TWI706359B - Data processing method and device, computing equipment and storage medium - Google Patents

Data processing method and device, computing equipment and storage medium Download PDF

Info

Publication number
TWI706359B
TWI706359B TW108128465A TW108128465A TWI706359B TW I706359 B TWI706359 B TW I706359B TW 108128465 A TW108128465 A TW 108128465A TW 108128465 A TW108128465 A TW 108128465A TW I706359 B TWI706359 B TW I706359B
Authority
TW
Taiwan
Prior art keywords
shared
data
sharing request
sharing
application
Prior art date
Application number
TW108128465A
Other languages
Chinese (zh)
Other versions
TW202018637A (en
Inventor
張萌
唐志慧
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202018637A publication Critical patent/TW202018637A/en
Application granted granted Critical
Publication of TWI706359B publication Critical patent/TWI706359B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/066Format adaptation, e.g. format conversion or compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本發明提供的一種資料處理方法及裝置、一種計算設備及儲存媒體,其中,該方法應用於第一應用端,該方法包括:接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同;產生該待分享資料的第一分享請求並發送至該第二應用端;確定該待分享資料的第一分享請求被該第二應用端攔截;根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求,在該待分享資料的第一分享請求被攔截後可以自動識別攔截並且切換分享請求的產生模式產生待分享資料的第二分享請求以突破攔截。The present invention provides a data processing method and device, a computing device and a storage medium, wherein the method is applied to a first application terminal, and the method includes: receiving a first sharing request for generating data to be shared, wherein the first sharing The request takes the second application terminal as the sharing target, and the second application terminal is different from the first application terminal; the first sharing request of the data to be shared is generated and sent to the second application terminal; the first application terminal of the data to be shared is determined The sharing request is intercepted by the second application; a second sharing request for the data to be shared targeting the second application is generated according to a preset generation rule, after the first sharing request for the data to be shared is intercepted It can automatically identify the interception and switch the generation mode of the sharing request to generate the second sharing request of the data to be shared to break through the interception.

Description

資料處理方法及裝置、計算設備及儲存媒體Data processing method and device, computing equipment and storage medium

本發明涉及電腦資料處理技術領域,特別涉及一種資料處理方法及裝置、一種計算設備及儲存媒體。The present invention relates to the technical field of computer data processing, in particular to a data processing method and device, a computing device and a storage medium.

吱口令的主要作用是營銷、觸達更廣泛的用戶。用戶作為分享執行人,在分享吱口令的過程中,由於各種原因,分享媒介可能並不支持甚至攔截這種分享行為,但是目標應用和共享用戶還有繼續分享的需求,因此就造成了衝突。The main function of Password is to market and reach a wider range of users. As the sharing executor, in the process of sharing passwords, the sharing medium may not support or even intercept this sharing behavior due to various reasons. However, the target application and the sharing user still need to continue sharing, which creates conflicts.

有鑑於此,本說明書實施例提供了一種資料處理方法及裝置、一種計算設備及儲存媒體,以解決現有技術中存在的技術缺陷。 第一方面,本說明書實施例公開了一種資料處理方法,應用於第一應用端,該方法包括: 接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同; 產生該待分享資料的第一分享請求並發送至該第二應用端; 確定該待分享資料的第一分享請求被該第二應用端攔截; 根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求。 第二方面,本說明書實施例公開了一種資料處理方法,應用於第二應用端,該方法包括: 接收第一應用端產生的,以自身為分享目標的待分享資料的第一分享請求; 對該待分享資料的第一分享請求進行分析,確定是否對該待分享資料的第一分享請求進行攔截操作; 在確定對該待分享資料的第一分享請求進行攔截操作的情況下,對該待分享資料的第一分享請求執行攔截操作。 第三方面,本說明書實施例公開了一種資料處理裝置,應用於第一應用端,該裝置包括: 第一接收模組,被配置為接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同; 第一產生模組,被配置為產生該待分享資料的第一分享請求並發送至該第二應用端; 第一攔截模組,被配置為確定該待分享資料的第一分享請求被該第二應用端攔截; 第二產生模組,被配置為根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求。 第四方面,本說明書實施例公開了一種資料處理裝置,應用於第二應用端,該裝置包括: 第三接收模組,被配置為接收第一應用端產生的,以自身為分享目標的待分享資料的第一分享請求; 第一分析模組,被配置為對該待分享資料的第一分享請求進行分析,確定是否對該待分享資料的第一分享請求進行攔截操作; 第三攔截模組,被配置為在確定對該待分享資料的第一分享請求進行攔截操作的情況下,對該待分享資料的第一分享請求執行攔截操作。 第五方面,本說明書實施例公開了一種計算設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的電腦指令,該處理器執行該指令時實現該指令被處理器執行時實現如上所述該資料處理方法的步驟。 第六方面,本說明書實施例公開了一種電腦可讀取儲存媒體,其儲存有電腦指令,該指令被處理器執行時實現如上該資料處理方法的步驟。 本發明提供的一種資料處理方法及裝置、一種計算設備及儲存媒體,其中,該方法應用於第一應用端,該方法包括:接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同;產生該待分享資料的第一分享請求並發送至該第二應用端;確定該待分享資料的第一分享請求被該第二應用端攔截;根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求,在該待分享資料的第一分享請求被攔截後可以自動識別攔截並且切換分享請求的產生模式產生待分享資料的第二分享請求以突破攔截。In view of this, the embodiments of this specification provide a data processing method and device, a computing device and a storage medium to solve the technical defects in the prior art. In the first aspect, the embodiment of this specification discloses a data processing method applied to the first application terminal, and the method includes: Receiving a first sharing request for generating the data to be shared, where the first sharing request targets a second application end, and the second application end is different from the first application end; Generate the first sharing request of the data to be shared and send it to the second application terminal; Determine that the first sharing request of the data to be shared is intercepted by the second application; According to a preset generation rule, a second sharing request for the data to be shared with the second application terminal as a sharing target is generated. In the second aspect, the embodiment of this specification discloses a data processing method applied to a second application terminal, and the method includes: Receive the first sharing request for the data to be shared that is generated by the first application terminal and is targeted for sharing; Analyze the first sharing request of the data to be shared to determine whether to intercept the first sharing request of the data to be shared; In the case where it is determined that the first sharing request for the material to be shared is intercepted, the first sharing request for the material to be shared is intercepted. In the third aspect, the embodiment of this specification discloses a data processing device applied to the first application terminal, and the device includes: The first receiving module is configured to receive a first sharing request for generating data to be shared, wherein the first sharing request targets a second application end, which is different from the first application end; The first generation module is configured to generate a first sharing request of the data to be shared and send it to the second application terminal; The first interception module is configured to determine that the first sharing request of the data to be shared is intercepted by the second application; The second generation module is configured to generate a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule. In a fourth aspect, an embodiment of this specification discloses a data processing device applied to a second application terminal, and the device includes: The third receiving module is configured to receive the first sharing request of the data to be shared that is generated by the first application terminal and uses itself as the sharing target; The first analysis module is configured to analyze the first sharing request of the data to be shared, and determine whether to intercept the first sharing request of the data to be shared; The third interception module is configured to perform an interception operation on the first sharing request for the data to be shared when it is determined that the first sharing request for the data to be shared is intercepted. In the fifth aspect, the embodiments of this specification disclose a computing device, including a memory, a processor, and computer instructions stored on the memory and running on the processor. When the processor executes the instruction, the instruction is executed by the processor. The steps of the data processing method as described above are realized during execution. In a sixth aspect, the embodiments of this specification disclose a computer-readable storage medium, which stores computer instructions, and when the instructions are executed by a processor, the steps of the data processing method as described above are realized. The present invention provides a data processing method and device, a computing device and a storage medium, wherein the method is applied to a first application terminal, and the method includes: receiving a first sharing request for generating data to be shared, wherein the first sharing The request takes the second application terminal as the sharing target, and the second application terminal is different from the first application terminal; the first sharing request of the data to be shared is generated and sent to the second application terminal; the first application terminal of the data to be shared is determined The sharing request is intercepted by the second application; a second sharing request for the data to be shared targeting the second application is generated according to a preset generation rule, after the first sharing request for the data to be shared is intercepted It can automatically identify the interception and switch the generation mode of the sharing request to generate the second sharing request of the data to be shared to break through the interception.

在下面的描述中闡述了很多具體細節以便於充分理解本發明。但是本發明能夠以很多不同於在此描述的其它方式來實施,本領域技術人員可以在不違背本發明內涵的情況下做類似推廣,因此本發明不受下面公開的具體實施的限制。 在本說明書一個或多個實施例中使用的術語是僅僅出於描述特定實施例的目的,而非旨在限制本說明書一個或多個實施例。在本說明書一個或多個實施例和所附申請專利範圍中所使用的單數形式的“一種”、“該”和“該”也旨在包括多數形式,除非上下文清楚地表示其他含義。還應當理解,本說明書一個或多個實施例中使用的術語“和/或”是指並包含一個或多個相關聯的列出項目的任何或所有可能組合。 應當理解,儘管在本說明書一個或多個實施例中可能採用術語第一、第二等來描述各種資訊,但這些資訊不應限於這些術語。這些術語僅用來將同一類型的資訊彼此區分開。例如,在不脫離本說明書一個或多個實施例範圍的情況下,第一也可以被稱為第二,類似地,第二也可以被稱為第一。取決於語境,如在此所使用的詞語“如果”可以被解釋成為“在……時”或“當……時”或“回應於確定”。 首先,對本發明一個或多個實施例涉及的名詞術語進行解釋。 吱口令:一種可以在應用程式之間進行資料交換,被指定應用識別的通信口令。它包括四個要素:分享媒介應用、打開目標應用、分享執行用戶和共享用戶。 在本發明中,提供了一種資料處理方法及裝置、一種計算設備及儲存媒體,在下面的實施例中逐一進行詳細說明。 圖1是示出了根據本說明書一實施例的計算設備100的結構方塊圖。該計算設備100的部件包括但不限於記憶體110和處理器120。處理器120與記憶體110透過匯流排130相連接,資料庫150用於保存資料。 計算設備100還包括存取設備140,存取設備140使得計算設備100能夠經由一個或多個網路160通信。這些網路的示例包括公用交換電話網(PSTN)、區域網(LAN)、廣域網(WAN)、個域網(PAN)或諸如網際網路的通信網路的組合。存取設備140可以包括有線或無線的任何類型的網路介面(例如,網路介面卡(NIC))中的一個或多個,諸如IEEE802.11無線區域網(WLAN)無線介面、全球微波互聯存取(Wi-MAX)介面、以太網介面、通用串行匯流排(USB)介面、蜂巢式網路介面、藍牙介面、近場通信(NFC)介面,等等。 在本說明書的一個實施例中,計算設備100的上述以及圖1中未示出的其他部件也可以彼此相連接,例如透過匯流排。應當理解,圖1所示的計算設備結構方塊圖僅僅是出於示例的目的,而不是對本說明書範圍的限制。本領域技術人員可以根據需要,增添或替換其他部件。 計算設備100可以是任何類型的靜止或行動計算設備,包括行動電腦或行動計算設備(例如,平板電腦、個人數位助理、筆記型電腦、筆記本電腦、輕省筆電等)、行動電話(例如,智慧型手機)、可佩戴的計算設備(例如,智慧型手錶、智慧型眼鏡等)或其他類型的行動設備,或者諸如台式電腦或PC的靜止計算設備。計算設備100還可以是行動式或靜止式的伺服器。 其中,處理器120可以執行圖2所示方法中的步驟。圖2是示出了根據本說明書一實施例的資料處理方法的示意性流程圖,應用於第一應用端,該方法包括步驟202至步驟208。 步驟202:接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同。 本說明書一個或多個實施例中,該待分享資料為將要分享給其他用戶的資料,例如某個購物網站中的銷售產品等;該第一分享請求為將待分享資料分享給其他用戶的請求,例如將某個購物網站中的某個銷售產品分享給其他用戶的請求,例如吱口令。 在實際應用中,該第一應用端可以是某個購物網站的應用程式或者是某個支付應用程式等,該第二應用端可以是某個即時通訊的應用程式等。 當該資料處理方法應用於第一應用端的情況下,接收產生待分享資料的第一分享請求即該第一應用端接收以該第二應用端為分享目標的產生待分享資料的第一分享請求。 步驟204:產生該待分享資料的第一分享請求並發送至該第二應用端。 本說明書一個或多個實施例中,該第一應用端在接收到產生待分享資料的第一分享請求後,產生該待分享資料的第一分享請求,並將該待分享資料的第一分享請求發送至分享目標即該第二應用端。 本說明書一個或多個實施例中,可以根據第一預設條件產生該待分享資料的第一分享請求並發送至第二應用端。其中,該第一預設條件包括但不限於從產生待分享資料的分享請求的固定字典中,產生指定長度和指定校驗位的待分享資料的第一分享請求。 在該第一應用端為某支付應用程式,該第二應用端為某即時通訊應用程式的情況下,產生該待分享資料的第一分享請求並發送至該第二應用端包括:該支付應用程式在接收產生添加好友的分享請求的情況下,根據第一預設條件從預設的固定添加好友的分享請求產生字典中選取一段指定長度和指定校驗位的文字、數字或者特殊字符的組合產生該添加好友的分享請求,並將產生的該添加好友的分享請求發送至該即時通訊應用程式。 步驟206:確定該待分享資料的第一分享請求被該第二應用端攔截。 本說明書一個或多個實施例中,該第一應用端可以自動識別該待分享資料的第一分享請求是否被該第二應用端攔截。即該第一應用端若檢測到發送至該第二應用端的該待分享資料的第一分享請求滿足第二預設條件,則確定該待分享資料的第一分享請求被該第二應用端攔截。 其中,該第二預設條件包括但不限於該待分享資料的第一分享請求分享至該第二應用端指定時間內,該待分享資料的第一分享請求被操作的用戶數量滿足時間衰減曲線。即該待分享資料的第一分享請求分享至該第二應用端指定時間內,該待分享資料的第一分享請求被操作的用戶數量一直減少。 以該第一應用端為支付應用程式,該第二應用端為即時通訊應用程式為例,確定該待分享資料的第一分享請求被該第二應用端攔截包括: 網紅A的支付應用程式接收網紅A產生一個添加好友的分享請求,網紅A的支付應用程式根據第一預設條件產生該添加好友的分享請求後將該添加好友的分享請求發送至網紅A的即時通訊應用程式,網紅A的即時通訊應用程式中的用戶接收到該添加好友的分享請求之後,一般均會複製黏貼該添加好友的分享請求到自身的支付應用程式中添加網紅A為好友,若正常情況下網紅A分享該添加好友的分享請求後每小時都會有30個好友透過自身的支付應用程式添加她為好友,但是某一小時網紅A分享該添加好友的分享請求後每小時透過自身的支付應用程式添加她為好友的人變為了2個或者是沒有人添加她為好友了,則網紅A的支付應用程式可以確定網紅A的該添加好友的分享請求被即時通訊應用程式進行了攔截。 步驟208:根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求。 本說明書一個或多個實施例中,該預設的產生規則包括但不限於將該待分享資料的第一分享請求進行同語義改寫。 根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求,即將該待分享資料的第一分享請求同語義改寫成以該第二應用端為分享目標的該待分享資料的第二分享請求。 本說明書一個或多個實施例中,該資料處理方法還包括: 接收產生該待分享資料的第二分享請求; 發送根據預設的產生規則產生的以該第二應用端為分享目標的該待分享資料的第二分享請求。 即該第一應用端再次接收到該待分享資料的第二分享請求的情況下,產生並發送根據預設的產生規則產生的以該第二應用端為分享目標的該待分享資料的第二分享請求。 本說明書一個或多個實施例中,該待分享資料的第一分享請求和第二分享請求的分享內容相同,資料格式不同。 例如該待分享資料為某購物網站的一條裙子,產生的該第一分享請求和第二分享請求則均是分享該裙子的請求,但是該第一分享請求和該第二分享請求的資料組成形式不同。 本說明書一個或多個實施例中,該資料處理方法在該第一應用端產生的待分享資料的第一分享請求被該第二應用端攔截的情況下,可以自動識別出該第二應用端的攔截並根據預設的產生規則產生新的該待分享資料的第二分享請求,在確定該待分享資料的第二分享請求不被該第二應用端攔截的情況下,接收並解析該第二應用端回傳的該待分享資料的第二分享請求以確定該待分享資料,以使該待分享資料的分享請求突破該第二應用端的攔截。 實際應用中,若該第二分享請求仍被第二應用端攔截,則第一應用端識別出攔截之後,會再次根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第三分享請求,直至產生的分享請求不會被第二應用端攔截,實現該待分享資料可以透過第二應用端被分享。 其中,處理器120可以執行圖3所示方法中的步驟。圖3是示出了根據本說明書一實施例的資料處理方法的示意性流程圖,應用於第二應用端,該方法包括步驟302至步驟306。 步驟302:接收第一應用端產生的,以自身為分享目標的待分享資料的第一分享請求。 步驟304:對該待分享資料的第一分享請求進行分析,確定是否對該待分享資料的第一分享請求進行攔截操作。 本說明書一個或多個實施例中,對該待分享資料的第一分享請求進行分析包括: 確定該待分享資料的第一分享請求中包含敏感字符或確定該第一應用端屬於該第二應用端預設的黑名單。 實際應用中,還可以有其它因素造成第二應用端對第一應用端產生的該待分享資料的分享請求進行攔截,在此不再一一列舉。 步驟306:在確定對該待分享資料的第一分享請求進行攔截操作的情況下,對該待分享資料的第一分享請求執行攔截操作。 本說明書一個或多個實施例中,該資料處理方法還包括: 接收該第一應用端產生的,以自身為分享目標的待分享資料的第二分享請求; 對該待分享資料的第二分享請求進行分析,確定是否對該待分享資料的第二分享請求進行攔截操作; 確定對該待分享資料的第二分享請求不攔截操作的情況下,回傳該待分享資料的第二分享請求至該第一應用端。 本說明書一個或多個實施例中,該第一應用端、該第二應用端、該待分享資料、該待分享資料的第一分享請求和第二分享請求的解釋可參見上述實施例,在此不再贅述。 本說明書一個或多個實施例中,第二應用端接收第一應用端產生的,以自身為分享目標的待分享資料的第一分享請求,然後對該待分享資料的第一分享請求進行分析,在不符合第二應用端的接收分享條件的情況下,對該待分享資料的第一分享請求進行攔截,使得第一應用端產生符合第二應用端接收分享條件的待分享資料的第二分享請求,在該待分享資料的第二分享請求符合第二應用端的接收分享條件的情況下,接收該待分享資料的第二分享請求並將該待分享資料的第二分享請求回傳至第一應用端;該第二應用端實現對不符合條件的待分享資料的分享請求進行分析和攔截,可以避免存在安全隱患或者敏感資訊的待分享資料的分享請求分享出去,提升用戶體驗。 參見圖4,以第一應用端為分享目標應用程式,第二應用端為分享媒介應用程式為例,對本說明書一個或多個實施例的資料處理方法進行說明,包括步驟402至步驟434。 步驟402:用戶A的分享目標應用程式接收用戶A發送的產生添加好友的第一分享請求。 步驟404:用戶A的分享目標應用程式將產生添加好友的第一分享請求發送至自身的處理系統。 步驟406:用戶A的分享目標應用程式的處理系統根據預設的字典產生長度為20,校驗位為111的添加好友的第一分享請求。 步驟408:用戶A的分享目標應用程式的處理系統將該添加好友的第一分享請求反饋給用戶A。 步驟410:用戶A的分享媒介應用程式接收並分析用戶A分享的添加好友的第一分享請求。 步驟412:用戶A的分享媒介應用程式在確定添加好友的第一分享請求不符合分享條件的情況下,對添加好友的第一分享請求進行攔截。 步驟414:用戶A的分享目標應用程式的處理系統在自動檢測出添加好友的第一分享請求是否被自身的分享媒介應用程式攔截。 步驟416:用戶A的分享目標應用程式的處理系統在自動檢測出添加好友的第一分享請求被自身的分享媒介應用程式攔截的情況下,產生一個與添加好友的第一分享請求同語義的第二分享請求。 實際應用中,分享目標應用程式每隔一段時間就會對添加好友的分享請求進行一次更新,使得分享目標應用程式每次接受到產生添加好友的分享請求都會將最新的添加好友的分享請求反饋給用戶,避免分享媒介應用程式的重複攔截,提高工作效率。 此外,分享目標應用程式在識別出分享媒介應用程式攔截之後,可以針對當前的添加好友的分享請求進行更新,也可以對分享目標應用程式上其他待分享資料的分享請求進行更新,可以根據實際需求進行設定,本發明對此不作任何限定。 步驟418:用戶A的分享目標應用程式再次接收到用戶A的產生添加好友的第二分享請求。 步驟420:用戶A的分享目標應用程式將產生添加好友的第二分享請求發送至自身的處理系統。 步驟422:用戶A的分享目標應用程式將透過自身的處理系統產生的添加好友的第二分享請求反饋給用戶A。 步驟424:用戶A的分享媒介應用程式接收並分析用戶A添加好友的第二分享請求。 步驟426:用戶A的分享媒介應用程式確定對用戶A添加好友的第二分享請求不攔截。 步驟428:用戶A的分享媒介應用程式在確定對添加好友的第二分享請求不攔截的情況下,將用戶A添加好友的第二分享請求分享給自身的共享用戶。 步驟430:共享用戶透過自身的分享媒介應用程式接收到用戶A分享的添加好友的第二分享請求。 步驟432:共享用戶透過自身的分享媒介應用程式發送用戶A分享的添加好友的第二分享請求至自身的處理系統。 步驟434:共享用戶的分享目標應用程式的處理系統對用戶A分享的添加好友的第二分享請求進行解析,在共享用戶的分享目標應用程式的處理系統解析出該第二分享請求為添加好友請求的情況下,共享用戶的分享目標應用程式的處理系統添加用戶A為好友。 本說明書一個或多個實施例中,該資料處理方法在分享目標應用程式產生的添加好友的第一分享請求被分享媒介應用程式攔截的情況下,可以自動識別出分享媒介應用程式的攔截並產生新的添加好友的第二分享請求,在確定添加好友的第二分享請求不被分享媒介應用程式攔截的情況下,接收並解析共享用戶的分享媒介應用程式回傳的添加好友的第二分享請求以添加用戶A為好友,使得分享目標應用程式產生的添加好友的分享請求在被分享媒介應用程式攔截的情況下,也可以實現好友的添加。 參見圖5,本說明書一個或多個實施例提供了一種資料處理裝置,應用於第一應用端,該裝置包括: 第一接收模組502,被配置為接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同; 第一產生模組504,被配置為產生該待分享資料的第一分享請求並發送至該第二應用端; 第一攔截模組506,被配置為確定該待分享資料的第一分享請求被該第二應用端攔截; 第二產生模組508,被配置為根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求。 可選地,該裝置還包括: 第二接收模組,被配置為接收產生該待分享資料的第二分享請求; 第一發送模組,被配置為發送根據預設的產生規則產生的以該第二應用端為分享目標的該待分享資料的第二分享請求。 可選地,該第一產生模組504,還被配置為: 根據第一預設條件產生該待分享資料的第一分享請求並發送至第二應用端。 可選地,該第一攔截模組506,還被配置為: 若檢測到發送至該第二應用端的該待分享資料的第一分享請求滿足第二預設條件,則確定該待分享資料的第一分享請求被該第二應用端攔截。 可選地,該裝置還包括: 第二攔截模組,被配置為確定該待分享資料的第二分享請求不被該第二應用端攔截的情況下,接收並解析該第二應用端回傳的該待分享資料的第二分享請求以確定該待分享資料。 本說明書一個或多個實施例中,該資料處理裝置在該第一應用端產生的待分享資料的第一分享請求被該第二應用端攔截的情況下,可以自動識別出該第二應用端的攔截並根據預設的產生規則產生新的該待分享資料的第二分享請求,在確定該待分享資料的第二分享請求不被該第二應用端攔截的情況下,接收並解析該第二應用端回傳的該待分享資料的第二分享請求以確定該待分享資料,以使該待分享資料的分享請求突破該第二應用端的攔截。 參見圖6,本說明書一個或多個實施例提供了一種資料處理裝置,應用於第二應用端,該裝置包括: 第三接收模組602,被配置為接收第一應用端產生的,以自身為分享目標的待分享資料的第一分享請求; 第一分析模組604,被配置為對該待分享資料的第一分享請求進行分析,確定是否對該待分享資料的第一分享請求進行攔截操作; 第三攔截模組606,被配置為在確定對該待分享資料的第一分享請求進行攔截操作的情況下,對該待分享資料的第一分享請求執行攔截操作。 可選地,該第一分析模組604,還被配置為: 確定該待分享資料的第一分享請求中包含敏感字符或確定該第一應用端屬於該第二應用端預設的黑名單。 可選地,該裝置還包括: 第四接收模組,被配置為接收該第一應用端產生的,以自身為分享目標的待分享資料的第二分享請求; 第二分析模組,被配置為對該待分享資料的第二分享請求進行分析,確定是否對該待分享資料的第二分享請求進行攔截操作; 回傳模組,被配置為確定對該待分享資料的第二分享請求不攔截操作的情況下,回傳該待分享資料的第二分享請求至該第一應用端。 本說明書一個或多個實施例中,第二應用端接收第一應用端產生的,以自身為分享目標的待分享資料的第一分享請求,然後對該待分享資料的第一分享請求進行分析,在不符合第二應用端的接收分享條件的情況下,對該待分享資料的第一分享請求進行攔截,使得第一應用端產生符合第二應用端接收分享條件的待分享資料的第二分享請求,在該待分享資料的第二分享請求符合第二應用端的接收分享條件的情況下,接收該待分享資料的第二分享請求並將該待分享資料的第二分享請求回傳至第一應用端;該第二應用端實現對不符合條件的待分享資料的分享請求進行分析和攔截,可以避免存在安全隱患或者敏感資訊的待分享資料的分享請求分享出去,提升用戶體驗。 本發明一實施例還提供一種電腦可讀取儲存媒體,其儲存有電腦指令,該指令被處理器執行時實現如前該資料處理方法的步驟。 上述為本實施例的一種電腦可讀取儲存媒體的示意性方案。需要說明的是,該儲存媒體的技術方案與上述的資料處理方法的技術方案屬於同一構思,儲存媒體的技術方案未詳細描述的細節內容,均可以參見上述資料處理方法的技術方案的描述。 上述對本說明書特定實施例進行了描述。其它實施例在所附申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在圖式中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多任務處理和並行處理也是可以的或者可能是有利的。 該電腦指令包括電腦程式代碼,該電腦程式代碼可以為源代碼形式、物件代碼形式、可執行文件或某些中間形式等。該電腦可讀取取媒體可以包括:能夠攜帶該電腦程式代碼的任何實體或裝置、記錄媒體、隨身碟、行動硬碟、磁碟、光碟、電腦記憶體、唯讀記憶體(ROM,Read-Only Memory)、隨機存取記憶體(RAM,Random Access Memory)、電載波信號、電信信號以及軟體分發媒體等。需要說明的是,該電腦可讀取媒體包含的內容可以根據司法管轄區內立法和專利實踐的要求進行適當的增減,例如在某些司法管轄區,根據立法和專利實踐,電腦可讀取媒體不包括電載波信號和電信信號。 需要說明的是,對於前述的各方法實施例,為了簡便描述,故將其都表述為一系列的動作組合,但是本領域技術人員應該知悉,本發明並不受所描述的動作順序的限制,因為依據本發明,某些步驟可以採用其它順序或者同時進行。其次,本領域技術人員也應該知悉,說明書中所描述的實施例均屬於較佳實施例,所涉及的動作和模組並不一定都是本發明所必須的。 在上述實施例中,對各個實施例的描述都各有側重,某個實施例中沒有詳述的部分,可以參見其它實施例的相關描述。 以上公開的本發明較佳實施例只是用於幫助闡述本發明。可選實施例並沒有詳盡敘述所有的細節,也不限制該發明僅為所述的具體實施方式。顯然,根據本說明書的內容,可作很多的修改和變化。本說明書選取並具體描述這些實施例,是為了更好地解釋本發明的原理和實際應用,從而使所屬技術領域技術人員能很好地理解和利用本發明。本發明僅受申請專利範圍及其全部範圍和等效物的限制。In the following description, many specific details are explained in order to fully understand the present invention. However, the present invention can be implemented in many other ways different from those described herein, and those skilled in the art can make similar extensions without violating the connotation of the present invention. Therefore, the present invention is not limited by the specific implementation disclosed below. The terms used in one or more embodiments of this specification are only for the purpose of describing specific embodiments, and are not intended to limit one or more embodiments of this specification. The singular forms of "a", "the" and "the" used in one or more embodiments of this specification and the scope of the appended patent application are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and/or" used in one or more embodiments of this specification refers to and includes any or all possible combinations of one or more associated listed items. It should be understood that although the terms first, second, etc. may be used to describe various information in one or more embodiments of this specification, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of one or more embodiments of this specification, the first may also be referred to as the second, and similarly, the second may also be referred to as the first. Depending on the context, the word "if" as used herein can be interpreted as "when" or "when" or "in response to certainty". First, the terminology involved in one or more embodiments of the present invention will be explained. Password: A communication password that can be used to exchange data between applications and is recognized by a designated application. It includes four elements: sharing media applications, opening target applications, sharing execution users, and sharing users. In the present invention, a data processing method and device, a computing device and a storage medium are provided, which are described in detail in the following embodiments. FIG. 1 is a block diagram showing the structure of a computing device 100 according to an embodiment of the present specification. The components of the computing device 100 include but are not limited to a memory 110 and a processor 120. The processor 120 and the memory 110 are connected through the bus 130, and the database 150 is used for storing data. The computing device 100 also includes an access device 140 that enables the computing device 100 to communicate via one or more networks 160. Examples of these networks include public switched telephone networks (PSTN), local area networks (LAN), wide area networks (WAN), personal area networks (PAN), or a combination of communication networks such as the Internet. The access device 140 may include one or more of any type of wired or wireless network interface (for example, a network interface card (NIC)), such as IEEE802.11 wireless local area network (WLAN) wireless interface, global microwave interconnection Access (Wi-MAX) interface, Ethernet interface, universal serial bus (USB) interface, cellular network interface, Bluetooth interface, near field communication (NFC) interface, etc. In an embodiment of this specification, the above-mentioned components of the computing device 100 and other components not shown in FIG. 1 may also be connected to each other, for example, through a bus. It should be understood that the structural block diagram of the computing device shown in FIG. 1 is for illustrative purposes only, and is not intended to limit the scope of this specification. Those skilled in the art can add or replace other components as needed. The computing device 100 can be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (for example, a tablet computer, a personal digital assistant, a notebook computer, a notebook computer, a laptop, etc.), a mobile phone (for example, Smart phones), wearable computing devices (for example, smart watches, smart glasses, etc.) or other types of mobile devices, or stationary computing devices such as desktop computers or PCs. The computing device 100 may also be a mobile or static server. The processor 120 may execute the steps in the method shown in FIG. 2. FIG. 2 is a schematic flowchart showing a data processing method according to an embodiment of the present specification, which is applied to the first application terminal, and the method includes step 202 to step 208. Step 202: Receive a first sharing request for generating the data to be shared, where the first sharing request targets a second application terminal, which is different from the first application terminal. In one or more embodiments of this specification, the data to be shared is data to be shared with other users, such as a product sold in a shopping website; the first sharing request is a request to share the data to be shared with other users , Such as a request to share a certain product sold in a shopping website with other users, such as a password. In actual applications, the first application terminal may be an application program of a shopping website or a payment application program, etc., and the second application terminal may be an instant messaging application program, etc. When the data processing method is applied to the first application terminal, receiving the first sharing request for generating the data to be shared means that the first application terminal receives the first sharing request for generating the data to be shared with the second application as the sharing target . Step 204: Generate a first sharing request of the data to be shared and send it to the second application terminal. In one or more embodiments of this specification, after receiving the first sharing request for generating the data to be shared, the first application terminal generates the first sharing request for the data to be shared, and performs the first sharing of the data to be shared The request is sent to the sharing target, that is, the second application terminal. In one or more embodiments of this specification, the first sharing request of the data to be shared may be generated according to a first preset condition and sent to the second application terminal. Wherein, the first preset condition includes, but is not limited to, generating a first sharing request for the data to be shared with a specified length and a specified check digit from a fixed dictionary that generates the sharing request for the data to be shared. In the case where the first application terminal is a payment application and the second application terminal is an instant messaging application, generating and sending a first sharing request of the data to be shared to the second application terminal includes: the payment application In the case of receiving and generating a sharing request for adding a friend, the program selects a combination of text, numbers or special characters with a specified length and a specified check digit from the preset fixed-add friend sharing request generation dictionary according to the first preset condition Generate the sharing request for adding friends, and send the generated sharing request for adding friends to the instant messaging application. Step 206: Determine that the first sharing request of the data to be shared is intercepted by the second application. In one or more embodiments of this specification, the first application can automatically identify whether the first sharing request of the data to be shared is intercepted by the second application. That is, if the first application terminal detects that the first sharing request of the data to be shared sent to the second application terminal satisfies the second preset condition, it determines that the first sharing request of the data to be shared is intercepted by the second application terminal . Wherein, the second preset condition includes, but is not limited to, the first sharing request of the to-be-shared data is shared to the second application within a specified time, and the number of users whose first sharing request of the to-be-shared data is operated satisfies the time decay curve . That is, the first sharing request of the to-be-shared data is shared until the specified time of the second application terminal, and the number of users whose first sharing request of the to-be-shared data is operated has been reduced. Taking the first application as a payment application and the second application as an instant messaging application as an example, determining that the first sharing request of the data to be shared is intercepted by the second application includes: The payment application of influencer A receives the sharing request of adding a friend by influencer A, and the payment application of influencer A generates the sharing request for adding a friend according to the first preset condition and then sends the sharing request for adding a friend to the network Red A's instant messaging application. After receiving the sharing request for adding a friend, the user in the instant messaging application of Net Red A will generally copy and paste the sharing request for adding a friend to their payment application to add an online celebrity A is a friend. Under normal circumstances, after Internet celebrity A shares the sharing request to add a friend, 30 friends will add her as a friend through his payment application every hour, but in an hour, Internet celebrity A shares the sharing of the added friend After the request, the number of people who added her as a friend through her payment application every hour becomes 2 or no one adds her as a friend, then the payment application of the influencer A can determine the sharing request of the influencer A to add a friend Was blocked by an instant messaging application. Step 208: Generate a second sharing request of the data to be shared with the second application as the sharing target according to a preset generation rule. In one or more embodiments of this specification, the preset generation rule includes, but is not limited to, rewriting the first sharing request of the data to be shared with the same semantics. According to a preset generation rule, a second sharing request for the data to be shared with the second application as the sharing target is generated, that is, the first sharing request for the data to be shared is semantically rewritten into the second application as the sharing target The second sharing request of the data to be shared. In one or more embodiments of this specification, the data processing method further includes: Receive a second sharing request that generates the data to be shared; Sending a second sharing request for the data to be shared, which is generated according to a preset generation rule, with the second application as a sharing target. That is, when the first application terminal receives the second sharing request of the material to be shared again, it generates and sends the second application terminal of the material to be shared that is generated according to a preset generation rule and targeted at the second application terminal. Sharing request. In one or more embodiments of this specification, the sharing content of the first sharing request and the second sharing request of the data to be shared is the same, and the data format is different. For example, the material to be shared is a skirt of a shopping website, and the first sharing request and the second sharing request generated are both requests to share the skirt, but the first sharing request and the second sharing request form the data composition different. In one or more embodiments of this specification, the data processing method can automatically identify the data processing method of the second application when the first sharing request of the data to be shared generated by the first application is intercepted by the second application. Intercept and generate a new second sharing request of the data to be shared according to the preset generation rule, and receive and parse the second sharing request when it is determined that the second sharing request of the data to be shared is not intercepted by the second application. The second sharing request of the data to be shared returned by the application terminal determines the data to be shared, so that the sharing request of the data to be shared can break through the interception of the second application terminal. In actual applications, if the second sharing request is still intercepted by the second application, after the first application recognizes the interception, it will generate the to-be-shared target with the second application as the sharing target again according to the preset generation rules. The third sharing request of the data until the generated sharing request will not be intercepted by the second application terminal, so that the data to be shared can be shared through the second application terminal. The processor 120 may execute the steps in the method shown in FIG. 3. FIG. 3 is a schematic flowchart showing a data processing method according to an embodiment of the present specification, applied to the second application terminal, and the method includes step 302 to step 306. Step 302: Receive a first sharing request for the data to be shared that is generated by the first application terminal and uses itself as a sharing target. Step 304: Analyze the first sharing request of the data to be shared, and determine whether to intercept the first sharing request of the data to be shared. In one or more embodiments of this specification, analyzing the first sharing request of the data to be shared includes: It is determined that the first sharing request of the data to be shared contains sensitive characters or that the first application terminal belongs to a blacklist preset by the second application terminal. In actual applications, there may be other factors that cause the second application terminal to intercept the sharing request of the data to be shared generated by the first application terminal, which will not be listed here. Step 306: When it is determined that an interception operation is performed on the first sharing request for the material to be shared, perform an interception operation on the first sharing request for the material to be shared. In one or more embodiments of this specification, the data processing method further includes: Receiving a second sharing request for the data to be shared generated by the first application terminal and targeting itself as a sharing target; Analyze the second sharing request of the data to be shared to determine whether to intercept the second sharing request of the data to be shared; If it is determined that the second sharing request for the data to be shared is not intercepted, the second sharing request for the data to be shared is returned to the first application terminal. In one or more embodiments of this specification, the explanation of the first application terminal, the second application terminal, the material to be shared, the first sharing request and the second sharing request of the material to be shared can be found in the above embodiments. This will not be repeated here. In one or more embodiments of this specification, the second application terminal receives the first sharing request for the data to be shared that is generated by the first application terminal and targets itself, and then analyzes the first sharing request for the data to be shared , In the case that the receiving and sharing condition of the second application terminal is not met, intercept the first sharing request of the data to be shared, so that the first application terminal generates a second sharing of the data to be shared that meets the receiving sharing condition of the second application terminal Request, when the second sharing request of the data to be shared meets the receiving and sharing conditions of the second application terminal, receive the second sharing request of the data to be shared and return the second sharing request of the data to be shared to the first Application side: The second application side realizes analysis and interception of unqualified sharing requests for data to be shared, which can avoid sharing requests for data to be shared with hidden security hazards or sensitive information, and improve user experience. Referring to FIG. 4, taking the first application terminal as the sharing target application and the second application terminal as the sharing medium application as an example, the data processing method of one or more embodiments of this specification will be described, including steps 402 to 434. Step 402: The sharing target application of the user A receives the first sharing request sent by the user A for adding a friend. Step 404: The sharing target application of the user A sends the first sharing request for adding a friend to its processing system. Step 406: The processing system of the user A's sharing target application generates a first sharing request for adding a friend with a length of 20 and a check digit of 111 according to the preset dictionary. Step 408: The processing system of the sharing target application of the user A feeds back the first sharing request for adding a friend to the user A. Step 410: The sharing media application of user A receives and analyzes the first sharing request shared by user A to add friends. Step 412: If the sharing medium application of user A determines that the first sharing request for adding a friend does not meet the sharing conditions, it intercepts the first sharing request for adding a friend. Step 414: The processing system of the user A's sharing target application automatically detects whether the first sharing request to add a friend is intercepted by its own sharing medium application. Step 416: The processing system of user A's sharing target application automatically detects that the first sharing request to add a friend is intercepted by its own sharing medium application, and generates a first sharing request with the same semantics as the first sharing request to add a friend. 2. Sharing request. In actual applications, the sharing target application will update the sharing request to add friends every once in a while, so that every time the sharing target application receives a sharing request for adding a friend, it will feed back the latest sharing request for adding a friend. Users avoid repeated interception of shared media applications and improve work efficiency. In addition, after the sharing target application recognizes that the sharing medium application is intercepted, it can update the current sharing request to add friends, or update the sharing request of other data to be shared on the sharing target application, which can be based on actual needs. For setting, the present invention does not impose any limitation on this. Step 418: The sharing target application of user A again receives user A's second sharing request for adding friends. Step 420: The sharing target application of user A sends a second sharing request for adding a friend to its own processing system. Step 422: The sharing target application of the user A feeds back to the user A the second sharing request for adding a friend generated by its own processing system. Step 424: The sharing media application of user A receives and analyzes the second sharing request of user A to add friends. Step 426: The sharing medium application of the user A determines not to intercept the second sharing request of the user A to add a friend. Step 428: The sharing medium application of user A shares the second sharing request of user A to add a friend to its own sharing user when it is determined that the second sharing request for adding a friend is not intercepted. Step 430: The sharing user receives the second sharing request for adding a friend shared by user A through his own sharing media application. Step 432: The sharing user sends the second sharing request for adding a friend shared by user A to his processing system through his own sharing media application. Step 434: The processing system of the sharing target application of the sharing user parses the second sharing request shared by user A to add a friend, and the processing system of the sharing target application of the sharing user parses that the second sharing request is a request to add a friend In the case of the sharing user's sharing target application, the processing system adds user A as a friend. In one or more embodiments of the present specification, the data processing method can automatically identify the interception of the sharing medium application and generate it when the first sharing request to add a friend generated by the sharing target application is intercepted by the sharing medium application A new second sharing request for adding a friend, receiving and analyzing the second sharing request for adding a friend returned by the sharing medium application of the sharing user when it is determined that the second sharing request for adding a friend is not intercepted by the sharing medium application The user A is added as a friend, so that the sharing request for adding a friend generated by the sharing target application is intercepted by the sharing medium application, and the friend can also be added. Referring to FIG. 5, one or more embodiments of this specification provide a data processing device applied to a first application terminal, and the device includes: The first receiving module 502 is configured to receive a first sharing request for generating data to be shared, wherein the first sharing request targets a second application end, which is different from the first application end; The first generation module 504 is configured to generate a first sharing request of the data to be shared and send it to the second application terminal; The first interception module 506 is configured to determine that the first sharing request of the data to be shared is intercepted by the second application; The second generation module 508 is configured to generate a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule. Optionally, the device further includes: The second receiving module is configured to receive a second sharing request that generates the data to be shared; The first sending module is configured to send a second sharing request for the data to be shared with the second application as a sharing target generated according to a preset generation rule. Optionally, the first generation module 504 is further configured to: A first sharing request of the data to be shared is generated according to a first preset condition and sent to the second application terminal. Optionally, the first interception module 506 is further configured to: If it is detected that the first sharing request of the material to be shared sent to the second application terminal satisfies the second preset condition, it is determined that the first sharing request of the material to be shared is intercepted by the second application terminal. Optionally, the device further includes: The second interception module is configured to receive and parse the second sharing of the data to be shared returned by the second application when it is determined that the second sharing request of the data to be shared is not intercepted by the second application. Request to confirm the information to be shared. In one or more embodiments of this specification, the data processing device can automatically identify the data processing device of the second application when the first sharing request of the data to be shared generated by the first application is intercepted by the second application. Intercept and generate a new second sharing request of the data to be shared according to the preset generation rule, and receive and parse the second sharing request when it is determined that the second sharing request of the data to be shared is not intercepted by the second application. The second sharing request of the data to be shared returned by the application terminal determines the data to be shared, so that the sharing request of the data to be shared can break through the interception of the second application terminal. Referring to FIG. 6, one or more embodiments of this specification provide a data processing device applied to a second application terminal, and the device includes: The third receiving module 602 is configured to receive the first sharing request of the data to be shared that is generated by the first application terminal and uses itself as the sharing target; The first analysis module 604 is configured to analyze the first sharing request of the data to be shared, and determine whether to intercept the first sharing request of the data to be shared; The third interception module 606 is configured to perform an interception operation on the first sharing request for the data to be shared when it is determined that the first sharing request for the data to be shared is intercepted. Optionally, the first analysis module 604 is further configured to: It is determined that the first sharing request of the data to be shared contains sensitive characters or that the first application terminal belongs to a blacklist preset by the second application terminal. Optionally, the device further includes: The fourth receiving module is configured to receive a second sharing request for the data to be shared that is generated by the first application terminal and uses itself as a sharing target; The second analysis module is configured to analyze the second sharing request of the data to be shared and determine whether to intercept the second sharing request of the data to be shared; The return module is configured to return the second sharing request of the data to be shared to the first application terminal when it is determined that the second sharing request of the data to be shared is not intercepted. In one or more embodiments of this specification, the second application terminal receives the first sharing request for the data to be shared that is generated by the first application terminal and targets itself, and then analyzes the first sharing request for the data to be shared , In the case that the receiving and sharing condition of the second application terminal is not met, intercept the first sharing request of the data to be shared, so that the first application terminal generates a second sharing of the data to be shared that meets the receiving sharing condition of the second application terminal Request, when the second sharing request of the data to be shared meets the receiving and sharing conditions of the second application terminal, receive the second sharing request of the data to be shared and return the second sharing request of the data to be shared to the first Application side: The second application side realizes analysis and interception of unqualified sharing requests for data to be shared, which can avoid sharing requests for data to be shared with hidden security hazards or sensitive information, and improve user experience. An embodiment of the present invention also provides a computer readable storage medium, which stores computer instructions, and when the instructions are executed by a processor, the steps of the data processing method are implemented as before. The foregoing is a schematic solution of a computer-readable storage medium of this embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the above-mentioned data processing method belong to the same concept. For details of the technical solution of the storage medium that are not described in detail, please refer to the description of the technical solution of the above-mentioned data processing method. The foregoing describes specific embodiments of this specification. Other embodiments are within the scope of the attached patent application. In some cases, the actions or steps described in the scope of the patent application may be performed in a different order from the embodiment and still achieve desired results. In addition, the processes depicted in the drawings do not necessarily require the specific order or sequential order shown in order to achieve the desired result. In certain embodiments, multitasking and parallel processing are also possible or may be advantageous. The computer instruction includes computer program code, and the computer program code may be in the form of source code, object code, executable file, or some intermediate forms. The computer readable medium may include: any entity or device capable of carrying the computer program code, recording medium, flash drive, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read- Only Memory), Random Access Memory (RAM, Random Access Memory), electric carrier signal, telecommunications signal, software distribution media, etc. It should be noted that the content contained in the computer-readable media can be appropriately added or deleted according to the requirements of the legislation and patent practice in the jurisdiction. For example, in some jurisdictions, according to the legislation and patent practice, the computer can read The media does not include electric carrier signals and telecommunication signals. It should be noted that for the foregoing method embodiments, for simplicity of description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the described sequence of actions. Because according to the present invention, certain steps can be performed in other order or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification are all preferred embodiments, and the involved actions and modules are not necessarily all required by the present invention. In the above-mentioned embodiments, the description of each embodiment has its own emphasis. For parts that are not described in detail in an embodiment, reference may be made to related descriptions of other embodiments. The preferred embodiments of the present invention disclosed above are only used to help explain the present invention. The optional embodiments do not describe all the details in detail, nor do they limit the invention to only the specific embodiments described. Obviously, many modifications and changes can be made according to the content of this manual. This specification selects and specifically describes these embodiments in order to better explain the principles and practical applications of the present invention, so that those skilled in the art can understand and use the present invention well. The present invention is only limited by the scope of the patent application and its full scope and equivalents.

100:計算設備 110:記憶體 120:處理器 130:匯流排 140:存取設備 150:資料庫 160:網路 202~208:步驟 302~306:步驟 402~434:步驟 502:第一接收模組 504:第一產生模組 506:第一攔截模組 508:第二產生模組 602:第三接收模組 604:第一分析模組 606:第三攔截模組100: computing equipment 110: memory 120: processor 130: bus 140: Access equipment 150: database 160: Network 202~208: steps 302~306: steps 402~434: steps 502: The first receiving module 504: First Generation Module 506: First Interception Module 508: Second Generation Module 602: The third receiving module 604: First Analysis Module 606: Third Interception Module

圖1是本說明書一個或多個實施例提供的一種計算設備的結構方塊圖; 圖2是本說明書一個或多個實施例提供的一種資料處理方法的流程圖; 圖3是本說明書一個或多個實施例提供的一種資料處理方法的流程圖; 圖4是本說明書一個或多個實施例提供的一種資料處理方法的流程圖; 圖5是本說明書一個或多個實施例提供的一種資料處理裝置的結構示意圖; 圖6是本說明書一個或多個實施例提供的一種資料處理裝置的結構示意圖。FIG. 1 is a structural block diagram of a computing device provided by one or more embodiments of this specification; Figure 2 is a flowchart of a data processing method provided by one or more embodiments of this specification; FIG. 3 is a flowchart of a data processing method provided by one or more embodiments of this specification; 4 is a flowchart of a data processing method provided by one or more embodiments of this specification; Fig. 5 is a schematic structural diagram of a data processing device provided by one or more embodiments of this specification; Fig. 6 is a schematic structural diagram of a data processing device provided by one or more embodiments of this specification.

Claims (10)

一種資料處理方法,其特徵在於,應用於第一應用端,該方法包括:接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同;產生該待分享資料的第一分享請求並發送至該第二應用端;若檢測到發送至該第二應用端的該待分享資料的第一分享請求滿足第二預設條件,則確定該待分享資料的第一分享請求被該第二應用端攔截,其中,該第二預設條件包括該待分享資料的第一分享請求分享至該第二應用端指定時間內,該待分享資料的第一分享請求被操作的用戶數量滿足時間衰減曲線,即該待分享資料的第一分享請求分享至該第二應用端指定時間內,該待分享資料的第一分享請求被操作的用戶數量一直減少;根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求,其中該預設的產生規則包括將該待分享資料的第一分享請求進行同語義改寫。 A data processing method, characterized by being applied to a first application terminal, the method comprising: receiving a first sharing request for generating data to be shared, wherein the first sharing request targets a second application terminal, and the second The application terminal is different from the first application terminal; the first sharing request of the data to be shared is generated and sent to the second application terminal; if it is detected that the first sharing request of the data to be shared sent to the second application meets the first Two preset conditions, it is determined that the first sharing request of the data to be shared is intercepted by the second application terminal, wherein the second predetermined condition includes that the first sharing request of the data to be shared is designated by the second application terminal Within a period of time, the number of users whose first sharing request of the to-be-shared data is operated satisfies the time decay curve, that is, the first sharing request of the to-be-shared data is shared to the second application within the specified time, and the The number of users whose sharing requests are operated has been decreasing; a second sharing request for the data to be shared targeting the second application terminal is generated according to a preset generation rule, wherein the preset generation rule includes the data to be shared The first sharing request is rewritten with the same semantics. 根據請求項1所述的方法,其中,還包括:接收產生該待分享資料的第二分享請求;發送根據預設的產生規則產生的以該第二應用端為分 享目標的該待分享資料的第二分享請求。 The method according to claim 1, further comprising: receiving a second sharing request for generating the to-be-shared data; sending a second application based on a preset generation rule. The second sharing request of the sharing target for the data to be shared. 根據請求項1所述的方法,其中,產生該待分享資料的第一分享請求並發送至該第二應用端包括:根據第一預設條件產生該待分享資料的第一分享請求並發送至第二應用端。 The method according to claim 1, wherein generating a first sharing request of the material to be shared and sending it to the second application terminal comprises: generating a first sharing request of the material to be shared according to a first preset condition and sending it to The second application side. 根據請求項2所述的方法,其中,還包括:確定該待分享資料的第二分享請求不被該第二應用端攔截的情況下,接收並解析該第二應用端回傳的該待分享資料的第二分享請求以確定該待分享資料。 The method according to claim 2, which further includes: in the case where it is determined that the second sharing request of the material to be shared is not intercepted by the second application terminal, receiving and analyzing the to-be-shared data returned by the second application terminal The second sharing request of the data determines the data to be shared. 一種資料處理裝置,其特徵在於,應用於第一應用端,該裝置包括:第一接收模組,被配置為接收產生待分享資料的第一分享請求,其中,該第一分享請求以第二應用端為分享目標,該第二應用端與該第一應用端不同;第一產生模組,被配置為產生該待分享資料的第一分享請求並發送至該第二應用端;第一攔截模組,被配置為若檢測到發送至該第二應用端的該待分享資料的第一分享請求滿足第二預設條件,則確定該待分享資料的第一分享請求被該第二應用端攔截,其中,該第二預設條件包括該待分享資料的第一分享請求分享至該第二應用端指定時間內,該待分享資料的第一分 享請求被操作的用戶數量滿足時間衰減曲線,即該待分享資料的第一分享請求分享至該第二應用端指定時間內,該待分享資料的第一分享請求被操作的用戶數量一直減少;第二產生模組,被配置為根據預設的產生規則產生以該第二應用端為分享目標的該待分享資料的第二分享請求,其中該預設的產生規則包括將該待分享資料的第一分享請求進行同語義改寫。 A data processing device, characterized by being applied to a first application terminal, the device comprising: a first receiving module configured to receive a first sharing request for generating data to be shared, wherein the first sharing request is The application end is the sharing target, and the second application end is different from the first application end; the first generation module is configured to generate a first sharing request of the data to be shared and send it to the second application end; first interception The module is configured to determine that the first sharing request of the data to be shared is intercepted by the second application if it is detected that the first sharing request of the data to be shared sent to the second application terminal satisfies a second preset condition , Wherein the second preset condition includes that the first sharing request of the to-be-shared data is shared within the specified time of the second application terminal, and the first minute of the to-be-shared data The number of users whose share requests are operated satisfies the time decay curve, that is, the number of users whose first sharing requests of the data to be shared is operated has been reduced within the specified time from the first sharing request of the data to be shared to the second application terminal; The second generation module is configured to generate a second sharing request for the data to be shared with the second application as the sharing target according to a preset generation rule, wherein the preset generation rule includes a request for the data to be shared The first sharing request is rewritten with the same semantics. 根據請求項5所述的裝置,其中,還包括:第二接收模組,被配置為接收產生該待分享資料的第二分享請求;第一發送模組,被配置為發送根據預設的產生規則產生的以該第二應用端為分享目標的該待分享資料的第二分享請求。 The device according to claim 5, which further includes: a second receiving module configured to receive a second sharing request for generating the data to be shared; and a first sending module configured to send the generated data according to a preset The second sharing request of the to-be-shared data generated by the rule with the second application terminal as the sharing target. 根據請求項5所述的裝置,其中,該第一產生模組,還被配置為:根據第一預設條件產生該待分享資料的第一分享請求並發送至第二應用端。 The device according to claim 5, wherein the first generation module is further configured to generate a first sharing request of the data to be shared according to a first preset condition and send it to the second application terminal. 根據請求項6所述的裝置,其中,還包括:第二攔截模組,被配置為確定該待分享資料的第二分享請求不被該第二應用端攔截的情況下,接收並解析該第二應用端回傳的該待分享資料的第二分享請求以確定該待 分享資料。 The device according to claim 6, further comprising: a second interception module configured to receive and parse the second application terminal in the case that the second sharing request of the data to be shared is not intercepted by the second application terminal 2. The second sharing request of the data to be shared returned by the application terminal to determine the Share information. 一種計算設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的電腦指令,其特徵在於,該處理器執行該指令時實現該指令被處理器執行時實現請求項1-4中任一項所述的方法的步驟。 A computing device, including a memory, a processor, and computer instructions stored on the memory and running on the processor, characterized in that, when the processor executes the instruction, the instruction is executed when the processor executes the request item 1 -4 steps of the method. 一種電腦可讀取儲存媒體,其儲存有電腦指令,其特徵在於,該指令被處理器執行時實現請求項1-4中任一項所述的方法的步驟。 A computer-readable storage medium, which stores computer instructions, characterized in that, when the instructions are executed by a processor, the steps of the method described in any one of claim items 1-4 are realized.
TW108128465A 2018-11-06 2019-08-12 Data processing method and device, computing equipment and storage medium TWI706359B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811314102.5 2018-11-06
CN201811314102.5A CN110011896B (en) 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium

Publications (2)

Publication Number Publication Date
TW202018637A TW202018637A (en) 2020-05-16
TWI706359B true TWI706359B (en) 2020-10-01

Family

ID=67164890

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108128465A TWI706359B (en) 2018-11-06 2019-08-12 Data processing method and device, computing equipment and storage medium

Country Status (3)

Country Link
CN (1) CN110011896B (en)
TW (1) TWI706359B (en)
WO (1) WO2020093806A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011896B (en) * 2018-11-06 2020-07-28 阿里巴巴集团控股有限公司 Data processing method and device, computing equipment and storage medium
CN111966506B (en) * 2020-07-22 2024-03-22 招联消费金融股份有限公司 Content sharing method based on different application programs and computer equipment
CN112632418A (en) * 2020-12-16 2021-04-09 北京达佳互联信息技术有限公司 Password sharing method and device, electronic equipment and storage medium
CN113011165A (en) * 2021-03-19 2021-06-22 支付宝(杭州)信息技术有限公司 Method, device, equipment and medium for identifying blocked keywords

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169769A1 (en) * 2008-12-31 2010-07-01 International Business Machines Corporation Instant messaging multilingual configuration
CN102340424A (en) * 2010-07-21 2012-02-01 中国移动通信集团山东有限公司 Bad message detection method and bad message detection device
CN106682226A (en) * 2017-01-05 2017-05-17 珠海市魅族科技有限公司 Method, system and terminal for opening share link
CN106789566A (en) * 2016-12-12 2017-05-31 任子行网络技术股份有限公司 Different IM application messages sharing methods and system based on mobile phone operating system
TWI614614B (en) * 2013-11-18 2018-02-11 珠海金山網絡遊戲科技有限公司 File sharing method, device and mobile equipment

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104142788A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Terminal application sharing method and intelligent terminal
US10122660B2 (en) * 2015-03-27 2018-11-06 MINDBODY, Inc. Contextual mobile communication platform
CN105049319B (en) * 2015-05-25 2018-09-18 腾讯科技(深圳)有限公司 Good friend's adding method and system, client and server
CN105706397A (en) * 2016-01-20 2016-06-22 马岩 Method and system for sharing shared information based on micro-messages
CN107180049B (en) * 2016-03-11 2020-12-18 阿里巴巴集团控股有限公司 Searching method and device
CN107301224B (en) * 2017-06-19 2020-05-12 阿里巴巴集团控股有限公司 Information sharing method and device
CN107391587A (en) * 2017-06-23 2017-11-24 努比亚技术有限公司 Link is shared and access method, server, terminal and computer-readable storage medium
CN108307393A (en) * 2017-08-21 2018-07-20 腾讯科技(深圳)有限公司 Network flow resource sharing method, device, system and storage medium
CN108427751A (en) * 2018-03-13 2018-08-21 深圳乐信软件技术有限公司 A kind of short chain connects jump method, device and electronic equipment
CN110011896B (en) * 2018-11-06 2020-07-28 阿里巴巴集团控股有限公司 Data processing method and device, computing equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169769A1 (en) * 2008-12-31 2010-07-01 International Business Machines Corporation Instant messaging multilingual configuration
CN102340424A (en) * 2010-07-21 2012-02-01 中国移动通信集团山东有限公司 Bad message detection method and bad message detection device
TWI614614B (en) * 2013-11-18 2018-02-11 珠海金山網絡遊戲科技有限公司 File sharing method, device and mobile equipment
CN106789566A (en) * 2016-12-12 2017-05-31 任子行网络技术股份有限公司 Different IM application messages sharing methods and system based on mobile phone operating system
CN106682226A (en) * 2017-01-05 2017-05-17 珠海市魅族科技有限公司 Method, system and terminal for opening share link

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
(https://jingyan.baidu.com/article/59703552ce6c9f8fc00740d5.html) 玙璠,"微信用生命拦截敬业福 吓得马云连换几十版吱口令",财视传媒,2016-02-02 *
(https://www.caishimv.com/index.php/web/web_archives/info_details.html?id=3189) *
sunkist380,"吱口令在哪里打开?支付宝"我的吱口令"怎么用?",百度经验,2016-01-12 *
sunkist380,"吱口令在哪里打开?支付宝"我的吱口令"怎么用?",百度经验,2016-01-12。(https://jingyan.baidu.com/article/59703552ce6c9f8fc00740d5.html)
玙璠,"微信用生命拦截敬业福 吓得马云连换几十版吱口令",财视传媒,2016-02-02。(https://www.caishimv.com/index.php/web/web_archives/info_details.html?id=3189)

Also Published As

Publication number Publication date
CN110011896A (en) 2019-07-12
CN110011896B (en) 2020-07-28
TW202018637A (en) 2020-05-16
WO2020093806A1 (en) 2020-05-14

Similar Documents

Publication Publication Date Title
TWI706359B (en) Data processing method and device, computing equipment and storage medium
KR102396739B1 (en) Asset management method and apparatus, and electronic device
US10554655B2 (en) Method and system for verifying an account operation
KR102107560B1 (en) Method, device, terminal, and server for verifying security of service operation
US20210312035A1 (en) Computer-based systems configured for managing authentication challenge questions in a database and methods of use thereof
US11321734B2 (en) Information processing method, server, and computer storage medium
US10992612B2 (en) Contact information extraction and identification
US10165002B2 (en) Identifying an imposter account in a social network
US10127529B2 (en) User attribute value transfer method and terminal
US9973513B2 (en) Method and apparatus for communication number update
KR102231606B1 (en) Techniques for contextual mobile data access
US20190342753A1 (en) Device configuration method, apparatus and system
CN109345190B (en) Data processing method and device
CN107273415A (en) Peer system can search for by the subject index based on instant messaging
CN109685536B (en) Method and apparatus for outputting information
WO2014139298A1 (en) Permission management method, device and system for cloud platform service
US11562442B2 (en) Social graph database with compound connections
WO2014110929A1 (en) Method, device, and system for uploading data
WO2022116431A1 (en) Click through rate (ctr) prediction method and apparatus
JP6494990B2 (en) User authentication method and user authentication system for service account, and storage medium
CN110929260A (en) Malicious software detection method, device, server and readable storage medium
CN113626863A (en) Data processing method and device
JP6336065B2 (en) How to rate-control data usage using a virtual private network
WO2024051195A1 (en) Data calling method and apparatus, and serving gateway and storage medium
CN112968876A (en) Content sharing method and device, electronic equipment and storage medium