Movatterモバイル変換


[0]ホーム

URL:


CN115549918A - Information processing method, device and equipment - Google Patents

Information processing method, device and equipment
Download PDF

Info

Publication number
CN115549918A
CN115549918ACN202211088361.7ACN202211088361ACN115549918ACN 115549918 ACN115549918 ACN 115549918ACN 202211088361 ACN202211088361 ACN 202211088361ACN 115549918 ACN115549918 ACN 115549918A
Authority
CN
China
Prior art keywords
service
password
user
service condition
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211088361.7A
Other languages
Chinese (zh)
Inventor
朱志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co LtdfiledCriticalAdvanced New Technologies Co Ltd
Priority to CN202211088361.7ApriorityCriticalpatent/CN115549918A/en
Publication of CN115549918ApublicationCriticalpatent/CN115549918A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

The embodiment of the application discloses an information processing method, device and equipment. The method comprises the following steps: receiving a password request, determining a service condition and password characteristic information corresponding to the password request, generating a service password with the service condition according to the password characteristic information and the service condition, and feeding back the service password to a first user so as to verify a second user using the service password sent by the first user according to the service condition. By the method, under the action of the service condition, the audience users using the service password can be limited, namely, only the second user meeting the service condition can obtain the corresponding service content through the service password.

Description

Information processing method, device and equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information processing method, apparatus, and device.
Background
With the development of information technology, different users can share service contents.
Specifically, in the prior art, a user may use a service application having a service password function to generate a service password and transmit the service password to other users. After receiving the service password, other users can use the service password in corresponding service application to obtain the service content shared by the first user.
Based on the prior art, a more convenient and efficient sharing approach is needed.
Disclosure of Invention
The embodiment of the application provides an information processing method, device and equipment, which are used for solving the problem that certain defects exist in the prior art when a service password is adopted to share service content.
An information processing method provided by an embodiment of the present application includes:
receiving a password request;
determining a service condition and password characteristic information corresponding to the password request;
and generating a service password with the service condition according to the password characteristic information and the service condition, and feeding back the service password to the first user so as to verify a second user using the service password sent by the first user according to the service condition.
An embodiment of the present application further provides an information processing method, including:
receiving password characteristic information and service conditions set by a first user;
and generating a password request according to the password characteristic information and the service conditions, and sending the password request to a server so that the server generates a service password with the service conditions.
An embodiment of the present application further provides an information processing method, including:
receiving a service password; the service password is generated according to password characteristic information and service conditions set by the first user;
determining a service condition corresponding to the service password;
verifying the second user according to the service condition;
and when the second user is determined to meet the service condition, providing service content corresponding to the service password to the second user.
An information processing apparatus provided in an embodiment of the present application includes:
the receiving module receives a password request;
the determining module is used for determining the service condition and the password characteristic information corresponding to the password request;
and the password generating module is used for generating a service password with the service condition according to the password characteristic information and the service condition and feeding the service password back to the first user so as to verify a second user using the service password sent by the first user according to the service condition.
An information processing apparatus provided in another embodiment of the present application includes:
the receiving module is used for receiving password characteristic information and service conditions set by a first user;
and the request generation module generates a password request according to the password characteristic information and the service condition and sends the password request to the server so that the server generates a service password with the service condition.
An information processing apparatus provided in an embodiment of the present application includes:
the receiving module is used for receiving the service password; the service password is generated according to password characteristic information and service conditions set by the first user;
the condition determining module is used for determining the service condition corresponding to the service password;
the checking module is used for checking the second user according to the service condition;
and the response module is used for providing the service content corresponding to the service password to the second user when the second user is determined to meet the service condition.
An information processing terminal provided in an embodiment of the present application includes: a processor, a memory, a communication interface, wherein,
the memory stores an information processing program;
the processor calls the information processing program stored in the memory and executes:
receiving password characteristic information and service conditions set by a first user, generating a password request according to the password characteristic information and the service conditions, and calling a communication interface to send the password request to a server;
and the communication interface sends the password request to the server and receives the service password fed back by the server.
An information processing server provided in an embodiment of the present application includes: a processor, a memory, a communication interface, wherein,
the memory stores an information processing program;
the processor, after receiving the password request, calls the information processing program stored in the memory and executes:
determining a service condition and password characteristic information corresponding to the password request, generating a service password with the service condition according to the password characteristic information and the service condition, and calling a communication interface to send the service password;
the communication interface receives the password request and sends the service password.
An information processing server provided in an embodiment of the present application includes: a processor, a memory, a communication interface, wherein,
the memory stores an information processing program;
the processor calls the information processing program stored in the memory after receiving the service password, and executes:
determining a service condition corresponding to the service password, verifying the second user according to the service condition, and providing service content corresponding to the service password to the second user when the second user is determined to meet the service condition;
the communication interface receives the service password and sends the service content.
Further, in an embodiment of the present application, there is also provided a non-transitory memory storing a computer program that causes a terminal to execute a method including:
receiving password characteristic information and service conditions set by a first user;
and generating a password request according to the password characteristic information and the service condition, and sending the password request to a server so that the server generates a service password with the service condition.
On the server side, there is also provided a non-transitory memory storing a computer program for causing a server to execute a method comprising:
receiving a password request;
determining a service condition and password characteristic information corresponding to the password request;
and generating a service password with the service condition according to the password characteristic information and the service condition, and feeding back the service password to the first user so as to verify a second user using the service password sent by the first user according to the service condition.
And a non-transitory memory storing a computer program that causes a server to execute a method comprising:
receiving a service password;
determining a service condition corresponding to the service password;
verifying the second user according to the service condition;
and when the second user is determined to meet the service condition, providing service content corresponding to the service password to the second user.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
after receiving the password request sent by the first user, the server determines the service condition and the password characteristic information corresponding to the password request, and generates a service password to be fed back to the first user. On the server side, the corresponding relation between the service content and the service condition is established, so that when the second user wants to obtain the corresponding service content by using the service password, the server can verify the second user according to the service condition.
Under the action of the service condition, the audience users (i.e. the second users) using the service password can be limited, that is, only the second users meeting the service condition can obtain the corresponding service content through the service password. Compared with the prior art, the information processing method in the embodiment of the application can enhance the pertinence of the service content shared in the form of the service password.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic diagram of an architecture on which an information processing method according to an embodiment of the present application is based;
fig. 2a is a schematic diagram of an information processing process at a service client side in a password generation phase according to an embodiment of the present application;
fig. 2b-2c are schematic diagrams of an interface for setting service conditions, displayed on a service client in practical application according to the embodiment of the present application;
fig. 3 is a schematic diagram of an information processing process on a server side in a password generation phase according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an information processing process on a server side in a password using phase according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an information processing apparatus at a service client side in a password generation phase according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an information processing apparatus on a server side in a password generation phase according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an information processing apparatus on a server side in a password using phase according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Based on the foregoing content, the present application provides an information processing method, so that when a first user requests to generate a corresponding service password, the first user may make a limitation on audience users of the service password, that is, only users meeting a certain condition may obtain corresponding service content.
It should be noted here that, the service password may include: the red envelope password (for picking up the corresponding virtual red envelope), the goods page password of the online merchant (for accessing to the corresponding goods page), the friend-making password (for adding friends), etc., and of course, different forms of service passwords exist in the actual service scene, which are not listed one by one. It can be seen that different service passwords correspond to different service contents.
In the embodiment of the present application, the information processing method may adopt the architecture shown in fig. 1. In fig. 1, at least: service client, service server (for convenience of description, it will be simply referred to as server hereinafter).
The service client has a service password function, that is, a user can edit and use a service password through the service client.
The service server is associated with the service client and used as a background server of the service client, and can generate a service password according to a request sent by the service client and verify a user of the service password.
Different users can share and transmit the Service password through an Instant Messaging (IM) application client, a Short Messaging Service (SMS), a Multimedia Messaging Service (MMS) and other ways.
( The user who sends the service password is called as follows: the first user, who receives and uses the service password, is called: second user )
However, it should be understood that, in actual operation, the service password received by the second user is not necessarily directly shared or transmitted by the first user, and may be received by the second user after multiple transmissions between different users, and such a transmission process should also be considered to be within the coverage range of fig. 1.
The information processing procedure provided by the embodiment of the present application will be described in detail below based on the architecture shown in fig. 1.
The generation process of the service password comprises the following steps:
the generation of the service password in the embodiment of the present application depends on the password generation operation of the first user, so for the first user side, the setting process of the service password may be as shown in fig. 2a, and for the method process shown in fig. 2a, the execution subject may be a service client, which specifically includes the following steps:
step S201: and receiving password characteristic information and service conditions input by a first user.
As a possible mode in an actual application scene, a first user can edit different password characteristic information and service conditions in a user-defined manner through a password editing interface of a service client. It is understood that, after the user edits, a corresponding request may be sent to the server through the service client, so that the server generates the service password.
Specifically, the first user sets corresponding service conditions for the service password to be generated, so as to realize the limitation of the user (i.e., the second user) using the service password.
The service condition defines a condition to be satisfied by a user who can obtain service content by using a service password. It is understood that the service conditions are different in different scenarios, such as: in the service scenario of the password red packet, the service condition may be "friend of the first user"; for another example: in the business scenario of the goods page password, the business condition may be "the user has historically purchased the goods". Of course, the setting will be specifically performed according to the actual service scenario, and this should not be construed as a limitation to the present application.
The password feature information edited by the first user generally includes: password content, service content corresponding to the password, and the like. Wherein, the password content includes but is not limited to: password codes (e.g., 1234), password strings (e.g., I want to rob the red envelope), links to business content, account information, etc., including but not limited to: a virtual red envelope, a merchandise page, a virtual business card of the first user, etc.
Step S203: and generating a password request according to the password characteristic information and the service condition, and sending the password request to a server so that the server generates a service password with the service condition.
In practical applications, the service client may generally generate the password request after the first user issues the request instruction. In another possible case, the service client may also monitor the first user's editing of the password feature information and service conditions and automatically trigger generation of the password request. And are not to be construed as limiting the application herein.
Of course, besides the password characteristic information and the service condition, the password request usually also carries user information (such as userID, account name, etc.) of the first user, and is not limited in this regard.
For the above process shown in fig. 2a, in an actual service scenario, the first user may set the corresponding service condition in different ways.
Specifically, as a possible way, the service condition may be preset by the service provider and provided to the user in the password editing interface in the form of an option, so that the first user may select the option to set the service condition. For example: as shown in fig. 2b, two service conditions are provided in the password editing interface, i.e., "my contact" and "anyone", and it is assumed that the first user selects "my contact", then the service conditions for the service password are: a contact of the first user.
As another possible way, the first user may edit and input the corresponding service condition by himself, and then the service condition input by the first user may be recognized by the server based on the semantic recognition function. For example: as shown in fig. 2c, a service condition entry box is provided in the password editing interface, in which the first user can enter the service condition in text format. Of course, in the case of supporting voice input, the user may also input the service condition in a voice manner.
Based on the description of the first user side, the generation process of the service password for the server side can be as shown in fig. 3. In the method shown in fig. 3, the execution subject may be a server, and specifically, the method may include the following steps:
step S301: a password request is received.
In the embodiment of the present application, the password request is sent by the first user, and the process of sending the password request by the first user is not described in detail herein as before.
Step S303: and determining the service condition and the password characteristic information carried in the password request.
Step S305: and generating a service password with the service condition according to the password characteristic information and the service condition, and feeding back the service password to the first user so as to verify a second user using the service password sent by the first user according to the service condition.
The server can generate the service password according to the service condition and the corresponding password characteristic information. In practical applications, the service password may be in the form of an image, a sound, a character string, and the like, wherein, for the service password in the form of an image, specifically, the service password may be in the form of a Digital Object Identifier (DOI), a virtual business card, a picture with a password code, and the like. Of course, the specific form adopted will be set according to the needs of the practical application, and is not limited in particular here.
It should be noted that, in actual operation, when the server generates the service password, the server will establish a corresponding relationship between the service password and the service condition. Meanwhile, considering that in practical applications, a server may receive password requests of a large number of different users, and then generate different service passwords, the service passwords generated by the server are generally unique. In the embodiment of the application, the server generates a unique password identifier for each generated service password to distinguish different service passwords, and establishes a corresponding relation with the service condition based on the unique password identifier.
The password identification here may include: the userID, account name of the first user, a unique number generated for the password request, and so on. Besides, the generation of password identification can also adopt such methods as: and calculating an information summary Algorithm 5 (Message Digest Algorithm 5, MD5) aiming at the commodity page link in the password content to obtain a corresponding information summary as a password identifier. Of course, this is merely an example of one possible implementation manner, and different generation manners will be specifically selected according to the needs of practical applications, and this should not be construed as a limitation of the present application.
Based on the above, in the embodiment of the present application, the password feature information includes: the password content and the service content to be shared, then, the process of generating the service password with the service condition may specifically be: generating a password identification according to the service content, establishing a corresponding relation between the password identification and the service condition, storing the password identification, and generating a service password according to the password content and the password identification of the corresponding relation established with the service condition.
The above is the generation process of the service password in the embodiment of the present application.
The service password is used:
after the second user receives the service password sent by the first user, the service password can be used through the service client so as to obtain corresponding service content. For the server, it needs to check whether the second user meets the condition of obtaining the service content. Therefore, for the server side, the service password using process may be as shown in fig. 4, and for the method process shown in fig. 4, the executing subject may be a server, which specifically includes the following steps:
step S401: a service password is received.
The service password is generated according to the password feature information and the service condition set by the first user, which may be referred to specifically above, and is not described in detail here.
Step S403: and determining the service condition corresponding to the service password.
In the embodiment of the present application, as described above, the service password and the service condition have a corresponding relationship, so the server can perform: and determining the password identification of the service password, and determining the service condition corresponding to the service password according to the pre-established corresponding relationship between the password identification and the service condition.
Of course, if the service password does not set the relevant service condition, the server may directly provide the service content corresponding to the service password to the second user according to an existing manner, which is not limited in this embodiment.
Step S405: and verifying the second user according to the service condition.
Step S407: and when the second user is determined to meet the service condition, providing service content corresponding to the service password to the second user.
In the embodiment of the application, only the second user meeting the service condition can obtain the service content corresponding to the service password, so that the limitation on all the second users using the service password is realized.
As a possible manner, when it is determined that the second user does not satisfy the service condition, a notification of failure in acquiring the service content is fed back to the second user. The notification may be a pop-up prompt, a voice prompt, etc., and is not limited herein.
It should be noted that, in practical applications, the process of verifying the second user is, for example: assuming that when the first user defines the red packet password, the set service conditions are as follows: if the user id of the second user is in the userID set, the server determines that the user id of the user who can receive the red packet is not in the userID set (the userID set includes the userID of each friend of the first user), and obtains the userID of the second user; otherwise, the second user is not a friend of the first user, and the second user cannot get the red envelope.
Another example is: assuming that a certain merchant is used as a first user, when a password of a certain commodity preferential activity is edited, the set service conditions are as follows: users who have been consumed more than 2 times at the merchant. Then, when a second user uses the password of the product preference, the server determines the userID of the second user, and queries the consumption record based on the userID, if the second user is queried to have historically conducted more than 2 transactions with the merchant, the server may provide a product preference page to the second user, and if the second user is queried not to satisfy the above conditions, the server does not provide the product preference page to the user.
Of course, the above two examples are only for facilitating understanding of the information processing method in the embodiments of the present application, and should not be construed as limiting the present application.
Through the above contents, after receiving the password request sent by the first user, the server determines the service condition and the password characteristic information corresponding to the password request, and generates the service password to feed back to the first user. On the server side, the corresponding relation between the service content and the service condition is established, so when the second user wants to obtain the corresponding service content by using the service password, the server can verify the second user according to the service condition.
Under the action of the service condition, the audience users (i.e. the second users) using the service password can be limited, that is, only the second users meeting the service condition can obtain the corresponding service content through the service password. Compared with the prior art, the information processing method in the embodiment of the application can enhance the pertinence of the business contents shared by the business password.
Based on the same idea, the information processing method provided in the embodiment of the present application further provides a plurality of information processing apparatuses. Specifically, the method comprises the following steps:
as for the generation phase of the service password, on the service client side, the information processing apparatus provided in the embodiment of the present application, as shown in fig. 5, includes:
areceiving module 501, configured to receive password feature information and service conditions set by a first user;
therequest generating module 502 generates a password request according to the password feature information and the service condition, and sends the password request to the server, so that the server generates a service password with the service condition.
The receivingmodule 501 receives a selection operation of the first user on a preset service condition option in a password editing interface, and determines a service condition according to the selection operation of the first user, or receives a service condition input by the first user in a user-defined manner.
Based on the apparatus shown in fig. 5, the apparatus may be implemented by a terminal device of an entity in practical applications, and specifically, the terminal device includes: a processor, a memory, a communication interface, wherein,
and a memory storing the information processing program.
A processor calling the information processing program stored in the memory and executing:
receiving password characteristic information and service conditions set by a first user, generating a password request according to the password characteristic information and the service conditions, and calling a communication interface to send the password request to a server.
And the communication interface sends the password request to the server and receives the service password fed back by the server.
Based on the content of the apparatus shown in fig. 5 and the terminal device, an embodiment of the present application further provides a non-transitory memory storing a computer program, where the computer program causes the terminal to execute the following method, including:
receiving password characteristic information and service conditions set by a first user;
and generating a password request according to the password characteristic information and the service condition, and sending the password request to a server so that the server generates a service password with the service condition.
It should be noted that, in the embodiment of the present application, for the information processing apparatus and the computer program in the non-transitory memory, more specific execution logics thereof correspond to the contents of the information processing method and the apparatus portion described above, and therefore redundant description is not repeated (also for the information processing apparatus and the non-transitory memory in the following embodiments).
On the server side, an information processing apparatus according to an embodiment of the present application, as shown in fig. 6, includes:
areceiving module 601, receiving a password request;
a determiningmodule 602, configured to determine a service condition and password feature information corresponding to the password request;
thepassword generating module 603 generates a service password with the service condition according to the password feature information and the service condition, and feeds the service password back to the first user, so as to verify a second user using the service password sent by the first user according to the service condition.
The password characteristic information comprises: thepassword generation module 603 generates a password identifier according to the service content, establishes a correspondence between the password identifier and the service condition, stores the correspondence, and generates a service password according to the password content and the password identifier establishing a correspondence with the service condition.
Wherein the service condition at least comprises: service conditions based on user information and/or service conditions based on historical service information for the user.
The apparatus shown in fig. 6 may be implemented by a server of an entity in practical application, and specifically, the server includes: a processor, a memory, a communication interface, wherein,
and a memory storing an information processing program.
And a processor which, after receiving the password request, calls the information processing program stored in the memory and executes:
determining the service condition and password characteristic information corresponding to the password request, generating a service password with the service condition according to the password characteristic information and the service condition, and calling a communication interface to send the service password.
And the communication interface receives the password request and sends the service password.
In addition, based on the content of the apparatus shown in fig. 6 and the server for information processing, the present application further provides a non-transitory memory storing a computer program that causes the server to execute a method including:
receiving a password request;
determining a service condition and password characteristic information corresponding to the password request;
and generating a service password with the service condition according to the password characteristic information and the service condition, and feeding back the service password to the first user so as to verify a second user using the service password sent by the first user according to the service condition.
As for the service password using phase, on the server side, an information processing apparatus provided in the embodiment of the present application is shown in fig. 7, and includes:
areceiving module 701, configured to receive a service password; the service password is generated according to password characteristic information and service conditions set by the first user;
acondition determining module 702, configured to determine a service condition corresponding to the service password;
achecking module 703, configured to check the second user according to the service condition;
and aresponse module 704, when it is determined that the second user meets the service condition, providing service content corresponding to the service password to the second user.
Thecondition determining module 702 determines the password identifier of the service password, and determines the service condition corresponding to the service password according to the pre-established correspondence between the password identifier and the service condition.
Theverifying module 703, when the service condition is a service condition based on user information, obtains user information of a second user, and verifies whether the user information of the second user matches with the user information corresponding to the service condition;
and when the service condition is based on the service information, acquiring historical service information of a second user, and checking whether the historical service information of the second user is matched with the service information corresponding to the service condition.
The device further comprises: anotification module 705, configured to feed back, to the second user, a notification that service content acquisition fails when theverification module 703 determines that the second user does not satisfy the service condition.
The apparatus shown in fig. 7 may be implemented by a server of an entity in practical application, and specifically, the server includes: a processor, a memory, a communication interface, wherein,
and a memory storing the information processing program.
And the processor calls the information processing program stored in the memory after receiving the service password and executes the following steps:
and determining a service condition corresponding to the service password, verifying the second user according to the service condition, and providing service content corresponding to the service password to the second user when the second user is determined to meet the service condition.
And the communication interface receives the service password and sends the service content.
Further, based on the contents of the apparatus shown in fig. 7 and the server for information processing, an embodiment of the present application further provides a non-transitory memory storing a computer program that causes the server to execute a method including:
receiving a service password;
determining a service condition corresponding to the service password;
verifying the second user according to the service condition;
and when the second user is determined to meet the service condition, providing service content corresponding to the service password to the second user.
Thus, particular embodiments of the present subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may be advantageous.
In the 90's of the 20 th century, improvements to a technology could clearly distinguish between improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements to process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain a corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical blocks. For example, a Programmable Logic Device (PLD) (e.g., a Field Programmable Gate Array (FPGA)) is an integrated circuit whose Logic functions are determined by a user programming the Device. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as ABEL (Advanced Boolean Expression Language), AHDL (alternate Hardware Description Language), traffic, CUPL (core universal Programming Language), HDCal, jhddl (Java Hardware Description Language), lava, lola, HDL, PALASM, rhyd (Hardware Description Language), and vhigh-Language (Hardware Description Language), which is currently used in most popular applications. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in purely computer readable program code means, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more pieces of software and/or hardware in the practice of the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular transactions or implement particular abstract data types. The application may also be practiced in distributed computing environments where transactions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (25)

CN202211088361.7A2017-06-152017-06-15Information processing method, device and equipmentPendingCN115549918A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202211088361.7ACN115549918A (en)2017-06-152017-06-15Information processing method, device and equipment

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
CN202211088361.7ACN115549918A (en)2017-06-152017-06-15Information processing method, device and equipment
CN201710453298.5ACN109150795B (en)2017-06-152017-06-15 An information processing method, device and equipment

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
CN201710453298.5ADivisionCN109150795B (en)2017-06-152017-06-15 An information processing method, device and equipment

Publications (1)

Publication NumberPublication Date
CN115549918Atrue CN115549918A (en)2022-12-30

Family

ID=64830147

Family Applications (2)

Application NumberTitlePriority DateFiling Date
CN202211088361.7APendingCN115549918A (en)2017-06-152017-06-15Information processing method, device and equipment
CN201710453298.5AActiveCN109150795B (en)2017-06-152017-06-15 An information processing method, device and equipment

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
CN201710453298.5AActiveCN109150795B (en)2017-06-152017-06-15 An information processing method, device and equipment

Country Status (1)

CountryLink
CN (2)CN115549918A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110399561B (en)*2019-07-312022-09-09中国工商银行股份有限公司Information recommendation method, information recommendation device and electronic equipment
CN115225760B (en)*2022-06-232024-05-24中国银行股份有限公司Password sharing processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102904886A (en)*2012-09-262013-01-30曙光信息产业(北京)有限公司Method for achieving file sharing
CN103916637A (en)*2014-04-152014-07-09浙江宇视科技有限公司Method and device for safely sharing monitoring front end device
CN105391622A (en)*2015-12-072016-03-09腾讯科技(深圳)有限公司Method and system for sharing resources in instant messaging or social networking application
CN105989483A (en)*2015-02-092016-10-05阿里巴巴集团控股有限公司Service realizing method and device and payment method and device
CN105989511A (en)*2015-02-092016-10-05阿里巴巴集团控股有限公司 Service Realization Method and Device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8825999B2 (en)*2007-10-202014-09-02Blackout, Inc.Extending encrypting web service
US20130305354A1 (en)*2011-12-232013-11-14Microsoft CorporationRestricted execution modes
CN103902916B (en)*2012-12-252017-03-01联想(北京)有限公司A kind of data processing method and a kind of electronic equipment
CN203206476U (en)*2013-05-062013-09-18重庆昇通科技有限公司Data content generating and sharing system based on dual-network
CN106712931B (en)*2015-08-202019-12-03上海国盾量子信息技术有限公司Handset token identity authorization system and method based on quantum cryptography networks
CN106780065A (en)*2016-12-052017-05-31深圳万发创新进出口贸易有限公司A kind of social networks resource sharing system
CN106840185B (en)*2017-01-252021-10-26百度在线网络技术(北京)有限公司Navigation route sharing method and device based on password, server and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102904886A (en)*2012-09-262013-01-30曙光信息产业(北京)有限公司Method for achieving file sharing
CN103916637A (en)*2014-04-152014-07-09浙江宇视科技有限公司Method and device for safely sharing monitoring front end device
CN105989483A (en)*2015-02-092016-10-05阿里巴巴集团控股有限公司Service realizing method and device and payment method and device
CN105989511A (en)*2015-02-092016-10-05阿里巴巴集团控股有限公司 Service Realization Method and Device
CN105391622A (en)*2015-12-072016-03-09腾讯科技(深圳)有限公司Method and system for sharing resources in instant messaging or social networking application

Also Published As

Publication numberPublication date
CN109150795B (en)2022-07-26
CN109150795A (en)2019-01-04

Similar Documents

PublicationPublication DateTitle
US11314754B2 (en)Data processing method, apparatus, and device
CN112183039B (en)Compliance verification method and device for business report
US9104768B2 (en)Person-based information aggregation
CN106899666B (en)Data processing method and device for service identification
CN111614655A (en)Consensus checking method and device
US10997963B1 (en)Voice based interaction based on context-based directives
CN107070871B (en)Identity verification method and device
US11158319B2 (en)Information processing system, method, device and equipment
CN110120908B (en)Group message processing method and device and server
US20200162267A1 (en)Signature generating method, and signature template sharing method and device
CN115549918A (en)Information processing method, device and equipment
CN115964743A (en)User identification and user information processing method, device, equipment and medium
CN111355654B (en)Target content sharing method, device and equipment
US12244662B2 (en)Connected cloud applications
HK40002371B (en)Information processing method, device and apparatus
HK40002371A (en)Information processing method, device and apparatus
CN107483534B (en)Service processing method and device
US9129025B2 (en)Automatically granting access to content in a microblog
CN108428189B (en) A social resource processing method, device and readable medium
CN108920658B (en)Mobile device desktop moving method and device and electronic device
CN112559610A (en)Method and device for generating account checking file
US10277690B2 (en)Configuration-driven sign-up
CN113011165B (en) A method, device, equipment and medium for identifying blocked keywords
KR102070757B1 (en)Method and device for providing cloud computing service in offline
CN117951133A (en)Method and device for processing associated field, electronic equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp