CN109831588B - Method and equipment for setting target prompt tone - Google Patents
Method and equipment for setting target prompt tone Download PDFInfo
- Publication number
- CN109831588B CN109831588B CN201910208104.4A CN201910208104A CN109831588B CN 109831588 B CN109831588 B CN 109831588B CN 201910208104 A CN201910208104 A CN 201910208104A CN 109831588 B CN109831588 B CN 109831588B
- Authority
- CN
- China
- Prior art keywords
- user
- setting
- prompt tone
- tone
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
An object of the present application is to provide a method for setting a target alert tone, the method including: determining second user identification information of a second user according to user selection operation of the first user; sending a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone for providing to the second user equipment corresponding to the second user; and receiving prompt tone setting feedback information returned by the network equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user. The method and the device facilitate the operation of the users and also improve the interest of social contact among the users.
Description
Technical Field
The present application relates to the field of communications, and in particular, to a technique for setting a target alert tone.
Background
With the development of the times and the popularization of smart phones, people can select favorite audios to set incoming call ringtones, alarm clock ringtones or short message ringtones and the like for the smart phones, and can set various ringtones for the smart phones by editing and selecting various ringtone audios, so that the smart phones are distinctive and full of fun. However, people cannot set ring tones for relatives and friends, and the interactive interest is reduced.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for setting a target alert tone.
According to one aspect of the application, a method for setting a target prompt tone for a second user equipment at a first user equipment side is provided, and the method comprises the following steps:
determining second user identification information of a second user according to user selection operation of the first user;
sending a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone for providing to the second user equipment corresponding to the second user;
and receiving prompt tone setting feedback information returned by the network equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user.
According to an aspect of the present application, there is provided a first user equipment for setting a target alert tone for a second user equipment, the apparatus comprising:
the first module is used for determining second user identification information of a second user according to user selection operation of the first user;
a first and second module, configured to send a first setting request to a corresponding network device, where the first setting request includes the second user identification information and alert tone identification information used to provide a target alert tone of a second user device corresponding to the second user;
a first third module, configured to receive alert tone setting feedback information returned by the network device based on the first setting request, where the alert tone setting feedback information includes setting operation entry information used for setting the target alert tone for the second user.
According to another aspect of the present application, a method for setting a target alert tone for a second user equipment at a network equipment side is provided, and the method includes:
receiving a first setting request sent by corresponding first user equipment, wherein the first setting request comprises second user identification information of a second user and prompt tone identification information of a target prompt tone used for providing the target prompt tone to the second user equipment corresponding to the second user;
and sending prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user.
According to still another aspect of the present application, there is provided a network device for setting a target alert tone for a second user equipment, the device including:
a second module, configured to receive a first setting request sent by a corresponding first user equipment, where the first setting request includes second user identification information of a second user and alert tone identification information of a target alert tone provided to the second user equipment corresponding to the second user;
and a second module, configured to send prompt tone setting feedback information to the first user equipment based on the first setting request, where the prompt tone setting feedback information includes setting operation entry information used for setting the target prompt tone for the second user.
According to another aspect of the present application, there is provided a method for setting a target alert tone at a second user equipment, the method comprising:
receiving setting operation entry information which is provided by a first user and used for setting a target prompt tone for second user equipment;
based on the set operation entry information, sending a verification request to corresponding network equipment, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
and if the verification request is passed, receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment.
According to another aspect of the present application, there is provided a second user equipment for setting a target alert tone for the second user equipment, the apparatus including:
the third module is used for receiving setting operation entrance information which is provided by the first user and used for setting a target prompt tone for the second user equipment;
a third module, configured to send a verification request to a corresponding network device based on the set operation entry information, where the verification request includes first user identification information of the first user and prompt tone identification information of the target prompt tone;
and a third module, configured to receive, if the verification request is passed, a warning tone setting resource of the target warning tone sent by the corresponding network device.
According to an aspect of the present application, there is provided a method for setting a target alert tone, the method including:
the first user equipment determines second user identification information of a second user according to user selection operation of the first user, and sends a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone of the second user equipment corresponding to the second user;
the network equipment receives the first setting request sent by corresponding first user equipment, and sends prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information used for setting the target prompt tone for the second user;
the first user equipment receives the prompt tone setting feedback information;
the first user equipment sends the setting operation entrance information to the second user;
the second user equipment receives the set operation entrance information and sends a verification request to corresponding network equipment based on the set operation entrance information, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
and if the verification request is passed, the second user equipment receives a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment.
According to an aspect of the present invention, there is provided a first user equipment for setting a target alert tone, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
determining second user identification information of a second user according to user selection operation of the first user;
sending a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone for providing to the second user equipment corresponding to the second user;
and receiving prompt tone setting feedback information returned by the network equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user.
According to still another aspect of the present invention, there is provided a network apparatus for setting a target alert tone, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
receiving a first setting request sent by corresponding first user equipment, wherein the first setting request comprises second user identification information of a second user and prompt tone identification information of a target prompt tone used for providing the target prompt tone to the second user equipment corresponding to the second user;
and sending prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user.
According to still another aspect of the present invention, there is provided a second user equipment for setting a target alert tone, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
receiving setting operation entry information which is provided by a first user and used for setting a target prompt tone for second user equipment;
based on the set operation entry information, sending a verification request to corresponding network equipment, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
and if the verification request is passed, receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment.
According to one aspect of the invention, there is provided a computer readable medium storing instructions that, when executed, cause a system to:
determining second user identification information of a second user according to user selection operation of the first user;
sending a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone for providing to the second user equipment corresponding to the second user;
and receiving prompt tone setting feedback information returned by the network equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user.
According to yet another aspect of the invention, there is provided a computer readable medium storing instructions that, when executed, cause a system to:
receiving a first setting request sent by corresponding first user equipment, wherein the first setting request comprises second user identification information of a second user and prompt tone identification information of a target prompt tone used for providing the target prompt tone to the second user equipment corresponding to the second user;
and sending prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user.
According to yet another aspect of the invention, there is provided a computer readable medium storing instructions that, when executed, cause a system to:
receiving setting operation entry information which is provided by a first user and used for setting a target prompt tone for second user equipment;
based on the set operation entry information, sending and setting a verification request of the target prompt tone to corresponding network equipment, wherein the verification request for setting the target prompt tone comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
and if the verification request for setting the target prompt tone is passed, receiving prompt tone setting resources of the target prompt tone sent by the corresponding network equipment.
Compared with the prior art, the second user is determined by the first user equipment based on the selection operation of the first user, wherein the first user equipment sends the identification information of the selected target prompt tone and the user identification information of the second user to the network equipment, the prompt tone returned by the network equipment sets the feedback information to determine the authority of the first user, the operation that the first user sets the target prompt tone under the condition of no authority is avoided, the meaningless operation is filtered, and the setting efficiency is improved. And the first user equipment selects the target prompt tone through the prompt tone setting application and sends the target link to the second user, so that the personalized customized prompt tone is successfully realized, the second user can directly enter the confirmation setting entry according to the target link, the operation of the user is facilitated, and the efficiency of social contact among the users is also improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology according to the present application;
fig. 2 shows a flowchart of a method for setting a target alert tone for a second user equipment at a first user equipment according to an embodiment of the present application;
fig. 3 shows a flow chart of a method for setting a target alert tone at a network device according to another embodiment of the present application;
fig. 4 shows a flowchart of a method for setting a target alert tone for a second user equipment at the second user equipment according to an embodiment of the present application;
FIG. 5 illustrates a system method diagram for setting a target alert tone according to one embodiment of the present application;
FIG. 6 shows an apparatus diagram of a first user equipment for setting a target alert tone according to one embodiment of the present application;
FIG. 7 illustrates an apparatus diagram of a network device for setting a target alert tone according to one embodiment of the present application;
FIG. 8 illustrates an apparatus diagram of a second user equipment for setting a target alert tone according to one embodiment of the present application;
FIG. 9 shows a device diagram of a system for setting a target alert tone according to one embodiment of the present application;
FIG. 10 illustrates an exemplary system that can be used to implement the various embodiments described in this disclosure.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random-Access Memory (DRAM), other types of Random-Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
For simplicity, the embodiments will be described by taking the android system as an example, and the skilled in the art can understand that the embodiments are also applicable to other operating systems of the user equipment.
Fig. 1 illustrates a typical scenario according to an embodiment of the present application, where a first user holds a first user device, selects alert tone information to be set in an alert tone setting application through the first user device, then shares the alert tone information to be set to a second user through the alert tone setting application (for example, the second user may be selected according to second user identification information in an application sharing user list of other application software), and meanwhile, the first user device sends a first setting request to a network device, where the first setting request includes the second user identification information and alert tone identification information of a target alert tone for a second user device corresponding to the second user. And the network equipment sends prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information (such as text information and links) for setting the target prompt tone for the second user. The first user equipment sends the set operation entry information to second user equipment corresponding to a second user, the second user equipment sends a verification request for setting the target prompt tone to corresponding network equipment based on the set operation entry information, the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone, the network equipment verifies the information contained in the verification request and the information contained in the first set request sent by the first user equipment, if the verification request passes, the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment, and then the second user equipment successfully sets the prompt tone information. The first user equipment and the second user equipment comprise but are not limited to computing equipment such as a mobile phone, a tablet computer and a notebook computer; the alert tone setting application includes an application developed by an application market having a function of setting various ring tones.
Referring to the system shown in fig. 1, in order to further illustrate the solution of the embodiment of the present application, reference is made to the following description, taken in conjunction with fig. 2, from the perspective of the first user equipment.
Fig. 2 illustrates a method for setting a target alert tone for a second user equipment at a first user equipment according to an embodiment of the present application, the method including step S11, step S12, and step S13. In step S11, the first user equipment determines second user identification information of the second user according to a user selection operation of the first user; in step S12, the first user equipment sends a first setting request to the corresponding network equipment, where the first setting request includes the second user identification information and alert tone identification information for providing a target alert tone to the second user equipment corresponding to the second user; in step S13, the first user equipment receives alert tone setting feedback information returned by the network equipment based on the first setting request, where the alert tone setting feedback information includes setting operation entry information for setting the target alert tone for the second user.
Specifically, in step S11, the first user equipment determines the second user identification information of the second user according to the user selection operation of the first user. For example, the user selection operation includes the first user device determining a second user based on the first user selecting in a contact list, wherein the selection operation includes but is not limited to a key operation of the user on the first user device, a click operation of a screen of the first user device, and a sliding operation, and the contact list includes but is not limited to a contact list of the first user device system and a contact list in one or more applications. The second user identification information comprises a user name of the second user in an address list contact list of the first user equipment system or an address list contact list in one or more applications. The first user equipment selects a user name of the second user from the address list contact list of the system and the address list contact list in one or more applications based on the first user to determine the second user.
In step S12, the first user equipment sends a first setting request to the corresponding network equipment, where the first setting request includes the second user identification information and alert tone identification information for providing a target alert tone to the second user equipment corresponding to the second user. For example, the target alert tone includes, but is not limited to, a music ringtone uploaded by the first user or by a copyright party, and the alert tone identification information includes a music ID of the target alert tone. And the first user equipment sends the second user identification information and the prompt tone identification information of the target prompt tone of the second user equipment corresponding to the second user to the corresponding network equipment.
In step S13, the first user equipment receives alert tone setting feedback information returned by the network equipment based on the first setting request, where the alert tone setting feedback information includes setting operation entry information for setting the target alert tone for the second user. Wherein, the setting operation entrance information includes but is not limited to text description and link of the target prompt tone set for the second user. For example, in the process that the first user equipment sends the first setting request to the corresponding network equipment, the network equipment interacts with a prompt tone setting interface of the first user equipment, and the network equipment sends prompt tone setting feedback information generated based on the first setting request to the first user equipment. In this case, the first user equipment obtains the generated warning tone setting feedback information, and provides a basis for the first user equipment to subsequently transmit the information.
For example, a first user a holds a first user device a, selects an alert tone to be set in an alert tone setting application of the first user device a based on the first user a (where an identifier of the alert tone is YYY, where the identifier is used to determine the alert tone, for example, to query resource information of the alert tone determined in a server), selects a mobile phone number of a second user B based on a click operation of the first user a in a contact directory of the first user device a, then the first user a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to a corresponding network device, and the network device sends a ring tone including "this is a ring tone set for you by a" to the first user device a after receiving the informationhttps://xxxxxx"operate entry information.
In some embodiments, the method further includes step S14 (not shown), and in step S14, the first user device sends the setting operation entry information to the second user. For example, the first user equipment sends the setting operation entry information to the second user in various ways such as short message, pushing information in the application platform, and the like, where the setting operation entry information includes, but is not limited to, text description information of a target prompt tone and link information related to the target prompt tone. The first user acquires the feedback information sent by the network equipment in real time based on the first user equipment, and immediately learns the setting condition of the target prompt tone, so that the efficiency is improved for subsequent supplementary setting, and the user experience is improved.
In some embodiments, the setup operation entry information comprises a target link to an alert tone setup application, the target link being used to wake up an alert tone setup application in the second user equipment when accessed on the second user equipment. For example, the first user device selects a user name of the second user to determine the second user based on the address book contact list in the alert tone setting application. Then, the first user equipment sends information of a setting operation entry comprising a target prompt tone to second user equipment of a second user, wherein the setting operation entry comprises a target link related to the prompt tone setting application, and the second user equipment starts the prompt tone setting application based on clicking operation of the second user on the target link. Under the condition, the first user provides the set ring for the second user, so that the interactive pleasure among the users is increased, and the social experience among the users is improved.
For example, a first user a holds a first user device a, selects a prompt tone to be set (where the identifier of the prompt tone is YYY) from a prompt tone setting application W of the first user device a based on a click operation of the first user a in a contact list of the prompt tone setting application W of the first user device a, selects a user name (xxxx) of a second user B from the prompt tone setting application W based on the first user a, and then sends the user name (xxxx) of the second user B and the prompt tone identifier (YYY) to be set to corresponding network devices. Subsequently, the first user equipment a sends a short message to the second user B (for example, a customizes a mobile phone-specific ring for you, and clicks a link setting:https://xxxxxx) And the second user starts the prompt tone setting application W after clicking the link.
In some embodiments, the target link further includes first user identification information of the first user, second user identification information of the second user, and the alert tone identification information. For example, a first user device sends a first setting request to a corresponding network device, where the first setting request includes the second user identification information and alert tone identification information used for providing a target alert tone to the second user device corresponding to the second user, and the network device returns, based on the first setting request, to the first user device, setting operation entry information including a target link, where the target link includes first user identification information of the first user, second user identification information of the second user, and the alert tone identification information. The information included in the target link provides a basis for subsequent network device authentication.
In some embodiments, the first setup request further comprises at least any one of: first user identification information of the first user; and the prompt tone type information of the target prompt tone. For example, the first user identification information includes, but is not limited to, an ID (e.g., a mobile phone number) of the first user in the address book of the user equipment system, or a user name and a user ID in the alert tone setting application. The alert tone type information includes, but is not limited to, incoming call ring tone, alarm ring tone, and short message ring tone. The first user can set various types of prompt tones for the second user, and the diversity requirements of the users are met.
In some embodiments, the alert tone setting feedback information further includes setting result information of the target alert tone on the second user equipment. For example, the setting result information includes result information of success or failure of setting of the alert tone, or result information of approval or rejection of setting of the target alert tone by the second user to the first user, where the network device receives the setting result information sent by the second user device and sends the setting result information to the first user device. Under the condition that the network equipment sends the feedback information to the first user equipment, the first user can timely know the setting result of the prompt tone, a basis is provided for subsequently and continuously setting the prompt tone, and the user experience is improved.
The method provided by the embodiment of the present application is mainly described from the perspective of the first user equipment with reference to fig. 2, and is described as an example from the perspective of the network device with reference to fig. 3.
Fig. 3 shows a method for setting a target alert tone for a second user equipment at a network equipment side according to an embodiment of the present application, the method includes steps S21 and S22. In step S21, the network device receives a first setting request sent by a corresponding first user device, where the first setting request includes second user identification information of a second user and alert tone identification information of a target alert tone provided to the second user device corresponding to the second user; in step S22, the network device sends alert tone setting feedback information to the first user device based on the first setting request, where the alert tone setting feedback information includes setting operation entry information for setting the target alert tone for the second user.
Specifically, in step S21, the network device receives a first setting request sent by a corresponding first user device, where the first setting request includes second user identification information of a second user and prompt tone identification information of a target prompt tone provided to the second user device corresponding to the second user. For example, the target alert tone includes, but is not limited to, a music ringtone uploaded by the first user or by a copyright party, and the alert tone identification information includes a music ID of the target alert tone. And the first user equipment sends the second user identification information and the prompt tone identification information of the target prompt tone of the second user equipment corresponding to the second user to corresponding network equipment, and the network equipment receives the first setting request.
In step S22, the network device sends alert tone setting feedback information to the first user device based on the first setting request, where the alert tone setting feedback information includes setting operation entry information for setting the target alert tone for the second user. The set operation entry information includes, but is not limited to, a text description of a target alert tone set for the second user and an entry (e.g., a link, a two-dimensional code, etc.). For example, in the process that the first user equipment sends the first setting request to the corresponding network equipment, the network equipment interacts with a prompt tone setting interface of the first user equipment, and the network equipment sends prompt tone setting feedback information generated based on the first setting request to the first user equipment. And under the condition that the first setting request comprises second user identification information of a second user and prompt tone identification information of a target prompt tone of second user equipment corresponding to the second user, providing a basis for subsequent network equipment to carry out identity verification on the second user equipment.
For example, a first user a holds a first user device a, based on the first user a's pick-up at the first user device aAn alert tone to be set is selected in the alert tone setting application (where the identifier of the alert tone is YYY, and the identifier is used to determine the alert tone, for example, to query and determine resource information of the alert tone in a server), based on a click operation of a first user a in a contact address book of a first user equipment a, the first user a selects a mobile phone number of a second user B, and then the first user equipment a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to corresponding network equipment, and the network equipment sends a message including "this is a ringtone that a sets for you" to the first user equipment a after receiving the messagehttps://xxxxxx"operate entry information.
In some embodiments, the method includes step S23 (not shown), in step S23, the network device receives a verification request sent by the second user device to set the target alert tone; and if the verification request is passed, sending a prompt tone setting resource of the target prompt tone to the second user equipment. For example, the verification request includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends first user identification information comprising the first user and verification request information of the prompt tone identification information of the target prompt tone to the network equipment. The network equipment verifies information in a verification request for setting the target prompt tone based on second user identification information included in a first setting request sent by first user equipment and prompt tone identification information used for providing the target prompt tone of second user equipment corresponding to a second user, and if the verification request is passed, the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for a copyrighted prompt tone music file. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured.
In some embodiments, said sending an alert tone setting resource of said target alert tone to said second user equipment if said verification request is passed comprises sending a setting solicitation message to said second user equipment based on said first setting request if said verification request is passed, wherein said setting solicitation message includes said alert tone identification information; and receiving a prompt tone resource request returned by the second user equipment based on the set inquiry information, and sending a prompt tone setting resource of the target prompt tone to the second user equipment based on the prompt tone resource request. For example, the verification request for setting the target alert tone includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends first user identification information comprising the first user and verification request information of the prompt tone identification information of the target prompt tone to the network equipment. The network equipment verifies information in a verification request of the target prompt tone based on second user identification information included in a first setting request sent by first user equipment and prompt tone identification information used for providing the target prompt tone to second user equipment corresponding to a second user, if the verification request is passed, the network equipment sends setting inquiry information including the prompt tone identification information to the second user equipment, if the second user confirms the prompt tone identification information through the second user equipment and sends a prompt tone resource request to the network equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for a copyrighted prompt tone music file. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured, meanwhile, the transmission of the inquiry information is set to give a space selected by the user, and the user experience is improved.
For example, the first user equipment a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to the corresponding network equipment, and the network equipment sends a message including "this is the ringtone that a sets for you" to the first user equipment a after receiving the messagehttps://xxxxxx"operate entry information. The first user equipment sends the setting operation entry to second user equipment corresponding to the second user B, and the second user clicks the link through the second user equipmenthttps://xxxxxxThen, the second user equipment jumps to a corresponding prompt tone setting application according to the link and logs in, in the process of logging in, the second user equipment sends a first user identifier (for example, a mobile phone number AAA) and a prompt tone identifier (YYY) of the first user equipment a to the network equipment for identity authentication, the network equipment sends setting inquiry information (for example, whether to accept YYY ring set by the mobile phone number AAA for you) to the second user equipment after authenticating and confirming the information, sends a prompt tone resource request to the network equipment after the second user confirms the setting inquiry information through the second user equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment.
In some embodiments, the setting of the solicitation information further comprises at least any one of: first user identification information of a first user corresponding to the first user equipment; and the prompt tone type information of the target prompt tone. For example, the first user identification information includes, but is not limited to, an ID (e.g., a mobile phone number) of the first user in the address book of the user equipment system, or a user name and a user ID in the alert tone setting application. The alert tone type information includes, but is not limited to, incoming call ring tone, alarm ring tone, and short message ring tone. The first user can set various types of prompt tones for the second user, and the diversity requirements of the users are met.
In some embodiments, in step S22, if the authority information of the first user equipment includes an alert tone allowing setting of the second user equipment, the network device sends alert tone setting feedback information to the first user equipment based on the first setting request, where the alert tone setting feedback information includes setting operation entry information for setting the target alert tone for the second user. For example, the permission setting includes a user name list of the permission setting target prompt tone preset by the second user, and when the network device determines that the first user has the authority to set the target prompt tone for the second user, the network device sends prompt tone setting feedback information including the setting operation entry information of the target prompt tone to the first user device. Under the condition that the set authority is set, unnecessary prompt tone setting is filtered for the second user, and user experience is improved.
For example, a first user a holds a first user device a, selects a prompt tone to be set (where the identifier of the prompt tone is YYY) based on the first user a in a prompt tone setting application of the first user device a, the first user a selects a mobile phone number of a second user B based on a click operation of the first user a in a contact directory of the first user device a, then the first user device a sends the mobile phone number (yyyy) of the first user a, the mobile phone number of the second user B and the prompt tone identifier (YYY) to be set to a corresponding network device, and after receiving the above information, the network device performs a matching query in a user name preset by the second user and allowing setting of a target prompt tone, and determines that the first user device has a right to set a target prompt tone for the second user device. The network device will then include "this is the ringtone that A sets for youhttps://xxxxxx"the setting operation entry information is transmitted to the first user equipment a.
In some embodiments, in step S22, if the authority information of the first user equipment includes an alert tone for prohibiting setting of the second user equipment, the network device sends alert tone setting feedback information to the first user equipment, where the alert tone setting feedback information includes the authority information. For example, the authority information includes that the first user equipment has no authority to set a target prompt tone for the second user. And when the network equipment determines that the first user does not have the authority for setting the target prompt tone for the second user, the network equipment sends information including the ring tone which is not set by the first user to the first user equipment. Under the condition, the first user is properly reminded, meaningless setting of the first user is avoided, and user experience is improved.
In some embodiments, the method includes step S24 (not shown), in step S24, the network device receives setting result information of the target alert tone transmitted by the second user device; wherein the alert tone setting feedback information includes the setting result information. For example, the network device receives a prompt tone resource request returned by the second user device based on the setting inquiry information, sends a prompt tone setting resource of the target prompt tone to the second user device based on the prompt tone resource request, sends setting result information (for example, target prompt tone setting is completed) to the network device after the second user device receives the prompt tone setting resource, and receives the result information and sends the result information to the first user device. Under the condition, the network equipment returns the setting result to the first user, and timely informs the first user of the information about whether the setting is successful or not, so that the result of customizing the prompt tone in a personalized manner is realized, and the user experience is improved.
The method provided by the embodiment of the present application is mainly described from the perspective of the network device in conjunction with fig. 3, and is described as an example from the perspective of the second user equipment in conjunction with fig. 4.
Fig. 4 shows a method for setting a target alert tone for a second user equipment at the second user equipment according to an embodiment of the present application, the method including step S31, step S32, and step S33. In step S31, the second user equipment receives setting operation entry information provided by the first user and setting a target alert tone for the second user equipment; in step S32, the second user equipment sends a verification request to the corresponding network equipment based on the setting operation entry information, where the verification request includes the first user identification information of the first user and the prompt tone identification information of the target prompt tone; in step S33, if the verification request is passed, the second user equipment receives the alert tone setting resource of the target alert tone sent by the corresponding network equipment.
Specifically, in step S31, the second user equipment receives the setting operation entry information provided by the first user to set the target alert tone for the second user equipment. For example, the first user equipment sends the setting operation entry information to the second user in various ways such as short message, pushing information in the application platform, and the like, where the setting operation entry information includes, but is not limited to, text description information of a target prompt tone and link information related to the target prompt tone.
In step S32, the second user equipment sends a verification request to the corresponding network equipment based on the setting operation entry information, where the verification request includes the first user identification information of the first user and the prompt tone identification information of the target prompt tone. For example, the verification request includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends first user identification information comprising the first user and verification request information of the prompt tone identification information of the target prompt tone to the network equipment.
In step S33, if the verification request is passed, the second user equipment receives the alert tone setting resource of the target alert tone sent by the corresponding network equipment. For example, the network device verifies information in a verification request for setting a target prompt tone based on second user identification information included in a first setting request sent by a first user device and prompt tone identification information used for providing the target prompt tone to a second user device corresponding to the second user, and if the verification request is passed, the network device sends prompt tone setting resources of the target prompt tone to the second user device. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for the copyrighted prompt tone music file, and the second user equipment receives the prompt tone setting resource of the target prompt tone sent by the corresponding network equipment. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured.
For example, the first user equipment a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to the corresponding network equipment, and the network equipment sends a message including "this is the ringtone that a sets for you" to the first user equipment a after receiving the messagehttps://xxxxxx"operate entry information. The first user equipment sends the setting operation entry to second user equipment corresponding to the second user B, and the second user clicks the link through the second user equipmenthttps://xxxxxxAnd then the second user equipment jumps to the corresponding prompt tone setting application according to the link and logs in, in the process of logging in, the second user equipment sends the first user identifier (for example, a mobile phone number AAA) and the prompt tone identifier (YYY) of the first user equipment a to the network equipment for identity authentication, and the network equipment sends the prompt tone setting resource of the target prompt tone to the second user equipment after the authentication confirmation of the information.
In some embodiments, in step S33, if the verification request is passed, the second user equipment receives the setting inquiry information sent by the network equipment based on the first setting request, where the setting inquiry information includes the alert tone identification information; and returning a prompt tone resource request based on the set inquiry information to the network equipment based on the trigger operation of the second user on the set inquiry information, and receiving the prompt tone setting resource of the target prompt tone sent by the network equipment based on the prompt tone resource request. For example, the verification request includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. The triggering operation includes, but is not limited to, a click operation and a sliding operation of the second user on the set inquiry information in a specific area. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends first user identification information comprising the first user and verification request information of the prompt tone identification information of the target prompt tone to the network equipment. The network equipment verifies information in a verification request of the target prompt tone based on second user identification information included in a first setting request sent by first user equipment and prompt tone identification information used for providing the target prompt tone to second user equipment corresponding to a second user, if the verification request is passed, the network equipment sends setting inquiry information including the prompt tone identification information to the second user equipment, if the second user equipment clicks and confirms the prompt tone identification information through the second user equipment and sends a prompt tone resource request to the network equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for a copyrighted prompt tone music file. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured, meanwhile, the transmission of the inquiry information is set to give a space selected by the user, and the user experience is improved.
For example, the first user equipment a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to the corresponding network equipment, and the network equipment sends a message including "this is the ringtone that a sets for you" to the first user equipment a after receiving the messagehttps://xxxxxx"operate entry information. The first user equipment sends the setting operation entry to second user equipment corresponding to the second user B, and the second user clicks the link through the second user equipmenthttps://xxxxxxThen, the second user equipment jumps to a corresponding prompt tone setting application according to the link and logs in, in the process of logging in, the second user equipment sends a first user identifier (for example, a mobile phone number AAA) and a prompt tone identifier (YYY) of the first user equipment a to the network equipment for identity authentication, the network equipment sends setting inquiry information (for example, whether to accept YYY ring set by the mobile phone number AAA for you) to the second user equipment after authenticating and confirming the information, sends a prompt tone resource request to the network equipment after the second user confirms the setting inquiry information through the second user equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment.
In some embodiments, the setup operation portal includes a target link for an alert tone setup application, the target link being used to wake up an alert tone setup application in the second user equipment when accessed on the second user equipment. For example, the first user device selects a user name of the second user to determine the second user based on the address book contact list in the alert tone setting application. Then, the first user equipment sends information of a setting operation entry comprising a target prompt tone to second user equipment of a second user, wherein the setting operation entry comprises a target link related to the prompt tone setting application, and the second user equipment starts the prompt tone setting application based on clicking operation of the second user on the target link. Under the condition, the first user provides the set ring for the second user, so that the interactive pleasure among the users is increased, and the social experience among the users is improved.
For example, a first user a holds a first user device a, selects a prompt tone to be set (where the identifier of the prompt tone is YYY) from a prompt tone setting application W of the first user device a based on a click operation of the first user a in a contact list of the prompt tone setting application W of the first user device a, selects a user name (xxxx) of a second user B from the prompt tone setting application W based on the first user a, and then sends the user name (xxxx) of the second user B and the prompt tone identifier (YYY) to be set to corresponding network devices. Subsequently, the first user equipment a sends a short message to the second user B (for example, a customizes a mobile phone-specific ring for you, and clicks a link setting:https://xxxxxx) And the second user starts the prompt tone setting application W after clicking the link.
In some embodiments, in step S33, the second user equipment detects a trigger operation of the second user on a setting operation entry of a target alert tone provided by the first user equipment; when the prompt tone setting application corresponding to the setting operation entry is installed on the second user equipment, awakening the prompt tone setting application, and receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment through the prompt tone setting application; otherwise, based on the trigger operation, requesting an application server for a prompt tone setting application corresponding to the setting operation entry, and receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment through the prompt tone setting application.
For example, the setting operation entry includes a link related to a target prompt tone in a message sent by the user equipment system with a text message function or other social application platforms, and the triggering operation includes, but is not limited to, a key operation of the second user equipment by the second user, a sliding operation of a screen of the second user equipment, and a clicking operation of the sliding operation of the screen of the second user equipment. And when the prompt tone setting application corresponding to the setting operation entrance is installed on the second user equipment, the second user equipment starts the prompt tone setting application through a scheme protocol, and meanwhile, under the condition that the network equipment passes the identity verification, the network equipment sends the prompt tone setting resource of the target prompt tone to the second user equipment through the prompt tone setting application. If the prompt tone setting application corresponding to the setting operation entry is not installed on the second user equipment, based on the triggering operation of the second user on the setting operation entry, the second user equipment requests an application server for an application package of the prompt tone setting application corresponding to the setting operation entry (for example, the application package is downloaded at a webpage end and manually installed, or an application market including the prompt tone setting application is called for automatic downloading and installation), and after the downloading and installation of the prompt tone setting application is completed, and meanwhile, under the condition that the network equipment passes the identity verification, the network equipment sends the prompt tone setting resource of the target prompt tone to the second user equipment through the prompt tone setting application. And under the scene that the prompt tone setting application is not installed on the second application equipment, installing the application based on the trigger operation of the user on the setting operation entrance, and providing a basis for subsequently setting the prompt tone of the second user equipment.
For example, the first user equipment a sends a short message to the second user B (for example, a customizes a mobile phone-specific ring tone for you, clicks a link setting:https://xxxxxx) When the second user equipment side installs the warning tone setting application W, the second user clicks the link and then starts the warning tone setting application W, after the second user logs in the warning tone setting application W, the network equipment performs identity verification on login information, and after the identity information is confirmed, the network equipment sends warning tone setting resources of the target warning tone to the second user equipment through the warning tone setting application W; or, in the case that the second user equipment end does not install the prompt tone setting application W, the second user clicks the link and jumps to the application market, the application market downloads the prompt tone setting application W and installs the application on the second user equipment, and thenAfter the second user logs in the warning tone setting application W, the network equipment performs identity verification on the login information, and after the identity information is confirmed, the network equipment sends the warning tone setting resource of the target warning tone to the second user equipment through the warning tone setting application W.
In some embodiments, the method further includes step S34 (not shown), and in step S34, the second user equipment transmits setting result information of the target alert tone to the network device. For example, the network device receives an alert tone resource request returned by the second user device based on the setting inquiry information, sends an alert tone setting resource of the target alert tone to the second user device based on the alert tone resource request, and sends setting result information (e.g., target alert tone setting completion) to the network device after the second user device receives the alert tone setting resource. Under the condition, the network equipment receives the result information and sends the result information to the first user equipment, and the information of whether the first user is successfully set or not is informed in time, so that the result of customizing the prompt tone in a personalized manner is realized, and the user experience is improved.
Fig. 5 illustrates a system method for setting a target alert tone for a second user equipment according to one embodiment of the present application, the method comprising:
the first user equipment determines second user identification information of a second user according to user selection operation of the first user, and sends a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone of the second user equipment corresponding to the second user;
the network equipment receives the first setting request sent by corresponding first user equipment, and sends prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information used for setting the target prompt tone for the second user;
the first user equipment receives the prompt tone setting feedback information;
the first user equipment sends the setting operation entrance information to the second user;
the second user equipment receives the setting operation entry information and sends a verification request for setting the target prompt tone to corresponding network equipment based on the setting operation entry information, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
and if the verification request for setting the target prompt tone is passed, the second user equipment receives the prompt tone setting resource of the target prompt tone sent by the corresponding network equipment.
The method provided by the embodiment of the present application is mainly described above by way of example from the perspective of interaction of various devices, and correspondingly, the present application also provides devices capable of performing the methods described above, which are described below with reference to fig. 6 to 9.
Fig. 6 shows a first user equipment for setting a target alert tone for a second user equipment according to an embodiment of the present application, the first user equipment comprising a first module 11, a first second module 12 and a first third module 13. The first module 11 is configured to determine second user identification information of a second user according to a user selection operation of a first user; a first and second module 12, configured to send a first setting request to a corresponding network device, where the first setting request includes the second user identification information and alert tone identification information of a target alert tone provided to a second user device corresponding to the second user; a first third module 13, configured to receive alert tone setting feedback information returned by the network device based on the first setting request, where the alert tone setting feedback information includes setting operation entry information used for setting the target alert tone for the second user.
Specifically, the first module 11 is configured to determine second user identification information of a second user according to a user selection operation of the first user. For example, the user selection operation includes the first user device determining a second user based on the first user selecting in a contact list, wherein the selection operation includes but is not limited to a key operation of the user on the first user device, a click operation of a screen of the first user device, and a sliding operation, and the contact list includes but is not limited to a contact list of the first user device system and a contact list in one or more applications. The second user identification information comprises a user name of the second user in an address list contact list of the first user equipment system or an address list contact list in one or more applications. The first user equipment selects a user name of the second user from the address list contact list of the system and the address list contact list in one or more applications based on the first user to determine the second user.
A first and second module 12, configured to send a first setting request to a corresponding network device, where the first setting request includes the second user identification information, and alert tone identification information of a target alert tone provided to the second user device corresponding to the second user. For example, the target alert tone includes, but is not limited to, a music ringtone uploaded by the first user or by a copyright party, and the alert tone identification information includes a music ID of the target alert tone. And the first user equipment sends the second user identification information and the prompt tone identification information of the target prompt tone of the second user equipment corresponding to the second user to the corresponding network equipment.
A first third module 13, configured to receive alert tone setting feedback information returned by the network device based on the first setting request, where the alert tone setting feedback information includes setting operation entry information used for setting the target alert tone for the second user. Wherein, the setting operation entrance information includes but is not limited to text description and link of the target prompt tone set for the second user. For example, in the process that the first user equipment sends the first setting request to the corresponding network equipment, the network equipment interacts with a prompt tone setting interface of the first user equipment, and the network equipment sends prompt tone setting feedback information generated based on the first setting request to the first user equipment. In this case, the first user equipment obtains the generated warning tone setting feedback information, and provides a basis for the first user equipment to subsequently transmit the information.
For example, a first user a holds a first user device a, selects an alert tone to be set in an alert tone setting application of the first user device a based on the first user a (where an identifier of the alert tone is YYY, where the identifier is used to determine the alert tone, for example, to query resource information of the alert tone determined in a server), selects a mobile phone number of a second user B based on a click operation of the first user a in a contact directory of the first user device a, then the first user a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to a corresponding network device, and the network device sends a ring tone including "this is a ring tone set for you by a" to the first user device a after receiving the informationhttps://xxxxxx"operate entry information.
In some embodiments, the apparatus further includes a first fourth module 14, where the first fourth module 14 is configured to send the setting operation entry information to the second user. For example, the first user equipment sends the setting operation entry information to the second user in various ways such as short message, pushing information in the application platform, and the like, where the setting operation entry information includes, but is not limited to, text description information of a target prompt tone and link information related to the target prompt tone. The first user acquires the feedback information sent by the network equipment in real time based on the first user equipment, and immediately learns the setting condition of the target prompt tone, so that the efficiency is improved for subsequent supplementary setting, and the user experience is improved.
In some embodiments, the setup operation entry information comprises a target link to an alert tone setup application, the target link being used to wake up an alert tone setup application in the second user equipment when accessed on the second user equipment. For example, the first user device selects a user name of the second user to determine the second user based on the address book contact list in the alert tone setting application. Then, the first user equipment sends information of a setting operation entry comprising a target prompt tone to second user equipment of a second user, wherein the setting operation entry comprises a target link related to the prompt tone setting application, and the second user equipment starts the prompt tone setting application based on clicking operation of the second user on the target link. Under the condition, the first user provides the set ring for the second user, so that the interactive pleasure among the users is increased, and the social experience among the users is improved.
For example, a first user a holds a first user device a, selects a prompt tone to be set (where the identifier of the prompt tone is YYY) from a prompt tone setting application W of the first user device a based on a click operation of the first user a in a contact list of the prompt tone setting application W of the first user device a, selects a user name (xxxx) of a second user B from the prompt tone setting application W based on the first user a, and then sends the user name (xxxx) of the second user B and the prompt tone identifier (YYY) to be set to corresponding network devices. Subsequently, the first user equipment a sends a short message to the second user B (for example, a customizes a mobile phone-specific ring for you, and clicks a link setting:https://xxxxxx) And the second user starts the prompt tone setting application W after clicking the link.
In some embodiments, the target link further includes first user identification information of the first user, second user identification information of the second user, and the alert tone identification information. For example, a first user device sends a first setting request to a corresponding network device, where the first setting request includes the second user identification information and alert tone identification information used for providing a target alert tone to the second user device corresponding to the second user, and the network device returns, based on the first setting request, to the first user device, setting operation entry information including a target link, where the target link includes first user identification information of the first user, second user identification information of the second user, and the alert tone identification information. The information included in the target link provides a basis for subsequent network device authentication.
In some embodiments, the first setup request further comprises at least any one of: first user identification information of the first user; and the prompt tone type information of the target prompt tone. For example, the first user identification information includes, but is not limited to, an ID (e.g., a mobile phone number) of the first user in the address book of the user equipment system, or a user name and a user ID in the alert tone setting application. The alert tone type information includes, but is not limited to, incoming call ring tone, alarm ring tone, and short message ring tone. The first user can set various types of prompt tones for the second user, and the diversity requirements of the users are met.
In some embodiments, the alert tone setting feedback information further includes setting result information of the target alert tone on the second user equipment. For example, the setting result information includes result information of success or failure of setting of the alert tone, or result information of approval or rejection of setting of the target alert tone by the second user to the first user, where the network device receives the setting result information sent by the second user device and sends the setting result information to the first user device. Under the condition that the network equipment sends the feedback information to the first user equipment, the first user can timely know the setting result of the prompt tone, a basis is provided for subsequently and continuously setting the prompt tone, and the user experience is improved.
Fig. 7 shows a network device for setting a target alert tone for a second user equipment according to an embodiment of the present application, the device includes a second first module 21 and a second module 22. A second module 21, configured to receive a first setting request sent by a corresponding first user equipment, where the first setting request includes second user identification information of a second user and alert tone identification information of a target alert tone provided to the second user equipment corresponding to the second user; a second module 22, configured to send prompt tone setting feedback information to the first user equipment based on the first setting request, where the prompt tone setting feedback information includes setting operation entry information used for setting the target prompt tone for the second user.
Specifically, the second first module 21 is configured to receive a first setting request sent by a corresponding first user equipment, where the first setting request includes second user identification information of a second user and alert tone identification information of a target alert tone provided to the second user equipment corresponding to the second user. For example, the target alert tone includes, but is not limited to, a music ringtone uploaded by the first user or by a copyright party, and the alert tone identification information includes a music ID of the target alert tone. And the first user equipment sends the second user identification information and the prompt tone identification information of the target prompt tone of the second user equipment corresponding to the second user to corresponding network equipment, and the network equipment receives the first setting request.
A second module 22, configured to send prompt tone setting feedback information to the first user equipment based on the first setting request, where the prompt tone setting feedback information includes setting operation entry information used for setting the target prompt tone for the second user. The set operation entry information includes, but is not limited to, a text description of a target alert tone set for the second user and an entry (e.g., a link, a two-dimensional code, etc.). For example, in the process that the first user equipment sends the first setting request to the corresponding network equipment, the network equipment interacts with a prompt tone setting interface of the first user equipment, and the network equipment sends prompt tone setting feedback information generated based on the first setting request to the first user equipment. And under the condition that the first setting request comprises second user identification information of a second user and prompt tone identification information of a target prompt tone of second user equipment corresponding to the second user, providing a basis for subsequent network equipment to carry out identity verification on the second user equipment.
For example, a first user a holds a first user device a, selects an alert tone to be set in an alert tone setting application of the first user device a based on the first user a (where an identifier of the alert tone is YYY, and the identifier is used to determine the alert tone, for example, to query resource information of the alert tone in a server), and clicks in a contact address book of the first user device a based on the first user aA user A selects the mobile phone number of a second user B, then a first user device a sends the mobile phone number of the second user B and a prompt tone identifier (YYYY) to be set to a corresponding network device, and the network device sends a ring tone including 'the ring tone is set for the user A' to the first user device a after receiving the informationhttps://xxxxxx"operate entry information.
In some embodiments, the device comprises a second third module 23 (not shown), the second third module 23 being configured to receive a verification request sent by a second user equipment to set the target alert tone; and if the verification request is passed, sending a prompt tone setting resource of the target prompt tone to the second user equipment. For example, the verification request includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends first user identification information comprising the first user and verification request information of the prompt tone identification information of the target prompt tone to the network equipment. The network equipment verifies information in a verification request for setting the target prompt tone based on second user identification information included in a first setting request sent by first user equipment and prompt tone identification information used for providing the target prompt tone of second user equipment corresponding to a second user, and if the verification request is passed, the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for a copyrighted prompt tone music file. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured.
In some embodiments, said sending an alert tone setting resource of said target alert tone to said second user equipment if said verification request is passed comprises sending a setting solicitation message to said second user equipment based on said first setting request if said verification request is passed, wherein said setting solicitation message includes said alert tone identification information; and receiving a prompt tone resource request returned by the second user equipment based on the set inquiry information, and sending a prompt tone setting resource of the target prompt tone to the second user equipment based on the prompt tone resource request. For example, the verification request for setting the target alert tone includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends verification request information comprising the first user identification information of the first user and the prompt tone identification information of the target prompt tone to the network equipment. The network equipment verifies information in a verification request of the target prompt tone based on second user identification information included in a first setting request sent by first user equipment and prompt tone identification information used for providing the target prompt tone to second user equipment corresponding to a second user, if the verification request is passed, the network equipment sends setting inquiry information including the prompt tone identification information to the second user equipment, if the second user confirms the prompt tone identification information through the second user equipment and sends a prompt tone resource request to the network equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for a copyrighted prompt tone music file. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured, meanwhile, the transmission of the inquiry information is set to give a space selected by the user, and the user experience is improved.
For example, the first user equipment a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to the corresponding network equipment, and the network equipment sends a message including "this is the ringtone that a sets for you" to the first user equipment a after receiving the messagehttps://xxxxxx"operate entry information. The first user equipment sends the setting operation entry to second user equipment corresponding to the second user B, and the second user clicks the link through the second user equipmenthttps://xxxxxxThen, the second user equipment jumps to a corresponding prompt tone setting application according to the link and logs in, in the process of logging in, the second user equipment sends a first user identifier (for example, a mobile phone number AAA) and a prompt tone identifier (YYY) of the first user equipment a to the network equipment for identity authentication, the network equipment sends setting inquiry information (for example, whether to accept YYY ring set by the mobile phone number AAA for you) to the second user equipment after authenticating and confirming the information, sends a prompt tone resource request to the network equipment after the second user confirms the setting inquiry information through the second user equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment.
In some embodiments, the setting of the solicitation information further comprises at least any one of: first user identification information of a first user corresponding to the first user equipment; and the prompt tone type information of the target prompt tone. For example, the first user identification information includes, but is not limited to, an ID (e.g., a mobile phone number) of the first user in the address book of the user equipment system, or a user name and a user ID in the alert tone setting application. The alert tone type information includes, but is not limited to, incoming call ring tone, alarm ring tone, and short message ring tone. The first user can set various types of prompt tones for the second user, and the diversity requirements of the users are met.
In some embodiments, the second module 22 is configured to, if the permission information of the first user equipment includes a warning tone allowing setting of the second user equipment, send warning tone setting feedback information to the first user equipment based on the first setting request, where the warning tone setting feedback information includes setting operation entry information for setting the target warning tone for the second user. For example, the permission setting includes a user name list of the permission setting target prompt tone preset by the second user, and when the network device determines that the first user has the authority to set the target prompt tone for the second user, the network device sends prompt tone setting feedback information including the setting operation entry information of the target prompt tone to the first user device. Under the condition that the set authority is set, unnecessary prompt tone setting is filtered for the second user, and user experience is improved.
For example, a first user a holds a first user device a, selects a prompt tone to be set in a prompt tone setting application of the first user device a based on that the first user a selects the prompt tone (where the prompt tone is identified as YYY), and based on a click operation of the first user a in a contact directory of the first user device a, the first user a selects a mobile phone number (xxxx) of a second user B, and then the first user device a sends the mobile phone number (yyyy) of the first user a, the mobile phone number (xxxx) of the second user B, and the prompt tone identification (YYY) to be set to a corresponding network device, and after receiving the information, the network device performs matching query in a user name preset by the second user and allowing a target prompt tone to be set, and determines that the first user device has an authority to set a target prompt tone for the second user device. The network device will then include "this is the ringtone that A sets for youhttps://xxxxxx"the setting operation entry information is transmitted to the first user equipment a.
In some embodiments, the second module 22 is configured to send prompt tone setting feedback information to the first user equipment if the authority information of the first user equipment includes a prompt tone prohibiting setting of the second user equipment, where the prompt tone setting feedback information includes the authority information. For example, the authority information includes that the first user equipment has no authority to set a target prompt tone for the second user. And when the network equipment determines that the first user does not have the authority for setting the target prompt tone for the second user, the network equipment sends information including the ring tone which is not set by the first user to the first user equipment. Under the condition, the first user is properly reminded, meaningless setting of the first user is avoided, and user experience is improved.
In some embodiments, the apparatus includes a second fourth module 24 (not shown), the second fourth module 24 is configured to receive setting result information of the target alert tone sent by the second user equipment; wherein the alert tone setting feedback information includes the setting result information. For example, the network device receives a prompt tone resource request returned by the second user device based on the setting inquiry information, sends a prompt tone setting resource of the target prompt tone to the second user device based on the prompt tone resource request, sends setting result information (for example, target prompt tone setting is completed) to the network device after the second user device receives the prompt tone setting resource, and receives the result information and sends the result information to the first user device. Under the condition, the network equipment returns the setting result to the first user, and timely informs the first user of the information about whether the setting is successful or not, so that the result of customizing the prompt tone in a personalized manner is realized, and the user experience is improved.
Fig. 8 shows a second user equipment for setting a target alert tone for the second user equipment according to an embodiment of the present application, the second user equipment includes a third first module 31, a third second module 32 and a third module 33. A third module 31, configured to receive setting operation entry information provided by the first user and used for setting a target alert tone for the second user equipment; a third second module 32, configured to send a verification request to a corresponding network device based on the set operation entry information, where the verification request includes first user identification information of the first user and prompt tone identification information of the target prompt tone; a third module 33, configured to receive, if the verification request is passed, a warning tone setting resource of the target warning tone sent by the corresponding network device.
Specifically, the third module 31 is configured to receive setting operation entry information provided by the first user and used for setting a target prompt tone for the second user equipment. For example, the first user equipment sends the setting operation entry information to the second user in various ways such as short message, pushing information in the application platform, and the like, where the setting operation entry information includes, but is not limited to, text description information of a target prompt tone and link information related to the target prompt tone.
A third second module 32, configured to send an authentication request to a corresponding network device based on the set operation entry information, where the authentication request includes first user identification information of the first user and prompt tone identification information of the target prompt tone. For example, the verification request includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends first user identification information comprising the first user and verification request information of the prompt tone identification information of the target prompt tone to the network equipment.
A third module 33, configured to receive, if the verification request is passed, a warning tone setting resource of the target warning tone sent by the corresponding network device. For example, the network device verifies information in a verification request for setting a target prompt tone based on second user identification information included in a first setting request sent by a first user device and prompt tone identification information used for providing the target prompt tone to a second user device corresponding to the second user, and if the verification request is passed, the network device sends prompt tone setting resources of the target prompt tone to the second user device. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for the copyrighted prompt tone music file, and the second user equipment receives the prompt tone setting resource of the target prompt tone sent by the corresponding network equipment. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured.
For example, the first user equipment a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to the corresponding network equipment, and the network equipment sends a message including "this is the ringtone that a sets for you" to the first user equipment a after receiving the messagehttps://xxxxxx"operate entry information. The first user equipment sends the setting operation entry to second user equipment corresponding to the second user B, and the second user clicks the link through the second user equipmenthttps://xxxxxxAnd then the second user equipment jumps to the corresponding prompt tone setting application according to the link and logs in, in the process of logging in, the second user equipment sends the first user identifier (for example, a mobile phone number AAA) and the prompt tone identifier (YYY) of the first user equipment a to the network equipment for identity authentication, and the network equipment sends the prompt tone setting resource of the target prompt tone to the second user equipment after the authentication confirmation of the information.
In some embodiments, the third module 33 is configured to receive, if the verification request is passed, setting query information sent by the network device based on the first setting request, where the setting query information includes the alert tone identification information; and returning a prompt tone resource request based on the set inquiry information to the network equipment based on the trigger operation of the second user on the set inquiry information, and receiving the prompt tone setting resource of the target prompt tone sent by the network equipment based on the prompt tone resource request. For example, the verification request includes first user identification information of the first user and alert tone identification information of the target alert tone, wherein the alert tone identification information includes a music ID of the target alert tone. The triggering operation includes, but is not limited to, a click operation and a sliding operation of the second user on the set inquiry information in a specific area. And the second user equipment enters the prompt tone setting application through the target link, wherein the setting operation entry information sent by the first user equipment to the second user comprises the target link, and the prompt tone setting application comprises application software capable of setting the prompt tone. And after entering the prompt tone setting application, the second user equipment logs in based on second user identification information of the second user, and in the process, the second user equipment sends first user identification information comprising the first user and verification request information of the prompt tone identification information of the target prompt tone to the network equipment. The network equipment verifies information in a verification request of the target prompt tone based on second user identification information included in a first setting request sent by first user equipment and prompt tone identification information used for providing the target prompt tone to second user equipment corresponding to a second user, if the verification request is passed, the network equipment sends setting inquiry information including the prompt tone identification information to the second user equipment, if the second user equipment clicks and confirms the prompt tone identification information through the second user equipment and sends a prompt tone resource request to the network equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment. The prompt tone setting resource comprises a prompt tone music file, or a permission file or copyright information for a copyrighted prompt tone music file. And under the condition that the identity authentication is passed, the network equipment issues a prompt tone to the second user equipment to set resources, so that the reliability of the setting is ensured, meanwhile, the transmission of the inquiry information is set to give a space selected by the user, and the user experience is improved.
For example, the first user equipment a sends the mobile phone number of the second user B and the alert tone identifier (YYY) to be set to the corresponding network equipment, and the network equipment sends the information to the first user equipment a after receiving the information, where the information includes "this is set for you by aRing tonehttps://xxxxxx"operate entry information. The first user equipment sends the setting operation entry to second user equipment corresponding to the second user B, and the second user clicks the link through the second user equipmenthttps://xxxxxxThen, the second user equipment jumps to a corresponding prompt tone setting application according to the link and logs in, in the process of logging in, the second user equipment sends a first user identifier (for example, a mobile phone number AAA) and a prompt tone identifier (YYY) of the first user equipment a to the network equipment for identity authentication, the network equipment sends setting inquiry information (for example, whether to accept YYY ring set by the mobile phone number AAA for you) to the second user equipment after authenticating and confirming the information, sends a prompt tone resource request to the network equipment after the second user confirms the setting inquiry information through the second user equipment, and the network equipment sends prompt tone setting resources of the target prompt tone to the second user equipment.
In some embodiments, the setup operation portal includes a target link for an alert tone setup application, the target link being used to wake up an alert tone setup application in the second user equipment when accessed on the second user equipment. For example, the first user device selects a user name of the second user to determine the second user based on the address book contact list in the alert tone setting application. Then, the first user equipment sends information of a setting operation entry comprising a target prompt tone to second user equipment of a second user, wherein the setting operation entry comprises a target link related to the prompt tone setting application, and the second user equipment starts the prompt tone setting application based on clicking operation of the second user on the target link. Under the condition, the first user provides the set ring for the second user, so that the interactive pleasure among the users is increased, and the social experience among the users is improved.
For example, a first user a holds a first user device a, selects an alert tone to be set (where the identifier of the alert tone is YYY) in an alert tone setting application W of the first user device a based on the first user a, and sets a point in a contact address book of the application W based on the alert tone of the first user a in the first user device aAnd in a click operation, the first user A selects a user name (xxxx) of the second user B in the prompt tone setting application W, and then the first user equipment a sends the user name (xxxx) of the second user B and the prompt tone identification (YYY) to be set to the corresponding network equipment. Subsequently, the first user equipment a sends a short message to the second user B (for example, a customizes a mobile phone-specific ring for you, and clicks a link setting:https://xxxxxx) And the second user starts the prompt tone setting application W after clicking the link.
In some embodiments, the third module 33 is configured to detect a triggering operation of the second user on a setting operation entry of a target alert tone provided by the first user equipment; when the prompt tone setting application corresponding to the setting operation entry is installed on the second user equipment, awakening the prompt tone setting application, and receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment through the prompt tone setting application; otherwise, based on the trigger operation, requesting an application server for a prompt tone setting application corresponding to the setting operation entry, and receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment through the prompt tone setting application.
For example, the setting operation entry includes a link related to a target prompt tone in a message sent by the user equipment system with a text message function or other social application platforms, and the triggering operation includes, but is not limited to, a key operation of the second user equipment by the second user, a sliding operation of a screen of the second user equipment, and a clicking operation of the sliding operation of the screen of the second user equipment. And when the prompt tone setting application corresponding to the setting operation entrance is installed on the second user equipment, the second user equipment starts the prompt tone setting application through a scheme protocol, and meanwhile, under the condition that the network equipment passes the identity verification, the network equipment sends the prompt tone setting resource of the target prompt tone to the second user equipment through the prompt tone setting application. If the prompt tone setting application corresponding to the setting operation entry is not installed on the second user equipment, based on the triggering operation of the second user on the setting operation entry, the second user equipment requests an application server for an application package of the prompt tone setting application corresponding to the setting operation entry (for example, the application package is downloaded at a webpage end and manually installed, or an application market including the prompt tone setting application is called for automatic downloading and installation), and after the downloading and installation of the prompt tone setting application is completed, and meanwhile, under the condition that the network equipment passes the identity verification, the network equipment sends the prompt tone setting resource of the target prompt tone to the second user equipment through the prompt tone setting application. And under the scene that the prompt tone setting application is not installed on the second application equipment, installing the application based on the trigger operation of the user on the setting operation entrance, and providing a basis for subsequently setting the prompt tone of the second user equipment.
For example, the first user equipment a sends a short message to the second user B (for example, a customizes a mobile phone-specific ring tone for you, clicks a link setting:https://xxxxxx) When the second user equipment side installs the warning tone setting application W, the second user clicks the link and then starts the warning tone setting application W, after the second user logs in the warning tone setting application W, the network equipment performs identity verification on login information, and after the identity information is confirmed, the network equipment sends warning tone setting resources of the target warning tone to the second user equipment through the warning tone setting application W; or, when the second user equipment does not install the prompt tone setting application W, the second user clicks the link and jumps to the application market, the application market downloads the prompt tone setting application W and installs the application on the second user equipment, then, after the second user logs in the prompt tone setting application W, the network equipment performs identity verification on login information, and after the identity information is confirmed, the network equipment sends the prompt tone setting resource of the target prompt tone to the second user equipment through the prompt tone setting application W.
In some embodiments, the device further includes a third and fourth module 34 (not shown), and the third and fourth module 34 is configured to send setting result information of the target alert tone to the network device. For example, the network device receives an alert tone resource request returned by the second user device based on the setting inquiry information, sends an alert tone setting resource of the target alert tone to the second user device based on the alert tone resource request, and sends setting result information (e.g., target alert tone setting completion) to the network device after the second user device receives the alert tone setting resource. Under the condition, the network equipment receives the result information and sends the result information to the first user equipment, and the information of whether the first user is successfully set or not is informed in time, so that the result of customizing the prompt tone in a personalized manner is realized, and the user experience is improved.
Fig. 9 shows a system for setting a target alert tone for a second user equipment according to one embodiment of the present application, the system comprising:
the first user equipment determines second user identification information of a second user according to user selection operation of the first user, and sends a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone of the second user equipment corresponding to the second user;
the network equipment receives the first setting request sent by corresponding first user equipment, and sends prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information used for setting the target prompt tone for the second user;
the first user equipment receives the prompt tone setting feedback information;
the first user equipment sends the setting operation entrance information to the second user;
the second user equipment receives the setting operation entry information and sends a verification request for setting the target prompt tone to corresponding network equipment based on the setting operation entry information, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
and if the verification request is passed, the second user equipment receives a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment.
FIG. 10 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 10, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a holding computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (16)
1. A method for setting a target prompt tone for a second user equipment at a first user equipment end, wherein the method comprises the following steps:
determining second user identification information of a second user according to user selection operation of the first user;
sending a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone for providing to the second user equipment corresponding to the second user;
receiving prompt tone setting feedback information returned by the network equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user;
and sending the set operation entry information to the second user, so that the second user equipment sends a verification request to corresponding network equipment based on the set operation entry information, and if the verification request passes, the second user equipment receives set inquiry information sent by the network equipment based on a first set request, wherein the set inquiry information comprises the prompt tone identification information, and based on the trigger operation of the second user on the set inquiry information, returns a prompt tone resource request based on the set inquiry information to the network equipment, and receives the prompt tone setting resource of the target prompt tone sent by the network equipment based on the prompt tone resource request.
2. The method of claim 1, wherein the setup operation entry information includes a target link for an alert tone setup application, the target link being used to wake up an alert tone setup application in the second user device when accessed on the second user device.
3. The method of claim 2, wherein the target link further comprises first user identification information of the first user, second user identification information of a second user, and the alert tone identification information.
4. The method of claim 1, wherein the first setup request further comprises at least any one of:
first user identification information of the first user;
and the prompt tone type information of the target prompt tone.
5. The method of claim 1, wherein the alert tone setting feedback information further includes setting result information of the target alert tone on the second user equipment.
6. A method at a network device for setting a target alert tone for a second user equipment, wherein the method comprises:
receiving a first setting request sent by corresponding first user equipment, wherein the first setting request comprises second user identification information of a second user and prompt tone identification information of a target prompt tone used for providing the target prompt tone to the second user equipment corresponding to the second user;
sending prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information for setting the target prompt tone for the second user;
receiving a verification request sent by second user equipment and used for setting the target prompt tone;
if the verification request is passed, sending set inquiry information to the second user equipment based on the first set request, wherein the set inquiry information comprises the prompt tone identification information;
and receiving a prompt tone resource request returned by the second user equipment based on the set inquiry information, and sending a prompt tone setting resource of the target prompt tone to the second user equipment based on the prompt tone resource request.
7. The method of claim 6, wherein the setting of the solicitation information further comprises at least any one of:
first user identification information of a first user corresponding to the first user equipment;
and the prompt tone type information of the target prompt tone.
8. The method of claim 6, wherein the sending, based on the first setting request, alert tone setting feedback information to the first user device, wherein the alert tone setting feedback information includes setting operation entry information for setting the target alert tone for the second user comprises:
and if the authority information of the first user equipment comprises a prompt tone allowing the second user equipment to be set, sending prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information used for setting the target prompt tone for the second user.
9. The method of claim 6, wherein the sending, based on the first setting request, alert tone setting feedback information to the first user device, wherein the alert tone setting feedback information includes setting operation entry information for setting the target alert tone for the second user comprises:
and if the authority information of the first user equipment comprises a prompt tone for prohibiting setting of the second user equipment, sending prompt tone setting feedback information to the first user equipment, wherein the prompt tone setting feedback information comprises the authority information.
10. The method of claim 6, wherein the method further comprises:
receiving setting result information of the target prompt tone sent by the second user equipment;
wherein the alert tone setting feedback information includes the setting result information.
11. A method for setting a target alert tone at a second user equipment, wherein the method comprises:
receiving setting operation entry information which is provided by a first user and used for setting a target prompt tone for second user equipment, wherein the setting operation entry comprises a target link related to a prompt tone setting application, and the target link is used for awakening the prompt tone setting application in the second user equipment when being accessed on the second user equipment;
based on the set operation entry information, sending a verification request to corresponding network equipment, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
if the verification request is passed, receiving a warning tone setting resource of the target warning tone sent by the corresponding network device, wherein if the verification request is passed, receiving the warning tone setting resource of the target warning tone sent by the corresponding network device includes:
if the verification request is passed, receiving setting inquiry information sent by the network equipment based on a first setting request, wherein the setting inquiry information comprises the prompt tone identification information;
and returning a prompt tone resource request based on the set inquiry information to the network equipment based on the trigger operation of the second user on the set inquiry information, and receiving the prompt tone setting resource of the target prompt tone sent by the network equipment based on the prompt tone resource request.
12. A method for setting a target alert tone at a second user equipment, wherein the method comprises:
receiving setting operation entry information which is provided by a first user and used for setting a target prompt tone for second user equipment, wherein the setting operation entry comprises a target link related to a prompt tone setting application, and the target link is used for awakening the prompt tone setting application in the second user equipment when being accessed on the second user equipment;
based on the set operation entry information, sending a verification request to corresponding network equipment, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
if the verification request is passed, receiving a warning tone setting resource of the target warning tone sent by the corresponding network device, wherein if the verification request is passed, receiving the warning tone setting resource of the target warning tone sent by the corresponding network device includes:
detecting the triggering operation of the second user on a setting operation inlet of a target prompt tone provided by first user equipment;
when the prompt tone setting application corresponding to the setting operation entry is installed on the second user equipment, awakening the prompt tone setting application, and receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment through the prompt tone setting application; otherwise
And based on the trigger operation, requesting an application server for a prompt tone setting application corresponding to the setting operation entry, and receiving a prompt tone setting resource of the target prompt tone sent by the corresponding network equipment through the prompt tone setting application.
13. The method of claim 12, wherein the method further comprises:
and sending the setting result information of the target prompt tone to the network equipment.
14. A method for setting a target alert tone, wherein the method comprises:
the first user equipment determines second user identification information of a second user according to user selection operation of the first user, and sends a first setting request to corresponding network equipment, wherein the first setting request comprises the second user identification information and prompt tone identification information of a target prompt tone of the second user equipment corresponding to the second user;
the network equipment receives the first setting request sent by corresponding first user equipment, and sends prompt tone setting feedback information to the first user equipment based on the first setting request, wherein the prompt tone setting feedback information comprises setting operation entry information used for setting the target prompt tone for the second user;
the first user equipment receives the prompt tone setting feedback information;
the first user equipment sends the setting operation entry information to the second user, wherein the setting operation entry comprises a target link related to a warning tone setting application, and the target link is used for awakening the warning tone setting application in the second user equipment when being accessed on the second user equipment;
the second user equipment receives the setting operation entry information and sends a verification request for setting the target prompt tone to corresponding network equipment based on the setting operation entry information, wherein the verification request comprises first user identification information of the first user and prompt tone identification information of the target prompt tone;
the network equipment receives a verification request of the target prompt tone, and if the verification request is passed, the network equipment sends set inquiry information to the second user equipment based on the first set request, wherein the set inquiry information comprises the prompt tone identification information;
the second user equipment receives the set inquiry information and returns a prompt tone resource request based on the set inquiry information to the network equipment based on the trigger operation of the second user on the set inquiry information;
the network equipment receives the prompt tone resource request and sends prompt tone setting resources of the target prompt tone to the second user equipment based on the prompt tone resource request;
and the second user equipment receives the prompt tone setting resource of the target prompt tone.
15. An apparatus for setting a target alert tone, the apparatus comprising:
a processor; and
a memory arranged to store computer-executable instructions that, when executed, cause the processor to perform operations of any of the methods of claims 1 to 13.
16. A computer-readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods of claims 1-13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910208104.4A CN109831588B (en) | 2019-03-19 | 2019-03-19 | Method and equipment for setting target prompt tone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910208104.4A CN109831588B (en) | 2019-03-19 | 2019-03-19 | Method and equipment for setting target prompt tone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109831588A CN109831588A (en) | 2019-05-31 |
CN109831588B true CN109831588B (en) | 2021-01-22 |
Family
ID=66870486
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910208104.4A Active CN109831588B (en) | 2019-03-19 | 2019-03-19 | Method and equipment for setting target prompt tone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109831588B (en) |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137145B (en) * | 2006-08-31 | 2010-12-08 | 中国电信股份有限公司 | Wireless communication terminal indication voice automatic updating method |
KR101735344B1 (en) * | 2011-01-10 | 2017-05-15 | 삼성전자 주식회사 | Method of turning alarm off and mobile terminal thereof |
CN103108005A (en) * | 2011-11-11 | 2013-05-15 | 上海聚力传媒技术有限公司 | Method, device and system for achieving data sharing in distributed storage system |
CN102752731B (en) * | 2012-06-20 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method, equipment and system transmitting information |
CN103634483A (en) * | 2013-12-04 | 2014-03-12 | 百度在线网络技术(北京)有限公司 | Method, device and system for setting incoming call presentation mode |
CN103873578A (en) * | 2014-03-21 | 2014-06-18 | 深圳市东方拓宇科技有限公司 | Method for sending and sharing contents between terminals and corresponding terminals |
CN104038772B (en) * | 2014-06-30 | 2017-08-25 | 北京奇艺世纪科技有限公司 | Generate the method and device of ring signal file |
CN104038774B (en) * | 2014-06-30 | 2017-09-26 | 北京奇艺世纪科技有限公司 | Generate the method and device of ring signal file |
CN105813030B (en) * | 2014-12-29 | 2020-03-06 | 北京奇虎科技有限公司 | Communication access prompting method and mobile communication terminal |
CN105812591A (en) * | 2014-12-29 | 2016-07-27 | 北京奇虎科技有限公司 | Communication access prompting method and system |
US9632664B2 (en) * | 2015-03-08 | 2017-04-25 | Apple Inc. | Devices, methods, and graphical user interfaces for manipulating user interface objects with visual and/or haptic feedback |
CN106960333A (en) * | 2016-01-08 | 2017-07-18 | 深圳市星电商科技有限公司 | The method and system of shared resource |
CN106254655B (en) * | 2016-08-10 | 2019-07-26 | 北京小米移动软件有限公司 | The tinkle of bells setting method and device |
CN107135149B (en) * | 2017-06-30 | 2021-06-15 | 上海掌门科技有限公司 | Method and equipment for recommending social users |
CN108712478B (en) * | 2018-04-28 | 2019-10-22 | 上海掌门科技有限公司 | A kind of method and apparatus for sharing boarding application |
CN109246214B (en) * | 2018-09-10 | 2022-03-04 | 北京奇艺世纪科技有限公司 | Prompt tone obtaining method and device, terminal and server |
-
2019
- 2019-03-19 CN CN201910208104.4A patent/CN109831588B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109831588A (en) | 2019-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11102318B1 (en) | Method and system applications for push notification | |
EP3726868B1 (en) | Profile download method and system, and related device | |
CN110336735B (en) | Method and equipment for sending reminding message | |
CN110266505B (en) | Method and equipment for managing session group | |
CN107148068B (en) | Method and equipment for connecting wireless access point | |
CN107135149B (en) | Method and equipment for recommending social users | |
CN107396364B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
CN108924833B (en) | Method and equipment for authorizing user equipment to connect wireless access point | |
CN110765395A (en) | Method and equipment for providing novel information | |
CN105072080A (en) | Information verification method, device and system | |
CN107682250B (en) | Method and equipment for executing social operation | |
CN107690175A (en) | A kind of method and apparatus for being used to manage WAP | |
CN111212183B (en) | Method, device and computer readable medium for running hosted application | |
KR20190069574A (en) | Wireless network type detection method and apparatus, and electronic device | |
CN111325574B (en) | Method and device for providing presentation information | |
CN111162990B (en) | Method and equipment for presenting message notification | |
CN109890024B (en) | Method and equipment for determining rescue group information | |
CN112822430B (en) | Conference group merging method and device | |
CN107330013B (en) | Method and equipment for user recommendation | |
CN113157162A (en) | Method, apparatus, medium and program product for revoking session messages | |
CN110177360B (en) | Method and device for binding with wearable device | |
CN110166955B (en) | Method and equipment for reminding schedule | |
CN109831588B (en) | Method and equipment for setting target prompt tone | |
CN114296651B (en) | Method and device for storing custom data information | |
EP3329650B1 (en) | Providing multi-factor authentication credentials via device notifications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |