CN111818013B - Method and device for adding friends - Google Patents

Method and device for adding friends Download PDF

Info

Publication number
CN111818013B
CN111818013B CN202010500576.XA CN202010500576A CN111818013B CN 111818013 B CN111818013 B CN 111818013B CN 202010500576 A CN202010500576 A CN 202010500576A CN 111818013 B CN111818013 B CN 111818013B
Authority
CN
China
Prior art keywords
user
information
verification
request
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010500576.XA
Other languages
Chinese (zh)
Other versions
CN111818013A (en
Inventor
鲍承伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN202010500576.XA priority Critical patent/CN111818013B/en
Publication of CN111818013A publication Critical patent/CN111818013A/en
Application granted granted Critical
Publication of CN111818013B publication Critical patent/CN111818013B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application aims to provide a method and equipment for adding friends, and the method and equipment comprise the following steps: receiving a first verification request and a second verification request sent by a first terminal in response to friend expansion operation of a first user in social application; if receiving the confirmation permission information which is returned by the second terminal based on the second verification request and is about to carry out the audio/video call, establishing the call connection between the first user and the second user based on the confirmation permission information and the audio/video call request sent by the first terminal or the second terminal; and receiving verification feedback information returned by the second terminal based on the first verification request in the call connection maintaining process or after the call connection is finished, and sending the verification feedback information to the first terminal. The method and the device can enrich the form of adding friends.

Description

Method and device for adding friends
Technical Field
The present application relates to the field of communications, and in particular, to a technique for adding a friend.
Background
With the rapid development of the mobile internet, the social life of people changes day by day. Due to the popularization of the smart phone, the social application meets the new social requirements of people and quickly becomes an indispensable part of the life of people. Through the social application, a user can add a known person or a stranger in an address book of the social application, and the friend adding function becomes a common function. At present, a user can only send a segment of text information to verify the identity of the user when sending friend application information.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for adding a friend.
According to an aspect of the present application, a method for adding a friend at a network device is provided, the method comprising:
receiving a first verification request and a second verification request sent by a first terminal in response to friend expansion operation of a first user in social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, and the second verification request is used for obtaining permission of audio/video communication with the second user;
sending the first verification request and a second verification request to a second terminal corresponding to the second user according to the second user identification information;
if receiving the confirmation permission information which is returned by the second terminal based on the second verification request and is about to carry out the audio/video call, establishing the call connection between the first user and the second user based on the confirmation permission information and the audio/video call request sent by the first terminal or the second terminal;
and receiving verification feedback information returned by the second terminal based on the first verification request in the keeping process of the call connection or after the call connection is finished, and sending the verification feedback information to the first terminal, wherein the verification feedback information comprises verification passing information or verification failure information.
According to another aspect of the present application, there is provided a method for adding a friend in a first terminal, the method comprising:
responding to friend expansion operation of a first user in a social application, and sending a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user;
receiving confirmation permission information for carrying out the audio/video call returned by the network equipment based on the second verification request;
establishing a call connection between the first user and the second user;
and receiving verification feedback information returned by the network equipment based on the first verification request in the call connection maintaining process or after the call connection is finished, wherein the verification feedback information comprises verification passing information or verification failure information.
According to another aspect of the present application, there is provided a method for adding a buddy at a second terminal, the method comprising:
receiving a first verification request and a second verification request sent by network equipment, wherein the first verification request comprises first user identification information of a first user and second user identification information of a second user, and the second verification request is used for acquiring permission of audio/video communication with the second user to which the second terminal belongs;
responding to the confirmation operation of the second user on the second verification request, sending confirmation permission information for carrying out the audio/video call to the network equipment, and establishing call connection between the first user and the second user;
and returning verification feedback information of the first verification request to the network equipment according to a verification result of the call connection in the holding process of the call connection or after the call connection is finished, wherein the verification feedback information comprises verification passing information or verification failure information.
According to still another aspect of the present application, there is provided a method for adding a friend, the method including:
responding to friend expansion operation of a first user in a social application, a first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user;
the network equipment receives the first verification request and the second verification request, and sends the first verification request and the second verification request to a second terminal corresponding to the second user according to the second user identification information;
the second terminal receives the first verification request and the second verification request, responds to the confirmation operation of the second user on the second verification request, and sends confirmation permission information for carrying out the audio/video call to the network equipment;
the network equipment receives the permission confirmation information and establishes call connection between the first user and the second user based on the permission confirmation information and an audio/video call request sent by the first terminal or the second terminal;
in the holding process of the call connection or after the call connection is finished, the second terminal returns verification feedback information of the first verification request to the network equipment according to a verification result of the call connection, wherein the verification feedback information comprises verification passing information or verification failure information;
the network equipment receives the verification feedback information and sends the verification feedback information to the first terminal;
and the first terminal receives the verification feedback information returned by the network equipment.
According to an aspect of the present application, there is provided a network device for adding a buddy, the device comprising:
a module, configured to receive a first authentication request and a second authentication request sent by a first terminal in response to a friend expansion operation of a first user in a social application, where the first authentication request includes first user identification information of the first user and second user identification information of a second user, and the second authentication request is used to obtain permission to perform an audio/video call with the second user;
a second module, configured to send the first verification request and a second verification request to a second terminal corresponding to the second user according to the second user identification information;
a third module, configured to, if receiving permission confirmation information that is returned by the second terminal based on the second verification request and is related to the audio/video call, establish a call connection between the first user and the second user based on the permission confirmation information and an audio/video call request sent by the first terminal or the second terminal;
and a fourth module, configured to receive, during the holding process of the call connection or after the call connection is ended, verification feedback information returned by the second terminal based on the first verification request, and send the verification feedback information to the first terminal, where the verification feedback information includes verification pass information or verification failure information.
According to another aspect of the present application, there is provided a first terminal for adding a buddy, the apparatus including:
the system comprises a first module and a second module, wherein the first module is used for responding to friend expansion operation of a first user in a social application and sending a first verification request and a second verification request to network equipment corresponding to the social application, the first verification request comprises first user identification information of the first user and second user identification information of a second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user;
a second module, configured to receive permission confirmation information for performing the audio/video call, where the permission confirmation information is returned by the network device based on the second verification request;
a second module and a third module, which are used for establishing the call connection between the first user and the second user;
and a fourth module, configured to receive, during the holding process of the call connection or after the call connection is ended, verification feedback information returned by the network device based on the first verification request, where the verification feedback information includes verification passing information or verification failure information.
According to still another aspect of the present application, there is provided a second terminal for adding a buddy, the apparatus including:
a third module, configured to receive a first verification request and a second verification request sent by a network device, where the first verification request includes first user identification information of a first user and second user identification information of a second user, and the second verification request is used to obtain permission to perform an audio/video call with the second user to which the second terminal belongs;
a third module, configured to send, in response to a confirmation operation of the second user on the second authentication request, confirmation permission information for performing the audio/video call to the network device, and establish a call connection between the first user and the second user;
and a third module, configured to return, to the network device, verification feedback information of the first verification request according to a verification result of the call connection in a holding process of the call connection or after the call connection is ended, where the verification feedback information includes verification passing information or verification failure information.
According to an aspect of the present application, there is provided an apparatus for adding a buddy, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to another aspect of the application, there is provided a computer readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.
Compared with the prior art, the method and the device have the advantages that the first terminal of the first user sends the first verification request to the network device of the social application and also sends the second verification request, wherein the second verification request is used for obtaining permission for audio/video conversation with the second user, on the premise that after the network device subsequently establishes conversation connection between the first user and the second user, the added friend (for example, the second user) can determine whether to add the first user as a friend or not based on the conversation connection result, the method and the device enrich the form of adding friends, and meanwhile, on the other hand, the friend request of the strange user can be carefully identified through audio/video conversation before the friends are added, so that the effects of preventing cheating and reducing social risks are achieved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology according to the present application;
FIG. 2 illustrates a system method diagram for adding buddies in accordance with one embodiment of the present application;
fig. 3 is a flowchart illustrating a method for adding a buddy at a network device according to another embodiment of the present application;
fig. 4 shows a flowchart of a method for adding a buddy at a first terminal according to yet another embodiment of the present application;
fig. 5 shows a flowchart of a method for adding a buddy at a second terminal according to a further embodiment of the present application;
FIG. 6 illustrates a flow diagram of a method for adding buddies in accordance with one embodiment of the present application;
FIG. 7 shows a flowchart of a method for adding buddies in accordance with another embodiment of the present application;
fig. 8 is a device diagram of a network device for adding a buddy according to an embodiment of the present application;
fig. 9 is a schematic diagram illustrating an apparatus of a first terminal for adding a buddy according to another embodiment of the present application;
fig. 10 is a schematic diagram illustrating an apparatus of a second terminal for adding a buddy according to another embodiment of the present application;
fig. 11 is a device diagram of a system for adding buddies in accordance with one embodiment of the present application;
FIG. 12 illustrates an exemplary system that can be used to implement the various embodiments described in this disclosure.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, Random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The device referred to in the present application includes, but is not limited to, a terminal, a network device, or a device formed by integrating a terminal and a network device through a network. The terminal includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, multiple network server sets, or a cloud of multiple servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the terminal, the network device, or a device formed by integrating the terminal and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will understand that the above-described apparatus is merely exemplary, and that other existing or future existing apparatus, as may be suitable for use in the present application, are intended to be encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically defined otherwise.
Fig. 1 shows a typical scenario of the present application, where a first user holds a first terminal, and a social application is installed in the first terminal, where the social application includes an application that can communicate with a friend in an address list and has a function of adding the friend. The method comprises the steps that a first terminal and network equipment corresponding to the social application establish communication connection in a wireless or wired mode, and based on the communication connection, the network equipment receives a first verification request and a second verification request sent by the first terminal, wherein the first verification request comprises second user identification information pointing to a second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user. The method comprises the steps that on the basis that communication connection is established between the network equipment and a second terminal of a second user, the second terminal receives a first verification request and a second verification request, wherein the social application is installed in the second terminal, on the basis that the second user permits the audio/video call, the network equipment establishes call connection between the first user and the second user on the basis of the audio/video call request initiated by the first terminal or the second terminal, the second user carries out identity verification on the first user according to the audio/video call connection and returns verification feedback information which is approved or rejected on the basis of the first verification request, and if the verification feedback information comprises verification passing information, the network equipment confirms that the first user and the second user add friends successfully, wherein the first terminal and the second terminal comprise but are not limited to mobile phones, Tablet and computer, etc. computing devices with touch screens.
Referring to the system shown in fig. 1, fig. 2 shows a system method for adding friends according to an embodiment of the present application, the method comprising:
responding to friend expansion operation of a first user in a social application, a first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user;
the network equipment receives the first verification request and the second verification request, and sends the first verification request and the second verification request to a second terminal corresponding to the second user according to the second user identification information;
the second terminal receives the first verification request and the second verification request, responds to the confirmation operation of the second user on the second verification request, and sends confirmation permission information for carrying out the audio/video call to the network equipment;
the network equipment receives the permission confirmation information and establishes call connection between the first user and the second user based on the permission confirmation information and an audio/video call request sent by the first terminal or the second terminal;
in the holding process of the call connection or after the call connection is finished, the second terminal returns verification feedback information of the first verification request to the network equipment according to a verification result of the call connection, wherein the verification feedback information comprises verification passing information or verification failure information;
the network equipment receives the verification feedback information and sends the verification feedback information to the first terminal;
and the first terminal receives the verification feedback information returned by the network equipment.
Fig. 3 shows a method for adding a buddy at a network device according to an embodiment of the present application, where the method includes step S101, step S102, step S103, and step S104.
Specifically, in step S101, a network device receives a first authentication request and a second authentication request sent by a first terminal in response to a friend expansion operation of a first user in a social application, where the first authentication request includes first user identification information of the first user and second user identification information of a second user, and the second authentication request is used to obtain permission to perform an audio/video call with the second user. The friend expansion operation comprises click operation which is performed by the first user after the first user selects the second user in the social application and is used for friend addition, for example, in a friend request page of the second user, the first user enables setting for sending a second verification request, and in response to the friend expansion operation of the first user in the social application, the first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request is used for requesting the second user to add friends, and the second verification request is used for requesting the second user to permit audio/video communication with the first user.
In step S102, the network device sends the first verification request and the second verification request to a second terminal corresponding to the second user according to the second user identification information. For example, the first authentication request and the second authentication request both include second user identification information of the second user, and the network device sends the first authentication request and the second authentication request to the second terminal of the second user based on the second terminal identification information.
In step S103, if receiving the confirmation permission information about performing the audio/video call returned by the second terminal based on the second verification request, the network device establishes a call connection between the first user and the second user based on the confirmation permission information and the audio/video call request sent by the first terminal or the second terminal. In some embodiments, the establishing a call connection between the first user and the second user based on the confirmation permission information and the audio/video call request sent by the first terminal or the second terminal includes: returning confirmation permission information on the audio/video call to the first terminal; receiving an audio/video call request sent by the first terminal based on the confirmation permission information, wherein the audio/video call request comprises second user identification information of the second user, and sending the audio/video call request to the second terminal and receiving confirmation information about the audio/video call request sent by the second terminal; or, receiving an audio/video call request sent by the second terminal based on the confirmation permission information, wherein the audio/video call request comprises first identification information of the first user, and sending the audio/video call request to the first terminal and receiving confirmation information about the audio/video call request sent by the first terminal; and establishing the call connection between the first user and the second user based on the confirmation information. For example, the second terminal presents a prompt interface for whether to allow the audio/video call after receiving the first verification request and the second verification request, the second terminal sends the permission confirmation information for performing the audio/video call to the network device in response to the click operation of the second user on the prompt interface, and on the premise that the network device receives the permission confirmation information for performing the audio/video call, the network device receives the audio/video call request sent by the first terminal or the second terminal, and establishes the call connection between the first user and the second user based on the confirmation information of the first user or the second user. And on the basis of establishing the call connection, providing a basis for a subsequent second user to determine whether to add the first user to the friend or not based on the call process.
In step S104, in the holding process of the call connection or after the call connection is ended, the network device receives verification feedback information returned by the second terminal based on the first verification request, and sends the verification feedback information to the first terminal, where the verification feedback information includes verification passing information or verification failure information. For example, on the premise that the call connection between the first user and the second user is established, the second user device presents friend adding prompt information corresponding to the first verification request, and the second user sends verification feedback information of the friend adding prompt information corresponding to the first verification request to the network device based on the performance of the first user in the call process, where the verification feedback information includes verification passing information or verification failure information. If the verification feedback information comprises verification passing information, the network equipment returns the verification passing information serving as response information of the first verification request to the first terminal, and determines that the first user and the second user are added as friends; otherwise, the network device returns the verification failure information to the first terminal as response information of the first verification request, and determines that the first user fails to add the friend.
For example, a user a holds a first terminal, a social application is installed in the first terminal, the user a obtains user identification information of a user B from the social application, in response to a friend adding operation of the user a on a friend adding page of the user B, the first terminal sends a first authentication request and a second authentication request to network equipment, the network equipment sends the first authentication request and the second authentication request to a second terminal of the user B, after the user B receives a request permission of an audio/video call corresponding to the second authentication request and confirms the permission, the user a and the user B carry out a call based on a call connection initiated by the user a, and after the call is ended, in response to a rejection operation of the user B on the first authentication request, the network equipment sends friend adding failure information to the user a.
In some embodiments, the method further includes step S105 (not shown), in step S105, if the rejection permission information about the audio/video call returned by the second terminal based on the second authentication request is received; the network equipment returns the refusal permission information to the first terminal as response information of the second verification request; ignoring an audio/video call request sent by the first terminal, wherein the audio/video call request comprises first identification information of the first user; and receiving verification feedback information returned by the second terminal based on the first verification request, and sending the verification feedback information to the first terminal, wherein the verification feedback information comprises verification passing information or verification failure information. For example, the second terminal presents a prompt interface for allowing audio/video calls or not after receiving the first authentication request and the second authentication request, the second terminal sends refusal permission information for performing the audio/video calls to the network device in response to a click operation (for example, clicking a refusal button) or an ignore operation of the second user on the prompt interface, on the premise that the second terminal sends the refusal permission information, the first user cannot perform the audio/video calls with the second user in the social application, on the premise that the second user refuses an adding operation corresponding to the first authentication request, the second terminal returns authentication failure information to the network device depending on the operation of the second user on the first authentication request, and the network device returns the authentication failure information to the first terminal as response information of the first authentication request, in this case, the first user failed to add a friend; and if the second user receives the friend adding operation corresponding to the first verification request, the network equipment receives verification passing information sent by the second terminal, and returns the verification passing information serving as response information of the first verification request to the first terminal, wherein the friend adding of the first user is successful under the condition. The first user and the second user are enabled to successfully establish a social connection.
In some embodiments, the method further includes step S106 (not shown), and in step S106, if a response message returned by the second terminal based on the first authentication request is not received within a preset time, the network device ignores the first authentication request. For example, the first authentication request is time-efficient (e.g., the first authentication request fails if no response is received for more than one week), and if the network device does not receive the information returned by the second terminal based on the first authentication request within a preset time, the network device confirms that the first authentication request is invalid and ignores the first authentication request, so that the network device does not need to wait.
In some embodiments, the method further includes step S107 (not shown), in step S107, if a hang-up request sent by the second terminal in response to a hang-up operation of the second user in an interface of the call connection is received during the holding process of the call connection, terminating the call connection based on the hang-up request, where the hang-up request includes authentication failure information; and returning the authentication failure information to the first terminal as response information of the first authentication request. For example, a first user and a second user are in a call, in the call process, if the verification performance of the second user on the first user is not satisfactory, in response to a hang-up operation of the second user in an interface of the call connection (for example, clicking a hang-up button in a call interface), the second terminal sends a hang-up request to the network device, where the hang-up request includes verification failure information, and after receiving the hang-up request, the network device returns the verification failure information to the first terminal.
In some embodiments, the method further includes, before step S104, step S108 (not shown), in step S108, the network device acquires the verification auxiliary information during the holding of the call connection; and sending the verification auxiliary information to the second terminal, wherein the verification auxiliary information is used for prompting the second user that false information exists. On the premise that the network device acquires the verification auxiliary information in the conversation connection maintaining process, whether the verification of the first user is passed or not can be judged for the subsequent second user, so that the second user is prevented from being deceived by false information of the first terminal, the social security of the second user in the social application is improved, and the viscosity and the trust degree of the user to the social application are increased. In some embodiments, the obtaining the verification auxiliary information during the holding of the call connection includes: and acquiring the verification auxiliary information according to the audio/video information of the first user in the call connection maintaining process. For example, in the process of a call between a first user and a second user, the network device acquires audio/video information of the first terminal user in real time, detects whether false information exists in the audio/video information, and if false information exists, the false information is used as verification auxiliary information to provide reference opinions for subsequent second users to make friends through operation. In some embodiments, the obtaining the verification assistance information according to the audio/video information of the first user during the holding of the call connection includes: and detecting whether the audio/video information of the first user meets a false information condition in the call connection maintaining process, and if so, generating and acquiring verification auxiliary information in the call connection maintaining process, wherein the verification auxiliary information is used for prompting the second user that the audio/video information has false information. In some embodiments, the false information condition includes at least any one of:
1) the voice information in the audio/video information of the first user comprises synthesized voice;
2) the voice information in the audio/video verification of the first user comprises recorded voice information;
for example, the network device obtains the voice information from the audio/video information of the first user, and identifies whether the voice information is a sound passed through a sound changer through an automatic identification technology method or a robust synthesized voice detection algorithm based on noise training, in some embodiments, the voice information is jointly identified through the automatic identification technology method and a manual method through a phonetic identification method so as to more accurately identify whether the voice information is a non-human sound passed through the sound changer or a sound in a recording, and if so, the network device obtains the verification auxiliary information in the maintaining process of the call connection according to the identification result, wherein the verification auxiliary information comprises information for reminding the second user of the existence of the synthesized voice in the audio/video information. Thereby preventing the second user to some extent from being spoofed.
3) The portrait picture information in the audio/video information of the first user comprises video picture information;
for example, the network device obtains portrait image information from the audio/video information of the first user, performs watermark recognition by using an OCR technology to check whether watermark information exists in the portrait image information, and if so, the network device determines that false information exists in the portrait image information, where the portrait image information includes video image information, and the network device obtains verification auxiliary information in the holding process of the call connection according to the recognition result, where the verification auxiliary information includes information for reminding the second user that a video image exists in the audio/video information. Thereby preventing the second user from being spoofed by the picture to some extent. In some embodiments, during a call between a first user and a second user, the second user may provide a verification request of a motion instruction to the first user, for example, by making a specific shape with a hand, and when the first user performs a verification motion according to the request of the second user, the network device transmits the verification motion in real time and uses the verification motion as verification auxiliary information, and the second user may determine whether audio/video information of the first terminal is false information by itself through the verification auxiliary information, and may determine whether audio/video information of the first terminal is false information by itself.
Fig. 4 shows a method for adding a friend in a first terminal according to an embodiment of the present application, where the method includes step S201, step S202, step S203, and step S204.
Specifically, in step S201, in response to a friend expansion operation of a first user in a social application, a first terminal sends a first authentication request and a second authentication request to a network device corresponding to the social application, where the first authentication request includes first user identification information of the first user and second user identification information of a second user, and the second authentication request is used to obtain permission to perform an audio/video call with the second user. In some embodiments, the method further comprises, before step S201, step S205 (not shown), in step S205, the first terminal enables a second authentication setting in the social application of the first terminal, wherein the second authentication setting is used for initiating the second authentication request. For example, based on an obtaining operation of the first user to the second user in the social application, where the obtaining operation includes manually searching for second user identification information of the second user (for example, an ID or a user name of the second user in the social application) or obtaining relevant information of the second user from a group, for example, the first user enables a second verification setting in an adding interface for performing friend adding to the second user (for example, an enabling button including the second verification setting in the adding interface), in response to a friend propagation operation of the first user to the second user (for example, an operation of initiating a request to add a friend to the second user), the first terminal sends a first verification request and a second verification request to a network device corresponding to the social application, where the first verification request is used to request to add a friend to the second user, the second authentication request is used to obtain permission to conduct an audio/video call with the second user. And on the premise of starting the second verification setting, providing a basis for the subsequent first terminal to send a second verification request to the network equipment.
In step S202, the first terminal receives the permission confirmation information for performing the audio/video call, which is returned by the network device based on the second authentication request. For example, the second authentication request includes second identification information of a second user, the network device sends the second authentication request to a second user terminal of the second user based on the second user identification information after receiving the second authentication request, and if receiving confirmation permission information about performing the audio/video call returned by the second terminal based on the second authentication request, the network device returns the confirmation permission information to the first terminal.
In step S203, the first terminal establishes a call connection between the first user and the second user.
In some embodiments, in step S203, the first terminal, in response to a call triggering operation of the first user in the social application, sends an audio/video call request to the network device based on the confirmation permission information, and performs a call connection with the second user according to confirmation information returned by the network device based on the audio/video call request, where the audio/video call request includes second user identification information of the second user; or receiving an audio/video call request sent by the network device based on the confirmation permission information, and executing call connection with the second user after sending confirmation information to the network device based on the audio/video call request, wherein the audio/video call request includes second user identification information of the second user. For example, on the premise that the first user acquires the confirmation permission information for performing the audio/video call, in response to a call triggering operation of the first user in the social application, the first terminal sends an audio/video call request to the network device, the network device sends the audio/video call request to a second terminal of a second user corresponding to the audio/video call request, and the second terminal receives the audio/video call request, where the audio/video call request includes first user identification information of the first user, and in response to the confirmation operation performed by the first user, the network device establishes a call connection between the first user and the second user so that the first user and the second user can make a call in real time. For example, after the second terminal sends the permission confirmation information for performing the audio/video call based on the second verification request, the second terminal actively initiates the audio/video call request, so that the added friend (the second user) is in an active position, and the use experience of the user is improved.
In step S204, the first terminal receives, during the holding process of the call connection or after the call connection is ended, verification feedback information returned by the network device based on the first verification request, where the verification feedback information includes verification passing information or verification failure information. For example, in the process of a real-time audio/video call between a first user and a second user, the second user may feed back a first verification request during the call, or feed back the first verification request after the audio/video call between the first user and the second user is ended, and after the second terminal sends verification feedback information to the network device, the network device returns verification feedback information corresponding to the first verification request to the first terminal.
For example, a user a holds a first terminal, a social application is installed in the first terminal, the user a obtains user identification information of a user B from the social application, in response to a friend adding operation of the user a on a friend adding page of the user B, the first terminal sends a first verification request and a second verification request to network equipment, the network equipment sends the first verification request and the second verification request to a second terminal of the user B, after the user B receives a request permission of an audio/video call corresponding to the second verification request and confirms the permission, the user a and the user B carry out a call based on a call connection initiated by the user a, and after the call is ended, in response to a receiving operation of the user B on the first verification request, the network equipment sends information of successful friend adding to the user a.
Fig. 5 shows a method for adding a friend at a second terminal according to an embodiment of the present application, where the method includes step S301, step S302, and step S303.
Specifically, in step S301, the second terminal receives a first authentication request and a second authentication request sent by the network device, where the first authentication request includes first user identification information of a first user and second user identification information of a second user, and the second authentication request is used to obtain permission for performing an audio/video call with the second user to which the second terminal belongs. For example, in response to a friend expansion operation of a first user in a social application, a first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, and the network equipment sends the first verification request and the second verification request to a second terminal corresponding to a second user according to second user identification information.
In step S302, the second terminal sends, in response to the confirmation operation of the second user on the second authentication request, confirmation permission information for performing the audio/video call to the network device, and establishes a call connection between the first user and the second user. In some embodiments, the establishing the call connection between the first user and the second user includes: sending an audio/video call request to the network equipment based on the confirmation permission information, and executing call connection with the first user according to confirmation information returned by the network equipment based on the audio/video call request, wherein the audio/video call request comprises first user identification information of the first user; or receiving an audio/video call request sent by the network device based on the permission confirmation information, and executing call connection with the first user after sending confirmation information to the network device based on the audio/video call request, wherein the audio/video call request includes first user identification information of the first user. For example, the second terminal presents a confirmation interface whether to allow an audio/video call after receiving the second verification request, and in response to a confirmation operation of the second user on the confirmation interface, the second terminal sends confirmation permission information for performing the audio/video call to the network device, and actively initiates an audio/video call request to the network device after sending the confirmation permission information, where the audio/video call request includes first user identification information of the first user, and after the network device sends the audio/video call request to the first terminal and receives the confirmation information of the first terminal, the second terminal performs a call connection with the first user.
In step S303, the second terminal returns, to the network device, verification feedback information of the first verification request according to a verification result of the call connection in the holding process of the call connection or after the call connection is ended, where the verification feedback information includes verification passing information or verification failure information. For example, in the process of a real-time audio/video call between a first user and a second user, the second user may feed back a first verification request during the call, or feed back the first verification request after the audio/video call between the first user and the second user is ended, and after the second terminal sends verification feedback information to the network device, the network device returns verification feedback information corresponding to the first verification request to the first terminal. In some embodiments, the method further includes step S304 (not shown), in step S304, the second terminal receives the verification auxiliary information in the holding process of the call connection sent by the network device; in step S303, the second terminal returns, to the network device, verification feedback information of the first verification request according to a verification result of the call connection and the verification auxiliary information during the holding process of the call connection or after the call connection is ended, where the verification feedback information includes verification passing information or verification failure information. Wherein the verification auxiliary information is used for prompting the second user that false information exists in the audio/video information. For example, in the process of a call between a first user and a second user, the network device obtains audio/video information of the first end user in real time, detects whether false information exists in the audio/video information, if false information exists, the false information is used as verification auxiliary information, and the second user can refer to the verification auxiliary information to make a decision whether to pass a friend or not. In some embodiments, during a call between the first user and the second user, the second user may provide a verification request of an action instruction to the first user, for example, by making a specific shape with a hand, and when the first user performs a verification action according to the request of the second user, the network device transmits the verification action in real time and uses the verification action as verification auxiliary information, and the second user may determine whether the audio/video information of the first terminal is false information by itself through the verification auxiliary information. Thereby reducing the possibility of being deceived to some extent. Thereby improving the credibility of the user for the social application.
For example, a user a holds a first terminal, a social application is installed in the first terminal, the user a obtains user identification information of a user B from the social application, in response to a friend adding operation of the user a on a friend adding page of the user B, the first terminal sends a first verification request and a second verification request to network equipment, the network equipment sends the first verification request and the second verification request to a second terminal of the user B, after the user B receives a request permission of an audio/video call corresponding to the second verification request and confirms the permission, the user a and the user B carry out a call based on a call connection initiated by the user a, and in the call process, in response to a receiving operation of the user B on the first verification request, the network equipment sends friend adding success information to the user a.
Fig. 6 is a flowchart illustrating a method for adding a friend according to an embodiment of the present application, where a user a holds a first terminal, a user B holds a second terminal, the first terminal has an IM (instant messaging) social application client a installed therein, the second terminal has an IM social application client B installed therein, the client a sends a voice/video request and a friend adding request to a server of the IM application in response to a friend adding operation of the user a in the client a, the server sends the voice/video request and the friend adding request to the second terminal, the second terminal performs a call operation with the user a in response to a receiving operation of the voice/video request by the user B, and then the user B performs a feedback operation on the friend adding request, where the feedback operation includes feedback information of agreeing to or refusing to add the friend, the second terminal returns the feedback information to the server, and the server returns the feedback information to the first terminal.
Fig. 7 is a flowchart illustrating a method for adding a friend according to another embodiment of the present application, where a user a holds a first terminal, a user B holds a second terminal, the first terminal has an IM (instant messaging) social application client a installed therein, the second terminal has an IM social application client B installed therein, the client a sends information requesting the user B to allow a voice/video call and a request for adding a friend to a server of the IM application in response to a friend adding operation of the user a in the client a, the server sends information requesting the user B to allow a voice/video call and a request for adding a friend to the second terminal, the user B sends a voice/video call request to a network device in the second terminal in response to a confirmation operation of the user B for the information requesting the user B to allow a voice/video call, the network equipment sends the call request to the first terminal, the first terminal executes the call operation with the user B after the user A answers the call at the first terminal, the user B makes feedback operation on the request of adding friends in the call process or after the call is finished, wherein the feedback operation comprises feedback information of agreeing or refusing to add friends, the second terminal returns the feedback information to the server, and the server returns the feedback information to the first terminal.
Fig. 8 shows a network device for adding a buddy according to an embodiment of the present application, where the network device includes a one-to-one module 101, a two-to-two module 102, a three-to-three module 103, and a four-to-four module 104.
Specifically, the one-to-one module 101 is configured to receive a first verification request and a second verification request sent by a first terminal in response to a friend expansion operation of a first user in a social application, where the first verification request includes first user identification information of the first user and second user identification information of a second user, and the second verification request is used to obtain permission to perform an audio/video call with the second user. The friend expansion operation comprises a click operation which is performed by the first user after the first user selects the second user in the social application and is used for friend addition, for example, in a friend request page of the second user, the first user enables setting for sending a second verification request, and in response to the friend expansion operation of the first user in the social application, the first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request is used for requesting the second user to add friends, and the second verification request is used for requesting permission to the second user to perform audio/video communication with the first user.
A second module 102, configured to send the first verification request and the second verification request to a second terminal corresponding to the second user according to the second user identification information. For example, the first authentication request and the second authentication request both include second user identification information of the second user, and the network device sends the first authentication request and the second authentication request to the second terminal of the second user based on the second terminal identification information.
A third module 103, configured to, if receiving permission confirmation information that is returned by the second terminal based on the second verification request and is related to the audio/video call, establish a call connection between the first user and the second user based on the permission confirmation information and an audio/video call request sent by the first terminal or the second terminal. In some embodiments, the establishing a call connection between the first user and the second user based on the confirmation permission information and the audio/video call request sent by the first terminal or the second terminal includes: returning confirmation permission information on the audio/video call to the first terminal; receiving an audio/video call request sent by the first terminal based on the confirmation permission information, wherein the audio/video call request comprises second user identification information of the second user, and sending the audio/video call request to the second terminal and receiving confirmation information about the audio/video call request sent by the second terminal; or, receiving an audio/video call request sent by the second terminal based on the confirmation permission information, wherein the audio/video call request comprises first identification information of the first user, and sending the audio/video call request to the first terminal and receiving confirmation information about the audio/video call request sent by the first terminal; and establishing the call connection between the first user and the second user based on the confirmation information. The operation of establishing the call connection between the first user and the second user based on the confirmation permission information and the audio/video call request sent by the first terminal or the second terminal is the same as or similar to that of the embodiment shown in fig. 3, and therefore, the description is omitted, and the operation is incorporated herein by reference.
A fourth module 104, configured to receive, during the holding process of the call connection or after the call connection is ended, verification feedback information returned by the second terminal based on the first verification request, and send the verification feedback information to the first terminal, where the verification feedback information includes verification passing information or verification failure information. For example, on the premise that the call connection between the first user and the second user is established, adding friend prompt information corresponding to the first verification request is presented in the second user equipment, and the second user sends verification feedback information of adding friend prompt information corresponding to the first verification request to the network equipment based on the performance of the first user in the holding process of the call connection, where the verification feedback information includes verification passing information or verification failure information. If the verification feedback information comprises verification passing information, the network equipment returns the verification passing information serving as response information of the first verification request to the first terminal, and determines that the first user and the second user are added as friends; otherwise, the network device returns the verification failure information to the first terminal as response information of the first verification request, and determines that the first user fails to add the friend.
Here, the specific implementation of the above-mentioned one-to-one module 101, the two-to-one module 102, the one-to-three module 103 and the one-to-four module 104 is the same as or similar to the embodiment of steps S101, S102, S103 and S104 in fig. 3, and therefore, the detailed description thereof is omitted, and the detailed description thereof is incorporated herein by reference.
In some embodiments, the network device further includes a fifth module 105 (not shown), and the fifth module 105 is configured to, if receiving the permission rejection information returned by the second terminal based on the second authentication request, perform the audio/video call; returning the refusal permission information to the first terminal as response information of the second authentication request; ignoring an audio/video call request sent by the first terminal, wherein the audio/video call request comprises first identification information of the first user; and receiving verification feedback information returned by the second terminal based on the first verification request, and sending the verification feedback information to the first terminal, wherein the verification feedback information comprises verification passing information or verification failure information. The specific implementation manner of the fifth module 105 is the same as or similar to the embodiment of the step S105, and therefore, the detailed description is omitted, and the detailed implementation manner is included herein by reference.
In some embodiments, the network device further includes a sixth module 106 (not shown), and the sixth module 106 is configured to ignore the first authentication request if a response message returned by the second terminal based on the first authentication request is not received within a preset time. The specific implementation manner of the sixth module 106 is the same as or similar to the embodiment of the step S106, and thus is not described herein again, and is included herein by reference.
In some embodiments, the network device further includes a seventh module 107 (not shown), and the seventh module 107 is configured to terminate the call connection based on a hangup request sent by the second terminal in response to a hangup operation of the second user in an interface of the call connection if the hangup request is received during the holding of the call connection, where the hangup request includes authentication failure information; and returning the authentication failure information to the first terminal as response information of the first authentication request. The specific implementation manner of the seventh module 107 is the same as or similar to the embodiment of the step S107, and therefore, the detailed description is omitted, and the detailed implementation manner is incorporated herein by reference.
In some embodiments, the network device further comprises an eight module 108 (not shown) before a four module 104, the eight module 108 being configured to obtain the authentication assistance information during the holding of the call connection; and sending the verification auxiliary information to the second terminal, wherein the verification auxiliary information is used for prompting the second user that false information exists. The specific implementation manner of the eight module 108 is the same as or similar to the embodiment of the step S108, and therefore, the detailed description is omitted, and the detailed implementation manner is incorporated herein by reference. In some embodiments, the obtaining the verification auxiliary information during the holding of the call connection includes: and acquiring the verification auxiliary information according to the audio/video information of the first user in the call connection maintaining process. The operation of obtaining the verification auxiliary information during the holding process of the call connection is the same as or similar to that of the embodiment shown in fig. 3, and therefore, the description is omitted, and the operation is incorporated herein by reference. In some embodiments, the obtaining the verification assistance information according to the audio/video information of the first user during the holding of the call connection includes: and detecting whether the audio/video information of the first user meets a false information condition in the call connection maintaining process, and if so, generating and acquiring verification auxiliary information in the call connection maintaining process, wherein the verification auxiliary information is used for prompting the second user that the audio/video information has false information. The operation of obtaining the verification auxiliary information according to the audio/video information of the first user during the call connection maintaining process is the same as or similar to that of the embodiment shown in fig. 3, and therefore, the description is omitted, and the description is incorporated herein by reference. In some embodiments, the false information condition includes at least any one of:
1) the voice information in the audio/video information of the first user comprises synthesized voice;
2) the voice information in the audio/video verification of the first user comprises recorded voice information;
3) the portrait picture information in the audio/video information of the first user comprises video picture information; the operation of the associated dummy information condition is the same as or similar to the embodiment shown in FIG. 3, and thus is not described again and is incorporated herein by reference.
Fig. 9 shows a first terminal for adding a friend according to an embodiment of the present application, where the first terminal includes a first-module-two 201, a second-module-two 202, a third-module-two 203, and a fourth-module-two 204.
Specifically, the first-second module 201 is configured to send a first authentication request and a second authentication request to a network device corresponding to a social application in response to a friend expansion operation of a first user in the social application, where the first authentication request includes first user identification information of the first user and second user identification information of a second user, and the second authentication request is used to obtain permission for performing an audio/video call with the second user. In some embodiments, the first terminal further comprises a twenty-five module 205 (not shown) before the two-one module 201, and the twenty-five module 205 is configured to enable a second authentication setting in a social application of the first terminal, wherein the second authentication setting is used to initiate the second authentication request. The specific implementation manner of the twenty-five module 205 is the same as or similar to the embodiment of the step S205, and therefore, the detailed description is omitted, and the detailed implementation manner is included herein by reference.
A second module 202, configured to receive permission information for confirmation of performing the audio/video call, returned by the network device based on the second authentication request. For example, the second authentication request includes second identification information of a second user, the network device sends the second authentication request to a second user terminal of the second user based on the second user identification information after receiving the second authentication request, and if receiving confirmation permission information about performing the audio/video call returned by the second terminal based on the second authentication request, the network device returns the confirmation permission information to the first terminal.
A second and third module 203, configured to establish a call connection between the first user and the second user. For example, on the premise that the first user acquires the confirmation permission information for performing the audio/video call, in response to a call triggering operation of the first user in the social application, the first terminal sends an audio/video call request to the network device, the network device sends the audio/video call request to a second terminal of a second user corresponding to the audio/video call request, and the second terminal receives the audio/video call request, where the audio/video call request includes first user identification information of the first user, and in response to the confirmation operation performed by the first user, the network device establishes a call connection between the first user and the second user so that the first user and the second user can make a call in real time. In some embodiments, a second-third module 203, configured to send, in response to a call trigger operation of the first user in the social application, an audio/video call request to the network device based on the permission confirmation information, and perform a call connection with the second user according to confirmation information returned by the network device based on the audio/video call request, where the audio/video call request includes second user identification information of the second user; or receiving an audio/video call request sent by the network device based on the confirmation permission information, and executing call connection with the second user after sending confirmation information to the network device based on the audio/video call request, wherein the audio/video call request includes second user identification information of the second user. The operation of establishing the call connection between the first user and the second user is the same as or similar to that of the embodiment shown in fig. 4, and therefore, the description is omitted, and the operation is incorporated herein by reference.
A second-fourth module 204, configured to receive, during the holding process of the call connection or after the call connection is ended, verification feedback information returned by the network device based on the first verification request, where the verification feedback information includes verification passing information or verification failure information. For example, in the process of a real-time audio/video call between a first user and a second user, the second user may feed back a first verification request during the call, or feed back the first verification request after the audio/video call between the first user and the second user is ended, and after the second terminal sends verification feedback information to the network device, the network device returns verification feedback information corresponding to the first verification request to the first terminal.
Here, examples of specific implementation manners of the two-in-one module 201, the two-in-two module 202, the two-in-three module 203, and the two-in-four module 204 are the same as or similar to those of the embodiment related to steps S201, S202, S203, and S204 in fig. 4, and therefore are not repeated herein and are included herein by reference.
Fig. 10 illustrates a second terminal for adding a buddy according to an embodiment of the present application, where the second terminal includes a first-third module 301, a second-third module 302, and a third-third module 303.
Specifically, the third module 301 is configured to receive a first verification request and a second verification request sent by a network device, where the first verification request includes first user identification information of a first user and second user identification information of a second user, and the second verification request is used to obtain permission to perform an audio/video call with the second user to which the second terminal belongs. For example, in response to a friend expansion operation of a first user in a social application, a first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, and the network equipment sends the first verification request and the second verification request to a second terminal corresponding to a second user according to second user identification information.
A third-second module 302, configured to send, in response to a confirmation operation of the second user on the second verification request, confirmation permission information for performing the audio/video call to the network device, and establish a call connection between the first user and the second user. In some embodiments, the establishing the call connection between the first user and the second user includes: sending an audio/video call request to the network equipment based on the confirmation permission information, and executing call connection with the first user according to confirmation information returned by the network equipment based on the audio/video call request, wherein the audio/video call request comprises first user identification information of the first user; or receiving an audio/video call request sent by the network device based on the confirmation permission information, and executing call connection with the first user after sending confirmation information to the network device based on the audio/video call request, wherein the audio/video call request includes first user identification information of the first user. The operation of establishing the call connection between the first user and the second user is the same as or similar to that of the embodiment shown in fig. 5, and therefore, the description is omitted, and the description is incorporated herein by reference. For example, the second terminal presents a confirmation interface whether to allow an audio/video call after receiving the second verification request, and in response to a confirmation operation of the second user on the confirmation interface, the second terminal sends confirmation permission information for performing the audio/video call to the network device, and actively initiates an audio/video call request to the network device after sending the confirmation permission information, where the audio/video call request includes first user identification information of the first user, and after the network device sends the audio/video call request to the first terminal and receives the confirmation information of the first terminal, the second terminal performs a call connection with the first user.
A third module 303, configured to return, to the network device, verification feedback information of the first verification request according to a verification result of the call connection in a holding process of the call connection or after the call connection is ended, where the verification feedback information includes verification passing information or verification failure information. For example, in the process of a real-time audio/video call between a first user and a second user, the second user may feed back a first verification request during the call, or feed back the first verification request after the audio/video call between the first user and the second user is ended, and after the second terminal sends verification feedback information to the network device, the network device returns verification feedback information corresponding to the first verification request to the first terminal. In some embodiments, the second terminal further includes a third-fourth module 304 (not shown), where the third-fourth module 304 is configured to receive the verification assistance information sent by the network device during the holding process of the call connection; a thirty-third module 303, configured to, during the holding process of the call connection or after the call connection is ended, return verification feedback information of the first verification request to the network device according to a verification result of the call connection and the verification auxiliary information, where the verification feedback information includes verification passing information or verification failure information. Wherein the verification auxiliary information is used for prompting the second user that false information exists in the audio/video information. The specific implementation manner of the three-four module 304 is the same as or similar to the embodiment of the step S304, and therefore, the detailed description is omitted, and the detailed implementation manner is incorporated herein by reference.
Here, the examples of the specific implementation manners of the three-in-one module 301, the three-in-two module 302, and the three-in-three module 303 are the same as or similar to the embodiments related to steps S301, S302, and S303 in fig. 5, and therefore, the detailed description is omitted, and the detailed description is incorporated herein by reference.
Fig. 11 shows a system device for adding a friend according to an embodiment of the present application, where the system includes:
responding to friend expansion operation of a first user in a social application, a first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user;
the network equipment receives the first verification request and the second verification request, and sends the first verification request and the second verification request to a second terminal corresponding to the second user according to the second user identification information;
the second terminal receives the first verification request and the second verification request, responds to the confirmation operation of the second user on the second verification request, and sends confirmation permission information for carrying out the audio/video call to the network equipment;
the network equipment receives the permission confirmation information and establishes call connection between the first user and the second user based on the permission confirmation information and an audio/video call request sent by the first terminal or the second terminal;
in the holding process of the call connection or after the call connection is finished, the second terminal returns verification feedback information of the first verification request to the network equipment according to a verification result of the call connection, wherein the verification feedback information comprises verification passing information or verification failure information;
the network equipment receives the verification feedback information and sends the verification feedback information to the first terminal;
and the first terminal receives the verification feedback information returned by the network equipment.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method as recited in any preceding claim.
FIG. 12 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 12, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard disk drive(s) (HDD (s)), one or more Compact Disc (CD) drive(s), and/or one or more Digital Versatile Disc (DVD) drive (s)).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310, such as memory controller module 330. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controllers of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. As such, the software programs (including associated data structures) of the present application can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Further, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (18)

1. A method for adding a friend at a network device side, wherein the method comprises:
receiving a first verification request and a second verification request sent by a first terminal in response to friend expansion operation of a first user in social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, the first verification request is used for requesting addition of friends to the second user, and the second verification request is used for acquiring permission of audio/video conversation with the second user;
sending the first verification request and a second verification request to a second terminal corresponding to the second user according to the second user identification information;
if receiving the confirmation permission information which is returned by the second terminal based on the second verification request and is about to carry out the audio/video call, establishing the call connection between the first user and the second user based on the confirmation permission information and the audio/video call request sent by the first terminal or the second terminal;
and receiving verification feedback information returned by the second terminal based on the first verification request in the keeping process of the call connection or after the call connection is finished, and sending the verification feedback information to the first terminal, wherein the verification feedback information comprises verification passing information or verification failure information.
2. The method of claim 1, wherein the method further comprises:
if the refusal permission information which is returned by the second terminal based on the second verification request and is about to carry out the audio/video call is received;
returning the refusal permission information to the first terminal as response information of the second authentication request;
ignoring an audio/video call request sent by the first terminal, wherein the audio/video call request comprises first user identification information of the first user;
and receiving verification feedback information returned by the second terminal based on the first verification request, and sending the verification feedback information to the first terminal, wherein the verification feedback information comprises verification passing information or verification failure information.
3. The method according to claim 1 or 2, wherein the method further comprises:
and if the response information returned by the second terminal based on the first verification request is not received in the preset time, ignoring the first verification request.
4. The method of claim 1, wherein the establishing of the call connection between the first user and the second user based on the confirmation permission information and an audio/video call request sent by the first terminal or the second terminal comprises:
returning confirmation permission information on the audio/video call to the first terminal;
receiving an audio/video call request sent by the first terminal based on the confirmation permission information, wherein the audio/video call request comprises second user identification information of the second user, and sending the audio/video call request to the second terminal and receiving confirmation information about the audio/video call request sent by the second terminal;
or, receiving an audio/video call request sent by the second terminal based on the confirmation permission information, wherein the audio/video call request comprises first user identification information of the first user, and sending the audio/video call request to the first terminal and receiving confirmation information about the audio/video call request sent by the first terminal;
and establishing the call connection between the first user and the second user based on the confirmation information.
5. The method of claim 1, wherein the method further comprises:
if in the maintaining process of the call connection, receiving a hang-up request sent by the second terminal in response to the hang-up operation of the second user in the interface of the call connection, and terminating the call connection based on the hang-up request, wherein the hang-up request comprises authentication failure information;
and returning the authentication failure information to the first terminal as response information of the first authentication request.
6. The method of claim 1, wherein the method receives authentication feedback information returned by the second terminal based on the first authentication request during the holding of the call connection or after the call connection is ended, and sends the authentication feedback information to the first terminal, wherein the authentication feedback information includes authentication passing information or authentication failure information, and before the method further comprises:
acquiring verification auxiliary information in the call connection maintaining process;
and sending the verification auxiliary information to the second terminal, wherein the verification auxiliary information is used for prompting the second user that false information exists.
7. The method of claim 6, wherein the obtaining of the auxiliary information for authentication during the holding of the call connection comprises:
and acquiring the verification auxiliary information according to the audio/video information of the first user in the call connection maintaining process.
8. The method of claim 7, wherein said obtaining the verification assistance information based on audio/video information of the first user during the holding of the call connection comprises:
and detecting whether the audio/video information of the first user meets a false information condition in the call connection maintaining process, and if so, generating and acquiring verification auxiliary information in the call connection maintaining process, wherein the verification auxiliary information is used for prompting the second user that the audio/video information has false information.
9. The method of claim 8, wherein the false information condition comprises at least any one of:
the voice information in the audio/video information of the first user comprises synthetic voice;
the portrait picture information in the audio/video information of the first user comprises video picture information;
the voice information in the audio/video authentication of the first user comprises recorded voice information.
10. A method for adding a buddy at a first terminal, wherein the method comprises:
responding to friend expansion operation of a first user in a social application, and sending a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, the first verification request is used for requesting addition of friends to the second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user;
receiving confirmation permission information for carrying out the audio/video call returned by the network equipment based on the second verification request;
establishing a call connection between the first user and the second user;
and receiving verification feedback information returned by the network equipment based on the first verification request in the call connection maintaining process or after the call connection is finished, wherein the verification feedback information comprises verification passing information or verification failure information.
11. The method of claim 10, wherein the establishing the call connection between the first user and the second user comprises:
responding to a call triggering operation of the first user in the social application, sending an audio/video call request to the network equipment based on the confirmation permission information, and performing call connection with the second user according to confirmation information returned by the network equipment based on the audio/video call request, wherein the audio/video call request comprises second user identification information of the second user; alternatively, the first and second electrodes may be,
and receiving an audio/video call request sent by the network equipment based on the confirmation permission information, and executing call connection with the second user after sending confirmation information to the network equipment based on the audio/video call request, wherein the audio/video call request comprises second user identification information of the second user.
12. The method of claim 10, wherein the method sends a first authentication request and a second authentication request to a network device corresponding to a social application in response to a friend extension operation of a first user in the social application, wherein the first authentication request includes first user identification information of the first user and second user identification information of a second user, and the second authentication request is used before obtaining permission for an audio/video call with the second user, further comprising:
enabling a second authentication setting in a social application of the first terminal, wherein the second authentication setting is used for initiating the second authentication request.
13. A method for adding a buddy at a second terminal, wherein the method comprises:
receiving a first verification request and a second verification request sent by network equipment, wherein the first verification request comprises first user identification information of a first user and second user identification information of a second user, the first verification request is used for requesting addition of friends to the second user, and the second verification request is used for acquiring permission of audio/video conversation with the second user to which the second terminal belongs;
responding to the confirmation operation of the second user on the second verification request, sending confirmation permission information for carrying out the audio/video call to the network equipment, and establishing call connection between the first user and the second user;
and returning verification feedback information of the first verification request to the network equipment according to a verification result of the call connection in the holding process of the call connection or after the call connection is finished, wherein the verification feedback information comprises verification passing information or verification failure information.
14. The method of claim 13, wherein the establishing the call connection between the first user and the second user comprises:
sending an audio/video call request to the network equipment based on the confirmation permission information, and executing call connection with the first user according to confirmation information returned by the network equipment based on the audio/video call request, wherein the audio/video call request comprises first user identification information of the first user; alternatively, the first and second electrodes may be,
and receiving an audio/video call request sent by the network equipment based on the confirmation permission information, and executing call connection with the first user after sending confirmation information to the network equipment based on the audio/video call request, wherein the audio/video call request comprises first user identification information of the first user.
15. The method of claim 13, wherein the method further comprises:
receiving verification auxiliary information sent by the network equipment in the call connection maintaining process;
in the holding process of the call connection or after the call connection is finished, returning verification feedback information of the first verification request to the network device according to a verification result of the call connection, where the verification feedback information includes verification passing information or verification failure information, and includes:
and returning verification feedback information of the first verification request to the network equipment according to a verification result of the call connection and the verification auxiliary information in the holding process of the call connection or after the call connection is finished, wherein the verification feedback information comprises verification passing information or verification failure information.
16. A method for adding buddies, the method comprising:
responding to friend expansion operation of a first user in a social application, a first terminal sends a first verification request and a second verification request to network equipment corresponding to the social application, wherein the first verification request comprises first user identification information of the first user and second user identification information of a second user, the first verification request is used for requesting addition of friends to the second user, and the second verification request is used for obtaining permission of audio/video conversation with the second user;
the network equipment receives the first verification request and the second verification request, and sends the first verification request and the second verification request to a second terminal corresponding to the second user according to the second user identification information;
the second terminal receives the first verification request and the second verification request, responds to the confirmation operation of the second user on the second verification request, and sends confirmation permission information for carrying out the audio/video call to the network equipment;
the network equipment receives the permission confirmation information and establishes call connection between the first user and the second user based on the permission confirmation information and an audio/video call request sent by the first terminal or the second terminal;
in the holding process of the call connection or after the call connection is finished, the second terminal returns verification feedback information of the first verification request to the network equipment according to a verification result of the call connection, wherein the verification feedback information comprises verification passing information or verification failure information;
the network equipment receives the verification feedback information and sends the verification feedback information to the first terminal;
and the first terminal receives the verification feedback information returned by the network equipment.
17. An apparatus for adding a buddy, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 1 to 15.
18. A computer-readable medium storing instructions that, when executed by a computer, cause the computer to perform operations of any of the methods of claims 1-15.
CN202010500576.XA 2020-06-04 2020-06-04 Method and device for adding friends Active CN111818013B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010500576.XA CN111818013B (en) 2020-06-04 2020-06-04 Method and device for adding friends

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010500576.XA CN111818013B (en) 2020-06-04 2020-06-04 Method and device for adding friends

Publications (2)

Publication Number Publication Date
CN111818013A CN111818013A (en) 2020-10-23
CN111818013B true CN111818013B (en) 2022-06-21

Family

ID=72848249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010500576.XA Active CN111818013B (en) 2020-06-04 2020-06-04 Method and device for adding friends

Country Status (1)

Country Link
CN (1) CN111818013B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967553A (en) * 2015-04-30 2015-10-07 广东欧珀移动通信有限公司 Message interaction method, related device and communication system
CN105049319A (en) * 2015-05-25 2015-11-11 腾讯科技(深圳)有限公司 Friend adding method and system, client, and server
CN107508746A (en) * 2017-08-28 2017-12-22 武汉斗鱼网络科技有限公司 Good friend's adding method, device and electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008006214A1 (en) * 2006-07-13 2008-01-17 Mobivox Inc. Methods and systems for selecting a buddy from a buddy list and for placing call to a buddy
CN101090404A (en) * 2007-05-31 2007-12-19 中国移动通信集团广东有限公司 User matching method based on mobile phone address term

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967553A (en) * 2015-04-30 2015-10-07 广东欧珀移动通信有限公司 Message interaction method, related device and communication system
CN105049319A (en) * 2015-05-25 2015-11-11 腾讯科技(深圳)有限公司 Friend adding method and system, client, and server
CN107508746A (en) * 2017-08-28 2017-12-22 武汉斗鱼网络科技有限公司 Good friend's adding method, device and electronic equipment

Also Published As

Publication number Publication date
CN111818013A (en) 2020-10-23

Similar Documents

Publication Publication Date Title
CN102843421B (en) The implementation method of customer relationship and device in social networks application
CN110336735B (en) Method and equipment for sending reminding message
RU2651800C1 (en) Method and device connection status checking
CN107148068B (en) Method and equipment for connecting wireless access point
CN105323218A (en) Identity verifying method and device
CN110795004B (en) Social method and device
CN112822161B (en) Method and equipment for realizing conference message synchronization
CN110336733B (en) Method and equipment for presenting emoticon
CN112714158A (en) Transaction processing method, relay network, cross-link gateway, system, medium, and device
CN111949958B (en) Authorization authentication method and device in Oauth protocol
CN112822430B (en) Conference group merging method and device
CN110780955A (en) Method and equipment for processing emoticon message
WO2023241613A1 (en) Call establishment method, device and system, terminal, and readable storage medium
CN111818013B (en) Method and device for adding friends
CN111932230A (en) Method and equipment for modifying red envelope
CN112688856B (en) Method and device for releasing friend relationship
CN106302002B (en) Test method and device
CN112272213B (en) Activity registration method and equipment
KR20160042399A (en) Creating a contact list and pre-populated user accounts
CN113918897A (en) Method, apparatus, and medium for displaying application in application open platform
CN110460642B (en) Method and device for managing reading mode
CN114429361A (en) Method, device, medium and program product for extracting resource
US10904301B2 (en) Conference system and method for handling conference connection thereof
CN113157162A (en) Method, apparatus, medium and program product for revoking session messages
CN112769676B (en) Method and equipment for providing information in group

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant