Information generation, acquisition, and processing to improve service efficiency

ABSTRACT

An instruction to generate target information is received by a server and from a first user. The instruction includes two or more pieces of user identity information associated with two or more different users. The two or more pieces of user identity information are combined, by the server and in a predetermined method, into continuous text information. The two or more pieces of user identity information in the continuous text information are separated by one or more separation strings. The target information is generated, by the server, based on at least a predetermined algorithm and the continuous text information.

This application is a continuation of PCT Application No.PCT/CN2016/106324, filed on Nov. 18, 2016, which claims priority toChinese Patent Application No. 201510849154.2, filed on Nov. 27, 2015,and each application is hereby incorporated by reference in itsentirety.

TECHNICAL FIELD

The present application relates to the field of computer technologies,and in particular, to an information generation method and apparatus, aninformation acquisition method and apparatus, an information processingmethod and apparatus, and a payment method and client.

BACKGROUND

In conventional technologies, target information (for example, imageinformation or sound information) that includes user identityinformation can be generated. With rapid development of Internettechnologies, higher service operation performing efficiency is needed.For example, when obtaining account information by recognizing targetinformation, a user may want to make payment to two accounts byperforming one recognition operation. However, in existing technologies,target information can include information related to one account. Thatis, the user may need to recognize two pieces of account information byperforming two recognition operations, and separately perform twopayment operations with the two accounts, which can affect efficiency ofservice performance.

Therefore, a generation method for target information that includes atleast two pieces of user identity information and a recognition methodfor the target information are needed to improve service performanceefficiency.

SUMMARY

Implementations of the present application provide an informationgeneration method and apparatus, an information acquisition method andapparatus, an information processing method and apparatus, and a paymentmethod and client, so as to improve efficiency of performing a serviceoperation.

According to a first aspect, an information generation method isprovided, and the generation method includes: receiving an informationgeneration instruction entered by a first user, where the informationgeneration instruction includes at least two pieces of user identityinformation; combining the at least two pieces of user identityinformation in a predetermined method, to obtain continuous textinformation, where the at least two pieces of user identity informationin the continuous text information are separated by a separation string,and the separation string is a predefined character or charactercombination; and generating target information based on a predeterminedalgorithm and the continuous text information.

According to a second aspect, an information acquisition method isprovided, and the acquisition method includes: recognizing pre-generatedtarget information to obtain continuous text information, where thecontinuous text information includes at least two pieces of useridentity information, the at least two pieces of user identityinformation are separated by a separation string, and the separationstring is a predefined character or character combination; and parsingthe continuous text information to obtain the at least two pieces ofuser identity information.

According to a third aspect, an information processing method isprovided, and the processing method includes: recognizing pre-generatedtarget information to obtain continuous text information; sending thecontinuous text information to a server, so that the server parses thecontinuous text information to obtain at least two pieces of useridentity information; receiving the at least two pieces of user identityinformation sent by the server, and displaying the at least two piecesof user identity information; and performing a corresponding operationon the at least two pieces of user identity information based oninformation entered by a second user.

According to a fourth aspect, a payment method is provided, and thepayment method includes: recognizing pre-generated target information toobtain continuous text information; sending the continuous textinformation to a payment server, so that the payment server parses thecontinuous text information to obtain at least two pieces of accountinformation; receiving the at least two pieces of account informationsent by the payment server, and displaying the at least two pieces ofaccount information; determining a payment amount corresponding to eachpiece of account information based on information entered by a payor;and performing a payment operation based on the payment amountcorresponding to each piece of account information.

According to a fifth aspect, an information generation apparatus isprovided, and the generation apparatus includes a receiving unit, acombination unit, and a generation unit, where the receiving unit isconfigured to receive an information generation instruction entered by afirst user, where the information generation instruction includes atleast two pieces of user identity information; the combination unit isconfigured to combine, in a predetermined method, the at least twopieces of user identity information received by the receiving unit, toobtain continuous text information, where the at least two pieces ofuser identity information in the continuous text information areseparated by a separation string, and the separation string is apredefined character or character combination; and the generation unitis configured to generate target information based on a predeterminedalgorithm and the continuous text information obtained by thecombination unit.

According to a sixth aspect, an information acquisition apparatus isprovided, and the acquisition apparatus includes a recognition unit anda parsing unit, where the recognition unit is configured to recognizepre-generated target information to obtain continuous text information,where the continuous text information includes at least two pieces ofuser identity information, the at least two pieces of user identityinformation are separated by a separation string, and the separationstring is a predefined character or character combination; and theparsing unit is configured to parse the continuous text informationobtained by the recognition unit to obtain the at least two pieces ofuser identity information.

According to a seventh aspect, an information processing apparatus isprovided, and the processing apparatus includes a recognition unit, asending unit, a receiving unit, and an execution unit, where therecognition unit is configured to recognize pre-generated targetinformation to obtain continuous text information; the sending unit isconfigured to send the continuous text information obtained by therecognition unit to a server, so that the server parses the continuoustext information to obtain at least two pieces of user identityinformation; the receiving unit is configured to: receive the at leasttwo pieces of user identity information sent by the server, and displaythe at least two pieces of user identity information; and the executionunit is configured to perform a corresponding operation on the at leasttwo pieces of user identity information based on information entered bya second user.

According to an eighth aspect, a payment client is provided, and thepayment client includes a recognition unit, a sending unit, adetermining unit, and an execution unit, where the recognition unit isconfigured to recognize pre-generated target information to obtaincontinuous text information; the sending unit is configured to send thecontinuous text information obtained by the recognition unit to apayment server, so that the payment server parses the continuous textinformation to obtain at least two pieces of account information; thedetermining unit is configured to determine a payment amountcorresponding to each piece of account information based on informationentered by a payor; and the execution unit is configured to perform apayment operation based on the payment amount that corresponds to eachpiece of account information and that is determined by the determiningunit.

According to the information generation method and apparatus, theinformation acquisition method and apparatus, the information processingmethod and apparatus, and the payment method and client provided in thepresent application, the generation method includes: receiving theinformation generation instruction entered by the first user, where theinformation generation instruction includes at least two pieces of useridentity information; combining the at least two pieces of user identityinformation in the predetermined method, to obtain the continuous textinformation, where the at least two pieces of user identity informationin the continuous text information are separated by the separationstring, and the separation string is a predefined character or charactercombination; and generating the target information based on thepredetermined algorithm and the continuous text information. That is, inthe present application, the target information includes at least twopieces of user identity information, so that when user identityinformation is obtained by recognizing the target information, the atleast two pieces of user identity information are obtained by performingone recognition operation, and a service operation is performed (forexample, simultaneously) on the at least two pieces of user identityinformation, thereby improving efficiency of performing the serviceoperation on the at least two pieces of user identity information.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a flowchart illustrating an information generation method,according to an implementation of the present application.

FIG. 2 is a flowchart illustrating an information acquisition method,according to another implementation of the present application.

FIG. 3 is a flowchart illustrating an information processing method,according to still another implementation of the present application.

FIG. 4 is a flowchart illustrating a payment method, according to yetanother implementation of the present application.

FIG. 5 is a schematic diagram illustrating a page format of a paymentclient, according to the present application.

FIG. 6 is a schematic diagram illustrating an information generationapparatus, according to an implementation of the present application.

FIG. 7 is a schematic diagram illustrating an information acquisitionapparatus, according to another implementation of the presentapplication.

FIG. 8 is a schematic diagram illustrating an information processingapparatus, according to still another implementation of the presentapplication.

FIG. 9 is a schematic diagram illustrating a payment client, accordingto yet another implementation of the present application.

FIG. 10 is a flowchart illustrating an example of a computer-implementedmethod for generating information including two or more pieces of useridentity information associated with two or more different users,according to an implementation of the present disclosure.

DESCRIPTION OF IMPLEMENTATIONS

To make the objectives, technical solutions, and advantages of theimplementations of the present application clearer, the followingdescribes technical solutions of implementations of the presentapplication with reference to the accompanying drawings in theimplementations of the present application. The describedimplementations are merely some, rather than all, of the possibleimplementations of the present application. Other implementationsunderstood by a person of ordinary skill in the art, and based on theimplementations of the present application, are considered to fallwithin the protection scope of the present application.

To facilitate understanding of the present application, the followinguses detailed descriptions to provide further explanations withreference to the accompanying drawings, and the implementationsconstitute no limitation to the implementations of the presentapplication.

An information generation method and apparatus, an informationacquisition method and apparatus, an information processing method andapparatus, and a payment method and client provided in the presentapplication are applicable to scenarios in which target information thatincludes at least two pieces of user identity information are generatedin an Internet system. For example, the information generation methodand apparatus, the information acquisition method and apparatus, theinformation processing method and apparatus, and the payment method andclient can be applied to scenarios in which payment information thatincludes at least two pieces of user identity information is generatedin a payment system. Here, the user identity information can includeaccount information, account number information, bank card numberinformation, or other information that can identify a user identity.

The payment system can include a payment client and a payment server.The payment client can include a display interface, an image recognitionapparatus, and/or a sound recognition apparatus. The display interfacecan display payment processing results by a payment server of a paymentrequest by a payment client server. The image recognition apparatus isused to recognize image information, for example, to recognize a QR codeor an encrypted QR code, to obtain continuous text information (orcharacter string information). The sound recognition apparatus is usedto recognize sound information, for example, to recognize a sound waveor an encrypted sound wave, and obtain continuous text information (orcharacter string information). Here, when the payment client isconfigured to recognize the encrypted QR code or the encrypted soundwave, the payment client can further include a corresponding decryptionfunction, for example, it can include a function of decrypting textinformation encrypted by using an MD5 encryption algorithm. The paymentserver can be configured to: receive continuous text information sent bythe payment client, and decrypt the continuous text information by usinga predetermined algorithm, so as to obtain at least two pieces of useridentity information. A payment amount corresponding to each piece ofuser identity information can be determined based on a payment amountand a payment proportion entered by a payor, or can be determined basedon a payment amount or a predetermined proportion in a payment order. Inaddition, the payment information can be image information, for example,a QR code, or can be sound information, for example, a sound wave.

FIG. 1 is a flowchart illustrating an information generation method,according to an implementation of the present application. Thegeneration method can be performed by a device that has processingcapabilities such as a server, a system, or an apparatus. As shown inFIG. 1, the generation method can include the following steps.

Step 110: Receive an information generation instruction entered by afirst user, where the information generation instruction includes atleast two pieces of user identity information.

Here, in payment transactions, the first user can be a payee or amerchant, and the user identity information can include accountinformation, account number information, bank card number information,or other information that can identify a user identity. For example, theuser identity information is the account information, and the generatedtarget information is a QR code. The information generation instructioncan be triggered by clicking an option “My QR Code” in “Account Details”of a payment system by the payee. Because a QR code that includes onepiece of account information can be generated with existing paymentsystems, it may be that account information of the payee cannot beedited. When a solution of the present application is implemented,account information in “Account Details” can be set to an editablestate. Therefore, the payee can also add other account information.Alternatively, an option “Generate a QR code” can be added to thepayment system. The payee can add at least two pieces of accountinformation on a page corresponding to the option. After the accountinformation is edited on the page, the information generationinstruction is triggered when an “OK” button is clicked.

When the user identity information is a bank card number or otherinformation that can identify a user's identity, or when the generatedtarget information includes image or sound information other than the QRcode, the information generation instruction can be triggered in asimilar method. Details are omitted here to avoid duplication.

Step 120: Combine the at least two pieces of user identity informationin a predetermined method, to obtain continuous text information, wherethe at least two pieces of user identity information in the continuoustext information are separated by a separation string, and theseparation string is a predefined character or character combination.

In some implementations, the separation string can include the followingspecial characters or a combination of the following special characters:“#”, “*”, “< >”, or “(.*)”. Special characters can be any character thatcannot be used to form the user identity information.

Combining the at least two pieces of user identity information in apredetermined method to obtain continuous text information can include:

Step A: Sort the at least two pieces of user identity information basedon a predetermined sorting rule.

When there is primary user identity information and secondary useridentity information in the at least two pieces of user identityinformation, the predetermined sorting rule can sort the primary useridentity information before the secondary user identity information. Forexample, when the received information generation instruction includestwo pieces of account information, and the two pieces of accountinformation are merchant account information and waiter accountinformation, the predetermined sorting rule can sort the merchantaccount information before the waiter account information.

Step B: Combine the sorted at least two pieces of user identityinformation with the predetermined method to obtain the continuous textinformation.

For example, step B can combine the sorted at least two pieces of useridentity information by using the separation string to obtain thecontinuous text information.

As described in the previous example, assume that the merchant accountinformation is “a@163.com”, account information of a first waiter is“waiter1@163.com”, and the separation string is “#”, continuous textinformation obtained by combining two sorted pieces of accountinformation by using the separation string is “a@163com#waiter1@163.com”.

Assuming, similar to the previous example, that account informationincludes a second waiter, “waiter2@163.com”, and that there is nosequential relationship between the account information of the secondwaiter and the first waiter, continuous text information can be obtainedby combining three sorted pieces of account information by using theseparation string

a@163.com#waiter1@163.com#waiter2@163.com

or

a@163.com#waiter2@163 com#waiter1@163.com.

In certain applications, priorities can be separately determined for aplurality of waiters. As described in the previous example, when thepriority of the first waiter is higher than the priority of the secondwaiter, the obtained continuous text information can be“a@163.com#waiter1@163.com#waiter2@163.com”.

The at least two pieces of user identity information can be sorted tofacilitate user account recognition. For example, when the receivedcontinuous text information is “a@163.com#waiter1@163.com”, “a@163.com”can be recognized as the merchant account information, and“waiter1@163.com” can be recognized as the waiter account information.

Step 130: Generate target information based on a predetermined algorithmand the continuous text information.

Here, the target information can be image information or soundinformation. For example, in the payment system, the target informationcan be a QR code or a sound wave.

When the obtained target information is the QR code, the predeterminedalgorithm can be any algorithm that can generate the QR code asdescribed in the prior art. When the obtained target information is thesound wave, the predetermined algorithm can be any algorithm that canencode the continuous text information based on a predetermined codingrule and convert the encoded continuous text information into a signalon a corresponding sound frequency. For example, an algorithm thatconverts the continuous text information into octal data, where 0 to 7in the octal data can be represented by using eight different soundfrequencies, and converts the obtained octal data into signals oncorresponding sound frequencies.

In payment transactions, step 110 to step 130 can be performed by thepayment system.

According to the previously described implementation of the informationgeneration method, the target information can include at least twopieces of user identity information. This can improve efficiency inobtaining at least two pieces of user identity information when useridentity information is obtained by recognizing the target information,and thereby improving efficiency of performing a service operation onthe at least two pieces of user identity information.

FIG. 2 is a flowchart illustrating an information acquisition method,according to another implementation of the present application. Theacquisition method can be performed by a device that has a processingcapability such as a server, a system, or an apparatus. As shown in FIG.2, the acquisition method can include the following steps.

Step 210: Recognize pre-generated target information to obtaincontinuous text information, where the continuous text informationincludes at least two pieces of user identity information, the at leasttwo pieces of user identity information are separated by a separationstring, and the separation string is a predefined character or charactercombination.

Here, the pre-generated target information can be picture information,for example, a QR code, or can be sound information, for example, asound wave.

In a payment system, step 210 can be performed by a payment client. Forexample, when the pre-generated target information is a QR code, thepre-generated QR code can be recognized by enabling a “Scan” function inthe payment client. Indeed, in another application scenario, step 210can alternatively be performed by another system or apparatus that hasan image recognition function or a sound recognition function.

Preferably, the at least two pieces of user identity information in thecontinuous text information are sorted.

In some implementations, the separation string can include the followingspecial characters or a combination of the following special characters:“#”, “*”, “< >”, or “(.*)”. Special characters can be any character thatcannot be used to form the user identity information. In addition, whenthere is primary user identity information and secondary user identityinformation in the at least two pieces of user identity information, asequence of the at least two pieces of user identity information can bedetermined as the primary user identity information before the secondaryuser identity information. For example, in payment transactions, whenthe user identity information is account information, and two pieces ofaccount information are merchant account information and waiter accountinformation, a sequence of the two pieces of account information can bedetermined as the merchant account information before the waiter accountinformation.

For example, when the continuous text information includes two pieces ofuser identity information, the obtained continuous text information canbe “a@163.com#waiter1@163.com”. However, when the continuous textinformation includes at least two (for example, three) pieces of useridentity information, the obtained continuous text information can be“a@163.com#waiter2@163.com#waiter1@163.com”.

Step 220: Parse the continuous text information to obtain the at leasttwo pieces of user identity information.

Parsing of the continuous text information to obtain the at least twopieces of user identity information in step 220 can include:

Step X: Remove the separation string from the continuous textinformation, where continuous text information obtained after removingthe separation string includes at least two pieces of sub-textinformation.

As described in the previous example, when a special character “#” isremoved from the continuous text information“a@163.com#waiter1@163.com”, two pieces of sub-text information“a@163.com” and “waiter1@163.com” can be obtained. When a specialcharacter “#” is removed from the continuous text information“a@163.com#waiter2@163.com#waiter1@163.com”, three pieces of sub-textinformation “a@163.com”, “waiter1@163.com”, and “waiter2@163.com” areobtained.

Step Y: Use the at least two pieces of sub-text information as the atleast two pieces of user identity information.

As described in the previous example, “a@163.com” and “waiter1@163.com”can be used as two pieces of account information, or “a@163.com”,“waiter1@163.com”, and “waiter2@163.com” can be used as three pieces ofaccount information.

Additionally, if the at least two pieces of user identity informationare sorted, the at least two pieces of user identity information can beparsed based on a predetermined sorting rule. For example, the sortingrule of the at least two pieces of user identity information in thecontinuous text information with which separation string is not removedcan be that the merchant account information is sorted before the waiteraccount information. Therefore, “a@163.com” and “waiter1@163.com” can beparsed and used as the merchant account information and accountinformation of the first waiter. If there is no priority order,“a@163.com”, “waiter1@163.com”, and “waiter2@163.com” can be parsed andused as merchant account information, account information of a firstwaiter, and account information of a second waiter, or can be parsed andused as the merchant account information, account information of asecond waiter, and account information of a first waiter. However, ifthere is a priority order, and assuming that priority of the firstwaiter is higher than priority of the second waiter, “a@163.com”,“waiter1@163.com”, and “waiter2@163.com” can be parsed and used as themerchant account information, the account information of the firstwaiter, and the account information of the second waiter.

According to the previously described implementation information of theacquisition method, at least two pieces of user identity information canbe obtained by performing one recognition operation. This can improveefficiency of obtaining at least two pieces of user identity informationwhen user identity information is obtained by recognizing the targetinformation, thereby improving efficiency of performing a serviceoperation on at least two pieces of user identity information.

FIG. 3 is a flowchart illustrating an information processing method,according to still another implementation of the present application.The processing method can be performed by a device that has processingcapabilities such as a server, a system, or an apparatus. As shown inFIG. 3, the payment method can include the following steps.

Step 310: Recognize pre-generated target information to obtaincontinuous text information.

In this implementation, for example, the pre-generated targetinformation is a QR code. The QR code can be generated by a paymentsystem of a payee or peer instant messaging software (for example,WeChat or QQ), so that a payor or a party adding a friend can scan theQR code.

For example, when the payor pays the payee, a QR code generated by thepayee can be recognized by using a “Scan” function in a payment client,so as to obtain the continuous text information.

In another example, when a party adds another party to the friend list,a QR code generated by the another party can be recognized by using a“Scan” function in a client of an instant messaging software to obtainthe continuous text information.

For example, when the continuous text information includes three piecesof account information combined by using a separation string “#”, thecontinuous text information can be“a@163.com#waiter1@163.com#waiter2@163.com”.

Step 320: Send the continuous text information to a server, so that theserver can parse the continuous text information to obtain at least twopieces of user identity information.

As described in the previous first example, after obtaining thecontinuous text information, the payment client can send the continuoustext information to a payment server. After receiving the continuoustext information, the payment server can parse the continuous textinformation by using the parsing method in step 220, obtain thefollowing three pieces of account information: “a@163.com”,waiter1@163.com“, and waiter2@163.com”, and recognize, based on apredetermined sorting rule and priority, the three pieces of accountinformation are merchant account information, account information of afirst waiter, and account information of a second waiter.

As described in the previous example, after obtaining the continuoustext information, the client of the instant messaging software can sendthe obtained continuous text information to a corresponding server; orafter receiving the continuous text information, a server of the instantmessaging software can parse the continuous text information by usingthe parsing method in step 220, and obtain the following three pieces ofaccount number information: “XXX123”, “12345678001”, and “497770066”.

Step 330: Receive the at least two pieces of user identity informationsent by the server, and display the at least two pieces of user identityinformation.

As described in the previous example, after receiving the three piecesof account information, the payment client can display the merchantaccount information and related information of the two waiters, forexample, an avatar, and can uniquely determine a target waiter andaccount information of the target waiter based on a selectioninstruction. Here, the payment server can pre-store a mappingrelationship between a target waiter and account information of a targetwaiter in a storage unit.

As described in the previous example, after receiving the three piecesof account number information, the client of the instant messagingsoftware can display the three pieces of account number information, andcan further display related information of the three pieces of accountnumber information (for example, an avatar and a located region).

Step 340: Perform a corresponding operation on the at least two piecesof user identity information based on information entered by a seconduser.

As described in the previous example, the second user can be the payor.The payment client receives a first payment amount corresponding to themerchant account information and a proportion of a second payment amountcorresponding to waiter account information to the first payment amountentered by the payor; or a payment amount corresponding to each piece ofaccount information. After receiving information entered by the payor,the payment client sends the information to the payment server. Thepayment server determines the payment amount corresponding to each pieceof account information based on the received information. Afterdetermining the payment amount corresponding to each piece of accountinformation, the payment server performs a payment operation based onthe determined payment amount corresponding to each piece of accountinformation or a final payment amount corresponding to each piece ofaccount information. Therefore, when account information is obtained byrecognizing the target information, at least two pieces of accountinformation are obtained by performing one recognition operation, andthe payment operation is performed (for example, simultaneously) on theat least two pieces of account information, thereby improving efficiencyof performing the payment operation on the at least two pieces ofaccount information.

As described in the previous example, the second user can be the partyadding a friend. The information entered by the second user can be aninstruction for adding specific account number information to a friendlist, or can be an instruction for giving up adding specific accountnumber information to a friend list.

FIG. 4 is a flowchart illustrating a payment method, according to yetanother implementation of the present application. The payment methodcan be performed by a device that has processing capabilities, such as aserver, a system, or an apparatus, for example, a payment client. Asshown in FIG. 4, the payment method can include the following steps.

Step 410: Recognize pre-generated target information to obtaincontinuous text information.

In this implementation, for example, the pre-generated targetinformation is a QR code. The QR code can be generated by a payee byusing a payment system. To help a payor to scan the QR code, the payeecan print the QR code and attach to a place such as a wall of a shop ora counter near a cashier.

When the payor pays the payee, the payor can recognize, by using a“Scan” function in the payment client, the QR code printed on the wallof the shop or at the place near the cashier, to obtain the continuoustext information.

For example, when the continuous text information includes three piecesof account information combined by using a separation string “#”, thecontinuous text information can be“a@163.com#waiter1@163.com#waiter2@163.com”.

Step 420: Send the continuous text information to a payment server, sothat the payment server parses the continuous text information to obtainat least two pieces of account information.

After obtaining the continuous text information, the payment client cansend the continuous text information to the payment server. Afterreceiving the continuous text information, the payment server can parsethe continuous text information by using the parsing method in step 220,obtain the following three pieces of account information: “a@163.com”,“waiter1@163.com”, and “waiter2@163.com”, and recognize, based on apredetermined sorting rule and priority, the three pieces of accountinformation are merchant account information, account information of afirst waiter, and account information of a second waiter.

Step 430: Receive the at least two pieces of account information sent bythe payment server, and display the at least two pieces of accountinformation.

As described in the previous example, after receiving the three piecesof account information, the payment client can display a page as shownin FIG. 5. The page can be displayed by using a display interface, andcan include two areas, a merchant area and a tip area. The merchant areadisplays the merchant account information, and the tip area displaysrelated information of the two waiters by using a drop-down box, forexample, an avatar. The payment client can receive a selectioninstruction from the drop-down box, and send the received selectioninstruction to the payment server. The payment server can uniquelydetermine a target waiter and account information of the target waiter.In addition, the payment server can pre-store a mapping relationshipbetween a target waiter and account information of a target waiter in astorage unit.

Step 440: Determine a payment amount corresponding to each piece ofaccount information based on information entered by a payor.

The information entered by the payor includes: a first payment amountcorresponding to a piece of account information and a proportion of asecond payment amount corresponding to account information other thanthe first payment amount; or the payment amount corresponding to eachpiece of account information.

In FIG. 5, the payment client can receive a payment amount correspondingto the merchant account information through a text box in the merchantarea, and can determine, by using, for example, a radio button in thetip area, whether a payment proportion or a payment amount is entered bythe payor. When an instruction for entering the payment amount isreceived and sent to the payment server, the payment server can directlydetermine the payment amount corresponding to each piece of accountinformation based on a payment amount received from, for example, a textbox corresponding to the payment amount. When an instruction forentering the payment proportion is received and sent to the paymentserver, the payment server can determine the payment amountcorresponding to each piece of account information based on a proportionreceived, for example, from a text box corresponding to the paymentproportion and the payment amount in the merchant area.

In certain applications, the tip area in FIG. 5 may not include theradio button, and a proportional value can be predetermined by thepayment server. When receiving the payment amount that corresponds tothe merchant account information sent by the payment client, the paymentserver can determine the payment amount corresponding to each piece ofaccount information based on the payment amount corresponding to themerchant account information and the predetermined proportion value.Alternatively, when directly receiving the payment amount thatcorresponds to each piece of account information entered by the payor,the payment server can preset a share percentage. That is, a share isdetermined based on a payment amount corresponding to the waiter'saccount and the share percentage. Afterwards, the share can be added tothe payment amount corresponding to the merchant's account to obtain afinal payment amount corresponding to the merchant's account. The sharecan be deducted from the payment amount corresponding to the waiter'saccount to obtain a final payment amount corresponding to the waiter'saccount.

Additionally, when a tip is paid to a plurality of waiters, in anexample, one or more drop-down boxes can be added to a shopping area, asin FIG. 4. Other waiters and account information associated with theother waiters can be determined based on a selection instructionreceived from the one or more added drop-down boxes.

Step 450: Perform a payment operation based on the payment amountcorresponding to each piece of account information.

After determining the payment amount corresponding to each piece ofaccount information, the payment server performs a payment operationbased on the determined payment amount corresponding to each piece ofaccount information or a final payment amount corresponding to eachpiece of account information. Therefore, when account information isobtained by recognizing the target information, at least two pieces ofaccount information are obtained by performing one recognitionoperation, and the payment operation is performed (for example,simultaneously) on the at least two pieces of account information,thereby improving efficiency of performing the payment operation on theat least two pieces of account information.

Corresponding to the information generation method, an implementation ofthe present application further provides an information generationapparatus. As shown in FIG. 6, the generation apparatus includes areceiving unit 601, a combination unit 602, and a generation unit 603.

The receiving unit 601 is configured to receive an informationgeneration instruction entered by a first user, where the informationgeneration instruction includes at least two pieces of user identityinformation.

The combination unit 602 is configured to combine, in a predeterminedmethod, the at least two pieces of user identity information received bythe receiving unit 601, to obtain continuous text information, where theat least two pieces of user identity information in the continuous textinformation are separated by a separation string, and the separationstring is a predefined character or character combination.

The combination unit 602 is configured to: sort the at least two piecesof user identity information based on a predetermined sorting rule; andcombine the sorted at least two pieces of user identity information inthe predetermined method, to obtain the continuous text information.

The generation unit 603 is configured to generate target informationbased on a predetermined algorithm and the continuous text informationobtained by the combination unit 602.

The target information includes image information or sound information.

Functions of each functional module of the apparatus in thisimplementation of the present application can be implemented by usingsteps in the previous method implementations. Therefore, specificworking process of the apparatus provided in the present application isomitted here to avoid duplication.

According to the information generation apparatus provided in thisimplementation of the present application, the receiving unit 601receives the information generation instruction entered by the firstuser, where the information generation instruction includes at least twopieces of user identity information; the combination unit 602 combinesthe at least two pieces of user identity information in thepredetermined method, to obtain the continuous text information, wherethe at least two pieces of user identity information in the continuoustext information are separated by the separation string, and theseparation string is a predefined character or character combination;and the generation unit 603 generates the target information based onthe predetermined algorithm and the continuous text information.Therefore, the target information can include at least two pieces ofuser identity information. This can improve efficiency of obtaining atleast two pieces of user identity information when user identityinformation is obtained by recognizing the target information, therebyimproving efficiency of performing a service operation on at least twopieces of user identity information.

Corresponding to the information acquisition method, an implementationof the present application further provides an information acquisitionapparatus. As shown in FIG. 7, the acquisition apparatus includes arecognition unit 701 and a parsing unit 702.

The recognition unit 701 is configured to recognize pre-generated targetinformation to obtain continuous text information, where the continuoustext information includes at least two pieces of user identityinformation, the at least two pieces of user identity information areseparated by a separation string, and the separation string is apredefined character or character combination.

The parsing unit 702 is configured to parse the continuous textinformation obtained by the recognition unit 701, to obtain the at leasttwo pieces of user identity information.

The parsing unit 702 is configured to: remove the separation string fromthe continuous text information, where continuous text informationobtained after the separation string is removed includes at least twopieces of sub-text information; and use the at least two pieces ofsub-text information as the at least two pieces of user identityinformation.

Functions of each functional module of the apparatus in thisimplementation of the present application can be implemented by usingsteps in the previously described method implementations. Therefore,specific working process of the apparatus provided in the presentapplication is omitted here to avoid duplication.

According to the information acquisition apparatus provided in thisimplementation of the present application, the recognition unit 701recognizes the pre-generated target information to obtain the continuoustext information, where the continuous text information includes atleast two pieces of user identity information, the at least two piecesof user identity information are separated by the separation string, andthe separation string is a predefined character or charactercombination; and the parsing unit 702 parses the continuous textinformation to obtain the at least two pieces of user identityinformation. Therefore, at least two pieces of user identity informationcan be obtained by performing one recognition operation. This canimprove efficiency of obtaining at least two pieces of user identityinformation when user identity information is obtained by recognizingthe target information, thereby improving efficiency of performing aservice operation on at least two pieces of user identity information.

Corresponding to the information processing method, an implementation ofthe present application further provides an information processingapparatus. As shown in FIG. 8, the processing apparatus includes arecognition unit 801, a sending unit 802, a receiving unit 803, and anexecution unit 804.

The recognition unit 801 is configured to recognize pre-generated targetinformation to obtain continuous text information.

The sending unit 802 is configured to send the continuous textinformation obtained by the recognition unit 801 to a server, so thatthe server parses the continuous text information to obtain at least twopieces of user identity information.

The receiving unit 803 is configured to: receive the at least two piecesof user identity information sent by the server, and display the atleast two pieces of user identity information.

The execution unit 804 is configured to perform a correspondingoperation on the at least two pieces of user identity information basedon information entered by a second user.

Functions of each functional module of the apparatus in thisimplementation of the present application can be implemented by usingsteps in the previous method implementations. Therefore, specificworking process of the apparatus provided in the present application isnot described here.

According to the information processing apparatus provided in thisimplementation of the present application, the recognition unit 801recognizes the pre-generated target information to obtain the continuoustext information; the sending unit 802 sends the continuous textinformation to the server, so that the server parses the continuous textinformation to obtain the at least two pieces of user identityinformation; the receiving unit 803 receives the at least two pieces ofuser identity information sent by the server, and displays the at leasttwo pieces of user identity information; and the execution unit 804 isconfigured to perform the corresponding operation on the at least twopieces of user identity information based on the information entered bythe second user. Therefore, when user identity information is obtainedby recognizing the target information, at least two pieces of useridentity information are obtained by performing one recognitionoperation, and a corresponding operation is performed on the at leasttwo pieces of user identity information, thereby improving efficiency ofperforming a service operation on at least two pieces of user identityinformation.

Corresponding to the payment method, an implementation of the presentapplication further provides a payment client. As shown in FIG. 9, thepayment client includes a recognition unit 901, a sending unit 902, areceiving unit 903, a determining unit 904, and an execution unit 905.

The recognition unit 901 is configured to recognize pre-generated targetinformation to obtain continuous text information.

The sending unit 902 is configured to send the continuous textinformation obtained by the recognition unit 901 to a payment server, sothat the payment server parses the continuous text information to obtainat least two pieces of account information.

The receiving unit 903 is configured to: receive the at least two piecesof account information sent by the payment server, and display the atleast two pieces of account information.

The determining unit 904 is configured to determine a payment amountcorresponding to each piece of account information based on informationentered by a payor.

The information entered by the payor includes: a first payment amountcorresponding to a piece of account information and a proportion of asecond payment amount corresponding to other account information to thefirst payment amount; or the payment amount corresponding to each pieceof account information.

The execution unit 905 is configured to perform a payment operationbased on the payment amount that corresponds to each piece of accountinformation and that is determined by the determining unit 904.

Functions of each functional module of the apparatus in thisimplementation of the present application can be implemented by usingsteps in the previous method implementations. Therefore, specificworking process of the apparatus provided in the present application isnot described here.

According to the payment client provided in this implementation of thepresent application, the recognition unit 901 recognizes thepre-generated target information to obtain the continuous textinformation; the sending unit 902 sends the continuous text informationto the payment server, so that the payment server parses the continuoustext information to obtain the at least two pieces of accountinformation; the receiving unit 903 receives the at least two pieces ofaccount information sent by the payment server, and displays the atleast two pieces of account information; the determining unit 904determines the payment amount corresponding to each piece of accountinformation based on the information entered by the payor; and theexecution unit 905 performs the payment operation based on the paymentamount corresponding to each piece of account information. Therefore,when account information is obtained by recognizing the targetinformation, at least two pieces of account information are obtained byperforming one recognition operation, and the payment operation isperformed (for example, simultaneously) on the at least two pieces ofaccount information, thereby improving efficiency of performing thepayment operation on the at least two pieces of account information.

A person skilled in the art can be further aware that, in combinationwith the examples described in the implementations disclosed in thepresent specification, objects and algorithm steps can be implemented byelectronic hardware, computer software, or a combination of theelectronic hardware and the computer software. To describe theinterchangeability between the hardware and the software, the previoushas generally described structure and steps of each example based onfunctions. Whether the functions are performed by hardware or softwaredepends on particular applications and design constraint conditions ofthe technical solutions. A person skilled in the art can use differentmethods to implement the described functions for each particularapplication, but it should not be considered that the implementationgoes beyond the scope of the present application.

Steps of methods or algorithms described in the implementationsdisclosed in this specification can be implemented by hardware, asoftware module executed by a processor, or a combination of thehardware and the software module. The software module can reside in arandom access memory (RAM), a memory, a read-only memory (ROM), anelectrically programmable ROM, an electrically erasable programmableROM, a register, a hard disk, a removable disk, a CD-ROM, or any otherform of storage medium known in the art.

In the previous detailed descriptions, the objective, technicalsolutions, and benefits of the present application are further describedin detail. It should be understood that the previous descriptions aremerely implementations of the present application, but are not intendedto limit the protection scope of the present application. Anymodification, equivalent replacement, or improvement made withoutdeparting from the spirit and principle of the present applicationshould fall within the protection scope of the present application.

FIG. 10 is a flowchart illustrating an example of a computer-implementedmethod 1000 for generating information including two or more pieces ofuser identity information associated with two or more different users,according to an implementation of the present disclosure. For clarity ofpresentation, the description that follows generally describes method1000 in the context of the other figures in this description. However,it will be understood that method 1000 can be performed, for example, byany system, environment, software, and hardware, or a combination ofsystems, environments, software, and hardware, as appropriate. In someimplementations, various steps of method 1000 can be run in parallel, incombination, in loops, or in any order.

At 1005, an instruction to generate target information is received by aserver and from a first user. The instruction includes two or morepieces of user identity information associated with two or moredifferent users. For example, each user identity information is for adifferent user. The target information can be used by the first user asinformation that provides two or more pieces of user identityinformation to others. The target information can include at least oneof image information (such as a QR code) and sound information (such asa sound wave). In some implementations, the two or more pieces of useridentity information includes user identity information associated withthe first user and user identity information associated with one or moreuser different from the first user. Each user identity information caninclude account information, account number information, bank cardnumber information, or other information that can identify a particularuser.

In some implementations, the first user is a payee (such as abusiness/merchant) expecting a payment from a payor (such as a customerof the business). To facilitate a payment transaction, the first usercan instruct the server (such as a payment server) to generate targetinformation that the payor can use to perform the payment transaction.Additionally and in some implementations, the payor may be required toonly perform a single recognition operation (such as, scanning thetarget information) in order to make payments to multiple accounts. Forexample, the first user can edit account information in “AccountDetails” of the first user's account to add other account informationdifferent from the first user's account information. In some cases, thesystem can provide an option (such as “Generate a QR code”) for thefirst user to add multiple pieces of account information. After accountinformation is edited, an instruction to generate target information istriggered when, for example, an “OK” button is clicked. From 1005,method 1000 proceeds to 1010.

At 1010, the two or more pieces of user identity information arecombined, by the server and in a predetermined method, into continuoustext information. The two or more pieces of user identity information inthe continuous text information are separated by one or more separationstring. For example, the server can automatically place a separationstring between two pieces of user identity information that are next toeach other in the continuous text information. In some implementations,each separation string is a predefined character or a predefinedcombination of characters that are not used to form the user identityinformation (such as, “#”, “*”, “< >”, or “(*)”).

In some implementations, the predetermined method is based on at leastpriorities of the two or more pieces of user identity information. Forexample, the server can combine the two or more pieces of user identityinformation into the continuous text information in an order that isbased on the priorities of the two or more pieces of user identityinformation. For example, if the two or more pieces of user identityinformation includes “a@163.com” (such as, merchant account information)and “waiter1@163.com” (such as, waiter account information), the servercan sort the two or more pieces of user identity information first, andput “a@163.com” before “waiter1@163.com” if “a@163.com” has a higherpriority than “waiter1@163.com”. Next, the server can “combinea@163.com” and “waiter1@163.com” into continuous text information (suchas, “a@163.com#waiter1@163.com”). From 1010, method 1000 proceeds to1015.

At 1015, the target information is generated, by the server, based on atleast a predetermined algorithm and the continuous text information. Insome implementations, if the requested target information is a QR code,the predetermined algorithm can be an algorithm that generates a QRcode. If the requested target information is a sound wave, thepredetermined algorithm can be an algorithm that encodes the continuoustext information and converts the encoded continuous text informationinto signals on corresponding sound frequencies. For example, thepredetermined algorithm can encode the continuous text information intooctal data. Eight different sound frequencies represent 0 to 7 in theoctal data. Then, the predetermined algorithm can convert the encodedoctal data into signals on corresponding sound frequencies.

In some implementations, once the target information is generated, thetarget information is transmitted by the server and to the first user.The first user can use the target information as information thatprovides two or more pieces of user identity information to others. Forexample, the first user can provide the target information to a customerusing a mobile device (such as, displaying a QR code for the customer toscan). The customer can use a client application installed on the mobiledevice to recognize the continuous text information from the targetinformation. In addition, by automatically removing one or moreseparation string in the continuous text information, the clientapplication can obtain two or more pieces of sub-text information, whichthe client application considers as the two or more pieces of useridentity information. Therefore, by performing a single recognitionoperation, instead of multiple recognition operations, the clientapplication can obtain two or more pieces of user identity information.For example, if the recognized continuous text information is“a@163.com#waiter1@163.com”, by automatically removing the “#”, twopieces of user identity information, “a@163.com” and “waiter1@163.com”,are obtained.

In some implementations, once the client application recognizes thecontinuous text information from the target information, the clientapplication can transmit the continuous text information to the serverfor phasing the continuous text information. For example, the server canautomatically remove one or more separation string in the continuoustext information to obtain two or more pieces of sub-text information.The two or more pieces of sub-text information can then be transmittedto the client application by the server. In response to receiving thetwo or more pieces of sub-text information, the client application canuse the two or more pieces of sub-text information as the two or morepieces of user identity information.

In some implementations, after the client application obtains the two ormore pieces of user identity information, the client application candisplay the two or more pieces of user identity information on themobile device associated with the client application. A second user,such as a customer, can input information on the mobile device for thedisplayed two or more pieces of user identity information. In responseto the second user input, the client application can performcorresponding operations on the two or more pieces of user identityinformation based on the second user input.

In some implementations, the server is a payment server, the clientapplication is a payment client application associated with the paymentserver, the first user is a payee (such as a business/merchant), and thesecond user is a payor (such as a customer of the business). Thebusiness expects a payment from the customer through the payment system.The payment is to the business and one or more additional user (such as,an employee of the business). To facilitate the payment transaction, thepayment server can automatically generate, for example, a QR code thatincludes account information of the business and account information ofthe one or more employee (such as waiter or waitress) in response toreceiving an instruction from the business. The customer can scan the QRcode provided by the business to obtain the account information of thebusiness and the account information of the one or more employee. Themultiple pieces of account information can be displayed automatically,for example, on a mobile device, so that the customer can make paymentsto corresponding accounts in a single operation. For example, a customercan make a direct payment to a restaurant and a direct payment to awaiter serving the customer by scanning a single QR code to obtainaccount information of both the restaurant and the waiter, instead ofscanning two QR codes, one for obtaining account information of therestaurant and the other for obtaining account information of thewaiter. In other words, the waiter receives a payment to the waiter'saccount directly from the customer, not indirectly through therestaurant. After 1015, method 1000 stops.

A user can use application software installed on a mobile device torecognize account information to, for example, make a mobile payment.Normally, a single recognition operation can recognize a single piece ofaccount information associated with a single account. As a result,multiple recognition operations are required to recognize multiplepieces of account information associated with multiple differentaccounts and to make payments to the multiple different accounts. Thesubject matter described in this specification can be used to generatetarget information that include multiple pieces of user identityinformation (such as account information). For example, multiple piecesof user identity information can be combined into continuous textinformation to generate the target information. Two pieces of useridentity information that are next to each other in the continuous textinformation are separated by a separation string. As a result, targetinformation that includes multiple pieces of user identity informationcan be generated. In doing so, a user can use application softwareinstalled on a mobile device to obtain multiple pieces of user identityinformation by performing a single recognition operation on the targetinformation, thereby improving operation efficiency on the multiplepieces of user identity information and user experience when using theapplication software, for example, to make payments to multipledifferent accounts associated with the multiple pieces of user identityinformation.

Embodiments and the operations described in this specification can beimplemented in digital electronic circuitry, or in computer software,firmware, or hardware, including the structures disclosed in thisspecification or in combinations of one or more of them. The operationscan be implemented as operations performed by a data processingapparatus on data stored on one or more computer-readable storagedevices or received from other sources. A data processing apparatus,computer, or computing device may encompass apparatus, devices, andmachines for processing data, including by way of example a programmableprocessor, a computer, a system on a chip, or multiple ones, orcombinations, of the foregoing. The apparatus can include specialpurpose logic circuitry, for example, a central processing unit (CPU), afield programmable gate array (FPGA) or an application-specificintegrated circuit (ASIC). The apparatus can also include code thatcreates an execution environment for the computer program in question,for example, code that constitutes processor firmware, a protocol stack,a database management system, an operating system (for example anoperating system or a combination of operating systems), across-platform runtime environment, a virtual machine, or a combinationof one or more of them. The apparatus and execution environment canrealize various different computing model infrastructures, such as webservices, distributed computing and grid computing infrastructures.

A computer program (also known, for example, as a program, software,software application, software module, software unit, script, or code)can be written in any form of programming language, including compiledor interpreted languages, declarative or procedural languages, and itcan be deployed in any form, including as a stand-alone program or as amodule, component, subroutine, object, or other unit suitable for use ina computing environment. A program can be stored in a portion of a filethat holds other programs or data (for example, one or more scriptsstored in a markup language document), in a single file dedicated to theprogram in question, or in multiple coordinated files (for example,files that store one or more modules, sub-programs, or portions ofcode). A computer program can be executed on one computer or on multiplecomputers that are located at one site or distributed across multiplesites and interconnected by a communication network.

Processors for execution of a computer program include, by way ofexample, both general- and special-purpose microprocessors, and any oneor more processors of any kind of digital computer. Generally, aprocessor will receive instructions and data from a read-only memory ora random-access memory or both. The essential elements of a computer area processor for performing actions in accordance with instructions andone or more memory devices for storing instructions and data. Generally,a computer will also include, or be operatively coupled to receive datafrom or transfer data to, or both, one or more mass storage devices forstoring data. A computer can be embedded in another device, for example,a mobile device, a personal digital assistant (PDA), a game console, aGlobal Positioning System (GPS) receiver, or a portable storage device.Devices suitable for storing computer program instructions and datainclude non-volatile memory, media and memory devices, including, by wayof example, semiconductor memory devices, magnetic disks, andmagneto-optical disks. The processor and the memory can be supplementedby, or incorporated in, special-purpose logic circuitry.

Mobile devices can include handsets, user equipment (UE), mobiletelephones (for example, smartphones), tablets, wearable devices (forexample, smart watches and smart eyeglasses), implanted devices withinthe human body (for example, biosensors, cochlear implants), or othertypes of mobile devices. The mobile devices can communicate wirelessly(for example, using radio frequency (RF) signals) to variouscommunication networks (described below). The mobile devices can includesensors for determining characteristics of the mobile device's currentenvironment. The sensors can include cameras, microphones, proximitysensors, GPS sensors, motion sensors, accelerometers, ambient lightsensors, moisture sensors, gyroscopes, compasses, barometers,fingerprint sensors, facial recognition systems, RF sensors (forexample, Wi-Fi and cellular radios), thermal sensors, or other types ofsensors. For example, the cameras can include a forward- or rear-facingcamera with movable or fixed lenses, a flash, an image sensor, and animage processor. The camera can be a megapixel camera capable ofcapturing details for facial and/or iris recognition. The camera alongwith a data processor and authentication information stored in memory oraccessed remotely can form a facial recognition system. The facialrecognition system or one-or-more sensors, for example, microphones,motion sensors, accelerometers, GPS sensors, or RF sensors, can be usedfor user authentication.

To provide for interaction with a user, embodiments can be implementedon a computer having a display device and an input device, for example,a liquid crystal display (LCD) or organic light-emitting diode(OLED)/virtual-reality (VR)/augmented-reality (AR) display fordisplaying information to the user and a touchscreen, keyboard, and apointing device by which the user can provide input to the computer.Other kinds of devices can be used to provide for interaction with auser as well; for example, feedback provided to the user can be any formof sensory feedback, for example, visual feedback, auditory feedback, ortactile feedback; and input from the user can be received in any form,including acoustic, speech, or tactile input. In addition, a computercan interact with a user by sending documents to and receiving documentsfrom a device that is used by the user; for example, by sending webpages to a web browser on a user's client device in response to requestsreceived from the web browser.

Embodiments can be implemented using computing devices interconnected byany form or medium of wireline or wireless digital data communication(or combination thereof), for example, a communication network. Examplesof interconnected devices are a client and a server generally remotefrom each other that typically interact through a communication network.A client, for example, a mobile device, can carry out transactionsitself, with a server, or through a server, for example, performing buy,sell, pay, give, send, or loan transactions, or authorizing the same.Such transactions may be in real time such that an action and a responseare temporally proximate; for example an individual perceives the actionand the response occurring substantially simultaneously, the timedifference for a response following the individual's action is less than1 millisecond (ms) or less than 1 second (s), or the response is withoutintentional delay taking into account processing limitations of thesystem.

Examples of communication networks include a local area network (LAN), aradio access network (RAN), a metropolitan area network (MAN), and awide area network (WAN). The communication network can include all or aportion of the Internet, another communication network, or a combinationof communication networks. Information can be transmitted on thecommunication network according to various protocols and standards,including Long Term Evolution (LTE), 5G, IEEE 802, Internet Protocol(IP), or other protocols or combinations of protocols. The communicationnetwork can transmit voice, video, biometric, or authentication data, orother information between the connected computing devices.

Features described as separate implementations may be implemented, incombination, in a single implementation, while features described as asingle implementation may be implemented in multiple implementations,separately, or in any suitable sub-combination. Operations described andclaimed in a particular order should not be understood as requiring thatthe particular order, nor that all illustrated operations must beperformed (some operations can be optional). As appropriate,multitasking or parallel-processing (or a combination of multitaskingand parallel-processing) can be performed.

What is claimed is:
 1. A computer-implemented method, comprising:receiving, by a server and from a first user, an instruction to generatetarget information, wherein the instruction includes two or more piecesof user identity information associated with two or more differentusers; combining, by the server and in a predetermined method, the twoor more pieces of user identity information into continuous textinformation, wherein the two or more pieces of user identity informationin the continuous text information are separated by one or moreseparation strings; and generating, by the server, the targetinformation based on at least a predetermined algorithm and thecontinuous text information.
 2. The computer-implemented method of claim1, wherein the two or more pieces of user identity information areassociated with the first user and one or more users different from thefirst user, and user identity information associated with eachparticular user includes at least one of account information, accountnumber information, and bank card number information associated with theparticular user.
 3. The computer-implemented method of claim 1, whereinthe predetermined method combines the two or more pieces of useridentity information into the continuous text information in an orderthat is based on at least priorities of the two or more pieces of useridentity information.
 4. The computer-implemented method of claim 1,wherein each separation string is a predefined character or a predefinedcombination of characters.
 5. The computer-implemented method of claim1, wherein the target information includes at least one of imageinformation and sound information.
 6. The computer-implemented method ofclaim 1, further comprising: transmitting, by the server and to thefirst user, the target information; obtaining, by a client application,the continuous text information from the target information provided bythe first user; and obtaining, by the client application, the two ormore pieces of user identity information from the continuous textinformation.
 7. The computer-implemented method of claim 6, whereinobtaining, by the client application, the two or more pieces of useridentity information from the continuous text information comprises:removing, by the client application, one or more separation string inthe continuous text information to obtain two or more pieces of sub-textinformation; and using, by the client application, the two or morepieces of sub-text information as the two or more pieces of useridentity information.
 8. The computer-implemented method of claim 6,wherein obtaining, by the client application, the two or more pieces ofuser identity information from the continuous text informationcomprises: transmitting, by the client application and to the server,the continuous text information; removing, by the server, one or moreseparation string in the continuous text information to obtain two ormore pieces of sub-text information; transmitting, by the server and tothe client application, the two or more pieces of sub-text information;and using, by the client application, the two or more pieces of sub-textinformation as the two or more pieces of user identity information. 9.The computer-implemented method of claim 8, further comprising:displaying, by the client application and on a mobile device associatedwith the client application, the two or more pieces of user identityinformation; and performing, by the client application and based oninformation entered by a second user on the mobile device, correspondingoperations on the two or more pieces of user identity information. 10.The computer-implemented method of claim 9, wherein the server is apayment server, the client application is a payment client applicationassociated with the payment server, the first user is a payee or abusiness, and the second user is a payor or a customer of the business.11. A non-transitory, computer-readable medium storing one or moreinstructions executable by a computer system to perform operationscomprising: receiving, by a server and from a first user, an instructionto generate target information, wherein the instruction includes two ormore pieces of user identity information associated with two or moredifferent users; combining, by the server and in a predetermined method,the two or more pieces of user identity information into continuous textinformation, wherein the two or more pieces of user identity informationin the continuous text information are separated by one or moreseparation strings; and generating, by the server, the targetinformation based on at least a predetermined algorithm and thecontinuous text information.
 12. The non-transitory, computer-readablemedium of claim 11, wherein the two or more pieces of user identityinformation are associated with the first user and one or more usersdifferent from the first user, and user identity information associatedwith each particular user includes at least one of account information,account number information, and bank card number information associatedwith the particular user.
 13. The non-transitory, computer-readablemedium of claim 11, wherein the predetermined method combines the two ormore pieces of user identity information into the continuous textinformation in an order that is based on at least priorities of the twoor more pieces of user identity information.
 14. The non-transitory,computer-readable medium of claim 11, wherein each separation string isa predefined character or a predefined combination of characters. 15.The non-transitory, computer-readable medium of claim 11, wherein thetarget information includes at least one of image information and soundinformation.
 16. The non-transitory, computer-readable medium of claim11, the operations further comprising: transmitting, by the server andto the first user, the target information; obtaining, by a clientapplication, the continuous text information from the target informationprovided by the first user; and obtaining, by the client application,the two or more pieces of user identity information from the continuoustext information.
 17. The non-transitory, computer-readable medium ofclaim 16, wherein obtaining, by the client application, the two or morepieces of user identity information from the continuous text informationcomprises: removing, by the client application, one or more separationstring in the continuous text information to obtain two or more piecesof sub-text information; and using, by the client application, the twoor more pieces of sub-text information as the two or more pieces of useridentity information.
 18. The non-transitory, computer-readable mediumof claim 16, wherein obtaining, by the client application, the two ormore pieces of user identity information from the continuous textinformation comprises: transmitting, by the client application and tothe server, the continuous text information; removing, by the server,one or more separation string in the continuous text information toobtain two or more pieces of sub-text information; transmitting, by theserver and to the client application, the two or more pieces of sub-textinformation; and using, by the client application, the two or morepieces of sub-text information as the two or more pieces of useridentity information.
 19. The non-transitory, computer-readable mediumof claim 18, the operations further comprising: displaying, by theclient application and on a mobile device associated with the clientapplication, the two or more pieces of user identity information; andperforming, by the client application and based on information enteredby a second user on the mobile device, corresponding operations on thetwo or more pieces of user identity information.
 20. Acomputer-implemented system, comprising: one or more computers; and oneor more computer memory devices interoperably coupled with the one ormore computers and having tangible, non-transitory, machine-readablemedia storing one or more instructions that, when executed by the one ormore computers, perform one or more operations comprising: receiving, bya server and from a first user, an instruction to generate targetinformation, wherein the instruction includes two or more pieces of useridentity information associated with two or more different users;combining, by the server and in a predetermined method, the two or morepieces of user identity information into continuous text information,wherein the two or more pieces of user identity information in thecontinuous text information are separated by one or more separationstrings; and generating, by the server, the target information based onat least a predetermined algorithm and the continuous text information.