CN114745711A - Method and device for sending cloud business card, computer equipment and storage medium - Google Patents

Method and device for sending cloud business card, computer equipment and storage medium Download PDF

Info

Publication number
CN114745711A
CN114745711A CN202210314301.6A CN202210314301A CN114745711A CN 114745711 A CN114745711 A CN 114745711A CN 202210314301 A CN202210314301 A CN 202210314301A CN 114745711 A CN114745711 A CN 114745711A
Authority
CN
China
Prior art keywords
user
cloud
card
business card
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210314301.6A
Other languages
Chinese (zh)
Inventor
阳波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wingtech Communication Co Ltd
Original Assignee
Wingtech Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wingtech Communication Co Ltd filed Critical Wingtech Communication Co Ltd
Priority to CN202210314301.6A priority Critical patent/CN114745711A/en
Publication of CN114745711A publication Critical patent/CN114745711A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a method and a device for sending a cloud business card, computer equipment and a storage medium. The sending method of the cloud business card comprises the following steps: receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user; inquiring a cloud business card of a second user based on the face image; determining a cloud card type of a cloud card of a second user; and under the condition that the type of the cloud business card is the public type, sending the cloud business card of the second user to the first terminal. According to the embodiment of the disclosure, the user can conveniently and quickly acquire the cloud business card on the basis of protecting personal information.

Description

Method and device for sending cloud business card, computer equipment and storage medium
Technical Field
The present application relates to the field of information processing technologies, and in particular, to a method and an apparatus for sending a cloud card, a computer device, and a storage medium.
Background
The cloud business card is very practical in daily friend making, self introduction and other aspects, and along with the development of advanced science and technology of society, the mode of acquiring personal information in the cloud business card through the cloud business card is more and more.
In the related art, a user can generate a two-dimensional code from a cloud business card, so that other people can conveniently acquire the cloud business card by scanning the two-dimensional code. However, since the two-dimensional code screenshot can be forwarded at will, cloud business card information of the user can be exposed easily under the condition that the user does not know the information, and personal information is leaked.
Disclosure of Invention
Based on this, it is necessary to provide a method and an apparatus for sending a cloud card, a computer device, and a storage medium, which enable a user to conveniently and quickly obtain the cloud card on the basis of protecting personal information.
The embodiment of the application provides a method for sending a cloud card, which comprises the following steps:
receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user;
inquiring a cloud business card of a second user based on the face image;
determining a cloud card type of a cloud card of a second user;
and under the condition that the type of the cloud business card is the public type, sending the cloud business card of the second user to the first terminal.
In one embodiment, after determining the cloud card type of the cloud card of the second user, the method further comprises:
under the condition that the type of the cloud business card is a verification type, sending a verification request to a second terminal used by a second user, wherein the verification request is used for enabling the second terminal to feed back a verification result of the second user;
receiving a verification result fed back by the second terminal;
and under the condition that the verification result is that the verification is passed, the cloud business card of the second user is sent to the first terminal.
In one embodiment, the cloud card request further carries a user identifier of the first user;
wherein, before sending the authentication request to the second terminal used by the second user, the method further comprises:
inquiring user information of a first user based on a user identifier of the first user; the verification request carries user information of the first user.
In one embodiment, the cloud card request further carries a user identifier of the first user;
wherein, prior to determining the cloud card type of the cloud card of the second user, the method further comprises:
determining a user type of the first user marked by the second user based on the user identification of the first user;
wherein determining the cloud card type of the cloud card of the second user comprises:
and under the condition that the user type is the unmarked user, determining the cloud business card type of the cloud business card of the second user.
In one embodiment, after determining the user type that the second user marks for the first user, the method further comprises:
under the condition that the user type is the blacklist user, the cloud business card of the second user is forbidden to be sent to the first terminal;
and under the condition that the user type is a white list user, sending the cloud business card of the second user to the first terminal.
In one embodiment, the cloud card request also carries a real-time location of the first user;
before determining the cloud card type of the cloud card of the second user, the method further comprises:
judging whether the real-time position of the first user is within a target geographical range, wherein the target geographical range is determined according to the real-time position of the second user;
determining the cloud card type of the cloud card of the second user comprises the following steps:
if the real-time position of the first user is not within the target geographic range, determining the cloud business card type of the cloud business card of the second user;
in one embodiment, after determining whether the real-time location of the first user is within the target geographic range, the method further comprises:
and if the real-time position of the first user is within the target geographic range, the cloud business card of the second user is sent to the first terminal.
The embodiment of the application further provides a device for sending the cloud business card, and the device comprises:
the request receiving module is used for receiving a cloud business card request sent by a first terminal used by a first user, and the cloud business card request carries a face image of a second user;
the business card query module is used for querying a cloud business card of a second user based on the face image;
the type determining module is used for determining the cloud business card type of the cloud business card of the second user;
and the first sending module is used for sending the cloud business card of the second user to the first terminal under the condition that the type of the cloud business card is the public type.
The embodiment of the application further provides computer equipment which comprises a storage and a processor, wherein the storage stores a computer program, and the processor executes the computer program to realize the steps of the cloud card sending method provided by any embodiment of the application.
The embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the method for sending the cloud business card provided in any embodiment of the present application are implemented.
According to the cloud business card sending method, the cloud business card sending device, the computer equipment and the storage medium, after a cloud business card request sent by a first terminal used by a first user is received, the cloud business card of the second user can be inquired based on a face image of the second user carried in the cloud business card request, the type of the inquired cloud business card of the second user is determined, and then the cloud business card of the second user is sent to the first terminal under the condition that the type of the cloud business card is a public type.
Drawings
Fig. 1 is an application scenario diagram of a method for sending a cloud card in one embodiment;
FIG. 2 is a flow diagram illustrating a method for sending a cloud card in one embodiment;
FIG. 3 is an interaction diagram of a cloud card creation process in one embodiment;
FIG. 4 is an interaction diagram of a cloud card download process in one embodiment;
fig. 5 is a flowchart illustrating a method for sending a cloud card according to another embodiment;
FIG. 6 is an interaction diagram of a cloud card exchange process in one embodiment;
fig. 7 is a flowchart illustrating a method of sending a cloud card according to still another embodiment;
fig. 8 is a flowchart illustrating a method of transmitting a cloud card according to still another embodiment;
FIG. 9 is an interaction diagram of a cloud card download process in another embodiment;
FIG. 10 is a block diagram showing the configuration of a device for transmitting a cloud card according to an embodiment;
FIG. 11 is a diagram illustrating an internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present application. It should be understood that the drawings and embodiments of the present application are for illustration purposes only and are not intended to limit the scope of the present application.
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present application. It should be understood that the drawings and embodiments of the present application are for illustration purposes only and are not intended to limit the scope of the present application.
It should be noted that the terms "first", "second", and the like in the present application are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this application are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that reference to "one or more" unless the context clearly dictates otherwise.
The names of messages or information exchanged between a plurality of devices in the embodiments of the present application are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The sending method of the cloud business card provided by the application can be applied to an application scene shown in fig. 1. The application scenario may include the first terminal 101, the second terminal 102, and the server 103. The first terminal 101, the second terminal 102 and the server 103 communicate with each other through a network.
The first terminal 101 and the second terminal 102 may be, but are not limited to, a smart phone, a tablet computer, and a portable wearable device. Specifically, the first terminal 101 is a terminal used by a first user who needs to acquire a cloud card. The second terminal 102 is a terminal used by the second user who acquired the cloud card.
The server 103 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers. The server 103 may receive and store the cloud card uploaded by the second user through the second terminal 102, and execute the cloud card sending method provided by the present application when the first terminal 101 requests to obtain the cloud card of the second user.
Specifically, after receiving a cloud card request sent by a first terminal used by a first user, the server 103 queries a cloud card of the second user based on a face image of the second user carried in the cloud card request, determines a cloud card type of the queried cloud card of the second user, and sends the cloud card of the second user to the first terminal under the condition that the cloud card type is a public type.
Further, after determining the cloud card type of the cloud card of the second user, the server 103 may also send a verification request to the second terminal used by the second user when the cloud card type is a verification type, so that the second terminal feeds back the verification result of the second user after receiving the verification request. The server 103 may receive a verification result fed back by the second terminal, and in a case that the verification result is verified, send the cloud business card of the second user to the first terminal. Therefore, the server 103 enables the second user to verify the identity of the first user when the cloud card type is the verification type, that is, the security policy is semi-public, and then sends the cloud card of the second user to the first terminal when the identity of the first user passes the verification, so that the security of the personal information can be further improved.
Further, before sending the verification request to the second terminal used by the second user, the server 103 may query the user information of the first user based on the user identifier of the first user, which is carried by the first user when the first user sends the cloud card request to the server 103, and thus, after querying the user information of the first user, the server 103 may send the verification request carrying the user information of the first user to the second terminal used by the second user, and further, under the condition that the second user knows the identity of the first user, it may be determined whether the cloud card needs to be sent to the first user, further, personal information is prevented from being leaked to other people with unknown information, and the security of the personal information is improved.
Further, the server 103 may also determine, before determining the cloud card type of the cloud card of the second user, the user type of the second terminal, where the first user is marked by the second user, based on the user identifier of the first user carried by the first user when sending the cloud card request, if the user type of the first user is a non-labeled user, it may be determined that the second user has not labeled the first user, the first user neither belongs to a blacklist user nor a whitelist user, the server needs to determine the cloud card type of the cloud card of the second user, and further determines whether to send the cloud card of the second user to the first user, and thus, under the condition that the second user is not in contact with the first user and the first user is not marked, a way for obtaining the cloud business card of the second user can be provided for the first user, and the user experience of the user obtaining the cloud business card is improved.
Further, after determining that the second user is the user type marked by the first user, the server 103 may prohibit sending the cloud card of the second user to the first terminal of the first user when the user type of the first user is a blacklist user; and under the condition that the user type of the first user is a white list user, sending the cloud business card of the second user to the first terminal of the first user. Therefore, under the condition that the second user contacts the first user and marks the first user, the server can determine whether to send the cloud business card of the second user to the first terminal according to the marked user type of the first user, so that the first user marked as a blacklist user can not obtain the cloud business card, the first user marked as a whitelist user can conveniently and quickly obtain the cloud business card, leakage of personal information can be prevented, and the user who approves to obtain the cloud business card by the second user can quickly obtain the cloud business card.
Further, the server 103 may further determine, before determining the cloud card type of the cloud card of the second user, whether the real-time location of the first user carried in the cloud card request is within a target geographic range determined according to the real-time location of the second user, and if the real-time location of the first user is not within the target geographic range, it may be determined that the first user is not within a location range where the second user allows to obtain the cloud card of the second user.
Further, after the server 103 judges whether the real-time position of the first user is within the target geographical range, if the real-time position of the first user is within the target geographical range, it can be determined that the first user is within a position range where the second user allows to obtain the cloud business card of the first user, and the server 103 directly sends the cloud business card of the second user to the first terminal.
In an embodiment of the present application, as shown in fig. 2, a flowchart of a method for sending a cloud card is provided. In this embodiment, the method is mainly applied to a server, for example, as illustrated by the server 103 in fig. 1, and as shown in fig. 2, the method for sending the cloud business card may include the following steps:
s210, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user.
In the embodiment of the disclosure, when a first user wants to acquire a cloud card of a second user, the first user may use a first terminal to send a cloud card request to a server, so that the server may receive the cloud card request sent by the first terminal.
The first terminal may be a terminal used by a first user who needs to acquire a cloud card, for example, the first terminal 101 in fig. 1.
Further, the cloud card may include cloud card information, the cloud card information may include personal information, company information, and position information, and the personal information may include a user name, a user phone, a user social account, a user mailbox, and the like, which are not limited herein.
Optionally, the cloud card request may be a cloud card acquisition request for the first user to acquire a cloud card of the second user, or may be a cloud card exchange request for the first user and the second user to exchange cloud cards.
Further, the cloud card request may carry a facial image of the second user.
In some embodiments, a first user may open a face scanning interface on a first terminal, and perform a face scanning operation on a second user in the face scanning interface to obtain a face image of the second user, so that a cloud card request carries the face image of the second user.
In other embodiments, the first user may select a pre-stored photo of the second user on the first terminal to obtain a face image of the second user, so that the cloud card request carries the face image of the second user.
And S220, inquiring the cloud business card of the second user based on the face image.
In the embodiment of the disclosure, after receiving the cloud card request, the server may respond to the cloud card request, and query, based on the face image, a cloud card of the second user in the pre-stored cloud card.
Specifically, the server may perform associated storage on personal images of a plurality of users and cloud business cards thereof to obtain pre-stored cloud business cards. For example, the second user may edit the cloud card information on the second terminal to create a cloud card of the second user, then select one or more personal images, and further send the cloud card and the personal images of the second user to the server through the second terminal, and the server may perform associated storage on the cloud card and the personal images of the second user after receiving the cloud card and the personal images of the second user.
The second terminal may be a terminal used by a second user who acquires the cloud card, for example, the second terminal 102 in fig. 1.
Alternatively, the personal image may be an image containing a face of a user to which the cloud card belongs.
The following describes in detail a process of creating a cloud card by a second user with a specific example, as shown in fig. 3, the specific steps are as follows:
step 1: a second user inputs personal information or imports the personal information in a business card creation interface of contact person software installed on a second terminal, and creates an electronic business card;
step 2: when the second terminal stores the personal business card, a popup box can be displayed to inquire whether a second user creates a cloud business card;
and step 3: the second user selects to create a cloud business card in the bullet frame;
and 4, step 4: the second terminal displays a security policy selection panel, and the security policy selection panel provides a plurality of security policies which can be set for the cloud business card for the second user;
and 5: the second user selects the security policy required by the second user from the multiple security policies and confirms to use the security policy;
step 6: the second terminal responds to the second user to confirm the use of the security strategy, skips to display a face input interface and guides the second user to input the personal image;
and 7: the second user inputs the personal image according to the guide;
and 8: after the personal image is successfully input, the second terminal prompts a second user to confirm whether to upload personal information and the personal image or not so as to create a cloud business card;
and step 9: the second user selects and confirms to upload the personal information and the personal image on the second terminal;
step 10: the second terminal responds to the second terminal to select and confirm to upload the personal information and the personal image, and uploads the personal information, the personal image and the security policy to the server through the network;
step 11: after receiving the personal information, the personal image and the security policy, the server can store the personal information as a cloud business card of the second user, determine the cloud business card type of the cloud business card according to the security policy, store the cloud business card of the second user in association with the personal image, and respond to the second terminal for successful uploading;
step 12: and the second terminal receives the response message and can display a popup box to prompt the second user that the cloud business card is successfully created.
Therefore, the second user can conveniently and quickly create the cloud business card on the second terminal, so that the server stores the cloud business card in advance.
Further, the server may perform one-to-one comparison query on the face image carried in the cloud card request and a personal image pre-stored locally, and if a personal image matched with the face image carried in the cloud card request is queried, the cloud card stored in association with the queried personal image is used as the cloud card of the second user.
Optionally, the server may extract the face features in the face image, then calculate the similarity between the face features in the face image and the face features of each personal image, and use the personal image with the highest similarity and greater than or equal to a preset similarity threshold as the personal image matched with the face image carried in the cloud card request.
The preset similarity threshold may be a similarity threshold preset as needed and used for determining whether two face features belong to the same face. For example, the preset similarity threshold may be 98% or 99%, which is not limited herein.
S230, determining the cloud business card type of the cloud business card of the second user.
In the embodiment of the application, after the server queries the cloud card of the second user, the server queries the cloud card type preset for the cloud card of the second user.
The cloud business card type can be a policy type representing a security policy of the cloud business card.
When the second user creates the cloud business card, the second user can set the security policy of the cloud business card through the second terminal, so that when the second terminal sends the cloud business card and the personal image to the server, the security policy of the cloud business card is sent at the same time, the server can receive the security policy of the cloud business card, and the type of the cloud business card preset for the cloud business card by the second user is determined.
Furthermore, the security policy of the cloud business card is a policy used by a user to whom the cloud business card belongs to protect the security of the cloud business card, and different security policies are set, so that the cloud business card has different security levels, and the different security levels can correspond to different cloud business card types.
Optionally, the security policy of the cloud card includes full disclosure and semi-disclosure. Under the condition that the security policy of the cloud business card is completely disclosed, the cloud business card can have a first security level, and the type of the cloud business card corresponding to the first security level can be a public type. Under the condition that the security policy of the cloud business card is semi-public, the cloud business card can have a second security level, and the cloud business card type corresponding to the second security level can be a verification type.
It should be noted that the security of the first security level is lower than the security of the second security level.
S240, under the condition that the type of the cloud business card is the public type, the cloud business card of the second user is sent to the first terminal.
In the embodiment of the application, the server directly sends the cloud card of the second user to the first terminal of the first user when inquiring that the type of the cloud card preset for the cloud card by the second user is the public type.
The cloud business card type is the public type, and the user to which the cloud business card belongs sets the security policy of the cloud business card to be the public type.
And under the condition that the type of the cloud business card is the public type, users except the user to which the cloud business card belongs can acquire the information of the cloud business card. In some embodiments, the cloud card request is a cloud card acquisition request for a first user to acquire a cloud card of a second user, and the server may directly send the cloud card of the second user to the first terminal, so as to realize acquisition of the cloud card of the second user by the first user.
In other embodiments, the cloud business card request may be a cloud business card exchange request for exchanging cloud business cards between the first user and the second user, and the server may obtain the cloud business card of the first user while directly sending the cloud business card of the second user to the first terminal, or after directly sending the cloud business card of the second user to the first terminal, and send the cloud business card of the first user to the second terminal, so as to implement cloud business card exchange between the first user and the second user.
Specifically, the cloud card request may also carry a user identifier of the first user, and the server may search for a cloud card having the user identifier of the first user, and use the searched cloud card as the cloud card of the first user.
Alternatively, the user identity may be a unique identity for confirming the user identity of the first user. The user identifier may include a mobile phone number of the user, an account name of the user, and the like, which is not limited herein.
In the embodiment of the disclosure, after a cloud business card request sent by a first terminal used by a first user is received, a cloud business card of the second user is inquired based on a face image of the second user carried in the cloud business card request, and the type of the inquired cloud business card of the second user is determined, and then the cloud business card of the second user is sent to the first terminal under the condition that the type of the cloud business card is a public type.
The following describes in detail a sending process of the cloud card shown in fig. 2 by using a specific example, as shown in fig. 4, the specific steps are as follows:
step 1: a first user opens a face-sweeping contact adding interface in contact software installed on a first terminal;
step 2: the method comprises the steps that a first terminal responds to the opening operation of a first user, displays a face-scanning contact person adding interface and prepares to input a face image of a second user;
and step 3: adding a face image of a second user in a face-sweeping contact adding interface by a first user;
and 4, step 4: after receiving a face image of a second user input by a first user, a first terminal uploads the face image of the second user and a mobile phone number of the first user to a server through a network;
and 5: after receiving the face image of the second user and the mobile phone number of the first user, the server searches the cloud business card of the second user locally based on the face image of the second user;
step 6: the server determines the cloud name card type of the cloud name card of the second user;
and 7: the server directly issues the cloud business card of the second user to the first terminal of the first user based on the mobile phone number of the first user under the condition that the cloud business card type of the second user is a public type;
and 8: after receiving a second user's cloud card issued by the server, the first terminal jumps to a contact card creation interface, and imports cloud card information in the second user's cloud card issued by the server in the contact card creation interface;
and step 9: the method comprises the steps that a first user creates an interface on a contact card displayed by a first terminal, and selects and confirms to store cloud business card information of a second user as the contact card;
step 10: and the first terminal responds to the saving operation of the first user, saves the cloud business card information of the second user as a contact card of the second user, and displays the details of the contact card to the first user.
In another embodiment of the present application, as shown in fig. 5, the present application provides a flowchart of another method for sending a cloud card. In this embodiment, the method is mainly applied to a server, for example, as illustrated by the server 103 in fig. 1, and as shown in fig. 5, the method for sending the cloud business card may include the following steps:
s510, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user.
S520, inquiring the cloud business card of the second user based on the face image.
S530, determining the cloud business card type of the cloud business card of the second user.
S510-S530 are similar to S210-S230 in the embodiment shown in fig. 2, and are not described herein again.
And S540, under the condition that the type of the cloud business card is the verification type, sending a verification request to a second terminal used by a second user, wherein the verification request is used for enabling the second terminal to feed back the verification result of the second user.
In the embodiment of the application, after determining the cloud card type of the cloud card of the second user, if the cloud card type is determined to be the verification type, which indicates that the first user needs to obtain the cloud card only through the permission of the second user, the server determines whether the second user needs to verify whether to send the cloud card to the first user, and then sends a verification request to a second terminal used by the second user.
After receiving the verification request, the second terminal may present the verification information to the second user, so that the second user inputs the verification result of the second user with respect to the verification information. The verification result can comprise passing verification and failing verification, wherein the passing verification means that the second user allows the first user to obtain the cloud business card of the second user, and the failing verification means that the second user does not allow the first user to obtain the cloud business card of the second user.
Further, the cloud card request may also carry a user identifier of the first user.
Alternatively, the user identification may be a unique identification for confirming the user identity of the first user. The user identifier may include a mobile phone number of the user, an account name of the user, and the like, which is not limited herein.
In these embodiments, before S540, the sending method of the cloud business card may further include querying, based on the user identifier of the first user, user information of the first user; the verification request carries user information of the first user.
In the embodiment of the application, the cloud card request sent by the first terminal used by the first user to the server may also carry the user identifier of the first user, so that the server may query the user information of the first user based on the user identifier of the first user, and when the verification request is sent to the second terminal, the user information of the first user is carried in the verification request.
Specifically, the server may perform one-to-one comparison query on the user identifier of the first user carried in the cloud card request and the user identifier in the personal information stored locally in advance, and if the personal information matched with the user identifier of the first user is queried, the queried personal information is used as the user information of the first user.
In the embodiment of the application, the server can send the verification request carrying the user information of the first user to the second terminal used by the second user, so that the second user can judge whether the cloud business card needs to be sent to the first user or not under the condition that the second user knows the identity of the first user, personal information is further prevented from being leaked to other people with unknown information, and the safety of the personal information is improved.
And S550, receiving the verification result fed back by the second terminal.
In this embodiment of the application, after the second user inputs the verification result of the second user for the verification information, the second terminal may feed back the received verification result to the server, so that the server may receive the verification result fed back by the second terminal.
And S560, under the condition that the verification result is that the verification is passed, the cloud business card of the second user is sent to the first terminal.
In the embodiment of the application, after receiving the verification result fed back by the second terminal, the server detects the verification result, and if the verification result is that the verification is passed, the server directly sends the cloud business card of the second user to the first terminal.
Therefore, the server can send the cloud business card of the second user to the first terminal under the condition that the identity of the first user passes the verification, and the safety of personal information can be further improved.
And S570, under the condition that the verification result is that the second user is not verified, forbidding to send the cloud business card of the second user to the first terminal.
In this embodiment of the application, after receiving a verification result fed back by the second terminal, the server detects the verification result, and if the verification result is that the verification is not passed, the server does not send the cloud business card of the second user to the first terminal.
Therefore, the server can keep the cloud business card of the second user secret under the condition that the identity of the first user is not verified, and the safety of personal information can be further improved.
The following describes in detail a sending process of the cloud card shown in fig. 5 by using a specific example, as shown in fig. 6, the specific steps are as follows:
step 1: a first user opens a face scanning exchange cloud business card interface in contact person software installed on a first terminal;
step 2: the method comprises the steps that a first terminal responds to the opening operation of a first user, displays a face scanning exchange cloud business card interface and prepares to input a face image of a second user;
and step 3: a first user inputs a face image of a second user on a face scanning exchange cloud business card interface of a first terminal;
and 4, step 4: after receiving a face image of a second user input by a first user, a first terminal uploads the face image of the second user and a mobile phone number of the first user to a server through a network;
and 5: after receiving the face image of the second user and the mobile phone number of the first user, the server searches the cloud business card of the second user locally based on the face image of the second user, and queries the user information of the first user based on the mobile phone number of the first user;
step 6: the server sends a verification request carrying the user information of the first user to the second terminal through the network;
and 7: after receiving the mobile phone number and the verification request of the first user sent by the server, the second terminal can display a popup box based on the verification request and the user information of the first user to inquire whether the second user is willing to exchange a cloud business card with the first user;
and step 8: the second user confirms agreement to exchange the cloud business card in the bullet frame;
and step 9: the second terminal responds to the confirmation of the second user that the exchange of the cloud business card is agreed, and sends the verification result that the first user passes the verification to the server;
step 10: after receiving a verification result sent by a second terminal, the server directly issues a cloud business card of the second user to a first terminal of a first user based on the mobile phone number of the first user;
step 11: the server inquires the cloud business card of the first user based on the mobile phone number of the first user while issuing the cloud business card of the second user to the first terminal of the first user, and issues the cloud business card of the first user to the second terminal of the second user;
step 12: after receiving a second user's cloud card issued by the server, the first terminal jumps to a contact card creation interface, and imports cloud card information in the second user's cloud card issued by the server in the contact card creation interface;
step 13: the method comprises the steps that a first user creates an interface on a contact card displayed by a first terminal, and selects and confirms to store cloud business card information of a second user as the contact card;
step 14: the first terminal responds to the saving operation of the first user, the cloud business card information of the second user is saved as a contact card of the second user, and details of the contact card are displayed to the first user;
step 15: after receiving the cloud business card of the first user sent by the server, the second terminal jumps to a contact card creation interface and imports the cloud business card information in the cloud business card of the first user sent by the server into the contact card creation interface;
step 16: the second user creates an interface on the contact card displayed by the second terminal, and selects and confirms the cloud business card information of the first user to be stored as the contact card;
and step 17: and the second terminal responds to the storage operation of the second user, stores the cloud business card information of the first user as a contact card of the first user, and displays details of the contact card to the second user.
In another embodiment of the present application, as shown in fig. 7, the present application provides a schematic flowchart of a method for sending a cloud card. In this embodiment, the method is mainly applied to a server, for example, as illustrated by the server 103 in fig. 1, and as shown in fig. 7, the method for sending the cloud business card may include the following steps:
s710, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user and a user identifier of the first user.
The content of S710 is similar to that of S210 in the embodiment shown in fig. 2, and is not described herein again.
Alternatively, the user identity may be a unique identity for confirming the user identity of the first user. The user identifier may include a mobile phone number of the user, an account name of the user, and the like, which is not limited herein.
S720, inquiring the cloud business card of the second user based on the face image.
S720 is similar to S220 in the embodiment shown in fig. 2, and is not described herein again.
And S730, determining the user type marked by the second user by the first user based on the user identification of the first user.
In the embodiment of the application, the cloud card request sent by the first terminal to the server may also carry the user identifier of the first user, so that the server may respectively query whether the user identifier of the first user exists in a locally stored blacklist and a locally stored white list set by the second user, and determine the user type of the first user marked by the second user according to the query result.
If the query result is that the user identifier of the first user exists in the blacklist, determining that the user type of the first user is the blacklist user; if the query result is that the user identifier of the first user exists in the white list, determining that the user type of the first user is a white list user; and if the query result indicates that the user identifier of the first user does not exist in the blacklist and the white list, determining that the user type of the first user is an unmarked user.
Specifically, the second user can set a blacklist and a white list for the cloud business card of the second user through the second terminal, the blacklist user in the blacklist cannot obtain the cloud business card of the second user, and the white list user in the white list can directly obtain the cloud business card of the second user without verification of the second user.
And S740, determining the cloud business card type of the cloud business card of the second user under the condition that the user type is the unmarked user.
In the embodiment of the application, after querying the user type of the first user marked by the second user, if the user type of the first user is determined to be a user without a mark, the server needs to determine the cloud business card type of the cloud business card of the second user.
The method for determining the cloud card type of the cloud card of the second user is similar to S230 in the embodiment shown in fig. 2, and details are not repeated here.
And S750, under the condition that the type of the cloud business card is the public type, sending the cloud business card of the second user to the first terminal.
S750 is similar to S240 in the embodiment shown in fig. 2, and is not described herein again.
In the embodiment of the application, under the condition that the second user does not contact the first user and does not mark the first user, a way for obtaining the cloud business card of the second user can be provided for the first user, and the user experience of the user obtaining the cloud business card is improved.
And S760, under the condition that the user type is the blacklist user, the cloud business card of the second user is forbidden to be sent to the first terminal.
In the embodiment of the application, after querying the user type marked by the second user by the first user, if the user type of the first user is determined to be a blacklist user, the server does not send the cloud business card of the second user to the first terminal.
S770, under the condition that the user type is the white list user, the cloud business card of the second user is sent to the first terminal.
In the embodiment of the application, after querying the user type marked by the second user for the first user, if the user type of the first user is a white list user, the server directly sends the cloud business card of the second user to the first terminal.
Therefore, in the embodiment of the application, under the condition that the second user contacts the first user and marks the first user, the server can determine whether to send the cloud business card of the second user to the first terminal according to the type of the marked user of the first user, so that the first user marked as a blacklist user cannot acquire the cloud business card, the first user marked as a whitelist user can conveniently and quickly acquire the cloud business card, leakage of personal information can be prevented, and the user who approves to acquire the cloud business card by the second user can quickly acquire the cloud business card.
In another embodiment of the present application, as shown in fig. 8, a flowchart of another method for sending a cloud card is provided. In this embodiment, the method is mainly applied to a server, for example, as illustrated by the server 103 in fig. 1, and as shown in fig. 8, the method for sending the cloud business card may include the following steps:
s810, receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user and the real-time position of the first user.
Here, the content of S810 is similar to that of S210 in the embodiment shown in fig. 2, and is not described herein again.
Optionally, the real-time location of the first user may be a location where the first terminal sends the cloud card request to the server, and the real-time location of the first user may be used for the server to verify the identity of the first user.
In the embodiment of the disclosure, under the condition that the first user grants the right to acquire and send the real-time location to the server on the first terminal, the cloud card request sent by the first terminal to the server may carry the real-time location, and the server may receive the cloud card request sent by the first terminal and carrying the real-time location of the first user, so as to verify the identity of the first user through the real-time location of the first user.
And S820, inquiring the cloud business card of the second user based on the face image.
S820 is similar to S220 in the embodiment shown in fig. 2, and is not described herein again. .
And S830, judging whether the real-time position of the first user is within a target geographic range, wherein the target geographic range is determined according to the real-time position of the second user.
In the embodiment of the application, because the cloud card request also carries the real-time position of the first user, after the server queries the cloud card of the second user, whether the real-time position of the first user is within the target geographic range can be judged, so that the identity of the first user is verified through the real-time position of the first user.
Wherein the target geographic range is determined by the real-time location of the second user. The real-time position of the second user can be the position of the second terminal when the first terminal sends the cloud card request to the server.
Specifically, under the condition that the second user starts the local area open cloud business card function on the second terminal, the server may receive indication information sent by the second terminal to the server, at this time, under the condition that the second user grants the right to acquire and send the real-time position to the server on the second terminal, the server may acquire the real-time position of the second user in response to the indication information, and obtain the target geographic range corresponding to the real-time position by taking the real-time position as a range center and taking the preset distance as a range radius. It can be seen that, since the real-time location of the second user is changed from moment to moment, the target geographical range is also changed from moment to moment following the real-time location of the second user.
If the second user starts the local area public cloud card function, the server can verify the identity of the first user based on the real-time position of the first user and execute different operations according to the verification result.
S840, if the real-time position of the first user is not within the target geographic range, determining the cloud business card type of the cloud business card of the second user.
In this embodiment of the application, after the server determines whether the real-time location of the first user is within the target geographic range, if it is determined that the real-time location of the first user is not within the target geographic range, it is determined that the identity of the first user is not verified by the server, and therefore, the server needs to determine the cloud card type of the cloud card of the second user.
The method for determining the cloud card type of the cloud card of the second user is similar to S230 in the embodiment shown in fig. 2, and details are not repeated here.
And S850, under the condition that the type of the cloud business card is the public type, sending the cloud business card of the second user to the first terminal.
S850 is similar to S240 in the embodiment shown in fig. 2, and is not repeated herein.
In this embodiment of the application, before determining the cloud card type of the cloud card of the second user, the server may further determine whether the real-time location of the first user carried in the cloud card request is within a target geographic range determined according to the real-time location of the second user, and even if the determination result is that the real-time location of the first user is not within the target geographic range, which is allowed by the second user to acquire the cloud card of the second user, that is, the identity of the first user does not pass the verification of the server, the server may provide a way for the first user to acquire the cloud card of the second user, so that the user experience of the user acquiring the cloud card is improved.
And S860, if the real-time position of the first user is within the target geographic range, sending the cloud business card of the second user to the first terminal.
In the embodiment of the application, after the server judges whether the real-time position of the first user is within the target geographic range, if the real-time position of the first user is determined to be within the target geographic range, the identity of the first user is determined to pass the verification of the server, and therefore the server can directly send the cloud business card of the second user to the first terminal.
In the embodiment of the application, after the server judges whether the real-time position of the first user is within the target geographic range, if the real-time position of the first user is within the target geographic range, the user identity can be verified through the real-time position of the first user, so that a user with a real-time position meeting requirements can quickly acquire the cloud business card of the second user, and the user experience of the user acquiring the cloud business card is improved.
The following describes in detail a process of sending a cloud card shown in fig. 8 by using a specific example, as shown in fig. 9, the specific steps are as follows:
step 1: the second user starts a local area public cloud business card function in contact person software installed on the second terminal;
step 2: the second terminal responds to the opening operation of the second user and can display risk items after the popup box prompts the second user to open the local open cloud business card function;
and step 3: the second user confirms that the local area open cloud business card function is started in the bullet frame;
and 4, step 4: the second terminal responds to the confirmation of the second user to start the local area public cloud business card function, sends indication information for starting the local area public cloud business card to the server, and attaches the real-time position of the second user;
and 5: after the server receives the indication information sent by the second terminal and the attached real-time position of the second user, the server records the real-time position of the second user and records that the second user opens the local public business card function;
step 6: the server feeds back a result of successful opening of the local area open cloud card function to the second terminal;
and 7: after receiving a result of successful opening of the local area public cloud business card function sent by the server, the second terminal can display a popup box to the second user to prompt the second user that the local area public cloud business card function is successfully opened;
and 8: the server regularly acquires and updates the locally recorded real-time position of the second user;
and step 9: a first user opens a face scanning contact person adding interface in contact person software installed on a first terminal;
step 10: the method comprises the steps that a first terminal responds to the opening operation of a first user, displays a face-scanning contact person adding interface and prepares to input a face image of a second user;
step 11: adding a contact person interface on a face of a first user, and inputting a face image of a second user;
step 12: after receiving a face image of a second user input by a first user, a first terminal uploads the face image of the second user and the real-time position of the first user to a server through a network;
step 13: after receiving the face image of the second user and the real-time position of the first user, the server searches the cloud business card of the second user locally based on the face image of the second user;
step 14: the server judges whether the real-time position of the first user is within the target geographical range of the second user under the condition that the second user is determined to start the function of the local public business card;
step 15: the method comprises the steps that under the condition that the server determines that the real-time position of a first user is located in the target geographic range of a second user public cloud business card, the server directly issues the cloud business card of the second user to a first terminal of the first user;
step 16: after receiving a second user's cloud card issued by the server, the first terminal jumps to a contact card creation interface, and imports cloud card information in the second user's cloud card issued by the server in the contact card creation interface;
and step 17: the method comprises the steps that a first user creates an interface on a contact card displayed by a first terminal, and selects and confirms to store cloud business card information of a second user as the contact card;
step 18: and the first terminal responds to the storage operation of the first user, stores the cloud business card information of the second user as a contact card of the second user, and displays details of the contact card to the first user.
Fig. 10 is a block diagram showing a configuration of a transmitting apparatus of a cloud card in one embodiment. The sending device of the cloud business card of the present application may be disposed in a server, such as the server 103 in fig. 1.
As shown in fig. 10, the cloud card transmitting apparatus 1000 may include a request receiving module 1010, a card querying module 1020, a type determining module 1030, and a first transmitting module 1040.
The request receiving module 1010 may be configured to receive a cloud card request sent by a first terminal used by a first user, where the cloud card request carries a face image of a second user.
The business card query module 1020 may be configured to query a cloud business card of the second user based on the face image of the second user.
The type determination module 1030 may be used to determine a cloud card type of the cloud card of the second user.
The first sending module 1040 may be configured to send the cloud card of the second user to the first terminal when the cloud card type of the second user is a public type.
In the embodiment of the application, after a cloud business card request sent by a first terminal used by a first user is received, a cloud business card of the second user is inquired based on a face image of the second user carried in the cloud business card request, the type of the inquired cloud business card of the second user is determined, and then the cloud business card of the second user is sent to the first terminal under the condition that the type of the cloud business card is a public type.
In some embodiments of the present application, the cloud card sending apparatus 1000 may further include a request sending module, a result receiving module, and a second sending module.
The request sending module may be configured to send, after determining the cloud card type of the cloud card of the second user, a verification request to a second terminal used by the second user when the cloud card type is a verification type, where the verification request is used to enable the second terminal to feed back a verification result of the second user.
The result receiving module may be configured to receive a verification result fed back by the second terminal.
The second sending module may be configured to send the cloud business card of the second user to the first terminal when the verification result is that the verification is passed.
In some embodiments of the present application, the cloud card request may also carry a user identifier of the first user.
The device 1000 for sending the cloud card may further include an information query module, and the information query module may be configured to query the user information of the first user based on the user identifier of the first user before sending the verification request to the second terminal used by the second user.
The authentication request may carry user information of the first user.
In some embodiments of the present application, the cloud card request may also carry a user identifier of the first user.
The cloud card sending device 1000 may further include an information tagging module, and the information tagging module may be configured to determine, based on the user identifier of the first user, a user type of the first user tagged by the second user before determining the cloud card type of the cloud card of the second user.
The type determining module 1030 may be specifically configured to determine the cloud card type of the cloud card of the second user when the user type is the unmarked user.
In some embodiments of the present application, the cloud card sending apparatus 1000 may further include a third sending module and a sending prohibition module.
The third sending module may be configured to, after determining that the second user is the user type marked by the first user, send the cloud business card of the second user to the first terminal when the user type is a white list user.
The sending prohibition module may be configured to prohibit sending the cloud card of the second user to the first terminal when the user type is the blacklist user after determining that the second user is the user type marked by the first user.
In some embodiments of the present application, the cloud card request may also carry a real-time location of the first user.
The device 1000 for sending a cloud card may further include a position determination module, where the position determination module may be configured to determine whether the real-time position of the first user is within a target geographic range before determining the cloud card type of the cloud card of the second user, where the target geographic range is determined according to the real-time position of the second user.
The type determining module 1030 may be specifically configured to determine the cloud card type of the cloud card of the second user if the real-time location of the first user is not within the target geographic range.
In some embodiments of the present application, the device 1000 for sending a cloud card may further include a fourth sending module, and the fourth sending module may be configured to send the cloud card of the second user to the first terminal if the real-time location of the first user is within the target geographic range after determining whether the real-time location of the first user is within the target geographic range.
It should be noted that the sending apparatus of the cloud business card shown in fig. 10 may execute each step of the method embodiments shown in fig. 1 to 9, and implement each process and effect of the method embodiments shown in fig. 1 to 9, which are not described herein again.
For specific limitations of the sending device of the cloud business card, reference may be made to the above limitations on the sending method of the cloud business card, and details are not repeated here. All or part of the modules in the sending device of the cloud business card can be realized through software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The application also provides a computer device, which can be a server, and the internal structure diagram of the computer device can be shown in fig. 11. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing cloud business card data of the user. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of transmitting a cloud card.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the sending apparatus of the cloud business card provided by the present application may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in fig. 11. The memory of the computer device may store various program modules constituting the transmitting apparatus of the cloud business card, such as a request receiving module, a business card querying module, a type determining module, and a first transmitting module shown in fig. 10. The computer program constituted by the respective program modules causes the processor to execute the steps in the cloud business card transmission method according to the respective embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 11 may execute step S201, the business card query module executes step S202, the type determination module executes step S203, and the first sending module executes step S204 through the request receiving module in the sending apparatus of the cloud business card shown in fig. 10.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user; inquiring a cloud business card of a second user based on the face image of the second user; determining a cloud card type of a cloud card of a second user; and under the condition that the type of the second user cloud business card is the public type, the second user cloud business card is sent to the first terminal.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware instructions of a computer program, which may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM is available in many forms, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), and the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, and these are all within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for sending a cloud business card is characterized by comprising the following steps:
receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user;
inquiring a cloud card of the second user based on the face image;
determining the cloud business card type of the cloud business card of the second user;
and under the condition that the type of the cloud business card is a public type, sending the cloud business card of the second user to the first terminal.
2. The method of claim 1, wherein after said determining the cloud card type of the cloud card of the second user, the method further comprises:
sending a verification request to a second terminal used by the second user under the condition that the type of the cloud business card is a verification type, wherein the verification request is used for enabling the second terminal to feed back a verification result of the second user;
receiving the verification result fed back by the second terminal;
and sending the cloud business card of the second user to the first terminal under the condition that the verification result is that the verification is passed.
3. The method of claim 2, wherein the cloud card request further carries a user identification of the first user;
wherein, prior to said sending a verification request to a second terminal used by said second user, said method further comprises:
inquiring user information of the first user based on the user identification of the first user; wherein the authentication request carries user information of the first user.
4. The method of claim 1, wherein the cloud card request further carries a user identification of the first user;
wherein, prior to the determining the cloud card type of the cloud card of the second user, the method further comprises:
determining a user type of the first user marked by the second user based on the user identification of the first user;
wherein the determining the cloud card type of the cloud card of the second user comprises:
and under the condition that the user type is the unmarked user, determining the cloud business card type of the cloud business card of the second user.
5. The method of claim 4, wherein after the determining the user type that the second user tagged for the first user, the method further comprises:
under the condition that the user type is a blacklist user, the cloud business card of the second user is forbidden to be sent to the first terminal;
and under the condition that the user type is a white list user, sending the cloud business card of the second user to the first terminal.
6. The method of claim 1, wherein the cloud card request further carries a real-time location of the first user;
wherein, prior to the determining the cloud card type of the cloud card of the second user, the method further comprises:
judging whether the real-time position of the first user is within a target geographical range, wherein the target geographical range is determined according to the real-time position of the second user;
wherein the determining the cloud card type of the cloud card of the second user comprises:
and if the real-time position of the first user is not within the target geographic range, determining the cloud business card type of the cloud business card of the second user.
7. The method of claim 6, wherein after said determining whether the real-time location of the first user is within a target geographic range, the method further comprises:
and if the real-time position of the first user is within the target geographic range, the cloud business card of the second user is sent to the first terminal.
8. A sending device of a cloud business card is characterized in that the device comprises:
the request receiving module is used for receiving a cloud business card request sent by a first terminal used by a first user, wherein the cloud business card request carries a face image of a second user;
the business card query module is used for querying the cloud business card of the second user based on the face image;
the type determining module is used for determining the cloud business card type of the cloud business card of the second user;
and the first sending module is used for sending the cloud business card of the second user to the first terminal under the condition that the type of the cloud business card is the public type.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210314301.6A 2022-03-28 2022-03-28 Method and device for sending cloud business card, computer equipment and storage medium Pending CN114745711A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210314301.6A CN114745711A (en) 2022-03-28 2022-03-28 Method and device for sending cloud business card, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210314301.6A CN114745711A (en) 2022-03-28 2022-03-28 Method and device for sending cloud business card, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114745711A true CN114745711A (en) 2022-07-12

Family

ID=82278128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210314301.6A Pending CN114745711A (en) 2022-03-28 2022-03-28 Method and device for sending cloud business card, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114745711A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104853325A (en) * 2015-05-29 2015-08-19 小米科技有限责任公司 Method and device for sending cloud business card
US20150254578A1 (en) * 2014-03-05 2015-09-10 Ikjoo CHI Cloud server for providing business card page and method for providing business card page on the cloud server
CN105100199A (en) * 2015-05-29 2015-11-25 小米科技有限责任公司 Method and device for transmitting cloud card
WO2016026432A1 (en) * 2014-08-21 2016-02-25 北京橙鑫数据科技有限公司 Business card information query method and cloud server
CN105468767A (en) * 2015-12-04 2016-04-06 小米科技有限责任公司 Method and device for acquiring calling card information
WO2018227785A1 (en) * 2017-06-16 2018-12-20 华为技术有限公司 Method for updating business card of contact and terminal
CN109361730A (en) * 2018-08-31 2019-02-19 杭州简简科技有限公司 Card information acquisition methods, system and Cloud Server based on face

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150254578A1 (en) * 2014-03-05 2015-09-10 Ikjoo CHI Cloud server for providing business card page and method for providing business card page on the cloud server
WO2016026432A1 (en) * 2014-08-21 2016-02-25 北京橙鑫数据科技有限公司 Business card information query method and cloud server
CN104853325A (en) * 2015-05-29 2015-08-19 小米科技有限责任公司 Method and device for sending cloud business card
CN105100199A (en) * 2015-05-29 2015-11-25 小米科技有限责任公司 Method and device for transmitting cloud card
CN105468767A (en) * 2015-12-04 2016-04-06 小米科技有限责任公司 Method and device for acquiring calling card information
WO2018227785A1 (en) * 2017-06-16 2018-12-20 华为技术有限公司 Method for updating business card of contact and terminal
CN109361730A (en) * 2018-08-31 2019-02-19 杭州简简科技有限公司 Card information acquisition methods, system and Cloud Server based on face

Similar Documents

Publication Publication Date Title
US9544286B2 (en) Methods and systems for increasing the security of electronic messages
CN107103245B (en) File authority management method and device
US8661558B2 (en) Methods and systems for increasing the security of electronic messages
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
TWI612792B (en) Account login method and device
US11487860B2 (en) Biometric authentication method, system, and computer program
AU2018323233A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
US20200065460A1 (en) Method and computer readable storage medium for remote interview signature
CN105553919A (en) Identity authentication method and apparatus
US10924479B2 (en) System and methods to establish user profile using multiple channels
CN109831441B (en) Identity authentication method, system and related components
CN108900536B (en) Authentication method, authentication device, computer equipment and storage medium
CN110086799B (en) Identity verification method and device
US20220058278A1 (en) Using machine learning to bypass activities of a secure document workflow based on recipient profile
CN105790948A (en) Identity authentication method and identity authentication device
CN105630855A (en) File sharing method, file sharing system and terminal
CN114268461A (en) User identity authentication method, device, server, terminal and storage medium
CN111400684B (en) Electronic license information acquisition method, system, device, equipment and storage medium
CN111581624B (en) Intelligent terminal user identity authentication method
CN107786566A (en) Method for protecting privacy, system, server and receiving terminal
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
US11163862B2 (en) Authentication of users based on snapshots thereof taken in corresponding acquisition conditions
CN114745711A (en) Method and device for sending cloud business card, computer equipment and storage medium
CN114999488A (en) Voice recognition method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination