CN108509788A - Information sharing method and device, computer readable storage medium, terminal - Google Patents

Information sharing method and device, computer readable storage medium, terminal Download PDF

Info

Publication number
CN108509788A
CN108509788A CN201810270230.8A CN201810270230A CN108509788A CN 108509788 A CN108509788 A CN 108509788A CN 201810270230 A CN201810270230 A CN 201810270230A CN 108509788 A CN108509788 A CN 108509788A
Authority
CN
China
Prior art keywords
user
space
data information
application message
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810270230.8A
Other languages
Chinese (zh)
Other versions
CN108509788B (en
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810270230.8A priority Critical patent/CN108509788B/en
Publication of CN108509788A publication Critical patent/CN108509788A/en
Priority to PCT/CN2019/075388 priority patent/WO2019184617A1/en
Application granted granted Critical
Publication of CN108509788B publication Critical patent/CN108509788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application involves a kind of information sharing methods and device, computer readable storage medium, terminal.This method, is applied to the system at least two user's spaces, and at least two user's space belongs to different use roles;The method includes:The application message and data information for belonging at least two user's spaces in acquisition system;The application message and data information are subjected to security level filing;Application message and data information that meet shared security level and belonging to second user space are provided according to trigger condition in the first user's space.It can either realize the shared of quickly application and data, and can accomplish necessary data and permission isolation, while the shelf space of data can also be saved.

Description

Information sharing method and device, computer readable storage medium, terminal
Technical field
This application involves field of terminal technology, more particularly to a kind of information sharing method and device, computer-readable deposit Storage media, terminal.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc. Different demands.
Currently, a variety of user modes can be arranged so that multiple users use same terminal in terminal.Opening new be mostly used When the space of family, due to being isolated for space and permission, user need to re-create contact person, using etc. data, using trouble, user It experiences low.
Invention content
A kind of information sharing method of the embodiment of the present application offer and device, computer readable storage medium, terminal, to realize The quickly shared and necessary data and permission isolation of application and data.
A kind of information sharing method, is applied to the system at least two user's spaces, and at least two user is empty Between belong to different and use role;The method includes:
The application message and data information for belonging at least two user's spaces in acquisition system;
The application message and data information are subjected to security level filing;
It is provided in the first user's space according to trigger condition meeting shared security level and belongs to second user space Application message and data information.
A kind of information sharing apparatus, is applied to the system at least two user's spaces, and at least two user is empty Between belong to different and use role;It is characterized in that, described device includes:
Data obtaining module, for the application message sum number for belonging at least two user's spaces in acquisition system it is believed that Breath;
Safe profiling module, for the application message and data information to be carried out security level filing;
Shared processing module, provided in first user's space according to trigger condition meet shared security level, And belong to the application message and data information in second user space.
A kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of the method in each embodiment of the application is realized when being executed by processor.
A kind of terminal, including memory, processor and storage are on a memory and the computer that can run on a processor Program, which is characterized in that the processor realizes the side in each embodiment of the application when executing the computer program The step of method.
Information sharing method and device that the embodiment of the present application is provided, computer readable storage medium, terminal, can will The application message and data information for belonging to multiple user's spaces are shared, and carry out privacy by the way of security level filing Control can either realize the shared of quickly application and data, and can accomplish necessary data and permission isolation, while can also Enough save the shelf space of data.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 2 is the flow chart of information sharing method in one embodiment;
Fig. 3 is the process chart that security level filing is carried out in one embodiment;
Fig. 4 is that the application message and data for belonging to second user space are provided in the first user's space in one embodiment The process chart of information;
Fig. 5 is that the application message sum number for belonging to second user space is provided in the first user's space in another embodiment It is believed that the process chart of breath;
Fig. 6 is that the application message sum number for belonging to second user space is provided in the first user's space in further embodiment It is believed that the process chart of breath;
Fig. 7 is the structure diagram of the information sharing apparatus of an embodiment;
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements, But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes It says, without departing from the scope of the invention, the first user's space can be known as second user space, and similarly, Second user space can be known as to the first user's space.First user's space and second user space both user's space, But it is not same user's space.
In one embodiment, as shown in Figure 1, providing a kind of internal structure schematic diagram of terminal.The terminal includes logical Cross processor, memory and the display screen of system bus connection.Wherein, the processor is for providing calculating and control ability, branch Support the operation of entire terminal.Memory for storing data, program, and/or instruction code etc., stored on memory at least one Computer program, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for terminal Information sharing method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-easily The property lost storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database And computer program.A kind of information sharing method phase provided for realizing above each embodiment is provided in the database The data of pass, for example default processing strategy or default verification information can be stored etc..The computer program can performed by processor, For realizing a kind of information sharing method that each embodiment of the application is provided.Built-in storage is non-volatile memory medium In operating system, database and computer program the running environment of cache is provided.Display screen can be touch screen, such as For capacitance plate or electrical screen, it to be used for the interface information of display terminal.The terminal can be mobile phone, tablet computer or individual digital Assistant or Wearable etc..
Information sharing method in the present embodiment is described for running in terminal.Described information sharing method Applied to the system at least two user's spaces, at least two user's space belongs to different use roles.
In the application, system refers to the operating system of terminal.The operating system provides the function in multi-user or more spaces, makes A terminal can open up multiple spaces by multiple user time-sharings use or a user under different situations enter not Same space uses.By not distinguishing multiple spaces of the space of different user and same user are collectively referred to as in the application User's space.When same user uses different user's spaces, it is also considered as it and uses role with different.Use situation packet It includes but is not limited to:
One terminal has more than two users, each with opening a user for belonging to itself in systems per family Space, such as children's spatial, visitor space etc.;One terminal only has there are one user, which opens in systems belongs to In the more than two user's spaces of itself, such as the principal space and private space;One terminal has more than two users, often It is a with opening a user's space for belonging to itself in systems per family, and wherein at least one user also additionally has one A one's own private space.
It is understood that in the scheme of traditional multi-user or more spaces, needed into line number between two user's spaces According to the isolation with permission, to prevent the use of multiple user's spaces from interfering with each other.Therefore inevitably there is the letter of multiple user's spaces Breath repeats.
For the system in multi-user or more spaces is provided, user when first used, in system it is general only there are one Space (commonly referred to as owner space is used to owner, has highest permission).When need to multi-user use or open up more Space is in use, need to create user's space in systems.Other than owner space, there is life in other user's spaces Period, the life cycle start from establishment, destroy finally.Between establishment and destruction is then the survival stage.
When creating user's space, system is that newly-built user's space distributes memory space, prepares running environment, wherein wrapping Offer system application and service is provided.Herein on basis, in user's space, system application can be both used, can also be downloaded It is applied with new tripartite is installed, and preserves the data of the user using the user's space.Wherein, with new tripartite using relevant Information is known as application message, and data related to user are known as data information.It should be noted that data information is either needle Can also be the data applied for tripartite, such as wechat data to the data of system application, such as contact data.
In the survival stage of user's space, with the use of user, application message and data information all can constantly become Change.Such as contact number gradually increases, wechat chat record gradually increases.
When destroying user's space, by the application deleted in user's space and data and it is released to its storage sky distributed Between.
The information sharing method of one embodiment of the application is as shown in Fig. 2, including step 202 to step 206.
Step 202:The application message and data information for belonging at least two user's spaces in acquisition system.It is described at least Two user's spaces can refer to all user's spaces in system.It may also mean that the user for only relating to information sharing is empty Between.The application message and data information of at least two user's space are maintained in the memory space distributed for the user's space In.The application message and data information for belonging to the user's space can be got from the memory space of each user's space.With Whether family space does not influence to read application message sum number from memory space in front stage operation, running background or not running It is believed that breath.
Step 204:The application message and data information are subjected to security level filing.What each user's space had answers With different with data, the demand for security that owning user is applied to data is different, all influences application message and data information It is shared.For example, owner space is after using a very long time, number of applications and personal data thereon is all more, this If when create new user's space, more may be to have some applications and data that cannot share.For this purpose, the side of the application The application message of each user's space and data information are carried out security level filing by method, to differentiate application message sum number it is believed that Breath shares security level.In some embodiments, the security level include at least indicate the sharing level that can share and Indicate the privately owned rank that cannot be shared.
Step 206:It is provided in first user's space meeting shared security level and belonged to according to trigger condition The application message and data information in second user space.This step can indicate the application message of at least one user's space and Data information is supplied to the first user's space, i.e. other users space except some first user's space to be referred to as second user Space.This step can also indicate repeatedly to be supplied to the first user empty the application message in second user space and data information Between.
Trigger condition is generally related to shared demand.When creating a user's space, system is usually only distributed necessary System applies (such as phone contacts), and (such as wechat) is applied without tripartite, and system application is also without user data.Therefore it should Trigger condition can be when a user's space creates completion.When a user's space is newly-built, automatically by other users sky Between application message and the data information user's space that is supplied to this newly-built.For example, by owner space application and data When meeting shared security level, the wechat in owner space is applied and contact number list is supplied to the children newly created empty Between, private space or visitor space etc..
Trigger condition can also be to be generated under other situations, same after owner space is downloaded and installs certain application When user enters private space, the shared of the application in owner space can be actively initiated by user, without in privacy It is downloaded again in space.It is appreciated that trigger condition can also include other similar conditions.
Meet the safety after filing of application message and data information that shared security level refers to second user space Rank meets the condition for being shared to the first user's space.For example, creating a use except owner space (second user space) Behind family space (the first user's space), application message and data information in owner space (second user space) are all pacified Full rank filing.For simplest situation, exactly it is determined which application message and data information can be shared, which is not It can be shared.After the completion of user's space (the first user's space) is newly-built, it can be shared in owner space (second user space) Application message and data information are provided to newly-built user's space (the first user's space).
In other situations, application message and data information can also have multiple sharing levels in owner space, when shared When rank higher, the lower user's space of permission can obtain shared;When sharing level is lower, the higher user's space of permission It can obtain shared.Or certain shared security levels only allow designated user's space access.The realization method of the application is unlimited In above-mentioned.
Above- mentioned information sharing method can share the application message for belonging to multiple user's spaces and data information, And privacy control is carried out by the way of security level filing, it can either realize the shared of quickly application and data, and can be with Accomplish necessary data and permission isolation, while the shelf space of data can also be saved.
In some embodiments, described information sharing method is realized using the service (Service) in system, each user The service is called to realize information sharing in space.Mode based on service can be such that this method resides in system and run, and make For a publicly-owned service so that at runtime, each user's space can call system, and also be easy to obtain each use The permission of the memory space in family space facilitates the application message and data information for reading user's space.
In some embodiments, as shown in figure 3, described carry out security level filing by the application message and data information The step of, i.e., above-mentioned steps 202 may include:
Step 302:Under each user's space, security level mark of the user to the application message and data information is obtained Note.The security level label includes at least:It indicates the shared label that can be shared and indicates the privately owned label that cannot be shared.It should Security level label can be that system is to apply the attribute with data addition can be by this under different use conditions Attribute is rewritten to change using the attribute with data.Such as by the attribute definition be whether the Boolean that can be shared, when When the attribute value is true, expression can be shared;When the attribute value is fictitious time, expression cannot be shared.In other embodiments, safety Level flag can also include multiple, and can other than indicating share, being also represented by can be shared by the user's space of what permission. At this point, the attribute definition is the enumeration type with multiple fixed values.It can be by user to the application message in its user's space It is specified with the security level label of data information.
Security level label can not also use the mode of addition attribute to realize, and be realized by the way of mapping table.Example Correspondence as security level and application message, the unique mark of data information are written in the mapping table.
Step 304:Security level filing is carried out to the application message and data information according to security level label. The purpose of filing is to facilitate the application message of same security level and data information carrying out qualified use.
It, will be with same alike result value by reading attributes value for being added to the application message and data information of attribute Application message and data information are filed.For realizing the application message sum number of security level label by way of mapping table It is believed that breath, can safeguard the table of multiple different safety class.It can be with the same security level of aggregating storing under classifying at one The unique mark of application message and data information.
By above-mentioned processing, all application messages and data information that obtain in step 202 all have determining safety Rank.When shared, so that it may to be carried out meeting the shared of shared security level condition according to security level.
In some embodiments, as shown in figure 4, it is described provided in the first user's space according to trigger condition meet it is shared Security level and belong to second user space application message and data information the step of,For realizing data sharing, but answer With need not migrate.I.e. above-mentioned steps 206 may include:
Step 402:Belong to the application message and data information in second user space described in reading.Belong to second user space Application message and data information be stored in the corresponding memory space in second user space.Whether second user space is on foreground Operation, running background or not running do not influence to read application message and data information from memory space.Work as second user In front stage operation or running background, application message and data information may change at any time in space, when trigger condition meets, Obtain newest application message and data information.When second user space not running, at any time obtain application message and Data information.
When obtaining application message and data information, the shared security level condition met is needed.Symbol can only be got Amount to application message and data information that enjoy security level condition and belonging to second user space.
Step 404:The data information for belonging to second user space is applied to identical answering in the first user's space With.When tripartite's application carries out data sharing, the data information for belonging to second user space is applied to the phase of the first user's space With application.Such as by the wechat chat record in owner space for newly-built private space.But the wechat chat note of private space Record only preserves and private space, will there is a common wechat chat record in such whole system, can be in owner space quilt It reads, can be also read in private space.The memory space of data is saved, while being also convenient for owner and being checked in private space All chat records.
When system application carries out data sharing, with tripartite using similar.Such as by the contact number list in owner space It is used for second user for a newly-built user's space, there is no need to second users to re-type a contact at this time People can quickly obtain All Contacts and save memory space.
In some embodiments, as shown in figure 5, it is described provided in the first user's space according to trigger condition meet it is shared Security level and belong to second user space application message and data information the step of,For realizing data sharing, and answer With migration, i.e. above-mentioned steps 206 may include:
Step 502:Belong to the application message and data information in second user space described in reading.Belong to second user space Application message and data information be stored in the corresponding memory space in second user space.Whether second user space is on foreground Operation, running background or not running do not influence to read application message and data information from memory space.Work as second user In front stage operation or running background, application message and data information may change at any time in space, when trigger condition meets, Obtain newest application message and data information.When second user space not running, at any time obtain application message and Data information.
When obtaining application message and data information, the shared security level condition met is needed.Symbol can only be got Amount to application message and data information that enjoy security level condition and belonging to second user space.
Step 504:The application message for belonging to second user space and data information are migrated into the first space.
When tripartite's application carries out data sharing, the data information for belonging to second user space is applied to the first user's space Same application.Such as by the wechat chat record in owner space for newly-built private space.But the wechat of private space is chatted Its record only preserves and private space, will there is a common wechat chat record in such whole system, can be in owner's sky Between be read, can be also read in private space.The memory space of data is saved, while being also convenient for owner in private space Check all chat records.When system application carries out data sharing, with tripartite using similar.Such as by the contact in owner space People's list of numbers is used for a newly-built user's space for second user, and there is no need to second users to record again at this time Enter a contact person, can quickly obtain All Contacts and saves memory space.
Usually, system application inherently belongs to system level, has the characteristic that can be shared.Therefore system application is not required to It migrates, it is only necessary to carry out data sharing or Data Migration.Tripartite's application will use in multiple user's spaces, can only be every A user's space is installed and is downloaded.In the application, in such a way that application message is shared, may be implemented application message with Migration between the space of family.The migration includes several situations, first, it is transferred to the first user's space completely from second user space, Do not retain application message and data information in second user space;Second is that from second user space replication application information and data In information to the first user's space;Third, from second user space replication application information, data information then shares.
In some embodiments, as shown in fig. 6, it is described provided in the first user's space according to trigger condition meet it is shared Security level and belong to second user space application message and data information the step of,For realizing data sharing, and have The application of selection and Data Migration, i.e. above-mentioned steps 206 may include:
Step 602:Belong to the application message and data information in second user space described in reading.Belong to second user space Application message and data information be stored in the corresponding memory space in second user space.Whether second user space is on foreground Operation, running background or not running do not influence to read application message and data information from memory space.Work as second user In front stage operation or running background, application message and data information may change at any time in space, when trigger condition meets, Obtain newest application message and data information.When second user space not running, at any time obtain application message and Data information.
When obtaining application message and data information, the shared security level condition met is needed.Symbol can only be got Amount to application message and data information that enjoy security level condition and belonging to second user space.
Step 604:Belong to the application message in second user space and the list of data information described in displaying.It will be in step The application message and data information obtained in 602 shows user in the form of a list, and provides selection.As previously mentioned, step 206 can indicate the application message of at least one user's space and data information being supplied to the first user's space, i.e., some Other users space except one user's space is referred to as second user space.Step 206 can also be indicated second user sky Between application message and data information be repeatedly supplied to the first user's space.
After the application message and data information for obtaining multiple user's spaces, it is necessary to the first user's space is supplied to carry out Selection.The mark easily recognized in application message, such as the icon of application can be shown in list.The expression of data information then may be used With including informative abstract, the last renewal time, the occupied space size of information etc..
Step 606:In the first user's space, selection needs migrate from the list application and data.The selection May include:It individually selects the application to be migrated, individually select data, the simultaneous selection to be migrated the application sum number to be migrated According to.For example, only migrating required application in newly-built private space, data are by the way of sharing.For another example by owner The private data in space moves in private space.For another example for a kind of more parts of data applied in multiple user's spaces, It is newest because migrating a copy of it.Selection mode is not limited to above-mentioned.
Step 608:It will be in the application of selection and Data Migration to the first space.Usually, system application inherently belongs to System level has the characteristic that can be shared.Therefore system application need not migrate, it is only necessary to carry out data sharing or data Migration.Tripartite's application will use in multiple user's spaces, can only be installed and downloaded in each user's space.The application In, by the way of application message and data information sharing, application message and data information may be implemented between user's space Migration.The migration includes several situations, first, being transferred to the first user's space, i.e. second user completely from second user space Do not retain application message and data information in space;Second is that from second user space replication application information and data information to first In user's space;Third, from second user space replication application information, data information then shares.No matter select in step 606 Which kind of mode can be carried out migrating.
In above-mentioned flow, data sharing, Data Migration can be carried out, is provided to ensure the consistency of data.It is according with When closing security level condition, the data that multiple user's spaces can be better achieved use.In addition to this, in some embodiments In, can also include in above-mentioned flow:The data information of the same application of at least two user's spaces is synchronized.It is synchronous Be migration after the completion of lasting sex work, can preferably, keep data consistency in real time.
It should be understood that although each step in the flow chart of Fig. 1-6 is shown successively according to the instruction of arrow, These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 1-6 Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can either the sub-step of other steps or at least part in stage be in turn or alternately with other steps It executes.
Fig. 7 is the structure diagram of the information sharing apparatus of one embodiment of the application.Information sharing apparatus is applied to have extremely Lack the system of two user's spaces, at least two user's space belongs to different use roles;Described device includes:
Data obtaining module 702, for the application message and data for belonging at least two user's spaces in acquisition system Information;
Safe profiling module 704, for the application message and data information to be carried out security level filing;
Shared processing module 706, provides in first user's space according to trigger condition and meets shared security level And the application message and data information that belong to second user space.
In some embodiments, described information sharing means are realized using the serviced component in system, each user's space It calls the serviced component to realize from other users space and obtains application message and data information.
In some embodiments, the safe profiling module 704 includes:
Marking unit, under each user's space, obtaining safety of the user to the application message and data information Level flag;
Profiling unit, for carrying out security level to the application message and data information according to security level label Filing;
Wherein, the security level label includes at least:Indicate what the shared label that can be shared and expression cannot be shared Privately owned label.
In some embodiments, the shared processing module 706 includes:
Reading unit, for reading the application message and data information for belonging to second user space;
Applying unit, the phase for being applied to the data information for belonging to second user space in the first user's space With application.
In some embodiments, the shared processing module 706 includes:
Reading unit, for reading the application message and data information for belonging to second user space;
Migration units, for migrating the application message for belonging to second user space and data information to the first space In.
In some embodiments, the shared processing module 706 further includes:
Display unit, application message and data for belonging to second user space described in the displaying in the first user's space The list of information;
Selecting unit, for selection to need the application migrated and data from the list in the first user's space;
Migration units, in the application and Data Migration to the first space for that will select.
In some embodiments, described information sharing means further include:Synchronization module is used at least two user's spaces The data information of same application synchronize.
Specific about information processing unit limits the restriction that may refer to above for information sharing method, herein not It repeats again.Modules in above- mentioned information processing unit can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the information processing unit provided in the embodiment of the present application can be the shape of computer program Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal Or on the memory of server.When the computer program is executed by processor, realize that information described in the embodiment of the present application is total The step of enjoying method.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the step of the processor execution information sharing method.
A kind of computer program product including instruction, when run on a computer so that computer execution information Sharing method.
The embodiment of the present application also provides a kind of terminals.As shown in figure 8, for convenience of description, illustrate only and the application The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 8, mobile phone Including:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit 840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880 and power supply 890 Equal components.It will be understood by those skilled in the art that handset structure shown in Fig. 8 does not constitute the restriction to mobile phone, may include Than illustrating more or fewer components, certain components or different components arrangement are either combined.
Wherein, RF circuits 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 880;The data of uplink can also be sent to base station.In general, RF circuits include but Be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 810 can also be communicated with network and other equipment by radio communication.Above-mentioned channel radio Letter can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation Software program and module, to execute various function application and the data processing of mobile phone.Memory 820 can include mainly Program storage area and data storage area, wherein program storage area can storage program area, the application journey needed at least one function Sequence (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can store root Created data (such as audio data, address list etc.) etc. are used according to mobile phone.In addition, memory 820 may include high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other volatile solid-state parts.
Input unit 830 can be used for receiving the number or character information of input, and generate the user setting with mobile phone 800 And the related key signals input of function control.Specifically, input unit 830 may include operation panel 831 and other inputs Equipment 832.Operation panel 831, alternatively referred to as touch screen collect user on it or neighbouring touch operation (such as user Use the operation of any suitable object or attachment such as finger, stylus on operation panel 831 or near operation panel 831), And corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 831 may include touching inspection Survey two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation The signal brought, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and will It is converted into contact coordinate, then gives processor 880, and can receive order that processor 880 is sent and be executed.In addition, The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize operation panel 831.In addition to operating surface Plate 831, input unit 830 can also include other input equipments 832.Specifically, other input equipments 832 may include but not It is limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.) etc..
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display panel 841.In one embodiment, liquid crystal display (Liquid may be used Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 841.In one embodiment, operation panel 831 can cover display panel 841, when operation panel 831 is examined It measures and sends processor 880 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device 880 provide corresponding visual output according to the type of touch event on display panel 841.Although in fig. 8, operation panel 831 be to realize input and the input function of mobile phone as two independent components with display panel 841, but in certain implementations In example, can be integrated by operation panel 831 and display panel 841 and that realizes mobile phone output and input function.
Mobile phone 800 may also include at least one sensor 850, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 841, and range sensor can close display panel when mobile phone is moved in one's ear 841 and/or backlight.Motion sensor may include acceleration transducer, can detect by acceleration transducer and adds in all directions The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, humidity Other sensors such as meter, thermometer, infrared sensor etc..
Voicefrequency circuit 860, loud speaker 861 and microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric The transformed electric signal of the audio data received can be transferred to loud speaker 861 by road 860, and sound is converted to by loud speaker 861 Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860 It is changed to audio data, then by after the processing of audio data output processor 880, another mobile phone can be sent to through RF circuits 810, or Person exports audio data to memory 820 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 8 is shown WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone 800, it can omit as needed.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820 Data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment, it handles Device 880 may include one or more processing units.In one embodiment, processor 880 can integrate application processor and modulation Demodulator, wherein the main processing operation system of application processor, user interface and application program etc.;Modem is mainly located Reason wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 880.For example, the processor 880 can integrate application processor and baseband processor, baseband processor with and the composable modem such as other peripheral chips. Mobile phone 800 further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power management system System is logically contiguous with processor 880, to realize the work(such as management charging, electric discharge and power managed by power-supply management system Energy.
In one embodiment, mobile phone 800 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory Realize above-mentioned described information sharing method.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of information sharing method is applied to the system at least two user's spaces, at least two user's space Belong to different use roles;The method includes:
The application message and data information for belonging at least two user's spaces in acquisition system;
The application message and data information are subjected to security level filing;
There is provided in the first user's space according to trigger condition meet shared security level and belong to second user space answer With information and data information.
2. according to the method described in claim 1, it is characterized in that, described information sharing method is real using the service in system Existing, each user's space calls the service to realize from other users space and obtains application message and data information.
3. according to the method described in claim 1, it is characterized in that, described carry out safety by the application message and data information Rank file the step of include:
Under each user's space, obtains user and the security level of the application message and data information is marked;
Security level filing is carried out to the application message and data information according to security level label;
Wherein, the security level label includes at least:It indicates the shared label that can be shared and indicates to share privately owned Label.
4. according to the method described in claim 1, it is characterized in that, described provide according to trigger condition in the first user's space The step of application message and data information that meet shared security level and belonging to second user space includes:
Belong to the application message and data information in second user space described in reading;
The data information for belonging to second user space is applied to the same application in the first user's space.
5. according to the method described in claim 1, it is characterized in that, described provide according to trigger condition in the first user's space The step of application message and data information that meet shared security level and belonging to second user space includes:
Belong to the application message and data information in second user space described in reading;
The application message for belonging to second user space and data information are migrated into the first space.
6. according to the method described in claim 5, it is characterized in that, further including:
Belong to the application message in second user space and the list of data information described in displaying in the first user's space;
Selection needs the application migrated and data from the list in the first user's space;
It will be in the application of selection and Data Migration to the first space.
7. according to the method described in claim 5, it is characterized in that, further including:By the same application of at least two user's spaces Data information synchronize.
8. a kind of information sharing apparatus is applied to the system at least two user's spaces, at least two user's space Belong to different use roles;It is characterized in that, described device includes:
Data obtaining module, for the application message and data information for belonging at least two user's spaces in acquisition system;
Safe profiling module, for the application message and data information to be carried out security level filing;
Shared processing module provides in first user's space meet shared security level and category according to trigger condition Application message and data information in second user space.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of any one of claim 1 to 7 the method is realized when processor executes.
10. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor Sequence, which is characterized in that the processor realizes any one of claim 1 to 7 the method when executing the computer program The step of.
CN201810270230.8A 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal Active CN108509788B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810270230.8A CN108509788B (en) 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal
PCT/CN2019/075388 WO2019184617A1 (en) 2018-03-29 2019-02-18 Information sharing method and device, computer-readable storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810270230.8A CN108509788B (en) 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal

Publications (2)

Publication Number Publication Date
CN108509788A true CN108509788A (en) 2018-09-07
CN108509788B CN108509788B (en) 2021-03-23

Family

ID=63379244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810270230.8A Active CN108509788B (en) 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal

Country Status (2)

Country Link
CN (1) CN108509788B (en)
WO (1) WO2019184617A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019184617A1 (en) * 2018-03-29 2019-10-03 Oppo广东移动通信有限公司 Information sharing method and device, computer-readable storage medium and terminal
CN113704209A (en) * 2021-07-27 2021-11-26 荣耀终端有限公司 Data sharing method, electronic device and storage medium
WO2022062875A1 (en) * 2020-09-22 2022-03-31 荣耀终端有限公司 Data transmission method and system, electronic device, and storage medium
CN115981576A (en) * 2023-03-20 2023-04-18 荣耀终端有限公司 Method for sharing data, electronic device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318176A (en) * 2014-10-28 2015-01-28 东莞宇龙通信科技有限公司 Terminal and data management method and device thereof
CN104572218A (en) * 2015-01-28 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Application operation control method and system and terminal
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN105224886A (en) * 2014-06-26 2016-01-06 中国移动通信集团甘肃有限公司 A kind of mobile terminal safety partition method, device and mobile terminal
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
CN105912951A (en) * 2016-04-15 2016-08-31 北京小米移动软件有限公司 Data migration method and device
CN106485098A (en) * 2015-08-26 2017-03-08 北京奇虎科技有限公司 Application program encryption method, application program encryption device and terminal
CN106933555A (en) * 2015-12-30 2017-07-07 中国科学院上海高等研究院 A kind of data framework system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609448A (en) * 2012-01-10 2012-07-25 西北工业大学 Multi-user-version hierarchical document mapping method
CN102932535A (en) * 2012-10-18 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal shared by multiple users and using method for mobile terminal
CN106485137B (en) * 2015-08-26 2020-02-07 北京安云世纪科技有限公司 Application program control method, application program control device and terminal
CN107632775A (en) * 2016-07-19 2018-01-26 中兴通讯股份有限公司 Information sharing method, device and terminal between a kind of user's space
CN108509788B (en) * 2018-03-29 2021-03-23 Oppo广东移动通信有限公司 Information sharing method and device, computer readable storage medium and terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224886A (en) * 2014-06-26 2016-01-06 中国移动通信集团甘肃有限公司 A kind of mobile terminal safety partition method, device and mobile terminal
CN104318176A (en) * 2014-10-28 2015-01-28 东莞宇龙通信科技有限公司 Terminal and data management method and device thereof
CN104572218A (en) * 2015-01-28 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Application operation control method and system and terminal
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN106485098A (en) * 2015-08-26 2017-03-08 北京奇虎科技有限公司 Application program encryption method, application program encryption device and terminal
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN106933555A (en) * 2015-12-30 2017-07-07 中国科学院上海高等研究院 A kind of data framework system
CN105912951A (en) * 2016-04-15 2016-08-31 北京小米移动软件有限公司 Data migration method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019184617A1 (en) * 2018-03-29 2019-10-03 Oppo广东移动通信有限公司 Information sharing method and device, computer-readable storage medium and terminal
WO2022062875A1 (en) * 2020-09-22 2022-03-31 荣耀终端有限公司 Data transmission method and system, electronic device, and storage medium
CN113704209A (en) * 2021-07-27 2021-11-26 荣耀终端有限公司 Data sharing method, electronic device and storage medium
CN115981576A (en) * 2023-03-20 2023-04-18 荣耀终端有限公司 Method for sharing data, electronic device and storage medium
CN115981576B (en) * 2023-03-20 2023-11-17 荣耀终端有限公司 Method for sharing data, electronic device and storage medium

Also Published As

Publication number Publication date
CN108509788B (en) 2021-03-23
WO2019184617A1 (en) 2019-10-03

Similar Documents

Publication Publication Date Title
CN106126562B (en) A kind of pop-up hold-up interception method and terminal
CN104427074B (en) A kind of methods, devices and systems for showing incoming information
CN103473092B (en) A kind of download the processing method of application, device and terminal unit
CN108509788A (en) Information sharing method and device, computer readable storage medium, terminal
CN106412093A (en) Method, device and system for uploading data
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN103501485B (en) Push the method, apparatus and terminal device of application
CN104424211B (en) A kind of dissemination method of the business datum based on microblogging, device and system
CN104571979B (en) A kind of method and apparatus for realizing split view
CN103631580B (en) Method and device for generating theme icon
CN108521494A (en) Terminal control method and device, readable storage medium storing program for executing, terminal
CN108563932A (en) Application control method and apparatus, readable storage medium storing program for executing, terminal
CN108334755A (en) Private space creation method and device, storage medium, electronic equipment
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN108549698A (en) Document handling method, device, mobile terminal and computer readable storage medium
CN107682851A (en) Information processing method, device, mobile terminal and computer-readable recording medium
CN104571778B (en) screen locking picture setting method and device
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN108632454A (en) Information processing method and device, computer readable storage medium, terminal
CN108563754A (en) Document handling method, device, mobile terminal and computer readable storage medium
CN106533917A (en) Relation chain processing method, device and system
CN108809805A (en) A kind of information interacting method, system and public's account client
CN106713636B (en) Loading method, device and the mobile terminal of image data
CN106682189A (en) Filename display method and device
CN108551524A (en) Message informing method and device, terminal between polygonal color in terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant