WO2017202386A1 - 信息更新的方法、装置以及服务器 - Google Patents

信息更新的方法、装置以及服务器 Download PDF

Info

Publication number
WO2017202386A1
WO2017202386A1 PCT/CN2017/086278 CN2017086278W WO2017202386A1 WO 2017202386 A1 WO2017202386 A1 WO 2017202386A1 CN 2017086278 W CN2017086278 W CN 2017086278W WO 2017202386 A1 WO2017202386 A1 WO 2017202386A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
account
interface
instruction
identity information
Prior art date
Application number
PCT/CN2017/086278
Other languages
English (en)
French (fr)
Inventor
黎翠霞
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to MYPI2018701658A priority Critical patent/MY192880A/en
Priority to KR1020187013321A priority patent/KR102108882B1/ko
Priority to JP2018526694A priority patent/JP6560453B2/ja
Publication of WO2017202386A1 publication Critical patent/WO2017202386A1/zh
Priority to US16/005,296 priority patent/US10880398B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/386Payment protocols; Details thereof using messaging services or messaging apps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2358Change logging, detection, and notification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Definitions

  • the present application relates to the field of the Internet, and in particular, to a method, an apparatus, and a server for updating information.
  • one user is allowed to initiate a message or resource transfer to another user, and a user is also allowed to initiate an event to a user group.
  • a user initiates a chat with a friend, and initiates certain events (such as red packets) to the friend in a separate chat interface with the friend.
  • the user initiates a chat group with multiple friends, and the user initiates certain events in the chat group (such as commenting or praising a friend's comments in the group).
  • the user in the chat interface can see which user initiated the event.
  • the user who initiated the event does not want other users to know the identity of the user who initiated the event. For example, when a user donates a charity, they don't want to leave their name.
  • the prior art is not capable of initiating an event with an anonymous identity.
  • the embodiment of the present application provides a method, an apparatus, and a server for updating information to solve at least the technical problem that the event cannot be initiated in an anonymous identity in the prior art.
  • a method for updating information includes: The first interface receives the first command, where the terminal logs in through the first account, the first instruction is used to perform a preset event on the first information, and the second account is displayed in the first interface.
  • the first information is displayed; the terminal displays the second interface in response to the first instruction, wherein the second interface displays the identity information of the first account, and the identity information of the first account is in an editable state;
  • the displayed identity information of the first account is updated to the target information.
  • a method for updating information includes: receiving, by the server, an identity information replacement request for instructing replacement of identity information of the first account with the target information, where the identity information
  • the replacement request is sent by the terminal that logs in the first account through the second interface, and the second interface is displayed after receiving the first instruction on the first interface of the terminal, where the first instruction is used to indicate that the preset event is performed on the first information.
  • the first information displayed by the second account is displayed in the first interface, and the identity information of the first account is displayed in the second interface, where the identity information of the first account is in an editable state;
  • the server generates the target information according to the identity information replacement request; the server sends the target information to a terminal that logs in to the first account.
  • an apparatus for updating information includes: a first receiving unit, configured to receive a first instruction on a first interface of the device, where the device passes the first account Logging in, the first instruction is used to indicate that a preset event is performed on the first information, the first information is displayed in the first interface, and the first display unit is configured to respond to the first instruction.
  • Displaying a second interface wherein the second interface displays identity information of the first account, the identity information of the first account is in an editable state, and the second receiving unit is configured to be in the second interface
  • Receiving a second instruction wherein the second instruction is used to indicate that the identity information of the first account is replaced with target information; and the first updating unit is configured to display the second interface according to the second instruction The identity information of the first account is updated to the target information.
  • a server including: a receiving module, configured to receive an identity information replacement request for instructing to replace identity information of a first account with target information, where the identity
  • the information replacement request is sent by the terminal that logs in the first account through the second interface, and the second interface is displayed after receiving the first instruction on the first interface of the terminal, where the first instruction is used to indicate that the preset event is performed on the first information. Displaying the first information posted by the second account in the first interface, The second interface displays the identity information of the first account, where the identity information of the first account is in an editable state, and the first generating module is configured to generate, by the server, the request according to the identity information replacement request.
  • the sending module is configured to send, by the server, the target information to a terminal that logs in to the first account.
  • the identity information displayed on the second interface is editable, that is, the identity information of the first account may be changed to other identity information, thereby realizing hiding the true identity information of the first account.
  • the purpose is to achieve the technical effect of initiating an event with an anonymous identity, thereby solving the technical problem in the prior art that the event cannot be initiated with an anonymous identity.
  • FIG. 1 is a schematic diagram of a hardware architecture of a method for updating an application information according to an embodiment of the present application
  • FIG. 2 is a flowchart of a method of information update according to an embodiment of the present application.
  • FIG. 3 is a flowchart of a method for updating information according to another embodiment of the present application.
  • FIG. 4 is a schematic diagram of a first interface of a terminal according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a second interface of a terminal according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of using an anonymous identity information for a second interface of a terminal according to an embodiment of the present application
  • FIG. 7 is a schematic diagram of a second interface of a terminal replacing a red envelope amount according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of adding a comment to a second interface of a terminal according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a second interface input payment password of a terminal according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of an interface prompting a reward of a terminal according to an embodiment of the present application.
  • FIG. 11 is a schematic diagram of an interface after an anonymous comment is successful according to an embodiment of the present application.
  • FIG. 12 is a schematic diagram of an interface for a terminal to view identity information of a first account according to an embodiment of the present application
  • FIG. 13 is a schematic diagram of an apparatus for updating information according to an embodiment of the present application.
  • FIG. 14 is a schematic diagram of a server for implementing a method of information update according to an embodiment of the present application
  • 15 is a schematic diagram of a terminal for implementing a method of information update according to an embodiment of the present application.
  • an embodiment of a method that can be performed by an embodiment of the apparatus of the present application is provided. It is noted that the steps illustrated in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions. The execution is performed, and although the logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in a different order than the ones described herein.
  • a method of information update is provided.
  • the method for updating the information may be applied to a hardware environment formed by the terminal 102 and the server 104 as shown in FIG. 1 .
  • the terminal 102 is connected to the server 104 through a network.
  • the network includes but is not limited to: a mobile communication network, a wide area network, a metropolitan area network, or a local area network.
  • the terminal 102 may be a mobile phone terminal, or may be a PC terminal or a notebook terminal. Or a tablet terminal.
  • the first interface of the terminal is displayed on the terminal 102, and the first instruction is received on the first interface of the terminal, where the first instruction is used to indicate that the preset event is performed on the first information, and the first interface is displayed in the first interface. a message.
  • Terminal 102 sends the first command to server 104.
  • the server 104 generates a second interface according to the first instruction, and transmits information of the second interface to the terminal 102.
  • the terminal 102 receives the second interface sent by the server 104 and displays the received second interface.
  • the identity information of the first account is displayed in the second interface, and the identity information of the first account is in an editable state.
  • the second interface displayed on the terminal 102 receives the second instruction, where the second instruction is used to indicate that the identity information of the first account is replaced with the target information.
  • the target information may be input by the user on the second interface, or may be automatically generated by the server 104.
  • the server 104 transmits the target information to the terminal 102 to display the target information on the second interface on the terminal 102, thereby completing updating the identity information on the second interface to the target information. .
  • the identity information displayed on the second interface is editable, that is, the identity information of the first account may be changed to other identity information, thereby realizing hiding the true identity information of the first account.
  • the object is to solve the technical problem that the event cannot be initiated by an anonymous identity in the prior art, and achieve the technical effect of initiating an event with an anonymous identity.
  • the second interface may be submitted to execute the preset event, and the changed target information is displayed on the first interface after the preset event is executed. Therefore, the account other than the first account (including the second account) cannot know the real identity information of the first account.
  • the terminal that logs in to the first account and the terminal that logs in to the second account may be the same terminal, or may be different terminals.
  • the target information cannot be viewed on the first account corresponding interface of the terminal, and the identity information of the first account cannot be viewed.
  • the identity information of the first account cannot be viewed by clicking the target information.
  • the terminal that logs in to the first account and the terminal that logs in to the second account are different terminals. It is assumed that the terminal that is logged in to the first account is the terminal A, and the terminal that is logged in to the second account is the terminal B. At this time, both the terminal A and the terminal B run an application that can perform the method for updating the information provided by the embodiment of the present application.
  • An account and a second account are both accounts of the application, when the first account is to the second account
  • clicking the target information on the interface of the terminal A cannot view the identity information of the first account
  • clicking the target information on the interface of the terminal B cannot view the identity information of the first account.
  • the target information may also be restored to the identity information of the first account.
  • the prompt information is displayed on the second interface to prompt whether the identity information of the first account is in a hidden state.
  • the first prompt information is displayed on the second interface, where the first prompt information is used to indicate the identity information of the first account.
  • the second prompt information is displayed on the second interface, where the second prompt information is used to indicate The identity information of an account is viewable.
  • the first account displayed on the second interface after receiving the second instruction on the second interface, detecting whether the second instruction carries the target information, and if detecting that the second instruction carries the target information, the first account displayed on the second interface according to the second instruction
  • the identity information is updated to the target information; if it is detected that the second instruction does not carry the target information, the second instruction is sent to the server; the receiving server responds to the target information generated by the second instruction, wherein the server randomly selects the target information group
  • the first packet is extracted, and one identity information is randomly extracted from the first packet as the target information, and the identity information of the first account displayed on the second interface is updated to the target information.
  • the target information may be input by the user or automatically generated by the server.
  • the user can input the target information to customize the customized target information, and the server can provide a plurality of target information to be selected, so that the user can select the target information to be used according to the washing, thereby increasing the flexibility of the application.
  • the preset event is a transfer resource.
  • the value of the resource to be transferred sent by the server may be used, or the value of the resource to be transferred may be edited by the user of the first account.
  • sending a first instruction to the server where the first instruction is used to indicate that the preset event is performed on the first information; and the value of the resource to be transferred sent by the receiving server in response to the first instruction is
  • the value of the resource to be transferred is displayed on the second interface, wherein the value of the resource to be transferred is in an editable state.
  • the preset event is a transfer resource
  • the interaction behavior information according to the first account and the second account is Generate the value of the resource to be transferred.
  • the server After receiving the first instruction, the server detects the interaction behavior information between the first account and the second account in the preset time period; the server generates the value of the resource to be transferred according to the interaction behavior information, and sends the value of the resource to be transferred to the second terminal. interface.
  • the value of the to-be-transferred resource is greater than or equal to the first value, and the value of the generated resource to be transferred is less than the first value if the interaction behavior information does not satisfy the preset condition.
  • the first account can transfer resources and messages to the second account at the same time.
  • the first account and the second account may be accounts of an instant messaging application and a social platform such as Weibo.
  • the preset event may be an operation performed on an account or an account to post information, such as a red envelope, a comment, a like, a donation, and the like.
  • the first information is information published by the second account, including text, pictures, voice, and video.
  • the first information is displayed on the interface of the terminal that has logged in the first account.
  • the target information may be identity information, for example, an image of a star, a name, or an image of a certain landscape and its name, or an image of an animal and its name, and the like.
  • the target information may not represent the real identity information of the first account, and the real identity information may be registration information corresponding to the account, for example, the registered account name, the registered account avatar, and the like.
  • the resource to be transferred may be a red envelope, and the value of the resource to be transferred may be the amount of the red envelope to be sent.
  • the resource to be transferred may also be a certain virtual currency, and the value of the resource to be transferred may be the number of virtual coins to be transferred.
  • the first prompt information is displayed on the second interface, to prompt the user that the identity information is hidden, and the other person cannot view the identity information of the first account except the user himself, therefore, other people Unable to know the identity information of the first account.
  • the second prompt information is displayed on the second interface to prompt the user that the identity information is in a viewable state, and the other person clicks the user avatar to view the identity information of the user.
  • the background color of the second interface changes from red to green, and the second interface displays “You are now in an anonymous state, and others cannot view your Identity information”
  • the background color of the second interface changes from green to red, and the second interface displays "you Now in a non-anonymous state, others can view your identity information.”
  • the server stores a plurality of sets of identity information (the plurality of sets of identity information is the preset identity information packet), each group of identity information includes multiple identity information, and when the server receives the identity information replacement request sent by the terminal that logs in to the first account, Thereafter, a group (ie, the first packet described above) is randomly extracted from the plurality of sets of identity information, and one identity information is randomly extracted from the first packet as the target information.
  • a group ie, the first packet described above
  • the user may send a third instruction to switch the target information back to the identity information of the first account.
  • the server sends a target information different from the previous target information to the user terminal for display as new identity information.
  • the server stores the preset identity information group.
  • the server stores a list of 100 popular stars. Among the 100 stars, there are 50 male stars and 50 female stars. The 100 stars are divided into 5 groups (Group A, Group B, Group C, Group D, Group E), with 10 male stars and 10 female stars in each group. If it is detected that the second instruction does not carry the target information, the second instruction is sent to the server.
  • the server randomly extracts one group from the five groups of group A, group B, group C, group D, and group E, and assumes that group B is randomly extracted, and an identity information is randomly extracted from group B, assuming Randomly extracted is the information of the star B5, the information of the star B5 is taken as the target information, the server sends the information of the star B5 to the client, and the user can see the avatar and name of the star B5 in the second interface of the terminal. If the user is not satisfied with the target information, the server randomly extracts one identity information from the remaining 9 stars in the B group as the target information, and if the user is still not satisfied with the target information, randomly from the remaining 8 stars in the B group. Extract an identity information as the target information.
  • a group is randomly selected from the 4 groups of group A, group C, group D, and group E (assuming that the group E is extracted), and randomly extracted from the group E.
  • An identity information is used as the target information, and so on. If the identity information of 100 stars has been extracted, then the identity information is randomly extracted from the B group as the target information, and the above process is repeated until the user selects a target information.
  • the target information may not be switched back to the identity information of the first account, and when the user continues to click the identity information of the first account, the server A target information different from the previous target information is sent to the user's terminal for display as new identity information.
  • a plurality of different color avatars may be set as target information, or The background of the avatar is set to a different color, and each time a random color is selected and sent to the user.
  • the user can select the favorite target information, increase the user's selection range, and increase the diversity and selectivity of the display content.
  • the first account can transfer resources to other accounts anonymously, and the first account is anonymously transferred to the second account as an example for description.
  • the terminal that has logged in to the first account displays the first interface, and the terminal sends a first instruction to the server, where the first instruction includes information for transferring the resource to the second account, and after receiving the first instruction, the server sends the value of the resource to be transferred to the terminal.
  • the terminal displays a second interface, and the second interface displays the value of the resource to be transferred, and the value is in an editable state. The user can directly use the value of the resource to be transferred generated on the second interface of the terminal, or click the value to edit.
  • the value of the resource to be transferred sent by the server to the terminal may be determined in multiple ways. For example, the value of the resource to be transferred is randomly confirmed within a given range of values; the value of the resource to be transferred is determined according to the degree of intimacy between the accounts. Optionally, in this embodiment, the value of the resource to be transferred is determined according to the intimacy of the first account and the second account.
  • the server detects the interaction behavior information of the first account and the second account in the preset time period, and determines whether the relationship between the owner of the first account and the owner of the second account is intimate. Interactive behaviors include chat, comments, likes, red packets, and more.
  • the first account and the second account interact more in the preset time period, the relationship between the owner of the first account and the owner of the second account is relatively close. At this time, the first account is transferred to the second account.
  • the value of the resource to be transferred generated by the server is large; if the interaction between the first account and the second account is small, the relationship between the owner of the first account and the owner of the second account is relatively distant. In the process of transferring resources to the second account by the first account, the value of the resource to be transferred generated by the server is small.
  • the server can randomly select from the four red packets of 1.22 yuan, 1.55 yuan, 1.69 yuan, 1.88 yuan.
  • the random amount X will increase to satisfy the condition of 1 yuan ⁇ X ⁇ 2 yuan, and the server can be from 1.22 yuan, 1.55 yuan, 1.69 yuan, 1.88 yuan.
  • One of the four red packets is randomly selected for the mobile phone of Xiao Ming.
  • the server detects the interaction behavior information between the first account and the second account in the preset time period, generates the value of the resource according to the interaction behavior information, and conforms to the expectation of the value of the resource that the user wants to transfer, so that the displayed value meets the requirements of the user, and improves The accuracy of the push value.
  • the first account can anonymously comment on the first information posted by the second account, and can also transfer resources and messages to the second account.
  • the second interface of the terminal that has logged in to the first account displays the target information.
  • the user can input the message, transfer the resource, and when the first account transfers the resource or message to the second account.
  • the interface of the terminal that has logged in the first account is switched from the second interface to the first interface.
  • the message information, the value of the transferred resource, and the target information are displayed on the first interface.
  • the message of the first account, the value of the transferred resource, and the target information can be seen. Since the identity information of the first account is not allowed to be viewed, The account other than the first account cannot know the identity information of the first account. In this way, the first account can initiate an event anonymously, protect the privacy of the first account, and ensure information security.
  • the method for updating information mainly includes steps 101-107.
  • Step 101 The terminal receives a first instruction for the first information on the first interface.
  • the first instruction is used to indicate that a preset event is performed on the first information.
  • the first information published by the second account is displayed in the first interface.
  • Step 102 The terminal sends a first instruction to the server.
  • Step 103 The server generates a second interface according to the first instruction.
  • Step 104 The server sends the second interface information to the terminal.
  • step 105 the terminal displays the second interface.
  • the second interface displays the identity information of the first account, and the identity information of the first account is in an editable state.
  • Step 106 The terminal accepts the second instruction on the second interface, and determines whether the second instruction includes the target information.
  • the second instruction is used to indicate that the identity information of the first account is replaced with the target information.
  • Step 106 also includes steps 1061-1063.
  • Step 1061 When the second instruction does not include the target information, the terminal sends the second instruction to the server.
  • Step 1062 The server generates target information in response to the second instruction sent by the terminal.
  • step 1063 the server sends the generated target information to the terminal.
  • Step 107 The terminal replaces the identity information of the first account with the target information.
  • the terminal replaces the identity information of the first account with the target information carried by the second command, and if the second command does not carry the target information, the identity information of the first account is replaced by the server. Target information.
  • FIG. 3 is a flowchart of a method for updating information according to another embodiment of the present application.
  • the method for updating information provided by the embodiment of the present application is specifically described below with reference to FIG. 3, as shown in FIG. Including the following steps:
  • step S202 it is determined that the user A clicks on the "red envelope".
  • the terminal of user A logs in to the first account, and the terminal of user B logs in to the second account.
  • the terminal of user A logs in to the first account
  • the terminal of user B logs in to the second account.
  • an icon of "red envelope” on the first interface of the terminal of the user A.
  • user A clicks the icon of the "red envelope" on the first interface of the terminal, and the interface of the terminal of user A is converted from the first interface to the second interface, and the second interface is as shown in FIG. Show.
  • step S204 it is determined whether the relationship between the user A and the user B is intimate. If the result of the determination is yes, step S206 is performed; if the result of the determination is no, step S208 is performed.
  • the frequency of the user A and the user B chatting, praising, or commenting it is determined whether the relationship between the user A and the user B is intimate, and the generated random amount is determined according to the degree of intimacy. If it is determined that the relationship between user A and user B is relatively intimate, the generated random amount is large; if it is determined that the relationship between user A and user B is relatively distant, the generated random amount is small.
  • the red packet amount is displayed to be greater than 1 yuan and less than 2 yuan. If it is determined that the relationship between user A and user B is relatively intimate, the generated random amount is between 1 and 2 yuan. For example, if it is determined that the relationship between user A and user B is relatively close, the generated random amount is 1.69 yuan, as shown in FIG. In Fig. 5, it can be seen that there is a line of words “change amount” under "1.69 yuan”. If User A clicks on this line, "1.69 yuan" will be updated to another amount.
  • step S208 the red packet amount is displayed to be less than 1 yuan. If it is determined in step S204 that the relationship between user A and user B is relatively distant, the generated random amount is less than one yuan.
  • step S210 it is determined whether the user A chooses to be anonymous. If the result of the determination is yes, step S212 is performed; if the result of the determination is no, step S214 is performed.
  • Step S212 assigning a name and an image according to an anonymous name and an avatar assignment rule.
  • an anonymous name and an avatar assignment rule As shown in FIG. 5, under the avatar of the first account, there is a line of words "Click the avatar to be anonymous". If user A clicks on the line, the avatar of user A of the second interface of the terminal will be replaced with a star avatar (for example, the avatar of star W), and "Anonymous for W" is displayed below the avatar. If the user does not like the star W, he can click on the star of the star W. At this time, the avatar of the star W is replaced with the identity information of the first account.
  • the identity information of the first account is replaced with Another star's avatar (such as the star L's avatar), and the avatar below shows "already anonymous.” If user A is still not satisfied, click on the avatar of star L. At this time, the avatar of star L is replaced with the identity information of the first account. If the user continues to click the identity information of the first account, the identity information of the first account is replaced with Other star avatars until the user is satisfied. For example, as shown in FIG. 6, the avatar of the user A of the second interface of the terminal is replaced with the avatar of the star XX, and the avatar is displayed as "anonymized as XXX".
  • step S214 it is determined whether the user A clicks "change amount". If the result of the determination is yes, step S216 is performed; if the result of the determination is no, step S218 is performed. If the user is not satisfied with the amount of the red envelope, he can click "Change Amount" in the interface shown in Figure 6.
  • Step S216 the user A is matched with the red packet amount according to the amount random rule. If the user clicks the "change amount" in the interface as shown in FIG. 6, the user A is matched with the red packet amount according to the principle of more sparseness, specifically, if the user A and the user B are determined in step S204. If the relationship is relatively intimate, randomly select one of several large red envelope amounts to display to user A. If it is determined in step S204 that the relationship between the user A and the user B is relatively distant, one of the several smaller red packets is randomly selected and displayed to the user A.
  • step S204 For example, if it is determined in step S204 that the relationship between user A and user B is relatively close Confidential, randomly select one of 1.22 yuan, 1.55 yuan, 1.69 yuan, 1.88 yuan to display to user A. If it is determined in step S204 that the relationship between the user A and the user B is relatively distant, one of the 0.33 yuan, 0.55 yuan, 0.66 yuan, and 0.88 yuan is randomly selected and presented to the user A. It is assumed that the relationship between user A and user B is relatively close in step S204, and 1.88 yuan is randomly selected as the red envelope amount to be displayed to user A. As shown in FIG. 7, the red packet amount is updated to 1.88 yuan.
  • step S2128 it is determined whether the user A adds a comment. If the result of the determination is yes, step S220 is performed; if the result of the determination is no, step S222 is performed.
  • User A can click on the " ⁇ " box in the interface shown in Figure 7 to add a comment. For example, after user A clicks on the " ⁇ " box in the interface as shown in FIG. 7, the interface is replaced with an interface as shown in FIG. 8, and user A can input a comment.
  • user A fills in the comment message "Goddess, you are beautiful, love you ⁇ ".
  • Step S220 receiving the comment information filled in by the user A.
  • Step S222 password verification.
  • the interface is switched to the interface as shown in FIG. 8.
  • User A can enter a payment password on this interface.
  • the entered payment password is sent to the payment server, and after the payment server verifies that the payment password is correct, the payment operation is completed, and the "payment successful" interface is returned to the terminal.
  • step S224 it is confirmed that the user A sends a red envelope to the user B successfully.
  • the terminal receives the “payment success” interface returned by the payment server, and displays the interface shown in FIG. 10 (ie, the interface for successful payment) to the user A, and the “display success” is displayed on the interface.
  • the prompt box after a few seconds, the prompt box disappears, and the red envelope icon appears.
  • the "Anonymous ( ⁇ )” appears on the right side of the red envelope icon, and the "Anonymous ( ⁇ )” comment appears below.
  • the prompt "The current user has been anonymously unable to view his information" appears, as shown in FIG.
  • the user can initiate an event anonymously, and achieves the technical effect of protecting the privacy of the user and ensuring the security of the user's information.
  • Xiao Zhang and Kiki are friends.
  • Xiao Zhang is very concerned about the dynamics of kiki's QQ space. Every time kiki sends a new dynamic, Xiao Zhang will comment or like, but Xiao Zhang does not want others to know that he is secretly kiki.
  • Xiao Zhang can make comments or points on the dynamics of kiki.
  • Like anonymity The specific scene is as follows:
  • Kiki sent a photo of himself in his QQ space (the first information released by the second account).
  • the QQ client of Xiao Zhang’s computer shows that kiki has new dynamics.
  • Xiao Zhang enters the QQ client and sees kiki.
  • a photo the first information posted by the second account displayed in the first interface of the terminal
  • Xiao Zhang sends a first instruction to the server, and the first instruction is used to comment on the photo of kiki (the photo of the comment kiki is the above-mentioned first information) Execute a preset event).
  • Xiao Zhang's computer displays an editable interface (second interface), on which is displayed a small piece of identity information.
  • Xiao Zhang clicks on the interface to send a second command to the server, the server receives the second command, and sends the image and name of the star A to the computer of Xiao Zhang.
  • the identity information of Xiao Zhang is replaced with the star A. Image and name.
  • Kiki can see Xiao Zhang's comments and star A's images on his QQ client, but he can't know the identity of the commenter.
  • others can only see the content of the comment, but can't know the commenter. The identity, thus achieving the technical effect of anonymous comments or praise.
  • Xiaohu posted the text of the call for donation on his own Weibo (the first information released by the second account)
  • Xiao Wang saw the text of the call for donation issued by Xiaohu on his Weibo (the first interface of the terminal)
  • the first information published in the second account is displayed.
  • Xiao Wang sends a first instruction to the server, and the first instruction is used to donate to Xiao Hu (the donation to Xiao Hu is the execution of the preset event for the first information) .
  • the server generates a second interface according to the first instruction, and sends the information of the second interface to the Xiaowang mobile phone.
  • Xiao Wang’s mobile phone displays an editable interface (second interface), in which Xiao Wang’s identity information and donation information are displayed.
  • Xiao Wang clicks on the interface to send a second command to the server, the server receives the second command, sends the image and name of the star B to the mobile phone of Xiao Wang, and the amount of the donation randomly generated, and the identity information of Xiao Wang on the second interface of the terminal Change to the image and name of Star B and display the donation amount. If Xiao Wang is not satisfied with the donation amount, he can edit the donation amount. Xiao Wang can also edit the message information.
  • the information update method provided by the embodiment of the present application can anonymously comment, reply, and like a message of a member in a group.
  • the group may be a WeChat group, a QQ group, or the like.
  • An anonymous comment on a member's message is given as an example.
  • a and B send a message in the WeChat group to "ride the bike together on the weekend! (the first information posted by the second account).
  • A logs in to his account on his mobile phone and sees the message posted by B in the WeChat group (the first information posted by the second account displayed in the first interface of the terminal).
  • An instruction to comment on the message issued by B (commenting the message issued by B is the above-mentioned execution of the preset event for the first message).
  • the server generates a second interface according to the first instruction, and sends the information of the second interface to the mobile phone of the A.
  • A's mobile phone displays an editable interface (second interface), on which is displayed the identity information of A.
  • the identity information of A on the second interface of A mobile phone is replaced with the image and name of Star B, and A can also comment on the B-mail message on the second interface. For example, in the second interface, the content of the comment on the message sent by B is "This suggestion is good! When the comment is completed, the people in the group can see the message to B on the WeChat group.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present application which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present application.
  • the information update device is mainly used to perform the method for updating the information provided by the foregoing content in the embodiment of the present application.
  • FIG. 13 is a schematic diagram of an apparatus for updating information according to an embodiment of the present application. As shown in FIG. 13, the apparatus for updating the information mainly includes:
  • a first receiving unit 1302 configured to receive a first instruction for the first information on the first interface of the device, where the device is logged in by using a first account, where the first instruction is used to indicate the A message executes a preset event, the first information is issued by the second account, and displayed on the first interface.
  • the first display unit 1304 is configured to display the second interface in response to the first instruction, where the identity information of the first account is displayed in the second interface, and the identity information of the first account is in an editable state.
  • the second receiving unit 1306 is configured to receive the second instruction on the second interface, where the second instruction is used to indicate that the identity information of the first account is replaced with the target information.
  • the first updating unit 1308 is configured to update the identity information of the first account displayed on the second interface to the target information according to the second instruction.
  • the device further includes: a third receiving unit, configured to: after the first update unit updates the identity information of the first account displayed on the second interface to the target information according to the second instruction, receive the second interface And a third instruction, wherein the third instruction is used to replace the target information with the identity information of the first account; and the second update unit is configured to update the target information displayed on the second interface to the identity information of the first account.
  • a third receiving unit configured to: after the first update unit updates the identity information of the first account displayed on the second interface to the target information according to the second instruction, receive the second interface And a third instruction, wherein the third instruction is used to replace the target information with the identity information of the first account; and the second update unit is configured to update the target information displayed on the second interface to the identity information of the first account.
  • the first display unit displays the first prompt information on the second interface, where a prompt message is used to indicate that the identity information of the first account is in a hidden state; or when the first update unit updates the target information displayed on the second interface to the identity information of the first account according to the second instruction, the first display unit is The second prompt information is displayed on the second interface, where the second prompt information is used to indicate that the identity information of the first account is in a viewable state.
  • the device further includes: a first detecting unit, after the second receiving unit receives the second instruction on the second interface, and the first updating unit displays the first displayed on the second interface according to the second instruction Before the identity information of the account is updated to the target information, detecting whether the second instruction carries the target information; and the third updating unit is configured to display the second interface if the second command is detected to carry the target information The identity information of the first account is updated to the target information carried by the second command.
  • the device further includes: a second detecting unit, configured to: after the second receiving unit receives the second instruction on the second interface, and in the first update unit, display the first interface on the second interface according to the second instruction Before the identity information of the account is updated to the target information, detecting whether the second instruction carries the target information; the first sending unit is configured to: if the second command does not carry the target information, send the second instruction to the server; the fourth receiving And a unit, configured to receive target information generated by the server in response to the second instruction, where the server randomly extracts the first packet from the preset identity information packet, and randomly extracts one identity information from the first packet as the target information.
  • a second detecting unit configured to: after the second receiving unit receives the second instruction on the second interface, and in the first update unit, display the first interface on the second interface according to the second instruction Before the identity information of the account is updated to the target information, detecting whether the second instruction carries the target information
  • the first sending unit is configured to: if the second command does not carry the target information,
  • the preset event is a transfer resource
  • the device further includes: a second sending unit, configured to send, after the first receiving unit receives the first instruction on the first interface of the device, the first instruction, the first instruction
  • the fifth receiving unit is configured to receive the value of the resource to be transferred sent by the server in response to the first instruction
  • the second display unit is configured to display the resource to be transferred on the second interface.
  • a value in which the value of the resource to be transferred is in an editable state.
  • the preset event is a transfer resource
  • the device further includes: a third detecting unit, configured to: after the second sending unit sends the first instruction to the server, and the fifth receiving unit receives the to-be-transferred sent by the server in response to the first instruction
  • the server detects the interaction behavior information between the first account and the second account in the preset time period
  • the generating unit is configured to generate, by the server, the value of the resource to be transferred according to the interaction behavior information, wherein if the interaction behavior information meets the preset condition
  • the generated value of the resource to be transferred is greater than or equal to the first value. If the interaction behavior information does not satisfy the preset condition, the generated value of the resource to be transferred is smaller than the first value.
  • the device further includes: a sixth receiving unit, configured to receive the message information in the second interface after the first display unit displays the second interface in response to the first instruction; wherein, completing the first account to the second account When the resource is transferred, the message information and the target information are displayed on the first interface, wherein the identity information of the first account is in a state that is not allowed to be viewed.
  • a sixth receiving unit configured to receive the message information in the second interface after the first display unit displays the second interface in response to the first instruction; wherein, completing the first account to the second account
  • the message information and the target information are displayed on the first interface, wherein the identity information of the first account is in a state that is not allowed to be viewed.
  • FIG. 14 is a schematic diagram of a server for implementing a method for updating information according to an embodiment of the present application. As shown in FIG. 14, the server mainly includes:
  • the receiving module 1402 is configured to receive an identity information replacement request for instructing to replace the identity information of the first account with the target information, where the identity information replacement request is passed by the terminal that logs in the first account.
  • the second interface is sent, and the second interface is displayed after receiving the first instruction on the first interface of the terminal, where the first instruction is used to perform a preset event on the first information, and the first information is displayed in the first interface.
  • the identity information of the first account is displayed in the second interface, wherein the identity information of the first account is in an editable state.
  • the first generating module 1404 is configured to generate, by the server, the target information according to the identity information replacement request.
  • the sending module 1406 is configured to send, by the server, target information to the terminal that logs in to the first account.
  • the first generating module includes: a first extracting submodule, configured to randomly extract the first packet from the preset identity information packet, where the preset identity information packet includes multiple identity information; and the second extracting submodule is used by An identity information is randomly extracted from the first group as the target information.
  • the server further includes: a detecting module, configured to detect the first account number and the second time in the preset time period before the receiving module receives the identity information replacement request for instructing to replace the identity information of the first account with the target information
  • the account interaction behavior information ;
  • the second generation module is configured to generate the value of the resource to be transferred according to the interaction behavior information, wherein if the interaction behavior information satisfies the preset condition, the generated value of the resource to be transferred is greater than or equal to the first value, if the interaction The behavior information does not satisfy the preset condition, and the generated value of the resource to be transferred is smaller than the first value.
  • the terminal mainly includes a processor 401, a display 405, a data interface 407, a memory 409, and a network interface 411. among them:
  • the data interface 407 transmits the identity information of the first account to the server mainly by means of data transmission.
  • the memory 409 is mainly used to store a plurality of target information.
  • the network interface 411 is mainly used for network communication with other servers.
  • the display 405 is mainly used to display the first interface and the second interface of the terminal.
  • the processor 401 is mainly used to perform the following operations:
  • the first information is displayed in the first interface, and the second information is displayed in response to the first instruction.
  • An interface wherein the second interface displays identity information of the first account, and identity information of the first account
  • the second command is received on the second interface, wherein the second instruction is used to indicate that the identity information of the first account is replaced with the target information; and the first account displayed on the second interface is The identity information is updated to the target information.
  • the processor 401 is further configured to receive the third instruction on the second interface, where the third instruction is used to replace the target information with the identity information of the first account; and the target information displayed on the second interface is updated to the first account.
  • Identity Information is used to replace the target information with the identity information of the first account.
  • the processor 401 is further configured to: when the identity information of the first account displayed on the second interface is updated to the target information according to the second instruction, displaying the first prompt information on the second interface, where the first prompt information is used to indicate The identity information of the first account is in a hidden state; or when the target information displayed on the second interface is updated to the identity information of the first account according to the second instruction, the second prompt information is displayed on the second interface, where the second The prompt information is used to indicate that the identity information of the first account is in an viewable state.
  • the processor 401 is further configured to detect whether the second instruction carries the target information, and if the second instruction carries the target information, update the identity information of the first account displayed on the second interface to the target information carried by the second instruction. .
  • the processor 401 is further configured to: detect whether the second instruction carries the target information; if detecting that the second instruction does not carry the target information, send the second instruction to the server; and the receiving server responds to the target information generated by the second instruction, where the server The first packet is randomly extracted from the preset identity information packet, and one identity information is randomly extracted from the first packet as the target information.
  • the processor 401 is further configured to send a first instruction to the server, where the first instruction is used to indicate that the preset event is performed on the first information; the value of the resource to be transferred sent by the receiving server in response to the first instruction is received; and the to-be-transferred is displayed on the second interface.
  • the value of the resource, where the value of the resource to be transferred is in an editable state.
  • the processor 401 is further configured to: detect interaction behavior information between the first account and the second account in the preset time period; and generate a value of the resource to be transferred according to the interaction behavior information, where the generated behavior information meets the preset condition, and the generated resource to be transferred
  • the value of the resource to be transferred is less than or equal to the first value. If the interaction behavior information does not satisfy the preset condition, the generated value of the resource to be transferred is smaller than the first value.
  • the processor 401 is further configured to receive the message information in the second interface, where the message information and the target information are displayed on the first interface when the resource is transferred from the first account to the second account, where the identity information of the first account is It is in a state that is not allowed to be viewed.
  • the processor 401 is further configured to receive an identity information replacement request for instructing to replace the identity information of the first account with the target information, where the identity information replacement request is sent by the terminal that logs in the first account by using the second interface, where the terminal is first.
  • the interface displays a second interface, where the first instruction is used to perform a preset event on the first information, the first interface displays the first information posted by the second account, and the second interface displays the first account.
  • Identity information wherein the identity information of the first account is in an editable state; the target information is generated according to the identity information replacement request; and the target information is sent to the terminal that logs in to the first account.
  • the processor 401 is further configured to randomly extract the first packet from the preset identity information packet, where the preset identity information packet includes multiple identity information; and randomly extract one identity information from the first packet as the target information.
  • the processor 401 is further configured to: detect interaction behavior information between the first account and the second account in the preset time period; and generate a value of the resource to be transferred according to the interaction behavior information, where the generated behavior information meets the preset condition, and the generated resource to be transferred
  • the value of the resource to be transferred is less than or equal to the first value. If the interaction behavior information does not satisfy the preset condition, the generated value of the resource to be transferred is smaller than the first value.
  • Embodiments of the present application also provide a storage medium.
  • the foregoing storage medium may be used to store program code of a method for updating information of the embodiment of the present application.
  • the foregoing storage medium may be located in at least one of a plurality of network devices in a network of a mobile communication network, a wide area network, a metropolitan area network, or a local area network.
  • the storage medium is arranged to store program code for performing the following steps:
  • the first instruction is received on the first interface of the terminal, where the first instruction is used to indicate that the preset event is performed on the first information, and the first information is displayed in the first interface.
  • the second interface is displayed in response to the first instruction, where the identity information of the first account is displayed in the second interface, and the identity information of the first account is in an editable state.
  • the second instruction is received on the second interface, where the second instruction is used to indicate that the identity information of the first account is replaced with the target information.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor executes, according to the stored program code in the storage medium, the third instruction is received on the second interface, where the third instruction is used to replace the target information with the identity of the first account.
  • Information updating the target information displayed on the second interface to the identity information of the first account
  • the processor executes, according to the stored program code in the storage medium, when the identity information of the first account displayed on the second interface is updated to the target information according to the second instruction, in the second
  • the first prompt information is displayed on the interface, where the first prompt information is used to indicate that the identity information of the first account is in a hidden state; or the target information displayed on the second interface is updated to the identity information of the first account according to the second instruction.
  • the second prompt information is displayed on the second interface, where the second prompt information is used to indicate that the identity information of the first account is in a viewable state.
  • the processor is configured to: according to the stored program code in the storage medium, detecting whether the second instruction carries the target information; if detecting that the second instruction carries the target information, then the second interface is The identity information of the displayed first account is updated to the target information carried by the second instruction.
  • the processor is configured to: according to the stored program code in the storage medium, detecting whether the second instruction carries the target information; if detecting that the second instruction does not carry the target information, sending the second instruction And the receiving server responds to the target information generated by the second instruction, wherein the server randomly extracts the first packet from the preset identity information packet, and randomly extracts one identity information from the first packet as the target information.
  • the processor is configured to: send, according to the stored program code in the storage medium, a first instruction, where the first instruction is used to perform a preset event on the first information; and the receiving server responds to the first The value of the resource to be transferred sent by the instruction; the value of the resource to be transferred is displayed on the second interface, wherein the value of the resource to be transferred is in an editable state.
  • the processor executes, according to the stored program code in the storage medium, the server detects interaction behavior information between the first account and the second account in the preset time period; The behavior information generates a value of the resource to be transferred, wherein if the interaction behavior information satisfies the preset condition, the generated value of the resource to be transferred is greater than or equal to the first value, and if the interaction behavior information does not satisfy the preset condition, the generated resource to be transferred The value is less than the first value.
  • the processor performs, according to the stored program code in the storage medium, receiving the message information in the second interface
  • the message information and the target information are displayed on the first interface when the resource is transferred from the first account to the second account.
  • the identity information of the first account is in a state that is not allowed to be viewed.
  • the storage medium is arranged to store program code for performing the following steps:
  • the processor performs, according to the stored program code in the storage medium, randomly extracting the first packet from the preset identity information packet, where the preset identity information packet includes multiple identity information; A group of randomly selected identity information is used as target information.
  • the processor performs: detecting, according to the stored program code in the storage medium, the interaction behavior information of the first account and the second account in the preset time period; and generating the value of the resource to be transferred according to the interaction behavior information.
  • the value of the to-be-transferred resource is greater than or equal to the first value, and the value of the generated resource to be transferred is less than the first value if the interactive behavior information does not satisfy the preset condition.
  • the integrated unit in the above embodiment if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in the above-described computer readable storage medium.
  • the technical solution of the present application in essence or the contribution to the prior art, or all or part of the technical solution may be embodied in the form of a software product, which is stored in a storage medium.
  • a number of instructions are included to cause one or more computer devices (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the disclosed client may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, unit or module, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Signal Processing (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种信息更新的方法、装置以及服务器。方法包括:在终端的第一界面上接收针对第一信息的第一指令;响应第一指令显示第二界面;在第二界面上接收第二指令;根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息。本方案解决了无法以匿名身份发起事件的技术问题。

Description

信息更新的方法、装置以及服务器
本申请要求于2016年5月27日提交中国专利局、申请号201610363929.X、发明名称为“信息更新的方法、装置及服务器”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及互联网领域,具体而言,涉及一种信息更新的方法、装置以及服务器。
背景技术
现有的应用客户端中,支持一个用户向另外一个用户发起留言或者资源转移等事件,也支持一个用户向一个用户群发起事件。例如,在即时通讯客户端中,用户与一个好友发起聊天,在与好友单独聊天界面中向该好友发起某些事件(如发红包)。或者,用户与多个好友发起聊天群组,用户在聊天群组中发起某些事件(如在群组中对某个好友的言论进行评论或者点赞)。在这两种场景中,处于聊天界面中用户能够看到是哪个用户发起的事件。
然而,在某些情况下,发起事件的用户并不希望其他用户知道发起事件的用户的身份。例如,用户公益捐赠时,不想留下自己的名字。然而,现有技术无法实现以匿名的身份发起事件。
针对上述的问题,目前尚未提出有效的解决方案。
发明内容
本申请实施例提供了一种信息更新的方法、装置以及服务器,以至少解决现有技术中无法以匿名的身份发起事件的技术问题。
根据本申请实施例的一个方面,提供了一种信息更新的方法,包括:在终 端的第一界面上接收第一指令,其中,所述终端通过第一账号登录,所述第一指令用于指示对第一信息执行预设事件,所述第一界面中显示所述第二账号发布的第一信息;终端响应所述第一指令显示第二界面,其中,所述第二界面中显示所述第一账号的身份信息,所述第一账号的身份信息处于可编辑状态;终端在所述第二界面上接收第二指令,其中,所述第二指令用于指示将所述第一账号的身份信息更换为目标信息;终端根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息。
根据本申请实施例的另一方面,还提供了一种信息更新的方法,包括:服务器接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求,其中,所述身份信息更换请求由登录第一账号的终端通过第二界面发送,终端的第一界面上接收第一指令后显示所述第二界面,所述第一指令用于指示对第一信息执行预设事件,所述第一界面中显示所述第二账号发布的第一信息,所述第二界面中显示所述第一账号的身份信息,其中,所述第一账号的身份信息处于可编辑状态;所述服务器根据所述身份信息更换请求生成所述目标信息;所述服务器向登录所述第一账号的终端发送所述目标信息。
根据本申请实施例的另一方面,还提供了一种信息更新的装置,包括:第一接收单元,用于在装置的第一界面上接收第一指令,其中,所述装置通过第一账号登录,所述第一指令用于指示对第一信息执行预设事件,所述第一界面中显示所述第二账号发布的第一信息;第一显示单元,用于响应所述第一指令显示第二界面,其中,所述第二界面中显示所述第一账号的身份信息,所述第一账号的身份信息处于可编辑状态;第二接收单元,用于在所述第二界面上接收第二指令,其中,所述第二指令用于指示将所述第一账号的身份信息更换为目标信息;第一更新单元,用于根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息。
根据本申请实施例的另一方面,还提供了一种服务器,包括:接收模块,用于接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求,其中,所述身份信息更换请求由登录第一账号的终端通过第二界面发送,终端的第一界面上接收第一指令后显示所述第二界面,所述第一指令用于指示对第一信息执行预设事件,所述第一界面中显示所述第二账号发布的第一信息, 所述第二界面中显示所述第一账号的身份信息,其中,所述第一账号的身份信息处于可编辑状态;第一生成模块,用于所述服务器根据所述身份信息更换请求生成所述目标信息;发送模块,用于所述服务器向登录所述第一账号的终端发送所述目标信息。
在本申请实施例中,由于第二界面上显示的身份信息是可编辑的,也就是说可以将第一账号的身份信息更改为其他身份信息,从而实现了隐藏第一账号的真实身份信息的目的,达到了以匿名的身份发起事件的技术效果,进而解决了现有技术中无法以匿名的身份发起事件的技术问题。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是根据本申请实施例的一种应用信息更新的方法的硬件架构示意图;
图2是根据本申请实施例的信息更新的方法的流程图;
图3是根据本申请另一实施例的信息更新的方法的流程图;
图4是根据本申请实施例的终端的第一界面的示意图;
图5是根据本申请实施例的终端的第二界面的示意图;
图6是根据本申请实施例的终端的第二界面采用匿名身份信息的示意图;
图7是根据本申请实施例的终端的第二界面更换红包金额后的示意图;
图8是根据本申请实施例的终端的第二界面添加评论的示意图;
图9是根据本申请实施例的终端的第二界面输入支付密码的示意图;
图10是根据本申请实施例的终端的界面提示打赏成功的示意图;
图11是根据本申请实施例的匿名评论成功后界面的示意图;
图12是根据本申请实施例的终端查看第一账号的身份信息的界面的示意图;
图13是根据本申请实施例的信息更新的装置的示意图;
图14是根据本申请实施例的用于实施信息更新的方法的服务器的示意图;
图15是根据本申请实施例的用于实施信息更新的方法的终端的示意图。
具体实施方式
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。
需要说明的是,本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
根据本申请实施例,提供了一种可以通过本申请装置实施例执行的方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
根据本申请实施例,提供了一种信息更新的方法。
可选地,在本实施例中,上述信息更新的方法可以应用于如图1所示的终端102和服务器104所构成的硬件环境中。如图1所示,终端102通过网络与服务器104进行连接,上述网络包括但不限于:移动通信网络、广域网、城域网或局域网,终端102可以是手机终端,也可以是PC终端、笔记本终端或平板电脑终端。
图1中示出的硬件环境系统的主要工作原理是:
终端102上显示终端的第一界面,在终端的第一界面上接收第一指令,其中,第一指令用于指示对第一信息执行预设事件,第一界面中显示第二账号发布的第一信息。终端102将第一指令发送给服务器104。
服务器104根据第一指令生成第二界面,并将第二界面的信息发送给终端102。终端102接收服务器104发送的第二界面,并显示接收到的第二界面。第二界面中显示有第一账号的身份信息,第一账号的身份信息处于可编辑状态。
终端102上显示的第二界面接收第二指令,第二指令用于指示将第一账号的身份信息更换为目标信息。该目标信息可以是用户在第二界面上输入的,也可以是服务器104自动生成的。在目标信息是服务器104生成的情况下,服务器104将目标信息发送给终端102,以使终端102上的第二界面上显示目标信息,从而完成了将第二界面上的身份信息更新为目标信息。
在本申请实施例中,由于第二界面上显示的身份信息是可编辑的,也就是说可以将第一账号的身份信息更改为其他身份信息,从而实现了隐藏第一账号的真实身份信息的目的,解决了现有技术中无法实现以匿名的身份发起事件的技术问题,达到了以匿名的身份发起事件的技术效果。
进一步地,在完成更改身份信息之后,可以提交第二界面来执行预设事件,执行预设事件之后在第一界面上显示更改后的目标信息。因此,除了第一账号以外的其他账号(包括第二账号)无法得知第一账号的真实身份信息。
在本申请实施例中,登录第一账号的终端和登录第二账号的终端可以是同一个终端,也可以是不同的终端。
当在同一终端上登入第一账号和第二账号,且第一账号向第二账号发起匿名事件时,在终端的第一账号对应界面上,点击目标信息无法查看第一账号的身份信息,在终端的第二账号对应界面上,点击目标信息也无法查看第一账号的身份信息。
更常见的情况是登录第一账号的终端和登录第二账号的终端是不同的终端。假设登录第一账号的终端是终端A,登录第二账号的终端是终端B,此时,终端A和终端B均运行了能够执行本申请实施例所提供的信息更新的方法的应用程序,第一账号和第二账号均是该应用程序的账号,当第一账号向第二账号 匿名发起事件时,点击终端A的界面上的目标信息无法查看第一账号的身份信息,点击终端B的界面上的目标信息也无法查看第一账号的身份信息。
可选地,在将第二界面上显示的第一账号的身份信息更新为目标信息之后,还可以将目标信息还原为第一账号的身份信息。通过第二界面接收第三指令,其中,第三指令用于将目标信息更换为第一账号的身份信息;并根据第三指令将第二界面上显示的目标信息更新为第一账号的身份信息。
可选地,在第二界面上显示提示信息,以提示第一账号的身份信息是否处于隐藏状态。在根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息时,在第二界面上显示第一提示信息,其中,第一提示信息用于指示第一账号的身份信息处于隐藏状态;或者在根据第二指令将第二界面上显示的目标信息更新为第一账号的身份信息时,在第二界面上显示第二提示信息,其中,第二提示信息用于指示第一账号的身份信息处于可查看状态。
可选地,在第二界面上接收第二指令之后,检测第二指令是否携带有目标信息,若检测到第二指令携带有目标信息,根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息;若检测到第二指令没有携带目标信息,则将第二指令发送给服务器;接收服务器响应第二指令生成的目标信息,其中,服务器从预设身份信息分组中随机抽取第一分组,并从第一分组中随机抽取一个身份信息作为目标信息,将第二界面上显示的第一账号的身份信息更新为目标信息。即目标信息可以是用户输入的,也可以是服务器自动生成的。用户输入目标信息可以实现自定义个性化定制目标信息,服务器可以提供多种可供选择的目标信息,以便用户根据自身洗好选择需要使用的目标信息,增加了应用的灵活性。
可选地,预设事件为转移资源,当第一账号向第二账号转移资源时,可以采用服务器发送的待转移资源的数值,也可以由第一账号的用户编辑待转移资源的数值。在终端的第一界面上接收第一指令之后,向服务器发送第一指令,第一指令用于指示对第一信息执行预设事件;接收服务器响应第一指令发送的待转移资源的数值;在第二界面上显示待转移资源的数值,其中,待转移资源的数值处于可编辑状态。
可选地,预设事件为转移资源,根据第一账号与第二账号的互动行为信息 生成待转移资源的数值。服务器接收第一指令之后,服务器检测预设时间段内第一账号与第二账号互动行为信息;服务器根据互动行为信息生成待转移资源的数值,并将待转移资源的数值发送给终端的第二界面。其中,若互动行为信息满足预设条件,生成的待转移资源的数值大于或者等于第一数值,若互动行为信息不满足预设条件,生成的待转移资源的数值小于第一数值。
可选地,第一账号可以同时向第二账号转移资源和留言。在响应第一指令显示第二界面之后,在第二界面接收留言信息;其中,在完成由第一账号向第二账号转移资源时,在第一界面上显示留言信息以及目标信息,其中,第一账号的身份信息处于不允许被查看的状态。
第一账号和第二账号可以是即时通讯应用和微博等社交平台的账号。预设事件可以是对账号或账号发布信息进行的操作,例如:发红包、评论、点赞、捐款等。第一信息是由第二账号发布的信息,包括文字、图片、语音和视频等。在登录了第一账号的终端的界面上显示第一信息。目标信息可以是身份信息,例如,某个明星的图像、名字,或者某个风景的图像及其名称,或者某种动物的图像及其名称,等等。目标信息可以不表示第一账号的真实身份信息,真实身份信息可以为与账号对应的注册信息,例如,注册的账户名,注册的账号头像等。待转移资源可以是红包,待转移资源的数值可以是所要发的红包的金额。待转移资源也可以是某种虚拟币,待转移资源的数值可以是所要转移的虚拟币的数量。
当第二界面上显示目标信息时,在第二界面上显示第一提示信息,以提示用户其身份信息处于隐藏状态,除了用户本人,其他人无法查看第一账号的身份信息,因此,其他人无法得知第一账号的身份信息。
当第二界面上显示第一账号的身份信息时,在第二界面上显示第二提示信息,以提示用户其身份信息处于可查看状态,其他人点击用户头像能够查看用户的身份信息。
例如,当终端的第二界面上的身份信息由用户头像切换成明星图像之后,第二界面的背景颜色从红色变为绿色,第二界面上显示“您现在处于匿名状态,别人无法查看您的身份信息”;当终端的第二界面上的身份信息由明星图像切换成用户头像之后,第二界面的背景颜色从绿色变为红色,第二界面上显示“您 现在处于非匿名状态,别人能够查看您的身份信息”。
服务器中存储了多组身份信息(多组身份信息即为上述预设身份信息分组),每一组身份信息包含多个身份信息,当服务器接收到登录第一账号的终端发送的身份信息更换请求之后,从这多组身份信息中随机抽取一组(即上述第一分组),从第一分组中随机抽取一个身份信息作为目标信息。
如果用户不喜欢终端的第二界面上显示的目标信息,用户可以发送第三指令,以将目标信息切换回第一账号的身份信息。当目标信息切换回第一账号的身份信息之后,若用户继续点击第一账号的身份信息,服务器会向用户的终端发送一个与之前的目标信息不同的目标信息作为新的身份信息进行显示。
服务器中存储着预设身份信息分组,例如,服务器中存储着100个当红明星的名单,这100个明星中有50个男明星、50个女明星。把这100个明星分成5个组(A组、B组、C组、D组、E组),每组10个男明星、10个女明星。如果检测出第二指令没有携带目标信息,则将第二指令发送给服务器。服务器接收到第二指令后,从A组、B组、C组、D组、E组这5个组中随机抽出一组,假设随机抽出B组,从B组中随机抽出一个身份信息,假设随机抽出的是明星B5的信息,将明星B5的信息作为目标信息,服务器将明星B5的信息发送给客户端,用户能够在终端的第二界面看到明星B5的头像和名字。如果用户对目标信息不满意,则服务器从B组中剩余的9个明星中随机抽取一个身份信息作为目标信息,如果用户仍然对目标信息不满意,则从B组中剩余的8个明星中随机抽取一个身份信息作为目标信息。如果用户对B组中的10个明星均不满意,则从A组、C组、D组、E组这4组中随机抽取一组(假设抽出的是E组),从E组中随机抽取一个身份信息作为目标信息,以此类推。假如100个明星的身份信息均已经被抽取过,则重新从B组开始随机抽取一个身份信息作为目标信息,重复以上过程,直至用户选择了一个目标信息为止。
作为一种可选的实施例,如果用户不喜欢终端的第二界面上显示的目标信息,可以无需将目标信息切换回第一账号的身份信息,当用户继续点击第一账号的身份信息,服务器会向用户的终端发送一个与之前的目标信息不同的目标信息作为新的身份信息进行显示。
作为一种可选的实施例,可以设置多种不同颜色的头像作为目标信息,或 者将头像的背景设置成不相同的颜色,每次随机选择一种颜色发送给用户。
通过设置多组身份信息,能够使用户挑选最喜欢的目标信息,增大了用户的选择范围,增加了显示内容的多样性和可选择性。
第一账号可以向其他账号匿名转移资源,以第一账号向第二账号匿名转移资源为例进行说明。
登录了第一账号的终端显示第一界面,终端向服务器发送第一指令,第一指令中包含向第二账号转移资源的信息,服务器接收第一指令后,向终端发送待转移资源的数值,终端显示第二界面,第二界面上显示待转移资源的数值,并且该数值处于可编辑状态。用户可以直接采用终端的第二界面上生成的待转移资源的数值,也可以点击该数值进行编辑。
其中,服务器向终端发送的待转移资源的数值可以有多种确定方式。例如,在给定的数值范围内随机确认待转移资源的数值;根据账号间的亲密程度确定待转移资源的数值。可选地,在本实施例中,待转移资源的数值是根据第一账号和第二账号的亲密程度确定的。服务器检测预设时间段内第一账号和第二账号的互动行为信息,并以此确定第一账号的拥有者和第二账号的拥有者的关系是否亲密。互动行为包括聊天、评论、点赞、发红包等。
如果预设时间段内,第一账号和第二账号互动行为多,则说明第一账号的拥有者和第二账号的拥有者的关系较为亲密,此时,在第一账号向第二账号转移资源的过程中,服务器生成的待转移资源的数值较大;如果第一账号和第二账号互动行为少,则说明第一账号的拥有者和第二账号的拥有者的关系较为疏远,此时,在第一账号向第二账号转移资源的过程中,服务器生成的待转移资源的数值较小。
例如,假设小明是第一账号的拥有者,小红是第二账号的拥有者,如果最近两周内,小明和小红在QQ上有过联系(包括聊天、一方给另一方点赞、或者一方给另一方评论),则服务器生成的红包的随机金额X的大小满足:1元<X<2元,服务器可以从1.22元、1.55元、1.69元、1.88元这四个红包金额中随机选取一个发给小明的手机。当小明点击“换个金额”之后,随机金额X下降为1元以下,服务器可以从0.33元、0.55元、0.66元、0.88元这四个红包金额中 随机选取一个发给小明的手机。如果最近两周内,小明和小红在QQ上没有联系过,则服务器生成的红包的随机金额X为1元以下,服务器可以从0.33元、0.55元、0.66元、0.88元这四个红包金额中随机选取一个发给小明的手机,当小明点击“换个金额”之后,随机金额X将增加到满足条件1元<X<2元,服务器可以从1.22元、1.55元、1.69元、1.88元这四个红包金额中随机选取一个发给小明的手机。
通过服务器检测预设时间段内第一账号与第二账号互动行为信息,根据互动行为信息生成资源的数值,符合用户对希望转移的资源的数值的预期,使得显示的数值符合用户的要求,提高推送数值的准确率。
第一账号能够对第二账号发布的第一信息进行匿名评论,还能够向第二账号转移资源和留言。当第一账号希望匿名时,登录了第一账号的终端的第二界面上显示目标信息,在第二界面上,用户能够输入留言、转移资源,当第一账号向第二账号转移资源或者留言完成之后,登录了第一账号的终端的界面由第二界面切换成第一界面,此时,第一界面上显示留言信息、转移资源的数值和目标信息。登录了除第一账号以外的其他账号的终端的界面上,能够看到第一账号的留言、转移资源的数值和目标信息,由于第一账号的身份信息处于不允许被查看的状态,因此除了第一账号以外的其他账号无法得知第一账号的身份信息。这样,第一账号就能够匿名发起事件,保护了第一账号的隐私,保证了信息安全。
图2是根据本申请实施例的信息更新的方法的流程图,如图2所示,该信息更新的方法主要包括步骤101-107。
步骤101,终端在第一界面上接收针对第一信息的第一指令。
其中,第一指令用于指示对所述第一信息执行预设事件。第一界面中显示第二账号发布的第一信息。
步骤102,终端向服务器发送第一指令。
步骤103,服务器根据第一指令生成第二界面。
步骤104,服务器向终端发送第二界面信息。
步骤105,终端显示第二界面。
其中,第二界面中显示第一账号的身份信息,第一账号的身份信息处于可编辑状态。
步骤106,终端在第二界面上接受第二指令,并判断第二指令是否包含有目标信息。
其中,第二指令用于指示将第一账号的身份信息更换为目标信息。
步骤106还包括步骤1061-1063。
步骤1061,当第二指令不含目标信息时,终端向服务器发送第二指令。
步骤1062,服务器响应于终端发送的第二指令生成目标信息。
步骤1063,服务器向终端发送生成的目标信息。
步骤107,终端将第一账号的身份信息更换为目标信息。
若第二指令携带有目标信息,则终端将第一账号的身份信息更换为第二指令携带的目标信息,若第二指令没有携带目标信息,则将第一账号的身份信息更换为服务器发送的目标信息。
图3是根据本申请另一实施例的信息更新的方法的流程图,以下结合图3对本申请实施例所提供的信息更新的方法做具体介绍,如图3所示,该信息更新的方法主要包括如下步骤:
步骤S202,确定用户A点击了“红包”。用户A的终端登录了第一账号,用户B的终端登录了第二账号。如图4所示,在用户A的终端的第一界面上,有“红包”的图标。当用户A希望向用户B发红包时,用户A点击终端的第一界面上的“红包”的图标,用户A的终端的界面由第一界面转换成第二界面,第二界面如图5所示。
步骤S204,判断用户A与用户B之间的关系是否亲密。如果判断结果为是,执行步骤S206;如果判断结果为否,执行步骤S208。
根据用户A与用户B聊天、点赞、或者评论的频繁程度,判断用户A与用户B之间的关系是否亲密,根据亲密程度决定生成的随机金额。如果判断出用户A与用户B的关系比较亲密,则生成的随机金额较大;如果判断出用户A与用户B的关系比较疏远,则生成的随机金额较小。
步骤S206,显示红包金额大于1元,并且小于2元。如果判断出用户A与用户B的关系比较亲密,则生成的随机金额在1元至2元之间。例如,如果判断出用户A与用户B的关系比较亲密,则生成的随机金额为1.69元,如图5所示。在图5中,可以看到,在“1.69元”的下面有一行字“换个金额”。如果用户A点击这行字,则“1.69元”将更新为其他金额。
步骤S208,显示红包金额小于1元。如果步骤S204中判断出用户A与用户B的关系比较疏远,则生成的随机金额小于1元。
步骤S210,判断用户A是否选择匿名。如果判断结果为是,执行步骤S212;如果判断结果为否,执行步骤S214。
步骤S212,按匿名名称和头像分配规则分配名称和图像。如图5所示,第一账号的头像下面有一行字“点击头像可匿名”。如果用户A点击了这行字,则终端的第二界面的用户A的头像将被更换为一个明星头像(例如明星W的头像),并且头像下面显示“已匿名为W”。如果用户不喜欢明星W,可以点击明星W的头像,这时,明星W的头像更换为第一账号的身份信息,如果用户继续点击第一账号的身份信息,则第一账号的身份信息更换为另一个明星的头像(例如明星L的头像),并且头像下面显示“已匿名为L”。如果用户A仍不满意,可点击明星L的头像,这时,明星L的头像更换为第一账号的身份信息,如果用户继续点击第一账号的身份信息,则第一账号的身份信息更换为其他明星的头像,直至用户满意为止。例如,如图6所示,终端的第二界面的用户A的头像被更换为明星×××的头像,并且头像下面显示“已匿名为×××”。
步骤S214,判断用户A是否点击了“换个金额”。如果判断结果为是,执行步骤S216;如果判断结果为否,执行步骤S218。用户如果对红包的金额不满意,可以点击如图6所示的界面中的“换个金额”。
步骤S216,按金额随机规则给用户A匹配红包金额。如果用户点击了如图6所示的界面中的“换个金额”,则按照亲多疏少的原则,给用户A匹配红包金额,具体地说,如果步骤S204中判断出用户A与用户B的关系比较亲密,则随机从几个比较大的红包金额中选择一个展示给用户A。如果步骤S204中判断出用户A与用户B的关系比较疏远,则随机从几个比较小的红包金额中选择一个展示给用户A。例如,如果步骤S204中判断出用户A与用户B的关系比较亲 密,则随机从1.22元、1.55元、1.69元、1.88元中选择一个展示给用户A。如果步骤S204中判断出用户A与用户B的关系比较疏远,则随机从0.33元、0.55元、0.66元、0.88元中选择一个展示给用户A。假设步骤S204中判断出用户A与用户B的关系比较亲密,随机选择出1.88元作为红包金额展示给用户A,如图7中所示,红包金额更新为1.88元。
步骤S218,判断用户A是否添加评论。如果判断结果为是,执行步骤S220;如果判断结果为否,执行步骤S222。用户A点击如图7所示的界面中的“捎句话”方框后,即可添加评论。例如,用户A点击了如图7所示的界面中的“捎句话”方框后,界面更换为如图8所示的界面,可供用户A输入评论。假设用户A填写了评论信息“女神你真美,爱你哟~”。
步骤S220,接收用户A填写的评论信息。
步骤S222,密码验证。当用户点击如图8所示的“发红包”方框时,界面切换成如图9所示的界面。用户A能够在此界面上输入支付密码。输入的支付密码被发送到支付服务器,支付服务器验证支付密码正确后,完成支付操作,并向终端返回“支付成功”的界面。
步骤S224,确认用户A向用户B发红包成功。当支付密码验证成功之后,终端接收支付服务器返回的“支付成功”的界面,并向用户A展示如图10所示的界面(即支付成功的界面),该界面上显示“打赏成功”的提示框,几秒之后,该提示框消失,出现红包图标,如图11所示,红包图标的右侧出现“匿名(×××)”,下面出现“匿名(×××)”的评论“女神你真美,爱你哟”。如果除用户A以外的其他用户点击文字链接“匿名(×××)”,则出现提示“当前用户已匿名无法查看他的信息”,如图12所示。
在本申请实施例中,用户能够匿名发起事件,达到了保护用户的隐私、保证用户的信息安全的技术效果。
以评论为例对本实施例的信息更新的方法进行说明。
例如,小张和kiki是好友,小张很关注kiki的QQ空间的动态,每次kiki发了新的动态,小张都会评论或点赞,但是小张不想让别人知道自己正在暗恋kiki。使用本申请实施例所提供的方法,能够使小张对kiki的动态进行评论或点 赞时匿名。具体场景如下:
kiki在自己的QQ空间发了一张自己的照片(第二账号发布的第一信息),小张的电脑的QQ客户端显示kiki有新的动态,小张进入QQ客户端,看到kiki的照片(终端的第一界面中显示的第二账号发布的第一信息),小张向服务器发送第一指令,第一指令用于评论kiki的照片(评论kiki的照片即为上述对第一信息执行预设事件)。小张的电脑显示可编辑界面(第二界面),在这个界面上显示有小张的身份信息。小张点击该界面,以向服务器发送第二指令,服务器接收第二指令,向小张的电脑发送明星A的图像和名字,终端的第二界面上,小张的身份信息更换为明星A的图像和名字。kiki在自己的QQ客户端能够看到小张的评论和明星A的图像,但无法得知评论人的身份,除了小张,其他人也只能看到评论的内容,但是无法得知评论人的身份,这样就达到了匿名评论或者点赞的技术效果。
以匿名捐款为例对本实施例的信息更新的方法进行说明。
例如,小胡在自己的微博发布了号召捐款的文字(第二账号发布的第一信息),小王在自己的微博中看到小胡发布的号召捐款的文字(终端的第一界面中显示的第二账号发布的第一信息),小王向服务器发送第一指令,第一指令用于对小胡进行捐款(对小胡进行捐款即为上述对第一信息执行预设事件)。服务器根据第一指令生成第二界面,并将第二界面的信息发送给小王手机。小王的手机显示可编辑界面(第二界面),在这个界面上显示有小王的身份信息和捐款信息。小王点击该界面,以向服务器发送第二指令,服务器接收第二指令,向小王的手机发送明星B的图像和名字以及随机生成的捐款金额,终端的第二界面上小王的身份信息更换为明星B的图像和名字,并且显示捐款金额。小王如果对捐款金额不满意,可以编辑捐款金额。小王还可以编辑留言信息。当小王捐款成功后,小胡在自己的微博能够看到小王的捐款、留言和明星B的图像,但无法得知捐款人的身份,除了小王,其他人也只能看到捐款的信息,但是无法得知捐款人的身份,这样就达到了匿名捐款的技术效果,保护了捐款人的隐私,保证了捐款人的信息安全。
使用本申请实施例所提供的信息更新的方法,能够在群组中对某个成员的消息进行匿名评论、回复和点赞等。群组可以是微信群、QQ群等。下面以在群 组中对某个成员的消息进行匿名评论为例进行说明。
例如,甲和乙在同一个微信群中,乙在微信群中发消息“周末一起去骑车吧!”(第二账号发布的第一信息)。甲在自己的手机上登录自己的账号,看到微信群中乙发布的消息(终端的第一界面中显示的第二账号发布的第一信息),甲点击乙发布的这条消息,生成第一指令,以对乙发布的这条消息进行评论(对乙发布的这条消息进行评论即为上述对第一信息执行预设事件)。服务器根据第一指令生成第二界面,并将第二界面的信息发送给甲的手机。甲的手机显示可编辑界面(第二界面),在这个界面上显示有甲的身份信息。甲点击该界面,以向服务器发送第二指令(指示更改甲的身份信息),服务器接收第二指令,向甲的手机发送明星B的图像。甲的手机的第二界面上甲的身份信息更换为明星B的图像和名字,甲还能够在第二界面上对乙发的消息进行评论。例如,甲在第二界面上对乙发的消息评论的内容是“这个建议不错!”当甲评论完成之后,群组中的人在微信群都能看到对乙的消息“周末一起去骑车吧!”的评论“这个建议不错!”和明星B的图像、名字,当点击明星B的图像时,会显示“该身份信息处于不允许被查看的状态”。除了甲本人,没人知道是谁对乙的消息进行了评论,从而达到了在群组中匿名评论的技术效果。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
根据本申请实施例,还提供了一种用于实施上述信息更新的方法的信息更 新的装置,该信息更新的装置主要用于执行本申请实施例上述内容所提供的信息更新的方法,以下对本申请实施例所提供的信息更新的装置做具体介绍:
图13是根据本申请实施例的信息更新的装置的示意图,如图13所示,该信息更新的装置主要包括:
第一接收单元1302,用于在所述装置的第一界面上接收针对第一信息的第一指令,其中,所述装置通过第一账号登录,所述第一指令用于指示对所述第一信息执行预设事件,所述第一信息由第二账号发布,并且显示在所述第一界面上。
第一显示单元1304,用于响应第一指令显示第二界面,其中,第二界面中显示第一账号的身份信息,第一账号的身份信息处于可编辑状态。
第二接收单元1306,用于在第二界面上接收第二指令,其中,第二指令用于指示将第一账号的身份信息更换为目标信息。
第一更新单元1308,用于根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息。
可选地,装置还包括:第三接收单元,用于在第一更新单元根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息之后,在第二界面上接收第三指令,其中,第三指令用于将目标信息更换为第一账号的身份信息;第二更新单元,用于将第二界面上显示的目标信息更新为第一账号的身份信息。
可选地,在第一更新单元根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息时,第一显示单元在第二界面上显示第一提示信息,其中,第一提示信息用于指示第一账号的身份信息处于隐藏状态;或者在第一更新单元根据第二指令将第二界面上显示的目标信息更新为第一账号的身份信息时,第一显示单元在第二界面上显示第二提示信息,其中,第二提示信息用于指示第一账号的身份信息处于可查看状态。
可选地,装置还包括:第一检测单元,用于在第二接收单元在第二界面上接收第二指令之后,并且在第一更新单元根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息之前,检测第二指令是否携带有目标信息;第三更新单元,用于若检测到第二指令携带有目标信息,则将第二界面上显示 的第一账号的身份信息更新为第二指令携带的目标信息。
可选地,装置还包括:第二检测单元,用于在第二接收单元在第二界面上接收第二指令之后,并且在第一更新单元根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息之前,检测第二指令是否携带有目标信息;第一发送单元,用于若检测到第二指令没有携带目标信息,则将第二指令发送给服务器;第四接收单元,用于接收服务器响应第二指令生成的目标信息,其中,服务器从预设身份信息分组中随机抽取第一分组,并从第一分组中随机抽取一个身份信息作为目标信息。
可选地,预设事件为转移资源,装置还包括:第二发送单元,用于在第一接收单元在装置的第一界面上接收第一指令之后,向服务器发送第一指令,第一指令用于指示对第一信息执行预设事件;第五接收单元,用于接收服务器响应第一指令发送的待转移资源的数值;第二显示单元,用于在第二界面上显示待转移资源的数值,其中,待转移资源的数值处于可编辑状态。
可选地,预设事件为转移资源,装置还包括:第三检测单元,用于在第二发送单元向服务器发送第一指令之后,且第五接收单元接收服务器响应第一指令发送的待转移资源的数值之前,服务器检测预设时间段内第一账号与第二账号互动行为信息;生成单元,用于服务器根据互动行为信息生成待转移资源的数值,其中,若互动行为信息满足预设条件,生成的待转移资源的数值大于或者等于第一数值,若互动行为信息不满足预设条件,生成的待转移资源的数值小于第一数值。
可选地,装置还包括:第六接收单元,用于在第一显示单元响应第一指令显示第二界面之后,在第二界面接收留言信息;其中,在完成由第一账号向第二账号转移资源时,在第一界面上显示留言信息以及目标信息,其中,第一账号的身份信息处于不允许被查看的状态。
图14是根据本申请实施例的用于实施信息更新的方法的服务器的示意图,如图14所示,该服务器主要包括:
接收模块1402,用于接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求,其中,身份信息更换请求由登录第一账号的终端通过第 二界面发送,终端的第一界面上接收第一指令后显示第二界面,第一指令用于指示对第一信息执行预设事件,第一界面中显示第二账号发布的第一信息,第二界面中显示第一账号的身份信息,其中,第一账号的身份信息处于可编辑状态。
第一生成模块1404,用于服务器根据身份信息更换请求生成目标信息。
发送模块1406,用于服务器向登录第一账号的终端发送目标信息。
可选地,第一生成模块包括:第一抽取子模块,用于从预设身份信息分组中随机抽取第一分组,预设身份信息分组中包括多个身份信息;第二抽取子模块,用于从第一分组中随机抽取一个身份信息作为目标信息。
可选地,服务器还包括:检测模块,用于在接收模块接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求之前,检测预设时间段内第一账号与第二账号互动行为信息;第二生成模块,用于根据互动行为信息生成待转移资源的数值,其中,若互动行为信息满足预设条件,生成的待转移资源的数值大于或者等于第一数值,若互动行为信息不满足预设条件,生成的待转移资源的数值小于第一数值。
根据本申请实施例,还提供了一种用于实施上述信息更新的方法的终端,如图15所示,该终端主要包括处理器401、显示器405、数据接口407、存储器409和网络接口411,其中:
数据接口407则主要通过数据传输的方式将第一账号的身份信息传输给服务器。
存储器409主要用于存储多个目标信息。
网络接口411主要用于与其他服务器进行网络通信。
显示器405主要用于显示终端的第一界面、第二界面。
处理器401主要用于执行如下操作:
在终端的第一界面上接收第一指令,其中,第一指令用于指示对第一信息执行预设事件,第一界面中显示第二账号发布的第一信息;响应第一指令显示第二界面,其中,第二界面中显示第一账号的身份信息,第一账号的身份信息 处于可编辑状态;在第二界面上接收第二指令,其中,第二指令用于指示将第一账号的身份信息更换为目标信息;根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息。
处理器401还用于在第二界面上接收第三指令,其中,第三指令用于将目标信息更换为第一账号的身份信息;将第二界面上显示的目标信息更新为第一账号的身份信息。
处理器401还用于在根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息时,在第二界面上显示第一提示信息,其中,第一提示信息用于指示第一账号的身份信息处于隐藏状态;或者在根据第二指令将第二界面上显示的目标信息更新为第一账号的身份信息时,在第二界面上显示第二提示信息,其中,第二提示信息用于指示第一账号的身份信息处于可查看状态。
处理器401还用于检测第二指令是否携带有目标信息;若检测到第二指令携带有目标信息,则将第二界面上显示的第一账号的身份信息更新为第二指令携带的目标信息。
处理器401还用于检测第二指令是否携带有目标信息;若检测到第二指令没有携带目标信息,则将第二指令发送给服务器;接收服务器响应第二指令生成的目标信息,其中,服务器从预设身份信息分组中随机抽取第一分组,并从第一分组中随机抽取一个身份信息作为目标信息。
处理器401还用于向服务器发送第一指令,第一指令用于指示对第一信息执行预设事件;接收服务器响应第一指令发送的待转移资源的数值;在第二界面上显示待转移资源的数值,其中,待转移资源的数值处于可编辑状态。
处理器401还用于检测预设时间段内第一账号与第二账号互动行为信息;根据互动行为信息生成待转移资源的数值,其中,若互动行为信息满足预设条件,生成的待转移资源的数值大于或者等于第一数值,若互动行为信息不满足预设条件,生成的待转移资源的数值小于第一数值。
处理器401还用于在第二界面接收留言信息;其中,在完成由第一账号向第二账号转移资源时,在第一界面上显示留言信息以及目标信息,其中,第一账号的身份信息处于不允许被查看的状态。
处理器401还用于接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求,其中,身份信息更换请求由登录第一账号的终端通过第二界面发送,终端的第一界面上接收第一指令后显示第二界面,第一指令用于指示对第一信息执行预设事件,第一界面中显示第二账号发布的第一信息,第二界面中显示第一账号的身份信息,其中,第一账号的身份信息处于可编辑状态;根据身份信息更换请求生成目标信息;向登录第一账号的终端发送目标信息。
处理器401还用于从预设身份信息分组中随机抽取第一分组,预设身份信息分组中包括多个身份信息;从第一分组中随机抽取一个身份信息作为目标信息。
处理器401还用于检测预设时间段内第一账号与第二账号互动行为信息;根据互动行为信息生成待转移资源的数值,其中,若互动行为信息满足预设条件,生成的待转移资源的数值大于或者等于第一数值,若互动行为信息不满足预设条件,生成的待转移资源的数值小于第一数值。
可选地,本实施例中的具体示例可以参考上述实施例中所描述的示例,本实施例在此不再赘述。
本申请的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以用于存储本申请实施例的信息更新的方法的程序代码。
可选地,在本实施例中,上述存储介质可以位于移动通信网络、广域网、城域网或局域网的网络中的多个网络设备中的至少一个网络设备。
可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:
S1,在终端的第一界面上接收第一指令,其中,第一指令用于指示对第一信息执行预设事件,第一界面中显示第二账号发布的第一信息;
S2,响应第一指令显示第二界面,其中,第二界面中显示第一账号的身份信息,第一账号的身份信息处于可编辑状态;
S3,在第二界面上接收第二指令,其中,第二指令用于指示将第一账号的身份信息更换为目标信息。
S4,根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:在第二界面上接收第三指令,其中,第三指令用于将目标信息更换为第一账号的身份信息;将第二界面上显示的目标信息更新为第一账号的身份信息
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:在根据第二指令将第二界面上显示的第一账号的身份信息更新为目标信息时,在第二界面上显示第一提示信息,其中,第一提示信息用于指示第一账号的身份信息处于隐藏状态;或者在根据第二指令将第二界面上显示的目标信息更新为第一账号的身份信息时,在第二界面上显示第二提示信息,其中,第二提示信息用于指示第一账号的身份信息处于可查看状态。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:检测第二指令是否携带有目标信息;若检测到第二指令携带有目标信息,则将第二界面上显示的第一账号的身份信息更新为第二指令携带的目标信息。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:检测第二指令是否携带有目标信息;若检测到第二指令没有携带目标信息,则将第二指令发送给服务器;接收服务器响应第二指令生成的目标信息,其中,服务器从预设身份信息分组中随机抽取第一分组,并从第一分组中随机抽取一个身份信息作为目标信息。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:向服务器发送第一指令,第一指令用于指示对第一信息执行预设事件;接收服务器响应第一指令发送的待转移资源的数值;在第二界面上显示待转移资源的数值,其中,待转移资源的数值处于可编辑状态。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:服务器检测预设时间段内第一账号与第二账号互动行为信息;服务器根据互动 行为信息生成待转移资源的数值,其中,若互动行为信息满足预设条件,生成的待转移资源的数值大于或者等于第一数值,若互动行为信息不满足预设条件,生成的待转移资源的数值小于第一数值。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:在第二界面接收留言信息;
其中,在完成由第一账号向第二账号转移资源时,在第一界面上显示留言信息以及目标信息,其中,第一账号的身份信息处于不允许被查看的状态。
可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:
S1,接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求,其中,身份信息更换请求由登录第一账号的终端通过第二界面发送,终端的第一界面上接收第一指令后显示第二界面,第一指令用于指示对第一信息执行预设事件,第一界面中显示第二账号发布的第一信息,第二界面中显示第一账号的身份信息,其中,第一账号的身份信息处于可编辑状态;
S2,根据身份信息更换请求生成目标信息;
S3,向登录第一账号的终端发送目标信息。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:从预设身份信息分组中随机抽取第一分组,预设身份信息分组中包括多个身份信息;从第一分组中随机抽取一个身份信息作为目标信息。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:检测预设时间段内第一账号与第二账号互动行为信息;根据互动行为信息生成待转移资源的数值,其中,若互动行为信息满足预设条件,生成的待转移资源的数值大于或者等于第一数值,若互动行为信息不满足预设条件,生成的待转移资源的数值小于第一数值。
可选地,本实施例中的具体示例可以参考上述实施例中所描述的示例,本实施例在此不再赘述。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
上述实施例中的集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在上述计算机可读取的存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在存储介质中,包括若干指令用以使得一台或多台计算机设备(可为个人计算机、服务器或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。
在本申请的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
在本申请所提供的几个实施例中,应该理解到,所揭露的客户端,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
以上所述仅是本申请的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。

Claims (22)

  1. 一种信息更新的方法,其特征在于,包括:
    在终端的第一界面上接收针对第一信息的第一指令,其中,所述终端通过第一账号登录,所述第一指令用于指示对所述第一信息执行预设事件,所述第一信息由第二账号发布,并且显示在所述第一界面上;
    终端响应所述第一指令显示第二界面,其中,所述第二界面中显示所述第一账号的身份信息,所述第一账号的身份信息处于可编辑状态;
    终端在所述第二界面上接收第二指令,其中,所述第二指令用于指示将所述第一账号的身份信息更换为目标信息;以及
    终端根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息。
  2. 根据权利要求1所述的方法,其特征在于,在根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息之后,所述方法还包括:
    终端在所述第二界面上接收第三指令,其中,所述第三指令用于将所述目标信息更换为所述第一账号的身份信息;以及
    终端将所述第二界面上显示的所述目标信息更新为所述第一账号的身份信息。
  3. 根据权利要求2所述的方法,其特征在于,
    在根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息时,在所述第二界面上显示第一提示信息,其中,所述第一提示信息用于指示所述第一账号的身份信息处于隐藏状态;或者
    在根据所述第二指令将所述第二界面上显示的所述目标信息更新为所述第一账号的身份信息时,在所述第二界面上显示第二提示信息,其中,所述第二提示信息用于指示所述第一账号的身份信息处于可查看状态。
  4. 根据权利要求1所述的方法,其特征在于,在所述第二界面上接收第二指令之后,并且在根据所述第二指令将所述第二界面上显示的所述第一账号 的身份信息更新为所述目标信息之前,所述方法还包括:
    终端检测所述第二指令是否携带有所述目标信息;以及
    若检测到所述第二指令携带有所述目标信息,则终端将所述第二界面上显示的所述第一账号的身份信息更新为所述第二指令携带的所述目标信息。
  5. 根据权利要求1所述的方法,其特征在于,在所述第二界面上接收第二指令之后,并且在根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息之前,所述方法还包括:
    终端检测所述第二指令是否携带有所述目标信息;
    若检测到所述第二指令没有携带所述目标信息,则终端将所述第二指令发送给服务器;以及
    终端接收所述服务器响应所述第二指令生成的所述目标信息,其中,所述服务器从预设身份信息分组中随机抽取第一分组,并从所述第一分组中随机抽取一个身份信息作为所述目标信息。
  6. 根据权利要求1所述的方法,其特征在于,所述预设事件为转移资源,在终端的第一界面上接收针对第一信息的第一指令之后,所述方法还包括:
    终端向服务器发送所述第一指令,所述第一指令用于指示向所述第二账号转移资源;
    终端接收所述服务器响应所述第一指令发送的待转移资源的数值;以及
    终端在所述第二界面上显示所述待转移资源的数值,其中,所述待转移资源的数值处于可编辑状态。
  7. 根据权利要求6所述的方法,其特征在于,在向服务器发送所述第一指令之后,且接收所述服务器响应所述第一指令发送的待转移资源的数值之前,所述方法还包括:
    所述服务器检测预设时间段内所述第一账号与所述第二账号的互动行为信息;以及
    所述服务器根据所述互动行为信息生成所述待转移资源的数值,其中, 若所述互动行为信息满足预设条件,生成的所述待转移资源的数值大于或者等于第一数值,若所述互动行为信息不满足所述预设条件,生成的所述待转移资源的数值小于所述第一数值。
  8. 根据权利要求1所述的方法,其特征在于,在响应所述第一指令显示第二界面之后,所述方法还包括:
    终端在所述第二界面接收留言信息;
    其中,在完成由所述第一账号向所述第二账号转移资源时,在所述第一界面上显示所述留言信息以及所述目标信息,其中,在显示所述目标信息时,所述第一账号的身份信息处于不允许被查看的状态。
  9. 一种信息更新的方法,其特征在于,包括:
    服务器接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求,其中,所述身份信息更换请求由登录第一账号的终端通过第二界面发送,终端的第一界面上接收第一指令后显示所述第二界面,所述第一指令用于指示对第一信息执行预设事件,所述第一界面中显示第二账号发布的所述第一信息,所述第二界面中显示所述第一账号的身份信息,其中,所述第一账号的身份信息处于可编辑状态;
    所述服务器根据所述身份信息更换请求生成所述目标信息;以及
    所述服务器向所述登录第一账号的终端发送所述目标信息。
  10. 根据权利要求9所述的方法,其特征在于,所述服务器根据所述身份信息更换请求生成所述目标信息包括:
    所述服务器从预设身份信息分组中随机抽取第一分组,所述预设身份信息分组中包括多个身份信息;以及
    所述服务器从所述第一分组中随机抽取一个身份信息作为所述目标信息。
  11. 根据权利要求9所述的方法,其特征在于,所述预设事件为转移资源,在服务器接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求之前,所述方法还包括:
    所述服务器检测预设时间段内所述第一账号与所述第二账号的互动行 为信息;以及
    所述服务器根据所述互动行为信息生成待转移资源的数值,其中,若所述互动行为信息满足预设条件,生成的所述待转移资源的数值大于或者等于第一数值,若所述互动行为信息不满足预设条件,生成的所述待转移资源的数值小于所述第一数值。
  12. 一种信息更新的装置,其特征在于,包括:
    第一接收单元,用于在所述装置的第一界面上接收针对第一信息的第一指令,其中,所述装置通过第一账号登录,所述第一指令用于指示对所述第一信息执行预设事件,所述第一信息由第二账号发布,并且显示在所述第一界面上;
    第一显示单元,用于响应所述第一指令显示第二界面,其中,所述第二界面中显示所述第一账号的身份信息,所述第一账号的身份信息处于可编辑状态;
    第二接收单元,用于在所述第二界面上接收第二指令,其中,所述第二指令用于指示将所述第一账号的身份信息更换为目标信息;以及
    第一更新单元,用于根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息。
  13. 根据权利要求12所述的装置,其特征在于,所述装置还包括:
    第三接收单元,用于在所述第一更新单元根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息之后,在所述第二界面上接收第三指令,其中,所述第三指令用于将所述目标信息更换为所述第一账号的身份信息;以及
    第二更新单元,用于将所述第二界面上显示的所述目标信息更新为所述第一账号的身份信息。
  14. 根据权利要求13所述的装置,其特征在于,
    在所述第一更新单元根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息时,所述第一显示单元在所述第二界面上显示第一提示信息,其中,所述第一提示信息用于指示所述第一账号的身份信息处于隐藏状态;或者
    在所述第一更新单元根据所述第二指令将所述第二界面上显示的所述目标信息更新为所述第一账号的身份信息时,所述第一显示单元在所述第二界面上显示第二提示信息,其中,所述第二提示信息用于指示所述第一账号的身份信息处于可查看状态。
  15. 根据权利要求12所述的装置,其特征在于,所述装置还包括:
    第一检测单元,用于在所述第二接收单元在所述第二界面上接收第二指令之后,并且在所述第一更新单元根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息之前,检测所述第二指令是否携带有所述目标信息;以及
    第三更新单元,用于若检测到所述第二指令携带有所述目标信息,则将所述第二界面上显示的所述第一账号的身份信息更新为所述第二指令携带的所述目标信息。
  16. 根据权利要求12所述的装置,其特征在于,所述装置还包括:
    第二检测单元,用于在所述第二接收单元在所述第二界面上接收第二指令之后,并且在所述第一更新单元根据所述第二指令将所述第二界面上显示的所述第一账号的身份信息更新为所述目标信息之前,检测所述第二指令是否携带有所述目标信息;
    第一发送单元,用于若检测到所述第二指令没有携带所述目标信息,则将所述第二指令发送给服务器;
    第四接收单元,用于接收所述服务器响应所述第二指令生成的所述目标信息,其中,所述服务器从预设身份信息分组中随机抽取第一分组,并从所述第一分组中随机抽取一个身份信息作为所述目标信息。
  17. 根据权利要求12所述的装置,其特征在于,所述预设事件为转移资源,所述装置还包括:
    第二发送单元,用于在所述第一接收单元在装置的第一界面上接收第一指令之后,向服务器发送所述第一指令,所述第一指令用于指示向所述第二账号转移资源;
    第五接收单元,用于接收所述服务器响应所述第一指令发送的待转移资源的数值;以及
    第二显示单元,用于在所述第二界面上显示所述待转移资源的数值,其中,所述待转移资源的数值处于可编辑状态。
  18. 根据权利要求17所述的装置,其特征在于,所述装置还包括:
    第三检测单元,用于在所述第二发送单元向服务器发送所述第一指令之后,且所述第五接收单元接收所述服务器响应所述第一指令发送的待转移资源的数值之前,所述服务器检测预设时间段内所述第一账号与所述第二账号互动行为信息;以及
    生成单元,用于所述服务器根据所述互动行为信息生成所述待转移资源的数值,其中,若所述互动行为信息满足预设条件,生成的所述待转移资源的数值大于或者等于第一数值,若所述互动行为信息不满足所述预设条件,生成的所述待转移资源的数值小于所述第一数值。
  19. 根据权利要求12所述的装置,其特征在于,所述装置还包括:
    第六接收单元,用于在所述第一显示单元响应所述第一指令显示第二界面之后,在所述第二界面接收留言信息;
    其中,在完成由所述第一账号向所述第二账号转移资源时,在所述第一界面上显示所述留言信息以及所述目标信息,其中,在显示所述目标信息时,所述第一账号的身份信息处于不允许被查看的状态。
  20. 一种服务器,其特征在于,包括:
    接收模块,用于接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求,其中,所述身份信息更换请求由登录第一账号的终端通过第二界面发送,终端的第一界面上接收第一指令后显示所述第二界面,所述第一指令用于指示对第一信息执行预设事件,所述第一界面中显示第二账号发布的所述第一信息,所述第二界面中显示所述第一账号的身份信息,其中,所述第一账号的身份信息处于可编辑状态;
    第一生成模块,用于所述服务器根据所述身份信息更换请求生成所述目标信息;以及
    发送模块,用于所述服务器向登录所述第一账号的终端发送所述目标信息。
  21. 根据权利要求20所述的服务器,其特征在于,所述第一生成模块包括:
    第一抽取子模块,用于从预设身份信息分组中随机抽取第一分组,所述预设身份信息分组中包括多个身份信息;以及
    第二抽取子模块,用于从所述第一分组中随机抽取一个身份信息作为所述目标信息。
  22. 根据权利要求20所述的服务器,其特征在于,所述预设事件为转移资源,所述服务器还包括:
    检测模块,用于在所述接收模块接收用于指示将第一账号的身份信息更换为目标信息的身份信息更换请求之前,检测预设时间段内所述第一账号与所述第二账号互动行为信息;以及
    第二生成模块,用于根据所述互动行为信息生成待转移资源的数值,其中,若所述互动行为信息满足预设条件,生成的所述待转移资源的数值大于或者等于第一数值,若所述互动行为信息不满足所述预设条件,生成的所述待转移资源的数值小于所述第一数值。
PCT/CN2017/086278 2016-05-27 2017-05-27 信息更新的方法、装置以及服务器 WO2017202386A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
MYPI2018701658A MY192880A (en) 2016-05-27 2017-05-27 Information update method and apparatus, and server
KR1020187013321A KR102108882B1 (ko) 2016-05-27 2017-05-27 정보 업데이트 방법 및 장치, 그리고 서버
JP2018526694A JP6560453B2 (ja) 2016-05-27 2017-05-27 情報更新方法および装置ならびにサーバ
US16/005,296 US10880398B2 (en) 2016-05-27 2018-06-11 Information updating/exchange method, apparatus, and server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610363929.X 2016-05-27
CN201610363929.XA CN106096927A (zh) 2016-05-27 2016-05-27 信息更新的方法、装置以及服务器

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/005,296 Continuation US10880398B2 (en) 2016-05-27 2018-06-11 Information updating/exchange method, apparatus, and server

Publications (1)

Publication Number Publication Date
WO2017202386A1 true WO2017202386A1 (zh) 2017-11-30

Family

ID=57230231

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/086278 WO2017202386A1 (zh) 2016-05-27 2017-05-27 信息更新的方法、装置以及服务器

Country Status (6)

Country Link
US (1) US10880398B2 (zh)
JP (1) JP6560453B2 (zh)
KR (1) KR102108882B1 (zh)
CN (2) CN106096927A (zh)
MY (1) MY192880A (zh)
WO (1) WO2017202386A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096927A (zh) * 2016-05-27 2016-11-09 腾讯科技(深圳)有限公司 信息更新的方法、装置以及服务器
US10552500B2 (en) * 2017-03-02 2020-02-04 International Business Machines Corporation Presenting a data instance based on presentation rules
CN107092426A (zh) * 2017-04-10 2017-08-25 上海哇嗨网络科技有限公司 主题发布方法和主题阅读方法
CN107481006B (zh) * 2017-08-24 2020-06-26 维沃移动通信有限公司 一种资源转移方法、服务器及终端
CN109067847B (zh) * 2018-07-10 2022-12-02 维沃移动通信有限公司 一种资源转移方法、接收终端、发送终端及服务器
EP3809248A4 (en) * 2018-07-31 2021-06-16 Huawei Technologies Co., Ltd. APPLICATION ICON DISPLAY PROCEDURE AND TERMINAL
US11070644B1 (en) * 2020-06-29 2021-07-20 Amazon Technologies, Inc. Resource grouped architecture for profile switching
CN111784315B (zh) * 2020-07-15 2022-04-29 支付宝(杭州)信息技术有限公司 电子红包的相关信息展示、发送、接收方法、装置及设备
CN113204724B (zh) * 2021-04-30 2024-05-14 北京达佳互联信息技术有限公司 创建互动信息的方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752313A (zh) * 2012-07-18 2012-10-24 北京开心人信息技术有限公司 一种即时通信工具中用户多身份的方法及装置
CN105227568A (zh) * 2015-10-16 2016-01-06 郭洪威 一种通讯的方法及装置
CN105515948A (zh) * 2015-12-04 2016-04-20 小米科技有限责任公司 即时通信方法和装置
CN106096927A (zh) * 2016-05-27 2016-11-09 腾讯科技(深圳)有限公司 信息更新的方法、装置以及服务器

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003263387A (ja) * 2002-03-07 2003-09-19 Fujitsu Ltd 個人間通信方法および個人間通信装置
US7870199B2 (en) * 2003-10-06 2011-01-11 Aol Inc. System and method for seamlessly bringing external services into instant messaging session
US7620636B2 (en) * 2006-01-10 2009-11-17 Stay Awake Inc. Method and apparatus for collecting and storing information about individuals in a charitable donations social network
JP2008129860A (ja) * 2006-11-21 2008-06-05 Matsushita Electric Ind Co Ltd 情報処理機器、サービス提供サーバ及び遠隔操作装置
US8438069B2 (en) * 2007-08-23 2013-05-07 Ebay Inc. Methods and systems to facilitate a purchase of an item on a network-based marketplace
US20140250001A1 (en) * 2010-12-14 2014-09-04 Giftya Llc System and method for processing gifts between different payment account types
JP2011002951A (ja) * 2009-06-17 2011-01-06 Ohma Inc 寄付システム
CN102045314B (zh) * 2009-10-10 2016-08-03 中兴通讯股份有限公司 匿名通信的方法、注册方法、信息收发方法及系统
US20130144951A1 (en) * 2010-07-23 2013-06-06 Smeak, Inc. Communication management system with extensible command language to consolidate and control multiple diverse communication mechanisms
US9306896B2 (en) * 2013-02-11 2016-04-05 Facebook, Inc. Delivery of messages for a life event of user of social networking system
KR20150018698A (ko) * 2013-08-08 2015-02-24 주식회사 레드퀸 연락처 기반 익명 대화 서비스 제공 시스템 및 이를 이용한 익명 대화 구현 방법
WO2015165018A1 (en) * 2014-04-28 2015-11-05 Tencent Technology (Shenzhen) Company Limited Method and device for providing online gifting
CN105306339B (zh) 2014-07-31 2020-06-16 腾讯科技(深圳)有限公司 一种信息交互方法及系统
US20160071099A1 (en) * 2014-09-05 2016-03-10 Silouet, Inc. Payment system that reduces or eliminates the need to exchange personal information
CN104392535B (zh) * 2014-12-11 2017-04-26 北京奇虎科技有限公司 群组内的投票方法和装置
CN104615747B (zh) * 2015-02-11 2017-05-17 腾讯科技(深圳)有限公司 一种信息处理方法、客户端及服务器
US10812429B2 (en) * 2015-04-03 2020-10-20 Glu Mobile Inc. Systems and methods for message communication
CN108028840B (zh) * 2015-07-15 2021-01-22 瑞典爱立信有限公司 实现建立安全的对等连接
CN105228087B (zh) * 2015-09-06 2019-04-09 宁波大学 基于近场通信的移动支付加密方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752313A (zh) * 2012-07-18 2012-10-24 北京开心人信息技术有限公司 一种即时通信工具中用户多身份的方法及装置
CN105227568A (zh) * 2015-10-16 2016-01-06 郭洪威 一种通讯的方法及装置
CN105515948A (zh) * 2015-12-04 2016-04-20 小米科技有限责任公司 即时通信方法和装置
CN106096927A (zh) * 2016-05-27 2016-11-09 腾讯科技(深圳)有限公司 信息更新的方法、装置以及服务器

Also Published As

Publication number Publication date
US20180295208A1 (en) 2018-10-11
KR102108882B1 (ko) 2020-05-11
MY192880A (en) 2022-09-13
JP2019508767A (ja) 2019-03-28
CN113723941A (zh) 2021-11-30
KR20180067625A (ko) 2018-06-20
CN106096927A (zh) 2016-11-09
JP6560453B2 (ja) 2019-08-14
US10880398B2 (en) 2020-12-29

Similar Documents

Publication Publication Date Title
WO2017202386A1 (zh) 信息更新的方法、装置以及服务器
US11290550B2 (en) Method and device for allocating augmented reality-based virtual objects
US11405350B2 (en) Multi-media processing and displaying method, terminal, and computer storage medium in a social networking application based on interaction information by multiple user accounts
EP3453146B1 (en) Communication system
CN108028798B (zh) 用于统一的消息传递平台的方法、装置和计算机设备
EP2849411B1 (en) Session establishment methods and corresponding server
WO2022017071A1 (zh) 基于虚拟角色交互界面的通信方法、装置和计算机设备
US20120203848A1 (en) System and method to provide context for an automated agent to service multiple avatars within a virtual universe
CN101364957B (zh) 基于即时通信平台管理虚拟形象的系统及方法
CN109155024A (zh) 与用户和接收设备共享内容
EP3808113A1 (en) Systems and methods for providing a flexibile and integrated communications, scheduling, and commerce platform
CN111557014A (zh) 提供多个个人资料的方法及系统
CN111934983B (zh) 数据交互方法和装置、存储介质及电子设备
JP6618207B2 (ja) 情報処理方法、端末、およびコンピュータストレージ媒体
CN114124415B (zh) 目标交互应用中的信息交互方法和装置
US9692803B2 (en) Computer device, system and methods for controlling an exchange of objects between devices
KR20210022964A (ko) 소셜 네트워크 서비스 관련 활동의 정보를 채팅방에 제공하는 방법 및 장치

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 20187013321

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2018526694

Country of ref document: JP

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17802232

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17802232

Country of ref document: EP

Kind code of ref document: A1