CN114745711B - Cloud business card sending method and device, computer equipment and storage medium - Google Patents
Cloud business card sending method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN114745711B CN114745711B CN202210314301.6A CN202210314301A CN114745711B CN 114745711 B CN114745711 B CN 114745711B CN 202210314301 A CN202210314301 A CN 202210314301A CN 114745711 B CN114745711 B CN 114745711B
- Authority
- CN
- China
- Prior art keywords
- user
- business card
- cloud business
- type
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 238000012795 verification Methods 0.000 claims description 73
- 238000004590 computer program Methods 0.000 claims description 15
- 230000006870 function Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 8
- 230000008676 import Effects 0.000 description 5
- 230000002452 interceptive effect Effects 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to a cloud business card sending method, a cloud business card sending device, computer equipment and a storage medium. The cloud business card sending method comprises the following steps: receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user; inquiring a cloud business card of a second user based on the face image; determining a cloud business card type of the cloud business card of the second user; and under the condition that the cloud business card type is the public type, sending the cloud business card of the second user to the first terminal. According to the embodiment of the disclosure, the cloud business card can be conveniently and rapidly acquired by a user on the basis of protecting personal information.
Description
Technical Field
The present application relates to the field of information processing technologies, and in particular, to a method and apparatus for sending a cloud business card, a computer device, and a storage medium.
Background
The cloud business card is very practical in daily friend making, self-introduction and other aspects, and along with the development of the advanced technology of society, the way of acquiring personal information in the cloud business card through the cloud business card is more and more.
In the related art, a user can generate a two-dimensional code for the cloud business card, so that other people can conveniently acquire the cloud business card by scanning the two-dimensional code. However, the two-dimensional code screenshot can be forwarded at will, so that cloud business card information is exposed easily under the condition that a user does not know, and personal information is revealed.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, an apparatus, a computer device, and a storage medium for sending a cloud business card, which enable a user to conveniently and quickly obtain the cloud business card while protecting personal information.
The embodiment of the application provides a method for sending cloud business cards, which comprises the following steps:
receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user;
inquiring a cloud business card of a second user based on the face image;
Determining a cloud business card type of the cloud business card of the second user;
And under the condition that the cloud business card type is the public type, sending the cloud business card of the second user to the first terminal.
In one embodiment, after determining the cloud business card type of the cloud business card of the second user, the method further comprises:
under the condition that the cloud business card type is the verification type, sending a verification request to a second terminal used by a second user, wherein the verification request is used for enabling the second terminal to feed back a verification result of the second user;
Receiving a verification result fed back by the second terminal;
And sending the cloud business card of the second user to the first terminal under the condition that the verification result is that the cloud business card passes the verification.
In one embodiment, the cloud business card request further carries a user identifier of the first user;
wherein before sending the authentication request to the second terminal used by the second user, the method further comprises:
Inquiring user information of the first user based on the user identification of the first user; wherein the authentication request carries user information of the first user.
In one embodiment, the cloud business card request further carries a user identifier of the first user;
before determining the cloud business card type of the cloud business card of the second user, the method further comprises the following steps:
Determining a user type of the first user marked by the second user based on the user identification of the first user;
the method for determining the cloud business card type of the cloud business card of the second user comprises the following steps:
And determining the cloud business card type of the cloud business card of the second user under the condition that the user type is the unmarked user.
In one embodiment, after determining the user type of the second user marked for the first user, the method further comprises:
under the condition that the user type is a blacklist user, the cloud business card of the second user is forbidden to be sent to the first terminal;
and under the condition that the user type is a white list user, sending the cloud business card of the second user to the first terminal.
In one embodiment, the cloud business card request also carries the real-time location of the first user;
before determining the cloud business card type of the cloud business card of the second user, the method further comprises the following steps:
judging whether the real-time position of the first user is in a target geographic range or not, wherein the target geographic range is determined according to the real-time position of the second user;
the method for determining the cloud business card type of the cloud business card of the second user comprises the following steps:
If the real-time position of the first user is not in the target geographic range, determining the cloud business card type of the cloud business card of the second user;
In one embodiment, after determining whether the real-time location of the first user is within the target geographic range, the method further comprises:
And if the real-time position of the first user is within the target geographic range, sending the cloud business card of the second user to the first terminal.
The embodiment of the application also provides a device for sending the cloud business card, which comprises the following steps:
The request receiving module is used for receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user;
the business card inquiry module is used for inquiring the cloud business card of the second user based on the face image;
the type determining module is used for determining the cloud business card type of the cloud business card of the second user;
the first sending module is used for sending the cloud business card of the second user to the first terminal under the condition that the type of the cloud business card is the public type.
The embodiment of the application also provides computer equipment, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the cloud business card sending method provided by any embodiment of the application when executing the computer program.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the method for sending a cloud business card provided by any embodiment of the application.
According to the cloud business card sending method, the cloud business card sending device, the computer equipment and the storage medium, after the cloud business card request sent by the first terminal used by the first user is received, the cloud business card of the second user is inquired based on the face image of the second user carried in the cloud business card request, the cloud business card type of the inquired cloud business card of the second user is determined, and then the cloud business card of the second user is sent to the first terminal under the condition that the cloud business card type is a public type, so that the cloud business card type of the cloud business card can be used for representing the security policy of the cloud business card, and further the cloud business card of the second user can be directly sent to the first terminal under the condition that the cloud business card type is the public type, namely the security policy is the public, and further the cloud business card of the second user can be conveniently and rapidly obtained on the basis of protecting personal information.
Drawings
FIG. 1 is an application scenario diagram of a method for sending a cloud business card in one embodiment;
FIG. 2 is a flow chart of a method for sending a cloud business card in one embodiment;
FIG. 3 is an interactive schematic diagram of a cloud business card creation process in one embodiment;
FIG. 4 is an interactive schematic diagram of a cloud business card download process in one embodiment;
Fig. 5 is a flow chart of a method for sending a cloud business card in another embodiment;
FIG. 6 is an interactive schematic diagram of a cloud business card exchange process in one embodiment;
Fig. 7 is a flow chart of a method for sending a cloud business card in yet another embodiment;
FIG. 8 is a flow chart of a method for sending a cloud business card in yet another embodiment;
FIG. 9 is an interactive schematic diagram of a cloud business card downloading process according to another embodiment;
FIG. 10 is a block diagram of a sending device of a cloud business card in one embodiment;
FIG. 11 is an internal block diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While the application is susceptible of embodiment in the drawings, it is to be understood that the application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided to provide a more thorough and complete understanding of the application. It should be understood that the drawings and embodiments of the application are for illustration purposes only and are not intended to limit the scope of the present application.
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While the application is susceptible of embodiment in the drawings, it is to be understood that the application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided to provide a more thorough and complete understanding of the application. It should be understood that the drawings and embodiments of the application are for illustration purposes only and are not intended to limit the scope of the present application.
It should be noted that the terms "first," "second," and the like herein are merely used for distinguishing between different devices, modules, or units and not for limiting the order or interdependence of the functions performed by such devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those skilled in the art will appreciate that "one or more" is intended to be construed as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the devices in the embodiments of the present application are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The cloud business card sending method provided by the application can be applied to an application scene shown in fig. 1. The application scenario may include a first terminal 101, a second terminal 102, and a server 103. Wherein the first terminal 101, the second terminal 102 and the server 103 communicate via a network.
Wherein the first terminal 101 and the second terminal 102 may be, but are not limited to, smartphones, tablet computers and portable wearable devices. Specifically, the first terminal 101 is a terminal used by a first user who needs to acquire a cloud business card. The second terminal 102 is a terminal used by a second user who is acquiring a cloud business card.
The server 103 may be implemented as a stand-alone server or as a server cluster composed of a plurality of servers. The server 103 may receive and store the cloud business card uploaded by the second user through the second terminal 102, and execute the sending method of the cloud business card provided by the present application when the first terminal 101 requests to obtain the cloud business card of the second user.
Specifically, after receiving the cloud business card request sent by the first terminal used by the first user, the server 103 queries the cloud business card of the second user based on the face image of the second user carried in the cloud business card request, and determines the cloud business card type of the queried cloud business card of the second user, and then sends the cloud business card of the second user to the first terminal under the condition that the cloud business card type is a public type, so that the security policy of the cloud business card can be represented by the cloud business card type of the cloud business card, and then the cloud business card of the second user is directly sent to the first terminal under the condition that the cloud business card type is the public type, namely the security policy is the public, and further, the user can conveniently and rapidly acquire the cloud business card on the basis of protecting personal information.
Further, after determining the cloud business card type of the cloud business card of the second user, the server 103 may send an authentication request to the second terminal used by the second user if the cloud business card type is the authentication type, so that the second terminal feeds back the authentication result of the second user after receiving the authentication request. The server 103 may receive the verification result fed back by the second terminal, and send the cloud business card of the second user to the first terminal if the verification result is passing verification. Therefore, the server 103 makes the second user verify the identity of the first user when the cloud business card type is the verification type, that is, the security policy is semi-public, and then sends the cloud business card of the second user to the first terminal when the identity of the first user passes the verification, so that the security of personal information can be further improved.
Further, before sending the verification request to the second terminal used by the second user, the server 103 may query the user information of the first user based on the user identifier of the first user carried by the first user when sending the cloud business card request to the server 103, so that after querying the user information of the first user, the server 103 may send the verification request carrying the user information of the first user to the second terminal used by the second user, thereby enabling the second user to determine whether to send the cloud business card to the first user when knowing the identity of the first user, further preventing the personal information from being revealed to other people with unknown information, and improving the security of the personal information.
Further, before determining the cloud business card type of the cloud business card of the second user, the server 103 may determine the user type of the first user marked by the second user in the second terminal based on the user identification of the first user carried by the first user when the first user sends the cloud business card request, if the user type of the first user is a non-marked user, it may be determined that the second user does not mark the first user, and the first user does not belong to a blacklist user or a whitelist user, and then the server needs to determine the cloud business card type of the cloud business card of the second user, so as to determine whether to send the cloud business card of the second user to the first user.
Further, the server 103 may further prohibit sending the cloud business card of the second user to the first terminal of the first user in the case that the user type of the first user is a blacklisted user after determining that the second user is the user type of the first user tag; and sending the cloud business card of the second user to the first terminal of the first user under the condition that the user type of the first user is a white list user. Therefore, under the condition that the second user contacts with the first user and marks the first user, the server can determine whether to send the cloud business card of the second user to the first terminal according to the type of the marked user of the first user, so that the first user marked as a blacklist user cannot acquire the cloud business card, the first user marked as a whitelist user can acquire the cloud business card conveniently and rapidly, leakage of personal information can be prevented, and the second user can approve the user who acquires the cloud business card to acquire the cloud business card rapidly.
Further, before determining the cloud business card type of the cloud business card of the second user, the server 103 may further determine whether the real-time position of the first user carried in the cloud business card request is within a target geographic range determined according to the real-time position of the second user, if the real-time position of the first user is not within the target geographic range, it may be determined that the first user is not within the position range where the second user is allowed to acquire the cloud business card of the second user, and the server needs to determine the cloud business card type of the cloud business card of the second user, so as to determine whether to send the cloud business card of the second user to the first user, thereby providing a way for the first user to acquire the cloud business card of the second user even if the first user is not within the position range where the second user is allowed to acquire the cloud business card of the second user, and improving user experience of the user who acquires the cloud business card.
Further, after the server 103 determines whether the real-time position of the first user is within the target geographic range, if the real-time position of the first user is within the target geographic range, it may be determined that the first user is within a position range where the second user is allowed to acquire the cloud business card, and the server 103 directly sends the cloud business card of the second user to the first terminal, so that verification of the user identity may be achieved through the real-time position of the first user, and further, a user with the real-time position meeting the requirement may quickly acquire the cloud business card of the second user, and user experience of the user acquiring the cloud business card is improved.
In an embodiment of the present application, as shown in fig. 2, the present application provides a flow chart of a method for sending a cloud business card. The method is mainly applied to a server, such as the server 103 in fig. 1 for illustration, and as shown in fig. 2, the method for sending the cloud business card may include the following steps:
S210, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user.
In the embodiment of the disclosure, when the first user wants to acquire the cloud business card of the second user, the first user can use the first terminal to send a cloud business card request to the server, so that the server can receive the cloud business card request sent by the first terminal.
The first terminal may be a terminal used by a first user who needs to acquire a cloud business card, for example, the first terminal 101 in fig. 1.
Further, the cloud business card may include cloud business card information, which may include personal information, company information, and job information, which may include a user name, a user phone, a user social account, a user mailbox, and the like, without limitation.
Optionally, the cloud business card request may be a cloud business card acquisition request for the first user to acquire the cloud business card of the second user, or may be a cloud business card exchange request for the first user to exchange the cloud business card with the second user.
Further, the cloud business card request may carry a face image of the second user.
In some embodiments, the first user may open lose face the interface on the first terminal, and perform lose face operation on the second user in lose face the interface, so as to obtain the face image of the second user, and further make the cloud business card request carry the face image of the second user.
In other embodiments, the first user may select a pre-stored photo of the second user on the first terminal, so as to obtain a face image of the second user, and further make the cloud business card request to carry the face image of the second user.
S220, inquiring the cloud business card of the second user based on the face image.
In the embodiment of the disclosure, after receiving the cloud business card request, the server may query the cloud business card of the second user based on the face image in the cloud business card stored in advance in response to the cloud business card request.
Specifically, the server may store personal images of a plurality of users and cloud business cards thereof in association with each other, so as to obtain pre-stored cloud business cards. For example, the second user may edit the cloud business card information on the second terminal to create the cloud business card, then select one or more personal images, and further send the cloud business card and the personal images to the server through the second terminal, and the server may store the cloud business card and the personal images of the second user in association after receiving the cloud business card and the personal images of the second user.
The second terminal may be a terminal used by a second user who obtains the cloud business card, for example, the second terminal 102 in fig. 1.
Alternatively, the personal image may be an image containing the face of the user to whom the cloud business card belongs.
The process of creating the cloud business card by the second user will be described in detail with a specific example, as shown in fig. 3, and the specific steps are as follows:
Step 1: the second user inputs personal information or imports the personal information in a business card creation interface of contact software installed on the second terminal, and creates an electronic business card;
Step 2: when the second terminal stores the personal business card, a popup frame can be displayed to inquire whether the second user creates the cloud business card;
Step 3: a second user selects to create a cloud business card in the bullet frame;
Step 4: the second terminal displays a security policy selection panel, and the security policy selection panel provides a plurality of security policies for the second user, wherein the security policies can be set for the cloud business card;
Step 5: the second user selects a security policy needed by the second user from a plurality of security policies and confirms the use of the security policy;
Step 6: the second terminal responds to the confirmation of the use of the security policy by the second user, and skips to display a face input interface to guide the second user to input a personal image;
Step 7: the second user inputs the personal image according to the guide;
Step 8: after the personal image is successfully input, the second terminal prompts a second user to confirm whether the personal information and the personal image are uploaded or not so as to create a cloud business card;
step 9: the second user selects to confirm uploading the personal information and the personal image on the second terminal;
Step 10: the second terminal responds to the second terminal to select and confirm the uploading of the personal information and the personal image, and the personal information, the personal image and the security policy are uploaded to the server through the network;
Step 11: after receiving the personal information, the personal image and the security policy, the server can store the personal information as a cloud business card of the second user, determine the cloud business card type of the cloud business card according to the security policy, store the cloud business card of the second user in association with the personal image, and respond to successful uploading to the second terminal;
step 12: and the second terminal receives the response message and can display the elastic frame to prompt the second user that the cloud business card is successfully created.
Therefore, the second user can conveniently and quickly create the cloud business card on the second terminal, so that the server stores the cloud business card in advance.
Further, the server may perform a comparison query on the face image carried in the cloud business card request and the local pre-stored personal image, and if the personal image matched with the face image carried in the cloud business card request is queried, the cloud business card stored in association with the queried personal image is used as the cloud business card of the second user.
Optionally, the server may extract the face features in the face image first, and then calculate the similarity between the face features in the face image and the face features of each personal image, where the personal image with the highest similarity and greater than or equal to the preset similarity threshold is used as the personal image matched with the face image carried in the cloud business card request.
The preset similarity threshold may be a similarity threshold preset according to needs and used for judging whether the two face features belong to the same face. For example, the preset similarity threshold may be 98% or 99%, which is not limited herein.
S230, determining the cloud business card type of the cloud business card of the second user.
In the embodiment of the application, after the server inquires the cloud business card of the second user, the cloud business card type preset by the second user for the cloud business card is inquired.
The cloud business card type may be a policy type that characterizes a security policy of the cloud business card.
When the second user creates the cloud business card, the second user can set the security policy of the cloud business card through the second terminal, so that when the second terminal sends the cloud business card and the personal image to the server, the security policy of the cloud business card is sent at the same time, the security policy of the cloud business card which can be received by the server is enabled to determine the type of the cloud business card preset by the second user for the cloud business card.
Further, the security policy of the cloud business card is a policy for protecting the security of the cloud business card of the user to whom the cloud business card belongs, and through setting different security policies, the cloud business card can have different security levels, and the different security levels can correspond to different cloud business card types.
Optionally, the security policy of the cloud business card includes thorough disclosure as well as semi-disclosure. Under the condition that the security policy of the cloud business card is thoroughly disclosed, the cloud business card can have a first security level, and the type of the cloud business card corresponding to the first security level can be a disclosure type. Under the condition that the security policy of the cloud business card is semi-public, the cloud business card can have a second security level, and the type of the cloud business card corresponding to the second security level can be a verification type.
The first security level is lower than the second security level.
And S240, sending the cloud business card of the second user to the first terminal under the condition that the cloud business card type is a public type.
In the embodiment of the application, the server directly sends the cloud business card of the second user to the first terminal of the first user under the condition that the cloud business card type preset by the second user for the cloud business card is the public type.
The cloud business card type is a public type, and a user to which the cloud business card belongs sets the security policy of the cloud business card as the public type.
Under the condition that the cloud business card type is the public type, users except the user to which the cloud business card belongs can acquire the information of the cloud business card. In some embodiments, the cloud business card request is a cloud business card acquisition request for a first user to acquire a cloud business card of a second user, and the server may directly send the cloud business card of the second user to the first terminal, so as to achieve the acquisition of the cloud business card of the second user by the first user.
In other embodiments, the cloud business card request may be a cloud business card exchange request that the first user exchanges cloud business cards with the second user, and the server may acquire the cloud business card of the first user while directly transmitting the cloud business card of the second user to the first terminal or after directly transmitting the cloud business card of the second user to the first terminal, and transmit the cloud business card of the first user to the second terminal, so as to implement cloud business card exchange between the first user and the second user.
Specifically, the cloud business card request may further carry a user identifier of the first user, and the server may search for a cloud business card with the user identifier of the first user, and use the searched cloud business card as the cloud business card of the first user.
Alternatively, the user identity may be a unique identity for confirming the user identity of the first user. The user identifier may include, but is not limited to, a mobile phone number of the user, an account name of the user, and the like.
In the embodiment of the disclosure, after a cloud business card request sent by a first terminal used by a first user is received, based on a face image of a second user carried in the cloud business card request, the cloud business card of the second user is queried, and the cloud business card type of the queried cloud business card of the second user is determined, so that the cloud business card of the second user is sent to the first terminal under the condition that the cloud business card type is a public type, and therefore, the security policy of the cloud business card can be represented by the cloud business card type of the cloud business card, and further, the cloud business card of the second user is directly sent to the first terminal under the condition that the cloud business card type is the public type, namely the security policy is the public, so that the user can conveniently and rapidly acquire the cloud business card on the basis of protecting personal information.
The following describes the sending process of the cloud business card shown in fig. 2 in detail by using a specific example, as shown in fig. 4, the specific steps are as follows:
step 1: the method comprises the steps that a first user opens lose face an add contact interface in contact software installed on a first terminal;
step 2: the first terminal responds to the opening operation of the first user, displays lose face an add contact interface, and prepares to input a face image of the second user;
Step 3: the first user adds a face image of the second user in lose face add contact interface;
step 4: after receiving a face image of a second user input by a first user, a first terminal uploads the face image of the second user and a mobile phone number of the first user to a server through a network;
Step 5: after receiving the face image of the second user and the mobile phone number of the first user, the server locally searches the cloud business card of the second user based on the face image of the second user;
step 6: the server determines the cloud business card type of the cloud business card of the second user;
step 7: the server directly issues the cloud business card of the second user to the first terminal of the first user based on the mobile phone number of the first user under the condition that the cloud business card type of the second user is the public type;
step 8: after receiving the cloud business card of the second user issued by the server, the first terminal jumps to the contact card creation interface and imports cloud business card information in the cloud business card of the second user issued by the server in the contact card creation interface;
step 9: the method comprises the steps that a first user creates an interface on a contact card displayed on a first terminal, and cloud business card information of a second user is selected and confirmed to be stored as the contact card;
Step 10: and the first terminal responds to the save operation of the first user, saves the cloud business card information of the second user as a contact card of the second user, and displays the details of the contact card to the first user.
In another embodiment of the present application, as shown in fig. 5, the present application provides a flowchart of another method for sending a cloud business card. The method is mainly applied to a server, such as the server 103 in fig. 1 for illustration, and as shown in fig. 5, the method for sending the cloud business card may include the following steps:
s510, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user.
S520, inquiring the cloud business card of the second user based on the face image.
S530, determining the cloud business card type of the cloud business card of the second user.
Wherein, S510-S530 are similar to S210-S230 in the embodiment shown in fig. 2, and are not described herein.
S540, sending a verification request to a second terminal used by the second user under the condition that the cloud business card type is the verification type, wherein the verification request is used for enabling the second terminal to feed back a verification result of the second user.
In the embodiment of the application, after determining the cloud business card type of the cloud business card of the second user, if the cloud business card type is determined to be the verification type, which means that the first user can acquire the cloud business card only through the permission of the second user, the server determines whether the second user needs to verify whether to send the cloud business card to the first user or not, and then sends a verification request to a second terminal used by the second user.
After receiving the verification request, the second terminal can display verification information to the second user, so that the second user inputs verification results of the second user aiming at the verification information. The verification result may include passing verification that the second user allows the first user to acquire the cloud business card, and failing verification that the second user does not allow the first user to acquire the cloud business card.
Further, the cloud business card request may also carry a user identifier of the first user.
Alternatively, the user identity may be a unique identity for confirming the user identity of the first user. The user identifier may include, but is not limited to, a mobile phone number of the user, an account name of the user, and the like.
In these embodiments, before S540, the sending method of the cloud business card may further include querying user information of the first user based on the user identifier of the first user; wherein the authentication request carries user information of the first user.
In the embodiment of the application, the cloud business card request sent to the server by the first terminal used by the first user can also carry the user identification of the first user, so that the server can inquire the user information of the first user based on the user identification of the first user, and when sending the verification request to the second terminal, the user information of the first user is carried in the verification request.
Specifically, the server may perform a comparison query on the user identifier of the first user carried in the cloud business card request and the user identifier in the local prestored personal information, and if the personal information matched with the user identifier of the first user is queried, the personal information queried is used as the user information of the first user.
In the embodiment of the application, the server can send the verification request carrying the user information of the first user to the second terminal used by the second user, so that the second user can judge whether the cloud business card needs to be sent to the first user or not under the condition that the second user knows the identity of the first user, thereby further preventing personal information from being revealed to other people with unknown information and improving the safety of the personal information.
S550, receiving a verification result fed back by the second terminal.
In the embodiment of the application, after the second user inputs the verification result aiming at the verification information, the second terminal can feed back the received verification result to the server, so that the server can receive the verification result fed back by the second terminal.
And S560, sending the cloud business card of the second user to the first terminal when the verification result is that the second user passes the verification.
In the embodiment of the application, after receiving the verification result fed back by the second terminal, the server detects the verification result, and if the verification result is that the verification is passed, the server directly sends the cloud business card of the second user to the first terminal.
Therefore, the server can send the cloud business card of the second user to the first terminal under the condition that the identity of the first user passes verification, and further the security of personal information can be further improved.
And S570, prohibiting the cloud business card of the second user from being sent to the first terminal when the verification result is that the verification is not passed.
In the embodiment of the application, after receiving the verification result fed back by the second terminal, the server detects the verification result, and if the verification result is that the verification result is not passed, the server does not send the cloud business card of the second user to the first terminal.
Therefore, the server can keep the cloud business card of the second user secret under the condition that the identity of the first user fails to pass verification, and further the security of personal information can be further improved.
The following describes in detail the sending process of the cloud business card shown in fig. 5 with a specific example, as shown in fig. 6, the specific steps are as follows:
Step 1: a first user opens lose face exchange cloud business card interfaces in contact person software installed on a first terminal;
Step 2: the first terminal responds to the opening operation of the first user, displays lose face a cloud business card interface, and prepares to input a face image of the second user;
step 3: exchanging a cloud business card interface by a first user at lose face of a first terminal to input a face image of a second user;
step 4: after receiving a face image of a second user input by a first user, a first terminal uploads the face image of the second user and a mobile phone number of the first user to a server through a network;
Step 5: after receiving the face image of the second user and the mobile phone number of the first user, the server searches the cloud business card of the second user locally based on the face image of the second user and inquires the user information of the first user based on the mobile phone number of the first user;
step 6: the server sends a verification request carrying user information of the first user to the second terminal through a network;
Step 7: after receiving the mobile phone number and the verification request of the first user sent by the server, the second terminal can display a popup frame based on the verification request and the user information of the first user so as to inquire whether the second user is willing to exchange cloud business cards with the first user;
step 8: the second user confirms that the cloud business card is approved to be exchanged in the bullet frame;
step 9: the second terminal responds to the confirmation of the second user to agree to exchange the cloud business card, and sends a verification result of the first user passing the verification to the server;
step 10: after receiving the verification result sent by the second terminal, the server directly issues the cloud business card of the second user to the first terminal of the first user based on the mobile phone number of the first user;
Step 11: the method comprises the steps that a server inquires a cloud business card of a first user based on a mobile phone number of the first user while issuing the cloud business card of a second user to a first terminal of the first user, and issues the cloud business card of the first user to a second terminal of the second user;
step 12: after receiving the cloud business card of the second user issued by the server, the first terminal jumps to the contact card creation interface and imports cloud business card information in the cloud business card of the second user issued by the server in the contact card creation interface;
step 13: the method comprises the steps that a first user creates an interface on a contact card displayed on a first terminal, and cloud business card information of a second user is selected and confirmed to be stored as the contact card;
Step 14: the first terminal responds to the save operation of the first user, saves the cloud business card information of the second user as a contact card of the second user, and displays details of the contact card to the first user;
step 15: after receiving the cloud business card of the first user issued by the server, the second terminal jumps to the contact card creation interface and imports cloud business card information in the cloud business card of the first user issued by the server in the contact card creation interface;
step 16: a second user creates an interface on a contact card displayed on a second terminal, and selects and confirms to store cloud business card information of the first user as the contact card;
Step 17: and the second terminal responds to the save operation of the second user, saves the cloud business card information of the first user as the contact card of the first user, and displays the details of the contact card to the second user.
In still another embodiment of the present application, as shown in fig. 7, the present application provides a flowchart of a method for sending a cloud business card. The method is mainly applied to a server, such as the server 103 in fig. 1 for illustration, and as shown in fig. 7, the method for sending the cloud business card may include the following steps:
s710, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user and a user identification of the first user.
In the embodiment shown in fig. 2, S710 is similar to S210, and will not be described herein.
Alternatively, the user identity may be a unique identity for confirming the user identity of the first user. The user identifier may include, but is not limited to, a mobile phone number of the user, an account name of the user, and the like.
S720, inquiring the cloud business card of the second user based on the face image.
Wherein S720 is similar to S220 in the embodiment shown in fig. 2, and will not be described herein.
S730, determining the user type of the first user marked by the second user based on the user identification of the first user.
In the embodiment of the application, the cloud business card request sent by the first terminal to the server can also carry the user identification of the first user, so that the server can respectively inquire whether the user identification of the first user exists in the locally stored blacklist and whitelist set by the second user, and the user type of the first user marked by the second user is determined according to the inquiry result.
If the query result is that the user identification of the first user exists in the blacklist, determining that the user type of the first user is the blacklist user; if the query result is that the user identification of the first user exists in the white list, determining that the user type of the first user is the white list user; if the query result is that the user identification of the first user does not exist in the blacklist and the white list, determining that the user type of the first user is a label-free user.
Specifically, the second user can set a blacklist and a white list for the cloud business card through the second terminal, the blacklist user in the blacklist cannot acquire the cloud business card of the second user, and the white list user in the white list can directly acquire the cloud business card of the second user without verification of the second user.
S740, determining the cloud business card type of the cloud business card of the second user under the condition that the user type is a label-free user.
In the embodiment of the application, after the server inquires the user type of the first user marked by the second user, if the user type of the first user is determined to be the unmarked user, the server needs to determine the cloud business card type of the cloud business card of the second user.
The method for determining the cloud business card type of the cloud business card of the second user is similar to S230 in the embodiment shown in fig. 2, and will not be described herein.
And S750, sending the cloud business card of the second user to the first terminal under the condition that the type of the cloud business card is the public type.
Here, S750 is similar to S240 in the embodiment shown in fig. 2, and will not be described here.
In the embodiment of the application, a way for acquiring the cloud business card of the second user can be provided for the first user under the condition that the second user is not contacted with the first user and the first user is not marked, so that the user experience of the user for acquiring the cloud business card is improved.
S760, under the condition that the user type is a blacklist user, the cloud business card of the second user is forbidden to be sent to the first terminal.
In the embodiment of the application, after the server inquires the user type of the first user marked by the second user, if the user type of the first user is determined to be a blacklist user, the server does not send the cloud business card of the second user to the first terminal.
And S770, sending the cloud business card of the second user to the first terminal under the condition that the user type is the white list user.
In the embodiment of the application, after the server inquires the user type of the first user marked by the second user, if the user type of the first user is a white list user, the server directly sends the cloud business card of the second user to the first terminal.
Therefore, in the embodiment of the application, under the condition that the second user contacts with the first user and marks the first user, the server can determine whether to send the cloud business card of the second user to the first terminal according to the type of the marked user of the first user, so that the first user marked as the blacklist user cannot acquire the cloud business card, the first user marked as the whitelist user can acquire the cloud business card conveniently and rapidly, the disclosure of personal information can be prevented, and the second user can approve the user who acquires the cloud business card to acquire the cloud business card rapidly.
In still another embodiment of the present application, as shown in fig. 8, the present application provides a flowchart of a method for sending a cloud business card. The method is mainly applied to a server, such as the server 103 in fig. 1 for illustration, and as shown in fig. 8, the method for sending the cloud business card may include the following steps:
S810, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user and a real-time position of the first user.
In the embodiment shown in fig. 2, S810 is similar to S210, which is not described herein.
Optionally, the real-time location of the first user may be a location where the first terminal sends the cloud business card request to the server, where the real-time location of the first user may be used for the server to verify the identity of the first user.
In the embodiment of the disclosure, under the condition that the first user grants permission to acquire and send the real-time position to the server on the first terminal, the first terminal can carry the real-time position in a cloud business card request sent to the server, the server can receive the cloud business card request which is sent by the first terminal and carries the real-time position of the first user, and then the identity of the first user is verified through the real-time position of the first user.
S820, inquiring the cloud business card of the second user based on the face image.
S820 is similar to S220 in the embodiment shown in fig. 2, and will not be described here. .
S830, judging whether the real-time position of the first user is within a target geographic range, wherein the target geographic range is determined according to the real-time position of the second user.
In the embodiment of the application, because the cloud business card request also carries the real-time position of the first user, after the server queries the cloud business card of the second user, whether the real-time position of the first user is in the target geographic range or not can be judged, so that the identity of the first user can be verified through the real-time position of the first user.
Wherein the target geographic area is determined by the real-time location of the second user. The real-time position of the second user may be a position where the second terminal is located when the first terminal sends the cloud business card request to the server.
Specifically, when the second user opens the function of locally disclosing the cloud business card on the second terminal, the server may receive the indication information sent by the second terminal to the second user, and at this time, when the second user grants permission to acquire and send the real-time position to the server on the second terminal, the server may acquire the real-time position of the second user in response to the indication information, and obtain the target geographic range corresponding to the real-time position with the real-time position as a range center and the preset distance as a range radius. It can be seen that since the real-time location of the second user is changing from time to time, the target geographic area also changes from time to time following the real-time location of the second user.
If the second user opens the local public cloud business card function, the server can verify the identity of the first user based on the real-time position of the first user, and execute different operations according to the verification result.
And S840, if the real-time position of the first user is not in the target geographic range, determining the cloud business card type of the cloud business card of the second user.
In the embodiment of the application, after judging whether the real-time position of the first user is within the target geographic range or not, if the real-time position of the first user is not within the target geographic range, the server determines that the identity of the first user fails to pass the verification of the server, so that the server needs to determine the cloud business card type of the cloud business card of the second user.
The method for determining the cloud business card type of the cloud business card of the second user is similar to S230 in the embodiment shown in fig. 2, and will not be described herein.
S850, sending the cloud business card of the second user to the first terminal under the condition that the type of the cloud business card is the public type.
Wherein S850 is similar to S240 in the embodiment shown in fig. 2, and will not be described herein.
In the embodiment of the application, the server can also judge whether the real-time position of the first user carried in the cloud business card request is in the target geographic range determined according to the real-time position of the second user before determining the cloud business card type of the cloud business card of the second user, and even if the judgment result is that the real-time position of the first user is not in the target geographic range in which the second user is allowed to acquire the cloud business card, that is, the identity of the first user does not pass the verification of the server, a way for acquiring the cloud business card of the second user can be provided for the first user, so that the user experience of the user acquiring the cloud business card is improved.
S860, if the real-time position of the first user is within the target geographic range, the cloud business card of the second user is sent to the first terminal.
In the embodiment of the application, after judging whether the real-time position of the first user is within the target geographic range or not, if the real-time position of the first user is determined to be within the target geographic range, the server determines that the identity of the first user passes the verification of the server, so that the server can directly send the cloud business card of the second user to the first terminal.
In the embodiment of the application, after judging whether the real-time position of the first user is within the target geographic range or not, if the real-time position of the first user is within the target geographic range, the server can verify the user identity through the real-time position of the first user, so that the user with the real-time position meeting the requirements can quickly acquire the cloud business card of the second user, and the user experience of the user acquiring the cloud business card is improved.
The following describes in detail the procedure of the sending method of the cloud business card shown in fig. 8 with a specific example, as shown in fig. 9, the specific steps are as follows:
Step 1: a second user opens a local public cloud business card function in contact person software installed on a second terminal;
Step 2: the second terminal responds to the opening operation of the second user, and can display a risk item after the second user is prompted to open the local public cloud business card function by the elastic frame;
step 3: the second user confirms to open the function of opening the local public cloud business card in the bullet frame;
Step 4: the second terminal responds to the confirmation of the second user to open the function of the local public cloud business card, sends indication information for opening the local public to the server, and simultaneously attaches the real-time position of the second user;
step 5: after receiving the indication information sent by the second terminal and the attached real-time position of the second user, the server records the real-time position of the second user and records that the second user has started the local public business card function;
Step 6: the server feeds back a successful opening result of the local public cloud business card function to the second terminal;
Step 7: after receiving the result of successful opening of the local public cloud business card function sent by the server, the second terminal can display a popup frame for the second user so as to prompt the second user that the function of the local public cloud business card is successful;
step 8: the server acquires and updates the real-time position of the second user recorded locally at regular time;
step 9: the method comprises the steps that a first user opens lose face an add contact interface in contact software installed on a first terminal;
step 10: the first terminal responds to the opening operation of the first user, displays lose face an add contact interface, and prepares to input a face image of the second user;
Step 11: the first user adds a contact interface at lose face and inputs a face image of the second user;
step 12: after receiving a face image of a second user input by a first user, a first terminal uploads the face image of the second user and the real-time position of the first user to a server through a network;
Step 13: after receiving the face image of the second user and the real-time position of the first user, the server locally searches the cloud business card of the second user based on the face image of the second user;
Step 14: the server judges whether the real-time position of the first user is in the target geographic range of the second user under the condition that the second user is determined to start the local public business card function;
step 15: the method comprises the steps that under the condition that the real-time position of a first user is determined to be in a target geographic range of a second user for disclosing cloud business cards, the server directly transmits the cloud business cards of the second user to a first terminal of the first user;
Step 16: after receiving the cloud business card of the second user issued by the server, the first terminal jumps to the contact card creation interface and imports cloud business card information in the cloud business card of the second user issued by the server in the contact card creation interface;
step 17: the method comprises the steps that a first user creates an interface on a contact card displayed on a first terminal, and cloud business card information of a second user is selected and confirmed to be stored as the contact card;
Step 18: and the first terminal responds to the save operation of the first user, saves the cloud business card information of the second user as a contact card of the second user, and displays the details of the contact card to the first user.
Fig. 10 shows a block diagram of the configuration of the sending device of the cloud business card in one embodiment. The sending device of the cloud business card of the present application may be provided in a server, such as the server 103 in fig. 1.
As shown in fig. 10, the transmitting apparatus 1000 of the cloud business card may include a request receiving module 1010, a business card inquiry module 1020, a type determining module 1030, and a first transmitting module 1040.
The request receiving module 1010 may be configured to receive a cloud business card request sent by a first terminal used by a first user, where the cloud business card request carries a face image of a second user.
The business card query module 1020 may be configured to query the cloud business card of the second user based on the face image of the second user.
The type determination module 1030 may be used to determine a cloud business card type of the cloud business card of the second user.
The first sending module 1040 may be configured to send, to the first terminal, the cloud business card of the second user if the cloud business card type of the second user is a public type.
According to the cloud business card processing method and device, after the cloud business card request sent by the first terminal used by the first user is received, the cloud business card of the second user is queried based on the face image of the second user carried in the cloud business card request, the cloud business card type of the queried cloud business card of the second user is determined, and then the cloud business card of the second user is sent to the first terminal under the condition that the cloud business card type is a public type, so that the cloud business card type of the cloud business card can be utilized to represent the security policy of the cloud business card, and further the cloud business card of the second user can be directly sent to the first terminal under the condition that the cloud business card type is the public type, namely the security policy is the public, and further the cloud business card of the second user can be conveniently and rapidly obtained on the basis of protecting personal information.
In some embodiments of the present application, the sending device 1000 of the cloud business card may further include a request sending module, a result receiving module, and a second sending module.
The request sending module may be configured to send, after determining the cloud business card type of the cloud business card of the second user, an authentication request to the second terminal used by the second user in the case where the cloud business card type is the authentication type, where the authentication request is used to enable the second terminal to feed back an authentication result of the second user.
The result receiving module may be configured to receive a verification result fed back by the second terminal.
The second sending module may be configured to send the cloud business card of the second user to the first terminal when the verification result is that the verification result is passed.
In some embodiments of the present application, the cloud business card request may also carry a user identification of the first user.
The sending device 1000 of the cloud business card may further include an information query module, where the information query module may be configured to query, before sending the verification request to the second terminal used by the second user, user information of the first user based on the user identifier of the first user.
The authentication request may carry user information of the first user.
In some embodiments of the present application, the cloud business card request may also carry a user identification of the first user.
The sending device 1000 of the cloud business card may further include an information marking module, where the information marking module may be configured to determine, before determining the cloud business card type of the cloud business card of the second user, a user type of the first user marked by the second user based on the user identification of the first user.
The type determining module 1030 may be specifically configured to determine, when the user type is a label-free user, a cloud business card type of the cloud business card of the second user.
In some embodiments of the present application, the sending device 1000 of the cloud business card may further include a third sending module and a forbidden sending module.
The third sending module may be configured to send the cloud business card of the second user to the first terminal when the user type is a white list user after determining that the second user is the user type marked by the first user.
The prohibition sending module may be configured to prohibit sending of the cloud business card of the second user to the first terminal, in a case where the user type is a blacklisted user, after determining that the second user is the user type marked by the first user.
In some embodiments of the present application, the cloud business card request may also carry the real-time location of the first user.
The sending device 1000 of the cloud business card may further include a location determining module, where the location determining module may be configured to determine, before determining the type of the cloud business card of the second user, whether the real-time location of the first user is within a target geographic range, where the target geographic range is determined according to the real-time location of the second user.
The type determining module 1030 may be specifically configured to determine a cloud business card type of the cloud business card of the second user if the real-time location of the first user is not within the target geographic range.
In some embodiments of the present application, the sending device 1000 of the cloud business card may further include a fourth sending module, where the fourth sending module may be configured to send the cloud business card of the second user to the first terminal after determining whether the real-time location of the first user is within the target geographic range if the real-time location of the first user is within the target geographic range.
It should be noted that, the sending device of the cloud business card shown in fig. 10 may perform the steps of the method embodiments shown in fig. 1 to 9, and implement the processes and effects of the method embodiments shown in fig. 1 to 9, which are not described herein.
For specific limitation of the sending device of the cloud business card, reference may be made to the limitation of the sending method of the cloud business card hereinabove, and the description thereof will not be repeated here. All or part of the modules in the cloud business card sending device can be realized by software, hardware and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
The present application also provides a computer device, which may be a server, and an internal structure diagram thereof may be as shown in fig. 11. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing cloud business card data of the user. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a method of sending a cloud business card.
It will be appreciated by those skilled in the art that the structure shown in FIG. 11 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, the sending device of the cloud business card provided by the application can be implemented as a form of a computer program, and the computer program can run on a computer device as shown in fig. 11. The memory of the computer device may store various program modules constituting the transmitting apparatus of the cloud business card, such as a request receiving module, a business card inquiry module, a type determining module, and a first transmitting module shown in fig. 10. The computer program constituted by the respective program modules causes the processor to execute the steps in the sending method of the cloud business card of the respective embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 11 may perform step S201 by the request receiving module, step S202 by the business card inquiry module, step S203 by the type determining module, and step S204 by the first transmitting module in the transmitting apparatus of the cloud business card shown in fig. 10.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user; inquiring the cloud business card of the second user based on the face image of the second user; determining a cloud business card type of the cloud business card of the second user; and under the condition that the cloud business card type of the second user is the public type, sending the cloud business card of the second user to the first terminal.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as static random access memory (Static Random Access Memory, SRAM), dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
Claims (8)
1. The method for sending the cloud business card is characterized by comprising the following steps:
Receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user, a user identifier of the first user and a real-time position of the first user;
Inquiring the cloud business card of the second user based on the face image;
Determining a user type of the first user marked by the second user based on the user identification of the first user;
Under the condition that the user type is a label-free user, determining the cloud business card type of the cloud business card of the second user;
under the condition that the cloud business card type is a public type, sending the cloud business card of the second user to the first terminal;
Before the determining the cloud business card type of the cloud business card of the second user, the method further comprises:
judging whether the real-time position of the first user is within a target geographic range or not, wherein the target geographic range is determined according to the real-time position of the second user;
The determining the cloud business card type of the cloud business card of the second user comprises the following steps:
and if the real-time position of the first user is not in the target geographic range, determining the cloud business card type of the cloud business card of the second user.
2. The method of claim 1, wherein after the determining the cloud business card type of the second user's cloud business card, the method further comprises:
Sending a verification request to a second terminal used by the second user under the condition that the cloud business card type is a verification type, wherein the verification request is used for enabling the second terminal to feed back a verification result of the second user;
receiving the verification result fed back by the second terminal;
and sending the cloud business card of the second user to the first terminal under the condition that the verification result is that the second user passes the verification.
3. The method of claim 2, wherein the cloud business card request further carries a user identification of the first user;
Wherein prior to said sending of the authentication request to the second terminal for use by the second user, the method further comprises:
Inquiring user information of the first user based on the user identification of the first user; wherein the authentication request carries user information of the first user.
4. The method of claim 1, wherein after said determining the user type of the second user as the first user tag, the method further comprises:
Under the condition that the user type is a blacklist user, the cloud business card of the second user is forbidden to be sent to the first terminal;
and sending the cloud business card of the second user to the first terminal under the condition that the user type is a white list user.
5. The method of claim 1, wherein after said determining whether the real-time location of the first user is within a target geographic range, the method further comprises:
and if the real-time position of the first user is in the target geographic range, sending the cloud business card of the second user to the first terminal.
6. A cloud business card sending device, characterized in that the device comprises:
The request receiving module is used for receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user, a user identifier of the first user and a real-time position of the first user;
the business card inquiry module is used for inquiring the cloud business card of the second user based on the face image;
the information marking module is used for determining the user type of the first user marked by the second user based on the user identification of the first user;
the type determining module is used for determining the cloud business card type of the cloud business card of the second user under the condition that the user type is a label-free user;
the first sending module is used for sending the cloud business card of the second user to the first terminal under the condition that the type of the cloud business card is a public type;
The position judging module is used for judging whether the real-time position of the first user is in a target geographic range or not before the cloud business card type of the cloud business card of the second user is determined, and the target geographic range is determined according to the real-time position of the second user;
The type determining module is specifically configured to determine a cloud business card type of the cloud business card of the second user if the real-time location of the first user is not within the target geographic range.
7. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 5 when the computer program is executed.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210314301.6A CN114745711B (en) | 2022-03-28 | 2022-03-28 | Cloud business card sending method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210314301.6A CN114745711B (en) | 2022-03-28 | 2022-03-28 | Cloud business card sending method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114745711A CN114745711A (en) | 2022-07-12 |
CN114745711B true CN114745711B (en) | 2024-09-20 |
Family
ID=82278128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210314301.6A Active CN114745711B (en) | 2022-03-28 | 2022-03-28 | Cloud business card sending method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114745711B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105468767A (en) * | 2015-12-04 | 2016-04-06 | 小米科技有限责任公司 | Method and device for acquiring calling card information |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SG172508A1 (en) * | 2010-01-04 | 2011-07-28 | Smart Communications Inc | System and method for a global directory service |
CN102333276A (en) * | 2011-07-29 | 2012-01-25 | 上海合合信息科技发展有限公司 | Electronic name card transmission method and system in combination with geographical position information and authentication information |
KR101492623B1 (en) * | 2014-03-05 | 2015-02-24 | 지익주 | Cloud server for providing business card page and method for providing business card page on the cloud server |
CN104158889B (en) * | 2014-08-21 | 2017-07-28 | 北京橙鑫数据科技有限公司 | Card information querying method and Cloud Server |
CN104853325A (en) * | 2015-05-29 | 2015-08-19 | 小米科技有限责任公司 | Method and device for sending cloud business card |
CN105100199A (en) * | 2015-05-29 | 2015-11-25 | 小米科技有限责任公司 | Method and device for transmitting cloud card |
CN104853326A (en) * | 2015-05-29 | 2015-08-19 | 小米科技有限责任公司 | Method and device for sharing cloud card |
CN105163307A (en) * | 2015-07-31 | 2015-12-16 | 小米科技有限责任公司 | Method and device for sharing cloud card |
CN105163269A (en) * | 2015-09-28 | 2015-12-16 | 北京橙鑫数据科技有限公司 | E-card information adding method and device and intelligent device |
WO2018227785A1 (en) * | 2017-06-16 | 2018-12-20 | 华为技术有限公司 | Method for updating business card of contact and terminal |
CN109361730A (en) * | 2018-08-31 | 2019-02-19 | 杭州简简科技有限公司 | Card information acquisition methods, system and Cloud Server based on face |
CN109819061B (en) * | 2018-09-11 | 2021-09-21 | 华为技术有限公司 | Method, device and equipment for processing cloud service in cloud system |
CN110958347B (en) * | 2018-09-21 | 2021-11-30 | 钉钉控股(开曼)有限公司 | Electronic business card management method and device |
KR20200106263A (en) * | 2019-03-04 | 2020-09-14 | 권형석 | How to send business card information using block chain And system |
-
2022
- 2022-03-28 CN CN202210314301.6A patent/CN114745711B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105468767A (en) * | 2015-12-04 | 2016-04-06 | 小米科技有限责任公司 | Method and device for acquiring calling card information |
Also Published As
Publication number | Publication date |
---|---|
CN114745711A (en) | 2022-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210152357A1 (en) | Method and device for identity verification | |
US9544286B2 (en) | Methods and systems for increasing the security of electronic messages | |
US8661558B2 (en) | Methods and systems for increasing the security of electronic messages | |
US11824644B2 (en) | Controlling electronically communicated resources | |
US9722989B2 (en) | System and method for collaborative authentication | |
TWI612792B (en) | Account login method and device | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
CN107103245B (en) | File authority management method and device | |
CN102067555B (en) | Improved biometric authentication and identification | |
EP3200417B1 (en) | Method and device for information interaction and association between human biological feature data and account | |
KR101970123B1 (en) | Dual channel identity authentication | |
CN108337210B (en) | Equipment configuration method, device and system | |
CN109831441B (en) | Identity authentication method, system and related components | |
CN109033857B (en) | Method, device and equipment for accessing data and readable storage medium | |
CN105009123A (en) | Method and apparatus for requesting and providing access to information associated with an image | |
CN110086799B (en) | Identity verification method and device | |
US9977924B2 (en) | Method and device for providing notification indicating loss of terminal | |
CN110545274A (en) | Method, device and system for UMA service based on people and evidence integration | |
CN111797418B (en) | Online service control method and device, service terminal, server and storage medium | |
US11163862B2 (en) | Authentication of users based on snapshots thereof taken in corresponding acquisition conditions | |
CN114745711B (en) | Cloud business card sending method and device, computer equipment and storage medium | |
CN113946739A (en) | Sensitive data query method, device, equipment and storage medium | |
CN107333005B (en) | Emergency unlocking method, unlocking server, user equipment and system | |
US20220255923A1 (en) | Collaboration application integration for user-identity verification | |
US20220058286A1 (en) | Bypassing elements of a secure document workflow based on identity of recipient |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |