CN112163862A - Target function processing method, device, terminal and storage medium - Google Patents

Target function processing method, device, terminal and storage medium Download PDF

Info

Publication number
CN112163862A
CN112163862A CN202011135026.9A CN202011135026A CN112163862A CN 112163862 A CN112163862 A CN 112163862A CN 202011135026 A CN202011135026 A CN 202011135026A CN 112163862 A CN112163862 A CN 112163862A
Authority
CN
China
Prior art keywords
user
interface
target function
terminal
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011135026.9A
Other languages
Chinese (zh)
Inventor
郑丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202011135026.9A priority Critical patent/CN112163862A/en
Publication of CN112163862A publication Critical patent/CN112163862A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a processing method and device of a target function, a terminal and a storage medium, and belongs to the technical field of terminals. The method comprises the following steps: displaying a user invitation interface, wherein the user invitation interface is used for showing at least one user meeting invitation conditions invited to assist the first user; acquiring at least one second user selected from the at least one user based on the user invitation interface; and respectively sending request auxiliary information to at least one second user, wherein the request auxiliary information is used for indicating the limiting conditions when the at least one second user configures the first user to use the target function. According to the technical scheme, the first user can select at least one second user to configure the limiting condition for the first user when the target function is used based on the user invitation interface, so that the old or children can use the target functions such as payment under the limiting condition when the first user is the old or children, convenience is brought to the old and children, and risks are avoided.

Description

Target function processing method, device, terminal and storage medium
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a method and an apparatus for processing a target function, a terminal, and a storage medium.
Background
With the development of terminal technology, various applications installed on a terminal can provide various services for a user, such as shopping, making friends, watching videos, browsing information, and the like, which brings great convenience to the life of the user. However, for users such as the elderly and children, the terminal brings convenience to the users and also brings certain risks, such as a risk of cheating when making friends or paying through a mobile phone.
At present, in order to avoid cheating on the old and children, the old and children are generally limited to use the payment function, such as not providing bank card binding service for the old and children.
The problem that above-mentioned technical scheme exists is that the restriction old man and children use the payment function can bring inconvenience for old man and children in many payment scenes, like in the scene that needs to use the payment function such as taking a bus, paying the water and electricity fee and supermarket shopping.
Disclosure of Invention
The embodiment of the application provides a processing method, a processing device, a terminal and a storage medium of a target function, so that old people and children can use functions such as payment under the limiting conditions set by other users, convenience is brought to the old people and the children, and risks are avoided. The technical scheme is as follows:
in one aspect, a method for processing a target function is provided, and is applied to a first terminal, where a first user logs in to the first terminal, and the method includes:
displaying a user invitation interface for presenting at least one user meeting an invitation condition invited to assist the first user;
acquiring at least one second user selected from the at least one user based on the user invitation interface;
and respectively sending request auxiliary information to the at least one second user, wherein the request auxiliary information is used for indicating the limiting conditions when the at least one second user configures the first user to use the target function.
In another aspect, a method for processing a target function is provided, where the method is applied to a first terminal, and the method includes:
responding to the trigger operation of a target function, and displaying a target function interface, wherein the target function interface is used for realizing the target function;
acquiring at least one restriction condition corresponding to the target function, wherein the at least one restriction condition is used for restricting a first user of the first terminal from using the target function, and the at least one restriction condition is configured by at least one second user invited by the first user;
and in response to the fact that any limiting condition in the at least one limiting condition is met based on the function using operation detected by the target function interface, respectively sending reminding information to the at least one second user, wherein the reminding information is used for indicating the limiting condition met when the first user uses the target function.
In another aspect, a method for processing a target function is provided, and is applied to a second terminal, and the method includes:
responding to the received request auxiliary information sent by a first terminal, and displaying a condition configuration interface, wherein the condition configuration interface is used for displaying at least one limiting condition corresponding to a target function indicated by the request auxiliary information;
acquiring at least one limiting condition selected from the at least one limiting condition based on the condition configuration interface;
returning the selected at least one restriction condition to the first terminal.
In an optional implementation, the method further includes:
and displaying a third authentication interface, wherein the third authentication interface is used for performing living body detection.
In an optional implementation, the method further includes:
displaying a reminding setting interface, wherein the reminding setting interface is used for setting a reminding mode;
and sending at least one reminding mode selected on the reminding setting interface to the first terminal.
In another aspect, an apparatus for processing a target function is provided, where the apparatus is applied to a first terminal, and the first terminal is logged with a first user, and the apparatus includes:
the first display module is used for displaying a user invitation interface, and the user invitation interface is used for displaying at least one user meeting invitation conditions invited to assist the first user;
the user obtaining module is used for obtaining at least one second user selected from the at least one user based on the user invitation interface;
and the first information sending module is used for sending request auxiliary information to the at least one second user respectively, wherein the request auxiliary information is used for indicating the limiting conditions when the at least one second user configures the target function for the first user.
In an optional implementation manner, the user obtaining module is configured to obtain user authentication information of the user based on a selection operation of any user detected by the user invitation interface, where the user authentication information is used to indicate identity information of the user that is authenticated; in response to the user authentication information indicating that the age of the user is within a target age range, treating the user as the second user.
In an optional implementation, the apparatus further includes:
and the protocol display interface is used for displaying at least one user protocol observed when the first user invites the at least one second user.
In an optional implementation, the apparatus further includes:
the fifth display module is used for displaying the first authentication interface;
and the living body detection module is used for carrying out living body detection based on the first authentication interface.
In an optional implementation manner, the living body detection module is configured to perform face acquisition based on the first authentication interface; displaying a first face image acquired in real time on the first authentication interface; and performing living body detection on the first face image.
In an optional implementation, the apparatus further includes:
and the sixth display module is used for displaying a second authentication interface, and the second authentication interface is used for performing real-name authentication on the user.
In another aspect, an apparatus for processing a target function is provided, which is applied to a first terminal, and includes:
the second display module is used for responding to the trigger operation of a target function and displaying a target function interface, and the target function interface is used for realizing the target function;
a first condition obtaining module, configured to obtain at least one restriction condition corresponding to the target function, where the at least one restriction condition is used to restrict a first user of the first terminal from using the target function, and the at least one restriction condition is configured by at least one second user invited by the first user;
and the second information sending module is used for responding to a function using operation detected based on the target function interface and meeting any limiting condition of the at least one limiting condition, and sending reminding information to the at least one second user respectively, wherein the reminding information is used for indicating the limiting condition met when the first user uses the target function.
In an optional implementation manner, the target function is a friend adding function, and the target function interface is a friend adding interface;
the second information sending module is used for responding to friend adding operation detected based on the friend adding interface and acquiring user information of a friend user requesting to add; and responding to the user information indicating that the friend user meets any limiting condition in the at least one limiting condition, and respectively sending reminding information to the at least one second user.
In an optional implementation manner, the target function is a resource transfer function, and the target function interface is a first resource transfer interface;
the device further comprises:
a seventh display module, configured to display a user selection interface in response to the surcharge operation detected by the first resource transfer interface, where the user selection interface is used to display the at least one second user;
and the third information sending module is used for responding to the selection operation of any second user and sending resource transfer information to the second user, wherein the resource transfer information is used for indicating the second user to replace the first user to carry out resource transfer.
In another aspect, an apparatus for processing a target function is provided, which is applied to a second terminal, and includes:
the third display module is used for responding to the received request auxiliary information sent by the first terminal and displaying a condition configuration interface, and the condition configuration interface is used for displaying at least one limiting condition corresponding to the target function indicated by the request auxiliary information;
the second condition acquisition module is used for acquiring at least one limiting condition selected from the at least one limiting condition based on the condition configuration interface;
and the condition sending module is used for returning the selected at least one limiting condition to the first terminal.
In an optional implementation manner, the condition sending module is configured to display at least one application scene on the condition configuration interface, where one application scene corresponds to at least one constraint condition; and returning the selected at least one limiting condition to the first terminal.
In an optional implementation, the apparatus further includes:
and the eighth display module is used for displaying a third authentication interface, and the third authentication interface is used for performing living body detection.
In an optional implementation, the apparatus further includes:
the ninth display module is used for displaying a reminding setting interface, and the reminding setting interface is used for setting a reminding mode;
and the reminding mode sending module is used for sending at least one reminding mode selected on the reminding setting interface to the first terminal.
In another aspect, a terminal is provided, where the terminal includes a processor and a memory, where the memory is used to store at least one program code, and the at least one program code is loaded and executed by the processor to implement the operations executed in the processing method of the target function in the embodiment of the present application.
In another aspect, a computer-readable storage medium is provided, in which at least one program code is stored, and the at least one program code is loaded and executed by a processor to implement the operations performed in the processing method according to the target functions in the embodiments of the present application.
In another aspect, a computer program product or a computer program is provided, the computer program product or the computer program comprising computer program code, the computer program code being stored in a computer readable storage medium. The processor of the terminal reads the computer program code from the computer-readable storage medium, and the processor executes the computer program code, so that the terminal performs the processing method of the target function provided in the above-described aspects or various alternative implementations of the aspects.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
in the embodiment of the application, a processing method of a target function is provided, by displaying a user invitation interface for displaying at least one user who is invited to be an invitation condition for assisting a first user, the first user can select at least one second user based on the user invitation interface to configure a restriction condition for the first user when the target function is used, so that the old or children can use the target functions such as payment under the restriction condition when the first user is the old or children, thereby bringing convenience to the old and children and avoiding some risks.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of an implementation environment of a processing method for a target function according to an embodiment of the present application;
FIG. 2 is a flow chart of a processing method of a target function according to an embodiment of the present application;
FIG. 3 is a flow chart of another processing method of a target function provided according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a protocol presentation interface provided in accordance with an embodiment of the present application;
FIG. 5 is a schematic diagram of a first authentication interface provided in accordance with an embodiment of the present application;
FIG. 6 is a schematic diagram of a user invitation interface provided in accordance with an embodiment of the present application;
FIG. 7 is a flow chart of another processing method of a target function provided according to an embodiment of the present application;
FIG. 8 is a flow chart of another processing method of a target function provided according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a conditional configuration interface provided in accordance with an embodiment of the present application;
FIG. 10 is a flow chart illustrating another method for processing a target function according to an embodiment of the present disclosure;
FIG. 11 is a block diagram of a processing device for a target function provided in accordance with an embodiment of the present application;
FIG. 12 is a block diagram of a processing device for another target function provided in accordance with an embodiment of the present application;
FIG. 13 is a block diagram of a processing device for another target function provided in accordance with an embodiment of the present application;
fig. 14 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Techniques that may be used with embodiments of the present application are described below.
Cloud Technology refers to a hosting Technology for unifying resources of hardware, software, network and the like in a wide area network or a local area network to realize calculation, storage, processing and sharing of data. The cloud technology is based on the general names of network technology, information technology, integration technology, management platform technology, application technology and the like applied in the cloud computing business model, can form a resource pool, is used as required, and is flexible and convenient. Cloud computing technology will become an important support. Background services of the technical network system require a large amount of computing and storage resources, such as video websites, picture-like websites and more web portals. With the high development and application of the internet industry, each article may have its own identification mark and needs to be transmitted to a background system for logic processing, data in different levels are processed separately, and various industrial data need strong system background support and can only be realized through cloud computing.
Cloud Security (Cloud Security) refers to a generic term for Security software, hardware, users, organizations, secure Cloud platforms for Cloud-based business model applications. The cloud security integrates emerging technologies and concepts such as parallel processing, grid computing and unknown virus behavior judgment, abnormal monitoring of software behaviors in the network is achieved through a large number of meshed clients, the latest information of trojans and malicious programs in the internet is obtained and sent to the server for automatic analysis and processing, and then the virus and trojan solution is distributed to each client.
The main research directions of cloud security include: 1. the cloud computing security mainly researches how to guarantee the security of the cloud and various applications on the cloud, including the security of a cloud computer system, the secure storage and isolation of user data, user access authentication, information transmission security, network attack protection, compliance audit and the like; 2. the cloud of the security infrastructure mainly researches how to adopt cloud computing to newly build and integrate security infrastructure resources and optimize a security protection mechanism, and comprises the steps of constructing a super-large-scale security event and an information acquisition and processing platform through a cloud computing technology, realizing the acquisition and correlation analysis of mass information, and improving the handling control capability and the risk control capability of the security event of the whole network; 3. the cloud security service mainly researches various security services, such as anti-virus services and the like, provided for users based on a cloud computing platform.
Cloud Social interaction (Cloud Social) is a virtual Social application mode of internet of things, Cloud computing and mobile internet interactive application, aims to establish a famous resource sharing relationship map, and further develops network Social interaction, and is mainly characterized in that a large number of Social resources are uniformly integrated and evaluated to form a resource effective pool to provide services for users as required. The more users that participate in the sharing, the greater the value of the utility that can be created.
Hereinafter, an implementation environment of the processing method of the target function provided in the embodiment of the present application is described.
Fig. 1 is a schematic diagram of an implementation environment of a processing method of a target function according to an embodiment of the present application. Referring to fig. 1, the implementation environment includes a first terminal 101, a second terminal 102, and a server 103.
The first terminal 101 and the server 103 can be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
Optionally, the first terminal 101 is a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, or the like, but is not limited thereto. The first terminal 101 is installed and operated with an application program. Optionally, the application is any one of a social application, a financial application, and a game application. Illustratively, the first terminal 101 is a terminal used by a first user, and the first terminal 101 is logged in with a user account of the first user. Optionally, the first user is an elderly person or a child.
The second terminal 102 and the server 103 can be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
Optionally, the second terminal 102 is a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, or the like, but is not limited thereto. The second terminal 102 is installed and operated with an application program. In some embodiments, the application is any one of a social application, a financial application, and a gaming application. Illustratively, the second terminal 102 is a terminal used by a second user, and the second terminal 102 is logged in with a user account of the first user. The second user has a target relationship with the first user. Optionally, the target relationship is: a relationship of relatives, guardianship, or love, for example, the first user is an old person, and the second user is a child of the first user; the first user is a child, and the second user is a guardian of the first user; the first user is one of the male and female friends, and the second user is the other.
Optionally, the server 103 is an independent physical server, may also be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a CDN (Content Delivery Network), a big data and artificial intelligence platform, and the like. The server 103 is used for providing background services for the application programs.
Optionally, the server 103 undertakes primary computing work and the first terminal 101 undertakes secondary computing work; or, the server 103 undertakes the secondary computing work, and the first terminal 101 undertakes the primary computing work; alternatively, the server 103 and the first terminal 101 perform cooperative computing by using a distributed computing architecture.
Those skilled in the art will appreciate that the number of first terminals and second terminals described above can be greater or fewer. For example, the number of the first terminal and the number of the second terminal are only one, or the number of the first terminal is one and the number of the second terminal is two or more, or more. The number of terminals and the type of the device are not limited in the embodiments of the present application.
Optionally, the wireless network or wired network described above uses standard communication techniques and/or protocols. The Network is typically the Internet, but can be any Network including, but not limited to, a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a mobile, wireline or wireless Network, a private Network, or any combination of virtual private networks. In some embodiments, data exchanged over a network is represented using techniques and/or formats including Hypertext Mark-up Language (HTML), Extensible Markup Language (XML), and the like. All or some of the links can also be encrypted using conventional encryption techniques such as Secure Socket Layer (SSL), Transport Layer Security (TLS), Virtual Private Network (VPN), Internet Protocol Security (IPsec). In other embodiments, custom and/or dedicated data communication techniques can also be used in place of or in addition to the data communication techniques described above.
Fig. 2 is a flowchart of a processing method of a target function according to an embodiment of the present application, and as shown in fig. 2, the processing method is described in the embodiment of the present application by taking the first terminal as an example. The processing method of the target function comprises the following steps:
201. the first terminal displays a user invitation interface for presenting at least one user meeting invitation conditions invited to assist the first user.
In the embodiment of the present application, the first terminal is the first terminal 101 shown in fig. 1, and the first terminal is a terminal used by a first user such as an old person or a child. Optionally, the first user can invite at least one second user through the user invitation operation, where the second user is a user having a target relationship with the first user. The target relationship is one of a relationship of relatives, a relationship of guardianship, or a relationship of love.
In an optional implementation manner, before the user invitation interface is displayed, the first terminal displays a protocol presentation interface, and the protocol presentation interface is used for presenting at least one piece of user protocol information. The first terminal can display at least one piece of user protocol information on the protocol display interface when the first user triggers the user invitation operation. If the first user reads and agrees with the content of the at least one piece of user agreement information, the first user performs a confirmation operation, and the first terminal performs step 202; and if the first user does not perform the confirmation operation, the first terminal keeps displaying the protocol display interface until the first user agrees or triggers the quit operation.
In an optional implementation manner, in response to the confirmation operation detected by the protocol presentation interface, the first terminal displays a first authentication interface, and the first authentication interface is used for performing living body detection on the first user. After the terminal detects that the first user performs the confirmation operation triggered by the protocol display interface, the terminal can display a first authentication interface, and performs living body detection on the first user based on the first authentication interface, so that the risk of falsely acting as the first user to perform the user invitation operation is avoided. If the first user passes the living body detection, the first user initiating the user invitation operation is represented as an actual owner of the terminal; if the first user fails the liveness detection, the first user is not the actual owner of the terminal.
202. The first terminal acquires at least one second user selected from the at least one user based on the user invitation interface.
The first user can select users meeting the invitation condition invited to assist the first user in the user invitation interface as second users, such as friend users, relative users or users with other relations, so that the at least one second user can set the limiting condition for the first user.
Optionally, the first user can perform real-name authentication through the second authentication interface of the first terminal, and then perform living body detection on the first authentication interface based on information of the real-name authentication, and determine that the detected face image is consistent with information of the real-name authentication and is a living body.
203. The first terminal respectively sends request auxiliary information to at least one second user, wherein the request auxiliary information is used for indicating the limiting conditions when the at least one second user configures the first user to use the target function.
In the embodiment of the application, after a first user selects at least one second user, a first terminal can send invitation information to the at least one second user respectively, so that the at least one second user configures a restriction condition for the first user according to the invitation information, and the restriction condition can restrict the first user from using at least one function of the first terminal, such as a payment function, an internet surfing function, a friend adding function, and the like.
In the embodiment of the application, a processing method of a target function is provided, by displaying a user invitation interface for showing at least one user who is invited to be an invitation condition for assisting the first user, the first user can select at least one second user based on the user invitation interface to configure a restriction condition for the first user when the target function is used, so that the old or children can use the target functions such as payment under the restriction condition when the first user is the old or children, thereby bringing convenience to the old and children and avoiding some risks.
Fig. 2 is a main flow of a processing method applied to a target function of a first terminal according to an embodiment of the present application, and a detailed flow of the processing method applied to the target function is described below based on an application scenario. In the daily use process of the social application program, due to the fact that the judgment capability of the old people is reduced, the old people can be easily stared by lawbreakers, and property loss is caused. The interface displayed in the processing method of the target function provided in the embodiment of the present application is an interface of the social application program, or an interface of an applet started through the social application program, or an interface of an independent applet that does not need to be installed, which is not limited in the embodiment of the present application.
Fig. 3 is a flowchart of another processing method of a target function according to an embodiment of the present application, and as shown in fig. 3, the processing method is described in the embodiment of the present application by taking the first terminal as an example. The processing method of the target function comprises the following steps:
301. and the first terminal displays a second authentication interface, and the second authentication interface is used for carrying out real-name authentication on the first user.
In the embodiment of the present application, the first terminal is the first terminal 101 shown in fig. 1, and the first user can invite at least one second user through a user invitation operation. The first terminal can judge whether the first user has real-name authentication when the first user triggers the user invitation operation, and if the first user has real-name authentication, the current step is skipped, and the step 302 is executed; if the first user does not perform real-name authentication, the first terminal can display a second authentication interface, perform real-name authentication on the first user based on the second authentication interface, and execute step 302 in response to the first user passing the real-name authentication.
For example, the first user can fill in own identity information and upload certificate information on the second authentication interface, the third-party real-name authentication mechanism verifies the information input by the first user, if the verification is passed, the first user is returned to the first terminal to pass the real-name authentication, and otherwise, the authentication is returned to fail.
The real-name authentication process may be performed once, and the real-name authentication information of the first user may be stored in the first terminal or the server. In addition, if the identity information of the first user indicates that the first user does not belong to the old or children, the first terminal can display secondary confirmation information to confirm that the user invitation operation is not a misoperation. Optionally, the identity card is older than 65 years and belongs to the elderly, and the identity card is younger than 12 years and belongs to the children.
302. And responding to the first user passing the real-name authentication, the first terminal displays a protocol display interface, and the protocol display interface is used for displaying at least one piece of user protocol information.
In the embodiment of the application, after the first user passes the real-name authentication, in order to enable the first user to clearly know which users can be invited and the functions of the limited part of the users which may be invited, the first terminal can display at least one piece of user protocol information on a protocol display interface. If the first user reads and agrees with the content of the at least one piece of user agreement information, the first user performs a confirmation operation, and the first terminal performs step 303; and if the first user does not perform the confirmation operation, the first terminal keeps displaying the protocol display interface until the first user agrees or triggers the quit operation.
For example, referring to fig. 4, fig. 4 is a schematic diagram of a protocol presentation interface provided according to an embodiment of the present application. As shown in fig. 4, the protocol presentation interface includes two pieces of user protocol information: 1) would you clearly use this invitation function might lead you to pay or newly add a friend to be seen by the guardian when using the handset? 2) Is you clear to use the invitation function and only advises the child of himself? If the old or children user clicks the confirmation button in the protocol display interface, the old or children user knows and agrees to the user protocol information.
303. And responding to the confirmation operation detected by the protocol display interface, and displaying a first authentication interface by the first terminal, wherein the first authentication interface is used for carrying out living body detection on the first user.
In the embodiment of the application, in order to confirm that the first user initiating the user invitation operation is the user corresponding to the first terminal, the first terminal can perform living body detection on the first user based on the first authentication interface.
In an optional implementation manner, in response to a confirmation operation detected by the protocol display interface, the first terminal may perform face acquisition on the first user, and then the first terminal may display a first face image acquired in real time on the first authentication interface, and then the first terminal displays a detection result of performing living body detection on the first face image based on the first authentication interface. The first user is subjected to living body detection through the first authentication interface, and the risk of pretending to be the first user to carry out user invitation operation is avoided.
For example, referring to fig. 5, fig. 5 is a schematic diagram of a first authentication interface provided according to an embodiment of the present application. As shown in fig. 5, the first authentication interface can display a real-time face image captured by a camera of the first terminal, perform living body detection on the captured face image, and when it is determined that the captured face image is a living body and is the same as the certificate information uploaded during real-name authentication of the first user, display that authentication is passed on the first authentication interface, or display that authentication is failed.
304. In response to the first user passing the liveness detection, the first terminal displays a user invitation interface showing at least one user meeting invitation conditions invited to assist the first user.
In the embodiment of the application, if the first user passes the living body detection, it indicates that the first user initiating the user invitation operation is the actual owner of the first terminal; if the first user fails the liveness detection, the first user is not the actual owner of the first terminal. The invitation condition includes but is not limited to having a friend relationship, a relative relationship, a lover relationship, etc. with the first user.
305. The first terminal acquires at least one second user selected from the at least one user based on the user invitation interface.
The first user can select at least one second user in the user invitation interface so that the at least one second user can set a restriction condition for the first user.
For example, referring to fig. 6, fig. 6 is a schematic diagram of a user invitation interface provided according to an embodiment of the present application. As shown in fig. 6, the user invitation interface includes at least one second user to be selected, one check box corresponding to each second user, and a user screen name and a user avatar of each second user are displayed on the user invitation interface. And responding to the triggering operation of a confirmation button in the user invitation interface, and acquiring at least one second user selected by the first user by the first terminal.
In an alternative implementation, the at least one second user is a user belonging to a target age range. Correspondingly, the first terminal can acquire user authentication information of any user based on the selection operation of the user detected by the user invitation interface, wherein the user authentication information is used for indicating the authenticated identity information of the user. And in response to the user authentication information indicating that the user's age is within the target age range, treating the user as a second user.
It should be noted that the at least one second user displayed in the user invitation interface is a user having a target relationship, which is bound by the first user in the user binding interface. Optionally, the user invitation interface may further display all friend users of the first user, so as to save steps of binding users having a target relationship in the user binding interface, which is not limited in the embodiment of the present application.
306. The first terminal respectively sends request auxiliary information to the at least one second user, wherein the request auxiliary information is used for indicating the limiting conditions when the at least one second user configures the first user to use the target function.
In this embodiment, after a first user selects at least one second user, a first terminal may send invitation information to the at least one second user through a server of a social application program, so that the at least one second user configures a restriction condition for the first user according to the invitation information, where the restriction condition may restrict the first user from using at least one function of the first terminal, such as a payment function, an internet access function, a friend adding function, and the like. Optionally, the server of the social application is the server 103 shown in fig. 1.
307. And sending reminding information to the second terminal in response to any limiting condition triggered by the first user when the first user uses the target function.
In the embodiment of the application, for any second user, the second user can send at least one limiting condition configured based on the second terminal to a server of the social application program through the second terminal, and the at least one limiting condition is forwarded to the first terminal by the server, wherein the at least one limiting condition is used for limiting the first user of the first terminal to use the target function. When a first user uses a target function, if any limiting condition of the at least one limiting condition is triggered, the first terminal can send reminding information to a second terminal through a server to remind the second user, and correspondingly, a target function interface is displayed in response to the triggering operation of the target function, wherein the target function interface is used for realizing the target function. The first terminal can acquire at least one limiting condition corresponding to the target function, responds to the function using operation detected based on the target function interface and meets any limiting condition in the at least one limiting condition, and sends reminding information to the at least one second user respectively, wherein the reminding information is used for indicating the limiting condition met when the first user uses the target function.
In an optional implementation manner, when the limitation condition configured by the second user is to limit the payment function, the first terminal can display a first resource transfer interface in response to the operation of the resource transfer function, where the first resource transfer interface is used for resource transfer. And responding to that the first resource quantity input by the first resource transfer interface meets any limiting condition, and displaying first reminding information by the first terminal, wherein the first reminding information is used for reminding the first user that the resource transfer function is limited. By judging whether the limiting conditions set by the second user are met or not when the first user transfers resources and reminding the first user when the resource transfer operation of the first user meets any limiting conditions, the first user can know that the current resource transfer operation has risks and is limited, and therefore the old or children are prevented from being cheated.
For example, the second user can set a limit for resource transfer for the first user, such as an upper limit on the payment amount for a single time/day/month, and the second user can configure one or more of these as the limiting conditions. And if the old people exceed any payment upper limit during resource transfer, the first terminal cancels the resource transfer operation and sends first reminding information to the first user for reminding.
In an optional implementation manner, the first terminal may further send, on the basis of displaying the first reminding information, second reminding information to the at least one second terminal, where the second reminding information is used to prompt that the at least one second user has restricted the first user from using the resource transfer function. By sending the second reminding information, the at least one second user can make sure that the current behavior of the first user meets the set limiting conditions, so that the second user can contact with the first user in time to prevent the first user from being cheated.
In an alternative implementation manner, limiting the first user to use the payment function may cause inconvenience to the first user, and therefore, when the first resource quantity input by the first user in the first resource transfer interface meets any limiting condition, any second user can be indicated to be paid instead through a payment-instead operation. Responding to the surcharge operation detected by the first resource transfer interface, the first terminal displays a user selection interface, the user selection interface is used for displaying the at least one second user, responding to the selection operation of any second user, the first terminal sends resource transfer information to the second terminal of the second user, and the resource transfer information is used for indicating the second user to replace the first user to transfer the resources with the first resource quantity. When the payment function of the first user is limited, any second user setting the limit is required to pay instead, so that convenience is brought to the first user, and meanwhile the risk that the first user is cheated is avoided to a certain extent.
For example, when the old people pay for water and electricity, the amount of money to be paid exceeds the limit set by the children, the old people can select an option of ' others ' payment on behalf of others ' on the first resource transfer interface, and then select any children on the user selection interface, and the children pay for water and electricity.
It should be noted that, in order to facilitate the first user and the second user selected by the first user to make a payment for a second user to communicate with each other in time, after the first terminal sends the resource transfer information to the second terminal of the second user selected by the first user, the first terminal can also establish an audio/video connection with the second user through the server.
In an optional implementation manner, when the restriction condition configured by the second user is to restrict the friend adding function, the first terminal may obtain the user information of the friend user requesting to add in response to the friend adding operation detected based on the friend adding interface. And in response to the user information indicating that the friend user meets any limiting condition of the at least one limiting condition, respectively sending reminding information to the at least one second user, wherein the first terminal can display third reminding information, the third reminding information is used for reminding the friend user to meet the limiting condition, the first terminal can send fourth reminding information to the at least one second terminal, and the fourth reminding information is used for reminding the first user to add the friend user meeting the limiting condition. The target user condition is a limiting condition set by any second user. When friend users meeting the conditions of the target users are added to the first user, the first user and the second user are reminded, so that the first user and the second user can clearly determine that the friend users have certain risks.
It should be noted that, because adding a friend user by the first user is different from resource transfer, and there is no substantial risk, in the embodiment of the present application, the first terminal may further detect chat information of the first user and the friend user, and when there is a keyword with risk in the chat information, remind the first user and the second user again. Optionally, the first terminal may also directly refuse to add the friend user when the first user adds the friend user meeting the restriction condition, so that the first user and the second user cannot establish a friend relationship, which is not limited in the embodiment of the present application.
In the embodiment of the application, a processing method of a target function is provided, by displaying a protocol display interface for displaying at least one piece of user protocol information, a user initiating a user invitation operation can know a user protocol to be followed through the at least one piece of user protocol information; by carrying out living body detection based on the displayed first authentication interface after the user agrees with the user protocol, the user initiating the user invitation operation can be ensured to be the user of the current terminal; and then, by displaying a user invitation interface for displaying at least one user who is invited to meet the invitation condition for assisting the first user, the first user can select at least one second user based on the user invitation interface to configure a limiting condition for the first user when using the target function, so that when the first user is old people or children, the old people or children can use the target functions such as payment under the limiting condition, thereby bringing convenience to the old people and children and avoiding some risks.
Fig. 7 is a flowchart of another processing method of a target function according to an embodiment of the present application, and as shown in fig. 7, the second terminal is taken as an example in the embodiment of the present application for description. The processing method of the target function comprises the following steps:
701. in response to receiving request auxiliary information sent by a first terminal, a second terminal displays a condition configuration interface, wherein the condition configuration interface is used for displaying at least one limiting condition corresponding to a target function indicated by the request auxiliary information.
Second terminal in the embodiment of the present application, the second terminal 102 shown in fig. 1 is a terminal used by a second user having a target relationship with an old person or a child. The second user can receive the request assistance information transmitted by the first user through the first terminal through the second terminal. Based on the requested auxiliary information, the second terminal displays a conditional configuration interface.
702. Based on the condition configuration interface, obtaining at least one constraint selected from the at least one constraint is based on the condition configuration interface, obtaining at least one constraint selected from the at least one constraint.
The second user can configure a limitation condition for the first user in the condition configuration interface, and the limitation condition can limit the first user from using at least one function of the first terminal, such as a payment function, an internet surfing function, a friend adding function and the like.
703. The second terminal returns at least one constraint on the selection to the first terminal.
In this embodiment, the second terminal may obtain at least one constraint condition configured by the second user on the condition configuration interface, and then return the at least one constraint condition to the first terminal indicated by the invitation information according to the invitation information.
704. And the second terminal displays reminding information, and the reminding information is sent by the first terminal when any limiting condition in the at least one limiting condition is met.
In this embodiment of the application, if the first user uses the target function in the first terminal and any one of the at least one limiting condition is met, the first terminal may send a reminding message to the second terminal, and the second terminal may display the received reminding message to remind the second user that the first user is currently using the limited target function.
In the embodiment of the application, a condition configuration interface for configuring a restriction condition when a first user uses at least one function of a first terminal is displayed after an invitation message is received, so that a second user can freely select the configurable restriction condition, and at least one restriction condition selected by the second user is returned to the first terminal, so that old people and children can use functions such as payment under the restriction condition, convenience is brought to the old people and children, and the second user can avoid risks for the old people and children based on the restriction condition.
Fig. 7 is a main flow of a processing method applied to a target function of a second terminal according to an embodiment of the present application, and a detailed flow of the processing method of the target function is described below based on an application scenario. In the daily use process of the social application program, due to the fact that the judgment capability of the old people is reduced, the old people can be easily stared by lawbreakers, and property loss is caused. The interface displayed in the processing method of the target function provided in the embodiment of the present application is an interface of the social application program, or an interface of an applet started through the social application program, or an interface of an independent applet that does not need to be installed, which is not limited in the embodiment of the present application.
Fig. 8 is a flowchart of another processing method of a target function according to an embodiment of the present application, and as shown in fig. 8, the second terminal is taken as an example for description in the embodiment of the present application. The processing method of the target function comprises the following steps:
801. and responding to the received request auxiliary information sent by the first terminal, the second terminal displays a fourth authentication interface, and the fourth authentication interface carries out real-name authentication on the second user.
In this embodiment of the application, the second terminal is the second terminal 102 shown in fig. 1, and the first user can invite at least one second user by sending the request assistance information through the first terminal, where the second terminal is a terminal used by any one of the second users. The second terminal can judge whether the second user is authenticated by real name or not when receiving the invitation request auxiliary information, if the second user is authenticated by real name, the current step is skipped, and step 802 is executed; if the second user does not perform real-name authentication, the second terminal can display a fourth authentication interface, perform real-name authentication on the second user based on the fourth authentication interface, and execute step 802 in response to the second user passing the real-name authentication.
For example, the second user can fill in own identity information and upload certificate information on the fourth authentication interface, the third-party real-name authentication mechanism verifies the information input by the second user, if the verification is passed, the second user is returned to the second terminal to pass the real-name authentication, and otherwise, the authentication is returned to fail.
The real-name authentication process may be performed once, and the real-name authentication information of the second user may be stored in the second terminal or the server. In addition, if the identity information of the second user indicates that the first user belongs to the elderly or children, that is, does not belong to the user who can be invited, the second terminal can return a rejection response to the first terminal, where the rejection response indicates that the second user does not satisfy the invitation condition. Optionally, the old people with the identification card age of more than 65 years old, the children with the identification card age of less than 12 years old, and the adults with the identification card age between 18 years old and 55 years old belong to the users who can be invited. Of course, the age limit of the user that can be invited can be set according to actual needs, and the embodiment of the present application does not limit this.
802. And responding to the second user passing the real-name authentication, the second terminal displays a third authentication interface, and the third authentication interface is used for carrying out living body detection on the second user of the second terminal.
In this embodiment of the application, after the first user passes the real-name authentication, in order to confirm that the second user receiving the invitation information is the user corresponding to the second terminal, the second terminal can perform living body detection on the second user based on the third authentication interface.
In an optional implementation manner, the second terminal can perform face acquisition on the second user, then the second terminal can display the second face image acquired in real time on the third authentication interface, and then the second terminal displays a detection result of performing living body detection on the second face image based on the third authentication interface. And the second user is subjected to living body detection through the third authentication interface, so that the risk of pretending the configuration limiting condition of the second user is avoided. The third authentication interface is the same as the first authentication interface shown in fig. 5, and is not described again.
803. And responding to the second user through the living body detection, and displaying a condition configuration interface by the second terminal, wherein the condition configuration interface is used for displaying at least one limiting condition corresponding to the target function indicated by the request auxiliary information.
In the embodiment of the application, if the second user passes the live body detection, the second user is the actual owner of the second terminal; if the second user fails the liveness detection, the second user is not the actual owner of the second terminal. The second user can configure at least one restriction condition for the first user in the condition configuration interface.
804. The second terminal acquires at least one restriction condition selected from the at least one restriction condition based on the condition configuration interface.
In the embodiment of the application, different limiting conditions correspond to different application scenarios. And the corresponding second terminal can display at least one application scene on the condition configuration interface, wherein one application scene corresponds to at least one limiting condition.
For example, referring to fig. 9, fig. 9 is a schematic diagram of a condition configuration interface provided according to an embodiment of the present application. As shown in fig. 9, the condition configuration interface includes a payment scenario and a friend-making scenario. For the payment scenario, the following four constraints are included: 1) and setting a limit, wherein the upper limit of the payment amount of single time/single day/single month can be limited, and the second user can select one or more types. 2) The friend relationship of the payee is set, so that the payee can be limited to be a user who establishes the friend relationship with the old for more than 30 days, or the payee is a child, or the payee is a common friend of the old and the child. 3) The region limitation is set, and the payment of the old people to the user in the designated region can be limited. 4) And a white list is set, so that users except the white list can be limited. The source of the white list can be white list merchants recommended by the server or users set according to historical payment records of the old people. For the friend-making scene, the following three limiting conditions are included: 5) and setting a white list, wherein the user who adds the non-white list to the first user can be limited to be a friend, or the second user is reminded when the user who adds the non-white list to the first user. The source of the white list can be a buddy list of the second user. 6) And setting region limitation, wherein the user who adds the non-specified region to the first user can be limited to be a friend, or the second user is reminded when the user who adds the non-specified region to the first user. 7) And setting keywords, wherein the user with the nickname including any keyword added by the first user can be limited to be a friend, or the second user is reminded when the user with the nickname including the keyword added by the first user. Wherein, the second user can add or delete the keywords by managing the keyword options. Alternatively, the number of keywords can be limited to no more than 20.
It should be noted that the payment scenario and the friend-making scenario are only example scenarios provided in the embodiment of the present application, and there are other application scenarios and corresponding limiting conditions correspondingly, which are not limited in the embodiment of the present application.
805. The second terminal returns the selected at least one restriction condition to the first terminal.
In this embodiment of the application, after the second user has configured the at least one restriction condition, the second terminal can send the at least one restriction condition to the server, and the server sends the at least one restriction condition to the first terminal, so that the first terminal determines whether the subsequent operation of the first user is restricted by the at least one restriction condition.
806. And the second terminal displays a reminding setting interface which is used for setting a reminding mode.
In the embodiment of the application, the second user can set the reminding mode on the reminding setting interface. The reminding mode comprises at least one of small program reminding, social application program reminding and short message reminding.
The second terminal can send the at least one reminding mode to the first terminal through the server after detecting the issuing operation of the reminding setting interface. Optionally, if the second user does not trigger the publishing operation, the second terminal may display the publishing reminding information to remind the second user to publish. Correspondingly, after the second user modifies the reminding mode and the limiting conditions, the second user also needs to perform the issuing operation again.
807. And the second terminal displays reminding information, and the reminding information is sent by the first terminal when the function using operation of the target function meets any limiting condition in the at least one limiting condition.
In this embodiment of the application, when a first user uses a target function, if any limiting condition of the at least one limiting condition is triggered, the first terminal can send a reminding message to a second terminal through a server to remind the second user. The second terminal is capable of displaying the received reminder message.
In an optional implementation manner, if the first user selects the second user for payment, the second terminal can display the second resource transfer interface according to the resource transfer information sent by the first terminal, and the second user performs resource transfer based on the second resource transfer interface.
In the embodiment of the application, a condition configuration interface for configuring a restriction condition when a first user uses at least one function of a first terminal is displayed after an invitation message is received, so that a second user can freely select the configurable restriction condition, and then at least one restriction condition selected by the second user is returned to the first terminal, so that the first terminal can send a reminding message to a second terminal when any restriction condition is met, so that the second user is reminded that the first user is currently using the restricted function, the old and children can use functions such as payment under the restriction condition, convenience is brought to the old and children, and the second user can avoid risks for the old and children based on the restriction condition.
Fig. 10 is a flowchart illustrating another processing method of a target function according to an embodiment of the present application. The scenario that the old person initiates an invitation to a child based on the applet will be described as an example. As shown in fig. 10, the method comprises the following steps:
1001. the old enters into the applet to perform the user invitation operation.
1002. The first terminal displays a real-name authentication interface and judges whether the old is more than 65 years old.
The real-name authentication process in this step is referred to as step 301, and will not be described herein again.
1003. The first terminal displays a living body detection interface and judges whether the old people pass living body authentication.
The living body detection process in this step is referred to as step 303, and will not be described herein.
1004. The first terminal displays a protocol display interface and judges whether the old people confirm the user protocol information.
This step is referred to as step 302 and will not be described herein.
1005. The first terminal displays a user invitation interface and determines whether the invitee is less than 55 years old.
The process of determining whether the invited person is less than 55 years old can also be implemented by the second terminal, see step 801, which is not described herein again.
1006. The second terminal displays a living body detection interface and judges whether the invitee passes the living body authentication.
The living body detection process in this step is referred to as step 802, and will not be described herein.
1007. And the second terminal displays a condition configuration interface and configures the limiting conditions.
In the embodiment of the application, the second terminal displays a condition configuration interface in the applet, the second user selects a configuration scene through the condition configuration interface, the second terminal displays a scene condition interface, and one scene corresponds to one scene condition interface. Referring to step 803 and fig. 9, the difference is that fig. 9 displays the restriction conditions of all scenes on the condition configuration interface, which is not described herein again.
1008. And the second terminal displays a reminding setting interface.
This step is referred to as step 805, and is not described herein again.
1009. And the second terminal issues the reminding mode and the limiting condition configured by the second user.
When any of the steps 1002 to 1005 is judged no, step 1010 is executed.
1010. The first terminal prompts that the invitation is failed and cancels the invitation.
Fig. 11 is a block diagram of a processing device of a target function according to an embodiment of the present application. The processing device of the target function is used for executing the steps when the processing method of the target function is executed, and referring to fig. 11, the device comprises: a first display module 1101, a user acquisition module 1102 and a first information sending module 1103.
A first display module 1101, configured to display a user invitation interface, where the user invitation interface is used to display at least one user meeting an invitation condition invited to assist the first user;
a user obtaining module 1102, configured to obtain, based on the user invitation interface, at least one second user selected from the at least one user;
a first information sending module 1103, configured to send request auxiliary information to the at least one second user, where the request auxiliary information is used to indicate a limitation condition when the at least one second user configures the first user to use the target function.
In an optional implementation manner, the user obtaining module 1102 is configured to obtain user authentication information of the user based on a selection operation of any user detected by the user invitation interface, where the user authentication information is used to indicate authenticated identity information of the user; and in response to the user authentication information indicating that the user's age is within a target age range, treating the user as the second user.
In an optional implementation, the apparatus further includes:
a fourth display module 1104, configured to display a protocol presentation interface, where the protocol presentation interface is configured to present at least one user protocol to which the first user invites the at least one second user.
In an optional implementation, the apparatus further includes:
a fifth display module 1105, configured to display the first authentication interface;
a living body detection module 1106, configured to perform living body detection based on the first authentication interface.
In an optional implementation manner, the living body detection module 1106 is configured to perform face acquisition based on the first authentication interface; displaying a first face image acquired in real time on the first authentication interface; the first face image is subjected to a live body detection.
In an optional implementation, the apparatus further includes:
a sixth display module 1107, configured to display a second authentication interface, where the second authentication interface is used to perform real-name authentication on the user.
In the embodiment of the application, a processing method of a target function is provided, by displaying a user invitation interface for showing at least one user who is invited to be an invitation condition for assisting the first user, the first user can select at least one second user based on the user invitation interface to configure a restriction condition for the first user when the target function is used, so that the old or children can use the target functions such as payment under the restriction condition when the first user is the old or children, thereby bringing convenience to the old and children and avoiding some risks.
Fig. 12 is a block diagram of a processing device of another target function provided according to an embodiment of the present application. The processing device of the target function is used for executing the steps when the processing method of the target function is executed, and referring to fig. 12, the device comprises: a second display module 1201, a first condition acquisition module 1202, and a second information sending module 1203.
A second display module 1201, configured to display a target function interface in response to a trigger operation of a target function, where the target function interface is used to implement the target function;
a first condition obtaining module 1202, configured to obtain at least one restriction condition corresponding to the target function, where the at least one restriction condition is used to restrict a first user of the first terminal from using the target function, and the at least one restriction condition is configured by at least one second user invited by the first user;
a second information sending module 1203, configured to send, in response to a function using operation detected based on the target function interface and when any limiting condition of the at least one limiting condition is met, a reminding information to the at least one second user, where the reminding information is used to indicate the limiting condition that is met when the first user uses the target function.
In an optional implementation manner, the target function is a friend adding function, and the target function interface is a friend adding interface;
the second information sending module 1203 is configured to, in response to a friend adding operation detected based on the friend adding interface, obtain user information of a friend user who requests to add; and responding to the user information indicating that the friend user meets any limiting condition in the at least one limiting condition, and respectively sending reminding information to the at least one second user.
In an optional implementation manner, the target function is a resource transfer function, and the target function interface is a first resource transfer interface;
the device also includes:
a seventh display module 1204, configured to display a user selection interface in response to the surcharge operation detected by the first resource transfer interface, where the user selection interface is used to display the at least one second user;
a third information sending module 1205, configured to send, in response to a selection operation of any second user, resource transfer information to the second user, where the resource transfer information is used to instruct the second user to perform resource transfer instead of the first user.
In the embodiment of the application, a processing method of a target function is provided, by displaying a protocol display interface for displaying at least one piece of user protocol information, a user initiating a user invitation operation can know a user protocol to be followed through the at least one piece of user protocol information; by carrying out living body detection based on the displayed first authentication interface after the user agrees with the user protocol, the user initiating the user invitation operation can be ensured to be the user of the current terminal; and then, by displaying a user invitation interface for displaying at least one user who is invited to meet the invitation condition for assisting the first user, the first user can select at least one second user based on the user invitation interface to configure a limiting condition for the first user when using the target function, so that when the first user is old people or children, the old people or children can use the target functions such as payment under the limiting condition, thereby bringing convenience to the old people and children and avoiding some risks.
Fig. 13 is a block diagram of a processing device of another target function provided according to an embodiment of the present application. The processing device of the target function is used for executing the steps when the processing method of the target function is executed, and referring to fig. 12, the device comprises: a third display module 1301, a second condition acquisition module 1302, and a condition sending module 1303.
A third display module 1301, configured to, in response to receiving request auxiliary information sent by the first terminal, display a condition configuration interface, where the condition configuration interface is configured to display at least one limitation condition corresponding to a target function indicated by the request auxiliary information;
a second condition obtaining module 1302, configured to obtain at least one constraint selected from the at least one constraint based on the condition configuration interface;
a condition sending module 1303, configured to return the selected at least one limitation condition to the first terminal.
In an optional implementation manner, the condition sending module 1303 is configured to display at least one application scene on the condition configuration interface, where one application scene corresponds to at least one restriction condition; and returning the selected at least one limiting condition to the first terminal.
In an optional implementation, the apparatus further includes:
an eighth display module 1304, configured to display a third authentication interface, where the third authentication interface is used for performing a living body detection.
In an optional implementation, the apparatus further includes:
a ninth display module 1305, configured to display a reminder setting interface, where the reminder setting interface is used to set a reminder mode;
a reminding mode sending module 1306, configured to send, to the first terminal, at least one reminding mode selected on the reminding setting interface.
In the embodiment of the application, a condition configuration interface for configuring a restriction condition when a first user uses at least one function of a first terminal is displayed after an invitation message is received, so that a second user can freely select the configurable restriction condition, and at least one restriction condition selected by the second user is returned to the first terminal, so that old people and children can use functions such as payment under the restriction condition, convenience is brought to the old people and children, and the second user can avoid risks for the old people and children based on the restriction condition.
It should be noted that: in the above embodiment, when the processing device with the target function runs the application program, only the division of the functional modules is illustrated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the processing device may be divided into different functional modules to complete all or part of the functions described above. In addition, the processing apparatus of the target function and the processing method of the target function provided in the foregoing embodiments belong to the same concept, and details of a specific implementation process thereof are referred to in the method embodiments and are not described herein again.
Fig. 14 is a block diagram of a terminal 1400 according to an embodiment of the present disclosure. The terminal 1400 can be a portable mobile terminal such as: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer. Terminal 1400 can also be referred to as user equipment, a portable terminal, a laptop terminal, a desktop terminal, or other names.
In general, terminal 1400 includes: a processor 1401, and a memory 1402.
Processor 1401 can include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 1401 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). Processor 1401 may also include a main processor, which is a processor for Processing data in an awake state, also referred to as a CPU (Central Processing Unit), and a coprocessor; a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1401 can be integrated with a GPU (Graphics Processing Unit) that is responsible for rendering and drawing content that the display screen needs to display. In some embodiments, processor 1401 can also include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 1402 can include one or more computer-readable storage media, which can be non-transitory. Memory 1402 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1402 is used to store at least one program code for execution by processor 1401 to implement the processing methods of the target functionality provided by the method embodiments herein.
In some embodiments, terminal 1400 may further optionally include: a peripheral device interface 1403 and at least one peripheral device. The processor 1401, the memory 1402, and the peripheral device interface 1403 can be connected by buses or signal lines. Each peripheral device can be connected to the peripheral device interface 1403 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1404, a display 1405, a camera assembly 1406, audio circuitry 1407, a positioning assembly 1408, and a power supply 1409.
The peripheral device interface 1403 can be used to connect at least one peripheral device related to I/O (Input/Output) to the processor 1401 and the memory 1402. In some embodiments, the processor 1401, memory 1402, and peripheral interface 1403 are integrated on the same chip or circuit board; in some other embodiments, any one or both of the processor 1401, the memory 1402, and the peripheral device interface 1403 can be implemented on a separate chip or circuit board, which is not limited by this embodiment.
The Radio Frequency circuit 1404 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 1404 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 1404 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1404 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 1404 is capable of communicating with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 1404 can also include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 1405 is used to display a UI (User Interface). The UI can include graphics, text, icons, video, and any combination thereof. When the display screen 1405 is a touch display screen, the display screen 1405 also has the ability to capture touch signals at or above the surface of the display screen 1405. The touch signal can be input to the processor 1401 as a control signal for processing. At this point, the display 1405 can also be used to provide virtual buttons and/or virtual keyboards, also referred to as soft buttons and/or soft keyboards. In some embodiments, the display 1405 can be one, disposed on the front panel of the terminal 1400; in other embodiments, display 1405 can be at least two, either separately disposed on different surfaces of terminal 1400 or in a folded design; in other embodiments, display 1405 can be a flexible display disposed on a curved surface or on a folded surface of terminal 1400. Even the display 1405 can be arranged in a non-rectangular irregular figure, that is, a shaped screen. The Display 1405 can be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or the like.
The camera assembly 1406 is used to capture images or video. Optionally, camera assembly 1406 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 1406 can also include a flash. The flash lamp can be a monochrome temperature flash lamp and can also be a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp and can be used for light compensation under different color temperatures.
The audio circuit 1407 can include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 1401 for processing or inputting the electric signals to the radio frequency circuit 1404 to realize voice communication. For stereo capture or noise reduction purposes, the microphones can be multiple and located at different locations on terminal 1400. The microphone can also be an array microphone or an omni-directional pick-up microphone. The speaker is then used to convert electrical signals from the processor 1401 or the radio frequency circuit 1404 into sound waves. The loudspeaker can be a conventional membrane loudspeaker, but also a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, not only the electric signal can be converted into a sound wave audible to human, but also the electric signal can be converted into a sound wave inaudible to human for use in distance measurement or the like. In some embodiments, the audio circuit 1407 can also include a headphone jack.
The positioning component 1408 serves to locate the current geographic position of the terminal 1400 for navigation or LBS (Location Based Service). The Positioning component 1408 can be a Positioning component based on the united states GPS (Global Positioning System), the chinese beidou System, or the russian galileo System.
Power supply 1409 is used to power the various components of terminal 1400. The power source 1409 can be alternating current, direct current, disposable batteries, or rechargeable batteries. When the power source 1409 comprises a rechargeable battery, the rechargeable battery can be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery can also be used to support fast charge technology.
In some embodiments, terminal 1400 also includes one or more sensors 1410. The one or more sensors 1410 include, but are not limited to: acceleration sensor 1411, gyroscope sensor 1412, pressure sensor 1413, fingerprint sensor 1414, optical sensor 1415, and proximity sensor 1416.
The acceleration sensor 1411 can detect the magnitude of acceleration on three coordinate axes of a coordinate system established with the terminal 1400. For example, the acceleration sensor 1411 can be used to detect components of the gravitational acceleration in three coordinate axes. The processor 1401 can control the display 1405 to display a user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1411. The acceleration sensor 1411 can also be used for the acquisition of motion data of a game or a user.
The gyro sensor 1412 can detect the body direction and the rotation angle of the terminal 1400, and the gyro sensor 1412 and the acceleration sensor 1411 can cooperate to collect the 3D motion of the user on the terminal 1400. The processor 1401 can realize the following functions according to the data collected by the gyro sensor 1412: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensors 1413 can be disposed on the side frames of terminal 1400 and/or underneath display 1405. When the pressure sensor 1413 is disposed on the side frame of the terminal 1400, the user can detect the holding signal of the terminal 1400, and the processor 1401 performs left-right hand recognition or shortcut operation according to the holding signal collected by the pressure sensor 1413. When the pressure sensor 1413 is disposed at the lower layer of the display screen 1405, the processor 1401 controls the operability control on the UI interface according to the pressure operation of the user on the display screen 1405. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1414 is used for collecting a fingerprint of a user, and the processor 1401 identifies the user according to the fingerprint collected by the fingerprint sensor 1414, or the fingerprint sensor 1414 identifies the user according to the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, processor 1401 authorizes the user to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying for, and changing settings, etc. Fingerprint sensor 1414 can be disposed on the front, back, or side of terminal 1400. When a physical button or vendor Logo is provided on terminal 1400, fingerprint sensor 1414 can be integrated with the physical button or vendor Logo.
The optical sensor 1415 is used to collect ambient light intensity. In one embodiment, processor 1401 is capable of controlling the display brightness of display 1405 based on the ambient light intensity collected by optical sensor 1415. Specifically, when the ambient light intensity is high, the display luminance of the display screen 1405 is increased; when the ambient light intensity is low, the display brightness of the display screen 1405 is reduced. In another embodiment, the processor 1401 is further capable of dynamically adjusting the shooting parameters of the camera assembly 1406 according to the intensity of the ambient light collected by the optical sensor 1415.
Proximity sensor 1416, also known as a distance sensor, is typically disposed on the front panel of terminal 1400. The proximity sensor 1416 is used to collect the distance between the user and the front surface of the terminal 1400. In one embodiment, when proximity sensor 1416 detects that the distance between the user and the front face of terminal 1400 is gradually decreased, processor 1401 controls display 1405 to switch from a bright screen state to a dark screen state; when proximity sensor 1416 detects that the distance between the user and the front face of terminal 1400 is gradually increasing, display 1405 is controlled by processor 1401 to switch from the sniff state to the brighten state.
Those skilled in the art will appreciate that the configuration shown in fig. 14 is not intended to be limiting with respect to terminal 1400 and can include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be employed.
The embodiment of the present application further provides a computer-readable storage medium, which is applied to a terminal, and the computer-readable storage medium stores at least one program code, and the at least one program code is loaded and executed by a processor to implement the operations executed by the terminal in the processing method of the target function of the foregoing embodiment.
Embodiments of the present application also provide a computer program product or a computer program comprising computer program code stored in a computer readable storage medium. The processor of the terminal reads the computer program code from the computer-readable storage medium, and the processor executes the computer program code, so that the terminal performs the processing method of the target function provided in the above-described various alternative implementations.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (15)

1. A processing method of a target function is applied to a first terminal, the first terminal is logged with a first user, and the method comprises the following steps:
displaying a user invitation interface for presenting at least one user meeting an invitation condition invited to assist the first user;
acquiring at least one second user selected from the at least one user based on the user invitation interface;
and respectively sending request auxiliary information to the at least one second user, wherein the request auxiliary information is used for indicating the limiting conditions when the at least one second user configures the first user to use the target function.
2. The method according to claim 1, wherein the obtaining at least one second user selected from the at least one user based on the user invitation interface comprises:
acquiring user authentication information of the user based on the selection operation of any user detected by the user invitation interface, wherein the user authentication information is used for indicating the authenticated identity information of the user;
in response to the user authentication information indicating that the age of the user is within a target age range, treating the user as the second user.
3. The method of claim 1, wherein prior to displaying the user invitation interface, the method further comprises:
displaying a protocol presentation interface for presenting at least one user protocol followed by the first user when inviting the at least one second user.
4. The method of claim 1, wherein prior to displaying the user invitation interface, the method further comprises:
displaying a first authentication interface;
and performing living body detection based on the first authentication interface.
5. The method of claim 4, wherein the performing a liveness check based on the first authentication interface comprises:
acquiring a face based on the first authentication interface;
displaying a first face image acquired in real time on the first authentication interface;
and performing living body detection on the first face image.
6. The method of claim 1, wherein prior to displaying the user invitation interface, the method further comprises:
and displaying a second authentication interface, wherein the second authentication interface is used for performing real-name authentication on the user.
7. A processing method of a target function is applied to a first terminal, and the method comprises the following steps:
responding to the trigger operation of a target function, and displaying a target function interface, wherein the target function interface is used for realizing the target function;
acquiring at least one restriction condition corresponding to the target function, wherein the at least one restriction condition is used for restricting a first user of the first terminal from using the target function, and the at least one restriction condition is configured by at least one second user invited by the first user;
and in response to the fact that any limiting condition in the at least one limiting condition is met based on the function using operation detected by the target function interface, respectively sending reminding information to the at least one second user, wherein the reminding information is used for indicating the limiting condition met when the first user uses the target function.
8. The method of claim 7, wherein the target function is a friend add function, and the target function interface is a friend add interface;
the sending of the reminding information to the at least one second user respectively in response to the function using operation detected based on the target function interface meeting any limiting condition of the at least one limiting condition comprises:
responding to friend adding operation detected based on the friend adding interface, and acquiring user information of a friend user requesting to add;
and responding to the user information indicating that the friend user meets any limiting condition in the at least one limiting condition, and respectively sending reminding information to the at least one second user.
9. The method of claim 7, wherein the target function is a resource transfer function and the target function interface is a first resource transfer interface;
after the sending of the reminder information to the at least one second user, the method further includes:
responding to the payment withholding operation detected by the first resource transfer interface, and displaying a user selection interface which is used for displaying the at least one second user;
and responding to the selection operation of any second user, and sending resource transfer information to the second user, wherein the resource transfer information is used for indicating the second user to replace the first user for resource transfer.
10. A processing method of a target function is applied to a second terminal, and the method comprises the following steps:
responding to the received request auxiliary information sent by a first terminal, and displaying a condition configuration interface, wherein the condition configuration interface is used for displaying at least one limiting condition corresponding to a target function indicated by the request auxiliary information;
acquiring at least one limiting condition selected from the at least one limiting condition based on the condition configuration interface;
returning the selected at least one restriction condition to the first terminal.
11. An apparatus for processing a target function, applied to a first terminal, the first terminal being logged with a first user, the apparatus comprising:
the first display module is used for displaying a user invitation interface, and the user invitation interface is used for displaying at least one user meeting invitation conditions invited to assist the first user;
the user obtaining module is used for obtaining at least one second user selected from the at least one user based on the user invitation interface;
and the first information sending module is used for sending request auxiliary information to the at least one second user respectively, wherein the request auxiliary information is used for indicating the limiting conditions when the at least one second user configures the target function for the first user.
12. An apparatus for processing a target function, applied to a first terminal, the apparatus comprising:
the second display module is used for responding to the trigger operation of a target function and displaying a target function interface, and the target function interface is used for realizing the target function;
a first condition obtaining module, configured to obtain at least one restriction condition corresponding to the target function, where the at least one restriction condition is used to restrict a first user of the first terminal from using the target function, and the at least one restriction condition is configured by at least one second user invited by the first user;
and the second information sending module is used for responding to a function using operation detected based on the target function interface and meeting any limiting condition of the at least one limiting condition, and sending reminding information to the at least one second user respectively, wherein the reminding information is used for indicating the limiting condition met when the first user uses the target function.
13. An apparatus for processing a target function, applied to a second terminal, the apparatus comprising:
the third display module is used for responding to the received request auxiliary information sent by the first terminal and displaying a condition configuration interface, and the condition configuration interface is used for displaying at least one limiting condition corresponding to the target function indicated by the request auxiliary information;
the second condition acquisition module is used for acquiring at least one limiting condition selected from the at least one limiting condition based on the condition configuration interface;
and the condition sending module is used for returning the selected at least one limiting condition to the first terminal.
14. A terminal, characterized in that it comprises a processor and a memory for storing at least one piece of program code, which is loaded by the processor and which performs the processing method of the target function of any one of claims 1 to 6, or performs the processing method of the target function of any one of claims 7 to 9, or performs the processing method of the target function of claim 10.
15. A storage medium for storing at least one program code for performing the method of processing the target function of any one of claims 1 to 6, or for performing the method of processing the target function of any one of claims 7 to 9, or for performing the method of processing the target function of claim 10.
CN202011135026.9A 2020-10-21 2020-10-21 Target function processing method, device, terminal and storage medium Pending CN112163862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011135026.9A CN112163862A (en) 2020-10-21 2020-10-21 Target function processing method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011135026.9A CN112163862A (en) 2020-10-21 2020-10-21 Target function processing method, device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN112163862A true CN112163862A (en) 2021-01-01

Family

ID=73867867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011135026.9A Pending CN112163862A (en) 2020-10-21 2020-10-21 Target function processing method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112163862A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113447819A (en) * 2021-06-28 2021-09-28 国网北京市电力公司 Residual electric quantity prompting method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113447819A (en) * 2021-06-28 2021-09-28 国网北京市电力公司 Residual electric quantity prompting method and device

Similar Documents

Publication Publication Date Title
CN108888959B (en) Team forming method and device in virtual scene, computer equipment and storage medium
CN111324259B (en) Group creation method, device and storage medium
CN109547495B (en) Sensitive operation processing method, device, server, terminal and storage medium
CN111083516B (en) Live broadcast processing method and device
CN111835531B (en) Session processing method, device, computer equipment and storage medium
CN111092809B (en) Method and device for pushing information in real time, computer equipment and storage medium
CN110102063B (en) Identification binding method, device, terminal, server and storage medium
CN111106997B (en) Message reminding method, device, equipment and storage medium
CN109218169B (en) Instant messaging method, device and storage medium
CN111158576A (en) Social relationship establishing method and device based on live broadcast scene and storage medium
CN112966798B (en) Information display method and device, electronic equipment and storage medium
CN113413615A (en) Game invitation method, device, computer equipment and storage medium
CN111760296A (en) Team forming processing method, team forming processing device, terminal, server and storage medium
CN112163862A (en) Target function processing method, device, terminal and storage medium
CN110597840A (en) Partner relationship establishing method, device, equipment and storage medium based on block chain
CN114826799B (en) Information acquisition method, device, terminal and storage medium
CN111131619B (en) Account switching processing method, device and system
CN111726558B (en) On-site survey information acquisition method and device, computer equipment and storage medium
CN111277608B (en) Block chain-based security risk information management method, device, equipment and storage medium
CN115708372A (en) Vehicle position sharing method, system, device, equipment and readable storage medium
CN111444289A (en) Incidence relation establishing method
CN114546188A (en) Interaction method, device and equipment based on interaction interface and readable storage medium
CN111490979B (en) Information interaction method and device and storage medium
CN110809256B (en) System acceleration method and device of terminal, storage medium and terminal
CN114826800B (en) Information acquisition method, device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40037756

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination