for being supplied to user.First user is in the letter
The appointed authentication information is inputted on breath input page, in this way, first client can be believed according to the specified certification
It ceases to the server and sends interaction request.
In the present embodiment, the interaction request can be the character string write according to preset rules.Wherein, institute
Stating preset rules can be the network communication protocol followed between first client and the server.For example, the friendship
Mutually request can be the character string write according to http protocol.The preset rules can limit each in interaction request
Putting in order between component part and each component part.For example, may include request identifier word in the interaction request
Section, source IP address field and purpose IP address field.The request identification can fill first user's respectively
The mark of mark and the appointed authentication information.The source IP address field can fill in the IP address of first client,
The destination IP address field can fill in the IP address of the server.In this way, the interaction request can be from described
One client is sent at the server.
In the present embodiment, the appointed authentication information can be the authentication information of the second user, can be with institute
The account information for stating second user is associated.In this way, after server receives the interaction request, it can be from the interaction request
The middle mark for extracting the appointed authentication information, and after the mark for extracting the appointed authentication information, it can read and have
The appointed authentication information of the mark and account information with the associated second user of the appointed authentication information.
In the present embodiment, the specified interactive information can be the standard being set in advance and reply text or standard reply
Voice is also possible to the character of the specified quantity of user's input or the voice of specified duration.The specified quantity and described specified
Duration can specifically be set according to actual needs.
In the present embodiment, the information that predetermined number of times can be carried out between first user and the second user is handed over
Mutually.The predetermined number of times can specifically be set according to actual needs.
S33:The specified interactive information is supplied to the second client for being logged in the account information of the second user.
In the present embodiment, after receiving the interaction request, server can be extracted from the interaction request
The mark of first user and the mark of the appointed authentication information.In the mark of extracting first user and described specified
After the mark of authentication information, server can read the account letter for having the first user of mark of first user respectively
It ceases, have the appointed authentication information of the mark of the appointed authentication information and used with the appointed authentication information associated second
The account information at family.So that the specified interactive information can be supplied to the account letter for being logged in the second user by server
Second client of breath.
Therefore in this application, first user between second user without establishing information exchange relationship, still
Of short duration exchange can be carried out directly between second user.
In a specific implementation scene, the appointed authentication information for example can be license plate number, the account information example
It such as can be wechat account, first client and second client can be respectively the first smart phone and the second intelligence
It can mobile phone.First user prepares to remove the vehicle of oneself from parking stall, but finds that another car bumper has lived outlet, at this moment, first
User can directly pass through the license plate number of the vehicle, carry out of short duration exchange with second user.Specifically, it has all been incited somebody to action in the two users
In the wechat account of itself situation associated with license plate number, the first user can log in the micro- of oneself on the first smart phone
Believe account, and inputs the license plate number and specified interactive information of second user on the page of wechat application.At this moment, the first intelligence
The interaction request that mobile phone can be sent to server includes the license plate of the mark of the first user, second user in the interaction request
Number mark and specified interactive information, after server receives the interaction request, can be extracted from the interaction request first use
The mark of the license plate number of the mark and second user at family, and after extracting these marks, it can read respectively and have the first user
Mark the first user wechat account, have second user license plate number mark second user license plate number and with
The associated wechat account of the license plate number of second user.In this way, server can be to the wechat account for being logged in second user
Second smart phone provides the specified interactive information.The specified interactive information for example can be " your vehicle blocks crossing, fiber crops
It is tired of that you come to move vehicle ".It, still can be directly with the in this way, the first user is between second user without establishing information exchange relationship
Of short duration exchange is carried out between two users, to inform that second user carries out moving vehicle in time.
In another implement scene, the authentication information for example can be social security account, and the account information for example may be used
To be wechat account, first client and second client are respectively the first smart phone and the second smart phone.
First user finds second user and falls social security card in roadside, at this moment, the two users all by the wechat account of itself with
Under social security account or associated situation, in order to which the social security card of second user is returned to second user in time, the first user can
With directly by the social security account of second user, with second user carry out it is of short duration exchange, inform that second user fetches social security in time
Card.Specific implementation process is similar with the implementation process of above-mentioned implement scene, no longer repeats one by one herein.Moreover, the implementation
Scene is equally applicable to the specific implementation scene that the authentication information is passport or inhabitation address etc..
In one embodiment of the application, in practical applications, there may be some user and not have and the user
Account information associated authentication information the case where, in order to refuse the Client-initiated interaction request, in the interaction request
It further include the mark of first user for identification;Receive the first client issue the first user interaction request it
Afterwards, the method also includes following steps.
S311:Based on the mark, judge whether first user has the account information phase with first user
Associated authentication information.
S313:Do not have the feelings of authentication information associated with the account information of first user in first user
Under condition, refuse the interaction request.
Therefore the implementation procedure of the step S311/ step S313 in present embodiment and step S111/ step S113
In description it is similar, in this way, the specific implementation of step S311/ step S313, may refer in step S111/ step S113
Specific embodiment description, just repeat no more here.
In the present embodiment, the function of realizing in above method step, can be realized by computer program, the calculating
Machine program can be stored in computer storage medium.Specifically, the computer storage medium can be carried out with processor
Coupling, processor is so as to reading the computer program in computer storage medium.The computer storage medium can be used
Account information, authentication information associated with the account information of the user in storage user.The computer program is located
When managing device execution, following steps may be implemented:
S31:The interaction request of the first user of the first client sending is received, is wrapped in the interaction request of first user
Appointed authentication information and specified interactive information are included, the appointed authentication information is associated with the account information of second user;
S33:The specified interactive information is supplied to the second client for being logged in the account information of the second user.
It in one embodiment, further include the mark of first user for identification in the interaction request;It is described
When computer program is executed by processor, following steps can also be realized:
Based on the mark, it is associated with the account information of first user to judge whether first user has
Authentication information;
In the case where first user does not have authentication information associated with the account information of first user,
Refuse the interaction request.
It should be noted that function achieved by computer program in above-mentioned computer storage medium, can join
Implement embodiment according to method above-mentioned, the technical effect of realization also with the technical effect class realized in preceding method embodiment
Seemingly, it just repeats no more here.
The application also provides a kind of server, and the server includes memory and processor, stores in the memory
There are account information, authentication information associated with the account information of the user and the computer program of user, the calculating
When machine program is executed by the processor, following steps are realized:
S31:The interaction request of the first user of the first client sending is received, is wrapped in the interaction request of first user
Appointed authentication information and specified interactive information are included, the appointed authentication information is associated with the account information of second user;
S33:The specified interactive information is supplied to the second client for being logged in the account information of the second user.
In the present embodiment, the memory may include the physical unit for storing information, usually by information
It is stored again with the media using the methods of electricity, magnetic or optics after digitlization.Memory described in present embodiment again may be used
To include:The device of information, such as RAM, ROM are stored in the way of electric energy;The device of information is stored in the way of magnetic energy, it is such as hard
Disk, floppy disk, tape, core memory, magnetic bubble memory, USB flash disk;Using the device of optical mode storage information, such as CD or DVD.
Certainly, there are also memories of other modes, such as quantum memory, graphene memory etc..
In the present embodiment, the processor can be implemented in any suitable manner.For example, the processor can be with
Take such as microprocessor or processor and storage can by (micro-) processor execute computer readable program code (such as
Software or firmware) computer-readable medium, logic gate, switch, specific integrated circuit (Application Specific
Integrated Circuit, ASIC), programmable logic controller (PLC) and the form etc. for being embedded in microcontroller.
It in one embodiment, further include the mark of first user for identification in the interaction request;It is described
When computer program is executed by processor, following steps can also be realized:
Based on the mark, it is associated with the account information of first user to judge whether first user has
Authentication information;
In the case where first user does not have authentication information associated with the account information of first user,
Refuse the interaction request.
The concrete function that the server that this specification embodiment provides, memory and processor are realized, can be with this
Aforementioned embodiments in specification contrast explanation, and can reach the technical effect of aforementioned embodiments, here just no longer
It repeats.
The application also provides a kind of information interacting method, and the method can be applied in the client.The method
It may comprise steps of:The interaction request of the first user is issued to server, includes in the interaction request of first user
Appointed authentication information and specified interactive information, the appointed authentication information is associated with the account information of second user, so that
The appointed authentication information is supplied to the second client of the account information for being logged in the second user by the server.
It further include the user of first user for identification in the interaction request in one embodiment of the application
Mark;The method also includes:Receive the refusal information that the server generates, the refusal information is according to based on the user
The designated result of mark judgement generates, and the designated result does not have for characterizing first user with first user's
The associated authentication information of account information.
Therefore the implementation procedure of each step in present embodiment is similar with the description in aforementioned embodiments,
Only the executing subject of the part steps in aforementioned embodiments is changed into client from server.The specific reality of each step
Existing mode, may refer to the description of aforementioned embodiments, just repeats no more here.
The application also provides a kind of client, and the client includes memory and processor, stores in the memory
Following steps may be implemented when the computer program is executed by the processor in computer program:First is issued to server
The interaction request of user includes appointed authentication information and specified interactive information, the finger in the interaction request of first user
It is associated with the account information of second user to determine authentication information, so that the appointed authentication information is supplied to by the server
It is logged in the second client of the account information of the second user.
In the present embodiment, the memory may include the physical unit for storing information, usually by information
It is stored again with the media using the methods of electricity, magnetic or optics after digitlization.Memory described in present embodiment again may be used
To include:The device of information, such as RAM, ROM are stored in the way of electric energy;The device of information is stored in the way of magnetic energy, it is such as hard
Disk, floppy disk, tape, core memory, magnetic bubble memory, USB flash disk;Using the device of optical mode storage information, such as CD or DVD.
Certainly, there are also memories of other modes, such as quantum memory, graphene memory etc..
In the present embodiment, the processor can be implemented in any suitable manner.For example, the processor can be with
Take such as microprocessor or processor and storage can by (micro-) processor execute computer readable program code (such as
Software or firmware) computer-readable medium, logic gate, switch, specific integrated circuit (Application Specific
Integrated Circuit, ASIC), programmable logic controller (PLC) and the form etc. for being embedded in microcontroller.
It further include the user of first user for identification in the interaction request in one embodiment of the application
Mark;When the computer program is executed by the processor, following steps can also be realized:Receive what the server generated
Refuse information, the refusal information is generated according to the designated result judged based on the user identifier, and the designated result is used for
First user is characterized without authentication information associated with the account information of first user.
The concrete function that the client that this specification embodiment provides, memory and processor are realized, can be with this
Aforementioned embodiments in specification contrast explanation, and can reach the technical effect of aforementioned embodiments, here just no longer
It repeats.
The application also provides a kind of system of information exchange, the system comprises:First client, the second client kimonos
Business device;Wherein, the server is provided with the account information of user, and certification associated with the account information of the user
Information.
First client is used to issue the interaction request of the first user, the friendship of first user to the server
It mutually include appointed authentication information and specified interactive information, the account information phase of the appointed authentication information and second user in request
Association.
The appointed authentication information for being supplied to the account information for being logged in the second user by the server
Second client.
The system for the information exchange that this specification embodiment provides, server, the first client and the second client
The concrete function of realization can contrast explanation with the aforementioned embodiments in this specification, and can reach aforementioned embodiment party
The technical effect of formula, just repeats no more here.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present
Integrated Circuit Hardware Description Language) and Verilog2.Those skilled in the art
It will be apparent to the skilled artisan that only needing method flow slightly programming in logic and being programmed into integrated circuit with above-mentioned several hardware description languages
In, so that it may it is readily available the hardware circuit for realizing the logical method process.
It is also known in the art that in addition to realizing client, server in a manner of pure computer readable program code
In addition, completely can by by method and step carry out programming in logic come so that client, server with logic gate, switch, dedicated
The form of integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. realizes identical function.Therefore this client,
Server is considered a kind of hardware component, and can also be considered as to the device for realizing various functions for including in it
Structure in hardware component.Or even, can will be considered as realizing the device of various functions either implementation method
Software module can be the structure in hardware component again.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can
It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application
On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product
It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes each embodiment of the application or embodiment
Method described in certain parts.
Each embodiment in this specification is described in a progressive manner, same and similar between each embodiment
Part may refer to each other, what each embodiment stressed is the difference with other embodiments.In particular, needle
For computer storage medium, the embodiment of server and client side, it is referred to the embodiment of preceding method
Control is introduced to explain.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that there are many deformations by the application
With variation without departing from spirit herein, it is desirable to which the attached claims include these deformations and change without departing from the application
Spirit.