CN108509788A - Information sharing method and device, computer readable storage medium, terminal - Google Patents
Information sharing method and device, computer readable storage medium, terminal Download PDFInfo
- Publication number
- CN108509788A CN108509788A CN201810270230.8A CN201810270230A CN108509788A CN 108509788 A CN108509788 A CN 108509788A CN 201810270230 A CN201810270230 A CN 201810270230A CN 108509788 A CN108509788 A CN 108509788A
- Authority
- CN
- China
- Prior art keywords
- user
- space
- data information
- application message
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This application involves a kind of information sharing methods and device, computer readable storage medium, terminal.This method, is applied to the system at least two user's spaces, and at least two user's space belongs to different use roles;The method includes:The application message and data information for belonging at least two user's spaces in acquisition system;The application message and data information are subjected to security level filing;Application message and data information that meet shared security level and belonging to second user space are provided according to trigger condition in the first user's space.It can either realize the shared of quickly application and data, and can accomplish necessary data and permission isolation, while the shelf space of data can also be saved.
Description
Technical field
This application involves field of terminal technology, more particularly to a kind of information sharing method and device, computer-readable deposit
Storage media, terminal.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives
Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc.
Different demands.
Currently, a variety of user modes can be arranged so that multiple users use same terminal in terminal.Opening new be mostly used
When the space of family, due to being isolated for space and permission, user need to re-create contact person, using etc. data, using trouble, user
It experiences low.
Invention content
A kind of information sharing method of the embodiment of the present application offer and device, computer readable storage medium, terminal, to realize
The quickly shared and necessary data and permission isolation of application and data.
A kind of information sharing method, is applied to the system at least two user's spaces, and at least two user is empty
Between belong to different and use role;The method includes:
The application message and data information for belonging at least two user's spaces in acquisition system;
The application message and data information are subjected to security level filing;
It is provided in the first user's space according to trigger condition meeting shared security level and belongs to second user space
Application message and data information.
A kind of information sharing apparatus, is applied to the system at least two user's spaces, and at least two user is empty
Between belong to different and use role;It is characterized in that, described device includes:
Data obtaining module, for the application message sum number for belonging at least two user's spaces in acquisition system it is believed that
Breath;
Safe profiling module, for the application message and data information to be carried out security level filing;
Shared processing module, provided in first user's space according to trigger condition meet shared security level,
And belong to the application message and data information in second user space.
A kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of the method in each embodiment of the application is realized when being executed by processor.
A kind of terminal, including memory, processor and storage are on a memory and the computer that can run on a processor
Program, which is characterized in that the processor realizes the side in each embodiment of the application when executing the computer program
The step of method.
Information sharing method and device that the embodiment of the present application is provided, computer readable storage medium, terminal, can will
The application message and data information for belonging to multiple user's spaces are shared, and carry out privacy by the way of security level filing
Control can either realize the shared of quickly application and data, and can accomplish necessary data and permission isolation, while can also
Enough save the shelf space of data.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 2 is the flow chart of information sharing method in one embodiment;
Fig. 3 is the process chart that security level filing is carried out in one embodiment;
Fig. 4 is that the application message and data for belonging to second user space are provided in the first user's space in one embodiment
The process chart of information;
Fig. 5 is that the application message sum number for belonging to second user space is provided in the first user's space in another embodiment
It is believed that the process chart of breath;
Fig. 6 is that the application message sum number for belonging to second user space is provided in the first user's space in further embodiment
It is believed that the process chart of breath;
Fig. 7 is the structure diagram of the information sharing apparatus of an embodiment;
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements,
But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes
It says, without departing from the scope of the invention, the first user's space can be known as second user space, and similarly,
Second user space can be known as to the first user's space.First user's space and second user space both user's space,
But it is not same user's space.
In one embodiment, as shown in Figure 1, providing a kind of internal structure schematic diagram of terminal.The terminal includes logical
Cross processor, memory and the display screen of system bus connection.Wherein, the processor is for providing calculating and control ability, branch
Support the operation of entire terminal.Memory for storing data, program, and/or instruction code etc., stored on memory at least one
Computer program, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for terminal
Information sharing method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-easily
The property lost storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment
In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database
And computer program.A kind of information sharing method phase provided for realizing above each embodiment is provided in the database
The data of pass, for example default processing strategy or default verification information can be stored etc..The computer program can performed by processor,
For realizing a kind of information sharing method that each embodiment of the application is provided.Built-in storage is non-volatile memory medium
In operating system, database and computer program the running environment of cache is provided.Display screen can be touch screen, such as
For capacitance plate or electrical screen, it to be used for the interface information of display terminal.The terminal can be mobile phone, tablet computer or individual digital
Assistant or Wearable etc..
Information sharing method in the present embodiment is described for running in terminal.Described information sharing method
Applied to the system at least two user's spaces, at least two user's space belongs to different use roles.
In the application, system refers to the operating system of terminal.The operating system provides the function in multi-user or more spaces, makes
A terminal can open up multiple spaces by multiple user time-sharings use or a user under different situations enter not
Same space uses.By not distinguishing multiple spaces of the space of different user and same user are collectively referred to as in the application
User's space.When same user uses different user's spaces, it is also considered as it and uses role with different.Use situation packet
It includes but is not limited to:
One terminal has more than two users, each with opening a user for belonging to itself in systems per family
Space, such as children's spatial, visitor space etc.;One terminal only has there are one user, which opens in systems belongs to
In the more than two user's spaces of itself, such as the principal space and private space;One terminal has more than two users, often
It is a with opening a user's space for belonging to itself in systems per family, and wherein at least one user also additionally has one
A one's own private space.
It is understood that in the scheme of traditional multi-user or more spaces, needed into line number between two user's spaces
According to the isolation with permission, to prevent the use of multiple user's spaces from interfering with each other.Therefore inevitably there is the letter of multiple user's spaces
Breath repeats.
For the system in multi-user or more spaces is provided, user when first used, in system it is general only there are one
Space (commonly referred to as owner space is used to owner, has highest permission).When need to multi-user use or open up more
Space is in use, need to create user's space in systems.Other than owner space, there is life in other user's spaces
Period, the life cycle start from establishment, destroy finally.Between establishment and destruction is then the survival stage.
When creating user's space, system is that newly-built user's space distributes memory space, prepares running environment, wherein wrapping
Offer system application and service is provided.Herein on basis, in user's space, system application can be both used, can also be downloaded
It is applied with new tripartite is installed, and preserves the data of the user using the user's space.Wherein, with new tripartite using relevant
Information is known as application message, and data related to user are known as data information.It should be noted that data information is either needle
Can also be the data applied for tripartite, such as wechat data to the data of system application, such as contact data.
In the survival stage of user's space, with the use of user, application message and data information all can constantly become
Change.Such as contact number gradually increases, wechat chat record gradually increases.
When destroying user's space, by the application deleted in user's space and data and it is released to its storage sky distributed
Between.
The information sharing method of one embodiment of the application is as shown in Fig. 2, including step 202 to step 206.
Step 202:The application message and data information for belonging at least two user's spaces in acquisition system.It is described at least
Two user's spaces can refer to all user's spaces in system.It may also mean that the user for only relating to information sharing is empty
Between.The application message and data information of at least two user's space are maintained in the memory space distributed for the user's space
In.The application message and data information for belonging to the user's space can be got from the memory space of each user's space.With
Whether family space does not influence to read application message sum number from memory space in front stage operation, running background or not running
It is believed that breath.
Step 204:The application message and data information are subjected to security level filing.What each user's space had answers
With different with data, the demand for security that owning user is applied to data is different, all influences application message and data information
It is shared.For example, owner space is after using a very long time, number of applications and personal data thereon is all more, this
If when create new user's space, more may be to have some applications and data that cannot share.For this purpose, the side of the application
The application message of each user's space and data information are carried out security level filing by method, to differentiate application message sum number it is believed that
Breath shares security level.In some embodiments, the security level include at least indicate the sharing level that can share and
Indicate the privately owned rank that cannot be shared.
Step 206:It is provided in first user's space meeting shared security level and belonged to according to trigger condition
The application message and data information in second user space.This step can indicate the application message of at least one user's space and
Data information is supplied to the first user's space, i.e. other users space except some first user's space to be referred to as second user
Space.This step can also indicate repeatedly to be supplied to the first user empty the application message in second user space and data information
Between.
Trigger condition is generally related to shared demand.When creating a user's space, system is usually only distributed necessary
System applies (such as phone contacts), and (such as wechat) is applied without tripartite, and system application is also without user data.Therefore it should
Trigger condition can be when a user's space creates completion.When a user's space is newly-built, automatically by other users sky
Between application message and the data information user's space that is supplied to this newly-built.For example, by owner space application and data
When meeting shared security level, the wechat in owner space is applied and contact number list is supplied to the children newly created empty
Between, private space or visitor space etc..
Trigger condition can also be to be generated under other situations, same after owner space is downloaded and installs certain application
When user enters private space, the shared of the application in owner space can be actively initiated by user, without in privacy
It is downloaded again in space.It is appreciated that trigger condition can also include other similar conditions.
Meet the safety after filing of application message and data information that shared security level refers to second user space
Rank meets the condition for being shared to the first user's space.For example, creating a use except owner space (second user space)
Behind family space (the first user's space), application message and data information in owner space (second user space) are all pacified
Full rank filing.For simplest situation, exactly it is determined which application message and data information can be shared, which is not
It can be shared.After the completion of user's space (the first user's space) is newly-built, it can be shared in owner space (second user space)
Application message and data information are provided to newly-built user's space (the first user's space).
In other situations, application message and data information can also have multiple sharing levels in owner space, when shared
When rank higher, the lower user's space of permission can obtain shared;When sharing level is lower, the higher user's space of permission
It can obtain shared.Or certain shared security levels only allow designated user's space access.The realization method of the application is unlimited
In above-mentioned.
Above- mentioned information sharing method can share the application message for belonging to multiple user's spaces and data information,
And privacy control is carried out by the way of security level filing, it can either realize the shared of quickly application and data, and can be with
Accomplish necessary data and permission isolation, while the shelf space of data can also be saved.
In some embodiments, described information sharing method is realized using the service (Service) in system, each user
The service is called to realize information sharing in space.Mode based on service can be such that this method resides in system and run, and make
For a publicly-owned service so that at runtime, each user's space can call system, and also be easy to obtain each use
The permission of the memory space in family space facilitates the application message and data information for reading user's space.
In some embodiments, as shown in figure 3, described carry out security level filing by the application message and data information
The step of, i.e., above-mentioned steps 202 may include:
Step 302:Under each user's space, security level mark of the user to the application message and data information is obtained
Note.The security level label includes at least:It indicates the shared label that can be shared and indicates the privately owned label that cannot be shared.It should
Security level label can be that system is to apply the attribute with data addition can be by this under different use conditions
Attribute is rewritten to change using the attribute with data.Such as by the attribute definition be whether the Boolean that can be shared, when
When the attribute value is true, expression can be shared;When the attribute value is fictitious time, expression cannot be shared.In other embodiments, safety
Level flag can also include multiple, and can other than indicating share, being also represented by can be shared by the user's space of what permission.
At this point, the attribute definition is the enumeration type with multiple fixed values.It can be by user to the application message in its user's space
It is specified with the security level label of data information.
Security level label can not also use the mode of addition attribute to realize, and be realized by the way of mapping table.Example
Correspondence as security level and application message, the unique mark of data information are written in the mapping table.
Step 304:Security level filing is carried out to the application message and data information according to security level label.
The purpose of filing is to facilitate the application message of same security level and data information carrying out qualified use.
It, will be with same alike result value by reading attributes value for being added to the application message and data information of attribute
Application message and data information are filed.For realizing the application message sum number of security level label by way of mapping table
It is believed that breath, can safeguard the table of multiple different safety class.It can be with the same security level of aggregating storing under classifying at one
The unique mark of application message and data information.
By above-mentioned processing, all application messages and data information that obtain in step 202 all have determining safety
Rank.When shared, so that it may to be carried out meeting the shared of shared security level condition according to security level.
In some embodiments, as shown in figure 4, it is described provided in the first user's space according to trigger condition meet it is shared
Security level and belong to second user space application message and data information the step of,For realizing data sharing, but answer With need not migrate.I.e. above-mentioned steps 206 may include:
Step 402:Belong to the application message and data information in second user space described in reading.Belong to second user space
Application message and data information be stored in the corresponding memory space in second user space.Whether second user space is on foreground
Operation, running background or not running do not influence to read application message and data information from memory space.Work as second user
In front stage operation or running background, application message and data information may change at any time in space, when trigger condition meets,
Obtain newest application message and data information.When second user space not running, at any time obtain application message and
Data information.
When obtaining application message and data information, the shared security level condition met is needed.Symbol can only be got
Amount to application message and data information that enjoy security level condition and belonging to second user space.
Step 404:The data information for belonging to second user space is applied to identical answering in the first user's space
With.When tripartite's application carries out data sharing, the data information for belonging to second user space is applied to the phase of the first user's space
With application.Such as by the wechat chat record in owner space for newly-built private space.But the wechat chat note of private space
Record only preserves and private space, will there is a common wechat chat record in such whole system, can be in owner space quilt
It reads, can be also read in private space.The memory space of data is saved, while being also convenient for owner and being checked in private space
All chat records.
When system application carries out data sharing, with tripartite using similar.Such as by the contact number list in owner space
It is used for second user for a newly-built user's space, there is no need to second users to re-type a contact at this time
People can quickly obtain All Contacts and save memory space.
In some embodiments, as shown in figure 5, it is described provided in the first user's space according to trigger condition meet it is shared
Security level and belong to second user space application message and data information the step of,For realizing data sharing, and answer With migration, i.e. above-mentioned steps 206 may include:
Step 502:Belong to the application message and data information in second user space described in reading.Belong to second user space
Application message and data information be stored in the corresponding memory space in second user space.Whether second user space is on foreground
Operation, running background or not running do not influence to read application message and data information from memory space.Work as second user
In front stage operation or running background, application message and data information may change at any time in space, when trigger condition meets,
Obtain newest application message and data information.When second user space not running, at any time obtain application message and
Data information.
When obtaining application message and data information, the shared security level condition met is needed.Symbol can only be got
Amount to application message and data information that enjoy security level condition and belonging to second user space.
Step 504:The application message for belonging to second user space and data information are migrated into the first space.
When tripartite's application carries out data sharing, the data information for belonging to second user space is applied to the first user's space
Same application.Such as by the wechat chat record in owner space for newly-built private space.But the wechat of private space is chatted
Its record only preserves and private space, will there is a common wechat chat record in such whole system, can be in owner's sky
Between be read, can be also read in private space.The memory space of data is saved, while being also convenient for owner in private space
Check all chat records.When system application carries out data sharing, with tripartite using similar.Such as by the contact in owner space
People's list of numbers is used for a newly-built user's space for second user, and there is no need to second users to record again at this time
Enter a contact person, can quickly obtain All Contacts and saves memory space.
Usually, system application inherently belongs to system level, has the characteristic that can be shared.Therefore system application is not required to
It migrates, it is only necessary to carry out data sharing or Data Migration.Tripartite's application will use in multiple user's spaces, can only be every
A user's space is installed and is downloaded.In the application, in such a way that application message is shared, may be implemented application message with
Migration between the space of family.The migration includes several situations, first, it is transferred to the first user's space completely from second user space,
Do not retain application message and data information in second user space;Second is that from second user space replication application information and data
In information to the first user's space;Third, from second user space replication application information, data information then shares.
In some embodiments, as shown in fig. 6, it is described provided in the first user's space according to trigger condition meet it is shared
Security level and belong to second user space application message and data information the step of,For realizing data sharing, and have The application of selection and Data Migration, i.e. above-mentioned steps 206 may include:
Step 602:Belong to the application message and data information in second user space described in reading.Belong to second user space
Application message and data information be stored in the corresponding memory space in second user space.Whether second user space is on foreground
Operation, running background or not running do not influence to read application message and data information from memory space.Work as second user
In front stage operation or running background, application message and data information may change at any time in space, when trigger condition meets,
Obtain newest application message and data information.When second user space not running, at any time obtain application message and
Data information.
When obtaining application message and data information, the shared security level condition met is needed.Symbol can only be got
Amount to application message and data information that enjoy security level condition and belonging to second user space.
Step 604:Belong to the application message in second user space and the list of data information described in displaying.It will be in step
The application message and data information obtained in 602 shows user in the form of a list, and provides selection.As previously mentioned, step
206 can indicate the application message of at least one user's space and data information being supplied to the first user's space, i.e., some
Other users space except one user's space is referred to as second user space.Step 206 can also be indicated second user sky
Between application message and data information be repeatedly supplied to the first user's space.
After the application message and data information for obtaining multiple user's spaces, it is necessary to the first user's space is supplied to carry out
Selection.The mark easily recognized in application message, such as the icon of application can be shown in list.The expression of data information then may be used
With including informative abstract, the last renewal time, the occupied space size of information etc..
Step 606:In the first user's space, selection needs migrate from the list application and data.The selection
May include:It individually selects the application to be migrated, individually select data, the simultaneous selection to be migrated the application sum number to be migrated
According to.For example, only migrating required application in newly-built private space, data are by the way of sharing.For another example by owner
The private data in space moves in private space.For another example for a kind of more parts of data applied in multiple user's spaces,
It is newest because migrating a copy of it.Selection mode is not limited to above-mentioned.
Step 608:It will be in the application of selection and Data Migration to the first space.Usually, system application inherently belongs to
System level has the characteristic that can be shared.Therefore system application need not migrate, it is only necessary to carry out data sharing or data
Migration.Tripartite's application will use in multiple user's spaces, can only be installed and downloaded in each user's space.The application
In, by the way of application message and data information sharing, application message and data information may be implemented between user's space
Migration.The migration includes several situations, first, being transferred to the first user's space, i.e. second user completely from second user space
Do not retain application message and data information in space;Second is that from second user space replication application information and data information to first
In user's space;Third, from second user space replication application information, data information then shares.No matter select in step 606
Which kind of mode can be carried out migrating.
In above-mentioned flow, data sharing, Data Migration can be carried out, is provided to ensure the consistency of data.It is according with
When closing security level condition, the data that multiple user's spaces can be better achieved use.In addition to this, in some embodiments
In, can also include in above-mentioned flow:The data information of the same application of at least two user's spaces is synchronized.It is synchronous
Be migration after the completion of lasting sex work, can preferably, keep data consistency in real time.
It should be understood that although each step in the flow chart of Fig. 1-6 is shown successively according to the instruction of arrow,
These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 1-6
Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can either the sub-step of other steps or at least part in stage be in turn or alternately with other steps
It executes.
Fig. 7 is the structure diagram of the information sharing apparatus of one embodiment of the application.Information sharing apparatus is applied to have extremely
Lack the system of two user's spaces, at least two user's space belongs to different use roles;Described device includes:
Data obtaining module 702, for the application message and data for belonging at least two user's spaces in acquisition system
Information;
Safe profiling module 704, for the application message and data information to be carried out security level filing;
Shared processing module 706, provides in first user's space according to trigger condition and meets shared security level
And the application message and data information that belong to second user space.
In some embodiments, described information sharing means are realized using the serviced component in system, each user's space
It calls the serviced component to realize from other users space and obtains application message and data information.
In some embodiments, the safe profiling module 704 includes:
Marking unit, under each user's space, obtaining safety of the user to the application message and data information
Level flag;
Profiling unit, for carrying out security level to the application message and data information according to security level label
Filing;
Wherein, the security level label includes at least:Indicate what the shared label that can be shared and expression cannot be shared
Privately owned label.
In some embodiments, the shared processing module 706 includes:
Reading unit, for reading the application message and data information for belonging to second user space;
Applying unit, the phase for being applied to the data information for belonging to second user space in the first user's space
With application.
In some embodiments, the shared processing module 706 includes:
Reading unit, for reading the application message and data information for belonging to second user space;
Migration units, for migrating the application message for belonging to second user space and data information to the first space
In.
In some embodiments, the shared processing module 706 further includes:
Display unit, application message and data for belonging to second user space described in the displaying in the first user's space
The list of information;
Selecting unit, for selection to need the application migrated and data from the list in the first user's space;
Migration units, in the application and Data Migration to the first space for that will select.
In some embodiments, described information sharing means further include:Synchronization module is used at least two user's spaces
The data information of same application synchronize.
Specific about information processing unit limits the restriction that may refer to above for information sharing method, herein not
It repeats again.Modules in above- mentioned information processing unit can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the information processing unit provided in the embodiment of the present application can be the shape of computer program
Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal
Or on the memory of server.When the computer program is executed by processor, realize that information described in the embodiment of the present application is total
The step of enjoying method.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the step of the processor execution information sharing method.
A kind of computer program product including instruction, when run on a computer so that computer execution information
Sharing method.
The embodiment of the present application also provides a kind of terminals.As shown in figure 8, for convenience of description, illustrate only and the application
The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be
Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of
Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 8, mobile phone
Including:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit 840, sensor
850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880 and power supply 890
Equal components.It will be understood by those skilled in the art that handset structure shown in Fig. 8 does not constitute the restriction to mobile phone, may include
Than illustrating more or fewer components, certain components or different components arrangement are either combined.
Wherein, RF circuits 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station
After downlink information receives, handled to processor 880;The data of uplink can also be sent to base station.In general, RF circuits include but
Be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier,
LNA), duplexer etc..In addition, RF circuits 810 can also be communicated with network and other equipment by radio communication.Above-mentioned channel radio
Letter can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of
Mobile communication, GSM), general packet radio service (General Packet Radio Service,
GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code
Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email,
Short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation
Software program and module, to execute various function application and the data processing of mobile phone.Memory 820 can include mainly
Program storage area and data storage area, wherein program storage area can storage program area, the application journey needed at least one function
Sequence (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can store root
Created data (such as audio data, address list etc.) etc. are used according to mobile phone.In addition, memory 820 may include high speed
Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or
Other volatile solid-state parts.
Input unit 830 can be used for receiving the number or character information of input, and generate the user setting with mobile phone 800
And the related key signals input of function control.Specifically, input unit 830 may include operation panel 831 and other inputs
Equipment 832.Operation panel 831, alternatively referred to as touch screen collect user on it or neighbouring touch operation (such as user
Use the operation of any suitable object or attachment such as finger, stylus on operation panel 831 or near operation panel 831),
And corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 831 may include touching inspection
Survey two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation
The signal brought, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and will
It is converted into contact coordinate, then gives processor 880, and can receive order that processor 880 is sent and be executed.In addition,
The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize operation panel 831.In addition to operating surface
Plate 831, input unit 830 can also include other input equipments 832.Specifically, other input equipments 832 may include but not
It is limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.) etc..
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 840 may include display panel 841.In one embodiment, liquid crystal display (Liquid may be used
Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
To configure display panel 841.In one embodiment, operation panel 831 can cover display panel 841, when operation panel 831 is examined
It measures and sends processor 880 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device
880 provide corresponding visual output according to the type of touch event on display panel 841.Although in fig. 8, operation panel
831 be to realize input and the input function of mobile phone as two independent components with display panel 841, but in certain implementations
In example, can be integrated by operation panel 831 and display panel 841 and that realizes mobile phone output and input function.
Mobile phone 800 may also include at least one sensor 850, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 841, and range sensor can close display panel when mobile phone is moved in one's ear
841 and/or backlight.Motion sensor may include acceleration transducer, can detect by acceleration transducer and adds in all directions
The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture
Switching), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, humidity
Other sensors such as meter, thermometer, infrared sensor etc..
Voicefrequency circuit 860, loud speaker 861 and microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric
The transformed electric signal of the audio data received can be transferred to loud speaker 861 by road 860, and sound is converted to by loud speaker 861
Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860
It is changed to audio data, then by after the processing of audio data output processor 880, another mobile phone can be sent to through RF circuits 810, or
Person exports audio data to memory 820 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870
Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 8 is shown
WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone 800, it can omit as needed.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820
Data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment, it handles
Device 880 may include one or more processing units.In one embodiment, processor 880 can integrate application processor and modulation
Demodulator, wherein the main processing operation system of application processor, user interface and application program etc.;Modem is mainly located
Reason wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 880.For example, the processor
880 can integrate application processor and baseband processor, baseband processor with and the composable modem such as other peripheral chips.
Mobile phone 800 further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power management system
System is logically contiguous with processor 880, to realize the work(such as management charging, electric discharge and power managed by power-supply management system
Energy.
In one embodiment, mobile phone 800 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory
Realize above-mentioned described information sharing method.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile
And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access
Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as
It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced
SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention
Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of information sharing method is applied to the system at least two user's spaces, at least two user's space
Belong to different use roles;The method includes:
The application message and data information for belonging at least two user's spaces in acquisition system;
The application message and data information are subjected to security level filing;
There is provided in the first user's space according to trigger condition meet shared security level and belong to second user space answer
With information and data information.
2. according to the method described in claim 1, it is characterized in that, described information sharing method is real using the service in system
Existing, each user's space calls the service to realize from other users space and obtains application message and data information.
3. according to the method described in claim 1, it is characterized in that, described carry out safety by the application message and data information
Rank file the step of include:
Under each user's space, obtains user and the security level of the application message and data information is marked;
Security level filing is carried out to the application message and data information according to security level label;
Wherein, the security level label includes at least:It indicates the shared label that can be shared and indicates to share privately owned
Label.
4. according to the method described in claim 1, it is characterized in that, described provide according to trigger condition in the first user's space
The step of application message and data information that meet shared security level and belonging to second user space includes:
Belong to the application message and data information in second user space described in reading;
The data information for belonging to second user space is applied to the same application in the first user's space.
5. according to the method described in claim 1, it is characterized in that, described provide according to trigger condition in the first user's space
The step of application message and data information that meet shared security level and belonging to second user space includes:
Belong to the application message and data information in second user space described in reading;
The application message for belonging to second user space and data information are migrated into the first space.
6. according to the method described in claim 5, it is characterized in that, further including:
Belong to the application message in second user space and the list of data information described in displaying in the first user's space;
Selection needs the application migrated and data from the list in the first user's space;
It will be in the application of selection and Data Migration to the first space.
7. according to the method described in claim 5, it is characterized in that, further including:By the same application of at least two user's spaces
Data information synchronize.
8. a kind of information sharing apparatus is applied to the system at least two user's spaces, at least two user's space
Belong to different use roles;It is characterized in that, described device includes:
Data obtaining module, for the application message and data information for belonging at least two user's spaces in acquisition system;
Safe profiling module, for the application message and data information to be carried out security level filing;
Shared processing module provides in first user's space meet shared security level and category according to trigger condition
Application message and data information in second user space.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of any one of claim 1 to 7 the method is realized when processor executes.
10. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor
Sequence, which is characterized in that the processor realizes any one of claim 1 to 7 the method when executing the computer program
The step of.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810270230.8A CN108509788B (en) | 2018-03-29 | 2018-03-29 | Information sharing method and device, computer readable storage medium and terminal |
PCT/CN2019/075388 WO2019184617A1 (en) | 2018-03-29 | 2019-02-18 | Information sharing method and device, computer-readable storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810270230.8A CN108509788B (en) | 2018-03-29 | 2018-03-29 | Information sharing method and device, computer readable storage medium and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108509788A true CN108509788A (en) | 2018-09-07 |
CN108509788B CN108509788B (en) | 2021-03-23 |
Family
ID=63379244
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810270230.8A Active CN108509788B (en) | 2018-03-29 | 2018-03-29 | Information sharing method and device, computer readable storage medium and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108509788B (en) |
WO (1) | WO2019184617A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019184617A1 (en) * | 2018-03-29 | 2019-10-03 | Oppo广东移动通信有限公司 | Information sharing method and device, computer-readable storage medium and terminal |
CN113704209A (en) * | 2021-07-27 | 2021-11-26 | 荣耀终端有限公司 | Data sharing method, electronic device and storage medium |
WO2022062875A1 (en) * | 2020-09-22 | 2022-03-31 | 荣耀终端有限公司 | Data transmission method and system, electronic device, and storage medium |
CN115981576A (en) * | 2023-03-20 | 2023-04-18 | 荣耀终端有限公司 | Method for sharing data, electronic device and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318176A (en) * | 2014-10-28 | 2015-01-28 | 东莞宇龙通信科技有限公司 | Terminal and data management method and device thereof |
CN104572218A (en) * | 2015-01-28 | 2015-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Application operation control method and system and terminal |
CN105069333A (en) * | 2015-08-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | User domain access method, access system and terminal |
CN105224886A (en) * | 2014-06-26 | 2016-01-06 | 中国移动通信集团甘肃有限公司 | A kind of mobile terminal safety partition method, device and mobile terminal |
CN105631293A (en) * | 2015-12-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Data access method, data access system and terminal |
CN105653969A (en) * | 2015-04-27 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method, apparatus and electronic equipment |
CN105912951A (en) * | 2016-04-15 | 2016-08-31 | 北京小米移动软件有限公司 | Data migration method and device |
CN106485098A (en) * | 2015-08-26 | 2017-03-08 | 北京奇虎科技有限公司 | Application program encryption method, application program encryption device and terminal |
CN106933555A (en) * | 2015-12-30 | 2017-07-07 | 中国科学院上海高等研究院 | A kind of data framework system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609448A (en) * | 2012-01-10 | 2012-07-25 | 西北工业大学 | Multi-user-version hierarchical document mapping method |
CN102932535A (en) * | 2012-10-18 | 2013-02-13 | 广东欧珀移动通信有限公司 | Mobile terminal shared by multiple users and using method for mobile terminal |
CN106485137B (en) * | 2015-08-26 | 2020-02-07 | 北京安云世纪科技有限公司 | Application program control method, application program control device and terminal |
CN107632775A (en) * | 2016-07-19 | 2018-01-26 | 中兴通讯股份有限公司 | Information sharing method, device and terminal between a kind of user's space |
CN108509788B (en) * | 2018-03-29 | 2021-03-23 | Oppo广东移动通信有限公司 | Information sharing method and device, computer readable storage medium and terminal |
-
2018
- 2018-03-29 CN CN201810270230.8A patent/CN108509788B/en active Active
-
2019
- 2019-02-18 WO PCT/CN2019/075388 patent/WO2019184617A1/en active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224886A (en) * | 2014-06-26 | 2016-01-06 | 中国移动通信集团甘肃有限公司 | A kind of mobile terminal safety partition method, device and mobile terminal |
CN104318176A (en) * | 2014-10-28 | 2015-01-28 | 东莞宇龙通信科技有限公司 | Terminal and data management method and device thereof |
CN104572218A (en) * | 2015-01-28 | 2015-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Application operation control method and system and terminal |
CN105653969A (en) * | 2015-04-27 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method, apparatus and electronic equipment |
CN105069333A (en) * | 2015-08-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | User domain access method, access system and terminal |
CN106485098A (en) * | 2015-08-26 | 2017-03-08 | 北京奇虎科技有限公司 | Application program encryption method, application program encryption device and terminal |
CN105631293A (en) * | 2015-12-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Data access method, data access system and terminal |
CN106933555A (en) * | 2015-12-30 | 2017-07-07 | 中国科学院上海高等研究院 | A kind of data framework system |
CN105912951A (en) * | 2016-04-15 | 2016-08-31 | 北京小米移动软件有限公司 | Data migration method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019184617A1 (en) * | 2018-03-29 | 2019-10-03 | Oppo广东移动通信有限公司 | Information sharing method and device, computer-readable storage medium and terminal |
WO2022062875A1 (en) * | 2020-09-22 | 2022-03-31 | 荣耀终端有限公司 | Data transmission method and system, electronic device, and storage medium |
CN113704209A (en) * | 2021-07-27 | 2021-11-26 | 荣耀终端有限公司 | Data sharing method, electronic device and storage medium |
CN115981576A (en) * | 2023-03-20 | 2023-04-18 | 荣耀终端有限公司 | Method for sharing data, electronic device and storage medium |
CN115981576B (en) * | 2023-03-20 | 2023-11-17 | 荣耀终端有限公司 | Method for sharing data, electronic device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108509788B (en) | 2021-03-23 |
WO2019184617A1 (en) | 2019-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106126562B (en) | A kind of pop-up hold-up interception method and terminal | |
CN104427074B (en) | A kind of methods, devices and systems for showing incoming information | |
CN103473092B (en) | A kind of download the processing method of application, device and terminal unit | |
CN108509788A (en) | Information sharing method and device, computer readable storage medium, terminal | |
CN106412093A (en) | Method, device and system for uploading data | |
CN108537037A (en) | Privacy control method and device, computer readable storage medium, terminal | |
CN103501485B (en) | Push the method, apparatus and terminal device of application | |
CN104424211B (en) | A kind of dissemination method of the business datum based on microblogging, device and system | |
CN104571979B (en) | A kind of method and apparatus for realizing split view | |
CN103631580B (en) | Method and device for generating theme icon | |
CN108521494A (en) | Terminal control method and device, readable storage medium storing program for executing, terminal | |
CN108563932A (en) | Application control method and apparatus, readable storage medium storing program for executing, terminal | |
CN108334755A (en) | Private space creation method and device, storage medium, electronic equipment | |
CN108573169A (en) | Nearest task list display methods and device, storage medium, electronic equipment | |
CN108549698A (en) | Document handling method, device, mobile terminal and computer readable storage medium | |
CN107682851A (en) | Information processing method, device, mobile terminal and computer-readable recording medium | |
CN104571778B (en) | screen locking picture setting method and device | |
CN107133507A (en) | A kind of privacy services system access method, device and mobile terminal | |
CN108632454A (en) | Information processing method and device, computer readable storage medium, terminal | |
CN108563754A (en) | Document handling method, device, mobile terminal and computer readable storage medium | |
CN106533917A (en) | Relation chain processing method, device and system | |
CN108809805A (en) | A kind of information interacting method, system and public's account client | |
CN106713636B (en) | Loading method, device and the mobile terminal of image data | |
CN106682189A (en) | Filename display method and device | |
CN108551524A (en) | Message informing method and device, terminal between polygonal color in terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |