CN117640833A - Telephone calling method, device, computer equipment and storage medium - Google Patents

Telephone calling method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN117640833A
CN117640833A CN202210957073.4A CN202210957073A CN117640833A CN 117640833 A CN117640833 A CN 117640833A CN 202210957073 A CN202210957073 A CN 202210957073A CN 117640833 A CN117640833 A CN 117640833A
Authority
CN
China
Prior art keywords
group
telephone
public fee
public
belongs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210957073.4A
Other languages
Chinese (zh)
Inventor
黄铁鸣
赵岩
舒展
李斌
李磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202210957073.4A priority Critical patent/CN117640833A/en
Publication of CN117640833A publication Critical patent/CN117640833A/en
Pending legal-status Critical Current

Links

Landscapes

  • Meter Arrangements (AREA)

Abstract

The present application relates to a telephone call method, apparatus, computer device, storage medium and computer program product. The method comprises the following steps: and receiving a call request initiated by using the public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs. When the public fee telephone sharing range corresponding to the collective to which the called party identifier belongs is verified to comprise the collective to which the calling party identifier belongs, the public fee call between the calling party identifier and the called party identifier is established, and the public fee telephone resource occupied by the public fee call is deducted from the public fee telephone resource of the collective to which the called party identifier belongs after the call is ended. Thus, the communication efficiency between different groups is improved.

Description

Telephone calling method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a telephone call method, apparatus, computer device, storage medium, and computer program product.
Background
With the development of communication technology, in order to facilitate the work communication between users, the instant messaging application integrates the application of public fee telephone, which can support free use between staff in enterprises, and the corresponding call cost is borne by the enterprises.
However, the current public fee telephone is limited to be used in enterprises, that is, after the enterprises purchase the public fee telephone line, the public fee telephone can be used for calling among the employees in the enterprises, if the employees need to call with the employees in the external enterprises, the external enterprises also need to purchase the public fee telephone line, otherwise, the enterprises cannot use the public fee telephone for calling, and the public fee telephone cannot be initiated with the employees in the external enterprises at any time and any place, so that the communication efficiency among the enterprises is reduced.
Disclosure of Invention
In view of the foregoing, there is a need for a telephone call method, apparatus, computer device, computer readable storage medium, and computer program product that can improve the efficiency of communication between cross-group employees.
The application provides a telephone calling method. The method comprises the following steps:
receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs;
when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, a public fee call between the calling party identifier and the called party identifier is established, and after the call is ended, the public fee telephone resources occupied by the public fee call are deducted from the public fee telephone resources of the group to which the called party identifier belongs.
The application also provides a telephone calling device. The device comprises:
the receiving module is used for receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs;
and the establishing module is used for establishing the public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducting the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
In one embodiment, the establishing module is further configured to, when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs includes the group to which the called party identifier belongs, check the public fee telephone sharing range corresponding to the group to which the called party identifier belongs, and if it is checked that the shared party in the public fee telephone sharing range includes the group to which the calling party belongs and the calling party identifier, establish a public fee call between the calling party identifier and the called party identifier.
In one embodiment, the establishing module is further configured to determine, according to the calling party identifier and the called party identifier, a group to which the calling party identifier belongs and a group to which the called party identifier belongs, respectively; and acquiring a public fee telephone sharing range corresponding to the collective group to which the calling party identification belongs, and inquiring whether the sharing party in the public fee telephone sharing range comprises the collective group to which the called party identification belongs.
In one embodiment, the establishing module is further configured to query a value of a public fee telephone resource to which the called party identifier belongs; and when the numerical value is larger than a preset threshold value, executing the step of establishing the public fee call between the calling party identifier and the called party identifier.
In one embodiment, the establishing module is further configured to establish a public fee call between the caller identifier and the callee identifier when the sharing party in the public fee telephone sharing range corresponding to the caller identifier does not include the callee identifier, or when it is verified that the shared party in the public fee telephone sharing range corresponding to the callee identifier does not include the caller identifier, or when the value of the public fee telephone resource of the callee identifier is less than or equal to a preset threshold, and deduct the public fee telephone resource occupied by the public fee call from the public fee telephone resource of the caller identifier.
In one embodiment, the establishing module is further configured to query a value of a public fee telephone resource to which the caller id belongs; executing the step of establishing a public fee call between the calling party identifier and the called party identifier when the numerical value is greater than a preset threshold value; and rejecting the call request when the numerical value is smaller than or equal to a preset threshold value.
In one embodiment, the telephone calling device further comprises a first sharing module for receiving a sharing request from a first group for sharing a public fee telephone upstream and downstream of the target; analyzing the shared party from the sharing request; adding the public fee telephone in a sharing application upstream and downstream of the target when the shared party is verified to originate from a second collective and the second collective belongs to the upstream and downstream of the target; and adding the second group as a shared party in the public fee telephone sharing range corresponding to the first group, and adding the first group as a shared party in the public fee telephone sharing range corresponding to the second group so as to share the public fee telephone resources of the first group to the second group.
In one embodiment, the telephone calling device further comprises a first removal module, wherein the first removal module receives a cancel request of the target upstream and downstream shared public fee telephone from a first collective or receives a reject request of the target upstream and downstream shared public fee telephone from a second collective; parsing the target upstream and downstream from the cancel request or reject request; removing the public fee telephone application from the sharing application at the upstream and downstream of the target; in the case where a second group is included in the upstream and downstream of the target, the second group is removed from the shared party of the shared range of the public fee telephone corresponding to the first group, and the first group is removed from the shared party of the shared range of the public fee telephone corresponding to the second group.
In one embodiment, the receiving module is configured to receive a call request initiated using a public fee phone from a second group, where a called party of the call request identifies a call originating upstream and downstream from the target and belonging to the first group.
The application also provides a computer device. The computer device comprises a memory storing a computer program and a processor which when executing the computer program performs the steps of:
Receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs;
when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, a public fee call between the calling party identifier and the called party identifier is established, and after the call is ended, the public fee telephone resources occupied by the public fee call are deducted from the public fee telephone resources of the group to which the called party identifier belongs.
The present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs;
when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, a public fee call between the calling party identifier and the called party identifier is established, and after the call is ended, the public fee telephone resources occupied by the public fee call are deducted from the public fee telephone resources of the group to which the called party identifier belongs.
The present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of:
receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs;
when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, a public fee call between the calling party identifier and the called party identifier is established, and after the call is ended, the public fee telephone resources occupied by the public fee call are deducted from the public fee telephone resources of the group to which the called party identifier belongs.
According to the telephone calling method, the call request initiated by using the public fee telephone is received, so that the group to which the calling party identifier belongs and the group to which the called party identifier belongs, which are derived from different groups, can be known in time. When the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, the public fee telephone between the calling party identifier and the called party identifier can be established on the basis that the group to which the calling party identifier belongs does not need to additionally configure the public fee telephone and the public fee telephone resource, the group to which the called party identifier belongs is directly taken as a deduction object of the public fee call after the call is received, and the public fee telephone resource occupied by the public fee telephone is deducted from the public fee telephone resource of the group to which the called party identifier belongs. Therefore, under the condition that the collective without the public charge telephone resource has the use authority of the public charge telephone resource of the collective with the telephone resource, the collective without the public charge telephone resource can initiate the public charge telephone call to the collective with the telephone resource at any time and quickly, thereby greatly improving the communication efficiency between different collective.
The application provides a telephone calling method. The method comprises the following steps:
responding to the triggering operation of calling by using the public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier; the group to which the calling party identifier belongs is different from the group to which the called party identifier belongs;
and sending the call request to a server, so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
The application provides a telephone calling device. The device comprises:
the generation module is used for responding to the triggering operation of calling initiated by using the public fee telephone and generating a call request carrying the calling party identifier and the called party identifier; the group to which the calling party identifier belongs is different from the group to which the called party identifier belongs;
and the sending module is used for sending the call request to the server so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
In one embodiment, the generating module is further configured to display an upstream address book and a downstream address book in an instant messaging application logged in with a caller id; and responding to a triggering operation of calling the contact person in the upstream and downstream address books by using a public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier by using the contact person.
In one embodiment, the telephone calling device further comprises a second sharing module, wherein the second sharing module is used for displaying upstream and downstream in an instant messaging application logged in by an account belonging to a first group; responding to the triggering operation of the second collective shared public fee telephone in the upstream and downstream of the target, and sending a sharing request of the second collective shared public fee telephone in the upstream and downstream of the target; and newly adding the public fee telephone application in the sharing application list at the upstream and downstream of the target so as to share the public fee telephone resources of the first group to the second group.
In one embodiment, the telephone calling device further comprises a second removing module, wherein the second removing module is used for responding to a trigger operation of cancelling the shared public fee telephone of a second group in the upstream and downstream of the target and sending a cancelling request of the shared public fee telephone of the second group in the upstream and downstream of the target; and removing the public fee telephone application from the shared application list at the upstream and downstream of the target to cancel sharing of the public fee telephone resources of the first group to the second group.
The application also provides a computer device. The computer device comprises a memory storing a computer program and a processor which when executing the computer program performs the steps of:
responding to the triggering operation of calling by using the public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier; the group to which the calling party identifier belongs is different from the group to which the called party identifier belongs;
and sending the call request to a server, so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
The present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
responding to the triggering operation of calling by using the public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier; the group to which the calling party identifier belongs is different from the group to which the called party identifier belongs;
And sending the call request to a server, so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
The present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of:
responding to the triggering operation of calling by using the public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier; the group to which the calling party identifier belongs is different from the group to which the called party identifier belongs;
and sending the call request to a server, so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
According to the telephone calling method, the call request carrying the calling party identifier and the called party identifier is automatically generated by responding to the triggering operation of calling by using the public fee telephone, and the call request is sent to the server, so that the server can check whether the public fee telephone of the group to which the called party identifier belongs is shared to the group to which the calling party identifier belongs through the received call request. Thus, after the condition that the group to which the called party identifier belongs shares the public fee telephone to the group to which the calling party identifier belongs is determined, the range of the public fee telephone resource of the group to which the called party identifier belongs is expanded from the group to which the called party identifier belongs to the group to which the calling party identifier belongs, and under the condition that the public fee telephone resource and the public fee telephone resource are not required to be additionally configured by the group to which the calling party identifier belongs, the resource deduction operation is completed through the public fee telephone resource of the group to which the called party identifier belongs, so that the telephone calling process between different groups is greatly simplified, the calling party can successfully initiate the public fee telephone of the called party from the external group at any time and rapidly, and the communication efficiency between the different groups is greatly improved.
Drawings
FIG. 1 is an application environment diagram of a telephone call method in one embodiment;
FIG. 2 is a flow diagram of a method of telephone calling in one embodiment;
FIG. 3 is a flow chart illustrating deduction of telephone resources of a public fee in one embodiment;
FIG. 4 is a flow diagram of sharing settings for a payphone in one embodiment;
FIG. 5 is a flow chart of a telephone call method according to another embodiment;
FIG. 6 is a schematic diagram of an interface of an address book in one embodiment;
FIG. 7 is a schematic diagram of an upstream and downstream contact interface in one embodiment;
FIG. 8 is a flow chart of a telephone call method in another embodiment;
FIG. 9 is a schematic diagram of an upstream and downstream setup page in one embodiment;
FIG. 10 is a flow chart of a telephone call method in another embodiment;
FIG. 11 is a block diagram of a telephone call apparatus in one embodiment;
fig. 12 is a block diagram showing the structure of a telephone calling device in another embodiment;
fig. 13 is an internal structural view of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In the related art, the time period of the toll phone is limited to the inside of a group, that is, after the application of the toll phone is set up in the group and the time period of the toll phone is purchased, the staff in the inside of the group can communicate with the staff of the same group as the calling party for free or communicate with the staff of an external group for free. Similarly, the outside corporate personnel may need to additionally set up the application of the premium phone and purchase time before initiating the premium phone call. That is, for two groups requiring frequent business exchanges, in order to ensure that any one group employee can make a free call to another group employee, the two groups each need to set up an application of a toll phone and purchase time periods, respectively. It is obvious that any collective employee is difficult to instantly initiate a toll call with an external collective employee at any time and any place, and the communication efficiency among the collective employees is greatly reduced.
According to the telephone call method provided by the embodiment of the invention, the calling party identification belonging group and the called party identification belonging group which are derived from different groups can be known in time by receiving the call request initiated by using the public fee telephone. When the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, the public fee telephone between the calling party identifier and the called party identifier can be established on the basis that the group to which the calling party identifier belongs does not need to additionally configure the public fee telephone and the public fee telephone resource, the group to which the called party identifier belongs is directly taken as a deduction object of the public fee call after the call is received, and the public fee telephone resource occupied by the public fee telephone is deducted from the public fee telephone resource of the group to which the called party identifier belongs. Therefore, under the condition that the collective without the public charge telephone resource has the use authority of the public charge telephone resource of the collective with the telephone resource, the collective without the public charge telephone resource can initiate the public charge telephone call to the collective with the telephone resource at any time and quickly, thereby greatly improving the communication efficiency between different collective.
The telephone calling method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on the cloud or other servers.
In one embodiment, the server 104 receives a call request initiated by the terminal 102 using a public toll phone, the call request carrying a caller identification and a called party identification that is called, the group to which the called party identification belongs being different from the group to which the caller identification belongs. When the server 104 verifies that the public fee telephone sharing range corresponding to the group to which the called party identifier belongs includes the group to which the calling party identifier belongs, the server 104 establishes a public fee call between the calling party identifier and the called party identifier, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, portable wearable devices, and the internet of things devices may be smart televisions, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In one embodiment, as shown in fig. 2, a telephone call method is provided, and the method is applied to the server 104 in fig. 1 for illustration, and includes the following steps:
step 202, receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs.
The public fee telephone is an application function or a business function, and can support free call making by users in the group, wherein the users in the group can purchase the call duration in a group, so that the free call made through the public fee telephone application can be called as the public fee telephone. In one embodiment, the toll phone is an application integrated with an instant messaging application. The instant messaging application is an instant messaging software, which is a software based on the internet and can realize online chat and communication. Instant messaging applications may integrate multiple business functions that may be used by users as tools for instant messaging applications to enable efficient communication and collaboration. For example, instant messaging applications may support making premium calls anywhere and anytime, initiating live video anywhere and anytime, initiating online conferences anywhere and anytime, and may also support upstream and downstream management. What is called upstream and downstream is a space formed by users or groups of certain or certain partners, the partners in the space may include users from a plurality of different external groups, and may also include users from an internal group, and the partners in the space may develop business collaboration based on the shared application, for example, when a public fee telephone is added to a certain upstream and downstream for the shared application, then the upstream and downstream contacts in the upstream and downstream may initiate free telephone calls based on the public fee telephone.
A group is an organization to which a user belongs, and typically includes a plurality of users, for example, the group may be an enterprise. The calling party is the party actively initiating a telephone call and the called party is the other party being called. The identifiers are used for distinguishing the users, each user has a unique corresponding identifier, the calling party identifier can be the user identifier of the calling party, the called party identifier is the user identifier of the called party, and the user identifier can be the mobile phone number, the email box and the like of the user. It will be appreciated that each identifier for characterizing a subscriber belongs to a respective group, and in the embodiment of the present application, the caller identifier and the callee identifier belong to different groups.
Specifically, the server receives a call request initiated by a public fee phone from a group to which the caller identification belongs, wherein the call request carries the caller identification and the callee identification. The group to which the called party identification belongs is a different group than the group to which the calling party identification belongs. For the calling party, the group to which the calling party identification belongs is an internal group, and the group to which the called party identification belongs is an external group. In one embodiment, the group to which the called party identification belongs and the group to which the calling party identification belongs may be two groups having an upstream-downstream relationship, in which case the group to which the calling party identification belongs is a group in the upstream-downstream relationship of the group to which the called party identification belongs.
In one embodiment, after the terminal generates the call request, the terminal may encrypt the generated call request to obtain an encrypted call request, the terminal sends the encrypted call request to the server, and the server decrypts the encrypted call request to obtain the call request generated by the terminal.
Step 204, when it is verified that the public fee telephone sharing range corresponding to the group to which the called party identifier belongs includes the group to which the calling party identifier belongs, a public fee call between the calling party identifier and the called party identifier is established, and after the call is ended, the public fee telephone resources occupied by the public fee call are deducted from the public fee telephone resources of the group to which the called party identifier belongs.
The public fee telephone resource is a resource required for dialing a public fee telephone, and can be, for example, the duration of the public fee telephone purchased by an enterprise, the service time of the public fee telephone, and the like. The public telephone shared scope is used for limiting the use authority of the public telephone resources, and the public telephone shared scope can comprise a set of shared objects of the public telephone resources, and the shared objects are objects with the use authority of the public telephone resources. The shared object may be a group or a user in a group. If the sharing object exists in the public telephone sharing range as a group, all users in the group have the use authority of public telephone resources. For example, in the case where the public fee telephone sharing range of group a includes group B, user C1 and user C2 in group C, it is indicated that the public fee telephone resources of group a are available for all users (i.e., all employees) in group B, and also for user C1 and user C2 in group C.
In one embodiment, when it is verified that the public fee telephone sharing range corresponding to the group to which the called party identifier belongs includes the group to which the calling party identifier belongs, establishing a public fee call between the calling party identifier and the called party identifier includes: when the sharing party in the public fee telephone sharing range corresponding to the collective to which the calling party identification belongs comprises the collective to which the called party identification belongs, checking the public fee telephone sharing range corresponding to the collective to which the called party identification belongs, and if the sharing party in the public fee telephone sharing range comprises the collective to which the calling party belongs and the calling party identification, establishing the public fee call between the calling party identification and the called party identification.
The public fee telephone sharing range of the group can comprise a sharing party and a shared party, and for each group, the sharing party in the public fee telephone sharing range is a group for sharing the public fee telephone resources to the group, namely the group is taken as the shared party, and the shared party in the public fee telephone sharing range is a group for sharing the public fee telephone resources to the group, namely the group is taken as the sharing party.
In an alternative embodiment, the sharers in the public telephone sharing scope are typically a collective, and the sharees typically comprise the collective and the users in the collective. For example, the administrator user of the group a shares the public-fee telephone resources of the group a to the users B1 and B2 in the group B by configuration, and the shared party in the public-fee telephone sharing range of the group a includes the users B1 and B2 in the group B, and the shared party in the public-fee telephone sharing range of the group B includes the group a. That is, by querying the sharing parties in the public telephone sharing range of group B, it is possible to determine which group shared public telephone resources to group B, and it is impossible to determine which users of group B are available for use.
Specifically, the server determines, based on the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs, whether the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs contains the group to which the called party identifier belongs. And when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identification belongs is verified to comprise the group to which the called party identification belongs, determining that the public fee telephone resource of the group to which the called party identification belongs is shared to the group to which the calling party identification belongs. The server determines, based on the public fee telephone sharing range to which the called party identification belongs, whether the shared party in the public fee telephone sharing range to which the called party identification belongs includes the group to which the calling party belongs and the calling party identification. If the shared party in the public charge telephone sharing range comprises a collective and calling party identification, the server sequentially sends a call request to the terminal where the calling party identification is and the terminal where the called party identification is, and under the condition that the terminal where the calling party identification is and the terminal where the called party identification is receives the call request, the public charge call between the calling party identification and the called party identification is established.
In this embodiment, by checking whether the sharing party in the public-fee telephone sharing range corresponding to the group to which the calling party identifier belongs has the group to which the called party identifier belongs, it is possible to determine whether there is a sharing relationship of public-fee telephone resources between the group to which the calling party identifier belongs and the group to which the called party identifier belongs, and determine whether the sharing relationship is shared by the group to which the called party identifier belongs. If so, the occupied time of the subsequent established public fee call can be ensured to be deducted from the public fee telephone resources of the group to which the called party identification belongs, and the additional configuration of the public fee telephone resources of the group to which the calling party identification belongs is not needed, so that the establishment flow of the public fee telephone is greatly simplified.
In one embodiment, the method further comprises: and respectively determining a group to which the calling party identifier belongs and a group to which the called party identifier belongs according to the calling party identifier and the called party identifier. And acquiring a public fee telephone sharing range corresponding to the group to which the calling party identifier belongs, and inquiring whether the sharing party in the public fee telephone sharing range comprises the group to which the called party identifier belongs.
Specifically, the server receives a call request sent by a terminal of a calling party, and respectively determines a group to which the calling party identifier belongs and a group to which the called party identifier belongs according to the calling party identifier and the called party identifier carried by the call request. The server effectively judges the calling party identification by judging whether the calling party identification is stored in the terminal of the calling party. And judging whether the call request is valid or not based on the valid judging result of the calling party identifier. And under the condition that the call request is an effective request, the server acquires a public fee telephone sharing range corresponding to the group to which the calling party identifier belongs and inquires whether the sharing party in the public fee telephone sharing range comprises the group to which the called party identifier belongs. When the sharing party in the public fee telephone sharing range is inquired to comprise the collective group to which the called party identification belongs, checking the public fee telephone sharing range corresponding to the collective group to which the called party identification belongs, and if the sharing party in the public fee telephone sharing range is checked to comprise the collective group to which the calling party belongs and the calling party identification, establishing the public fee call between the calling party identification and the called party identification.
In this embodiment, after the group to which the caller identifier belongs and the group to which the callee identifier belongs are rapidly determined according to the caller identifier and the callee identifier, the sharing party in the public fee telephone sharing range corresponding to the group to which the caller identifier belongs can be directly checked, so that whether the group to which the caller identifier belongs is qualified to use the public fee telephone resource of the group to which the callee identifier belongs or not can be timely determined, the subsequent resource deduction operation is facilitated directly according to the public fee telephone resource of the group to which the callee identifier belongs, and the efficiency of the resource deduction operation is improved.
In one embodiment, the call request further carries a collective identifier of a group to which the calling party identifier belongs and a collective identifier of a group to which the called party belongs, and the method further includes: and acquiring a public fee telephone sharing range corresponding to the group to which the calling party identifier belongs, and inquiring whether the sharing party in the public fee telephone sharing range comprises the group to which the called party identifier belongs.
Specifically, the server receives a call request sent by a terminal of a calling party, and effectively determines the calling party identifier and the collective identifier of the collective to which the calling party belongs by determining whether the terminal of the calling party stores the calling party identifier and the collective identifier of the collective to which the calling party belongs. The server judges whether the call request is valid based on the valid judgment result of the collective identification to which the caller identification belongs and the valid judgment result of the caller identification, and under the condition that the call request is a valid request, the server acquires a public fee telephone sharing range corresponding to the collective to which the caller identification belongs, and inquires whether a sharing party in the public fee telephone sharing range comprises the collective to which the callee identification belongs. When the sharing party in the public fee telephone sharing range is inquired to comprise the collective group to which the called party identification belongs, checking the public fee telephone sharing range corresponding to the collective group to which the called party identification belongs, and if the sharing party in the public fee telephone sharing range is checked to comprise the collective group to which the calling party belongs and the calling party identification, establishing the public fee call between the calling party identification and the called party identification.
The collective identification is used for uniquely identifying a collective, and the collective identification of the collective to which the calling party identification belongs is used for representing the collective to which the calling party identification belongs.
In this embodiment, by querying whether the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs includes the group to which the called party identifier belongs, whether the group to which the calling party identifier belongs is qualified to use the public fee telephone resource of the group to which the called party identifier belongs can be determined in time, which is beneficial to performing resource deduction operation directly according to the public fee telephone resource of the group to which the called party identifier belongs in the following process, and improves efficiency of the resource deduction operation.
In one embodiment, before establishing the public charge call between the caller identification and the callee identification, the method further comprises: the value of the public telephone resource to which the called party identification belongs is queried. And when the numerical value is larger than a preset threshold value, executing the step of establishing the public fee call between the calling party identifier and the called party identifier.
Specifically, if it is verified that the shared party in the public fee telephone sharing range includes the group to which the calling party belongs and the calling party identifier, the server queries the numerical value of the public fee telephone resource to which the called party identifier belongs. When the value is greater than a preset threshold, the server executes the step of establishing a public fee call between the caller identification and the callee identification. Wherein the predetermined threshold is a value greater than zero.
For example, if it is verified that the shared party in the public telephone sharing range includes the group to which the calling party belongs and the calling party identification, the server inquires the value of the public telephone resource to which the called party identification belongs. When the value is larger than the preset threshold, the server establishes a public fee call between the calling party identifier and the called party identifier, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended. If the call duration is less than or equal to the value of the public fee telephone resource and the deducted public fee telephone resource is greater than the preset threshold, the deducted public fee telephone resource is used as the public fee telephone resource of the group to which the called party identifier of the next public fee telephone belongs. If the call time is longer than the value of the public fee telephone resource, namely the deducted public fee telephone resource is smaller than zero, the server generates a request of insufficient public fee telephone resource to the terminal so as to prompt the collective user to which the called party identifier belongs to process. If the call duration is less than or equal to the value of the public fee telephone resource and the deducted public fee telephone is less than the preset threshold, the server generates a request of insufficient public fee telephone resource to the terminal of the called party so as to prompt the user of the group to which the called party identifier belongs to process.
In this embodiment, the value of the public fee telephone resource is queried in advance before the public fee telephone between the caller identifier and the callee identifier is established, so that the public fee call can be ensured to be performed under the condition of enough public fee telephone resource, the condition that the call fails due to insufficient public fee telephone resource after the call is established is avoided, and the success rate of the public fee call is greatly improved.
According to the telephone calling method, the call request initiated by using the public fee telephone is received, so that the group to which the calling party identifier belongs and the group to which the called party identifier belongs, which are derived from different groups, can be known in time. When the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, the public fee telephone between the calling party identifier and the called party identifier can be established on the basis that the group to which the calling party identifier belongs does not need to additionally configure the public fee telephone and the public fee telephone resource, the group to which the called party identifier belongs is directly taken as a deduction object of the public fee call after the call is received, and the public fee telephone resource occupied by the public fee telephone is deducted from the public fee telephone resource of the group to which the called party identifier belongs. Therefore, under the condition that the collective without the public charge telephone resource has the use authority of the public charge telephone resource of the collective with the telephone resource, the collective without the public charge telephone resource can initiate the public charge telephone call to the collective with the telephone resource at any time and quickly, thereby greatly improving the communication efficiency between different collective.
In one embodiment, the method further comprises: when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identification belongs does not comprise the group to which the called party identification belongs, or when the sharing party in the public fee telephone sharing range corresponding to the group to which the called party identification belongs is verified to not comprise the calling party identification, or when the value of the public fee telephone resource of the group to which the called party identification belongs is smaller than or equal to a preset threshold value, the public fee call between the calling party identification and the called party identification is established, and the public fee telephone resource occupied by the public fee call is deducted from the public fee telephone resource of the group to which the calling party identification belongs after the call is ended.
Specifically, when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs does not include the group to which the called party identifier belongs, the server prohibits each user in the group to which the called party identifier belongs from using the public fee telephone resource of the group to which the calling party identifier belongs, the server establishes a public fee telephone between the calling party identifier and the called party identifier, and deducts the public fee telephone resource occupied by the public fee call from the public fee telephone resource of the group to which the calling party identifier belongs after the call is ended.
Or when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identification belongs comprises the group to which the called party identification belongs and the shared party in the public fee telephone sharing range corresponding to the group to which the called party identification belongs does not comprise the calling party identification, the server prohibits the called party identification from using the public fee telephone resource of the group to which the calling party identification belongs, the server establishes the public fee telephone between the calling party identification and the called party identification, and deducts the public fee telephone resource occupied by the public fee call from the public fee telephone resource of the group to which the calling party identification belongs after the call is ended.
Or when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identification belongs comprises the group to which the called party identification belongs, and the shared party in the public fee telephone sharing range corresponding to the group to which the called party identification belongs does not comprise the calling party identification, and the value of the public fee telephone resource of the group to which the called party identification belongs is smaller than or equal to a preset threshold value, the server establishes the public fee telephone between the calling party identification and the called party identification, and deducts the public fee telephone resource occupied by the public fee call from the public fee telephone resource of the group to which the calling party identification belongs after the call is ended.
It should be noted that, for a call request initiated by using a public fee phone, the related group to which the caller identifier belongs and the group to which the callee identifier belongs may be preconfigured with the shared application of the public fee phone, and the caller identifier may or may not be preconfigured with the public fee phone resource of the group to which the caller identifier belongs. Likewise, the group to which the called party identification belongs may be preconfigured with the shared application of the public telephone, and the group to which the called party identification belongs preconfigured public telephone resources of the group to which the called party identification belongs. The process of setting any one collective public telephone as a shared application will be described in detail later. Preferably, when determining that the deduction object of the public fee telephone is the group to which the called party identifier belongs, the group to which the calling party identifier belongs does not need to be additionally configured with the public fee telephone resource of the group to which the calling party identifier belongs, so that the step of using the public fee telephone is greatly simplified, and the communication efficiency of the calling party and the called party is improved. When the deduction object of the public charge call is determined to be the group to which the calling party identifier belongs, if the calling party identifier is preconfigured with the public charge telephone resource of the group to which the calling party identifier belongs, the public charge telephone resource occupied by the public charge call is directly deducted from the public charge telephone resource of the group to which the calling party identifier belongs. If the caller identification does not pre-configure the public fee telephone resource of the group to which the caller identification belongs, the public fee telephone is failed, and at this time, the caller can initiate a common telephone to the called party.
In one embodiment, before establishing the public charge call between the caller identification and the callee identification, the method further comprises: the value of the public telephone resource to which the caller identification belongs is queried. And when the numerical value is larger than a preset threshold value, executing the step of establishing the public fee call between the calling party identifier and the called party identifier. And rejecting the call request when the value is smaller than or equal to a preset threshold value.
Specifically, when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identification belongs does not include the group to which the called party identification belongs, or when it is verified that the shared party in the public fee telephone sharing range corresponding to the group to which the called party identification belongs does not include the calling party identification, or when the value of the public fee telephone resource of the group to which the called party identification belongs is less than or equal to a preset threshold value, the server inquires the value of the public fee telephone resource of the group to which the calling party identification belongs. When the value is greater than a preset threshold, the server executes the step of establishing a public fee call between the calling party identification and the called party identification. And rejecting the call request when the value is smaller than or equal to a preset threshold value.
For example, when the sharing party in the public telephone sharing range to which the caller identification belongs does not include the group to which the called party identification belongs, or when it is verified that the shared party in the public telephone sharing range to which the called party identification belongs does not include the caller identification, or when the value of the public telephone resource of the group to which the called party identification belongs is less than or equal to a preset threshold value, the server inquires the value of the public telephone resource of the group to which the caller identification belongs. And when the value is smaller than or equal to the preset threshold value, the server refuses the call request. When the value is larger than a preset threshold, the server establishes a public fee call between the calling party identifier and the called party identifier, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the calling party identifier belongs after the call is ended. If the call duration is less than or equal to the value of the public charge telephone resource and the deducted public charge telephone resource is greater than the preset threshold, the deducted public charge telephone resource is used as the public charge telephone resource of the group to which the calling party identification of the next public charge telephone belongs. If the call time is longer than the value of the public fee telephone resource, namely the deducted public fee telephone resource is smaller than zero, the server generates a request of insufficient public fee telephone resource to the terminal so as to prompt the collective user to which the calling party identifier belongs to process. If the call duration is less than or equal to the value of the public fee telephone resource and the deducted public fee telephone is less than the preset threshold, the server generates a request of insufficient public fee telephone resource to the terminal of the calling party so as to prompt the user of the group to which the calling party identifier belongs to process.
After determining the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the caller identification belongs, the numerical value of the public fee telephone resources of the group to which the caller identification belongs is queried in advance, so that the public fee call can be ensured to be carried out under the condition of enough public fee telephone resources, the condition of failure in calling due to insufficient public fee telephone resources after the call is established is avoided, and the success rate of the calling of the public fee call is greatly improved.
In this embodiment, when it is determined that either the caller identifier belongs to a group or the caller identifier is not within the public fee telephone sharing range of the group to which the caller identifier belongs, or when it is determined that the value of the public fee telephone resource of the group to which the caller identifier belongs is smaller than a preset value, the caller identifier belongs to the group as the object of deducting the resource, that is, the public fee telephone resource occupied by the public fee call is determined to be deducted from the public fee telephone resource of the group to which the caller identifier belongs. Therefore, the operation of calling the public fee telephone for multiple times when the public fee telephone resources occupied by the public fee call cannot be shared by the group to which the called party identification belongs can be avoided, and the probability of successful initiation of the public fee telephone is greatly improved.
In one embodiment, as shown in FIG. 3, a flow chart of a deduction of a public telephone resource is provided. The terminal receives a call request initiated by using a public fee telephone, a calling party of the call request is a user B1 of a group B, and a called party is a user A1 of the group A. If the server inquires that the sharing party of the group B comprises the group A, the server takes the group A as a deduction object, namely deducting the public charge telephone resources occupied by the public charge call from the public charge telephone resources of the group A. The server inquires whether the shared party of the group A comprises the user B1 of the group B, if so, inquires whether the public fee telephone resources of the group A are enough, namely, whether the numerical value of the public fee telephone resources of the group A is larger than a preset threshold value. If the public fee telephone resources of the group A are sufficient, namely the value of the public fee telephone resources of the group A is larger than a preset threshold value, the server establishes the public fee call between the calling party and the called party, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group A after the call is ended. If the server inquires that the sharing party of the group B does not comprise the group A, or inquires that the shared party of the group A does not comprise the user B1 of the group B, or the public charge telephone resources of the group A are insufficient, the server deducts the public charge telephone resources occupied by the public charge call from the public charge telephone resources of the group B by taking the group B as a deduction object. Whether the public fee telephone resources of the server group B are enough or not, namely whether the numerical value of the public fee telephone resources of the server group B is larger than a preset threshold value or not is inquired. If the public fee telephone resources of the group B are sufficient, namely the value of the public fee telephone resources of the group B is larger than a preset threshold value, the server establishes the public fee call between the calling party and the called party, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group B after the call is ended. If the public fee telephone resources of the group B are insufficient, the call request is refused.
In this embodiment, when it is verified that the sharing party corresponding to the group to which the caller identifier belongs includes the group to which the callee identifier belongs, the public fee telephone resource occupied by the public fee call is determined to be deducted from the public fee telephone resource of the group to which the callee identifier belongs, and the public fee telephone resource of the group to which the caller identifier belongs is not required to be additionally configured by the group to which the caller identifier belongs, so that the step of using the public fee telephone is greatly simplified, and the communication efficiency of the caller and the callee is improved. And under the condition that the calling party identifier belongs to a group or any one of the calling party identifiers is not in the public fee telephone sharing range of the group to which the called party identifier belongs, or the value of the public fee telephone resource of the group to which the called party identifier belongs is smaller than a preset value, directly taking the group to which the calling party identifier belongs as a resource deduction object, namely, determining that the public fee telephone resource occupied by the public fee call is deducted from the public fee telephone resource of the group to which the calling party identifier belongs. Therefore, the operation of calling the public fee telephone for multiple times when the public fee telephone resources occupied by the public fee call cannot be shared by the group to which the called party identification belongs can be avoided, and the probability of successful initiation of the public fee telephone is greatly improved.
In one embodiment, the method further comprises: a sharing request from a first collective for sharing a public fee telephone upstream and downstream of a target is received. The shared party is parsed from the sharing request. And adding a public fee telephone in the sharing application on the upstream and downstream of the target when the shared party is verified to originate from the second collective and the second collective belongs to the upstream and downstream of the target. And adding a second group as a shared party in the public fee telephone sharing range corresponding to the first group, and adding the first group as a shared party in the public fee telephone sharing range corresponding to the second group so as to share the public fee telephone resources of the first group to the second group.
Wherein the first group and the second group are different groups. The first group corresponds to at least one upstream and downstream, and each upstream and downstream is a space formed by aggregating some or some kinds of partners by a user or an administrator of the first group, wherein the partners come from the upstream and downstream groups of the first group, and the upstream and downstream groups can also comprise users in the first group, and are usually internal staff for realizing business collaboration and interfacing with the partners. The target upstream and downstream is any one of the at least one upstream and downstream. The shared application is an application shared among a plurality of groups, and it can be understood that a scene of a plurality of business synergies exists among the groups, the business synergies among the groups can be satisfied by using the application, and by sharing the application among the groups, information flows can be communicated across the groups, and the business synergies efficiency is improved. The user or administrator belonging to the first group may select an application of sharing the public fee telephone for the user originating from the second group in the upstream and downstream of the target, that is, the upstream and downstream of the target, thereby implementing sharing of the public fee telephone resource of the first group to the user originating from the second group or the second group in the upstream and downstream of the target, so that the second group or the user originating from the second group becomes a shared party of the public fee telephone resource of the first group, and the number of the second groups may be a plurality.
Specifically, the user who initiates the sharing request may be denoted as a request initiating user, which may be a first collective administrator user or a general user. The server receives a request for sharing of the targeted upstream and downstream shared public fee telephone initiated by a request initiating user in the first group. The sharing request carries a first collective identification, a request initiating user identification, a request initiating timestamp, and shared party information. And carrying out effective verification on the sharing request based on the first collective identification, the request initiating user identification, the request initiating time stamp and the shared party information. If the valid verification result representation of the sharing request passes, determining that the shared party is from a second group, and the second group belongs to the target upstream and downstream of the request initiating user of the first group. When it is verified that the shared party originates from the second group and the second group belongs to the upstream and downstream of the target, the server adds a toll phone to the sharing application upstream and downstream of the target. The server adds a second group as a shared party in the public fee telephone sharing range corresponding to the first group, and adds the first group as a sharing party in the public fee telephone sharing range corresponding to the second group so as to share the public fee telephone of the first group to the second group.
Wherein the request initiating user in the first group may be a general user in the first group or an administrator in the first group. The shared party information may be a collective identifier of the second group, or may be a user identifier in the second group, which is not particularly limited.
It should be noted that the first group may correspond to a plurality of upstream and downstream groups, where a relationship between the group in each upstream and downstream group and the first group is an upstream and downstream relationship.
In one embodiment, the method further comprises: the server sending an application sharing notification regarding the premium telephones to the second group; and after receiving a sharing confirmation instruction triggered by the second collective based on the application sharing notification, executing the steps of adding the second collective as a shared party in the public fee telephone sharing range corresponding to the first collective and adding the first collective as a shared party in the public fee telephone sharing range corresponding to the second collective.
Wherein the application sharing notification of the public toll phone is a prompt message received by a user or an administrator in the second group about the first group sharing public toll phone resources thereto.
In this embodiment, after adding the public fee telephone in the sharing application on the upstream and downstream of the target, the step of adding the second group as the shared party in the public fee telephone sharing range corresponding to the first group and adding the first group as the shared party in the public fee telephone sharing range corresponding to the second group is performed after receiving the sharing confirmation instruction triggered by the second group based on the application sharing notification. In this way, it is ensured that both the first group and the second group can quickly know that the operation of configuring the public fee telephone as the sharing application has been completed, so that the first group and the second group can quickly update the corresponding public fee telephone sharing range, thereby improving the configuration efficiency of the public fee telephone.
In one embodiment, a call request initiated using a public toll phone includes: a call request originating from a second group using a public toll telephone is received, the called party of the call request identifying that the call request originates upstream and downstream of the target and belongs to the first group.
Specifically, after the server shares the first collective public fee telephone to the second collective, the server receives a call request using the public fee telephone from the second collective to which the caller identification belongs. The called party identification carried in the call request originates from the upstream and downstream of the target and belongs to the first group. Wherein the first group and the second group are different groups. The upstream and downstream of the target are created by the first collective body, i.e. the second collective body in the upstream and downstream of the target is in an upstream and downstream relationship with the first collective body.
In the present embodiment, after the sharing of the public-charge telephone of the first group to the second group is completed, the sharing of the public-charge telephone resource of the first group by the first group and the second group in the upstream and downstream of the target is realized. Therefore, by receiving the call request initiated by the public fee telephone from the second group, the upstream and downstream groups of the subsequent first group can efficiently and conveniently communicate with the first group, and the communication cost is reduced.
For example, as shown in fig. 4, an administrator in the first group uses a terminal to enter a public fee telephone setting interface of the application of the public fee telephone, and selects a second group which shares the public fee telephone to the target upstream and downstream of the first group in the interface, and the terminal generates a sharing request carrying a group identifier, an administrator identifier, a request initiation timestamp and shared party information of the first group according to a triggering operation of the administrator in the first group. The terminal sends the sharing request to a server (comprising a public fee telephone background, an upstream background, a downstream background, a public fee telephone storage and a message system), the public fee telephone background obtains the moment when the sharing request is received, and the sharing request is effectively checked based on the collective identification of the first group, the request initiating user identification, the request initiating timestamp and the information of the shared party. And if the format of the first collective identifier meets the preset collective format, determining that the first collective identifier is valid. And if the user identification of the request initiation user identification meets the preset collective format, determining that the request initiation user identification is effective. If the time period between the request initiation time stamp and the time at which the sharing request is received is less than the preset time period, the request initiation time stamp is valid. The toll phone background acquires the upstream and downstream of the target of the first collective from the upstream and downstream background of the first collective and checks whether the second collective belongs to the upstream and downstream of the target. And if the second group in the shared party information belongs to the upstream and downstream of the target, determining the shared party information as effective information. And when the first collective group identifier is a valid collective identifier, the request initiating user identifier is a valid identifier, the request initiating time stamp and the shared party information are valid information, determining that the sharing request is a valid request. If the sharing request is an invalid request, the background of the public fee telephone returns error prompt information to the terminal. If the sharing request is a valid request, it is determined that the shared party originates from a second group, and the second group belongs to the target upstream and downstream. When it is verified that the shared party originates from the second group and the second group belongs to the upstream and downstream of the target, the public fee telephone background adds the public fee telephone in the sharing application of the upstream and downstream of the target. And the public fee telephone background stores upstream and downstream sharing configuration, specifically, adds a second group as a shared party in a public fee telephone sharing range corresponding to the first group, adds the first group as a shared party in the public fee telephone sharing range corresponding to the second group, and stores the public fee telephone range corresponding to the added first group and the public fee telephone sharing range corresponding to the added second group to public fee telephone storage. The public fee telephone background sends an application sharing reminder to an administrator in the second group through the messaging system. The background of the public fee telephone sends an operation result representing that the sharing configuration operation of the public fee telephone is completed to the terminal, and the terminal displays the operation result representing that the sharing configuration operation of the public fee telephone is completed to an administrator in the first group. The public fee telephone sharing range can be understood as an upstream and downstream sharing configuration.
Wherein an administrator in the first group may set at least one user to which the first group's public telephone resources are shared or to which the first group's public telephone resources are shared to generate shared information. In addition, the administrator in the first group may also set the usage rights of the public telephone resources of the members in the first group, for example, which users in the first group may use the public telephone resources.
After generating the sharing request, the terminal may encrypt the generated sharing request first to obtain an encrypted sharing request. The terminal transmits the encrypted sharing request to the server, the server decrypts the encrypted sharing request to obtain the sharing request generated by the terminal, and then the server executes the step of obtaining the moment of receiving the sharing request.
Note that the public fee telephone storage may be regarded as a storage database, in which public fee telephone sharing ranges corresponding to the respective groups are stored, specifically, each group is stored with a group identifier as a primary key, for example, for group a, there is a data group 1 with a group identifier a of group a as a primary key, and the data group 1 stores the public fee telephone sharing range of group a.
In the present embodiment, whether or not there is an upstream-downstream relationship between the first group and the second group is checked by determining whether or not the second group in the shared party belongs to the target upstream-downstream. When the shared party is verified to originate from the second collective body and the second collective body belongs to the upstream and downstream of the target, the public fee telephone is directly added in the sharing application of the upstream and downstream of the target, and the fact that the public fee telephone resources which are successfully shared subsequently can be shared in the two collective bodies with the upstream and downstream relation is also ensured. And adding a second group as a shared party in the public fee telephone sharing range corresponding to the first group, and adding the first group as a shared party in the public fee telephone sharing range corresponding to the second group so as to share the public fee telephone resources of the first group to the second group. Therefore, when the group to which the calling party identification belongs is a second group, the second group does not need to be additionally provided with public charge telephone resources, and communication efficiency of the first group and the second group is greatly improved.
In one embodiment, the method further comprises: a cancellation request is received from a first group for the target upstream and downstream shared public fee telephone, or a rejection request is received from a second group for the target upstream and downstream shared public fee telephone. The target upstream and downstream are parsed from the cancel request or reject request. In the sharing application at the upstream and downstream of the target, the public fee telephone application is removed. In the case where the second group is included in the target upstream and downstream, the second group is removed from the shared party of the sharing range of the public fee telephone corresponding to the first group, and the first group is removed from the sharing party of the sharing range of the public fee telephone corresponding to the second group.
Specifically, after the server completes sharing the first collective public fee telephone resource to the second collective, the server receives a cancel request from the first collective for the target upstream and downstream shared public fee telephone, or the server receives a reject request from the second collective for the target upstream and downstream shared public fee telephone. The server parses out the target upstream and downstream from the cancel request or reject request. In the shared application upstream and downstream of the target, the server removes the premium telephony application. The server judges whether the second group is included in the upstream and downstream of the target, and in the case that the second group is included in the upstream and downstream of the target, the server removes the second group from the shared party of the public fee telephone sharing range corresponding to the first group, and removes the first group from the shared party of the public fee telephone sharing range corresponding to the second group.
The cancellation request may be initiated by a common user in the second group, or may be initiated by an administrator in the second group, which is not limited in particular.
It should be noted that, since the upstream and downstream of the target are created by the first collective, the upstream and downstream of the target include the second collective. Thus, the first group can cancel sharing of the public-charge telephone resources of the second group according to the demand after completing sharing of the public-charge telephone resources of the first group to the second group belonging to the upstream and downstream of the target. The second group may refuse the shared public telephone resources according to the demand after receiving the sharing of the public telephone resources of the first group.
For example, in the case where the server determines that the second group is included in the upstream and downstream of the target, the server acquires a first group data set in which the first group is identified as the primary key, and determines a public charge telephone sharing range corresponding to the first group from the first group data set. And the server removes the second group from the shared party of the public fee telephone sharing range corresponding to the first group, and obtains the public fee telephone sharing range corresponding to the removed first group. The server acquires a second collective data group with the second collective identification as a primary key, and determines a public fee telephone sharing range corresponding to the second collective from the second collective data group. And the server removes the first group from the sharing party of the public fee telephone sharing range corresponding to the second group, and obtains the public fee telephone sharing range corresponding to the removed second group.
In this embodiment, after sharing the public telephone resources of the first group to the second group is completed, the first group or the second group may send, according to the work requirement, a cancel request carrying the upstream and downstream of the target or a reject request carrying the upstream and downstream of the target. Therefore, according to the cancel request or reject request, the public fee telephone application is directly removed from the sharing application at the upstream and downstream of the target, and the convenience of cancellation of the public fee telephone application is greatly improved. Accordingly, in the case that the second group is included in the upstream and downstream of the target, the second group in the shared party of the first group is removed in time, and the first group in the shared party of the second group is removed, so that the accuracy of the sharing range of the public fee telephones in the first group and the sharing range of the public fee telephones in the second group is ensured.
In one embodiment, as shown in fig. 5, a telephone call method is provided, and the method is applied to the terminal 102 in fig. 1 for illustration, and includes the following steps:
step 502, responding to a triggering operation of calling by using a public fee telephone, and generating a call request carrying a calling party identifier and a called party identifier; the group to which the calling party identification belongs is different from the group to which the called party identification belongs.
Specifically, the terminal generates a call request carrying a caller identification and a callee identification in response to a trigger operation performed by the caller on the terminal to initiate a call using a public fee telephone.
In one embodiment, the terminal may display a page on which an entry of the toll phone is located, display a dial of the toll phone in response to a trigger operation of the entry, and initiate a call using the toll phone in response to a phone number entered in the dial. In one embodiment, the terminal may display a first collective upstream and downstream address book, and initiate a call using a public toll phone in response to a selection operation of any one of the upstream and downstream contacts in the upstream and downstream address book.
In one embodiment, generating a call request carrying a caller identification and a callee identification in response to a trigger operation to initiate a call using a public fee telephone includes: in the instant messaging application logged in by the caller identification, the upstream and downstream address books are displayed. And responding to the triggering operation of calling the contact person in the upstream and downstream address books by using the public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier by using the contact person.
The upstream and downstream address books display upstream and downstream of the group to which the caller identification belongs, and the upstream and downstream address books display all upstream and downstream spaces added by a user (i.e., caller identification) currently logged in the instant messaging application.
Specifically, in the instant messaging application logged in by the caller identification, the terminal responds to the click operation of the caller on the instant messaging application page, switches the page to the interface of the address book, and displays the upstream and downstream address books. The terminal responds to the triggering operation of calling the contact person in the upstream and downstream address books by using the public fee telephone to generate a call request carrying the calling party identifier and the called party identifier by using the contact person. As shown in fig. 6, the interface of the address book may be understood as an interface of the organization structure. The interface of the address book can display information of three modules, wherein the first module is "my client" for displaying client information of the calling party, and the "my client" module in fig. 6 displays an icon of "add client" in addition to an icon of "my client" for viewing client information of the calling party. The second module is the upstream and downstream address book, as shown in fig. 6. The third module is a collective address book, in which a plurality of objects belonging to the group to which the caller id belongs, such as object 20 to object 28, are displayed, wherein object 23 and object 24 in fig. 6 are engineers, and a creator can be identified in the collective address book as required, such as object 27 in fig. 6 is a creator. And a switching icon of the instant messaging application, such as a message, a mail, a document, a workbench and an address book, is also displayed below the interface of the address book.
In one embodiment, the terminal responds to the clicking operation of the calling party on the instant messaging application page to switch the page to the interface of the address book, and the terminal responds to the triggering operation of the calling party clicking the upstream and downstream address books to switch the interface of the address book to the upstream and downstream contact person interface. The terminal responds to the triggering operation of calling the upstream contact person in the upstream and downstream address book by using the public fee telephone, and generates a call request carrying the calling party identifier and the called party identifier by using the contact person. The upstream and downstream contact interfaces are shown in fig. 7, and the calling party initiates a call by clicking on the avatar of the called party in the upstream and downstream address book. In fig. 7, the upstream and downstream contact interfaces display the head portraits of the objects 1 to 13, and the calling party clicks the called party as the head portraits of the object 2 to initiate a call when the called party is selected from the objects 2, 4 and 5 to perform a dialing test of the public fee telephone. The head portrait right side of each object in the upstream and downstream contact person interfaces is also displayed with a word of 'anti-harassment real name collective' besides the object name, so as to inform that the harassment prevention of the group to which the object belongs is started and the group to which the object belongs is the real name group. In order to facilitate quick finding of the head portrait of the called party, the called party can be searched in a search box of an upstream contact interface and a downstream contact interface.
In this embodiment, in the instant messaging application logged in by the caller id, the upstream and downstream address books are displayed, so that the caller can quickly find the called party. Therefore, after the calling party initiates the triggering operation of calling by using the public fee telephone to the contact in the upstream and downstream address books, the calling request carrying the calling party identifier and the called party identifier by the contact can be accurately generated by responding to the triggering operation, so that the efficiency of the public fee telephone call can be greatly improved.
Step 504, a call request is sent to a server, so that the server establishes a public fee call between the caller identifier and the callee identifier when it is verified that the public fee telephone sharing range corresponding to the group to which the callee identifier belongs includes the group to which the caller identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the callee identifier belongs after the call is ended.
Specifically, the terminal sends a call request to the server, so that when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs includes the group to which the called party identifier belongs, the server checks the public fee telephone sharing range corresponding to the group to which the called party identifier belongs, and if the sharing party in the public fee telephone sharing range includes the group to which the calling party belongs and the calling party identifier, the public fee call between the calling party identifier and the called party identifier is established.
According to the telephone calling method, the call request carrying the calling party identifier and the called party identifier is automatically generated by responding to the triggering operation of calling by using the public fee telephone, and the call request is sent to the server, so that the server can check whether the public fee telephone of the group to which the called party identifier belongs is shared to the group to which the calling party identifier belongs through the received call request. Thus, after the condition that the group to which the called party identifier belongs shares the public fee telephone to the group to which the calling party identifier belongs is determined, the range of the public fee telephone resource of the group to which the called party identifier belongs is expanded from the group to which the called party identifier belongs to the group to which the calling party identifier belongs, and under the condition that the public fee telephone resource and the public fee telephone resource are not required to be additionally configured by the group to which the calling party identifier belongs, the resource deduction operation is completed through the public fee telephone resource of the group to which the called party identifier belongs, so that the telephone calling process between different groups is greatly simplified, the calling party can successfully initiate the public fee telephone of the called party from the external group at any time and rapidly, and the communication efficiency between the different groups is greatly improved.
In one embodiment, as shown in fig. 8, in an instant messaging application logged in with a caller id, a terminal switches a page to an interface of an address book in response to a click operation of the caller on the instant messaging application page, and displays an upstream address book and a downstream address book. And the terminal responds to the triggering operation of the calling party for calling the contact in the upstream and downstream address books by using the public fee telephone, and generates a call request carrying the calling party identifier and the called party identifier by using the contact. The triggering operation is an operation that a calling party selects an upstream and downstream contact as a called party. The terminal sends the call request to a server (comprising a public fee telephone background and a public fee telephone storage), and the public fee telephone background respectively determines a collective to which the calling party identifier belongs and a collective to which the called party identifier belongs according to the calling party identifier and the called party identifier carried by the call request. And the public fee telephone background judges the relationship between the calling party and the called party according to the calling party identification and the called party identification, and if the relationship between the calling party identification and the called party identification is correct, the public fee telephone background acquires the upstream and downstream of the group to which the called party identification belongs from the upstream and downstream background, and judges whether the group to which the calling party identification belongs is in the upstream and downstream. The public fee telephone background judges whether the calling party identification is stored in the terminal of the calling party or not so as to effectively judge the calling party identification. And under the condition that the group to which the calling party identifier belongs is checked to be in the upstream and downstream, and the terminal is checked to store the calling party identifier, determining that the call request is valid, namely checking that the call is legal. And under the condition that the call request is an effective request, reading a public fee telephone sharing range corresponding to the group to which the calling party identification belongs from the public fee telephone storage by the public fee telephone background, and determining the group to which the called party identification belongs as a deduction object based on the public fee telephone sharing range corresponding to the group to which the calling party identification belongs by the public fee telephone background. Specifically, when the sharing party in the public fee telephone sharing range is inquired to include the group to which the called party identification belongs, the public fee telephone background determines that the group to which the called party identification belongs is a deduction object. The public fee telephone background reads the public fee telephone sharing range of the group to which the called party identifier belongs from the public fee telephone storage, and checks the use authority of the called party identifier. Specifically, if the public fee telephone background verifies that the shared party in the public fee telephone sharing range comprises a collective to which the calling party belongs and a calling party identifier, the public fee telephone background verifies whether public fee telephone resources of the collective to which the called party identifier belongs are enough, specifically, when the number of the public fee telephone resources is greater than a preset threshold value, public fee conversation between the calling party identifier and the called party identifier is established, specifically, the public fee telephone background initiates a call request to a terminal where the calling party is located, after the terminal where the calling party is located receives the call request, the public fee telephone background initiates a call request to the terminal where the called party is located, and after the terminal where the called party is located receives the call request, the calling party and the called party conduct conversation. And after the call is ended, deducting corresponding resources from the corresponding public fee telephone resources of the deducted objects, namely deducting the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identification belongs. The public fee telephone background stores the historical call into the public fee telephone storage, specifically, the public fee telephone background writes the historical call in the personal public fee telephone historical call of the calling party identification, and writes the historical call in the personal public fee telephone historical call of the called party identification, and the public fee telephone background writes a historical call in the collective historical call of the calling party identification and the collective historical call of the called party identification respectively.
In this embodiment, by responding to a triggering operation of initiating a call by using a public fee phone, a call request carrying a calling party identifier and a called party identifier is automatically generated, and the call request is sent to a server, so that the server checks whether the public fee phone of the group to which the called party identifier belongs is shared to the group to which the calling party identifier belongs through the received call request. Thus, after the condition that the group to which the called party identifier belongs shares the public fee telephone to the group to which the calling party identifier belongs is determined, the range of the public fee telephone resource of the group to which the called party identifier belongs is expanded from the group to which the called party identifier belongs to the group to which the calling party identifier belongs, and under the condition that the public fee telephone resource and the public fee telephone resource are not required to be additionally configured by the group to which the calling party identifier belongs, the resource deduction operation is completed through the public fee telephone resource of the group to which the called party identifier belongs, so that the telephone calling process between different groups is greatly simplified, the calling party can successfully initiate the public fee telephone of the called party from the external group at any time and rapidly, and the communication efficiency between the different groups is greatly improved.
In one embodiment, the method further comprises: and displaying the upstream and downstream in the instant messaging application logged in by the account belonging to the first group. In response to a trigger operation for the second collective shared public fee telephone in the upstream and downstream of the target, a sharing request for the second collective shared public fee telephone in the upstream and downstream of the target is issued. And adding the public fee telephone application in the sharing application list at the upstream and downstream of the target to share the public fee telephone resources of the first group to the second group.
The shared application list displays shared applications shared between the first group and the upstream and downstream of the target. The triggering operation may be an operation of all the groups upstream and downstream of the whole object, and at this time, all the groups upstream and downstream of the object may be shared as a second group, i.e., for the whole upstream and downstream.
Specifically, the upstream and downstream are shown in the instant messaging application logged in by the account belonging to the first group. The terminal responds to the triggering operation of the second collective shared public fee telephone in the upstream and downstream of the target, sends out a sharing request of the second collective shared public fee telephone in the upstream and downstream of the target, and sends the sharing request to the server. And when the server verifies that the second group belongs to the upstream and downstream of the target, adding the public charge telephone in the sharing application of the upstream and downstream of the target, adding the second group as a shared party in the public charge telephone sharing range corresponding to the first group, and adding the first group as a sharing party in the public charge telephone sharing range corresponding to the second group so as to share the public charge telephone resources of the first group to the second group. And after receiving an operation result which is sent by the server and characterizes the completion of the sharing configuration operation of the public fee telephone, the terminal adds a new public fee telephone application in a sharing application list at the upstream and downstream of the target so as to share the public fee telephone resources of the first group to the second group.
It should be noted that, since the terminal responds to the trigger operation of the second group sharing the public fee telephone in the upstream and downstream of the target, all users in the second group have the use authority of the public fee telephone application.
For example, the first collective administrator selects to add the shared application in the upstream and downstream setting interfaces of the terminal, and the terminal switches the upstream and downstream setting interfaces to the shared application interface in response to the addition operation of the first collective administrator. And the terminal responds to the operation of selecting the public fee telephone in the shared application interface by the administrator, and switches the shared application interface to the public fee telephone setting interface. The terminal responds to the triggering operation of the second collective shared public fee telephone in the upstream and downstream of the target, sends out a sharing request of the second collective shared public fee telephone in the upstream and downstream of the target, and sends the sharing request to the server. And when the server verifies that the second group belongs to the upstream and downstream of the target, adding the public charge telephone in the sharing application of the upstream and downstream of the target, adding the second group as a shared party in the public charge telephone sharing range corresponding to the first group, and adding the first group as a sharing party in the public charge telephone sharing range corresponding to the second group so as to share the public charge telephone resources of the first group to the second group.
FIG. 9 is a schematic diagram of an interface upstream and downstream in one embodiment. Referring to fig. 9, an upstream and downstream setting page is displayed with an upstream and downstream setting interface for a "first collective dealer", the upstream and downstream creation is made to be the first collective, the upstream and downstream collective of the first collective can be displayed by clicking on the "first collective", the upstream and downstream collective contacts can be displayed in a hierarchical manner, such as a first-level dealer and a second-level dealer, furthermore, an edit box of the first collective is displayed on the right side of the upstream and downstream setting page, a department or a member can be added to the corresponding upstream and downstream in the edit box of the first collective, and a department or a member can be removed from the selected upstream and downstream, as shown in fig. 9, a user A1 belonging to the department_92 of the first collective is added. In fig. 9, when the arrow points to the first-level dealer, the area of the upstream and downstream collective contacts is followed by the number of first-level dealers, such as 1 collective. After the administrator selects 'adding' in the upstream and downstream setting pages, the terminal responds to the adding operation of the first collective administrator to switch the upstream and downstream setting interfaces to a shared application interface, and the shared application is newly added or removed for the selected target upstream and downstream in the interface, so that the applications can be checked and used by the upstream and downstream collective contacts on the workbench, and the business cooperation efficiency is improved.
In this embodiment, the upstream and downstream are displayed in the instant call application logged in by the account belonging to the first group, so that the upstream and downstream conditions of the first group can be intuitively determined. By responding to the triggering operation of the second collective shared public fee telephone in the upstream and downstream of the target, the sharing request of the second collective shared public fee telephone in the upstream and downstream of the target can be timely and accurately sent. And after the sharing configuration operation is determined to be completed, adding the public fee telephone application directly in the sharing application list at the upstream and downstream of the target so as to share the public fee telephone resources of the first group to the second group. Thus, the personnel logging in the instant call application can timely know the progress of the public fee telephone configuration.
In one embodiment, the method further comprises: and displaying the upstream and downstream in the instant messaging application logged in by the account belonging to the first group. And responding to the triggering operation of the contact sharing public fee telephone belonging to the second group in the upstream and downstream of the target, and sending a sharing request of the contact sharing public fee telephone. And adding the public fee telephone application in the sharing application list at the upstream and downstream of the target to share the public fee telephone resources of the first group to the second group.
Specifically, the terminal displays upstream and downstream in an instant messaging application logged in by an account belonging to a first group. The terminal responds to the triggering operation of the contact person sharing public fee telephone of the second group in the upstream and downstream of the target, sends a sharing request of the contact person sharing public fee telephone, and sends the sharing request to the server, so that when the server verifies that the contact person originates from the second group and the second group belongs to the upstream and downstream of the target, the server adds the public fee telephone in the sharing application of the upstream and downstream of the target, adds the contact person of the second group as a shared party in the sharing range of the public fee telephone corresponding to the first group, and adds the first group as a sharing party in the sharing range of the public fee telephone corresponding to the second group, so that the public fee telephone resource of the first group is shared to the second group. And after receiving an operation result which is sent by the server and characterizes the completion of the sharing configuration operation of the public fee telephone, the terminal adds a new public fee telephone application in a sharing application list at the upstream and downstream of the target so as to share the public fee telephone resources of the first group to the second group.
When the triggering operation is an operation of sharing the public fee telephone with the contacts belonging to the second group in the upstream and downstream of the target, only the contacts in the second group have the use authority of the public fee telephone application, and the non-contacts in the second group do not have the use authority of the public fee telephone application. Wherein the number of contacts may be plural.
In this embodiment, the upstream and downstream are displayed in the instant call application logged in by the account belonging to the first group, so that the upstream and downstream conditions of the first group can be intuitively determined. By responding to the triggering operation of the second collective contact persons in the upstream and downstream of the target to share the public fee telephone, the sharing request of the second collective contact persons in the upstream and downstream of the target can be timely and accurately sent. And after the sharing configuration operation is determined to be completed, adding the public fee telephone application in the sharing application list directly at the upstream and downstream of the target so as to share the public fee telephone resource of the first group to the contact persons in the second group. Thus, the personnel logging in the instant call application can timely know the progress of the public fee telephone configuration. Meanwhile, the public fee telephone resource of the first group is selectively shared by the second group, and the flexibility of sharing the public fee telephone is improved.
In one embodiment, the method further comprises: in response to a trigger operation for the second collective cancellation of the shared public fee telephone in the upstream and downstream of the target, a cancellation request for the second collective shared public fee telephone in the upstream and downstream of the target is issued. And removing the public fee telephone application from the shared application list at the upstream and downstream of the target to cancel sharing of the public fee telephone resources of the first group to the second group.
Specifically, the terminal transmits a cancellation request from the first group to the server for canceling the shared public fee telephone of the upstream and downstream of the target in response to a trigger operation for canceling the shared public fee telephone of the second group in the upstream and downstream of the target, so that the server resolves the upstream and downstream of the target from the cancellation request. And after receiving an operation result of successfully removing the public fee telephone application sent by the server, the terminal removes the public fee telephone application from the sharing application list at the upstream and downstream of the target so as to cancel sharing of the public fee telephone resources of the first group to the second group.
Note that the trigger operation to cancel the shared public charge telephone is an operation performed by the first collective normal user or the first collective administrator, that is, the trigger operation to cancel the shared public charge telephone is an operation performed by the first collective normal user or the first collective administrator after logging in the timely communication application in the terminal. Thus, the cancellation request is issued by the terminal originating from the first group.
In the embodiment, the trigger operation of the second collective shared public fee telephone in the upstream and downstream of the target is responded to, so that the public fee telephone application can be removed timely. After determining that the premium telephony applications are removed, the premium telephony applications are removed by being in a shared application list upstream and downstream of the target to cancel sharing of the first collective of premium telephony resources to the second collective. Therefore, the user can timely know the use authority of the public charge telephone resources which are not in the first group by the information displayed on the page, and the experience of the user is greatly improved.
The application also provides an application scene, and the application scene applies the telephone calling method. Specifically, the application of the telephone call method in the application scenario is as follows: for retail scenarios, a corporate configured with a premium telephone will often communicate frequently with upstream and downstream corporate services. Among them, telephone communication is a relatively efficient communication mode. In order to improve the communication efficiency between the group provided with the public fee telephone and the upstream and downstream groups, the public fee telephone resources of the group provided with the public fee telephone can be shared to the upstream and downstream groups through the telephone calling method. Specifically, a call request initiated by a public fee telephone from a second collective is received, the called party identifier of the call request originates from the upstream and downstream of the target and belongs to the first collective, the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs. When the public fee telephone sharing range corresponding to the collective to which the called party identifier belongs is verified to comprise the collective to which the calling party identifier belongs, the public fee call between the calling party identifier and the called party identifier is established, and the public fee telephone resource occupied by the public fee call is deducted from the public fee telephone resource of the collective to which the called party identifier belongs after the call is ended.
Of course, the method is not limited thereto, and the method can be applied to other application scenarios, for example, for product research and development scenarios, involving research and development of a product commonly responsible among different groups, each group being responsible for different research and development tasks. In order to ensure the progress of development tasks, telephone calls among different groups can be realized through the telephone call method so as to improve the communication efficiency among different groups.
The above application scenario is only illustrative, and it is to be understood that the application of the telephone call method provided in the embodiments of the present application is not limited to the above scenario.
In a specific embodiment, as shown in fig. 10, there is provided a telephone call method, which is performed by a server, the telephone call method comprising the steps of:
step 1002, receiving a call request initiated by a public fee phone from a second group, wherein a called party identifier of the call request originates from a target upstream and downstream and belongs to the first group, the call request carries a calling party identifier and a called party identifier called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs.
Step 1004, determining the group to which the calling party identifier belongs and the group to which the called party identifier belongs according to the calling party identifier and the called party identifier respectively.
Step 1006, obtaining the public fee telephone sharing range corresponding to the group to which the caller identification belongs.
Step 1008, query whether the sharing party in the public toll phone sharing scope includes the group to which the called party identification belongs.
Step 1010, when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs includes the group to which the called party identifier belongs, checking whether the shared party in the public fee telephone sharing range corresponding to the group to which the called party identifier belongs includes the group to which the calling party belongs and the calling party identifier.
Step 1012, if it is verified that the shared party in the public fee telephone sharing range includes the group to which the calling party belongs and the calling party identifier, the value of the public fee telephone resource to which the called party identifier belongs is obtained.
Step 1014 queries whether the value of the public telephone resource to which the called party identification belongs is greater than a preset threshold.
Step 1016, when the value is greater than the preset threshold, establishing a public fee call between the caller identification and the callee identification.
Step 1018, deducting the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identification belongs after the call is ended.
In step 1020, when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs does not include the group to which the called party identifier belongs, or when it is verified that the shared party in the public fee telephone sharing range corresponding to the group to which the called party identifier belongs does not include the calling party identifier, or when the value of the public fee telephone resource of the group to which the called party identifier belongs is less than or equal to a preset threshold value, the value of the public fee telephone resource of the group to which the calling party identifier belongs is obtained.
Step 1022, query whether the value of the public telephone resource of the caller identification belonging group is greater than a preset threshold.
Step 1024, when the value is greater than the preset threshold, establishing a public fee call between the caller identification and the callee identification.
Step 1026, deducting the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the caller identification belongs after the call is ended.
Step 1028, rejecting the call request when the value is less than or equal to the preset threshold.
In this embodiment, by receiving a call request initiated using a public toll phone, it is possible to timely know the group to which the caller identification belongs and the group to which the callee identification belongs, which originate from different groups. When the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, the public fee telephone between the calling party identifier and the called party identifier can be established on the basis that the group to which the calling party identifier belongs does not need to additionally configure the public fee telephone and the public fee telephone resource, the group to which the called party identifier belongs is directly taken as a deduction object of the public fee call after the call is received, and the public fee telephone resource occupied by the public fee telephone is deducted from the public fee telephone resource of the group to which the called party identifier belongs. Therefore, under the condition that the collective without the public charge telephone resource has the use authority of the public charge telephone resource of the collective with the telephone resource, the collective without the public charge telephone resource can initiate the public charge telephone call to the collective with the telephone resource at any time and quickly, thereby greatly improving the communication efficiency between different collective.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a telephone calling device for realizing the telephone calling method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitations in one or more embodiments of the phone call device provided below may be referred to above as limitations of the phone call method, and will not be repeated here.
In one embodiment, as shown in fig. 11, there is provided a telephone calling apparatus including: a receiving module 1102 and a setting-up module 1104, wherein:
the receiving module 1102 is configured to receive a call request initiated by using a public fee phone, where the call request carries a calling party identifier and a called party identifier that is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs.
And a building module 1104, configured to build a public fee call between the caller identifier and the callee identifier when it is verified that the public fee telephone sharing range corresponding to the group to which the callee identifier belongs includes the group to which the caller identifier belongs, and deduct the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the callee identifier belongs after the call is ended.
In one embodiment, the establishing module is further configured to, when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identifier belongs includes the group to which the called party identifier belongs, check the public fee telephone sharing range corresponding to the group to which the called party identifier belongs, and if it is checked that the sharing party in the public fee telephone sharing range includes the group to which the calling party belongs and the calling party identifier, establish a public fee call between the calling party identifier and the called party identifier.
In one embodiment, the establishing module is further configured to determine, according to the calling party identifier and the called party identifier, a group to which the calling party identifier belongs and a group to which the called party identifier belongs, respectively; and acquiring a public fee telephone sharing range corresponding to the group to which the calling party identifier belongs, and inquiring whether the sharing party in the public fee telephone sharing range comprises the group to which the called party identifier belongs.
In one embodiment, the establishing module is further configured to query a value of a public fee telephone resource to which the called party identifier belongs; and when the numerical value is larger than a preset threshold value, executing the step of establishing the public fee call between the calling party identifier and the called party identifier.
In one embodiment, the establishing module is further configured to establish a public fee call between the caller identifier and the callee identifier when the sharing party in the public fee telephone sharing range corresponding to the caller identifier does not include the group to which the callee identifier belongs, or when the sharing party in the public fee telephone sharing range corresponding to the group to which the callee identifier belongs is verified to not include the caller identifier, or when the value of the public fee telephone resource of the group to which the callee identifier belongs is less than or equal to a preset threshold, and deduct the public fee telephone resource occupied by the public fee call from the public fee telephone resource of the group to which the caller identifier belongs after the call is ended.
In one embodiment, the establishing module is further configured to query the value of the public fee telephone resource to which the caller identification belongs; when the value is larger than a preset threshold value, executing the step of establishing a public fee call between the calling party identifier and the called party identifier; and rejecting the call request when the value is smaller than or equal to a preset threshold value.
In one embodiment, the telephone calling device further comprises a first sharing module for receiving a sharing request from a first group for sharing the public fee telephone upstream and downstream of the target; analyzing the shared party from the sharing request; when the shared party is verified to originate from the second collective body and the second collective body belongs to the upstream and downstream of the target, adding a public fee telephone in the sharing application of the upstream and downstream of the target; and adding a second group as a shared party in the public fee telephone sharing range corresponding to the first group, and adding the first group as a shared party in the public fee telephone sharing range corresponding to the second group so as to share the public fee telephone resources of the first group to the second group.
In one embodiment, the telephone calling device further comprises a first removal module that receives a cancel request from a first group for the target upstream and downstream shared public fee telephone, or a reject request from a second group for the target upstream and downstream shared public fee telephone; resolving the upstream and downstream of the target from the cancel request or reject request; removing the public fee telephone application from the sharing application at the upstream and downstream of the target; in the case where the second group is included in the target upstream and downstream, the second group is removed from the shared party of the sharing range of the public fee telephone corresponding to the first group, and the first group is removed from the sharing party of the sharing range of the public fee telephone corresponding to the second group.
In one embodiment, the receiving module is configured to receive a call request originating from a second group using a public fee telephone, the called party of the call request identifying that originates upstream and downstream of the target and belongs to the first group.
Based on the same inventive concept, the embodiment of the application also provides a telephone calling device for realizing the telephone calling method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitations in one or more embodiments of the phone call device provided below may be referred to above as limitations of the phone call method, and will not be repeated here.
In one embodiment, as shown in fig. 12, there is provided a telephone calling apparatus comprising: a generating module 1202 and a transmitting module 1204, wherein:
a generating module 1202, configured to generate a call request carrying a caller id and a callee id in response to a triggering operation of initiating a call using a public fee phone; the group to which the calling party identification belongs is different from the group to which the called party identification belongs.
And the sending module 1204 is used for sending a call request to the server, so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
In one embodiment, the generating module is further configured to display the upstream address book and the downstream address book in an instant messaging application logged in with the caller id; and responding to the triggering operation of calling the contact person in the upstream and downstream address books by using the public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier by using the contact person.
In one embodiment, the telephone calling device further comprises a second sharing module, wherein the second sharing module is used for displaying the upstream and downstream in the instant messaging application logged in by the account belonging to the first group; responding to the triggering operation of the second collective shared public fee telephone in the upstream and downstream of the target, and sending a sharing request of the second collective shared public fee telephone in the upstream and downstream of the target; and adding the public fee telephone application in the sharing application list at the upstream and downstream of the target to share the public fee telephone resources of the first group to the second group.
In one embodiment, the telephone calling device further comprises a second removing module, wherein the second removing module is used for responding to a trigger operation of the second collective shared public fee telephone in the upstream and downstream of the target to cancel the shared public fee telephone and sending out a cancellation request of the second collective shared public fee telephone in the upstream and downstream of the target; and removing the public fee telephone application from the shared application list at the upstream and downstream of the target to cancel sharing of the public fee telephone resources of the first group to the second group.
Each of the above-described two telephone call apparatuses may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal or a server as shown in fig. 1, and an internal structure diagram thereof may be as shown in fig. 13. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a telephone call method.
It will be appreciated by those skilled in the art that the structure shown in fig. 13 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (18)

1. A method of telephone calling, the method comprising:
receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs;
when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, a public fee call between the calling party identifier and the called party identifier is established, and after the call is ended, the public fee telephone resources occupied by the public fee call are deducted from the public fee telephone resources of the group to which the called party identifier belongs.
2. The method of claim 1, wherein establishing a public fee call between the caller identification and the callee identification when it is verified that the public fee telephone sharing range to which the callee identification belongs includes the group to which the caller identification belongs comprises:
and when the sharing party in the public fee telephone sharing range corresponding to the collective to which the calling party identification belongs comprises the collective to which the called party identification belongs, checking the public fee telephone sharing range corresponding to the collective to which the called party identification belongs, and if the shared party in the public fee telephone sharing range comprises the collective to which the calling party belongs and the calling party identification, establishing the public fee call between the calling party identification and the called party identification.
3. The method according to claim 2, wherein the method further comprises:
according to the calling party identifier and the called party identifier, determining a collective to which the calling party identifier belongs and a collective to which the called party identifier belongs respectively;
and acquiring a public fee telephone sharing range corresponding to the collective group to which the calling party identification belongs, and inquiring whether the sharing party in the public fee telephone sharing range comprises the collective group to which the called party identification belongs.
4. The method of claim 2, wherein prior to establishing a public fee call between the caller identification and the callee identification, the method further comprises:
inquiring the value of public fee telephone resources of a group to which the called party identification belongs;
and when the numerical value is larger than a preset threshold value, executing the step of establishing the public fee call between the calling party identifier and the called party identifier.
5. The method according to claim 1, wherein the method further comprises:
when the sharing party in the public fee telephone sharing range corresponding to the group to which the calling party identification belongs does not comprise the group to which the called party identification belongs, or when the sharing party in the public fee telephone sharing range corresponding to the group to which the called party identification belongs is verified to not comprise the calling party identification, or when the value of the public fee telephone resource of the group to which the called party identification belongs is smaller than or equal to a preset threshold value, then
And establishing a public fee call between the calling party identifier and the called party identifier, and deducting public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the calling party identifier belongs after the call is ended.
6. The method of claim 5, wherein prior to establishing a public fee call between the caller identification and the callee identification, the method further comprises:
inquiring the value of the public fee telephone resource of the group to which the calling party identification belongs;
executing the step of establishing a public fee call between the calling party identifier and the called party identifier when the numerical value is greater than a preset threshold value;
and rejecting the call request when the numerical value is smaller than or equal to a preset threshold value.
7. The method according to claim 1, wherein the method further comprises:
receiving a sharing request from a first collective for sharing the public fee telephone upstream and downstream of the target;
analyzing the shared party from the sharing request;
adding the public fee telephone in a sharing application upstream and downstream of the target when the shared party is verified to originate from a second collective and the second collective belongs to the upstream and downstream of the target;
and adding the second group as a shared party in the public fee telephone sharing range corresponding to the first group, and adding the first group as a shared party in the public fee telephone sharing range corresponding to the second group so as to share the public fee telephone resources of the first group to the second group.
8. The method of claim 7, wherein the method further comprises:
receiving a cancel request from a first group for the target upstream and downstream shared public fee telephone, or receiving a reject request from a second group for the target upstream and downstream shared public fee telephone;
parsing the target upstream and downstream from the cancel request or reject request;
removing the public fee telephone application from the sharing application at the upstream and downstream of the target;
in the case where a second group is included in the upstream and downstream of the target, the second group is removed from the shared party of the shared range of the public fee telephone corresponding to the first group, and the first group is removed from the shared party of the shared range of the public fee telephone corresponding to the second group.
9. The method of claim 7, wherein the call request initiated using the public fee telephone comprises:
a call request initiated using a public fee telephone originating from a second group is received, a called party of the call request identifying a call originating upstream and downstream of the target and belonging to the first group.
10. A method of telephone calling, the method comprising:
responding to the triggering operation of calling by using the public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier; the group to which the calling party identifier belongs is different from the group to which the called party identifier belongs;
And sending the call request to a server, so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
11. The method of claim 10, wherein generating a call request carrying the caller identification and the callee identification in response to a trigger to initiate a call using a public fee telephone comprises:
displaying an upstream address book and a downstream address book in an instant messaging application logged in by a calling party identifier;
and responding to a triggering operation of calling the contact person in the upstream and downstream address books by using a public fee telephone, and generating a call request carrying the calling party identifier and the called party identifier by using the contact person.
12. The method according to claim 10, wherein the method further comprises:
displaying upstream and downstream in an instant messaging application logged in by an account belonging to a first group;
Responding to the triggering operation of the second collective shared public fee telephone in the upstream and downstream of the target, and sending a sharing request of the second collective shared public fee telephone in the upstream and downstream of the target;
and newly adding the public fee telephone application in the sharing application list at the upstream and downstream of the target so as to share the public fee telephone resources of the first group to the second group.
13. The method according to claim 12, wherein the method further comprises:
responding to a trigger operation for canceling the shared public fee telephone of the second group in the upstream and downstream of the target, and sending a cancellation request for canceling the shared public fee telephone of the second group in the upstream and downstream of the target;
and removing the public fee telephone application from the shared application list at the upstream and downstream of the target to cancel sharing of the public fee telephone resources of the first group to the second group.
14. A telephone call apparatus, the apparatus comprising:
the receiving module is used for receiving a call request initiated by using a public fee telephone, wherein the call request carries a calling party identifier and a called party identifier which is called, and the group to which the called party identifier belongs is different from the group to which the calling party identifier belongs;
And the establishing module is used for establishing the public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducting the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
15. A telephone call apparatus, the apparatus comprising:
the generation module is used for responding to the triggering operation of calling initiated by using the public fee telephone and generating a call request carrying the calling party identifier and the called party identifier; the group to which the calling party identifier belongs is different from the group to which the called party identifier belongs;
and the sending module is used for sending the call request to the server so that the server establishes a public fee call between the calling party identifier and the called party identifier when the public fee telephone sharing range corresponding to the group to which the called party identifier belongs is verified to comprise the group to which the calling party identifier belongs, and deducts the public fee telephone resources occupied by the public fee call from the public fee telephone resources of the group to which the called party identifier belongs after the call is ended.
16. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 13 when the computer program is executed.
17. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 13.
18. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any one of claims 1 to 13.
CN202210957073.4A 2022-08-10 2022-08-10 Telephone calling method, device, computer equipment and storage medium Pending CN117640833A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210957073.4A CN117640833A (en) 2022-08-10 2022-08-10 Telephone calling method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210957073.4A CN117640833A (en) 2022-08-10 2022-08-10 Telephone calling method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117640833A true CN117640833A (en) 2024-03-01

Family

ID=90022052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210957073.4A Pending CN117640833A (en) 2022-08-10 2022-08-10 Telephone calling method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117640833A (en)

Similar Documents

Publication Publication Date Title
US20180359200A1 (en) System and method for facilitating the growth of a mobile community
EP3075177B1 (en) Method, apparatus and device for exchanging name card
CN109005098B (en) Task reminding method and device, and reminding message generating and displaying method and device
CA3062580A1 (en) An enterprise group establishing method and computer device in an instant messaging system
CN111669311A (en) Communication method, communication device, communication system, electronic equipment and readable storage medium
KR20060094855A (en) Method and system for locating contact information collected from contact sources
KR20060094853A (en) Method and system for aggregating contact information from multiple contact sources
US20090138552A1 (en) Apparatus and method for managing communication between parties
CN112073289B (en) Instant messaging control method and device
CN109104406B (en) Online customer service management method and device, server and storage medium
CN109510758B (en) Session establishing method, terminal and system
CN118104218A (en) Integrated workspace on a communication platform
CN113746722B (en) Information processing method, device, equipment and storage medium
CN110311855B (en) User message processing method and device, electronic equipment and storage medium
CN110784517B (en) Service application integration method, system, terminal and storage medium based on block chain
CN109756348B (en) Batch calling method and device
CN111934991B (en) Service processing method, system, electronic device and storage medium
US8331543B2 (en) Resynchronization of call events after trigger event
CN117640833A (en) Telephone calling method, device, computer equipment and storage medium
CN114254278A (en) User account merging method and device, computer equipment and storage medium
US10542132B2 (en) Updating contact details for communications
CA2887396C (en) System and method for machine-to-machine privacy and security brokered transactions
CN116662016B (en) Port switching method, device, computer equipment, storage medium and program product
CN106488412B (en) Communication service control method, system, server and client
US20130117458A1 (en) Build a Person from Multiple Contacts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination