This application is based upon and claims priority to Chinese Patent Application No. 201511001356.8, filed on Dec. 28, 2015, the entire contents of which are incorporated herein by reference.
The present disclosure generally relates to communication technologies, and more particularly, to a method, device and computer-readable medium for acquiring user information.
In modern society, changes in economics and society environments make it increasingly important for people to interact with others. Only through continuous interaction and communication with others, can a person constantly enrich his experience. Therefore, it is desirable for a person to continuously expand his contacts and connections.
In related art, when a user A wishes to obtain user information of user B, user A may need to first obtain relevant information (e.g., a name) of user B. Then, user A can acquire other additional information of user B through a network or other channels (e.g., by asking acquaintances about user B) using such relevant information of the user B.
According to a first aspect of the present disclosure, there is provided a method for acquiring user information. The method includes obtaining headshot information of a target user. The method also includes acquiring user information of the target user based on the headshot information of the target user and a predefined set of acquisition policies. The predefined set of acquisition policies includes at least one acquisition policy, and each of the acquisition policies indicates a respective approach to acquiring the user information of the target user.
According to a second aspect of the present disclosure, there is provided a device for acquiring user information. The device is a first terminal device and includes a processor and a memory for storing instructions executable by the processor. The processor is configured to execute the instructions to obtain headshot information of a target user. The processor is also configured to execute the instructions to acquire user information of the target user based on the headshot information of the target user and a predefined set of acquisition policies. The predefined set of acquisition policies includes at least one acquisition policy, and each of the acquisition policies indicates a respective approach to acquiring user information of the target user.
It is to be understood that both the forgoing general description and the following detailed description are exemplary only, and are not restrictive of the present disclosure.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and, together with the description, serve to explain the principles of the invention.
With reference to the above drawings, specific embodiments of the present disclosure have been illustrated, which will be described below in more details. Those drawings and literature descriptions are not intended to limit the scope of the invention in any way, but are only intended to illustrate concepts of the disclosure.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which same numbers in different drawings represent same or similar elements unless otherwise described. The implementations set forth in the following description of exemplary embodiments do not represent all implementations consistent with the invention. Instead, they are merely examples of devices and methods consistent with aspects related to the invention as recited in the appended claims.
In step S101, headshot information of a target user is obtained.
In this step, optionally, when user A (shown in
Referring back to
In this step, because the headshot information of the target user uniquely identifies the target user, after obtaining the headshot information of the target user, the terminal device acquires the user information of the target user based on the headshot information of the target user and a predefined set of acquisition policies. The predefined set of acquisition policies includes at least one acquisition policy. Each of the acquisition policies indicates a respective approach to acquiring user information of the target user (e.g., approaches to acquiring user information of the target user based on the headshot information of the target user). In some embodiments, as shown in
In some embodiments, as shown in
A method of acquiring user information is provided in the present embodiment. With the steps of obtaining the headshot information of a target user, and acquiring the user information of the target user based on the headshot information of the target user and a predefined set of acquisition policies, the user information of the target user can be accurately acquired, thereby improving the user experience.
In step S201, the headshot information of the target user is transmitted to a server to instruct the server to inquire, based on the headshot information of the target user, whether the server includes the user information of the target user.
In some embodiments, the user information includes headshot information and profile information of the target user.
In some embodiments, the server stores the user information of at least one user (e.g., information that is allowed by the user to disclose to others). The stored user information includes headshot information of the user, profile information of the user, and the like. In this step, after the terminal device is operated to run headshot information based user recognition software, the headshot information of the target user obtained in step S101 may be transmitted to the server. For example, as shown in
Referring to
Referring to
In some embodiments, if the terminal device does not acquire user information of the target user from the server, the terminal device may further seek to acquire user information of the target user by broadcasting the headshot information of the target user within a predefined range. For example, as shown in
Referring to
In some embodiments, a target terminal device corresponding to the target user is located within the predefined range.
In this step, the terminal device broadcasts the headshot information of the target user within the predefined range (for ease of description, this broadcasting terminal device is referred to as “first terminal device” hereinafter). Optionally, the headshot information based user recognition software includes a broadcast function. In some embodiments, the headshot information of the target user obtained in step S101 may be broadcasted via Bluetooth®, WiFi®, etc. A terminal device capable of receiving the headshot information of the target user within the predefined range (for ease of description, this receiving terminal device is referred to as “second terminal device” hereinafter) may determine whether the second terminal device is the target terminal device corresponding to the target user based on the headshot information of the target user and headshot information stored in the second terminal device. The stored headshot information may uniquely identify a user having the second terminal device. For example, in some embodiments, the second terminal device determines whether the headshot information of the target user and headshot information stored in the second terminal device identify the same user. If the headshot information of the target user and headshot information stored in the second terminal device identify the same user (i.e., the second terminal device is the target terminal device), a third response message containing the user information locally stored in the target terminal device (e.g., the user information of the target user) is transmitted to the first terminal device. Correspondingly, the first terminal device performs step S205 (discussed below).
In some embodiments, the second terminal device may be preconfigured to be allowed to respond to other terminal devices with user information of a user of the second terminal device (e.g., a user having the second terminal device). For example, in some embodiments, when the first terminal device transmits to the second terminal device headshot information of the user of the second terminal device, the second terminal device automatically returns to the first terminal device a response message containing the user information of the user of the second terminal device. In an alternative embodiment, before the second terminal device transmits the third response message to the first terminal device, the second terminal device informs its user of the following: a request transmitted from the first terminal device requests to acquire the user information of the user, is it allowable to transmit the user information to the first terminal device? If the user allows the second terminal device to transmit the user information to the first terminal device, the second terminal device transmits the third response message to the first terminal device. If the user refuses or declines to transmit the user information to the first terminal device, the second terminal device transmits to the first terminal device a fourth response message, which indicates that the user of the second terminal device (i.e., the target device) declines to transmit the user information to the first terminal device.
In some embodiments, if the headshot information of the target user and the headshot information stored in the second terminal device identify two different users (i.e., the second terminal device is not the target terminal device), the second terminal device does not transmit any response message to the first terminal device.
Referring to
In some embodiments, if the user information of the target user acquired by the first terminal device from the server does not have sufficient information content, the first terminal device further broadcasts the headshot information of the target user within a predefined range so as to acquire additional user information of the target user. The details about the broadcasting have been described above with respect to step S204, which are not repeated.
In some embodiments, the headshot information of the target user obtained in step S101 is encrypted to generate the encrypted headshot information of the target user. In step S201, encrypted headshot information of the target user is transmitted to the server, such that the server inquires whether the server includes the user information of the target user in accordance with decrypted headshot information. Optionally, in step S204, the encrypted headshot information of the target user is broadcasted within the predefined range.
Methods of acquiring user information are provided in the present disclosure. By combining a method of acquiring the user information of the target user from the server and a method of broadcasting the headshot information of the target user so as to acquire the user information of the target user, the user information of the target user can be accurately acquired, thereby improving the user experience.
In step S301, the headshot information of the target user is broadcasted within a predefined range.
In some embodiments, a target terminal device corresponding to the target user is located within the predefined range.
In this step, the terminal device (i.e., “first terminal device”) broadcasts the headshot information of the target user within the predefined range. For example, as shown in
In some embodiments, the second terminal device is preconfigured to be allowed to respond to other terminal devices with the user information of the user of the second terminal device. For example, when the first terminal device transmits to the second terminal device headshot information of the user of the second terminal device, the second terminal device automatically returns, to the first terminal device, a response message containing user information of the user of the second terminal device. In an alternative embodiment, before the second terminal device transmits the third response message to the first terminal device, the second terminal device informs its user of the following: a request transmitted from the first terminal device requests to acquire the user information of the user, is it allowable to transmit the user information to the first terminal device? If the user allows the second terminal device to transmit the user information to the first terminal device, the second terminal device transmits the third response message to the first terminal device. If the user declines to transmit user information to the first terminal device, the second terminal device transmits to the first terminal device a fourth response message, which indicates that the user of the second terminal device (i.e., the target device) declines to transmit the user information to the first terminal device. Correspondingly, the terminal device performs step S303 (discussed below).
Referring to
In step S303, the fourth response message returned from the target terminal device is received. The fourth response message indicates that the target user declines to transmit the user information of the target user.
In some embodiments, after the terminal device does not acquire user information of the target user by broadcasting the headshot information of the target user, the terminal device further seeks to acquire the user information of the target user from a server. As shown in
Referring to
In some embodiments, the user information includes headshot information and profile information of the target user.
In some embodiments, the server stores the user information of at least one user (e.g., information that is permitted by the user to be disclosed to others). The stored user information may include headshot information of the user, profile information of the user, and the like. In this step, after the terminal device is operated to run headshot information based user recognition software, by transmitting the headshot information of the target user obtained in step S101 to the server, the server is enabled to inquire, based on the headshot information of the target user, whether the server includes the user information of the target user. If the server has stored the user information of the target user, the server transmits a first response message containing the user information of the target user. Correspondingly, the terminal device performs step S305 (discussed below). If the server has not stored the user information of the target user, the server transmits a second response message indicating that the server does not include the user information of the target user.
Referring to
In some embodiments, the headshot information of the target user obtained in step S101 is encrypted to generate the encrypted headshot information of the target user. In step S301, encrypted headshot information of the target user is broadcasted within the predefined range. Optionally, in step S304, the encrypted headshot information of the target user is transmitted to the server, such that the server inquires whether the server includes the user information of the target user based on decrypted headshot information.
Methods of acquiring user information are provided in the present disclosure. By combining a method of broadcasting the headshot information of the target user so as to acquire the user information of the target user and a method of acquiring the user information of the target user from the server, the user information of the target user is accurately acquired, thereby improving the user experience.
In step S401, the server receives headshot information of a target user transmitted by a first terminal device.
In step S402, based on the headshot information of the target user, the server inquires whether the server includes user information of the target user.
In some embodiments, the user information includes headshot information and profile information of the target user.
In step S403, if the server includes the user information of the target user, the server transmits a first response message to the first terminal device. The first response message contains the user information of the target user.
In some embodiments, the server stores the user information of at least one user (e.g., information that is allowed by the user to disclose to others). The stored user information includes headshot information of the user, profile information of the user, and the like. In step S401, the server receives the headshot information of the target user transmitted by the terminal device after the terminal device has been operated to run headshot information based user recognition software. Optionally, the headshot information of the target user received by the server is encrypted headshot information of the target user. In some embodiments, before step S401, the method further includes: acquiring and saving user information of at least one user, such that the server matches the received headshot information of the target user transmitted from any terminal device with the locally stored headshot information of users. In some embodiments, the server is a cloud server.
In step S402, based on the headshot information of the target user, the server inquires whether the server includes user information of the target user. Optionally, the server determines whether the server includes the user information of the target user by comparing the headshot information of the target user with the headshot information of at least one other user stored in the server. If both the headshot information of the target user and the headshot information of user A stored in the server identify the same user (i.e., the user A is the target user, which means the server contains the user information of the target user), the server transmits a first response message to the first terminal device, which includes the user information of the target user stored in the server (i.e., step S403). If the headshot information of the target user and the headshot information of user A stored in the server identify different users (i.e., the server does not contain the user information of the target user), the sever transmits a second response message to the first terminal device. The second response message indicates that the server does not include the user information of the target user.
In some embodiments, if the headshot information received by the server is encrypted headshot information, correspondingly, before step S402, the method further includes: decrypting the received encrypted headshot information of the target user to generate decrypted headshot information of the target user. Accordingly, step S402 includes: inquiring, based on the decrypted headshot information of the target user, whether the server includes the user information of the target user.
A method of acquiring user information is provided in the present disclosure. With the steps of receiving headshot information of a target user transmitted by a first terminal device, inquiring, based on the headshot information of the target user, whether the server includes the user information of the target user, and transmitting a first response message to the first terminal device, if the server includes the user information of the target user, the first terminal device is capable of accurately acquiring the user information of the target user, thereby improving the user experience.
In step S501, a second terminal device receives headshot information of a target user broadcasted by a first terminal device.
In step S502, based on the headshot information of the target user and headshot information stored in the second terminal device, the second terminal device determines whether the second terminal device is a target terminal device corresponding to the target user.
In step S503, if the second terminal device is the target terminal device, the second terminal device transmits a third response message to the first terminal device.
In some embodiments, the third response message contains the user information locally stored in the target terminal device, and the user information includes headshot information and profile information of the target user.
In some embodiments, in step S501, a second terminal device receives headshot information of a target user broadcasted by a first terminal device after the first terminal device has been operated to run headshot information based user recognition software. Optionally, the first terminal device may broadcast the headshot information of the target user within a predefined range via Bluetooth®, WiFi®, etc. Accordingly, the second terminal may receive the headshot information of the target user in a corresponding manner (i.e., in the same manner as that used for broadcasting by the first terminal device). Optionally, if the headshot information based user recognition software in the second terminal device has not been started when the second terminal device receives headshot information of a target user broadcasted by another terminal device (e.g., the first terminal device), the headshot information based user recognition software may be automatically started in the second terminal device, in order to determine whether the second terminal device is the target terminal device. Optionally, the headshot information of the target user received by the second terminal device is headshot information that has been encrypted by the first terminal device.
In step S502, determining whether the second terminal device is the target terminal device corresponding to the target user includes determining whether both the headshot information of the target user and the headshot information stored in the second terminal device identify the same user. If the headshot information of the target user and the headshot information stored in the second terminal device identify the same user (i.e., the second terminal device is the target terminal device), a third response message containing the user information locally stored in the target terminal device (i.e., the user information of the target user) is transmitted to the first terminal device (i.e., step S503).
In some embodiments, the second terminal device is preconfigured to be allowed to respond to other terminal devices with user information of a user of the second terminal device. For example, when the first terminal device transmits to the second terminal device headshot information of the user of the second terminal device, the second terminal device automatically returns, to the first terminal device, a response message containing user information of the user of the second terminal device. In an alternative embodiment, before the second terminal device transmits the third response message to the first terminal device, the second terminal device informs its user (i.e., the target user) of the following (as shown in
In some embodiments, if the headshot information of the target user and the headshot information stored in the second terminal device identify two different users respectively (i.e., the second terminal device is not the target terminal device), the second terminal device does not transmit a response message to the first terminal device.
In some embodiments, if the headshot information received by the second terminal device is encrypted headshot information, correspondingly, before step S502, the method further includes: decrypting the received encrypted headshot information of the target user to generate decrypted headshot information of the target user. Accordingly, step S502 includes: determining whether a second terminal device is a target terminal device corresponding to the target user based on the decrypted headshot information of the target user and headshot information stored in the second terminal device.
A method of acquiring user information is provided in the present disclosure. With the steps of receiving headshot information of a target user broadcasted by a first terminal device, determining whether a second terminal device is a target terminal device corresponding to the target user based on the headshot information of the target user and headshot information stored in the second terminal device, and transmitting a third response message to the first terminal device if the second terminal device is the target terminal device, the first terminal device is capable of accurately acquiring the user information of the target user, thereby improving the user experience.
A user information acquisition device is provided in the present disclosure. By the first obtaining module 601 obtaining headshot information of a target user, and the second acquisition module 602 acquiring user information of the target user based on the headshot information obtained by the first obtaining module 601 and a predefined set of acquisition policies, the user information of the target user can be accurately acquired, thereby improving the user experience.
On the basis of the embodiment shown in
In some embodiments, the second acquisition module 602 further includes: a second reception sub-module 6023 configured to receive a second response message returned from the server. The second response message indicates that the server does not include the user information of the target user. The second acquisition module 602 also includes a first broadcasting sub-module 6024 configured to broadcast the headshot information obtained by the first obtaining module 601 within a predefined range in which a target terminal device corresponding to the target user is located. The second acquisition module 602 further includes a third reception sub-module 6025 configured to receive a third response message returned from the target terminal device. The third response message contains the user information locally stored in the target terminal device.
A user information acquisition device is provided in the present disclosure. By combining a method of acquiring the user information of the target user with a method of acquiring the user information of the target user by broadcasting the headshot information of the target user, the second acquisition module 602 accurately acquires the user information of the target user, thereby improving the user experience.
On the basis of the embodiment shown in
In some embodiments, the second acquisition module 602 further includes: a fifth reception sub-module 6028 configured to receive a fourth response message returned from the target terminal device. The fourth response message indicates that the target user declines to transmit the user information of the target user. The second acquisition module 602 also includes a second transmission sub-module 6029 configured to transmit the headshot information obtained by the first obtaining module 601 to a server to instruct the server to inquire, based on the headshot information of the target user, whether the server includes the user information of the target user. The user information includes headshot information and profile information of the target user. The second acquisition module 602 further includes a sixth reception sub-module 60210 configured to receive a first response message returned from the server. The first response message contains the user information of the target user.
A user information acquisition device is provided in the present disclosure. By combining a method of acquiring the user information of the target user by broadcasting the headshot information of the target user in combination with a method of acquiring the user information of the target user, the second acquisition module 602 accurately acquires the user information of the target user, thereby improving the user experience.
Any of the user information acquisition devices provided in the above embodiments may be used to implement the technical solutions of the methods shown in
The above descriptions illustrate internal functional modules and schematic structures of devices for acquiring user information. Each of these devices can be implemented in or as a terminal device (optionally, the terminal device may be the first terminal device).
In the above embodiments of the terminal device, the processor (e.g., processor 905) may be a Central Processing Unit (CPU), or other general-purpose processor, Digital Signal Processing (DSP), Application Specific Integrated Circuit (ASIC), or the like. The general-purpose processor may be microprocessor or the processor may be another common processor. The memory (e.g., memory 910) may be a read-only memory (ROM), random access memory (RAM), flash memory, hard disk or solid-state disk. A SIM card is also known as Subscriber Identity Module or smart card, and a digital mobile phone may be provided with such a SIM card. In some embodiments, the following contents may be stored in a computer chip (e.g., a memory or a SIM card): information of the owner of the digital mobile phone, encryption key(s), telephone book, etc. The steps of the disclosed methods may be performed by a hardware processor (e.g., processor 905), or may be performed by a combination of hardware and software modules in the processor (e.g., processor 905).
The processing component 1002 is configured to control overall operations of the terminal device 1000, such as operations associated with display and/or data communications, multimedia operations, and recording operations. The processing component 1002 includes one or more processors 1020 configured to execute instructions to perform all or part of the above-described methods. Moreover, the processing component 1002 includes one or more modules configured to facilitate the interaction between the processing component 1002 and other components. In some embodiments, the processing component 1002 includes a multimedia module to facilitate the interaction between the multimedia component 1008 and the processing component 1002.
The memory 1004 is configured to store various types of data to support the operation of the terminal device 1000. Examples of such data include instructions, various data, messages, pictures, video, etc., for applications or methods operated on the terminal device 1000. The memory 1004 is implemented using any type of volatile or non-volatile memory devices, or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read-only memory (EEPROM), an erasable programmable read-only memory (EPROM), a programmable read-only memory (PROM), a read-only memory (ROM), a magnetic memory, a flash memory, a magnetic, or an optical disk.
The power component 1006 is configured to provide power to various components of the terminal device 1000. The power component 1006 may include a power management system, one or more power sources, and any other components associated with the generation, management, and distribution of power in the terminal device 1000.
The multimedia component 1008 includes a screen providing an output interface between the terminal device 1000 and the user. In some embodiments, the screen may include a liquid crystal display and a touch panel. If the screen includes the touch panel, the screen may be implemented as a touch screen to receive input signals from the user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensors may not only sense a boundary of a touch or swipe action, but also sense a period of time and a pressure associated with the touch or swipe action.
The audio component 1010 is configured to output and/or input audio signals. For example, in some embodiments, the audio component 1010 includes a microphone configured to receive an external audio signal when the terminal device 1000 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may be further stored in the memory 1004 or transmitted via the communication component 1016. In some embodiments, the audio component 1010 further includes a speaker configured to output audio signals.
The I/O interface 1012 is configured to provide an interface between the processing component 1002 and peripheral interface modules, such as a keyboard, a click wheel, buttons, and the like.
The sensor component 1014 includes one or more sensors configured to provide status assessments of various aspects of the terminal device 1000. For example, in some embodiments, the sensor component 1014 detects an open/closed status of the terminal device 1000, relative positioning of components, e.g., the display and the keypad, of the terminal device 1000, a change in position of the terminal device 1000 or a component of the terminal device 1000, a presence or absence of user contact with the terminal device 1000, an orientation or an acceleration/deceleration of the terminal device 1000, and a change in temperature of the terminal device 1000. The sensor component 1014 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor component 1014 may include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor component 1014 may also include an accelerometer sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1016 is configured to facilitate communication, wired or wirelessly, between the terminal device 1000 and other devices. The terminal device 1000 can access a wireless network based on a communication standard, such as WiFi, 2G, 3G, 4G, or a combination thereof. In one embodiment, the communication component 1016 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel In one embodiment, the communication component 1016 further includes a near field communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on a radio frequency identification (RFID) technology, an infrared data association (IrDA) technology, an ultra-wideband (UWB) technology, a Bluetooth (BT) technology, and other technologies.
In some embodiments, the terminal device 1000 is implemented with one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components, for performing the above described methods.
In some embodiments, there is also provided a non-transitory computer-readable storage medium including instructions, such as included in the memory 1004, executable by the processor 1020 in the terminal device 1000, for performing the above-described methods. For example, the non-transitory computer-readable storage medium may include a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disc, an optical data storage device, and the like.
There is provided a non-transitory computer-readable storage medium including instructions that, when executed by the processing component within the user information acquisition device, cause the user information acquisition device to perform a method for acquiring user information. The method includes: obtaining headshot information of a target user; and acquiring user information of the target user based on the headshot information of the target user and a predefined set of acquisition policies. The predefined set of acquisition policies includes at least one acquisition policy. Each of the acquisition policies indicates a respective approach to acquiring user information of the target user.
In some embodiments, acquiring the user information of the target user includes: transmitting the headshot information of the target user to a server to instruct the server to inquire, based on the headshot information of the target user, whether the server includes the user information of the target user. The user information includes headshot information and profile information of the target user. Acquiring the user information of the target user also includes receiving a first response message returned from the server. The first response message contains the user information of the target user.
In some embodiments, after transmitting the headshot information of the target user to the server, the method includes: receiving a second response message returned from the server. The second response message indicates that the server does not include the user information of the target user. The method also includes broadcasting the headshot information of the target user within a predefined range in which a target terminal device corresponding to the target user is located. The method further includes receiving a third response message returned from the target terminal device. The third response message contains the user information locally stored in the target terminal device.
In some embodiments, acquiring the user information of the target user includes: broadcasting the headshot information of the target user within a predefined range in which a target terminal device corresponding to the target user is located; and receiving a third response message returned from the target terminal device. The third response message contains the user information locally stored in the target terminal device.
In some embodiments, after broadcasting the headshot information of the target user within the predefined range, the method includes: receiving a fourth response message returned from the target terminal device. The fourth response message indicates that the target user declines to transmit the user information of the target user. The method also includes transmitting the headshot information of the target user to a server to instruct the server to inquire, based on the headshot information of the target user, whether the server includes the user information of the target user. The user information includes headshot information and profile information of the target user. The method also includes receiving a first response message returned from the server. The first response message contains the user information of the target user.
In the user information acquisition device 110, the reception module 1101 receives headshot information of a target user transmitted by a first terminal device. Based on the headshot information received by the reception module 1101, the inquiry module 1102 inquires whether a server includes the user information of the target user. If the inquiry module 1102 determines that the server includes the user information of the target user, the first transmission module 1103 transmits to the first terminal device a first response message containing the user information of the target user. Accordingly, the first terminal device acquires accurate user information of the target user. As a result, the user experience is improved.
On the basis of the above embodiment shown in
In some embodiments, the device 110 includes an acquisition module 1105 configured to acquire and save the user information of at least one user.
Any of the user information acquisition devices provided in the above embodiments may be used to implement the technical solution of the method shown in
The above descriptions illustrate internal functional modules and schematic structures of devices for acquiring user information. The devices may be implemented in or as a server.
In the above embodiment of the server 1300, the processor 1310 may be a Central Processing Unit (CPU), or other general-purpose processors, Digital Signal Processing (DSP), Application Specific Integrated Circuit (ASIC), or the like. The general-purpose processor may be microprocessor or the processor may be other common processor, etc. The memory 1305 may be read-only memory (ROM), random access memory (RAM), flash memory, hard disk, or solid-state disk. The steps of the disclosed methods may be performed by a hardware processor (e.g., 1310), or may be performed by a combination of hardware and software modules in the processor 1310.
The device 1400 also includes a power component 1426 configured to perform power supply management of server 1400, a wired or wireless network interfaces 1450 configured to connect the server 1400 to the network, and an input/output interface 1458. The server 1400 may operate with an operating system (such as Windows Server™, Mac OS X™, Unix™, Linux™, FreeBSD™, or the like) stored in the memory 1432.
In the user information acquisition device 150, the reception module 1501 receives headshot information of a target user broadcasted by a first terminal device. The determination module 1502 determines whether a second terminal device is a target terminal device corresponding to the target user based on the headshot information received by the reception module 1501 and headshot information stored in the second terminal device. If the determination module 1502 determines that the second terminal device is the target terminal device, the first transmission module 1503 transmits a third response message to the first terminal device. The third response message contains the user information locally stored in the target terminal device. Accordingly, the first terminal device can acquire accurate user information of the target user, thereby improving the user experience.
On the basis of the above embodiment shown in
Any of the user information acquisition devices provided in the above embodiments may be used to implement the technical solution of the method shown in
The above descriptions illustrate internal functional modules and schematic structures of devices for acquiring user information. The devices may be implemented in or as a terminal device (the terminal device may be the second terminal device).
In some embodiments, the terminal device 1700 may include components included in the embodiment shown in
In exemplary embodiments, there is also provided a non-transitory computer-readable storage medium including instructions, such as a memory containing instructions, which are executable by a processor in a terminal device for performing the above-described methods. For example, the non-transitory computer-readable storage medium may include a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disc, an optical data storage device, and the like.
There is provided a non-transitory computer-readable storage medium including instructions that, when executed by a processing component within a user information acquisition device, cause the user information acquisition device to perform a method for acquiring user information. The method includes receiving headshot information of a target user broadcasted by a first terminal device. The method also includes determining whether a second terminal device is a target terminal device corresponding to the target user, based on the headshot information of the target user and headshot information stored in the second terminal device. The method also includes transmitting a third response message to the first terminal device, if the second terminal device is the target terminal device. The third response message contains the user information locally stored in the target terminal device, and the user information includes headshot information and profile information of the target user.
In one embodiment, after determining whether the second terminal device is the target terminal device corresponding to the target user, the method further includes: transmitting a fourth response message to the first terminal device, if the second terminal device is the target terminal device and the target user declines to transmit the user information of the target user to the first terminal device. The fourth response message indicates that the target user declines to transmit the user information of the target user.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed here. This application is intended to cover any variations, uses, or adaptations of the invention following the general principles thereof and including such departures from the present disclosure as come within known or customary practice in the art. The specification and embodiments are merely considered to be exemplary and the substantive scope and spirit of the disclosure is limited only by the appended claims.
It will be appreciated that the inventive concept is not limited to the exact construction that has been described above and illustrated in the accompanying drawings, and that various modifications and changes can be made without departing from the scope thereof. It is intended that the scope of the invention only be limited by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
201511001356.8 | Dec 2015 | CN | national |