CN113326537A - Data processing method, terminal device and storage medium - Google Patents

Data processing method, terminal device and storage medium Download PDF

Info

Publication number
CN113326537A
CN113326537A CN202110672806.5A CN202110672806A CN113326537A CN 113326537 A CN113326537 A CN 113326537A CN 202110672806 A CN202110672806 A CN 202110672806A CN 113326537 A CN113326537 A CN 113326537A
Authority
CN
China
Prior art keywords
data
information
terminal
shielded
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110672806.5A
Other languages
Chinese (zh)
Inventor
肖凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN202110672806.5A priority Critical patent/CN113326537A/en
Publication of CN113326537A publication Critical patent/CN113326537A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a data processing method, which comprises the following steps: determining that at least one piece of information to be shielded exists in the first data; shielding at least one to-be-shielded information in the first data, and determining or generating second data; and sharing the second data to at least one second terminal and/or platform. By the method, the information to be shielded can be automatically shielded in the process of sharing data, and safety is improved.

Description

Data processing method, terminal device and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, a terminal device, and a storage medium.
Background
With the development of the times, users can share data such as pictures and videos to other users through software, and in the process of designing and implementing the application, the inventor finds that at least the following problems exist: since the information carried by the data often includes the personal privacy of the user, how to protect the personal privacy of the user in the process of sharing the data is a technical problem that needs to be solved urgently.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
In view of the above technical problems, the present application provides a data processing method, a terminal device and a storage medium, which can improve the security of data sharing.
Optionally, an embodiment of the present application provides a data processing method, which is applied to a first terminal, and the method includes:
determining that at least one piece of information to be shielded exists in the first data;
shielding at least one to-be-shielded information in the first data, and determining or generating second data;
and sharing the second data to at least one second terminal and/or platform.
Optionally, the first data is text data and/or audio data and/or image data, and the information to be masked is a character to be masked and/or an audio to be masked and/or an image area to be masked in the text data and/or the audio and/or the image data; when the steps of shielding at least one piece of information to be shielded in the first data and determining or generating second data are executed, the method comprises the following steps: and replacing at least one character to be shielded and/or the audio frequency to be shielded and/or the image area to be shielded in the text data and/or the audio frequency data and/or the image data with a preset character and/or a preset audio frequency and/or a preset image area, and determining or generating the second data.
Optionally, before determining that at least one information to be masked exists in the first data, the method further includes: determining that the first data contains the associated information of the second terminal and/or the contact; sending information to be confirmed to the second terminal, wherein the information to be confirmed is used for requesting to confirm whether the second terminal is provided with a shielding function; receiving confirmation information sent by terminal equipment corresponding to the second terminal, wherein the confirmation information is used for indicating that the second terminal is provided with a shielding function; and determining the associated information of the second terminal as the information to be shielded.
Optionally, before determining that at least one information to be masked exists in the first data, the method further includes: responding to an operation event of the first data, and acquiring target information indicated by the operation event in the first data; and determining the target information as the information to be shielded.
Optionally, before responding to the operation event on the first data, the method further comprises: when the first data contains at least one alternative message, highlighting the at least one alternative message; the acquiring, in response to an operation event to the first data, target information indicated by the operation event in the first data includes: and responding to the operation event of the at least one piece of alternative information, and acquiring target information indicated by the operation event in the at least one piece of alternative information.
Optionally, when the step of determining that at least one to-be-masked information exists in the first data is performed, the method includes: determining the first information processing object; obtaining a shielding rule corresponding to the sharing object; and identifying information to be shielded of the first data according to the shielding rule to obtain the at least one information to be shielded.
Optionally, the masking rule includes a preset masking rule and/or a custom masking rule.
Optionally, the method is applied in a first terminal, and the second data is displayed in the second terminal, or the second data is displayed in the first terminal and the second terminal.
Optionally, the present application further provides a terminal device, including: a memory, optionally having stored thereon a data processing program, which when executed by the processor implements the steps of the method as described above.
Optionally, the present application further provides a data processing apparatus, where the data processing apparatus includes a processing unit and a communication unit, and the processing unit is configured to determine that at least one piece of information to be masked exists in the first data; the processing unit is further configured to perform shielding processing on at least one to-be-shielded information in the first data, and determine or generate second data; the communication unit is used for sharing the second data to at least one second terminal and/or platform.
Optionally, the present application also provides a computer storage medium storing a computer program which, when executed by a processor, implements the steps of the method as described above.
As described above, the first terminal performs shielding processing on the information to be shielded by determining the information to be shielded in the data such as the picture, the video and the like to be shared, and processes the processed information to the second terminal. Based on the mode, the first terminal can automatically shield the information to be shielded in the data processing process, and the safety is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic diagram of a hardware structure of a terminal device for implementing various embodiments of the present application;
fig. 2 is a communication network system architecture diagram according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a data processing method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a human-computer interaction provided by an embodiment of the present application;
FIG. 5 is a schematic flow chart diagram illustrating a further data processing method according to an embodiment of the present application;
FIG. 6 is a schematic diagram of another human-computer interaction provided by an embodiment of the present application;
FIG. 7 is a schematic flow chart diagram illustrating a further data processing method according to an embodiment of the present application;
FIG. 8 is a schematic diagram of yet another human-computer interaction provided by an embodiment of the present application;
fig. 9 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings. With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of an element by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element, and further, where similarly-named elements, features, or elements in different embodiments of the disclosure may have the same meaning, or may have different meanings, that particular meaning should be determined by their interpretation in the embodiment or further by context with the embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or," "and/or," "including at least one of the following," and the like, as used herein, are to be construed as inclusive or mean any one or any combination. For example, "includes at least one of: A. b, C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C ", again for example," A, B or C "or" A, B and/or C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C'. An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that step numbers such as S301 and S302 are used herein for the purpose of more clearly and briefly describing the corresponding contents, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S302 first and then S301 in specific implementation, but these should be within the scope of the present application.
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
The terminal device may be implemented in various forms. For example, the terminal devices described in the present application may include terminal devices such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and fixed terminals such as a Digital TV, a desktop computer, and the like.
In the following description, a terminal device will be exemplified, and it will be understood by those skilled in the art that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a terminal device for implementing various embodiments of the present application, the terminal device 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the terminal device configuration shown in fig. 1 does not constitute a limitation of the terminal device, and that the terminal device may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the terminal device in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and terminal equipment can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the terminal device, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the terminal device 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal device 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The terminal device 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Optionally, the light sensor includes an ambient light sensor and a proximity sensor, the ambient light sensor may adjust the brightness of the display panel 1061 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 1061 and/or the backlight when the terminal device 100 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal device. Alternatively, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Optionally, the touch detection device detects a touch orientation of a user, detects a signal caused by a touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Optionally, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited thereto.
Alternatively, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 1, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the terminal device, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the terminal device, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the terminal apparatus 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal apparatus 100 or may be used to transmit data between the terminal apparatus 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a program storage area and a data storage area, and optionally, the program storage area may store an operating system, an application program (such as a sound playing function, an image playing function, and the like) required by at least one function, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the terminal device, connects various parts of the entire terminal device by using various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the terminal device. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor and a modem processor, optionally, the application processor mainly handles operating systems, user interfaces, application programs, etc., and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The terminal device 100 may further include a power supply 111 (such as a battery) for supplying power to each component, and preferably, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
Although not shown in fig. 1, the terminal device 100 may further include a bluetooth module or the like, which is not described herein.
In order to facilitate understanding of the embodiments of the present application, a communication network system on which the terminal device of the present application is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present disclosure, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Optionally, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Alternatively, the eNodeB2021 may be connected with other enodebs 2022 through a backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. Optionally, the MME2031 is a control node that handles signaling between the UE201 and the EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present application is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above hardware structure of the terminal device and the communication network system, various embodiments of the present application are provided.
Referring to fig. 3, fig. 3 is a flowchart illustrating a data processing method according to an embodiment of the present application, where the data processing method is applicable to the communication network system shown in fig. 2 and is executed by a first terminal, and specifically, can be executed by a processor of the first terminal. The data processing method comprises the following steps:
s301, the first terminal determines that at least one piece of information to be shielded exists in the first data.
In the embodiment of the present application, the hardware structures of the first terminal and the second terminal are the hardware structures of the terminal device 100 shown in fig. 1.
In this embodiment, the first data may be text data, audio data, image data, video data, or the like, and the type of the first data is not limited in this embodiment. The information to be shielded is information related to personal privacy, business confidentiality and the like in the first data, which the user does not want to obtain by the sharing object, for example, the first data is an image containing an express box, personal information of the user such as the user name, the address and the telephone is printed on the express box in the image, the user considers that the personal information is the personal privacy of the user, the sharing object is not expected to obtain the personal information, and the information to be shielded is an image area containing the personal information of the user such as the user name, the address and the telephone in the image.
Optionally, the first terminal determines at least one to-be-shielded information mode as follows: and selecting the information to be shielded in the first data as the information to be shielded by clicking operation, sliding operation or other modes by the user. Optionally, the text data includes the following physical examination report results, body condition: health, height: 160cm 'and the height considered by the user as the privacy of the user, the user can select' height: 160cm "corresponds to the corresponding character, and the first terminal determines" height: 160cm "is the information to be shielded. By the mode, the user can independently select the information to be shielded, and the user experience is improved.
In another possible implementation manner, the manner in which the first terminal determines the at least one to-be-shielded information is as follows: the first terminal identifies specific content in the first data as information to be shielded through an intelligent algorithm. Optionally, the first data is an image of a courier box, the courier box in the image has personal privacy of the user, such as the name, address, and phone information of the user, and the first terminal may recognize the information, such as the name, address, and phone information of the user, appearing in the image through an Optical Character Recognition (OCR) algorithm. Optionally, the different first data types correspond to different intelligent algorithms, for example, when the first data is image data, an OCR algorithm may be adopted, and when the first data is audio data, a related algorithm such as converting speech into text may be adopted. Based on this mode, first terminal can discern treating shielding information intelligently, promotes the security, is favorable to improving the efficiency of discerning treating shielding information simultaneously, increases user operation's convenience.
Optionally, the specific step of the first terminal determining at least one to-be-shielded information includes: determining the first information processing object; obtaining a shielding rule corresponding to the sharing object; and identifying information to be shielded of the first data according to the shielding rule to obtain the at least one information to be shielded.
Optionally, the shielding rule is used to enable the first terminal to determine the type of the information to be shielded according to the shared object, and the first terminal determines the information to be shielded according to the type of the information to be shielded. The types of information to be masked include: identity information (age, height, weight, identification number, etc.), physical information (appearance, stature, birthmark, etc.), and commercial confidential information, among others. The shielding rules corresponding to different sharing objects are different, for example, if the tag of the sharing object is "parent", the first terminal only needs to determine that the commercial confidential information included in the first data is the information to be shielded; if the tag of the sharing object is a stranger, the first terminal needs to determine the identity information, the body information and the commercial confidential information in the first data as the information to be shielded. The number of different sharing objects corresponds to different rules to be shielded, for example, the number of people sharing the objects is smaller than a preset value, and the first terminal only needs to determine commercial confidential information contained in the first data as information to be shielded; and/or the number of people sharing the object is larger than or equal to a preset value, and the first terminal needs to determine the identity information, the body information and the commercial confidential information in the first data as the information to be shielded. By the mode, the first terminal can process the type of the information to be shielded in different scenes, and the automatic and intelligent requirements of users on data shielding processing are met.
Optionally, the masking rule includes a preset masking rule and/or a custom masking rule. The preset shielding rules are shielding rules which are preset for the first terminal, and the user-defined shielding rules are shielding rules set by a user. Optionally, if the preset shielding rule does not set the personal preference as the information to be shielded, but the user does not want to share the personal preference, the user can set the personal preference as the information to be shielded through the self-defined shielding rule; if the preset rule sets that data are shared with strangers, the identity information, the body information and the commercial confidential information in the first data are determined to be information to be shielded, but the user is willing to share the identity information with the strangers, so that the user can set that the user shares the data with the strangers through the customized shielding rule, the identity information is not the information to be shielded, and the embodiment of the application does not limit how the user sets the customized shielding rule. Based on the mode, different users can set different shielding rules, so that the shielding rules are more personalized, and the user experience is favorably increased.
S302, the first terminal conducts shielding processing on at least one to-be-shielded information in the first data, and determines or generates second data.
In this embodiment, the second data is the first data after the masking process has been performed. Optionally, the first data is a picture including user personal information, the information to be shielded is an image area where the user personal information is located in the picture, the first terminal performs shielding processing (which may be blurring processing, mosaic processing, direct smearing or deletion, or replacement by a preset picture, text, color, or the like) on the first data, performs blurring on the image area where the user personal information is located in the picture, and determines or generates second data, where the second data is the picture after the blurring processing.
Optionally, the first data is text data, and the information to be masked is characters to be masked in the text data. The first terminal may replace at least one of the characters to be masked in the text data with a preset character, and determine or generate the second data. Optionally, the text data contains a "red little physical examination report, body condition: health, height: 160cm ", the character to be shielded is determined to be" height: 160cm ", optionally, the preset characters are", after the first terminal replaces the characters to be shielded with the preset characters, the second data determined or generated is "the physical examination report result of small red", as follows, the physical condition: health. The shielding processing method may include, in addition to replacing the character, deleting the character to be shielded, and at this time, the determined or generated second book may be the "red physical examination report result, which is the following physical condition: healthy ".
Optionally, the first data is audio data, and the information to be masked is an audio frequency band to be masked in the audio data. The first terminal may replace one or more of the audio frequency bands to be shielded in the audio data with a preset audio frequency band, and determine or generate the second data. Optionally, the audio data is an audio recorded by a user using a recording function, and the specific voice content is as follows: "it is very happy that the Xiaoming lives in A floor of A district of A street when the people go to Xiaoming family to play today. The user is unwilling to share a small and clear address of the A street, the A building of the A cell, namely, a section of voice of the A street, the A building of the A cell in the audio is an audio frequency band to be shielded, and the audio of the A street, the A building of the A cell is replaced by a preset audio frequency band by the first terminal. The masking processing method may further include deleting the segment of audio to be masked from the original audio data, in addition to replacing the audio.
Optionally, the first data is image data, and the information to be masked is an image area to be masked in the image data. The first terminal may replace at least one image data to be masked in the image data with a preset image, and determine or generate the second data. Alternatively, as shown in fig. 4, fig. 4 is a chat screenshot of a user with a small brightness and a small red, and through the identification of the first terminal, the image area 401 includes the birthday of the user, and the image area 402 includes the specific address of the appointment. The first terminal determines that the image area 401 and the image area 402 are image areas to be shielded, replaces the image area 401 and the image area 402 with preset images, and determines or generates second data. The shielding processing method may further include blurring the image to be shielded, in addition to the replacement image.
Optionally, the first data is video data, and the information to be masked is an image to be masked or an audio to be masked in the video data. The processing manner of the first terminal for processing the image to be masked or the audio to be masked in the video data is the same as that described above when the first data is the image data or the audio data, and the details of the embodiment of the present application are not repeated herein.
And S303, the first terminal shares the second data with at least one second terminal and/or platform.
In this embodiment, the second data is displayed in the second terminal, or the second data is displayed in the first terminal and the second terminal. Optionally, after the first terminal transmits the image data after the shielding processing to the second terminal, the user interface of the second terminal displays the image data after the shielding processing, or the user interfaces of the first terminal and the second terminal both display the image data after the shielding processing.
In this embodiment, the first terminal may process the second information to one second terminal, and may also share the second information to a plurality of second terminals at the same time. The embodiment of the present application does not limit how the second data is shared. Optionally, the user may share the image data after the shielding processing to the target user in a private chat manner, that is, the first terminal separately sends the image data after the shielding processing to a terminal corresponding to the target user; the user can process the image information after the shielding processing in a group containing at least one target user, namely the first terminal transmits the image data after the shielding processing to a terminal corresponding to the at least one target user; the user can also process the image information after the shielding processing in the content platform, the target user can acquire the image data in the content platform, that is, the first terminal uploads the image data after the shielding processing to the content platform, and the terminal corresponding to the target user can download the image data after the shielding processing from the content platform.
Referring to fig. 5, fig. 5 is a flowchart illustrating a further data processing method according to an embodiment of the present application, where the data processing method can be executed by a first terminal, and specifically can be executed by a processor of the first terminal. The data processing method comprises the following steps:
s501, the first terminal determines that the first data contains the relevant information of the target terminal.
In the embodiment of the application, the target terminal comprises a second terminal and/or a terminal corresponding to the contact. The associated information means that the information related to the target terminal in the first data is associated information. Optionally, the first user wants to share the chat screenshot of the first user and the chat screenshot of the second user in a chat group, the chat group further includes other users, and the second user avatar name in the chat screenshot, the chat content sent by the second user, and the like are all associated information.
Optionally, the method for the first terminal to determine the association information of the target terminal includes: the click operation determination may be performed by a user, or the first terminal performs recognition determination through an intelligent algorithm, or the big data analysis or the user usage habit determination is performed, which is not limited in the embodiment of the present application.
S502, the first terminal sends information to be confirmed to the target terminal, wherein the information to be confirmed is used for requesting to confirm whether the target terminal is provided with a shielding function.
Optionally, if the target terminal is a second terminal, the first terminal sends the information to be confirmed to the second terminal; and if the target terminal to be confirmed is the terminal corresponding to the contact person, the first terminal sends the information to be confirmed to the terminal equipment of the user logging in the contact person. The shielding function can be set by a user through a background to start or not.
In another possible implementation manner, the first terminal may further send the information to be confirmed to a server, and the server may determine whether the target terminal is set with the shielding function by querying. Optionally, when the number of target terminals corresponding to the association information included in the first data is large, for example, the first data is a chat screenshot, the chat screenshot includes speech content of at least one user, the first terminal may send a to-be-confirmed message to the server, the to-be-confirmed message includes an identifier of at least one target terminal, and the server queries the message to determine whether the target terminals have the shielding function.
S503, the first terminal receives the confirmation information sent by the terminal device corresponding to the target terminal, where the confirmation information is used to indicate that the target terminal has the shielding function.
Alternatively, the first terminal may send the information to be confirmed to the server, and if the server determines that the target terminal has the shielding function by querying the information, the server sends the confirmation information to the first terminal. Based on the mode, the related information of the target terminal user can be shielded, the safety is improved, and the personal privacy of the target terminal user is protected.
S504, the first terminal determines that the associated information of the target terminal is the information to be shielded.
S505, the first terminal determines that at least one piece of information to be shielded exists in the first data.
S506, the first terminal conducts shielding processing on at least one to-be-shielded information in the first data, and determines or generates second data.
And S507, the first terminal shares the second data to at least one second terminal and/or platform.
Optionally, steps S504 to S507 are the same as steps S301 to S303, and the embodiments of the present application are not described herein again.
Next, steps S501 to S507 will be described by way of a specific example. The first user wants to send a chat screenshot with the second user to the group, and the first terminal recognizes that the chat screenshot includes the associated information of the second user through an algorithm, as shown in fig. 6, the associated information includes: the image area 601 is the user name of the second user, the image areas 602 and 603 are the user avatar of the second user, and the image areas 604 and 605 are the chat content sent by the second user. And the first terminal sends confirmation information to a second terminal or a server corresponding to the second user to confirm whether the second terminal is provided with the shielding function. After the confirmation, the second terminal or the server sends confirmation information to the first terminal, determines that the second terminal sets a shielding function, determines the association information of the second user as information to be shielded by the first terminal, processes the information to be shielded in the chat screenshot, and determines or generates second data, wherein as shown in fig. 6, the image area related to the second user in the determined or generated second data is replaced by a preset image. Based on the mode, the related information related to the second user can be shielded, the personal privacy of the second user can be protected, and the safety is improved.
Referring to fig. 7, fig. 7 is a flowchart illustrating a further data processing method according to an embodiment of the present application, where the data processing method may be executed by a first terminal, specifically, by a processor of the first terminal, and optionally, the method shown in fig. 7 may be combined with the method shown in fig. 5. The data processing method comprises the following steps:
s701, the first terminal responds to the operation event of the first data, and target information indicated by the operation event is acquired in the first data.
Optionally, before the first terminal responds to the operation event of the first data, the method further includes: when the first data contains at least one alternative message, the first terminal highlights the at least one alternative message; and the first terminal responds to the operation event of the at least one piece of alternative information and acquires the target information indicated by the operation event from the at least one piece of alternative information. Optionally, after the first terminal identifies and determines the alternative information through an algorithm, the alternative information is highlighted, the user can select the alternative information, and the first terminal determines that the alternative information selected by the user is the target information. Based on the mode, the first terminal intelligent identification alternative information and the information to be shielded selected by the user can be combined, so that the determined information to be shielded meets the requirements of the user, and meanwhile, the operation of the user is simplified.
Optionally, the first terminal may identify the first data according to a shielding rule corresponding to the object to be shared, and determine the alternative information. The shielding rule comprises a preset shielding rule and/or a custom shielding rule. For the related description of the masking rule, reference may be made to the content in step S301, and details of the embodiment of the present application are not described herein.
S702, the first terminal determines the target information as the information to be shielded.
Optionally, the first terminal determines that the alternative information selected by the user is target information, and the target information is the information to be shielded. Optionally, as shown in fig. 8, the first data is a small red and small clear chat screenshot, the first terminal recognizes that the chat screenshot includes alternative information 801 and alternative information 802, the alternative information 801 includes a birthday of the user, the alternative information 802 includes a specific address, optionally, the user performs a click operation only on the alternative information 802, the first terminal determines that the alternative information 802 is the target information, and the user does not click on the alternative information 801, so that the alternative information 802 as the target information is determined by the first terminal as the information to be shielded, and the shielding process is performed. Based on the mode, the first terminal intelligent identification alternative information and the information to be shielded selected by the user can be combined, so that the determined information to be shielded meets the requirements of the user, and meanwhile, the operation of the user is simplified.
S703, the first terminal determines that at least one piece of information to be shielded exists in the first data.
S704, the first terminal conducts shielding processing on at least one to-be-shielded information in the first data, and determines or generates second data.
S705, the first terminal shares the second data with at least one second terminal and/or a platform.
Optionally, steps S703 to S705 are the same as steps S301 to S303, and the embodiments of the present application are not described herein again.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application. The data processing apparatus shown in fig. 9 may be adapted to perform some or all of the functionality of the first terminal in any of the method embodiments described above. The data processing device may be the first terminal, may be a device in the first terminal, or may be a device that can be used in cooperation with the first terminal. The data processing apparatus shown in fig. 9 may include a communication unit 901 and a processing unit 902. The processing unit 902 is configured to determine that at least one to-be-masked information exists in the first data; the processing unit 902 is further configured to perform shielding processing on at least one to-be-shielded information in the first data, and determine or generate second data; the communication unit 901 is configured to share the second data with at least one second terminal and/or platform.
Optionally, the first data is text data and/or audio data and/or image data, and the information to be masked is a character to be masked and/or an audio to be masked and/or an image area to be masked in the text data and/or the audio and/or the image data; when the processing unit 902 is configured to perform shielding processing on at least one to-be-shielded information in the first data and determine or generate second data, the processing unit 902 is specifically configured to replace at least one to-be-shielded character and/or the to-be-shielded audio and/or the to-be-shielded image area in the text data and/or the audio data and/or the image data with a preset character and/or a preset audio and/or a preset image area and determine or generate the second data.
Optionally, before the processing unit 902 is configured to determine that at least one piece of information to be masked exists in the first data, the processing unit 902 is further configured to determine that the first data includes associated information of the second terminal and/or the contact; the communication unit 901 is further configured to send information to be confirmed to the second terminal, where the information to be confirmed is used to request to confirm whether the second terminal is set with the shielding function; the communication unit 901 is further configured to receive acknowledgement information sent by a terminal device corresponding to the second terminal, where the acknowledgement information is used to indicate that the second terminal is set with a shielding function; the processing unit 902 is further configured to determine that the association information of the second terminal is the information to be masked.
Optionally, before the processing unit 902 is configured to determine that at least one piece of information to be masked exists in the first data, the processing unit 902 is further configured to, in response to an operation event for the first data, obtain target information indicated by the operation event in the first data; the processing unit 902 is further configured to determine that the target information is the information to be masked.
Optionally, before the processing unit 902 is further configured to respond to the operation event on the first data, the processing unit 902 is further configured to highlight at least one alternative information when the first data contains the at least one alternative information; the processing unit 902 is configured to respond to an operation event for the first data, and when the target information indicated by the operation event is acquired in the first data, the processing unit 902 is specifically configured to respond to the operation event for the at least one candidate information, and acquire the target information indicated by the operation event in the at least one candidate information.
Optionally, when the processing unit 902 is configured to determine that at least one to-be-masked information exists in the first data, the processing unit 902 is specifically configured to determine the first information processing object; obtaining a shielding rule corresponding to the sharing object; and identifying information to be shielded of the first data according to the shielding rule to obtain the at least one information to be shielded.
Optionally, the masking rule includes a preset masking rule and/or a custom masking rule.
Optionally, the method is applied in a first terminal, and the second data is displayed in the second terminal, or the second data is displayed in the first terminal and the second terminal.
The present application further provides a terminal device, where the terminal device includes a memory and a processor, and the memory stores a data processing program, and the data processing program, when executed by the processor, implements the steps of the data processing method in any of the above embodiments.
The present application further provides a computer-readable storage medium, on which a data processing program is stored, and when the data processing program is executed by a processor, the data processing program implements the steps of the data processing method in any of the above embodiments.
In the embodiments of the terminal device and the computer-readable storage medium provided in the present application, all technical features of the embodiments of the data processing method are included, and the expanding and explaining contents of the specification are basically the same as those of the embodiments of the method, and are not described herein again.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method in the above various possible embodiments.
Embodiments of the present application further provide a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method in the above various possible embodiments.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device in the embodiment of the application can be merged, divided and deleted according to actual needs.
In the present application, the same or similar term concepts, technical solutions and/or application scenario descriptions will be generally described only in detail at the first occurrence, and when the description is repeated later, the detailed description will not be repeated in general for brevity, and when understanding the technical solutions and the like of the present application, reference may be made to the related detailed description before the description for the same or similar term concepts, technical solutions and/or application scenario descriptions and the like which are not described in detail later.
In the present application, each embodiment is described with emphasis, and reference may be made to the description of other embodiments for parts that are not described or illustrated in any embodiment.
The technical features of the technical solution of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the scope of the present application should be considered as being described in the present application.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, memory Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A method of data processing, the method comprising:
judging that at least one piece of information to be shielded exists in the first data;
shielding at least one to-be-shielded information in the first data, and determining or generating second data;
and sharing the second data to at least one second terminal and/or platform.
2. The method according to claim 1, wherein the first data is text data and/or audio data and/or image data, and the information to be masked is a character to be masked and/or an audio to be masked and/or an image area to be masked in the text data and/or audio and/or image data;
the shielding at least one to-be-shielded information in the first data, and determining or generating second data, includes:
replacing at least one character to be shielded and/or the audio frequency to be shielded and/or the image area to be shielded in the text data and/or the audio frequency data and/or the image data with a preset character and/or a preset audio frequency and/or a preset image area, and determining or generating the second data.
3. The method of claim 1, wherein prior to determining that at least one information to be masked exists in the first data, the method further comprises:
determining that the first data contains the associated information of the second terminal and/or the contact;
sending to-be-confirmed information to the second terminal, wherein the to-be-confirmed information is used for requesting to confirm whether the second terminal is provided with a shielding function;
receiving confirmation information sent by terminal equipment corresponding to the second terminal, wherein the confirmation information is used for indicating that the second terminal is provided with a shielding function;
and determining the associated information of the second terminal as the information to be shielded.
4. The method of any of claims 1 to 3, wherein prior to determining that at least one information to be masked is present in the first data, the method further comprises:
responding to an operation event of the first data, and acquiring target information indicated by the operation event;
and determining the target information as the information to be shielded.
5. The method of claim 4, wherein prior to responding to the operational event on the first data, the method further comprises:
when the first data comprises at least one alternative message, highlighting the at least one alternative message;
the acquiring, in response to the operation event for the first data, target information indicated by the operation event, includes:
and responding to the operation event of the at least one piece of alternative information, and acquiring target information indicated by the operation event.
6. The method according to any one of claims 1 to 3, wherein the determining that there is at least one information to be masked in the first data comprises:
determining the first information sharing object;
obtaining a shielding rule corresponding to the sharing object;
and identifying information to be shielded of the first data according to the shielding rule to obtain the at least one information to be shielded.
7. The method of claim 6, wherein the masking rules comprise preset masking rules and/or custom masking rules.
8. The method according to any one of claims 1 to 3, wherein the method is applied in a first terminal and the second data is displayed in a second terminal, or the second data is displayed in the first terminal and the second terminal.
9. A terminal device, characterized in that the terminal device comprises: memory, processor and data processing program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the data processing method according to any one of claims 1 to 8.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the data processing method according to any one of claims 1 to 8.
CN202110672806.5A 2021-06-17 2021-06-17 Data processing method, terminal device and storage medium Pending CN113326537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110672806.5A CN113326537A (en) 2021-06-17 2021-06-17 Data processing method, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110672806.5A CN113326537A (en) 2021-06-17 2021-06-17 Data processing method, terminal device and storage medium

Publications (1)

Publication Number Publication Date
CN113326537A true CN113326537A (en) 2021-08-31

Family

ID=77423780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110672806.5A Pending CN113326537A (en) 2021-06-17 2021-06-17 Data processing method, terminal device and storage medium

Country Status (1)

Country Link
CN (1) CN113326537A (en)

Similar Documents

Publication Publication Date Title
CN107885448B (en) Control method for application touch operation, mobile terminal and readable storage medium
CN114371803B (en) Operation method, intelligent terminal and storage medium
CN111966804A (en) Expression processing method, terminal and storage medium
CN108810262B (en) Application configuration method, terminal and computer readable storage medium
CN113126844A (en) Display method, terminal and storage medium
CN108900696B (en) Data processing method, terminal and computer readable storage medium
CN113325981B (en) Processing method, mobile terminal and storage medium
CN114594886A (en) Operation method, intelligent terminal and storage medium
CN114640739A (en) Application pushing method, intelligent terminal and storage medium
CN114416254A (en) Business card display method, intelligent terminal and storage medium
CN114442886A (en) Data processing method, intelligent terminal and storage medium
CN113867586A (en) Icon display method, intelligent terminal and storage medium
CN113900559A (en) Information processing method, mobile terminal and storage medium
CN113590069A (en) Switching method, mobile terminal and storage medium
CN113326537A (en) Data processing method, terminal device and storage medium
CN109542847B (en) File processing method, terminal and readable storage medium
CN113805767A (en) Information processing method, mobile terminal and storage medium
CN107479747B (en) Touch display method and device and computer storage medium
CN113986059A (en) Label display method, intelligent terminal and storage medium
CN114186271A (en) Processing method, intelligent terminal and storage medium
CN115767777A (en) Sharing method, terminal device and storage medium
CN113553181A (en) User space management and control method, terminal and storage medium
CN113392318A (en) Processing method, terminal device and storage medium
CN116450016A (en) Picture processing method, intelligent terminal and storage medium
CN115794440A (en) Data processing method, intelligent terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication