CN104935624A - Method of desktop sharing and sharing equipment - Google Patents
Method of desktop sharing and sharing equipment Download PDFInfo
- Publication number
- CN104935624A CN104935624A CN201410110091.4A CN201410110091A CN104935624A CN 104935624 A CN104935624 A CN 104935624A CN 201410110091 A CN201410110091 A CN 201410110091A CN 104935624 A CN104935624 A CN 104935624A
- Authority
- CN
- China
- Prior art keywords
- privacy
- request
- interface
- shared
- concealed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- User Interface Of Digital Computer (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention discloses a method of desktop sharing and sharing equipment, relating to the field of communication technology. The problem of the reduction of a user experience caused by the leakage of the privacy information of a sharing equipment user in the process of carrying out desktop sharing by the sharing equipment is solved. The method comprises the following steps that: the sharing equipment obtains a privacy setting request, whether the desktop of the sharing equipment is displaying an interface to be hidden or not at present time is judged according to the privacy setting request, if the desktop of the sharing equipment is displaying the interface to be hidden or not at present time, the attribute of the interface to be hidden is set as a sharing hidden mode such that after the desktop of the sharing equipment is shared by the sharing equipment, the sharing equipment does not display the interface to be hidden, and the desktop of the sharing equipment is shared to shared equipment. The method and the sharing equipment can be applied to realize desktop sharing.
Description
Technical field
The present invention relates to communication technical field, particularly relate to method and the shared device of Desktop Share.
Background technology
Desktop Share can refer to that the mutual viewing desktop carrying out desktop between two or multiple stage subscriber equipment even controls usually.The development of the Internet makes more subscriber equipment add to come in, and realizes file-sharing, picture is shared, greatly promoted the development of Desktop Share.
Desktop Share can be applied in the immediate meeting of holding many people in enterprise, concrete, meeting promoter can open and conference materials needed for showing on the subscriber equipment of oneself, then, by the Desktop Share of meeting promoter to participant, participant can be convenient to and check conference materials; In addition, Desktop Share can also be applied in remote assistance, such as user when encountering problems can by this function by the desktop presentation of oneself to keeper or director to seek help, like this, keeper need not run scene in person, and then prompting operating efficiency.
But in the scheme of above-mentioned Desktop Share, instant messaging is being carried out when sharing to rectify, and now due to shared end by the Desktop Share of oneself to being shared end, therefore, the desktop contents carrying out instant messaging together can share to and be shared end by shared end, and then cause the privacy of the user sharing end to be revealed, reduce Consumer's Experience.
Summary of the invention
The invention provides a kind of method and shared device of Desktop Share, solve and carry out in the process of Desktop Share at shared device, the privacy information of the user of shared device is revealed, and then reduces the problem of Consumer's Experience.
For achieving the above object, the present invention adopts following technical scheme:
First aspect, provides a kind of method of Desktop Share, comprising:
Shared device obtains privacy and arranges request;
Request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed;
If the desktop of shared device is showing described interface to be concealed described in described current time, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Equipment is shared described in being given by the Desktop Share of described shared device.
In conjunction with first aspect, in the first possible implementation of first aspect, after described shared device acquisition privacy arranges request, described method also comprises:
Revise the parameter at newly-built described interface to be concealed, make the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
In conjunction with the first possible implementation of first aspect or first aspect, in the implementation that the second is possible, described method also comprises:
Show described interface to be concealed.
In conjunction with first aspect or the first possible implementation of first aspect or the possible implementation of the second of first aspect, in the implementation that the third is possible, request be set according to described privacy judge that described method also comprises before whether the desktop of shared device described in current time is showing interface to be concealed described:
According to the mark of the promoter of described privacy request, judge that whether the promoter of described privacy request is legal, described privacy arranges the mark that request comprises the promoter of described privacy request;
Described setting according to described privacy asks to judge whether the desktop of shared device described in current time is showing interface to be concealed, comprising:
If the promoter of described privacy request is legal, then request is set according to described privacy and judges whether the desktop of shared device described in described current time is showing described interface to be concealed.
In conjunction with the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, described shared device comprises conference client will and instant messaging IM client;
Described shared device obtains privacy and arranges request, comprising:
In described conference client will, after the Desktop Share request receiving the transmission of described IM client, automatically generate described privacy and request is set;
In described conference client will, send described privacy to described IM client and request is set;
In described IM client, the described privacy receiving the transmission of described conference client will arranges request.
In conjunction with the 4th kind of possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, described shared device obtains privacy and arranges request, also comprises:
In described IM client, detect described privacy and request is set;
In described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
In conjunction with the 5th kind of possible implementation of first aspect, in the 6th kind of possible implementation of first aspect, described setting according to described privacy asks to judge whether the desktop of shared device described in current time is showing interface to be concealed, comprising:
In described IM client, arrange on the desktop asking to judge shared device described in current time whether showing described interface to be concealed according to described privacy;
Described is shared stealth mode by the setup of attribute at described interface to be concealed, comprising:
In described IM client, be described shared stealth mode by the setup of attribute at described interface to be concealed.
Second aspect, provides a kind of shared device, comprising:
Acquiring unit, arranges request for obtaining privacy;
Judging unit, the privacy for obtaining according to described acquiring unit arranges request and judges whether the desktop of shared device described in current time is showing interface to be concealed;
Setting unit, if judge that the desktop of shared device described in described current time is showing described interface to be concealed for described judging unit, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Shared cell, is shared equipment described in being given by the Desktop Share of described shared device.
In conjunction with first aspect, in the first possible implementation of first aspect, described shared device also comprises:
Amendment unit, after arranging request in described acquiring unit acquisition privacy, revises the parameter at newly-built described interface to be concealed, makes the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
In conjunction with the first possible implementation of first aspect or first aspect, in the implementation that the second is possible, described shared device also comprises:
Display unit, for showing described interface to be concealed.
In conjunction with first aspect or the first possible implementation of first aspect or the possible implementation of the second of first aspect, in the implementation that the third is possible, described shared device also comprises:
Described judging unit, also for arrange according to described privacy request judge before whether the desktop of shared device described in current time is showing interface to be concealed, according to the mark of the promoter of described privacy request, judge that whether the promoter of described privacy request is legal, described privacy arranges the mark that request comprises the promoter of described privacy request;
Described judging unit, if legal specifically for judging the promoter of described privacy request, then the privacy obtained according to described acquiring unit arranges request and judges whether the desktop of shared device described in described current time is showing described interface to be concealed.
In conjunction with the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, described shared device comprises conference client will and instant messaging IM client;
Described acquiring unit, comprising:
First receiver module, in described conference client will, after the Desktop Share request receiving the transmission of described IM client, automatically generates described privacy and arranges request;
Sending module, in described conference client will, sends described privacy to described IM client and arranges request;
Second receiver module, in described IM client, receives the described privacy that described conference client will sends and arranges request.
In conjunction with the 4th kind of possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, described acquiring unit, also comprises:
Detection module, in described IM client, detects described privacy and arranges request;
Described second receiver module, specifically in described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
In conjunction with the 5th kind of possible implementation of first aspect, in the 6th kind of possible implementation of first aspect, described judging unit, specifically in described IM client, the described privacy obtained according to described acquiring unit arranges on desktop that request judges shared device described in current time whether showing described interface to be concealed;
The setup of attribute at described interface to be concealed, specifically in described IM client, is described shared stealth mode by described setting unit.
The method of the Desktop Share that the embodiment of the present invention provides and shared device, shared device obtains privacy and arranges request; Request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed; If the desktop of shared device is showing described interface to be concealed described in described current time, then described interface to be concealed is set to shared stealth mode, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed; Equipment is shared described in being given by the Desktop Share of described shared device.After adopting such scheme, the interface comprising privacy information can be set to described interface to be concealed by the user of shared device, like this, when Desktop Share starts, even if shared device is current showing described interface to be concealed, due to, described interface to be concealed is set to shared stealth mode, therefore, is shared equipment and also can not shows described interface to be concealed, the privacy avoiding the user of shared device is revealed, and then adds Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The method flow diagram of a kind of Desktop Share that Fig. 1 provides for the present embodiment;
The data interaction figure that the method for the another kind of Desktop Share that Fig. 2 provides for the present embodiment is applied;
The method flow diagram of the another kind of Desktop Share that Fig. 3 provides for the present embodiment;
In the method for Fig. 4 for the Desktop Share shown in Fig. 3, the structural representation in private data storehouse;
In the method for Fig. 5 for the Desktop Share shown in Fig. 3, the structural representation of IM client;
In the method for Fig. 6 for the Desktop Share shown in Fig. 3, the structural representation of conference client will;
The structural representation of a kind of shared device that Fig. 7 provides for the present embodiment;
The structural representation of the another kind of shared device that Fig. 8 provides for the present embodiment;
The structural representation of a kind of computer that Fig. 9 provides for the present embodiment.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The present embodiment provides a kind of method of Desktop Share, as shown in Figure 1, can comprise:
101, shared device obtains privacy and arranges request.
When shared device carries out Desktop Share, in order to protect the fail safe of the information on shared device, make the equipment that is shared not show interface to be concealed, then obtain corresponding privacy and request is set, request can be arranged according to privacy perform corresponding operation.
102, request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed.
Wherein, interface to be concealed can be, but not limited to comprise IM(English: Instant Messenger, Chinese: instant messaging) window interface, such as, if the current IM that using of the user of shared device chats, then shared device may show IM window interface.
The present embodiment is not construed as limiting interface to be concealed, is not limited to the above-mentioned IM window interface mentioned, specifically can sets according to actual needs, not repeat them here.
If 103 described in described current time the desktop of shared device showing described interface to be concealed, then described interface to be concealed is set to shared stealth mode, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed.
In prior art, normally shared device is set to not eject interface to be concealed in the process of Desktop Share, namely the message that no matter shared device receives interface any and to be concealed relevant in the process of Desktop Share does not all eject interface to be concealed, in this case, be shared equipment and also can not show interface to be concealed, and then also can not expose privacy when Desktop Share to being shared equipment.But, if shared device is when just starting to carry out Desktop Share, desktop is showing described interface to be concealed, is then now being shared equipment and still can shows described interface to be concealed.
In order to solve the problem, the interface to be concealed that shared device when just starting to carry out Desktop Share, desktop is showing can be set to shared stealth mode by shared device, like this, shared device is when just starting to carry out Desktop Share, even if desktop is showing described interface to be concealed, described in be shared equipment and also do not show this interface to be concealed.
104, the Desktop Share of described shared device is given described in be shared equipment.
Now, the equipment of being shared still may can receive the information at the interface described to be concealed that shared device is shared, but, because the attribute at described interface to be concealed is set to shared stealth mode, and the interface that the equipment that is shared does not show shared stealth mode, the equipment that is therefore shared can not show described interface to be concealed.
In the present embodiment, shared device obtains privacy and arranges request; Request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed; If the desktop of shared device is showing described interface to be concealed described in described current time, then described interface to be concealed is set to shared stealth mode, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed; Equipment is shared described in being given by the Desktop Share of described shared device.After adopting such scheme, the interface comprising privacy information can be set to described interface to be concealed by the user of shared device, like this, when Desktop Share just starts, even if shared device is current showing described interface to be concealed, due to, described interface to be concealed is set to shared stealth mode, therefore, is shared equipment and also can not shows described interface to be concealed, the privacy avoiding the user of shared device is revealed, and then adds Consumer's Experience.
The present embodiment provides the method for another kind of Desktop Share, the method is further expanding the method shown in Fig. 1, as shown in Figure 2, the data interaction figure of the method for the Desktop Share provided for the present embodiment, the method flow diagram of the Desktop Share that Fig. 3 provides for the present embodiment.
In order to can better understand by the present embodiment, first the system architecture that the present embodiment is applied is briefly described.
As shown in Figure 2, the system that the present embodiment is applied can be, but not limited to comprise: shared device, be shared equipment, MS(is English: Media Server, Chinese: streaming media server) and IM server.
Wherein, can comprise in shared device: conference client will, IM client, conference client will can be, but not limited to comprise: meeting boundary layer, conference components layer, and IM client can be, but not limited to comprise: IM boundary layer, underlying platform.
Concrete, as shown in Figure 3, the method for the Desktop Share that the present embodiment provides can be, but not limited to comprise the steps:
301, Desktop Share is initiated.
As shown in Figure 2, when meeting promoter passes through IM application initiation Desktop Share, corresponding operation can be performed to shared device, shared device can generate Desktop Share request according to the operation information of user, e.g., can initiate request for meeting, specifically can comprise: IM boundary layer is after the meeting trigger action of user being detected, generate meeting and initiate request, and interface is initiated in the meeting of calling underlying platform, namely indicate underlying platform to send meeting to conference components layer and initiate request; Meeting is initiated request and is sent to conference components layer by underlying platform; The meeting received is initiated request and is sent to meeting boundary layer by conference components layer; Meeting boundary layer initiates request display conference interface according to meeting.
The present embodiment is not construed as limiting the process of initiating conference and method, is technology well known to those skilled in the art, and can sets according to actual needs, do not repeat them here.
302, shared device obtains privacy and arranges request.
Further, after shared device shows corresponding meeting interface by meeting boundary layer, user can perform corresponding privacy setting operation to shared device, like this, shared device can generate and obtain described privacy and arrange request, described privacy arranges request and can be, but not limited to comprise: privacy arranges the type of request, as, open privacy setting and close privacy and arrange, it is all right that described privacy arranges request: the mark (e.g., can comprise the mark etc. of the chat interface of IM) at described interface to be concealed, described privacy arrange the mark of the promoter of request.
Concrete, shared device acquisition privacy arranges request and can be, but not limited to comprise: the meeting boundary layer in shared device generates described privacy according to the operation that user performs and arranges request; Send described privacy to conference components layer and arrange request, and call the information transmission interface of conference components layer, namely described privacy is arranged the underlying platform asking to be sent in IM client by instruction conference components layer; Described privacy is arranged request and is sent to underlying platform by conference components layer, so that described privacy is arranged request by underlying platform be sent to IM boundary layer.
Further, in order to improve Consumer's Experience, meeting boundary layer automatically can generate described privacy and arrange request after receiving meeting and initiating request, and without the need to waiting until user after arranging in generation.Now, described privacy arranges request and can be, but not limited to comprise: described privacy arranges the mark of request promoter.
Further, in described IM client, detect described privacy and request is set; In described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
Concrete, request can be set for IM boundary layer detects described privacy, can think whether detect underlying platform reports privacy to arrange request; In described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
303, shared device is according to the mark of the promoter of described privacy request, judges that whether the promoter of described privacy request is legal.If the promoter of described privacy request is legal, then perform step 304, if the promoter of described privacy request is illegal, then flow process terminates, or can be, but not limited to show privacy setup failed interface.
Wherein, described privacy arranges the mark that request can be, but not limited to the promoter comprising described privacy request.
Concrete, can be, but not limited to for IM boundary layer receive described hide request is set after, the mark that the promoter obtaining described privacy request is set request is hidden from described, judge that whether the mark of the promoter of described privacy request is preset mark, such as, the mark of the promoter of described privacy request can be the account of described promoter in IM application, IM boundary layer can judge that whether the account logged in during the account of described promoter is applied with current I M is identical, if identical, then can illustrate that the promoter of described privacy request is legal, if not identical, then can illustrate that the promoter of described privacy request is illegal.
The present embodiment judges the promoter of described privacy request to IM boundary layer, and whether legal method is not construed as limiting, and be technology well known to those skilled in the art, and can set according to actual needs, therefore not to repeat here.
Further, if the promoter of described privacy request is illegal, then IM boundary layer is to IM underlying platform transmission processing failure notification, IM underlying platform is to conference components layer transmission processing failure notification, conference components layer is to meeting boundary layer transmission processing failure notification, and meeting boundary layer can be, but not limited to display privacy and arranges the failed interface of request process after receiving process failure notification.
304, shared device arranges according to described privacy and asks to judge whether the desktop of shared device described in current time is showing interface to be concealed.If the desktop of shared device is showing described interface to be concealed described in current time, then perform step 305, if the desktop of shared device does not show described interface to be concealed described in current time, then perform step 306.
Further, shared device judges that whether showing interface to be concealed at the desktop of shared device described in current time can be, but not limited to comprise: in described IM client, and whether the desktop judging shared device described in current time is showing interface to be concealed.
Concrete, the identical interface of the mark at the interface described to be concealed comprised in request can be set for IM boundary layer judges whether to exist in the interface that current shared equipment is showing mark and described privacy, if comprise, then illustrate that the desktop current time of described shared device is showing described interface to be concealed, if do not comprise, then illustrate that the desktop current time of described shared device does not show described interface to be concealed.
If described privacy arranges in request the mark not comprising described interface to be concealed, then IM boundary layer is receiving after described privacy arranges request, arrange request from described privacy and obtain the mark that described privacy arranges request promoter, as, it can be the account of promoter, then, the mark at the to be concealed interface corresponding with the account of described promoter can be obtained from private data storehouse, finally, judge in the interface that current shared equipment is showing, whether to there is the mark interface identical with the mark at the interface described to be concealed of above-mentioned acquisition.
Wherein, as shown in Figure 4, at least one list item can be comprised in private data storehouse, each list item can comprise the corresponding relation of the mark at corresponding account information and interface to be concealed, this private data storehouse can be provided with rear storage by user in advance, also constantly can upgrade, not repeat them here.
To shared device, the present embodiment judges that the method whether desktop of shared device described in current time is showing interface to be concealed is not construed as limiting, be technology well known to those skilled in the art, and can set according to actual needs, do not repeat them here.
305, described interface to be concealed is set to shared stealth mode by shared device, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed.
The method that described interface to be concealed is set to shared stealth mode is not construed as limiting shared device by the present embodiment, is technology well known to those skilled in the art, does not repeat them here.
Further, shared device is after being set to shared stealth mode by described interface to be concealed, IM boundary layer is to IM underlying platform transmission processing success notification, IM underlying platform is to conference components layer transmission processing success notification, conference components layer is to meeting boundary layer transmission processing success notification, and meeting boundary layer can be, but not limited to display privacy and arranges the successful interface of request process after receiving process success notification.
306, the parameter at the newly-built described interface to be concealed of shared device amendment, makes the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
If shared device is current showing interface to be concealed, and by the setup of attribute at described interface to be concealed for share stealth mode, then when carrying out Desktop Share, described in be shared equipment when the desktop of display control apparatus, do not show described interface to be concealed.
Further, in order to experience by adding users, make other events of the user not affecting shared device, then, when carrying out Desktop Share, shared device normally can show described interface to be concealed.
Be briefly described below in conjunction with the internal structure of step 301 to step 307 pair IM client and conference client will.
As shown in Figure 5, IM boundary layer can comprise: platform adaptation layer, service adapting layer, WinGUI(are English: Windows Graphical User Interface, Microsft Windows graphic user interface) layer.
Wherein, platform adaptation layer needs to increase and ginseng receiving when privacy arranges request, namely can comprise and the privacy got request is set from described privacy the account that the type of request and privacy arrange the promoter of request is set informs upper strata, as, can for informing service adapting layer, for the treatment of this request; Service adapting layer mainly may be used for carrying out business logic processing, after this layer receives the account of the described promoter reported of platform adaptation layer, first can verify whether this account is current listed account, if so, then can continue process; If not, then illustrate that account is illegal, can directly refuse this request; WinGUI layer mainly may be used for the establishment of control IM message interface, amendment and display, if shared device is current showing described interface to be concealed, as, IM window interface, can be then described shared stealth mode by the attribute modification of IM window interface, and by the function of ShowWindow(during newly-built IM window interface, for arranging the show state of specified window) enter ginseng and be revised as shared stealth mode; Do not show described interface to be concealed if current, then only ShowWindow during newly-built IM window interface can be entered ginseng and be revised as shared stealth mode.
As shown in Figure 6, meeting boundary layer comprises: WinGUI layer, assembly key-course, and conference components layer comprises: Desktop Share component layer, bottom common component layer.
Wherein, the privacy that bottom common component layer mainly may be used for being issued on upper strata arranges the underlying platform asking to be sent in IM client; The privacy that can also be used for the underlying platform transmission received in IM client arranges response; Shared unit layer can be mainly used in the desktop of shared device to share, the method that the present embodiment provides is by the attribute modification at described interface to be concealed is not shown described interface to be concealed for shared stealth mode realizes the equipment that is shared, like this, amendment Desktop Share component layer is not needed.Assembly key-course is provided with adaptable interface, and this adaptable interface may be used for the trigger event processing meeting boundary layer, and the WinGUI layer in the boundary layer of meeting simultaneously can be provided with an inlet porting, arranges for guiding user.
The internal structure of the present embodiment to IM client and conference client will is not construed as limiting, and is technology well known to those skilled in the art, does not repeat them here.
307, shared device the Desktop Share of described shared device is given described in be shared equipment.
As shown in Figure 2, the meeting boundary layer in conference client will can call the Desktop Share interface in conference components layer, and desktop sharing data is sent to conference components layer; Desktop sharing data is sent to MS by conference components layer; Explanation data are sent to the equipment of being shared by MS, now, are shared the interface that equipment just can show shared device, but display properties is not the interface of shared stealth mode, e.g., can comprise and not show interface to be concealed, and newly-built interface to be concealed etc.
The present embodiment is not construed as limiting the method that shared device carries out Desktop Share, is technology well known to those skilled in the art, does not repeat them here.
Further, in order to adding users is experienced, in the process of described Desktop Share, shared device can show described interface to be concealed all the time.
Such as, when shared device starts to carry out Desktop Share, desktop is showing IM window interface, now, can be, but not limited to be described shared stealth mode by the setup of attribute of IM window interface, like this, in the process of carrying out Desktop Share, the equipment that is shared does not show IM window interface, but shared device can show this IM window interface all the time, in the process of carrying out Desktop Share, new IM information has been sent by IM server, now shared device still can eject new IM window interface, but, due within step 306, shared device have modified the parameter at newly-built described interface to be concealed, the attribute at the interface to be concealed set up according to described parameter is made to be described shared stealth mode, namely the attribute of newly-established IM window interface is described shared stealth mode, therefore, the equipment that is shared does not show the IM window interface that shared device newly ejects, but, shared device normally can show the new IM window interface ejected.
In the present embodiment, shared device obtains privacy and arranges request; Request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed; If the desktop of shared device is showing described interface to be concealed described in described current time, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed; Equipment is shared described in being given by the Desktop Share of described shared device.After adopting such scheme, the interface comprising privacy information can be set to described interface to be concealed by the user of shared device, like this, when Desktop Share starts, even if shared device is current showing described interface to be concealed, due to, the attribute at described interface to be concealed is set to shared stealth mode, therefore, is shared equipment and also can not shows described interface to be concealed, the privacy avoiding the user of shared device is revealed, and then adds Consumer's Experience.
In addition; the parameter at the newly-built described interface to be concealed of shared device amendment; the attribute at the interface to be concealed set up according to described parameter is made to be described shared stealth mode; like this; in the process of carrying out Desktop Share; if during the interface to be concealed that shared device appliance for releasing single makes new advances, the equipment that is shared still does not show described interface to be concealed newly, the privacy of the user of the shared device that can better protect.
Have again, in the process of carrying out Desktop Share, although due to by the setup of attribute at interface to be concealed and described interface to be concealed newly for share stealth mode, the equipment that is shared does not show interface to be concealed and described interface to be concealed newly, but shared device still normally can show interface to be concealed and described interface to be concealed newly, like this, avoid other events of the user affecting shared device, and then better add Consumer's Experience.
There is provided some device embodiments below, this device embodiment is corresponding to the above-mentioned corresponding embodiment of the method provided respectively.
The present embodiment provides a kind of shared device, as shown in Figure 7, can comprise:
Acquiring unit 71, arranges request for obtaining privacy;
Judging unit 72, the privacy for obtaining according to described acquiring unit 71 arranges request and judges whether the desktop of shared device described in current time is showing interface to be concealed;
Setting unit 73, if judge that the desktop of shared device described in described current time is showing described interface to be concealed for described judging unit 72, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Shared cell 74, is shared equipment described in being given by the Desktop Share of described shared device.
In the present embodiment, acquiring unit, arranges request for obtaining privacy; Judging unit, the privacy for obtaining according to described acquiring unit arranges request and judges whether the desktop of shared device described in current time is showing interface to be concealed; Setting unit, if judge that the desktop of shared device described in described current time is showing described interface to be concealed for described judging unit, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed; Shared cell, is shared equipment described in being given by the Desktop Share of described shared device.After adopting such scheme, the interface comprising privacy information can be set to described interface to be concealed by the user of shared device, like this, when Desktop Share starts, even if shared device is current showing described interface to be concealed, due to, the attribute at described interface to be concealed is set to shared stealth mode, therefore, is shared equipment and also can not shows described interface to be concealed, the privacy avoiding the user of shared device is revealed, and then adds Consumer's Experience.
The present embodiment provides another kind of shared device, and this shared device, to further expanding and optimizing for the shared device shown in Fig. 7, as shown in Figure 8, can comprise:
Acquiring unit 81, arranges request for obtaining privacy;
Judging unit 82, the privacy for obtaining according to described acquiring unit 81 arranges request and judges whether the desktop of shared device described in current time is showing interface to be concealed;
Setting unit 83, if judge that the desktop of shared device described in described current time is showing described interface to be concealed for described judging unit 82, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Shared cell 84, is shared equipment described in being given by the Desktop Share of described shared device.
Further, described shared device also comprises:
Amendment unit 85, for obtaining at described acquiring unit 81 after privacy arranges request, revising the parameter at newly-built described interface to be concealed, making the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
Further, described shared device also comprises:
Display unit 86, for showing described interface to be concealed.
Further, described judging unit 82, also for arrange according to described privacy request judge before whether the desktop of shared device described in current time is showing interface to be concealed, according to the mark of the promoter of described privacy request, judge that whether the promoter of described privacy request is legal, described privacy arranges the mark that request comprises the promoter of described privacy request;
Described judging unit 82, if legal specifically for judging the promoter of described privacy request, then the privacy obtained according to described acquiring unit 81 arranges request and judges whether the desktop of shared device described in described current time is showing described interface to be concealed.
Further, described shared device comprises conference client will and instant messaging IM client;
Described acquiring unit 81, comprising:
First receiver module 811, in described conference client will, after the Desktop Share request receiving the transmission of described IM client, automatically generates described privacy and arranges request;
Sending module 812, in described conference client will, sends described privacy to described IM client and arranges request;
Second receiver module 813, in described IM client, receives the described privacy that described sending module 812 sends and arranges request.
Further, described acquiring unit 81, also comprises:
Detection module 814, in described IM client, detects described privacy and arranges request;
Described second receiver module 813, specifically in described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
Further, described judging unit 82, specifically in described IM client, arranges on the desktop asking to judge shared device described in current time whether showing described interface to be concealed according to the described privacy of described acquiring unit 81 acquisition;
The setup of attribute at described interface to be concealed, specifically in described IM client, is described shared stealth mode by described setting unit 83.
In the present embodiment, acquiring unit, arranges request for obtaining privacy; Judging unit, the privacy for obtaining according to described acquiring unit arranges request and judges whether the desktop of shared device described in current time is showing interface to be concealed; Setting unit, if judge that the desktop of shared device described in described current time is showing described interface to be concealed for described judging unit, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed; Shared cell, is shared equipment described in being given by the Desktop Share of described shared device.After adopting such scheme, the interface comprising privacy information can be set to described interface to be concealed by the user of shared device, like this, when Desktop Share starts, even if shared device is current showing described interface to be concealed, due to, the attribute at described interface to be concealed is set to shared stealth mode, therefore, is shared equipment and also can not shows described interface to be concealed, the privacy avoiding the user of shared device is revealed, and then adds Consumer's Experience.
In addition; the parameter at the newly-built described interface to be concealed of shared device amendment; the attribute at the interface to be concealed set up according to described parameter is made to be described shared stealth mode; like this; in the process of carrying out Desktop Share; if during the interface to be concealed that shared device appliance for releasing single makes new advances, the equipment that is shared still does not show described interface to be concealed newly, the privacy of the user of the shared device that can better protect.
Have again, in the process of carrying out Desktop Share, although due to by the setup of attribute at interface to be concealed and described interface to be concealed newly for share stealth mode, the equipment that is shared does not show interface to be concealed and described interface to be concealed newly, but shared device still normally can show interface to be concealed and described interface to be concealed newly, like this, avoid other events of the user affecting shared device, and then better add Consumer's Experience.
The present embodiment also provides a kind of computer 1, as shown in Figure 9, this computer 1 comprises: at least one processor 15, such as CPU(Central Processing Unit, central processing unit), at least one output interface 16 or other user interfaces 17, memory 18, at least one communication bus 19.Communication bus 19 is for realizing the connection communication between said modules.This computer 1 optionally comprises other user interfaces 17, comprises display, keyboard or pointing device (such as, mouse, trace ball (trackball), touch-sensitive plate or touch sensitive display screen).Memory 18 may comprise high-speed RAM (Random Access Memory, random access memory), still may comprise non-labile memory (non-volatile memory), such as at least one magnetic disc store.Memory 18 optionally can comprise at least one and be positioned at storage device away from aforementioned processor 15.
In some embodiments, memory 18 stores following element, executable module or data structure, or their subset, or their superset:
Operating system 180, comprises various system program, for realizing various basic business and processing hardware based task.
Application program 181, comprises various application program, for realizing various applied business.
Can be, but not limited to comprise in application program 181:
Acquiring unit, arranges request for obtaining privacy;
Judging unit, the privacy for obtaining according to described acquiring unit arranges request and judges whether the desktop of shared device described in current time is showing interface to be concealed;
Setting unit, if judge that the desktop of shared device described in described current time is showing described interface to be concealed for described judging unit, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Shared cell, is shared equipment described in being given by the Desktop Share of described shared device.
Further, described shared device also comprises:
Amendment unit, after arranging request in described acquiring unit acquisition privacy, revises the parameter at newly-built described interface to be concealed, makes the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
Further, described shared device also comprises:
Display unit, for showing described interface to be concealed.
Further, described shared device also comprises:
Described judging unit, also for arrange according to described privacy request judge before whether the desktop of shared device described in current time is showing interface to be concealed, according to the mark of the promoter of described privacy request, judge that whether the promoter of described privacy request is legal, described privacy arranges the mark that request comprises the promoter of described privacy request;
Described judging unit, if legal specifically for judging the promoter of described privacy request, then the privacy obtained according to described acquiring unit arranges request and judges whether the desktop of shared device described in described current time is showing described interface to be concealed.
Further, described shared device comprises conference client will and instant messaging IM client;
Described acquiring unit, comprising:
First receiver module, in described conference client will, after the Desktop Share request receiving the transmission of described IM client, automatically generates described privacy and arranges request;
Sending module, in described conference client will, sends described privacy to described IM client and arranges request;
Second receiver module, in described IM client, receives the described privacy that described sending module sends and arranges request.
Further, described acquiring unit, also comprises:
Detection module, in described IM client, detects described privacy and arranges request;
Described second receiver module, specifically in described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
Further, described judging unit, specifically in described IM client, the described privacy obtained according to described acquiring unit arranges on desktop that request judges shared device described in current time whether showing described interface to be concealed;
The setup of attribute at described interface to be concealed, specifically in described IM client, is described shared stealth mode by described setting unit.
In embodiments of the present invention, by calling the program or instruction that store in memory 18, processor 15, for:
Obtain privacy and request is set;
Request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed;
If the desktop of shared device is showing described interface to be concealed described in described current time, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Equipment is shared described in being given by the Desktop Share of described shared device.
Further, processor 15, also for obtaining at described shared device after privacy arranges request, revising the parameter at newly-built described interface to be concealed, making the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
Further, processor 15, also for showing described interface to be concealed.
Further, processor 15, also for arrange request according to described privacy judge before whether the desktop of shared device described in current time is showing interface to be concealed described, according to the mark of the promoter of described privacy request, judge that whether the promoter of described privacy request is legal, described privacy arranges the mark that request comprises the promoter of described privacy request;
Described setting according to described privacy asks to judge whether the desktop of shared device described in current time is showing interface to be concealed, comprising:
If the promoter of described privacy request is legal, then request is set according to described privacy and judges whether the desktop of shared device described in described current time is showing described interface to be concealed.
Further, described shared device comprises conference client will and instant messaging IM client;
Further, processor 15, specifically in described conference client will, after the Desktop Share request receiving the transmission of described IM client, automatically generates described privacy and arranges request;
In described conference client will, send described privacy to described IM client and request is set;
In described IM client, the described privacy receiving the transmission of described conference client will arranges request.
Further, processor 15, specifically in described IM client, detects described privacy and arranges request;
In described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
Further, processor 15, specifically in described IM client, arranges on the desktop asking to judge shared device described in current time whether showing described interface to be concealed according to described privacy; In described IM client, be described shared stealth mode by the setup of attribute at described interface to be concealed.
In the present embodiment, shared device obtains privacy and arranges request; Request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed; If the desktop of shared device is showing described interface to be concealed described in described current time, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed; Equipment is shared described in being given by the Desktop Share of described shared device.After adopting such scheme, the interface comprising privacy information can be set to described interface to be concealed by the user of shared device, like this, when Desktop Share starts, even if shared device is current showing described interface to be concealed, due to, the attribute at described interface to be concealed is set to shared stealth mode, therefore, is shared equipment and also can not shows described interface to be concealed, the privacy avoiding the user of shared device is revealed, and then adds Consumer's Experience.
In addition; the parameter at the newly-built described interface to be concealed of shared device amendment; the attribute at the interface to be concealed set up according to described parameter is made to be described shared stealth mode; like this; in the process of carrying out Desktop Share; if during the interface to be concealed that shared device appliance for releasing single makes new advances, the equipment that is shared still does not show described interface to be concealed newly, the privacy of the user of the shared device that can better protect.
Have again, in the process of carrying out Desktop Share, although due to by the setup of attribute at interface to be concealed and described interface to be concealed newly for share stealth mode, the equipment that is shared does not show interface to be concealed and described interface to be concealed newly, but shared device still normally can show interface to be concealed and described interface to be concealed newly, like this, avoid other events of the user affecting shared device, and then better add Consumer's Experience.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required common hardware by software and realize, and can certainly pass through hardware, but in a lot of situation, the former is better execution mode.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in the storage medium that can read, as the floppy disk of computer, hard disk or CD etc., comprise some instructions and perform method described in each embodiment of the present invention in order to make a computer equipment (can be personal computer, server, or the network equipment etc.).
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection range of claim.
Claims (14)
1. a method for Desktop Share, is characterized in that, comprising:
Shared device obtains privacy and arranges request;
Request is set according to described privacy and judges whether the desktop of shared device described in current time is showing interface to be concealed;
If the desktop of shared device is showing described interface to be concealed described in described current time, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Equipment is shared described in being given by the Desktop Share of described shared device.
2. the method for Desktop Share according to claim 1, is characterized in that, after described shared device acquisition privacy arranges request, described method also comprises:
Revise the parameter at newly-built described interface to be concealed, make the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
3. the method for Desktop Share according to claim 1 and 2, is characterized in that, described method also comprises:
Show described interface to be concealed.
4. the method for Desktop Share according to any one of claim 1 to 3, is characterized in that, to arrange request judge that described method also comprises before whether the desktop of shared device described in current time is showing interface to be concealed described according to described privacy:
According to the mark of the promoter of described privacy request, judge that whether the promoter of described privacy request is legal, described privacy arranges the mark that request comprises the promoter of described privacy request;
Described setting according to described privacy asks to judge whether the desktop of shared device described in current time is showing interface to be concealed, comprising:
If the promoter of described privacy request is legal, then request is set according to described privacy and judges whether the desktop of shared device described in described current time is showing described interface to be concealed.
5. the method for Desktop Share according to claim 4, is characterized in that, described shared device comprises conference client will and instant messaging IM client;
Described shared device obtains privacy and arranges request, comprising:
In described conference client will, after the Desktop Share request receiving the transmission of described IM client, automatically generate described privacy and request is set;
In described conference client will, send described privacy to described IM client and request is set;
In described IM client, the described privacy receiving the transmission of described conference client will arranges request.
6. the method for Desktop Share according to claim 5, is characterized in that, described shared device obtains privacy and arranges request, also comprises:
In described IM client, detect described privacy and request is set;
In described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
7. the method for Desktop Share according to claim 6, is characterized in that, described setting according to described privacy asks to judge whether the desktop of shared device described in current time is showing interface to be concealed, comprising:
In described IM client, arrange on the desktop asking to judge shared device described in current time whether showing described interface to be concealed according to described privacy;
Described is shared stealth mode by the setup of attribute at described interface to be concealed, comprising:
In described IM client, be described shared stealth mode by the setup of attribute at described interface to be concealed.
8. a shared device, is characterized in that, comprising:
Acquiring unit, arranges request for obtaining privacy;
Judging unit, the privacy for obtaining according to described acquiring unit arranges request and judges whether the desktop of shared device described in current time is showing interface to be concealed;
Setting unit, if judge that the desktop of shared device described in described current time is showing described interface to be concealed for described judging unit, it is then shared stealth mode by the setup of attribute at described interface to be concealed, with make by the Desktop Share of described shared device to after being shared equipment, described in be shared equipment and do not show described interface to be concealed;
Shared cell, is shared equipment described in being given by the Desktop Share of described shared device.
9. shared device according to claim 8, is characterized in that, described shared device also comprises:
Amendment unit, after arranging request in described acquiring unit acquisition privacy, revises the parameter at newly-built described interface to be concealed, makes the attribute at the interface to be concealed set up according to described parameter be described shared stealth mode.
10. shared device according to claim 8 or claim 9, it is characterized in that, described shared device also comprises:
Display unit, for showing described interface to be concealed.
Shared device according to any one of 11. according to Claim 8 to 10, is characterized in that, described shared device also comprises:
Described judging unit, also for arrange according to described privacy request judge before whether the desktop of shared device described in current time is showing interface to be concealed, according to the mark of the promoter of described privacy request, judge that whether the promoter of described privacy request is legal, described privacy arranges the mark that request comprises the promoter of described privacy request;
Described judging unit, if legal specifically for judging the promoter of described privacy request, then the privacy obtained according to described acquiring unit arranges request and judges whether the desktop of shared device described in described current time is showing described interface to be concealed.
12. shared devices according to claim 11, is characterized in that, described shared device comprises conference client will and instant messaging IM client;
Described acquiring unit, comprising:
First receiver module, in described conference client will, after the Desktop Share request receiving the transmission of described IM client, automatically generates described privacy and arranges request;
Sending module, in described conference client will, sends described privacy to described IM client and arranges request;
Second receiver module, in described IM client, receives the described privacy that described sending module sends and arranges request.
13. shared devices according to claim 12, is characterized in that, described acquiring unit, also comprises:
Detection module, in described IM client, detects described privacy and arranges request;
Described second receiver module, specifically in described IM client, if detect, described privacy arranges request, then obtain described privacy and arrange request.
14. shared devices according to claim 13, it is characterized in that, described judging unit, specifically in described IM client, the described privacy obtained according to described acquiring unit arranges on desktop that request judges shared device described in current time whether showing described interface to be concealed;
The setup of attribute at described interface to be concealed, specifically in described IM client, is described shared stealth mode by described setting unit.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410110091.4A CN104935624A (en) | 2014-03-21 | 2014-03-21 | Method of desktop sharing and sharing equipment |
PCT/CN2014/094583 WO2015139493A1 (en) | 2014-03-21 | 2014-12-23 | Desktop sharing method and sharing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410110091.4A CN104935624A (en) | 2014-03-21 | 2014-03-21 | Method of desktop sharing and sharing equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104935624A true CN104935624A (en) | 2015-09-23 |
Family
ID=54122596
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410110091.4A Withdrawn CN104935624A (en) | 2014-03-21 | 2014-03-21 | Method of desktop sharing and sharing equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104935624A (en) |
WO (1) | WO2015139493A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107657925A (en) * | 2016-07-25 | 2018-02-02 | 联想(新加坡)私人有限公司 | Electronic equipment and multi-screen display control method with multihead display control function |
CN112784324A (en) * | 2021-01-12 | 2021-05-11 | 全时云商务服务股份有限公司 | Privacy protection method and device for sharing desktop |
CN113642053A (en) * | 2021-07-21 | 2021-11-12 | 深圳市兆珑科技有限公司 | Method, system, equipment and storage medium for remote control interface display |
WO2022111193A1 (en) * | 2020-11-24 | 2022-06-02 | 腾讯科技(深圳)有限公司 | Meeting control method, apparatus, device, and medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060161624A1 (en) * | 2001-04-13 | 2006-07-20 | Elaine Montgomery | Methods and apparatuses for dynamically sharing a portion of a display for application based screen sampling |
-
2014
- 2014-03-21 CN CN201410110091.4A patent/CN104935624A/en not_active Withdrawn
- 2014-12-23 WO PCT/CN2014/094583 patent/WO2015139493A1/en active Application Filing
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107657925A (en) * | 2016-07-25 | 2018-02-02 | 联想(新加坡)私人有限公司 | Electronic equipment and multi-screen display control method with multihead display control function |
WO2022111193A1 (en) * | 2020-11-24 | 2022-06-02 | 腾讯科技(深圳)有限公司 | Meeting control method, apparatus, device, and medium |
CN114610251A (en) * | 2020-11-24 | 2022-06-10 | 腾讯科技(深圳)有限公司 | Conference demonstration method, device, equipment and medium |
US20230017859A1 (en) * | 2020-11-24 | 2023-01-19 | Tencent Technology (Shenzhen) Company Limited | Meeting control method and apparatus, device, and medium |
CN112784324A (en) * | 2021-01-12 | 2021-05-11 | 全时云商务服务股份有限公司 | Privacy protection method and device for sharing desktop |
CN113642053A (en) * | 2021-07-21 | 2021-11-12 | 深圳市兆珑科技有限公司 | Method, system, equipment and storage medium for remote control interface display |
Also Published As
Publication number | Publication date |
---|---|
WO2015139493A1 (en) | 2015-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10153998B2 (en) | System and method for facilitating integrated social group instant messaging | |
CN109587044B (en) | Group creation and message interaction method and device | |
US9900554B2 (en) | Methods, systems, and computer readable media for automatically adding individuals and physical conference rooms to conferences in virtual conference rooms | |
EP3186920B1 (en) | Session history horizon control | |
CN108494572A (en) | Topic group creation method based on group and device | |
US8418079B2 (en) | System and method for cursor-based application management | |
US20150033139A1 (en) | Communication with on-calls and machines using multiple modalities through single historical tracking | |
KR20180051556A (en) | Method and device for implementing service functions | |
US10623193B2 (en) | Enhancing collaboration in real-time group chat system and method | |
CN102347941B (en) | A kind of safety applications control method based on open platform | |
US8543654B2 (en) | Contextual conversation framework | |
US10484480B2 (en) | Dynamically managing data sharing | |
US20180270177A1 (en) | Message sending method, device, and system | |
CN109799938A (en) | Control display management method, terminal device and computer readable storage medium | |
CN110958256B (en) | Cluster management method and management system | |
CN112016068A (en) | Account control method, device, equipment and computer readable storage medium | |
KR102136474B1 (en) | Synchronization of client-side keyboard layout with server-side keyboard layout in a virtual session | |
CN110019058B (en) | Sharing method and device for file operation | |
CN104935624A (en) | Method of desktop sharing and sharing equipment | |
WO2014042997A2 (en) | Managing conversations in single view pane environment | |
CN114816644A (en) | Data processing method of cloud interface, first user equipment, server and second user equipment | |
CN112235412B (en) | Message processing method and device | |
KR20160021298A (en) | Integrating customer relationship management information to communication sessions | |
US11425222B2 (en) | Dynamically managing data sharing | |
WO2023241455A1 (en) | Group chat operation processing method and apparatus, electronic device, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20150923 |