CN110113321B - Information sharing method and device, storage medium and computer equipment - Google Patents

Information sharing method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN110113321B
CN110113321B CN201910313152.XA CN201910313152A CN110113321B CN 110113321 B CN110113321 B CN 110113321B CN 201910313152 A CN201910313152 A CN 201910313152A CN 110113321 B CN110113321 B CN 110113321B
Authority
CN
China
Prior art keywords
information
sharing
combined
application
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910313152.XA
Other languages
Chinese (zh)
Other versions
CN110113321A (en
Inventor
马良
卢强
林庆杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910313152.XA priority Critical patent/CN110113321B/en
Publication of CN110113321A publication Critical patent/CN110113321A/en
Application granted granted Critical
Publication of CN110113321B publication Critical patent/CN110113321B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72427User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting games or graphical animations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses an information sharing method, an information sharing device, a storage medium and computer equipment; the method includes the steps that an information sharing instruction initiated by a sub-application in a parent application is received, the sub-application runs in the parent application, a plurality of objects to be shared in the parent application are displayed according to the information sharing instruction, a target sharing object selected by a user from the objects to be shared is obtained, relationship chain information of the target sharing object is combined with authentication information to obtain combined information, business link information of the sub-application is generated based on the combined information, the business link information comprises the combined information, and the business link information is shared to the target sharing object. The scheme can improve the safety of information sharing.

Description

Information sharing method and device, storage medium and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information sharing method and apparatus, a storage medium, and a computer device.
Background
When a user uses a sub-application to share information, the relationship chain information authorized by a parent application needs to be used for sharing the information, and since the relationship chain information needs to be authorized to the sub-application in the information sharing process, illegal conditions such as relationship chain information leakage and theft may occur, so that the safety of the user in information sharing in the sub-application is poor.
Disclosure of Invention
The embodiment of the application provides an information sharing method and device, a storage medium and computer equipment, which can improve the security of information sharing.
An embodiment of the present application provides an information sharing method, including:
receiving an information sharing instruction initiated by a child application in a parent application, wherein the child application runs in the parent application;
displaying a plurality of objects to be shared in the parent application according to the information sharing instruction;
acquiring a target sharing object selected by a user from the objects to be shared;
combining the relationship chain information of the target sharing object with the authentication information to obtain combined information;
generating service link information of the sub-application based on the combined information, wherein the service link information comprises the combined information;
and sharing the service link information to the target sharing object.
The embodiment of the application further provides another information sharing method, which includes:
acquiring relationship chain information of a target sharing object from a terminal;
combining the relationship chain information with the authentication information to obtain combined information;
the combined information is sent to a terminal, so that the terminal can share the information to a target sharing object based on the combined information;
and encrypting the combined information to obtain the encrypted combined information.
Correspondingly, this application embodiment still provides an information sharing device, includes:
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving an information sharing instruction initiated by a child application in a parent application, and the child application runs in the parent application;
the display module is used for displaying a plurality of objects to be shared in the parent application according to the information sharing instruction;
the first acquisition module is used for acquiring a target sharing object selected by a user from the objects to be shared;
the first combination module is used for combining the relationship chain information and the authentication information of the target sharing object to obtain combined information;
a generating module, configured to generate service link information of the sub-application based on the combined information, where the service link information includes the combined information;
and the sharing module is used for sharing the service link information to the target sharing object.
Correspondingly, this application embodiment still provides another kind of information sharing device, includes:
the second acquisition module is used for acquiring the relationship chain information of the target sharing object from the terminal;
the second combination module is used for combining the relationship chain information and the authentication information to obtain combined information;
the sending module is used for sending the combined information to the terminal so that the terminal can share the information to the target sharing object based on the combined information;
and the encryption module is used for encrypting the combined information to obtain the encrypted combined information.
Correspondingly, an embodiment of the present application further provides a storage medium, where the storage medium stores instructions, and the instructions, when executed by a processor, implement the steps of any of the information sharing methods provided in the embodiment of the present application.
Correspondingly, an embodiment of the present application further provides a computer device, where the computer device includes a processor and a memory, where the memory stores multiple instructions, and the processor loads the instructions from the memory to execute any of the steps of the information sharing method provided in the embodiment of the present application.
The method includes the steps of receiving an information sharing instruction initiated by a child application in a parent application, wherein the child application runs in the parent application, displaying a plurality of objects to be shared in the parent application according to the information sharing instruction, acquiring a target sharing object selected by a user from the objects to be shared, combining relationship chain information of the target sharing object with authentication information to obtain combined information, generating business link information of the child application based on the combined information, and the business link information includes the combined information and shares the business link information with the target sharing object. The scheme can improve the safety of information sharing.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of a scene of an information sharing system according to an embodiment of the present disclosure;
fig. 2 is a first flowchart of an information sharing method according to an embodiment of the present disclosure;
fig. 3 is a second process diagram of the information sharing method according to the embodiment of the present application;
fig. 4 is a third flow diagram of an information sharing method according to an embodiment of the present application;
fig. 5 is a schematic view of a first interface of a sharing terminal according to an embodiment of the present disclosure;
fig. 6 is a schematic view of a second interface of the sharing terminal according to the embodiment of the present disclosure;
fig. 7 is a schematic view of a third interface of the sharing terminal according to the embodiment of the present application;
fig. 8 is a schematic view of a fourth interface of the sharing terminal according to the embodiment of the present application;
fig. 9 is a schematic view of a first interface of a shared terminal according to an embodiment of the present disclosure;
fig. 10 is a schematic diagram of a second interface of a shared terminal according to an embodiment of the present application;
fig. 11 is a schematic diagram of a third interface of a shared terminal according to an embodiment of the present application;
fig. 12 is a schematic diagram of a fourth interface of a shared terminal according to an embodiment of the present application;
fig. 13 is a schematic flowchart of an information sharing system according to an embodiment of the present disclosure;
fig. 14 is a schematic flowchart of a sharing-side information sharing method according to an embodiment of the present disclosure;
fig. 15 is a schematic flowchart of a shared-end information sharing method according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of a first information sharing method according to an embodiment of the present application;
fig. 17 is a schematic structural diagram of a second information sharing method according to an embodiment of the present application;
fig. 18 is a schematic structural diagram of a third information sharing method according to an embodiment of the present application;
fig. 19 is a schematic structural diagram of a computer device provided in an embodiment of the present application.
Detailed Description
Referring to the drawings, wherein like reference numbers refer to like elements, the principles of the present application are illustrated as being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the application and should not be taken as limiting the application with respect to other embodiments that are not detailed herein.
In the description that follows, specific embodiments of the present application will be described with reference to steps and symbols executed by one or more computers, unless otherwise indicated. Accordingly, these steps and operations will be referred to, several times, as being performed by a computer, the computer performing operations involving a processing unit of the computer in electronic signals representing data in a structured form. This operation transforms the data or maintains it at locations in the computer's memory system, which may be reconfigured or otherwise altered in a manner well known to those skilled in the art. The data maintains a data structure that is a physical location of the memory that has particular characteristics defined by the data format. However, while the principles of the application have been described in language specific to above, it is not intended to be limited to the specific form set forth herein, and it will be recognized by those of ordinary skill in the art that various of the steps and operations described below may be implemented in hardware.
The term "module" as used herein may be considered a software object executing on the computing system. The different components, modules, engines, and services described herein may be considered as implementation objects on the computing system. The apparatus and method described herein are preferably implemented in software, but may also be implemented in hardware, and are within the scope of the present application.
The embodiment of the application provides an information sharing method and device, a storage medium and computer equipment.
The embodiment of the application provides an information sharing system, which can comprise any one of first information sharing devices applicable to a terminal and any one of second information sharing devices applicable to a server. The first information sharing device can be integrated in a terminal, the terminal can be a mobile phone, a tablet computer, wearable equipment and the like, and the second information sharing device can be integrated in a server.
For example, an embodiment of the present application provides an information sharing system, where the information sharing system includes: the terminal and the server are connected through a network, wherein the network may further include a router, a gateway, and other network entities.
As shown in fig. 1, when information needs to be shared, a terminal may receive an information sharing instruction initiated by a child application in a parent application, where the child application runs in the parent application, displays a plurality of objects to be shared in the parent application according to the information sharing instruction, obtains a target sharing object selected by a user from the objects to be shared, combines relationship chain information of the target sharing object with authentication information to obtain combined information, generates service link information of the child application based on the combined information, and shares the service link information with the target sharing object, where the service link information includes the combined information.
In this embodiment, the first information sharing device may be specifically integrated in a terminal, and the terminal may be a mobile phone, a tablet computer, a wearable device, or the like.
As shown in fig. 2, an information sharing method is provided, which is suitable for a terminal, and the specific process may be as follows:
201. and receiving an information sharing instruction initiated by the child application in the parent application.
The parent application may be a native application carrying the child application, and may be directly run in the operating system. For example, the parent application may be a Social application, a mail application, a game application, and the like, wherein the Social application may include an instant messaging application, an SNS (Social networking Service) application, or a live application, and the like.
Wherein the sub-application may be an application implemented in an environment for running the parent application. The sub-application may be a social application, a file management application, a mail application, or a gaming application, among others. The parent application may specifically be a WeChat program (WeChat) and the corresponding child application may specifically be an applet, such as a shopping applet, a gaming applet, a servlet, and the like. The small program can be a mobile terminal application program running on a content interaction platform, is developed and completed based on a specific programming language, and does not need to be downloaded and installed.
In an embodiment, the sub-application may also be a business service account in an application, such as a business service account in a parent application, for example, a public number in an instant messaging application.
Further, in some embodiments, the sub-application may also be a web page, such as a game web page, a shopping web page, and the like.
That is, the sub-applications in the embodiment of the present invention may be in the form of an application program (APP), a web page, a public number, an applet, and the like.
In practical application, a user of the sharing terminal can open the sub-application through the main application, share the sub-application on a sub-application interface, and the sub-application can send an information sharing instruction according to the sharing operation of the user. For example, when an information sharing instruction needs to be triggered, an information sharing control can be set on an information sharing interface of the sub-application, and a user can enter the sub-application through the parent application and operate the information sharing control in the sub-application to trigger the information sharing instruction. At this time, the sharing terminal receives the information sharing instruction. The information sharing control can be represented in various forms, such as a button, an input box, an icon, and the like.
For example, as shown in fig. 5 and fig. 6, a user may enter a sub-application through a parent application, and when the user clicks a "multiplayer game" icon button of a main interface of the sub-application, the sub-application may display an information sharing interface according to the click operation, where the information sharing interface may include game difficulty, a game participant avatar, an invitation interface (i.e., an "invite friend" icon button), and the like. When a user clicks an 'invite friend' icon button of an information sharing interface, an information sharing instruction can be triggered. At this time, the terminal receives the information sharing instruction.
202. And displaying a plurality of objects to be shared in the parent application according to the information sharing instruction.
In practical application, the terminal can display a plurality of objects to be shared from the parent application according to the information sharing instruction. For example, as shown in fig. 7, when the user clicks an "invite friend" icon button of an information sharing interface in the sub application, an information sharing instruction is triggered. The terminal may display an object selection interface according to the information sharing instruction, where the object selection interface may include a plurality of objects to be shared, and the objects to be shared may be from a parent application, such as friend information, group chat information, and the like of a terminal user in the parent application. The user can select a plurality of objects to be shared, such as "XXX group chat", so as to determine a target sharing object required to share information.
In an embodiment, in order to improve the security of information sharing, the terminal may further check the sharing authority of the sub-application, so as to ensure that the sub-application without the sharing authority cannot perform information sharing operation. Specifically, the step of "displaying a plurality of objects to be shared in the parent application according to the information sharing instruction" may include:
verifying the sharing authority of the sub-application;
when the sub-application has the sharing right, acquiring associated object data according to the information sharing instruction;
and displaying a plurality of objects to be shared in the parent application according to the associated object data.
In practical application, for example, when a user calls a sharing interface of a parent application through a child application to perform information sharing operation, a terminal can check the sharing authority of the child application, and if the child application has the sharing authority, the terminal can acquire associated object data according to an information sharing instruction, pull up an object selection interface according to the associated object data, and display a plurality of objects to be shared in the parent application, so that the user can select a target shared object; if the sub-application does not have the sharing authority, the interface-free calling authority information can be returned, the information sharing process is stopped, and information sharing information without the authority can be displayed according to the information sharing instruction.
203. And acquiring a target sharing object selected by a user from the objects to be shared.
In practical applications, for example, as shown in fig. 7, a user may determine a target sharing object from a plurality of objects to be shared by clicking an object selection interface, such as "XXX group chat". The target sharing object can be a friend of the user, a group chat of the user, and the like.
In an embodiment, after the user determines the target sharing object, the information sharing interface may correspondingly pop up an "start game" icon, the user of the sharing terminal may trigger an instruction to start a game by clicking the icon, and the sub-application may start the game according to the instruction to start the game.
204. And combining the relationship chain information of the target sharing object with the authentication information to obtain combined information.
The relationship chain information may be relationship chain information related to the target sharing object, which is acquired by the terminal according to the target sharing object selected by the user, for example, the relationship chain information may include a plurality of relationship chain sub-information, such as user information, developer game information, social group information, and the like. For example, when the sub application is a game applet, the relationship chain information may include user information of the sharing terminal, user information or group information of the target sharing object, user information or group information of the game object also played in the object to be shared of the parent application, and the like.
The authentication information may be reference information such as standard information and permission information set by the server, for example, the authentication information may include a plurality of authentication sub-information, such as background standard time, game permission information, developer permission information, and sharing effective information. For example, the background standard time can be a standard time customized by the background server to unify the time in the content interaction application. The authority information may be operation information authorized to be executed or data information that can be acquired, and the like.
The combined information may be identification information including relationship chain information, for example, the combined information may be an identification code including relationship chain information, and the like.
Because the exposure of the real relationship chain information of the user can influence the information safety of the user, the combined information can be obtained by encrypting the real relationship chain information, so that the shared combined information and the relationship chain information are isolated, the relationship chain information is protected from being leaked, and the information safety of the user is guaranteed.
In practical application, when the target sharing object is determined, the relationship chain information and the authentication information of the target sharing object may be combined to obtain combined information, for example, the relationship chain information may include a plurality of relationship chain sub-information, the authentication information may include a plurality of authentication sub-information, the plurality of relationship chain sub-information and the plurality of authentication sub-information may be combined to obtain combined information, which may facilitate sharing of the identification code by the terminal, and encrypt the relationship chain information, so that the real relationship chain information of the user is not exposed, and the security of information sharing is improved.
In an embodiment, in order to improve the security of information sharing, the relationship chain information may be further encrypted by a preset rule to avoid information leakage, and specifically, the step of combining the relationship chain information of the target sharing object with the authentication information to obtain combined information may include:
acquiring authentication information, wherein the authentication information comprises a plurality of authentication sub-information;
based on the information field position, arranging the relation chain sub-information and the authentication sub-information;
and combining the relation chain sub-information with preset digits and the authentication sub-information based on the information position arrangement sequence to obtain combined information.
In practical applications, after the target sharing object is determined, corresponding relationship chain information and authentication information may be obtained according to the target sharing object, and the plurality of relationship chain sub-information and the plurality of authentication sub-information are arranged according to the information field position, for example, information arrangement is performed according to the information position arrangement sequence of the background standard time and the user information …. And then combining the plurality of relationship chain sub-information and the plurality of authentication sub-information according to the information position arrangement sequence to obtain combined information in the form of the identification code.
In an embodiment, in order to protect the real relationship chain information of the user, the combination rule of the relationship chain information and the authentication information may be changed and adjusted at any time to adjust the encryption method of the relationship chain information, thereby preventing information leakage. For example, the types of the relationship chain sub-information and the authentication sub-information may be adjusted, and the permutation and combination rules of the relationship chain information and the authentication information may be adjusted.
In an embodiment, the encrypting step of the relationship chain information may be further performed by a background server, and specifically, the step "combining the relationship chain information of the target sharing object with the authentication information to obtain combined information" may include:
acquiring relationship chain information of the target sharing object;
sending a combination request to a server, wherein the combination request carries the relation chain information to be encrypted, and the combination request is used for indicating the server to combine the relation chain information with authentication information to obtain combined information;
and receiving the combined information sent by the server.
In practical application, after the target sharing object is determined, the terminal can acquire corresponding relationship chain information according to the target sharing object, send a combination request to the background server, wherein the combination request includes the relationship chain information to be encrypted, and instruct the background server to perform combination encryption on the relationship chain information through the combination request. The background server can combine the acquired relationship chain information with the authentication information according to the acquired relationship chain information to obtain combined information, and send the combined information to the terminal so that the terminal can share the combined information.
205. And generating the service link information of the sub-application based on the combined information.
In practical applications, after the terminal obtains the combined information, the terminal may generate the service link information of the sub-application according to the combined information, for example, as shown in fig. 8, the terminal may package the combined information into a service link to generate the service link information of the sub-application, where the service link information may include link information of the sub-application logged in by the terminal, the combined information, and the like.
206. And sharing the service link information to the target sharing object.
In practical application, after the terminal generates the service link information of the sub-application, the service link information can be shared with the target sharing object. As shown in fig. 9, after the sharing terminal shares the service link information with the target sharing object, the shared terminal corresponding to the target sharing object receives the service link information carrying the sub-application login link information.
Because the exposure of the real relationship chain information of the user can influence the information security of the user, the encrypted information can be obtained by encrypting the real relationship chain information, so that a developer can only judge information necessary for game logic to be performed from the encrypted information, such as whether the sharing terminal and the shared terminal are from the same group, and the real relationship chain information of the user cannot be obtained, thereby ensuring the information security of the user.
In an embodiment, in order to ensure information security of a user and protect real relationship chain information of the user from being exposed, the relationship chain information may be encrypted for the second time, and specifically, after the step "sharing the service link information with the target sharing object", the method may further include:
and encrypting the combined information to obtain encrypted combined information, and uploading the encrypted combined information to a development server of the sub-application.
In practical application, the terminal can encrypt the combined information to obtain encrypted combined information, and upload the encrypted combined information to the development server of the sub-application, so that a developer can acquire the encrypted combined information through the development server and acquire necessary game logic information according to the encrypted combined information.
In an embodiment, the step of encrypting the combined information may be further performed by a storage server, and specifically, after the step of "encrypting the combined information to obtain encrypted combined information, and uploading the encrypted combined information to a development server of the sub application", the method may further include:
and sending an encryption request to a storage server, wherein the encryption request carries the combined information so that the storage server can encrypt the combined information and send the encrypted combined information to a development server of the sub-application.
In practical application, the terminal may send an encryption request carrying the combined information to the storage server, and the storage server may encrypt the combined information according to the encryption request to generate encrypted combined information, and send the encrypted combined information to the development server of the sub-application. For example, the terminal may return the combined information to the middle layer of the public library, and the public library performs transformation mapping on the combined information to encrypt the combined information and returns the encrypted combined information to the development server.
In an embodiment, the combined information may be encrypted by a preset encryption method, specifically, the step "encrypting the combined information to obtain encrypted combined information" may include:
transforming the combined information into hash output information;
and mapping and converting the hash output information based on an encryption mapping set to obtain encrypted combined information, wherein the encryption mapping set comprises the relation between the hash output information and the encrypted combined information.
In practical application, the combined information can be converted into hash output information based on a hash algorithm, and then the hash output information is subjected to mapping conversion through an encryption mapping set corresponding to an encryption algorithm to obtain encrypted combined information. In one embodiment, the combined information may be encrypted using an encryption algorithm such as MD5, Base64, SHA, and the like.
MD5(Message Digest Algorithm) is a cryptographic hash function that can generate a 128-bit hash value to ensure the integrity of the Message transmission. MD5 may be used as a method of encrypting information.
Among other things, Base64 may implement a binary to character process, representing binary data based on 64 printable characters. Base64 may be used as a method for encrypting information.
The SHA (Secure Hash Algorithm) is a cryptographic Hash function, and can calculate a fixed-length character string corresponding to a digital message. SHA may be used as a method of encrypting information.
In an embodiment, for example, after the terminal acquires the combined information, the combined information may be sent to a public library, and the public library may encrypt the combined information by using encryption algorithms such as MD5, Base64, SHA, and the like, to obtain encrypted combined information.
In an embodiment, after the development server obtains the encrypted combined information from the multiple terminals, the developer can obtain the encrypted combined information through the development server, judge whether the multiple terminals are from the same group, and then perform corresponding game logic, or develop a game with social attributes based on the encrypted combined information, and perform play methods such as ranking in a ranking list in the game, so as to enhance the social interest of the game.
In an embodiment, in order not to expose the real relationship chain information of the user, a method for encrypting the combined information in the public library may be further adjusted to prevent information leakage.
In an embodiment, as shown in fig. 10, a shared terminal corresponding to a target sharing object may receive service link information carrying sub-application login link information, and a user corresponding to the shared terminal may enter a waiting starting interface by clicking the service link information, where the waiting starting interface may include game difficulty, a game participant head portrait, an invitation interface (i.e., an "invite friend" icon button), and the like. As shown in fig. 11 and 12, when the user of the sharing terminal clicks the "start game" button, the game participant waiting for the start interface display can play the game, and a leader board can be displayed after the game is finished.
As can be seen from the above, in the embodiment of the application, an information sharing instruction initiated by a child application in a parent application may be received, where the child application runs in the parent application, displays a plurality of objects to be shared in the parent application according to the information sharing instruction, obtains a target sharing object selected by a user from the objects to be shared, combines relationship chain information of the target sharing object with authentication information to obtain combined information, generates service link information of the child application based on the combined information, and shares the service link information with the target sharing object, where the service link information includes the combined information. According to the scheme, the relationship chain information can be encrypted in a front-end and background dual control mode, so that the shared information is isolated from the real relationship chain information of the user, developers can judge whether the shared terminal and the shared terminal are from the same group, the real relationship chain information of the user is not exposed, meanwhile, the management and control capacity is enhanced through the front-end and background dual management and control, and the information sharing safety is improved.
In an embodiment, the description will be made from the perspective of a second information sharing apparatus, which may be specifically integrated in a server.
As shown in fig. 3, an information sharing method is provided, which is suitable for a server, and the specific process may be as follows:
301. and acquiring the relationship chain information of the target sharing object from the terminal.
In practical application, the server may obtain the relationship chain information of the target sharing object from the terminal, for example, the background server may obtain the relationship chain information of the target sharing object from the terminal.
302. And combining the relation chain information and the authentication information to obtain combined information.
In practical application, after the target sharing object is determined, the terminal can acquire corresponding relationship chain information according to the target sharing object and send the relationship chain information to the background server, so that the background server can perform combined encryption on the relationship chain information. The background server may arrange the relationship chain sub-information and the authentication sub-information according to the corresponding information field positions according to the acquired relationship chain information in combination with the authentication information, and combine the relationship chain sub-information with a preset number of bits and the authentication sub-information according to the information position arrangement sequence to obtain combined information.
In an embodiment, in order to improve the security of information sharing, the relationship chain information may be further encrypted by a preset rule to avoid information leakage, and specifically, the step "combining the relationship chain information with the authentication information to obtain combined information" may include:
acquiring authentication information, wherein the authentication information comprises a plurality of authentication sub-information;
based on the information field position, arranging the relation chain sub-information and the authentication sub-information;
and combining the relation chain sub-information with preset digits and the authentication sub-information based on the information position arrangement sequence to obtain combined information.
In practical applications, after the target sharing object is determined, corresponding relationship chain information and authentication information may be obtained according to the target sharing object, and the plurality of relationship chain sub-information and the plurality of authentication sub-information are arranged according to the information field position, for example, information arrangement is performed according to the information position arrangement sequence of the background standard time and the user information …. And then combining the plurality of relationship chain sub-information and the plurality of authentication sub-information according to the information position arrangement sequence to obtain combined information in the form of the identification code.
In an embodiment, in order to protect the real relationship chain information of the user, the combination rule of the relationship chain information and the authentication information may be changed and adjusted at any time to adjust the encryption method of the relationship chain information, thereby preventing information leakage. For example, the types of the relationship chain sub-information and the authentication sub-information may be adjusted, and the permutation and combination rules of the relationship chain information and the authentication information may be adjusted.
303. And sending the combined information to the terminal so that the terminal can share the information to the target sharing object based on the combined information.
In practical application, after the background server combines the relationship chain information and the authentication information, the combined information can be sent to the terminal, so that the terminal can share the combined information.
In an embodiment, to ensure information security of a user, the combined information obtaining permission of the sharing terminal may be checked, so that the sharing terminal without the combined information obtaining permission cannot obtain the combined information, and specifically, the step "sending the combined information to the terminal" may include:
verifying the combined information acquisition authority of the terminal;
and when the terminal has the combined information acquisition right, sending the combined information to the terminal.
In practical application, after the background server generates the combined information, the combined information acquisition permission of the sharing terminal can be verified, when the sharing terminal has the combined information acquisition permission, the background server can send the combined information to the sharing terminal, so that the sharing terminal can share information based on the combined information, and send service link information including the combined information to a target sharing object; when the sharing terminal does not have the right to acquire the combined information, the background server may not perform the step of sending the combined information, and the sharing terminal may send the service link information that does not include the combined information to the target sharing object.
304. And encrypting the combined information to obtain the encrypted combined information.
In practical application, the terminal may send an encryption request carrying the combined information to the storage server, and the storage server may encrypt the combined information according to the encryption request to generate encrypted combined information. For example, the terminal may return the combined information to the middle layer of the public library, and the public library performs transformation mapping on the combined information to encrypt the combined information.
In an embodiment, after the storage server generates the encrypted combination information, the storage server may also upload the encrypted combination information to the development server of the sub application.
In one embodiment, in order not to expose the user's true relationship chain information to the developer, the relationship chain information may be encrypted twice, thereby preventing the relationship chain information from being leaked. Firstly, the background server can carry out combination transformation on the relationship chain information to obtain combined information, and then the first time of information encryption is completed. And then the public library can perform conversion mapping on the combined information to obtain the encrypted combined information, and the encryption of the information for the second time is completed. Therefore, through the combination of the front end and the background, the relationship chain information after external encryption is provided, real relationship chain information is not exposed, so that a developer can judge whether the terminals are from the same group, game logic is performed, and meanwhile, the real relationship chain information of a user cannot be acquired, and the safety of information sharing is improved.
In an embodiment, the security of information sharing can be improved through dual authority control performed by the front end and the background. For example, the background server may check the combined information acquisition permission of the sharing terminal to determine whether to send the combined information to the sharing terminal. The public library can also check the acquisition authority of the development server to determine whether to send the encrypted combined information to the development server for the developer to check.
In an embodiment, when the background rule has a bug, information sharing can be stopped urgently by adjusting the encryption rule of the public base, upgrading the terminal version or forbidding related rights, so that the information security is improved.
In an embodiment, in order to ensure information security of a user, the front end may also perform verification of the acquisition right on the development server, and for the development server that does not acquire the right to acquire the encrypted combined information, the public library may not transmit the encrypted combined information, that is, the developer cannot acquire the encrypted combined information through the development server that does not acquire the right. Specifically, after the step of "encrypting the combined information to obtain the encrypted combined information", the method may further include:
verifying the acquisition authority of the development server of the sub-application for the encrypted combined information;
and when the development server has the acquisition right, uploading the encrypted combined information to the development server.
In practical application, after the public library encrypts the combined information to obtain the encrypted combined information, the public library may check the acquisition authority of the development server to check whether the development server can acquire the encrypted combined information. When the development server has the acquisition right, the development server can acquire the encrypted combined information, and the public library can upload the encrypted combined information to the development server, so that a developer can check the encrypted combined information through the development server and perform game logic; when the development server does not have the right to acquire, it indicates that the development server does not have the right to acquire the encrypted combined information, and may only return the interface calling result.
As can be seen from the above, in the embodiment of the application, the relationship chain information of the target sharing object may be acquired from the terminal, the relationship chain information and the authentication information are combined to obtain the combined information, and the combined information is sent to the terminal, so that the terminal shares the information with the target sharing object based on the combined information, encrypts the combined information, and obtains the encrypted combined information. According to the scheme, the relationship chain information can be encrypted in a front-end and background dual control mode, so that the shared information is isolated from the real relationship chain information of the user, developers can judge whether the shared terminal and the shared terminal are from the same group, the real relationship chain information of the user is not exposed, meanwhile, the management and control capacity is enhanced through the front-end and background dual management and control, and the information sharing safety is improved.
The method described in the above embodiments is further illustrated in detail by way of example.
Referring to fig. 13, there is provided an information sharing system including: the terminal and the server are connected through a network, and the network includes network entities such as a router, a gateway and the like, which are not shown in the figure.
Referring to fig. 4, the specific process of the information sharing method may be as follows:
401. and the sharing terminal receives an information sharing instruction initiated by the child application in the parent application.
For example, a user of the sharing terminal may enter a sub-application through a parent application, as shown in fig. 5, when the user clicks a "multiplayer game" icon button of a main interface of the sub-application, the sub-application may display an information sharing interface according to the click operation, where the information sharing interface may include game difficulty, a head portrait of a game participant, an invitation interface (i.e., an "invite friend" icon button), and the like. As shown in fig. 6, when the user clicks an "invite friend" icon button of the information sharing interface, an information sharing instruction may be triggered. At this time, the sharing terminal receives the information sharing instruction.
402. And the sharing terminal displays a plurality of objects to be shared in the parent application according to the information sharing instruction.
For example, as shown in fig. 7, when a user of the sharing terminal clicks an "invite friend" icon button of the information sharing interface, an information sharing instruction is triggered. The sharing terminal may display an object selection interface according to the information sharing instruction, where the object selection interface may include a plurality of objects to be shared, and the objects to be shared are from a parent application, such as friend information, group chat information, and the like of a sharing terminal user in the parent application.
In an embodiment, for example, in order to improve the security of information sharing, the sharing authority of the sub-application may be checked, so as to ensure that the sub-application without the sharing authority cannot perform the information sharing operation. As shown in fig. 14, when a user calls a sharing interface of a parent application through a child application to perform an information sharing operation, a sharing terminal may verify a sharing right of the child application, and if the child application has the sharing right, the sharing terminal may pull up an object selection interface according to an information sharing instruction and display a plurality of objects to be shared in the parent application; if the sub-application does not have the sharing authority, the information of the interface-free calling authority can be returned, and the information sharing process is stopped.
403. The sharing terminal obtains a target sharing object selected by a user from the objects to be shared.
For example, as shown in fig. 7, the user may determine the target sharing object from the plurality of objects to be shared by clicking an object selection interface, such as "XXX group chat". The target sharing object can be a friend of the user, a group chat of the user, and the like.
404. And the background server combines the relationship chain information and the authentication information of the target sharing object to obtain combined information.
For example, as shown in fig. 14, after the sharing terminal determines the target sharing object, relationship chain information corresponding to the target sharing object, such as a plurality of relationship chain sub-information corresponding to the target sharing object, such as user information, developer game information, social group information, and the like, may be acquired. And then, the acquired relationship chain information is sent to a background server, and the background server can combine the acquired relationship chain information and the authentication information to obtain combined information in the form of the identification code.
In an embodiment, in order to protect the real relationship chain information of the user from being leaked, the combined encryption method may also be adjusted.
405. And the sharing terminal generates the service link information of the sub-application based on the combined information.
For example, as shown in fig. 8, the background server may return the combined information to the sharing terminal, and the sharing terminal may package the combined information into a service link to generate service link information of the sub-application, where the service link information may include link information of the terminal logged in to the sub-application, the combined information, and the like.
In an embodiment, the background server may further check the combined information acquisition permission of the sharing terminal for the combined information, so as to determine whether the sharing terminal has permission to acquire the combined information. As shown in fig. 14, when the sharing terminal has the right to obtain the combined information, the background server may send the combined information to the sharing terminal, so that the sharing terminal performs information sharing based on the combined information, and sends service link information including the combined information to the target sharing object; when the sharing terminal does not have the right of acquiring the combined information, the step of sending the combined information may not be performed, and the sharing terminal may send the service link information that does not include the combined information to the target sharing object.
406. And the sharing terminal shares the service link information with the target sharing object.
For example, as shown in fig. 9, after the sharing terminal shares the service link information with the target sharing object, the shared terminal corresponding to the target sharing object receives the service link information carrying the sub-application login link information.
In an embodiment, as shown in fig. 15, after the shared terminal of the target sharing object receives the service link information, the user of the shared terminal may enter a waiting starting interface by clicking the service link information, as shown in fig. 10, the waiting starting interface may include game difficulty, game participant head portrait, an invitation interface (i.e., an "invite friend" icon button), and the like. As shown in fig. 11 and 12, when the user of the sharing terminal clicks the "start game" button, the game participant waiting for the start interface display can play the game, and a leader board can be displayed after the game is finished.
In an embodiment, as shown in fig. 15, after the shared terminal corresponding to the target sharing object acquires the service link information, the combined information in the service link information may be detected, when the service link information includes the combined information, the shared terminal may return the combined information to the intermediate layer of the public library, and the public library may perform transformation mapping on the combined information through encryption algorithms such as MD5, Base64, and SHA, to obtain the encrypted combined information. After the public library encrypts the combined information to obtain the encrypted combined information, the public library can upload the encrypted combined information to the development server so that a developer can acquire the encrypted combined information through the development server. When the service link information does not include the combined information, the step of returning the combined information to the common base may not be performed.
407. And the storage server encrypts the combined information to obtain encrypted combined information.
For example, as shown in fig. 14, after acquiring the combined information, the sharing terminal may return the combined information to the intermediate layer of the public library, and the public library may perform conversion mapping on the combined information through encryption algorithms such as MD5, Base64, SHA, and the like, to obtain the encrypted combined information.
In an embodiment, in order not to expose the real relationship chain information of the user, an algorithm for encrypting the combined information in the public library may be further adjusted to prevent information leakage.
408. And the storage server uploads the encrypted combined information to a development server of the sub-application.
For example, as shown in fig. 14, after the public library encrypts the combined information to obtain the encrypted combined information, the public library may also upload the encrypted combined information to the development server, so that the developer can obtain the encrypted combined information through the development server.
In one embodiment, the public library can also check the acquisition authority of the development server to judge whether the development server has the authority to acquire the encrypted combined information, when the development server has the acquisition authority, the development server can acquire the encrypted combined information, and the public library can upload the encrypted combined information to the development server so that a developer can check the encrypted combined information through the development server, and the sub-application performs game logic through the encrypted combined information; when the development server does not have the right to acquire, it indicates that the development server does not have the right to acquire the encrypted combined information, and may only return the interface calling result.
In an embodiment, after the development server obtains the encrypted combined information from the multiple terminals, the developer can obtain the encrypted combined information through the development server, judge whether the multiple terminals are from the same group, and then perform corresponding game logic, or develop a game with social attributes based on the encrypted combined information, and perform play methods such as ranking in a ranking list in the game, so as to enhance the social interest of the game. For example, a developer may obtain the encrypted combination information from the sharing terminal and the encrypted combination information from the shared terminal through the development server, and determine whether the sharing terminal and the shared terminal are from the same group, so as to perform a corresponding game logic.
Therefore, in the embodiment of the application, an information sharing instruction initiated by a child application in a parent application can be received through a sharing terminal, the sharing terminal displays a plurality of objects to be shared in the parent application according to the information sharing instruction, the sharing terminal obtains a target sharing object selected by a user from the objects to be shared, a background server combines relationship chain information of the target sharing object with authentication information to obtain combined information, the sharing terminal generates business link information of the child application based on the combined information, the sharing terminal shares the business link information with the target sharing object, a storage server encrypts the combined information to obtain encrypted combined information, and the storage server uploads the encrypted combined information to a development server of the child application. According to the scheme, the relationship chain information can be encrypted in a front-end and background dual control mode, so that the shared information is isolated from the real relationship chain information of the user, developers can judge whether the shared terminal and the shared terminal are from the same group, the real relationship chain information of the user is not exposed, meanwhile, the management and control capacity is enhanced through the front-end and background dual management and control, and the information sharing safety is improved.
In order to better implement the method, an embodiment of the present application further provides an information sharing device, where the information sharing device may be applied to a terminal, and as shown in fig. 16, the information sharing device may include: the receiving module 161, the displaying module 162, the first obtaining module 163, the first combining module 164, the generating module 165, and the sharing module 166 are as follows:
a receiving module 161, configured to receive an information sharing instruction initiated by a child application in a parent application, where the child application runs in the parent application;
the display module 162 is configured to display the multiple objects to be shared in the parent application according to the information sharing instruction;
a first obtaining module 163, configured to obtain a target sharing object selected by a user from the objects to be shared;
the first combining module 164 is configured to combine the relationship chain information of the target sharing object with the authentication information to obtain combined information;
a generating module 165, configured to generate service link information of the sub-application based on the combined information, where the service link information includes the combined information;
a sharing module 166, configured to share the service link information with the target sharing object.
In an embodiment, as shown in fig. 17, the information sharing module may further include:
and an encryption module 167, configured to encrypt the combined information to obtain encrypted combined information, and upload the encrypted combined information to a development server of a sub-application.
In an embodiment, the encryption module 167 may specifically be configured to:
transforming the combined information into hash output information;
and mapping and converting the hash output information based on an encryption mapping set to obtain encrypted combined information, wherein the encryption mapping set comprises the relation between the hash output information and the encrypted combined information.
In an embodiment, the encryption module 167 may specifically be configured to:
and sending an encryption request to a storage server, wherein the encryption request carries the combined information so that the storage server can encrypt the combined information and send the encrypted combined information to a development server of the sub-application.
In an embodiment, the display module 162 may be specifically configured to:
verifying the sharing authority of the sub-application;
when the sub-application has the sharing right, acquiring associated object data according to the information sharing instruction;
and displaying a plurality of objects to be shared in the parent application according to the associated object data.
In an embodiment, the first assembling module 164 may be specifically configured to:
acquiring authentication information, wherein the authentication information comprises a plurality of authentication sub-information;
based on the information field position, arranging the relation chain sub-information and the authentication sub-information;
and combining the relation chain sub-information with preset digits and the authentication sub-information based on the information position arrangement sequence to obtain combined information.
In an embodiment, the first assembling module 164 may be specifically configured to:
acquiring relationship chain information of the target sharing object;
sending a combination request to a server, wherein the combination request carries the relation chain information to be encrypted, and the combination request is used for indicating the server to combine the relation chain information with authentication information to obtain combined information;
and receiving the combined information sent by the server.
As can be seen from the above, in the embodiment of the application, an information sharing instruction initiated by a child application in a parent application may be received by the receiving module 161, where the child application runs in the parent application, a plurality of objects to be shared in the parent application are displayed by the display module 162 according to the information sharing instruction, a target sharing object selected by a user from the objects to be shared is obtained by the first obtaining module 163, relationship chain information of the target sharing object is combined with authentication information by the first combining module 164 to obtain combined information, service link information of the child application is generated by the generating module 165 based on the combined information, the service link information includes the combined information, and the service link information is shared with the target sharing object by the sharing module 166. According to the scheme, the relationship chain information can be encrypted in a front-end and background dual control mode, so that the shared information is isolated from the real relationship chain information of the user, developers can judge whether the shared terminal and the shared terminal are from the same group, the real relationship chain information of the user is not exposed, meanwhile, the management and control capacity is enhanced through the front-end and background dual management and control, and the information sharing safety is improved.
In order to better implement the above method, an embodiment of the present application further provides an information sharing apparatus, where the information sharing apparatus may be applied to a server, and as shown in fig. 18, the information sharing apparatus may include: the second acquiring module 181, the second combining module 182, the sending module 183, and the encrypting module 184 are as follows:
a second obtaining module 181, configured to obtain relationship chain information of the target sharing object from the terminal;
the second combining module 182 is configured to combine the relationship chain information and the authentication information to obtain combined information;
the sending module 183 is configured to send the combined information to the terminal, so that the terminal shares information with the target sharing object based on the combined information;
and the encryption module 184 is configured to encrypt the combined information to obtain encrypted combined information.
In an embodiment, the second assembling module 182 may be specifically configured to:
acquiring authentication information, wherein the authentication information comprises a plurality of authentication sub-information;
based on the information field position, arranging the relation chain sub-information and the authentication sub-information;
and combining the relation chain sub-information with preset digits and the authentication sub-information based on the information position arrangement sequence to obtain combined information.
As can be seen from the above, in the embodiment of the application, the second obtaining module 181 may obtain the relationship chain information of the target sharing object from the terminal, the second combining module 182 combines the relationship chain information with the authentication information to obtain combined information, the sending module 183 sends the combined information to the terminal, so that the terminal shares the information with the target sharing object based on the combined information, and the encrypting module 184 encrypts the combined information to obtain encrypted combined information. According to the scheme, the relationship chain information can be encrypted in a front-end and background dual control mode, so that the shared information is isolated from the real relationship chain information of the user, developers can judge whether the shared terminal and the shared terminal are from the same group, the real relationship chain information of the user is not exposed, meanwhile, the management and control capacity is enhanced through the front-end and background dual management and control, and the information sharing safety is improved.
The embodiment of the application further provides a computer device, which can be a server or a terminal and the like, and is integrated with any one of the information sharing devices provided by the embodiment of the application. As shown in fig. 19, fig. 19 is a schematic structural diagram of a computer device provided in an embodiment of the present application, and specifically:
the computer device may include components such as a processor 191 of one or more processing cores, memory 192 of one or more computer-readable storage media, a power supply 193, and an input unit 194. Those skilled in the art will appreciate that the computer device configuration illustrated in FIG. 19 does not constitute a limitation of computer devices, and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. Wherein:
the processor 191 is a control center of the computer device, connects various parts of the entire computer device using various interfaces and lines, and performs various functions of the computer device and processes data by operating or executing software programs and/or modules stored in the memory 192 and calling data stored in the memory 192, thereby monitoring the computer device as a whole. Optionally, processor 191 may include one or more processing cores; preferably, the processor 191 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 191.
The memory 192 may be used to store software programs and modules, and the processor 191 executes various functional applications and data processing by operating the software programs and modules stored in the memory 192. The memory 192 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to use of the computer device, and the like. Further, the memory 192 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 192 may also include a memory controller to provide the processor 191 with access to the memory 192.
The computer device further includes a power supply 193 for supplying power to the various components, and preferably, the power supply 193 is logically connected to the processor 191 via a power management system, so that functions of managing charging, discharging, and power consumption are performed via the power management system. The power source 193 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The computer apparatus may further include an input unit 194, and the input unit 194 may be used to receive input numeric or character information and generate a keyboard, mouse, joystick, optical or trackball signal input in relation to user setting and function control.
Although not shown, the computer device may further include a display unit and the like, which are not described in detail herein. Specifically, in this embodiment, the processor 191 in the computer device loads the executable file corresponding to the process of one or more application programs into the memory 192 according to the following instructions, and the processor 191 runs the application programs stored in the memory 192, thereby implementing various functions as follows:
receiving an information sharing instruction initiated by a sub-application in a parent application, wherein the sub-application runs in the parent application, displaying a plurality of objects to be shared in the parent application according to the information sharing instruction, acquiring a target sharing object selected by a user from the objects to be shared, combining relationship chain information of the target sharing object with authentication information to obtain combined information, generating service link information of the sub-application based on the combined information, and the service link information comprises the combined information and shares the service link information with the target sharing object.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
As can be seen from the above, in the embodiment of the application, an information sharing instruction initiated by a child application in a parent application may be received, where the child application runs in the parent application, displays a plurality of objects to be shared in the parent application according to the information sharing instruction, obtains a target sharing object selected by a user from the objects to be shared, combines relationship chain information of the target sharing object with authentication information to obtain combined information, generates service link information of the child application based on the combined information, and shares the service link information with the target sharing object, where the service link information includes the combined information. According to the scheme, the relationship chain information can be encrypted in a front-end and background dual control mode, so that the shared information is isolated from the real relationship chain information of the user, developers can judge whether the shared terminal and the shared terminal are from the same group, the real relationship chain information of the user is not exposed, meanwhile, the management and control capacity is enhanced through the front-end and background dual management and control, and the information sharing safety is improved.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, embodiments of the present application provide a storage medium, in which a plurality of instructions are stored, and the instructions can be loaded by a processor to execute the steps in any one of the information sharing methods provided in the embodiments of the present application. For example, the instructions may perform the steps of:
receiving an information sharing instruction initiated by a sub-application in a parent application, wherein the sub-application runs in the parent application, displaying a plurality of objects to be shared in the parent application according to the information sharing instruction, acquiring a target sharing object selected by a user from the objects to be shared, combining relationship chain information of the target sharing object with authentication information to obtain combined information, generating service link information of the sub-application based on the combined information, and the service link information comprises the combined information and shares the service link information with the target sharing object.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium may execute the steps in any information sharing method provided in the embodiments of the present application, beneficial effects that can be achieved by any information sharing method provided in the embodiments of the present application may be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
The information sharing method, the information sharing device, the storage medium and the computer device provided by the embodiments of the present application are introduced in detail, and a specific example is applied to illustrate the principle and the implementation manner of the present application, and the description of the embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (12)

1. An information sharing method, comprising:
receiving an information sharing instruction initiated by a child application in a parent application, wherein the child application runs in the parent application;
displaying a plurality of objects to be shared in the parent application according to the information sharing instruction;
acquiring a target sharing object selected by a user from the objects to be shared;
combining the relationship chain information of the target sharing object with authentication information to obtain combined information, wherein the authentication information comprises at least one of background standard time, game authority information, developer authority information and sharing effective information;
generating service link information of the sub-application based on the combined information, wherein the service link information comprises the combined information;
sharing the service link information to the target sharing object;
and encrypting the combined information to obtain encrypted combined information, and uploading the encrypted combined information to a development server of the sub-application, wherein the encrypted combined information can be used for the development server to directly perform service logic processing based on the encrypted combined information.
2. The information sharing method according to claim 1, wherein encrypting the combined information to obtain encrypted combined information, and uploading the encrypted combined information to a development server of a sub-application includes:
and sending an encryption request to a storage server, wherein the encryption request carries the combined information so that the storage server can encrypt the combined information and send the encrypted combined information to a development server of the sub-application.
3. The information sharing method according to claim 1, wherein the relationship chain information includes a plurality of relationship chain sub information;
combining the relationship chain information of the target sharing object with the authentication information to obtain combined information, wherein the combined information comprises:
acquiring authentication information, wherein the authentication information comprises a plurality of authentication sub-information;
based on the information field position, arranging the relation chain sub-information and the authentication sub-information;
and combining the relation chain sub-information with preset digits and the authentication sub-information based on the information position arrangement sequence to obtain combined information.
4. The information sharing method according to claim 1, wherein combining the relationship chain information of the target sharing object with the authentication information to obtain combined information comprises:
acquiring relationship chain information of the target sharing object;
sending a combination request to a server, wherein the combination request carries the relation chain information to be encrypted, and the combination request is used for indicating the server to combine the relation chain information with authentication information to obtain combined information;
and receiving the combined information sent by the server.
5. The information sharing method according to claim 1, wherein displaying a plurality of objects to be shared in the parent application according to the information sharing instruction includes:
verifying the sharing authority of the sub-application;
when the sub-application has the sharing right, acquiring associated object data according to the information sharing instruction;
and displaying a plurality of objects to be shared in the parent application according to the associated object data.
6. The information sharing method according to claim 1, wherein encrypting the combined information to obtain encrypted combined information includes:
transforming the combined information into hash output information;
and mapping and converting the hash output information based on an encryption mapping set to obtain encrypted combined information, wherein the encryption mapping set comprises the relation between the hash output information and the encrypted combined information.
7. An information sharing method, comprising:
acquiring relationship chain information of a target sharing object from a terminal, wherein the relationship chain information is information sharing instructions initiated by child applications in a parent application received by the terminal, displaying a plurality of objects to be shared in the parent application according to the information sharing instructions, and acquiring information acquired after a user selects the target sharing object from the objects to be shared, wherein the child applications run in the parent application;
combining the relationship chain information with authentication information to obtain combined information, wherein the authentication information comprises at least one of background standard time, game authority information, developer authority information and sharing effective information;
sending the combined information to a terminal so that the terminal generates service link information of the sub-application based on the combined information and shares the service link information to the target sharing object, wherein the service link information comprises the combined information;
encrypting the combined information to obtain encrypted combined information;
verifying the acquisition authority of the development server of the sub-application for the encrypted combined information;
and when the development server has the acquisition right, uploading the encrypted combined information to the development server so that the development server directly performs service logic processing based on the encrypted combined information.
8. The information sharing method according to claim 7, wherein the relationship chain information includes a plurality of relationship chain sub information;
combining the relationship chain information with the authentication information to obtain combined information, wherein the combined information comprises:
acquiring authentication information, wherein the authentication information comprises a plurality of authentication sub-information;
based on the information field position, arranging the relation chain sub-information and the authentication sub-information;
and combining the relation chain sub-information with preset digits and the authentication sub-information based on the information position arrangement sequence to obtain combined information.
9. An information sharing apparatus, comprising:
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving an information sharing instruction initiated by a child application in a parent application, and the child application runs in the parent application;
the display module is used for displaying a plurality of objects to be shared in the parent application according to the information sharing instruction;
the first acquisition module is used for acquiring a target sharing object selected by a user from the objects to be shared;
the first combination module is used for combining the relationship chain information of the target sharing object with authentication information to obtain combined information, wherein the authentication information comprises at least one of background standard time, game permission information, developer permission information and sharing effective information;
a generating module, configured to generate service link information of the sub-application based on the combined information, where the service link information includes the combined information;
the sharing module is used for sharing the business link information with the target sharing object, encrypting the combined information to obtain encrypted combined information, and uploading the encrypted combined information to a development server of a sub-application, wherein the encrypted combined information can be used for the development server to directly perform business logic processing based on the encrypted combined information.
10. An information sharing apparatus, comprising:
the second obtaining module is used for obtaining relationship chain information of target sharing objects from a terminal, wherein the relationship chain information is information sharing instructions initiated by child applications in a parent application received by the terminal, displaying a plurality of objects to be shared in the parent application according to the information sharing instructions, and obtaining information obtained after a target sharing object selected by a user from the objects to be shared, and the child applications run in the parent application;
the second combination module is used for combining the relationship chain information with authentication information to obtain combined information, wherein the authentication information comprises at least one of background standard time, game permission information, developer permission information and sharing effective information;
the sending module is used for sending the combined information to a terminal so that the terminal can generate the business link information of the sub-application based on the combined information and share the business link information to the target sharing object, wherein the business link information comprises the combined information;
the encryption module is used for encrypting the combined information to obtain encrypted combined information; verifying the acquisition authority of the development server of the sub-application for the encrypted combined information; and when the development server has the acquisition right, uploading the encrypted combined information to the development server so that the development server directly performs service logic processing based on the encrypted combined information.
11. A storage medium storing instructions which, when executed by a processor, carry out the steps of the method according to any one of claims 1 to 8.
12. A computer device comprising a processor and a memory, the memory storing a plurality of instructions; the processor loads instructions from the memory to perform the steps of the information sharing method according to any one of claims 1 to 8.
CN201910313152.XA 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment Active CN110113321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910313152.XA CN110113321B (en) 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910313152.XA CN110113321B (en) 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN110113321A CN110113321A (en) 2019-08-09
CN110113321B true CN110113321B (en) 2020-11-03

Family

ID=67485794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910313152.XA Active CN110113321B (en) 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN110113321B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163398A (en) * 2020-09-30 2021-01-01 金蝶软件(中国)有限公司 Chart sharing method and related equipment thereof

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5872847A (en) * 1996-07-30 1999-02-16 Itt Industries, Inc. Using trusted associations to establish trust in a computer network
CN103297484B (en) * 2012-03-05 2017-07-11 腾讯科技(深圳)有限公司 resource sharing method and device
CN104052762B (en) * 2013-03-11 2019-02-12 腾讯科技(深圳)有限公司 The method, apparatus and system of data sharing
CN104580364B (en) * 2014-12-01 2018-08-10 百度在线网络技术(北京)有限公司 A kind of method and apparatus of resource sharing
CN104966211B (en) * 2015-06-04 2019-03-29 有米科技股份有限公司 A kind of method and system of automatic identification Channel Relationship
CN107102880B (en) * 2017-05-11 2018-11-23 腾讯科技(深圳)有限公司 Message treatment method, device, storage medium and computer equipment
CN109600408B (en) * 2017-09-30 2020-12-29 腾讯科技(深圳)有限公司 Resource sharing method and device, storage medium and computer equipment
CN108512829B (en) * 2018-02-26 2021-08-31 平安普惠企业管理有限公司 Information sharing method and device, computer equipment and storage medium
CN108809811B (en) * 2018-06-12 2021-11-16 腾讯科技(深圳)有限公司 Object sharing method and device
CN109241459A (en) * 2018-07-25 2019-01-18 五八有限公司 Content share method, device, computer equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN110113321A (en) 2019-08-09

Similar Documents

Publication Publication Date Title
US10999317B2 (en) Blockchain tracking of virtual universe traversal results
US10635289B1 (en) Discouraging screen capture
US8745401B1 (en) Authorizing actions performed by an online service provider
JP6388702B1 (en) Information processing program, information processing method, and information processing terminal
CN108337210A (en) Equipment configuration method and device, system
CN109565518A (en) Interchangeable content retrieval
CN109154968A (en) The system and method for the safety in organizing and efficiently communicated
WO2016200594A2 (en) System, apparatus and method for secure coordination of a rendezvous point for distributed devices using entropy multiplexing
US11881940B2 (en) Method and system for providing secure message
CN110113321B (en) Information sharing method and device, storage medium and computer equipment
CN109120576A (en) Data sharing method and device, computer equipment and storage medium
Li et al. Lost in the digital wild: Hiding information in digital activities
Rahman et al. Blockchain-enabled SLA compliance for crowdsourced edge-based network function virtualization
CN110661789B (en) Address resetting method, device, equipment and computer readable storage medium
US20220058270A1 (en) System, devices and/or processes for delegation of cryptographic control of firmware authorization management
CN112184277B (en) Virtual article package transmitting and receiving method, device, equipment and storage medium
CN111193694B (en) Application authorization management method, terminal and medium based on dual-system operating environment
CN113949508B (en) Process data processing method and device based on random number consensus mechanism
CN107210992B (en) Uploading and downloading data between a secure data system and an external data system
JP2019079499A (en) Information processing program, information processing method and information processing terminal
KR20230135333A (en) Method of accessing to open source-based metaverse platform using avatar-token information
CN114338185B (en) Method and device for processing flag, electronic equipment and computer readable medium
CN114827074B (en) Social message processing method, device, server, terminal and medium
CN117411619A (en) Terminal communication method, device, computer equipment and computer readable storage medium
CN116474372A (en) Game preview method, game preview device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant