CN103095663B - Information interacting method between a kind of A non logged-on user and device - Google Patents
Information interacting method between a kind of A non logged-on user and device Download PDFInfo
- Publication number
- CN103095663B CN103095663B CN201110346510.0A CN201110346510A CN103095663B CN 103095663 B CN103095663 B CN 103095663B CN 201110346510 A CN201110346510 A CN 201110346510A CN 103095663 B CN103095663 B CN 103095663B
- Authority
- CN
- China
- Prior art keywords
- user
- network address
- information
- access request
- page
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 239000000284 extract Substances 0.000 claims abstract description 19
- 230000002452 interceptive effect Effects 0.000 claims abstract description 17
- 239000012634 fragment Substances 0.000 claims description 57
- 235000014510 cooky Nutrition 0.000 claims description 20
- 238000011068 loading method Methods 0.000 claims description 9
- 238000000605 extraction Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
This application provides the information interacting method between a kind of A non logged-on user and device, the method comprise the steps that and obtain the first network address access request that first user is submitted under non-logging status;Generate the second network address according to described first network address access request, and described second network address is sent to the second user;Described second network address includes the information of the first network address and first user;Obtain the second network address access request that the second user submits under non-logging status;Open, according to described second network address access request, the page that described second network address is corresponding, and from the second network address, extract the information of first user, when the page of front opening loads the functional unit being identified with first user information.The application provides one can make between A non logged-on user, and webpage any in website carries out the scheme of information interactive operation, the function that the information that is user-friendly to is mutual.
Description
Technical field
The application relates to the technical field that website internal information is mutual, particularly relates to the information interacting method between a kind of A non logged-on user, and, the information interactive device between a kind of A non logged-on user.
Background technology
Internet technology high speed development now, content and technology that on network, information is mutual are more and more rich and varied.As shared, reprint and comment on these information interactive functions, it is the daily functions commonly used of people, and also provides a lot of facilities to people, enrich the network life.
Network information interactive function has application now substantially on each website.As having comment hurdle below the news hole of number of site, some articles also have, with report, the link directly reprinted with share.User can apply these information interactive functions after logging in this website.The good friend of the user in the most same website, it is possible to learn its active situation in website from the application of user, such as user's evaluation to certain article, the news etc. that user likes.
But wanting the mutual function of application message have to have the webpage of such function, such as some picture and do not have the mutual function of information by this webpage in conventional web sites, user can not reprint and be shared with good friend, can not comment on;And user also first to register, then log in this website, just can use the function that information is shared alternately and commented on.Because existing technology is all based on user's Website login, it is verified by rear at website service end, the operation interface that information is mutual could be shown, carry out the Authorized operation of correspondence.User without logging into, just cannot share easily, more cannot obtain by participator's comment to this.
Such as, user USER1, when Website login, utilizes corresponding sharing function to be broadcast to USER2.USER2 must carry out the comment operation to this when Website login.And if if this webpage do not have correspondence share and comment on module, that is just in spite of login user, all cannot apply such function.Each website will registering and logging, be inconvenient for a user.But also need mutual content page to have information interactive component, otherwise step on without logging into all information cannot be carried out at webpage itself mutual.
Therefore, a technical problem that those skilled in the art urgently solve is presently required exactly: provide one can make between A non logged-on user, webpage (even self not having the webpage of information interactive component) any in website is carried out the scheme of information interactive operation, the function that the information that is user-friendly to is mutual.
Summary of the invention
The purpose of the application is, it is provided that the information interacting method between a kind of A non logged-on user, to realize between A non logged-on user, webpage any in website carries out information interactive operation, thus the function that the information that is user-friendly to is mutual.
Present invention also provides the device that the information between a kind of A non logged-on user is mutual, in order to ensure said method application in practice and realization.
In order to solve the problems referred to above, the embodiment of the present application discloses the information interacting method between a kind of A non logged-on user, including:
Obtain the first network address access request that first user is submitted under non-logging status;
Generate the second network address according to described first network address access request, and described second network address is sent to the second user;Described second network address includes the information of the first network address and first user;
Obtain the second network address access request that the second user submits under non-logging status;
Open, according to described second network address access request, the page that described second network address is corresponding, and from the second network address, extract the information of first user, when the page of front opening loads the functional unit being identified with first user information.
Preferably, described method, after obtaining the step of the second network address access request that the second user submits under non-logging status, also include:
Obtain the information of the second user;
Receive second user operation information for functional unit, the operation information of described second user profile and corresponding function assembly is fed back to first user.
Preferably, the described step that second network address is sent to the second user includes:
Open browser and open the page that described second network address is corresponding;
First user replicates described page address from browser address bar, sends described page address to second user as the second network address.
Preferably, the local digital identity ID for user obtained, i.e. UID, can find corresponding user information in website user data base by this, generates the step of the second network address according to the first network address access request include including name, user's head portrait, user credit grade etc. are described:
The first network address is extracted from described first network address access request;
Timestamp when identity UID according to described first user and user ask generates characteristic fragment;
Described characteristic fragment is attached in the first network address be formed the second network address.
Preferably, described first user information is the identity UID of first user, described generate the step of the second network address according to the first network address access request and includes:
The first network address is extracted from described first network address access request;
Timestamp when asking the identity UID of described first user and user, uses the AES preset to be encrypted, generates encrypted feature fragment;
Described encrypted feature fragment is attached in the first network address be formed the second network address.
Preferably, the identity UID of described first user obtains from data Cookie of locally stored terminal.
Preferably, the step of the described information extracting first user from the second network address includes:
Extracting characteristic fragment from described second network address, described characteristic fragment is the other parts outside the first network address;
The identity UID of first user is extracted from described characteristic fragment.
Preferably, the step of the described information extracting first user from the second network address includes:
Encrypted feature fragment is extracted from described second network address;
Described encrypted feature fragment is decrypted according to default decipherment algorithm, the identity UID of the extracting data first user after deciphering;Wherein, described default decipherment algorithm is the symmetry algorithm of predetermined encryption algorithm.
Preferably, described functional unit includes: comment operation assembly, share operating assembly or reprint operating assembly.
Present invention also provides the information interactive device between a kind of A non logged-on user, including:
First user acquisition request module: for obtaining the first network address access request that first user is submitted under non-logging status;
Second network address generation module: for generating the second network address according to described first network address access request;Described second network address includes the information of the first network address and first user;
Second network address delivery module, for being sent to the second user by described second network address;
Second user's acquisition request module: for obtaining the second network address access request that the second user submits under non-logging status;
Page open module: for opening, according to described second network address access request, the page that described second network address is corresponding;
First user information extraction modules: for extracting the information of first user from the second network address;
Load-on module, for when loading the functional unit being identified with first user information in the page of front opening.
Preferably, described device, also include:
Second user profile acquisition module: for obtaining the information of the second user;
Second user profile feedback module: for reception the second user for the operation information of functional unit, the operation information of described second user profile and corresponding function assembly is fed back to first user.
Compared with prior art, the application has the advantage that
The application, by being stored in information Cookies of local terminal, reads local user's information, and is encrypted in network access page address, forms the special web page address with user identity identification.So user is even at the state of non-login, and website also can identify and determine that user is to the use authority of function in station.System can also can carry out reverse identification to special web page address, to show whom participator is, facilitates the mutual exchange between A non logged-on user.
The application can also make webpage need not sharing and comment function of embedded correspondence, realizes assembly type by schemes such as JS loadings and ejects, and makes user can realize using functional unit to operate content in webpage any one in website without logging in.Facilitate user's comment to web page contents with mutual.
Accompanying drawing explanation
Fig. 1 is the flow chart of steps of the information interacting method embodiment 1 between a kind of A non logged-on user of the application;
Fig. 2 is the flow chart of steps of the information interacting method embodiment 2 between a kind of A non logged-on user of the application;
Fig. 3 is the structured flowchart of the information interactive device embodiment between a kind of A non logged-on user of the application.
Detailed description of the invention
Understandable for enabling the above-mentioned purpose of the application, feature and advantage to become apparent from, with detailed description of the invention, the application is described in further detail below in conjunction with the accompanying drawings.
The core concept of the application is, user, when non-logging status, automatically extracts the corresponding informance that this website is stored in data Cookie on user local terminal, generates the URL characteristic fragment with user profile by AES, it is attached in the original URL of webpage, obtains new webpage URL2.After URL2 is propagated to other users, other users can also browse webpage in the case of non-login, website obtains other user profile in the same fashion, and the ejection of information interactive function assembly is realized by schemes such as JS (JavaScript) loadings, such as, other users can comment on reply, and user will be informed with system message in website, and who replys and have commented on what content.It is mutual to the information of any web page contents that the application facilitates user, guarantees the identity validation between interactive user under free position simultaneously.
With reference to Fig. 1, it illustrates the flow chart of steps of information interacting method embodiment 1 between a kind of A non logged-on user of the application, specifically may include steps of:
The first network address access request that step 101, acquisition first user are submitted under non-logging status;
In practice, described first user is the user of registration in the website that the first network address is corresponding, may be at non-logging status, but stores the information of this user in data Cookie of local terminal.It is well known that, Cookie refers to that server keeps in the user profile put on the user computer, allows well server pass through the computer of Cookie identification user.When user is browsing web sites when, Web server first can store some information on the computer of user, and in cookie information, the recordable word with user on website inputs or the information of selection.When user logs on same website, Web server can first check whether to record the cookie information of correspondence, if it has, user will be judged according to the content in Cookie, and sends the web page contents of correspondence to user.
In implementing, in the first network address access request that first user is submitted under non-logging status, generally can include information and the information of the first network address of first user, such as, the identity UID of first user is got from data Cookie of local terminal, corresponding user information in website user data base can be found, including name, user's head portrait, user credit grade etc., the information of the first network address such as URL1 etc. by this.
Step 102, generate the second network address according to described first network address access request, and described second network address is sent to the second user;
Wherein, described second network address includes the information of the first network address and first user.
In a preferred embodiment of the present application, the second network address can be generated according to the first network address access request as follows:
Sub-step S11, from described first network address access request, extract the first network address;
Sub-step S12, timestamp when asking according to the identity UID of described first user and user generate characteristic fragment;
Sub-step S13, described characteristic fragment is attached in the first network address be formed the second network address.
Such as: user USER1 will automatically extract the information of URL address with the most chartered website of conditional access of non-login, web station system.Basis is stored in the Cookie of user USER1 local terminal simultaneously, extracts the identity UID of user USER1, and timestamp during access website, the UID of user USER1 generates together with timestamp a character string (characteristic fragment).This character string is attached in the network address of website, generates new network address URL2 (the second network address) of the information with user USER1.
In another preferred embodiment of the present application, it is also possible to generate the second network address by following sub-step according to the first network address access request:
Sub-step S21, from described first network address access request, extract the first network address;
Sub-step S22, timestamp when asking the identity UID of described first user and user, use the AES preset to be encrypted, generate encrypted feature fragment;
Sub-step S23, described encrypted feature fragment is attached in the first network address be formed the second network address.
In implementing, described AES can be MD5 algorithm.
Such as: user USER1 will automatically extract the information of URL address with the most chartered website of conditional access of non-login, web station system.Simultaneously according to the Cookie being stored in user USER1 local terminal, extract the identity UID of user USER1, and timestamp during access website, by an AES (such as MD5), the timestamp of described user UID and correspondence is encrypted as the feature URL fragment (encrypted feature fragment) of about 10 character lengths, and this encrypted feature fragment is attached in original URL address, generate new network address URL2 (the second network address) of the information with user USER1.
In implementing, described AES can also use other algorithms encrypted, such as AESs such as RSA, DES, the application to this without limiting.
It can be seen that the second network address URL2 adds characteristic of correspondence fragment or encrypted feature fragment in fact exactly in the first network address URL1, the concrete mode that the first network address is converted to the second network address can be:
1) before the click of the X page is hyperlinked to the Y page, the corresponding hyperlink that the X page includes is changed when opening the X page so that the hyperlink of similar Y page etc, all becomes URL2 from URL1;
2) first it is loaded in URL1 mode, then carries out twice service end request, page address is redirected as URL2.
Certainly, the method for above-mentioned network address conversion is solely for example, and those skilled in the art arbitrarily select according to practical situation, and this is not restricted by the application.
Use the present embodiment, can effectively prevent user profile from exposing in URL address, increase safety and confidentiality.
A kind of example specifically applied as the embodiment of the present application, can be sent to the second user by following sub-step by the second network address:
The page that described second network address is corresponding opened by sub-step S31, unlatching browser;
Sub-step S32, first user replicate described page address from browser address bar, send described page address to second user as the second network address.
Such as: A non logged-on user USER1 replicates the URL address of the second network address in the address field of client browser, then passes through immediate communication tool or is broadcast to another user USER2 otherwise.
Step 103, obtain the second network address access request that the second user submits under non-logging status;
In practice, described second user is also the registration user of the first website, may be at non-logging status, stores the information of user identity in data Cookie of local terminal.
In implementing, in the second network address access request that second user submits under non-logging status, generally can include information and the information of the second network address of the second user, such as, the identity UID of the second user is got from data Cookie of local terminal, by identity UID, this can find corresponding user information in website user data base, including name, user's head portrait, user credit grade etc., the information of the second network address such as URL2 etc..
Step 104, open the page that described second network address is corresponding according to described second network address access request, and from the second network address, extract the information of first user, when the page of front opening loads the functional unit being identified with first user information.
In another preferred embodiment of the present application, the step of the described information extracting first user from the second network address specifically can include following sub-step:
Sub-step 41, from described second network address extract characteristic fragment, described characteristic fragment is the other parts outside the first network address;
Sub-step 42, from described characteristic fragment, extract the identity UID of first user.
Such as: according to the feature URL fragment comprised in the second network address URL2, remove to resolve the UID (unique identity) in feature URL fragment and timestamp, then extract the UID of correspondence.
In another preferred embodiment of the present application, the step of the described information extracting first user from the second network address specifically can include following sub-step:
Sub-step 51, from described second network address extract encrypted feature fragment;
Sub-step 52, described encrypted feature fragment is decrypted according to default decipherment algorithm, the identity UID of the extracting data first user after deciphering;Wherein, described default decipherment algorithm is the symmetry algorithm of predetermined encryption algorithm.
Such as: according to the characteristic fragment of the encryption comprised in the second network address, encrypted feature fragment is deciphered by the inverse operation of encryption method (such as MD5 algorithm), obtain the identity UID of user USER1.
A kind of example specifically applied as the embodiment of the present application, described functional unit may include that comment operation assembly, shares operating assembly or reprint operating assembly etc., specifically can eject, by JS loading scheme, the information interactive function assembly comprising USER1 information, such as, the corresponding loading layer shown is triggered by JS, certainly, foregoing description mode is all only used as example, the application to this without being any limitation as.
With reference to Fig. 2, it is shown that the flow chart of steps of the information interacting method embodiment 2 between a kind of A non logged-on user of the application, specifically may include steps of:
Step 201, first user A submit the access request of the first network address URL1 under non-logging status to;
Step 202, according to the data of first user A in data Cookie of the locally stored terminal of described acquisition request, be specifically as follows the identity UID of first user A;
Step 203, timestamp when asking the identity UID of described first user A and user, use the AES preset to be encrypted, generate encrypted feature fragment, and described characteristic fragment is attached in the first network address URL1 be formed the second network address URL2;
Step 204, open correspondence the page;
Step 205, first user A replicate the second network address URL in browser address bar, are broadcast to the second user B by instant messenger;
Step 206, the second user B submit the second network address access request under non-logging status to;
Step 207, according to the data of the second user B in data Cookie of the locally stored terminal of described acquisition request, be specifically as follows the identity UID of the second user B;
Step 208, open, according to described second network address access request, the page that described second network address URL2 is corresponding;
Step 209, from described second network address URL2 extract encrypted feature fragment, described encrypted feature fragment is decrypted according to default decipherment algorithm, the identity UID of the extracting data first user A after deciphering, then when loading the functional unit being identified with first user information in the second network address page of front opening;
Step 210, receive the operation that the second user B is carried out for functional unit, according to information and the operation information generating system message of corresponding function assembly of the second user;The system message of generation is sent to first user A.
In implementing, second user B is after the content shared having commented on first user A, corresponding informance in data Cookie that system will be extracted on the second user B local terminal, generate the identity information of the second user B, together with the content that the identity information of the second user B is commented on the second user B, is generated system message, when first user A presence, the system message comprising second user's B identity information and comment content is sent to first user A.
It should be noted that, for embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement, because according to the application, some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should know, embodiment described in this description belongs to preferred embodiment, necessary to involved action not necessarily the application.
With reference to Fig. 3, it illustrates the structured flowchart of information interactive device embodiment between a kind of A non logged-on user of the application, specifically can include such as lower module:
First user acquisition request module 301: for obtaining the first network address access request that first user is submitted under non-logging status;
Second network address generation module 302: for generating the second network address according to described first network address access request;Described second network address includes the information of the first network address and first user;
Second network address delivery module 303: for described second network address is sent to the second user;
Second user's acquisition request mould: 304: for obtaining the second network address access request that the second user submits under non-logging status;
Page open module 305: for opening, according to described second network address access request, the page that described second network address is corresponding;
First user information extraction modules 306: for extracting the information of first user from the second network address;
Load-on module 307: for when loading the functional unit being identified with first user information in the page of front opening.
In a preferred embodiment of the present application, described device can also include such as lower module:
Second user profile acquisition module: for obtaining the information of the second user;
Second user profile feedback module: for reception the second user for the operation information of functional unit, the operation information of described second user profile and corresponding function assembly is fed back to first user.
In a kind of concrete application of the application, described second network address delivery module can include following submodule:
Network address opens submodule: opens browser and opens the page that described second network address is corresponding;
Network address transmits submodule: first user replicates described page address from browser address bar, sends described page address to second user as the second network address.
In a preferred embodiment of the present application, described first user information can be the identity UID of first user, and described second network address generation module can include following submodule:
First user acquisition of information submodule: for extracting the first network address from described first network address access request;
Characteristic fragment generates submodule: the timestamp when the identity UID according to described first user and user ask generates characteristic fragment;
Characteristic fragment additional submodule: for described characteristic fragment is attached in the first network address be formed the second network address.
In the application another kind preferred embodiment, described first user information is the identity UID of first user, and described second network address generation module can include following submodule:
First user acquisition of information submodule: for extracting the first network address from described first network address access request;
Encrypted feature fragment generates submodule: the timestamp when the identity UID according to described first user and user ask generates characteristic fragment;
Encrypted feature fragment additional submodule: for described encrypted feature fragment is attached in the first network address be formed the second network address.
In implementing, the identity UID of described first user can obtain from data Cookie of locally stored terminal.
In a preferred embodiment of the present application, described first user information extraction modules can include following submodule:
Characteristic fragment extracts submodule: extracting characteristic fragment from described second network address, described characteristic fragment is the other parts outside the first network address;
Submodule is extracted in identity: extract the identity UID of first user from described characteristic fragment.
In another preferred embodiment of the present application, described first user information extraction modules can include following submodule:
Encrypted feature snippet extraction submodule: for extracting encrypted feature fragment from described second network address;
Encrypted feature fragment deciphering submodule: described encrypted feature fragment is decrypted according to default decipherment algorithm, the identity UID of the extracting data first user after deciphering;Wherein, described default decipherment algorithm is the symmetry algorithm of predetermined encryption algorithm.
In implementing, described functional unit may include that comment operation assembly, shares operating assembly or reprint operating assembly etc..
Owing to described system embodiment essentially corresponds to preceding method embodiment, therefore the most detailed part in the description of the present embodiment, may refer to the related description in previous embodiment, do not repeat at this.
The application can be used in numerous general or special purpose computing system environment or configuration.Such as: personal computer, server computer, handheld device or portable set, laptop device, multicomputer system, system based on microprocessor, set top box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, the distributed computing environment including any of the above system or equipment etc..
The application can be described in the general context of computer executable instructions, such as program module.Usually, program module includes performing particular task or realizing the routine of particular abstract data type, program, object, assembly, data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environment, the remote processing devices connected by communication network perform task.In a distributed computing environment, during program module may be located at the local and remote computer-readable storage medium including storage device.
Finally, it can further be stated that, in this article, the relational terms of such as first and second or the like is used merely to separate an entity or operation with another entity or operating space, and not necessarily requires or imply the relation or sequentially that there is any this reality between these entities or operation.And, term " includes ", " comprising " or its any other variant are intended to comprising of nonexcludability, so that include that the process of a series of key element, method, article or equipment not only include those key elements, but also include other key elements being not expressly set out, or also include the key element intrinsic for this process, method, article or equipment.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that there is also other identical element in including the process of described key element, method, article or equipment.
Above to the information interacting method between a kind of A non logged-on user provided herein, and, information interactive device between a kind of A non logged-on user is described in detail, principle and the embodiment of the application are set forth by specific case used herein, and the explanation of above example is only intended to help and understands the present processes and core concept thereof;Simultaneously for one of ordinary skill in the art, according to the thought of the application, the most all will change, in sum, this specification content should not be construed as the restriction to the application.
Claims (10)
1. the information interacting method between an A non logged-on user, it is characterised in that including:
Obtain the first network address access request that first user is submitted under non-logging status, wherein, described first user is the user of registration in the website that the first network address is corresponding, described first network address access request includes the information of the first network address and first user, and the information of described first user obtains from data Cookie being stored in local terminal;
Generate the second network address according to described first network address access request, and described second network address is sent to the second user;Described second network address includes the information of the first network address and first user;
Obtaining the second network address access request that the second user submits under non-logging status, wherein, described second user is also the user of registration in the website that the first network address is corresponding;
Open, according to described second network address access request, the page that described second network address is corresponding, and from the second network address, extract the information of first user, when the functional unit loading the information being identified with first user in the page of front opening.
2. the method for claim 1, it is characterized in that, the page that described second network address is corresponding is being opened according to described second network address access request, and from the second network address, extract the information of first user, after the page of front opening loads the step of functional unit of the information being identified with first user, also include:
Obtain the information of the second user;
Receive second user operation information for functional unit, the information of described second user and the operation information of corresponding function assembly are fed back to first user.
3. method as claimed in claim 1 or 2, it is characterised in that the described step that second network address is sent to the second user includes:
Open browser and open the page that described second network address is corresponding;
First user replicates described page address from browser address bar, sends described page address to second user as the second network address.
4. method as claimed in claim 3, it is characterised in that the information of described first user is the identity UID of first user, described generate the step of the second network address according to the first network address access request and includes:
The first network address is extracted from described first network address access request;
Timestamp when identity UID according to described first user and user ask generates characteristic fragment;
Described characteristic fragment is attached in the first network address be formed the second network address.
5. method as claimed in claim 3, it is characterised in that the information of described first user is the identity UID of first user, described generate the step of the second network address according to the first network address access request and includes:
The first network address is extracted from described first network address access request;
Timestamp when asking the identity UID of described first user and user, uses the AES preset to be encrypted, generates encrypted feature fragment;
Described encrypted feature fragment is attached in the first network address be formed the second network address.
6. method as claimed in claim 4, it is characterised in that the step of the described information extracting first user from the second network address includes:
Extracting characteristic fragment from described second network address, described characteristic fragment is the other parts outside the first network address;
The identity UID of first user is extracted from described characteristic fragment.
7. method as claimed in claim 5, it is characterised in that the step of the described information extracting first user from the second network address includes:
Encrypted feature fragment is extracted from described second network address;
Described encrypted feature fragment is decrypted according to default decipherment algorithm, the identity UID of the extracting data first user after deciphering;Wherein, described default decipherment algorithm is the symmetry algorithm of predetermined encryption algorithm.
8. the method for claim 1, it is characterised in that described functional unit includes: comment operation assembly, share operating assembly or reprint operating assembly.
9. the information interactive device between an A non logged-on user, it is characterised in that including:
First user acquisition request module: for obtaining the first network address access request that first user is submitted under non-logging status, wherein, described first user is the user of registration in the website that the first network address is corresponding, described first network address access request includes the information of the first network address and first user, and the information of described first user obtains from data Cookie being stored in local terminal;
Second network address generation module: for generating the second network address according to described first network address access request;Described second network address includes the information of the first network address and first user;
Second network address delivery module, for described second network address is sent to the second user, wherein, described second user is also the user of registration in the website that the first network address is corresponding;
Second user's acquisition request module: for obtaining the second network address access request that the second user submits under non-logging status;
Page open module: for opening, according to described second network address access request, the page that described second network address is corresponding;
First user information extraction modules: for extracting the information of first user from the second network address;
Load-on module, for when the functional unit loading the information being identified with first user in the page of front opening.
10. device as claimed in claim 9, it is characterised in that also include:
Second user profile acquisition module: for obtaining the information of the second user;
Second user profile feedback module: for reception the second user for the operation information of functional unit, the information of described second user and the operation information of corresponding function assembly are fed back to first user.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110346510.0A CN103095663B (en) | 2011-11-04 | 2011-11-04 | Information interacting method between a kind of A non logged-on user and device |
HK13107471.8A HK1180479B (en) | 2013-06-26 | Method and device for information interaction between non-login users |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110346510.0A CN103095663B (en) | 2011-11-04 | 2011-11-04 | Information interacting method between a kind of A non logged-on user and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103095663A CN103095663A (en) | 2013-05-08 |
CN103095663B true CN103095663B (en) | 2016-08-03 |
Family
ID=48207803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110346510.0A Active CN103095663B (en) | 2011-11-04 | 2011-11-04 | Information interacting method between a kind of A non logged-on user and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103095663B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11669584B2 (en) | 2013-02-10 | 2023-06-06 | Wix.Com Ltd. | System and method for third party application activity data collection |
KR102251844B1 (en) * | 2013-12-04 | 2021-05-13 | 윅스.컴 리미티드 | System and method for third party application activity data collection |
CN103777980B (en) * | 2014-01-08 | 2016-08-31 | 北京奇虎科技有限公司 | A kind of method loading website comment information and browser |
CN105812341B (en) * | 2014-12-31 | 2019-03-29 | 阿里巴巴集团控股有限公司 | A kind of method and device of identity user identity |
CN106487851B (en) * | 2015-08-31 | 2019-06-18 | 北京国双科技有限公司 | Web wrapper information transferring method, apparatus and system |
CN107729340A (en) * | 2016-08-14 | 2018-02-23 | 天脉聚源(北京)科技有限公司 | A kind of method and system for opening wechat webpage |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101415010A (en) * | 2008-11-26 | 2009-04-22 | 涂彦晖 | WEB browsing apparatus and operation method |
CN101827129A (en) * | 2010-04-12 | 2010-09-08 | 北京志腾新诺科技有限公司 | Information interaction method and system |
CN102082740A (en) * | 2010-12-29 | 2011-06-01 | 北京开心人信息技术有限公司 | Method and system for adding friends in invitation link mode |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100198678A1 (en) * | 2008-04-30 | 2010-08-05 | Shawn Michael Burst | Method and system for sharing offers |
-
2011
- 2011-11-04 CN CN201110346510.0A patent/CN103095663B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101415010A (en) * | 2008-11-26 | 2009-04-22 | 涂彦晖 | WEB browsing apparatus and operation method |
CN101827129A (en) * | 2010-04-12 | 2010-09-08 | 北京志腾新诺科技有限公司 | Information interaction method and system |
CN102082740A (en) * | 2010-12-29 | 2011-06-01 | 北京开心人信息技术有限公司 | Method and system for adding friends in invitation link mode |
Also Published As
Publication number | Publication date |
---|---|
HK1180479A1 (en) | 2013-10-18 |
CN103095663A (en) | 2013-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210288967A1 (en) | Systems and methods for efficient and secure temporary anonymous access to media content | |
CN103051600B (en) | document access control method and system | |
CN104735066B (en) | A kind of single-point logging method of object web page application, device and system | |
CN112131564B (en) | Method, device, equipment and medium for encrypting data communication | |
CN103095663B (en) | Information interacting method between a kind of A non logged-on user and device | |
CN107016074B (en) | Webpage loading method and device | |
CN103634399B (en) | Method and device for realizing cross-domain data transmission | |
CN101426009A (en) | Identity management platform, service server, uniform login system and method | |
CN113645226B (en) | Data processing method, device, equipment and storage medium based on gateway layer | |
CN103227786A (en) | Method and device for filling in website login information | |
CN111539775B (en) | Application management method and device | |
CN111770072B (en) | Method and device for accessing function page through single sign-on | |
CN107463848B (en) | Application-oriented ciphertext search method, device, proxy server and system | |
CN110278270A (en) | A kind of polled data cochain method and its equipment based on block chain | |
CN101072443B (en) | Identity authenticating information generating method, and automatic identity authenticating method and device | |
CN110266696A (en) | A kind of evaluation data cochain method and its equipment applied to block chain | |
CN106888200B (en) | Identification association method, information sending method and device | |
HK1199774A1 (en) | Server-based login system, login server and authentication method for the same | |
CN110263563A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN106685938B (en) | A kind of method and apparatus generating protection configuration for login page | |
TW201835794A (en) | Method and device for recording website access log | |
CN110213294A (en) | By means of the community data cochain method and its equipment of block chain | |
CN110247920A (en) | Lottery data cochain method and its equipment based on block chain | |
CN110245512A (en) | Lottery data cochain method and its equipment applied to block chain | |
CN110233852A (en) | Prize drawing data cochain method and its equipment based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1180479 Country of ref document: HK |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1180479 Country of ref document: HK |