Disclosure of Invention
A brief summary of the disclosure is provided below in order to provide a basic understanding of some aspects of the disclosure. It should be understood that this summary is not an exhaustive overview of the disclosure. It is not intended to identify key or critical elements of the disclosure or to delineate the scope of the disclosure. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
According to a first aspect of the present disclosure, there is provided a service connection method, including:
acquiring an information interaction request of a first target user;
sending the information interaction request to a second target user;
acquiring feedback information of a second target user aiming at the information interaction request;
generating a machine account related to the real account of the second target user according to the feedback information;
sending the machine account to a first target user;
acquiring a connection request of a first target user for a machine account;
and establishing service connection with the second target user according to the connection request.
According to a second aspect of the present disclosure, there is provided a service connection method, including:
acquiring a machine account;
determining a real account number of a second target user associated with the machine account number;
determining authority information of a real account;
and establishing a service connection relation between the first target user and the second target user according to the real account and the authority information.
According to a third aspect of the present disclosure, there is provided a service connection method, including:
receiving an information interaction request of a first target user;
acquiring user information of a first target user;
generating feedback information aiming at the request according to the user information;
and sending the feedback information to the server.
According to a fourth aspect of the present disclosure, there is provided a service connection apparatus, including:
the information interaction device comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is configured to acquire an information interaction request of a first target user;
the first sending unit is configured to send the information interaction request to a second target user;
the second acquisition unit is configured to acquire feedback information of a second target user for the information interaction request;
a first generating unit configured to generate a machine account associated with a real account of a second target user according to the feedback information;
a second sending unit configured to send the machine account to the first target user;
a third obtaining unit configured to obtain a connection request of the first target user for the machine account;
and the first connection unit is configured to establish service connection with the second target user according to the connection request.
According to a fifth aspect of the present disclosure, there is provided a service connection apparatus, comprising:
a fourth acquisition unit configured to acquire the machine account;
a first determination unit configured to determine a real account number of a second target user associated with the machine account number;
a second determination unit configured to determine authority information of the real account;
and the second connection unit is configured to establish service connection with a second target user according to the real account and the authority information.
According to a sixth aspect of the present disclosure, there is provided a service connection apparatus, comprising:
the first receiving unit is configured to receive an information interaction request of a first target user;
a fifth acquisition unit configured to acquire user information of the first target user;
a second generating unit configured to generate feedback information for the request according to the user information;
a third transmitting unit configured to transmit the feedback information to the server.
According to a seventh aspect of the present invention, there is provided an electronic apparatus comprising: one or more processors; memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of the first, second or third aspect.
According to an eighth aspect of the present invention there is provided a computer readable medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform a method as in the first, second or third aspect.
The technical scheme of the disclosure has at least one of the following technical effects: the server responds to an information interaction request of a first target user, and generates a machine account related to a real account of the first target user; the service connection with the second target user is realized through the machine account, and the problem of user privacy information leakage can be effectively solved.
Detailed Description
Exemplary embodiments of the present disclosure will be described hereinafter with reference to the accompanying drawings. In the interest of clarity and conciseness, not all features of an actual embodiment are described in the specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions may be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which will vary from one implementation to another.
Here, it should be further noted that, in order to avoid obscuring the present disclosure with unnecessary details, only the device structure closely related to the scheme according to the present disclosure is shown in the drawings, and other details not so related to the present disclosure are omitted.
It is to be understood that the disclosure is not limited to the described embodiments, as described below with reference to the drawings. In this context, embodiments may be combined with each other, features may be replaced or borrowed between different embodiments, one or more features may be omitted in one embodiment, where feasible.
An embodiment of the present disclosure provides a service connection method, including: acquiring an information interaction request and a real account of a first target user; acquiring an information interaction request of a first target user; sending the information interaction request to a second target user; acquiring feedback information of a second target user aiming at the information interaction request; generating a machine account related to the real account of the second target user according to the feedback information; sending the machine account to a first target user; acquiring a connection request of a first target user for a machine account; and establishing service connection with the second target user according to the connection request.
According to the embodiment of the disclosure, a server responds to an information interaction request of a first target user and generates a machine account number associated with a real account number of the first target user; and realizing service connection with the second target user through the machine account. The service connection mode can effectively solve the problem that the privacy information of the user is revealed.
Fig. 1 shows a schematic diagram of a service connection system 100 according to an embodiment of the disclosure. The business connection system 100 includes a first application 110, a second application 120, a server 130, a third party server 140, and a third application 150. Here, the first application 110 and the second application 120 belong to the same type of application, and may be, for example, a recruitment platform; the third application 150 is of a different type of application than the first application 110 and the second application 120, and may be, for example, WeChat. The functions of the above-described respective modules are described in detail below.
The first target user clicks an information interaction button in the first application 110, and sends an information interaction request to the server 130. Here, the first target user may be a candidate or a demander; the information interaction request is associated with user information of the first target user, wherein the user information can comprise information such as personal introduction, historical working records and personal scores.
The server 130 includes a first obtaining module 131, a second obtaining module 132, a virtual resource pool 133, a first storage module 134, a second storage module 135, a first service connection module 136, an account generating module 137, a first sending module 138, a second sending module 139, and a third sending module 1310. The first obtaining module 131 obtains the information interaction request sent by the first application 110, and sends the information interaction request to the second application 120 through the second sending module 139. The second target user clicks the information interaction request link through the second application 120, views the user information of the first target user, and gives feedback information through the second application 120, wherein the feedback information includes agreement or rejection to the interaction. Here, when the first target user is a candidate, the second target user is a demander, and when the first target user is a demander, the second target user may be a candidate. If the feedback information is rejection of interaction, the second obtaining module 132 sends the information rejecting interaction to the first application 110 through the first sending module 138, and after receiving the information rejecting interaction, the first target user does not perform service connection with the second target user any more; if the feedback information is an agreement interaction, the second obtaining module 132 sends the agreement interaction information to the account generating module 137, the account generating module 137 invokes the virtual number resource pool 133 and the first storage module 134, the first storage module 134 stores a real account of the second target user, the account generating module 137 randomly selects a virtual number from the virtual number resource pool 133 as a machine account associated with the real account of the second target user, and stores the corresponding relationship between the machine account and the real account in the second storage module 135.
Then, the account generating module 137 sends the machine account to the first sending module 138, the first sending module 138 sends the selected machine account to the first application 110, the first target user clicks the machine account after looking up the machine account through the first application 110, the first application 110 generates a connection request, the first obtaining module 131 obtains the connection request and sends the connection request to the first service connecting module 136, the first service connecting module 136 invokes the corresponding relationship in the second storage module 135, and a service connection is established with the second target user through the real account. Here, the real account may be a phone number or a business account of the second target user in the second application 120. If the real account is a phone number, the first service connection module 136 may directly connect to the mobile phone of the second target user; if the real number is a service account of the second target user in the second application 120, the first service connection module 136 may implement the communication between the first target user and the second target user in the first application 110, where the communication mode may be text, voice or video.
The third-party server 140 includes a third obtaining module 141, a permission module 142, a second service connection module 143, a fourth obtaining module 144, and a prompt information generating module 145.
A first target user looks up a machine account through the first application 110, the first target user inputs the machine account in a third application 150, a third obtaining module 141 obtains the machine account and transmits the machine account to a fourth obtaining module 144, the fourth obtaining module 144 obtains a corresponding relationship between the machine account stored in a second storage module 135 and a real account of a second target user according to the machine account, and determines a real account of the second target user associated with the machine account according to the corresponding relationship; the real account of the second target user may be a social account corresponding to the application type of the third application 150, for example, a wechat account. The fourth obtaining module 144 is further configured to transmit the real account to the permission module 142, where the permission module 142 is configured to determine permission information of the real account, where the permission information may include a first level permission, a second level permission, and a third level permission, for example, the first level permission may be that a circle of friends cannot be viewed, the second level permission may be that a circle of friends is viewed only within three days, and the third level permission may be that a circle of friends is viewed only within one week; the authority information of the real account may be any one of authorities of different levels, and may also be set by itself according to needs, which is not specifically limited herein.
Then, the authority module 142 transmits the real account and the authority information to the second service connection module 143, and the second service connection module 143 adds the second target user as a restricted friend of the first target user according to the real account and the authority information, where the real account is assigned with the authority information, and the service connection relationship has the authority by using the above method. For example, when the third application is WeChat, the permission information of the real account is that the friend circle cannot be viewed, that is, both parties cannot view the friend circle of the other party through WeChat friends added by the machine account.
After the first target user and the second target user perform service connection, the two perform service transaction, according to the service transaction results of the two, the first target user may input the transaction result in the first application 110, the first obtaining module 131 obtains the transaction result, and then the fourth obtaining module 144 obtains the transaction result from the server 130. Here, the transaction result may be transaction success or transaction failure.
Next, if the transaction result is that the transaction is successful, the fourth obtaining module 144 transmits the transaction result to the permission module 142, the permission module 142 changes the permission information of the real account, and the service connection relationship between the first target user and the second target user is changed to the unrestricted connection relationship. If the transaction result is a transaction failure, the fourth obtaining module 144 sends the transaction result to the prompt information generating module 145, and the prompt information generating module 145 generates a prompt information for prompting whether the first target user needs to release the service connection relationship with the second target user and sends the prompt information to the third application.
Fig. 2 shows a schematic flow diagram of a service connection method 200 according to an embodiment of the disclosure. The method 200 is applied to a server, and starts with obtaining an information interaction request of a first target user in step 210. This step may be performed by the first obtaining module 131. The first target user clicks an information interaction button in the first application 110, and sends an information interaction request to the server 130. Here, the first target user may be a candidate or a demander; the information interaction request is associated with user information of the first target user, wherein the user information can comprise information such as personal introduction, historical working records and personal scores.
Then, in step 220, the information interaction request is sent to the second target user. This step may be performed by the second sending module 139. Here, the second sending module 139 sends the information interaction request to the second application 120, and the second target user can view the information interaction request through the second application 120.
Then, in step 230, feedback information of the second target user for the information interaction request is obtained. This step may be performed by the second acquisition module 132. Here, after the second target user views the information interaction request through the second application 120, the second target user clicks a link of the information interaction request, views the user information of the first target user, and gives feedback information, which may include, for example, approval or rejection of the interaction, the feedback information being input into the first application 110, and the second obtaining module 132 obtains the feedback information.
Then, in step 240, a machine account associated with the real account of the second target user is generated according to the feedback information. This module may be executed by the account generation module 137. Here, if the feedback information given by the second target user is agreement interaction, after the account generation module 137 acquires the information, the real account of the second target user is acquired, and a virtual number is randomly selected from the virtual number resource pool 133 as a machine account associated with the real account of the second target user. And simultaneously storing the corresponding relation between the machine account and the real account.
The machine account number is then sent to the first target user at step 250. This step may be performed by the first sending module 138. Here, the first sending module 138 sends the machine account number to the first application 110, and the first target user may view the machine account number through the first application 110.
Then, in step 260, a connection request of the first target user for the machine account is obtained. This step may be performed by the first obtaining module 131. Here, after the first target user views the machine account, the first target user may click the machine account to generate a connection request in the first application.
Then, in step 270, a service connection is established with the second target user according to the connection request. This step may be performed by the first service connection module 136. Here, the first application 110 generates a connection request, the first obtaining module 131 obtains the connection request and sends the connection request to the first service connection module 136, and the first service connection module 136 invokes the corresponding relationship in the second storage module 135 to establish a service connection with the second target user through the real account. Here, the real account may be a phone number or a business account of the second target user in the second application 120. If the real account is a telephone number, the mobile phone of the second target user can be directly connected; if the real number is the service account of the second target user in the second application 120, the first target user and the second target user can communicate in the first application 110, and the communication mode may be text, voice or video.
In the service connection method, a server responds to an information interaction request of a first target user and generates a machine account related to a real account of the first target user according to feedback information of a second target user to the information interaction request; the service connection with the second target user is realized through the machine account, and the problem of user privacy information leakage can be effectively solved.
Fig. 3 shows a schematic flow diagram of a service connection method 300 according to another embodiment of the present disclosure. The method 300 applies to a third party server, beginning with step 310, where a machine account number is obtained. This step may be performed by the third obtaining module 141. Here, the first target user views the machine account through the first application 110, the first target user inputs the machine account in the third application 150, and the third obtaining module 141 obtains the machine account from the third application 150.
Then, at step 320, the real account number of the second target user associated with the machine account number is determined. This step may be performed by the fourth acquisition module 144. Here, the third obtaining module 141 obtains the machine account and transmits the machine account to the fourth obtaining module 144, and the fourth obtaining module 144 obtains a corresponding relationship between the machine account and a real account of a second target user stored in the second storage module 135 according to the machine account, and determines a real account of the second target user associated with the machine account according to the corresponding relationship; the real account of the second target user may be a social account corresponding to the application type of the third application 150, for example, a wechat account.
Then, in step 330, the authority information of the real account is determined. This step may be performed by the rights module 142. Here, the authority information may include a first level authority, a second level authority, and a third level authority, for example, the first level authority may be unable to view a circle of friends, the second level authority may be only view a circle of friends within 3 days, and the third level authority may be only view a circle of friends within one week; the authority information of the real account may be any one of authorities of different levels, and may also be set by itself according to needs, which is not specifically limited herein.
Then, in step 340, a service connection relationship between the first target user and the second target user is established according to the real account and the authority information. This step may be performed by the second service connection module 143. Here, the second target user is added as a restricted friend of the first target user according to the real account and the permission information, wherein the real account is assigned with the permission information, and service connection is restricted by adopting the above method. For example, when the third application is WeChat, the permission information of the real account is that the friend circle cannot be viewed, that is, both parties cannot view the friend circle of the other party through WeChat friends added by the machine account.
The service connection method realizes the service connection of the first target user and the second target user in the third-party application, and effectively protects the privacy information of the two parties.
Further, on the basis of the foregoing embodiments, fig. 4 shows a schematic flow chart of a service connection method 400 according to another embodiment of the present disclosure. The method 400 begins at step 410 by obtaining a result of a transaction between a first target user and a second target user. Here, after the first target user and the second target user perform service connection, the two target users perform service transaction, and according to the service transaction results of the two target users, the first target user may input a transaction result in the first application 110 or the second target user may input a transaction result in the second application 120, and the server 130 may obtain the transaction result and send the transaction result to the third party server 140. The transaction result may include, for example, a transaction success or a transaction failure.
Then, in step 420, the business connection relationship between the first target user and the second target user is changed according to the transaction result. Here, the third party server 140 may change the service connection mode according to the transaction result. Specifically, if the transaction result is that the transaction is successful, the fourth obtaining module 144 transmits the transaction result to the permission module 142, the permission module 142 changes the permission information of the real account, and the service connection between the first target user and the second target user is changed into the unrestricted connection relationship. If the transaction result is a transaction failure, the fourth obtaining module 144 sends the transaction result to the prompt information generating module 145, and the prompt information generating module 145 generates a prompt information for prompting whether the first target user needs to release the service connection relationship with the second target user and sends the prompt information to the third application. In other embodiments, the transaction result may also be a score level, where in a request of the first target user initiating the information interaction request, the first target user gives the score level, and after obtaining the score level, the third-party server changes the service connection relationship according to different correspondence of the score level. For example, the score levels include a low level, a medium level and a high level, and the corresponding operations for changing the service connection relationship are immediately releasing the service connection, reserving for 1 day and changing to the unrestricted connection relationship, respectively.
The business connection mode adjusts the business connection relation between the first target user and the second target user according to the transaction result between the first target user and the second target user, so that the business connection process is more flexible and reliable.
Fig. 5 shows a schematic flow diagram of a traffic connection method 500 according to an embodiment of the present disclosure. The method 500 is applied to the second application 120, beginning with step 510, where an information interaction request of a first target user is received. Here, the first target user clicks the information interaction button in the first application 110, generates an information interaction request, and transmits the information interaction request to the server 130, and the server 130 transmits the information interaction request to the second application 120. The first target user may be a candidate or a demander.
Then, in step 520, user information of the first target user is acquired. The information interaction request is associated with user information of the first target user, wherein the user information can comprise information such as personal introduction, historical working records and personal scores.
Then, in step 530, feedback information for the request is generated according to the user information. The second target user clicks the information interaction request link through the second application 120, views the user information of the first target user, and gives feedback information through the second application 120, wherein the feedback information includes agreement or rejection to the interaction.
Then, in step 540, the feedback information is sent to the server.
Fig. 6 shows a block diagram of a service connection apparatus 600 according to an embodiment of the present disclosure. Referring to fig. 5, the service connection apparatus includes: a first acquisition unit 610, a first transmission unit 620, a second acquisition unit 630, a first generation unit 640, a second transmission unit 650, a third acquisition unit 660, and a first connection unit 670.
The first obtaining unit 610 is configured to obtain an information interaction request of a first target user. Here, the first target user may be a candidate or a demander; the information interaction request is associated with user information of the first target user, wherein the user information can comprise information such as personal introduction, historical working records and personal scores.
And a first sending unit 620 configured to send the information interaction request to the second target user.
A second obtaining unit 630, configured to obtain feedback information of the second target user for the information interaction request. Here, after the second target user views the information interaction request through the second application, the second target user clicks a link of the information interaction request, views the user information of the first target user, and gives feedback information, which may include, for example, approval or rejection of the interaction.
A first generating unit 640 configured to generate a machine account associated with the real account of the second target user according to the feedback information. Here, if the feedback information given by the second target user is agreement interaction, the real account of the second target user is obtained, and a virtual number is randomly selected from the virtual number resource pool 133 as a machine account associated with the real account of the second target user.
A second transmitting unit 650 configured to transmit the machine account number to the first target user.
A third obtaining unit 660 configured to obtain a connection request of the first target user for the machine account. Here, after the first target user views the machine account, the first target user may click the machine account to generate a connection request in the first application.
A first connection unit 670 configured to establish a service connection with the second target user according to the connection request.
In the service connection method, a server responds to an information interaction request of a first target user and generates a machine account related to a real account of the first target user according to feedback information of a second target user to the information interaction request; the service connection with the second target user is realized through the machine account, and the problem of user privacy information leakage can be effectively solved.
Fig. 7 shows a block diagram of a service connection device 700 according to an embodiment of the disclosure. Referring to fig. 7, the service connection apparatus 700 includes: a fourth obtaining unit 710, a first determining unit 720, a second determining unit 730, and a second connecting unit 740.
A fourth obtaining unit 710 configured to obtain the machine account number.
A first determining unit 720 configured to determine a real account number of a second target user associated with the machine account number. Acquiring a corresponding relation between the machine account and a real account of a second target user according to the machine account, and determining the real account of the second target user associated with the machine account according to the corresponding relation; the real account of the second target user may be a WeChat account.
A second determining unit 730 configured to determine authority information of the real account. Here, the authority information may include a first level authority, a second level authority, and a third level authority, for example, the first level authority may be unable to view a circle of friends, the second level authority may be only view a circle of friends within 3 days, and the third level authority may be only view a circle of friends within one week; the authority information of the real account may be any one of authorities of different levels, and may also be set by itself according to needs, which is not specifically limited herein.
And the second connection unit 740 is configured to establish a service connection relationship between the first target user and the second target user according to the real account and the authority information. Here, the second target user is added as a restricted friend of the first target user according to the real account and the permission information, wherein the real account is assigned with the permission information, and service connection is restricted by adopting the above method. For example, when the third application is WeChat, the permission information of the real account is that the friend circle cannot be viewed, that is, both parties cannot view the friend circle of the other party through WeChat friends added by the machine account.
The service connection method realizes the service connection of the first target user and the second target user in the third-party application, and effectively protects the privacy information of the two parties.
Fig. 8 shows a block diagram of a service connection apparatus 800 according to an embodiment of the present disclosure. Referring to fig. 8, the service connection apparatus 800 includes: a first receiving unit 810, a fifth obtaining unit 820, a second generating unit 830 and a third transmitting unit 840.
The first receiving unit 810 is configured to receive an information interaction request of a first target user. Here, the first target user clicks the information interaction button in the first application 110, generates an information interaction request, and transmits the information interaction request to the server 130, and the server 130 transmits the information interaction request to the second application 120. The first target user may be a candidate or a demander.
A fifth obtaining unit 820 configured to obtain user information of the first target user. The information interaction request is associated with user information of the first target user, wherein the user information can comprise information such as personal introduction, historical working records and personal scores.
A second generating unit 830 configured to generate feedback information for the request according to the user information. The second target user clicks the information interaction request link through the second application 120, views the user information of the first target user, and gives feedback information through the second application 120, wherein the feedback information includes agreement or rejection to the interaction.
A third sending unit 840 configured to send the feedback information to the server.
Fig. 9 shows a schematic structural diagram of an electronic device 900 according to an embodiment of the disclosure. As shown in fig. 9, the electronic apparatus 900 includes a Central Processing Unit (CPU)901 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage section 908 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data necessary for the operation of the electronic apparatus are also stored. The CPU 901, ROM 902, and RAM 903 are connected to each other via a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
The following components are connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer-readable medium bearing instructions that, in such embodiments, may be downloaded and installed from a network via the communication section 909, and/or installed from the removable medium 911. The various method steps described in the present invention are performed when the instructions are executed by a Central Processing Unit (CPU) 901.
Although example embodiments have been described, it will be apparent to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the inventive concept. Accordingly, it should be understood that the above-described exemplary embodiments are not limiting, but illustrative.