CN111897620A - Interaction method and device and electronic equipment - Google Patents

Interaction method and device and electronic equipment Download PDF

Info

Publication number
CN111897620A
CN111897620A CN202010846986.XA CN202010846986A CN111897620A CN 111897620 A CN111897620 A CN 111897620A CN 202010846986 A CN202010846986 A CN 202010846986A CN 111897620 A CN111897620 A CN 111897620A
Authority
CN
China
Prior art keywords
information
target page
server
identification information
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010846986.XA
Other languages
Chinese (zh)
Inventor
彭源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010846986.XA priority Critical patent/CN111897620A/en
Publication of CN111897620A publication Critical patent/CN111897620A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

According to the interaction method, the interaction device and the electronic equipment, after the notification center of the terminal equipment receives the extended URL, the extended URL can be directly opened through a browser of the terminal equipment, then a target page acquisition request can be generated, and the target page acquisition request can be sent to a server. And after receiving the target page acquisition request, the server can directly determine the page to be returned according to the identity information, that is, in the interaction process, if the identity information is not expired or invalid, the user can directly open the extended URL through the browser to obtain the target page. Therefore, the interaction process is simplified, and the secret-free login is realized.

Description

Interaction method and device and electronic equipment
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to an interaction method, an interaction device, and an electronic device.
Background
With the development of science and technology, many operations (payment, queuing and the like) of people can be completed on terminal equipment without the need of a user to carry out treatment on site.
Such as: when a company needs to open a lecture, the information and the entry can be published on the network platform, then participants can fill own identity information in the entry and submit to the platform for auditing, and after the auditing is passed, the network platform can disclose partial information of the user so as to prompt the user to participate in the lecture.
Disclosure of Invention
This disclosure is provided to introduce concepts in a simplified form that are further described below in the detailed description. This disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The embodiment of the disclosure provides an interaction method, an interaction device and electronic equipment, which can receive a user of a URL, and the user can directly log in after clicking the URL without manually inputting a password, so that an interaction process is simplified.
In a first aspect, an embodiment of the present disclosure provides an interaction method, including: generating a target page acquisition request in response to detecting a trigger operation for the extended URL in the notification information; sending the target page acquisition request to a server, wherein the server determines a page to be returned based on the identity information in the target page acquisition request, and the extended URL is generated in the following manner: the server obtains identity identification information and generates an extended URL comprising the identity identification information and a target page resource locator.
In a second aspect, an embodiment of the present disclosure provides an interaction apparatus, including: a generation unit configured to generate a target page acquisition request in response to detection of a trigger operation for the extended URL in the notification information; a sending unit, configured to send the target page obtaining request to a server, where the server determines a page to be returned based on identity information in the target page obtaining request, where,
the extended URL is generated as follows: the server obtains identity identification information and generates an extended URL comprising the identity identification information and a target page resource locator, wherein the identity identification information comprises: the above-mentioned identification information.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including: one or more processors; a storage device, configured to store one or more programs, which when executed by the one or more processors, cause the one or more processors to implement the interaction method as described in the first aspect.
In a fourth aspect, the disclosed embodiments provide a computer-readable medium, on which a computer program is stored, which when executed by a processor, implements the steps of the interaction method as described above in the first aspect.
According to the interaction method, the interaction device and the electronic equipment provided by the embodiment of the disclosure, after the notification center of the terminal equipment receives the extended URL, the extended URL can be directly opened through a browser of the terminal equipment, then a target page acquisition request can be generated, and the target page acquisition request can be sent to a server. And after receiving the target page acquisition request, the server can directly determine the page to be returned according to the identity information, that is, in the interaction process, if the identity information is not expired or invalid, the user can directly open the extended URL through the browser to obtain the target page. Therefore, the interaction process is simplified, and the secret-free login is realized.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
FIG. 1 is a flow diagram of one embodiment of an interaction method according to the present disclosure;
FIG. 2 is an interaction diagram according to one embodiment of the disclosed interaction method;
FIG. 3A is a schematic diagram of an embodiment of an interaction method according to the present disclosure;
FIG. 3B is a schematic diagram of an embodiment of an interaction method according to the present disclosure;
FIG. 4 is a schematic block diagram of one embodiment of an interaction device according to the present disclosure;
FIG. 5 is an exemplary system architecture to which the interaction method of one embodiment of the present disclosure may be applied;
fig. 6 is a schematic diagram of a basic structure of an electronic device provided according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Referring to fig. 1, a flow diagram of one embodiment of an interaction method according to the present disclosure is shown. The interaction method can be applied to terminal equipment. The interaction method as shown in fig. 1 includes the following steps:
step 101, in response to detecting a trigger operation for the extended URL in the notification information, generating a target page acquisition request.
In some embodiments, the notification information may be understood as 'mail', 'short message', and the like, and the extended URL may include: identity identification information, target page resource locator, and the like. And the extended URL in the notification information can be understood as: and notifying a link in the information, wherein the user can perform trigger operation (click operation, double-click operation, long-press operation and the like) on the link, so that a browser of the terminal equipment can open the URL and generate a target page acquisition request.
Here, since the extended URL includes the identification information, the generated target page acquisition request may carry the identification information.
In some embodiments, the identification information may be any of: contact details of the user, mailbox address, etc.
In some embodiments, when the browser opens the URL, the identification information in the URL may be extracted; and then, a target page acquisition request can be generated according to the target page resource locator, so that the target page acquisition request carries the identity identification information.
Step 102, sending a target page acquisition request to a server.
Here, the server determines the returned page based on the identification information in the target page acquisition request.
Here, the extended URL is generated by: the server obtains the identity information and generates an extended URL including the identity information and the target page resource locator.
In some embodiments, since the extended URL is generated based on the identification information and the target page resource locator, the server of the terminal device may extract the identification information from the extended URL, and at the same time, due to the presence of the target page resource locator, the server may generate an access request (i.e., a target page access request) for the target page.
In some embodiments, after the browser in the terminal device generates the target page obtaining request, the target page obtaining request may be sent to the server (which may be understood as requesting the server to return the target page). Here, the target page may be set according to an actual application scenario.
In some embodiments, when the identity identifying information satisfies the condition, it may be the target page that is returned, and when the identity identifying information has expired or been invalid, it may be the identity information verification interface that is returned. That is, the server determines whether to return to the user target page according to the received identity information.
In some examples, the server is configured to generate a URL, and the generated URL may determine the terminal device to send based on the identification information. That is, it can be understood that the extended URL is transmitted for a terminal device of a specific user.
In order to facilitate understanding of the technical solutions provided by the present disclosure, the following practical application scenarios are exemplified:
for example: if 100 candidates post resumes to company a, if company a considers 30 of the candidates to meet the requirements, the 30 candidates may be notified to participate in the company's lecture. In order to make the 30 candidates know their seats before participating in the lecture, a seat selection interface or a position display map may be displayed in advance to the 30 candidates. At this time, the server of company a may obtain the contact information (for example, a communication number, a mailbox, etc.) of the 30 candidates from the resume of the 30 candidates, may generate 30 extended URLs based on the identification information (the communication number, the mailbox, if delivered on the website of company a, may also include a login account, a password, etc.) of the website of company a and the propaganda webpage information (a seating interface or a location display map) of the 30 candidates, and according to the contact information of the 30 candidates, send the generated 30 extended URLs to the terminal devices corresponding to the 30 candidates respectively. And when the terminal equipment of the candidate receives the extended URL, the candidate can be represented to possibly meet the conditions of the company A, so that the candidate can open the URL through the terminal equipment and know the seats or the flow and the like of the announced meeting of the company A.
It can be seen that: of the 100 candidates, the terminal devices corresponding to 70 candidates do not receive the extended URL, that is, only the terminal devices corresponding to some specific candidates can receive the extended URL. And the terminal equipment receiving the extended URL can directly open the URL through the browser and then can request the server to return to the target page.
It should be noted here that, when each extended URL is generated, the target page used may be different; for example: the destination page corresponding to user a is a seating interface and the destination page corresponding to user B may be a location presentation, i.e., it is possible that some users may be seated while some users have been assigned seats. It can be understood that: the target page may be different for different ids.
In the prior art, if company a considers that 30 candidates among them meet the requirements, it usually sends an announcement on its own platform and can display a login link, so as to inform the candidates meeting the requirements that the login link can be opened by the terminal device, then the terminal device can generate a login request according to the login link, after receiving the login request, the server can return a login page to the terminal device, and the candidates can fill their identity information in the login page and send the login information to the server by the terminal device again; and when detecting that the identity information of the candidate meets the requirement, the server returns some information (a seat selection interface or a position display map) about the company A announcements to the candidate. That is, in the prior art, although the server determines a specific candidate, the candidate needs to input its own identity information during the interaction process.
In the embodiment of the present disclosure, after the notification center of the terminal device receives the extended URL, the extended URL may be opened directly through the browser of the terminal device, and then the target page acquisition request may be generated and may be sent to the server. And after receiving the target page acquisition request, the server can directly determine the page to be returned according to the identity information, that is, in the interaction process, if the identity information is not expired or invalid, the user can directly open the extended URL through the browser to obtain the target page. Therefore, the interaction process is simplified, and the secret-free login is realized.
For further understanding of the interaction process between the server and the terminal device, please refer to fig. 2; fig. 2 is an interaction diagram of a server and a terminal, and it can be seen that the server may send an extended URL to a terminal device, and the terminal device may send a target page request to the server, and both the target page request and the extended URL may carry identity information. The server judges whether the identity information in the target page request is the same as the identity information in the extended URL or not, if so, the target page can be returned, and if not, the login page can be returned.
In some embodiments, the determining, by the server, the page to be returned based on the identification information in the target page obtaining request may include:
the server searches whether identification information consistent with the identity identification information exists in a pre-stored identification information table or not based on the identity identification information in the identity identification information; returning the target page in response to determining that the page exists; in response to determining that there is no, a login page is returned.
Here, the identification information in the pre-stored identification information table is used to generate an extended URL in combination with the target page resource locator.
For convenience of understanding, referring to fig. 3A and 3B, when the server verifies that the identification information consistent with the identification information exists in the pre-stored identification information table, the server may return to the page (target page) shown in fig. 3A, and the user may obtain the information (e.g., seat selection information) to be obtained according to the target page shown in fig. 3A. If the server verifies that the pre-stored identification information table does not have identification information consistent with the identity identification information, the page (login page) shown in fig. 3B can be returned, the user can input the identity identification information in the page shown in fig. 3B and send the identity identification information to the server to verify the identity identification information again, if the verification is passed, the target page can be returned, that is, the page shown in fig. 3A can be displayed at this time.
In some embodiments, since each extended URL has a designated sending object, the identification information table may store therein the identification information of these sending objects. For example: after a certain extended URL is generated, according to the identification information (contact number, mailbox, etc.), the terminal device to which the extended URL needs to be sent can be determined, and the identification information can be stored in a pre-stored identification information table.
In some embodiments, to avoid leakage of user information, a valid time may be set for each extended URL. If the user opens the extended URL through the browser after the user has exceeded the validity time, it may be characterized that there is a greater risk of leakage of the extended URL.
Therefore, in some embodiments, in order to reduce the risk of leakage of the extended URL, the recording time of each piece of identification information in the pre-stored identification information table is deleted from the pre-stored identification information table after the time interval between the recording time of the piece of identification information and the current time exceeds a preset time threshold.
That is, the server may monitor the recording time of each piece of identification information in the pre-stored identification information table, and after the time interval between the recording time of a certain piece of identification information and the current time exceeds the preset time threshold, it may be characterized that the extended URL generated based on the identification information has been sent for a long time, and therefore, the extended URL may have a risk of being leaked at this time, and then the identification information may be deleted from the pre-stored identification information table.
In some embodiments, after the user clicks the extended URL, if the server determines that the identifier information in the identifier information exists in the pre-stored identifier information table, the recording time of the pre-stored identifier information table for the identifier information may be updated to the time when the target page acquisition request is received.
That is, it can be understood that: if the user clicks the extended URL within the preset time period, the valid time of the extended URL may be increased again. For example: after the terminal device corresponding to the user B receives the extended URL and the user B opens the extended URL through the browser within the preset time, the identity information of the user B can be found in the pre-stored identity information table. At this time, the recording time of the id information of the user B in the pre-stored id information table may be updated to the time of generating the page obtaining request by extending the URL. That is, the timeliness of the extended URL is extended, so that user B can enter the target page according to the extended URL next time.
In some embodiments, when the pre-stored identification information table has the above-mentioned identification information, the user terminal may receive a target page returned by the server in response to the target page request, and may display the target page.
In some examples, when the pre-stored identification information table does not contain the identification information, the user terminal may receive a login page returned by the server in response to the target page acquisition request, and may display the login page.
Here, the user may input the identification information on the login page, and may send the identification information to the server, and after the server passes the verification, the target page of the user terminal may be returned. Meanwhile, the identity identification information input by the user at the moment can be stored in a pre-stored identification information table.
In some optional embodiments, after the server stores the identification information input by the user in the pre-stored identification information table, an extended URL may be generated based on the identification information, and the extended URL may be sent to the corresponding user terminal.
In some embodiments, when the server generates the extended URL based on the identification information and the target page resource locator, the identification information may be encrypted first to generate a ciphertext. And then can keep the cipher text that every identification information corresponds in prestoring the identification information table, thus can reduce the holding capacity of the data, at the same time, produce the cipher text, produce the extended URL through cipher text and goal page resource locator and can also increase the security when the data transmission. That is, when the terminal device sends a request to the server, the carried identification information is a ciphertext.
In some embodiments, the method for encrypting the identity is not limited herein, and only needs to be selected reasonably according to actual situations. For example, MD5 Encryption (Message Digest MD5, Message Digest Algorithm), AES Encryption (Advanced Encryption Standard), or the like may be employed.
In some embodiments, after the server determines that a login can be performed according to the identification information, a login identifier may be returned to the terminal device, and the terminal device may store the login identifier and may carry the login identifier when subsequently sending a request to the server. The type of the login identification can be reasonably set according to the identity information. For example: when the identification information only includes: when the contact number, the mailbox, and other relatively public information are provided, the token may be obtained after the identity information is encrypted (at this time, the token may be understood as a login identifier). If the identity information includes some private information such as a password, the cookie may be obtained after the identity information is encrypted, so that the cookie may be carried in the target page acquisition request. Of course, in the specific embodiment, there are many types of login identifiers, and for brevity of the description, detailed description is not repeated herein.
In some embodiments, the identification information may include: the terminal device information and the identity information, the user terminal may further: and receiving prompt information returned by the server.
Here, the prompt information is generated by: and the server generates prompt information when determining that the terminal equipment information in the identity identification information is different from the equipment corresponding to the pre-stored identity identification information.
In some embodiments, the terminal device may further receive prompt information returned by the server.
When the server determines that the terminal device information in the target page request is different from the device information corresponding to the pre-stored identification information, prompt information is generated.
In some embodiments, the browser may further obtain device information (a model, an ip address, and the like of the current terminal device) during the process of generating the target page obtaining request based on the extended URL; and the device information and the identity information can be merged into the target page request and sent to the server together. If the identity identification information exists in the pre-stored identification table, returning to a target page, and searching whether equipment information corresponding to the identity identification information is pre-stored, if not, representing that the terminal equipment opens the extended URL through a browser for the first time; and the identity information and the equipment information can be correspondingly stored. If so, it may be characterized that the extended URL is opened again or multiple times by the terminal device through the browser. At this time, whether the stored device information is the same as the device information carried at this time can be judged, and if the stored device information is the same as the device information carried at this time, the expansion URL can be represented to be opened for many times and to be the same device, that is, the expansion URL can be represented not to be leaked; if the stored device information is different from the device information carried at this time, the device which opens the extended URL at this time can be represented to be different from the device which opens the URL at the last time or for multiple times, so that the URL can be represented to have a risk of being leaked, and the server can send prompt information to the terminal device.
In some embodiments, the reminder information may include: sending a control, if the user finds that the device which opens the URL for the last time or a plurality of times is not the device of the user, namely, if the user finds that the previous opening operation or a plurality of times aiming at the URL is not triggered by the user; the trigger operation can be executed on the sending control in the prompt message, and then the warning message can be sent to the server.
Here, the alert information is used to indicate that the extended URL is at risk of being spoofed.
In some embodiments, after the server receives the warning information, the server may contact a corresponding worker to process the warning information in time.
In some embodiments, the prompt message may also include: the communication mode of the staff, and then the user can directly contact and communicate with the staff.
With further reference to fig. 4, as an implementation of the method shown in the above-mentioned figures, the present disclosure provides an embodiment of an interaction apparatus, which corresponds to the embodiment of the interaction method shown in fig. 1, and which can be applied in various electronic devices.
As shown in fig. 4, the interaction device of the present embodiment includes: a generating unit 401, configured to generate a target page obtaining request in response to detecting a trigger operation for the extended URL in the notification information; a sending unit 402, configured to send the target page obtaining request to a server, where the server determines a page to be returned based on identity information in the target page obtaining request, where the extended URL is generated in the following manner: the server obtains identity identification information and generates an extended URL comprising the identity identification information and a target page resource locator, wherein the identity identification information comprises: the above-mentioned identification information.
In some embodiments, the determining, by the server, the returned page based on the identification information in the target page obtaining request includes: the server searches whether identification information consistent with the identification information exists in a pre-stored identification information table or not based on the identification information in the identification information; returning the target page in response to determining that the target page exists; in response to determining that there is no, a login page is returned.
In some embodiments, the recording time of each identification information in the pre-stored identification information table is deleted from the pre-stored identification information table after the time interval between the recording time of the identification information and the current time exceeds a preset time threshold.
In some embodiments, the server updates the recording time of the id information in the pre-stored id information table to the time when the target page fetch request is received in response to determining that the id information exists.
In some embodiments, the above interaction means comprises: a receiving unit 403, configured to display the target page in response to receiving the target page returned by the server in response to the target page request.
In some embodiments, the receiving unit 403 is further specifically configured to: and displaying the login page in response to receiving the login page returned by the server aiming at the target page request.
In some embodiments, the receiving unit 403 is further specifically configured to: receiving prompt information returned by the server, wherein the prompt information is generated in the following way: and the server determines that the terminal equipment information in the target page request is different from the equipment information corresponding to the pre-stored identity identification information, and generates the prompt information.
In some embodiments, the prompt message includes: sending control, sending unit 402 is further specifically configured to: and generating and sending warning information to the server in response to the detection of the trigger operation for the sending control, wherein the warning information is used for indicating that the extended URL has the risk of being falsely used.
Referring to fig. 5, fig. 5 illustrates an exemplary system architecture to which the interaction method of one embodiment of the present disclosure may be applied.
As shown in fig. 5, the system architecture may include terminal devices 501, 502, 503, a network 504, and a server 505. The network 504 may be the medium used to provide communication links between the terminal devices 501, 502, 503 and the server 505. Network 504 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The terminal devices 501, 502, 503 may interact with a server 505 over a network 504 to receive or send messages or the like. The terminal devices 501, 502, 503 may have various client applications installed thereon, such as a web browser application, a search-type application, and a news-information-type application. The client application in the terminal device 501, 502, 503 may receive the instruction of the user, and complete the corresponding function according to the instruction of the user, for example, add the corresponding information in the information according to the instruction of the user.
The terminal devices 501, 502, 503 may be hardware or software. When the terminal devices 501, 502, 503 are hardware, they may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer), MP4 players (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like. When the terminal devices 501, 502, and 503 are software, they can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., software or software modules used to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 505 may be a server providing various services, for example, receiving an information acquisition request sent by the terminal device 501, 502, 503, and acquiring the presentation information corresponding to the information acquisition request in various ways according to the information acquisition request. And the relevant data of the presentation information is sent to the terminal equipment 501, 502, 503.
It should be noted that the information processing method provided by the embodiment of the present disclosure may be executed by a terminal device, and accordingly, the interaction device may be disposed in the terminal device 501, 502, 503. In addition, the information processing method provided by the embodiment of the present disclosure may also be executed by the server 505, and accordingly, an information processing apparatus may be provided in the server 505.
It should be understood that the number of terminal devices, networks, and servers in fig. 5 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to fig. 6, shown is a schematic diagram of an electronic device (e.g., a terminal device or a server of fig. 5) suitable for use in implementing embodiments of the present disclosure. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM602, and the RAM605 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device to communicate with other devices wirelessly or by wire to exchange data. While fig. 6 illustrates an electronic device having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText transfer protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: generating a target page acquisition request in response to detecting a trigger operation for the extended URL in the notification information; sending the target page acquisition request to a server, wherein the server determines a page to be returned based on the identity information in the target page acquisition request, and the extended URL is generated in the following manner: the server obtains identity identification information and generates an extended URL comprising the identity identification information and a target page resource locator, wherein the identity identification information comprises: the above-mentioned identification information.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation on the unit itself, for example, the generation unit 201 may also be described as a "unit that generates a target page acquisition request".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (11)

1. An interaction method, comprising:
generating a target page acquisition request in response to detecting a trigger operation for the extended URL in the notification information;
sending the target page acquisition request to a server, wherein the server determines a page to be returned based on the identification information in the target page acquisition request, wherein,
the extended URL is generated by: the server obtains identity information and generates an extended URL comprising the identity information and a target page resource locator.
2. The method of claim 1, wherein the server determines the page to be returned based on the identification information in the target page obtaining request, comprising:
the server searches whether identification information consistent with the identity identification information exists in a pre-stored identification information table or not based on the identity identification information;
returning the target page in response to determining that there is;
in response to determining that there is no, a login page is returned.
3. The method according to claim 2, wherein the recording time of each identification information in the pre-stored identification information table is deleted from the pre-stored identification information table after the time interval between the recording time of the identification information and the current time exceeds a preset time threshold.
4. The method of claim 3, wherein the server updates the time of recording the identity information in the table of pre-stored identity information to the time of receiving the target page get request in response to determining that the identity information exists.
5. The method of claim 1, further comprising:
and displaying the target page in response to receiving the target page returned by the server aiming at the target page request.
6. The method of claim 1, further comprising:
and displaying the login page in response to receiving the login page returned by the server aiming at the target page request.
7. The method of claim 1, further comprising:
receiving prompt information returned by the server, wherein the prompt information is generated in the following way:
and the server determines that the terminal equipment information in the target page request is different from the equipment information corresponding to the pre-stored identity identification information, and generates the prompt information.
8. The method of claim 7, wherein the prompting message comprises: a send control, and the method further comprises:
and generating and sending warning information to the server in response to the detection of the trigger operation aiming at the sending control, wherein the warning information is used for indicating that the extended URL has the risk of being falsely used.
9. An interactive apparatus, comprising:
a generation unit configured to generate a target page acquisition request in response to detection of a trigger operation for the extended URL in the notification information;
a sending unit, configured to send the target page obtaining request to a server, where the server determines a returned page based on identity information in the target page obtaining request, where,
the extended URL is generated by: the server obtains identity information and generates an extended URL comprising the identity information and a target page resource locator.
10. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
11. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-8.
CN202010846986.XA 2020-08-20 2020-08-20 Interaction method and device and electronic equipment Pending CN111897620A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010846986.XA CN111897620A (en) 2020-08-20 2020-08-20 Interaction method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010846986.XA CN111897620A (en) 2020-08-20 2020-08-20 Interaction method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN111897620A true CN111897620A (en) 2020-11-06

Family

ID=73230532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010846986.XA Pending CN111897620A (en) 2020-08-20 2020-08-20 Interaction method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111897620A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112905281A (en) * 2021-02-08 2021-06-04 北京字跳网络技术有限公司 View display method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103944944A (en) * 2013-01-23 2014-07-23 腾讯科技(深圳)有限公司 Webpage link sharing method and system, and electronic device
CN104967644A (en) * 2014-09-26 2015-10-07 腾讯科技(深圳)有限公司 Message push method, apparatus and system
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN109447400A (en) * 2018-09-18 2019-03-08 平安科技(深圳)有限公司 Task data management method, device, computer equipment and storage medium
CN110189462A (en) * 2019-05-28 2019-08-30 合肥诺优信息科技有限公司 A kind of electronic voting method
CN110929183A (en) * 2018-08-31 2020-03-27 阿里巴巴集团控股有限公司 Data processing method, device and machine readable medium
CN111554411A (en) * 2020-04-29 2020-08-18 重庆生命新云网络科技有限公司 First-aid remote consultation system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103944944A (en) * 2013-01-23 2014-07-23 腾讯科技(深圳)有限公司 Webpage link sharing method and system, and electronic device
CN104967644A (en) * 2014-09-26 2015-10-07 腾讯科技(深圳)有限公司 Message push method, apparatus and system
CN109089264A (en) * 2018-08-02 2018-12-25 江苏满运软件科技有限公司 A kind of mobile terminal exempts from the method and system of close login
CN110929183A (en) * 2018-08-31 2020-03-27 阿里巴巴集团控股有限公司 Data processing method, device and machine readable medium
CN109447400A (en) * 2018-09-18 2019-03-08 平安科技(深圳)有限公司 Task data management method, device, computer equipment and storage medium
CN110189462A (en) * 2019-05-28 2019-08-30 合肥诺优信息科技有限公司 A kind of electronic voting method
CN111554411A (en) * 2020-04-29 2020-08-18 重庆生命新云网络科技有限公司 First-aid remote consultation system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112905281A (en) * 2021-02-08 2021-06-04 北京字跳网络技术有限公司 View display method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111786876B (en) Information processing method, device, electronic equipment and computer readable medium
CN112311841B (en) Information pushing method and device, electronic equipment and computer readable medium
US11044222B2 (en) Automated connection of electronic messaging and social networking services method and apparatus
CN112866385B (en) Interface calling method and device, electronic equipment and storage medium
CN112487451B (en) Display method and device and electronic equipment
CN112395509A (en) Information display method, information providing method, apparatus, and computer-readable medium
CN112312222A (en) Video sending method and device and electronic equipment
CN111857858A (en) Method and apparatus for processing information
CN111447191B (en) Information interaction method and device and electronic equipment
CN110674481B (en) Account registration method, device, equipment and storage medium of application program
CN111614759A (en) Resource sharing method and device, electronic equipment and computer readable medium
CN111597486A (en) Information processing method and device and electronic equipment
CN110855655B (en) Information verification method, device, equipment and storage medium
CN112311750B (en) Interaction method and device and electronic equipment
CN110619101B (en) Method and apparatus for processing information
CN112367241A (en) Message generation and message transmission method, device, equipment and computer readable medium
CN111798251A (en) Verification method and device of house source data and electronic equipment
CN111897620A (en) Interaction method and device and electronic equipment
CN113079085B (en) Business service interaction method, business service interaction device, business service interaction equipment and storage medium
CN115563134A (en) Interaction method, interaction device, electronic equipment and computer readable medium
CN110781523B (en) Method and apparatus for processing information
CN115022106A (en) Group information processing method, device, equipment and medium
CN113890772A (en) Information processing method and device and electronic equipment
CN112163237A (en) Data processing method and device and electronic equipment
CN111752625A (en) Method and device for interface mock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination