Detailed Description
The embodiment of the application provides a method for providing request information and a user terminal.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For convenience of understanding, the following embodiments of the present application all use "AA payment" in mobile payment technology as an example to describe the technical solution of the present application. The request information in the embodiment of the application may be collection information, correspondingly, the request authentication information may be collection authentication information, the requesting party may be a collection party, the requested party may be a paying party, and the request content may be collection information.
Fig. 1 is a flowchart of a method for providing request information according to an embodiment of the present application. As shown in fig. 1, the method includes:
s1: the first user terminal obtains an instruction of establishing request information.
The first user terminal can acquire an instruction for establishing the payment information through a function key or a voice prompt. When the function key for establishing the collection information is pressed down, the first user terminal can open a task window for establishing the collection information to establish the collection information. When the voice prompt key is pressed, the first user terminal can receive external voice prompts through a microphone and other devices. The first user terminal may recognize a voice prompt to "establish payment information". After the first user terminal receives the voice prompt of 'establishing the collection information', a task window for establishing the collection information can be opened to establish the collection information.
S2: the first user terminal obtains an instruction for establishing the authentication request information.
The first user terminal may be a terminal of a payee, and after the commodity or the service is paid in advance, the first user terminal may obtain a consumption certificate of the commodity or the service, where the consumption certificate may be a specific consumption bill detail document, a consumption detail picture, an electronic consumption invoice, or a link, and the specific consumption detail may be queried through the link. The form of the consumption certificate is not limited in the embodiment of the application. The consumption certificate can be the payment authentication information used for providing payment confirmation for the payer. The first user terminal can be classified and stored according to the form of the payment receiving authentication information. For example: the consumption bill detail document may be stored in a document class store; the consumption detail picture and the electronic consumption invoice can be stored in a picture memory; the links may be stored in a link class store.
The first user terminal can obtain an instruction for establishing the collection authentication information through the function key. The function key for establishing the collection authentication information can comprise: at least one of a picture function key, a document function key, a picture taking function key and a link function key. The first user terminal can access the corresponding memory port by calling the picture function key, the document function key or the link function key, and call the picture, the document or the link in the memory according to the instruction. The first user terminal can also directly call a camera application program to take a picture as collection authentication information through a picture taking function key.
In addition, the first user terminal can also obtain an instruction for establishing the collection authentication information through voice prompt. When the voice prompt key is pressed, the first user terminal can receive external voice prompts through a microphone and other devices. The first user terminal may recognize a voice prompt including at least one of "call picture", "call document", "take picture", and "call link". After the first user terminal recognizes the voice prompt of calling the picture, calling the document or calling the link, the first user terminal can correspondingly access the picture memory, the document memory or the link memory and call the picture, the document or the link in the memory according to the instruction. When the first user terminal recognizes the voice prompt of 'picture taking', the first user terminal can directly call a camera application program to take a picture as the collection authentication information.
S3: the first user terminal establishes request information with request authentication information attached.
The first user terminal establishes the request information with the request authentication information through the following three steps:
s301: and the first user terminal opens a task window for establishing the request information according to the acquired instruction for establishing the request information, wherein the task window comprises a function key or/and a voice prompt key for establishing the request authentication information.
In step S1, after the first user terminal obtains the instruction to establish the collection information through the function key or the voice prompt, the first user terminal may open a task window for establishing the collection information, and establish the collection information. Fig. 2 is a schematic diagram of a task window for establishing collection information, for example, using a smart phone. As shown in fig. 2, the task window for establishing the collection information may include a series of information frames, such as a payee account information frame, a payer account information frame, and a payment amount frame, for entering corresponding payee account information, payer account information, and payment amount. In addition, the task window for establishing the collection information can also comprise a function key or/and a voice prompt key for establishing collection authentication information. The function key for establishing the payment receiving authentication information may include: a picture function key, a document function key, a picture taking function key and a link function key.
S302: and the first user terminal adds request content, requesting party account information and requested party account information in the task window of the request information.
After the first user terminal opens the task window for establishing the collection information, the first user terminal can add the collection party account information, the payment party account information and the payment amount. The adding method comprises the following steps: the first user terminal can directly input the account information of the payee, the account information of the payer and the payment amount according to the instruction. In addition, after the first user terminal inputs the account information of the payee and the payment amount according to the instruction, the first user terminal can call the stored user address book and select the account information of the payer according to the instruction.
S303: the first user terminal establishes the request authentication information according to the acquired instruction for establishing the request authentication information, and adds the request authentication information into the request information.
The first user terminal can acquire an instruction for establishing the collection authentication information through a function key or/and a voice prompt key for establishing the collection authentication information contained in the task window, and establishes the collection authentication information. By calling the picture function key, the document function key or the link function key, the first user terminal can access the corresponding memory port and call the picture, the document or the link in the memory according to the instruction. The first user terminal can also directly call a camera application program to take a picture as collection authentication information through a picture taking function key. In addition, when the voice guidance key is pressed, the first user terminal may recognize voice guidance including "call picture", "call document", "take picture", and "call link". After the first user terminal recognizes the voice prompt of calling the picture, calling the document or calling the link, the first user terminal can correspondingly access the picture memory, the document memory or the link memory and call the picture, the document or the link in the memory according to the instruction. When the first user terminal recognizes the voice prompt of 'picture taking', the first user terminal can directly call a camera application program to take a picture as the collection authentication information. After the first user terminal establishes the collection authentication information, the collection authentication information can be directly added into a task window of the collection information.
In another embodiment of the present application, step S3 can also be implemented by the following four steps:
s311: and the first user terminal opens a task window for establishing the request information according to the acquired instruction for establishing the request information, wherein the task window comprises a function key or/and a voice prompt key for establishing the request authentication information.
In step S1, after the first user terminal obtains the instruction to establish the collection information through the function key or the voice prompt, the first user terminal may open a task window for establishing the collection information, and establish the collection information. The task window for establishing the collection information can comprise a series of information frames, namely a collector account information frame, a payer account information frame and a payment amount frame, and is used for inputting corresponding collector account information, payer account information and payment amount. In addition, the task window for establishing the collection information can also comprise a function key or/and a voice prompt key for establishing collection authentication information. Wherein, the function key for establishing the collection authentication information comprises: the function key of the picture is called, the function key of the document is called, and the function key of the picture is shot.
S312: the first user terminal establishes the request authentication information according to the acquired instruction for establishing the request authentication information, and adds the request authentication information into the request information.
The first user terminal can acquire an instruction for establishing the collection authentication information through a function key or/and a voice prompt key for establishing the collection authentication information contained in the task window, and establishes the collection authentication information. By calling the picture function key, the document function key or the link function key, the first user terminal can access the corresponding memory port and call the picture, the document or the link in the memory according to the instruction. The first user terminal can also directly call a camera application program to take a picture as collection authentication information through a picture taking function key. In addition, when the voice guidance key is pressed, the first user terminal may recognize voice guidance including "call picture", "call document", "take picture", and "call link". After the first user terminal recognizes the voice prompt of calling the picture, calling the document or calling the link, the first user terminal can correspondingly access the picture memory, the document memory or the link memory and call the picture, the document or the link in the memory according to the instruction. When the first user terminal recognizes the voice prompt of 'picture taking', the first user terminal can directly call a camera application program to take a picture as the collection authentication information. After the first user terminal establishes the collection authentication information, the collection authentication information can be directly added into a task window of the collection information.
S313: the first user terminal scans the request authentication information to obtain requesting party account information, requested party account information and request content in the request authentication information.
The first user terminal can scan the established collection authentication information through the image character recognition application program to obtain the collection party account information, the payer account information and the payment amount in the collection authentication information. Specifically, if the receipt authentication information is stored in the form of a picture or a document, the first user terminal may scan and identify the picture or the document, and obtain the payee account information, the payer account information, and the payment amount in the picture or the document; if the collection authentication information is stored in a link form, the first user terminal can access the specific consumption information through the link, scan and identify the specific consumption information, and acquire the payee account information, the payer account information and the payment amount.
S314: and the first user terminal adds the acquired requesting party account information, the acquired requested party account information and the request content into the request information.
After the first user terminal identifies the account information of the payee, the account information of the payer and the payment amount, the information can be automatically added into a corresponding information frame in a task window for establishing the payment information so as to perfect the payment information.
S4: and the first user terminal sends the request information with the request authentication information to the second user terminal.
The first user terminal can send the collection information with the collection authentication information to the second user terminal where the payer is located according to the account information of the payer in the collection information.
As can be seen from the foregoing embodiments of the present application, the request authentication information in the embodiments of the present application may be provided to the second user terminal to confirm the correctness of the request information.
The application also provides a user terminal for providing the request information. Fig. 3 is a functional block diagram of a user terminal for providing request information according to an embodiment of the present application. As shown in fig. 3, the user terminal includes:
a first instruction obtaining unit 100 for obtaining an instruction to establish request information;
a second instruction obtaining unit 200, configured to obtain an instruction for establishing the request authentication information;
a request information creating unit 300 for creating request information;
a request authentication information creating unit 400 for creating request authentication information;
an adding unit 500 for adding request authentication information to the request information;
a sending unit 600, configured to send request information with request authentication information attached.
Fig. 4 is a functional block diagram of a first instruction obtaining unit in a user terminal for providing request information according to an embodiment of the present application. As shown in fig. 4, the first instruction fetch unit 100 includes: a first key recognition module 101 and/or a first speech recognition module 102, wherein:
the first key identification module 101 is used for acquiring an instruction of establishing request information generated by a function key;
the first speech recognition module 102 is configured to obtain an instruction of creating request information generated by a speech prompt.
The user terminal can receive an external instruction according to the first key identification module and/or the first voice identification module. For example, when a function key of the user terminal for establishing the request information is pressed, the first key identification module can receive the instruction of the establishment request information and perform subsequent processing; similarly, when the voice prompt key is pressed, the first voice recognition module can receive an external voice prompt instruction through a microphone and other devices and perform subsequent processing.
Fig. 5 is a functional block diagram of a second instruction obtaining unit in a user terminal for providing request information according to an embodiment of the present application. As shown in fig. 5, the second instruction obtaining unit 200 includes: a second key recognition module 201 and/or a second speech recognition module 202, wherein:
the second key identification module 201 is configured to obtain an instruction for establishing request authentication information generated by function keys, where the function keys include at least one of a picture call function key, a document call function key, a picture taking function key, and a link call function key;
the second voice recognition module 202 is configured to obtain an instruction for establishing the request authentication information, where the instruction is generated by a voice prompt, and the voice prompt includes at least one of a call picture, a call document, a picture taking, and a call link.
The user terminal can obtain an instruction for establishing the collection authentication information through the function key. The function key for establishing the collection authentication information can comprise: at least one of the picture function key, the document function key, the picture taking function key and the link function key is called. When the function key for establishing the collection authentication information is pressed, the second key identification module can acquire a corresponding instruction according to the pressed function key. For example, when the function key for calling the picture is pressed, the second key identification module can acquire an instruction for calling the picture.
In addition, the user terminal can also obtain an instruction for establishing the collection authentication information through voice prompt. When the voice prompt key is pressed down, the second voice recognition module can receive external voice prompts through a microphone and other devices. The second speech recognition module may recognize at least one speech prompt including "call picture", "call document", "take picture", and "call link". After the second voice recognition module recognizes the voice prompt, a corresponding instruction for establishing the collection authentication information is obtained.
Fig. 6 is a functional block diagram of a request information creating unit in a user terminal for providing request information according to an embodiment of the present application. As shown in fig. 6, the request information creating unit 300 includes:
the task window opening module 301 is configured to open a task window for establishing the request information according to the obtained instruction for establishing the request information, where the task window may include a series of information frames, such as a requester account information frame, a requested party account information frame, and a request content frame, and is used to enter corresponding requester account information, requested party account information, and request content. In addition, the task window can also comprise a function key for establishing a request for authentication information or/and a voice prompt key. Wherein, the function key for establishing the request authentication information comprises the following steps: a picture function key, a document function key, a picture taking function key and a link function key.
The request information adding module 302 is configured to add the request content, the requested account information, and the requesting account information to corresponding information frames in the task window.
Fig. 7 is a functional block diagram of a request authentication information creating unit in a user terminal for providing request information according to an embodiment of the present application. As shown in fig. 7, the request authentication information creating unit 400 includes:
the calling module 401 is configured to call a picture or a document or a link as the request authentication information according to the calling instruction acquired by the second instruction acquiring unit;
a shooting module 402, configured to take a picture as the authentication information according to the shooting instruction obtained by the second instruction obtaining unit.
Fig. 8 is a functional block diagram of a user terminal for providing request information according to an embodiment of the present application. As shown in fig. 8, the user terminal includes:
a first instruction obtaining unit 110, configured to obtain an instruction for establishing request information;
a second instruction obtaining unit 210 configured to obtain an instruction for establishing the request authentication information;
a request authentication information establishing unit 310 for establishing request authentication information;
a scanning and identifying unit 410, configured to scan and identify the request authentication information in response to a user instruction, and obtain requesting party account information, requested party account information, and request content in the request authentication information through the identified request authentication information;
a request information creating unit 510 for creating request information;
an adding unit 610 for adding the request authentication information to the request information;
a sending unit 710, configured to send request information with request authentication information attached.
In an embodiment, the information of the payee account information, the payer account information and the payment amount is obtained by scanning the established receipt authentication information through a scanning and identifying unit. Specifically, if the receipt authentication information is stored in the form of a picture or a document, the scanning and identifying unit may scan and identify the picture or the document, and obtain the payee account information, the payer account information, and the payment amount in the picture or the document; if the collection authentication information is stored in a link form, the scanning and identifying unit can access the specific consumption information through the link, scan and identify the specific consumption information, and acquire the payee account information, the payer account information and the payment amount. Accordingly, the request information creating unit 510 in this embodiment includes: a task window opening module and a request information adding module, wherein:
the task window opening module 511 is configured to open a task window for establishing the request information according to the obtained instruction for establishing the request information, where the task window includes a function key or/and a voice prompt key for establishing the request authentication information;
the request information adding module 512 is configured to add the request content, the requesting party account information, and the requested party account information to the task window.
The embodiment of the application can find that the embodiment of the application does not limit the request authentication information, and the reliability of the request authentication information can be ensured by providing more forms of request authentication information to the requested party, so that the requested party can know the request content more intuitively.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose logic functions are determined by programming the device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate a dedicated integrated circuit chip 2. Furthermore, nowadays, instead of manually making integrated circuit chips, such programming is often implemented by "logic compiler" (software), which is similar to the software compiler used in program development and writing, but the original code before compiling is also written in a specific programming language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced library expression language), ahdl (alternate language description language), traffic, pl (kernel universal programming language), HDCal cu, jhdardeddescriptionlanguage, langva, Lola, HDL, pamm, hardsdyd (hardware description language), vhigh language (vhardscript description language), and the like, which are currently used in the world-language (vheregdivisdensionlanguage). It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC625D, atmel at91SAM, microchip pic18F26K20, and silicon labsc8051F320, the memory controller may also be implemented as part of the control logic of the memory.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
While the present application has been described with examples, those of ordinary skill in the art will appreciate that there are numerous variations and permutations of the present application without departing from the spirit of the application, and it is intended that the appended claims encompass such variations and permutations without departing from the spirit of the application.