CN107819735B - Information processing method and system - Google Patents

Information processing method and system Download PDF

Info

Publication number
CN107819735B
CN107819735B CN201610826742.9A CN201610826742A CN107819735B CN 107819735 B CN107819735 B CN 107819735B CN 201610826742 A CN201610826742 A CN 201610826742A CN 107819735 B CN107819735 B CN 107819735B
Authority
CN
China
Prior art keywords
information
terminal
request
server
request item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610826742.9A
Other languages
Chinese (zh)
Other versions
CN107819735A (en
Inventor
李新辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610826742.9A priority Critical patent/CN107819735B/en
Publication of CN107819735A publication Critical patent/CN107819735A/en
Application granted granted Critical
Publication of CN107819735B publication Critical patent/CN107819735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an information processing method and system, wherein the method comprises the following steps: a first terminal sends a first request to at least one second terminal corresponding to a specified user Identification (ID), wherein the first request carries first information; generating second information according to the first information; storing the first information and the second information in a server, and carrying out encryption preprocessing on the first information and/or the second information by the server according to a preset strategy to obtain an encryption result; the request viewing end sends a second request to the server, the second request carries an information request item, and the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction; the request viewing end obtains an information request item after completing operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result; the request viewing end comprises: the at least one second terminal or at least one third terminal corresponding to the unspecified user ID.

Description

Information processing method and system
Technical Field
The present invention relates to communications technologies, and in particular, to an information processing method and system.
Background
Along with the development of the internet technology, the intelligent terminal is popularized in a large number, information interaction through the intelligent terminal becomes more convenient, convenience in sharing of various information is provided for users, and meanwhile various information safety problems are brought forward. For example, sharing of information is to open a right to friends or to open a right to all people including friends, which is an alternative way and is not applicable to all scenes, and if a certain scene needs to be adapted, processing logic needs to be modified again, and modifying processing logic again will inevitably increase cost. Moreover, sharing of information opens the right to all people including friends, which is not favorable for information security consideration and is easy to have the risk of being attacked.
The problems to be solved by the prior art are as follows: how to increase the scene application range of the processing logic and simultaneously improve the information security, however, in the related art, no effective solution for the problem exists.
Disclosure of Invention
In view of this, embodiments of the present invention provide an information processing method and system, which at least solve the problems in the prior art.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention discloses an information processing method, which comprises the following steps:
a first terminal sends a first request to at least one second terminal corresponding to a specified user Identification (ID), wherein the first request carries first information;
the at least one second terminal analyzes the first information from the first request and generates second information according to the first information;
storing the first information and the second information in a server, and carrying out encryption preprocessing on the first information and/or the second information by the server according to a preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden;
the server selectively sends the encryption result to a specified request viewing terminal for displaying;
the request viewing end sends a second request to the server based on the encryption result, the second request carries an information request item, and the server responds to the second request and sends an operation instruction;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after the encryption result is decrypted;
the request viewing end comprises: the at least one second terminal or at least one third terminal corresponding to the unspecified user ID.
In the above scheme, the obtaining, by the request viewing end, the information request item after completing the operation according to the operation instruction, where the information request item is derived from a decryption result obtained by decrypting the encryption result, includes:
the request viewing end operates according to the operation instruction and sends an operation completion instruction to the server;
and the server receives the operation completion instruction, decrypts the encrypted result according to a preset strategy to obtain the decrypted result, inquires the information request item from the decrypted result, and returns the information request item to the request viewing end.
In the foregoing solution, the sending, by the first terminal, a first request to at least one second terminal corresponding to a specified user ID, where the first request carries first information, includes:
the first terminal sends the first request to the server;
the server forwards the first request to the at least one second terminal in a preset transmission mode; wherein, the transmission mode comprises: social network, short message, mail.
In the above scheme, the method further comprises:
the server sets the first information to be displayed in a user interface where a social group is located according to an interactive permission viewing mode, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
when the server opens the interaction right for the at least one second terminal, the at least one second terminal can acquire the first information in the user interface and display the second information in the user interface;
and when the server disables the interaction right for the at least one third terminal, the at least one third terminal is made invisible to partial information of the first information in the user interface.
In the foregoing solution, the sending, by the request viewer, the second request to the server based on the encryption result includes:
the request viewing end is the at least one third terminal, the at least one third terminal generates an information request item according to the viewing requirement on the partially invisible first information, and the information request item is carried in the second request to be sent;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and the method comprises the following steps:
and the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted first information according to the operation completion instruction, determines the first information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal.
In the above scheme, the method further comprises:
the server sets the first information to be displayed in a user interface where a social group is located according to an interactive permission viewing mode, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
and when the server opens the interaction right for the at least one second terminal and the at least one third terminal, enabling the at least one second terminal and the at least one third terminal to acquire the first information in the user interface and displaying the second information in the user interface.
In the above scheme, the method further comprises:
the server sets the second information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the server disables the interaction right for the at least one third terminal, the at least one third terminal cannot see part of the second information in the user interface.
In the foregoing solution, the sending, by the request viewer, the second request to the server based on the encryption result includes:
the request viewing end is the at least one third terminal, the at least one third terminal generates an information request item according to the viewing requirement on the partially invisible second information, and the information request item is carried in the second request to be sent;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and the method comprises the following steps:
and the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted second information according to the operation completion instruction, determines the second information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal.
In the above scheme, the method further comprises:
the first terminal generates third information according to the first information;
the server sets the third information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the server disables the interaction right for the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal are/is made invisible to partial information of the third information in the user interface.
In the above scheme, the method further comprises:
storing the third information in a server, and carrying out encryption preprocessing on the third information by the server according to a preset strategy to obtain an encryption result;
the request viewing end sends a second request to the server based on the encryption result, and the second request comprises the following steps:
the request viewing end is the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal generates an information request item according to viewing requirements for partially invisible third information, and the information request item is carried in the second request to be sent;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and the method comprises the following steps:
and the at least one second terminal and/or the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted third information according to the operation completion instruction, determines the third information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal.
In the above scheme, the method further comprises:
displaying the first information at a first position of the user interface where the first terminal initiates a question;
displaying the second information at a second position of the user interface where the second terminal initiates a reply; or, displaying the second information at a third location in the user interface that is associated with the first location.
In the foregoing solution, after the at least one third terminal completes the operation according to the red packet information, the method further includes:
the server generates operation cashback information according to the operation amount in the red packet information;
and the first terminal receives the operation cashback information sent by the server.
An information processing system according to an embodiment of the present invention includes: the system comprises a first terminal, a server and a request viewing terminal, wherein the request viewing terminal further comprises: at least one second terminal corresponding to the appointed user ID and at least one third terminal corresponding to the non-appointed user ID;
the first terminal is used for sending a first request to at least one second terminal corresponding to the specified user ID, wherein the first request carries first information;
the second terminal is used for analyzing the first information from the first request and generating second information according to the first information;
the server is used for storing the first information and the second information, and encrypting and preprocessing the first information and/or the second information according to a preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden; the encryption result is selectively sent to a specified request viewing terminal for displaying;
the request viewing end is used for sending a second request to the server, the second request carries an information request item, and the server responds to the second request and prompts that the operation is required to be completed according to an operation instruction; and after the operation is completed according to the operation instruction, obtaining the information request item, wherein the information request item is derived from a decryption result obtained by decrypting the encryption result.
In the foregoing solution, the request viewing end is further configured to:
the request viewing end carries out operation according to the operation instruction and sends an operation completion instruction to the server;
the server is further configured to receive the operation completion instruction, decrypt the encrypted result according to a preset policy to obtain the decrypted result, query the information request item from the decrypted result, and return the information request item to the request viewing end.
In the foregoing solution, the first terminal is further configured to send the first request to the server;
the server is further configured to forward the first request to the at least one second terminal in a preset transmission manner; wherein, the transmission mode comprises: social network, short message, mail.
In the foregoing solution, the server is further configured to:
setting the first information to be displayed in a user interface where a social group is located according to a mode of viewing with an interactive authority, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
when the interaction right is opened for the at least one second terminal, the at least one second terminal can acquire the first information in the user interface and display the second information in the user interface;
and when the interaction right is forbidden to the at least one third terminal, the at least one third terminal is made invisible to partial information of the first information in the user interface.
In the foregoing solution, when the request viewing end is the third terminal, the method further includes:
generating an information request item according to the viewing requirement of the partially invisible first information, carrying the information request item in the second request and sending the information request item;
packaging the corresponding operation amount into the red packet information according to the operation instruction, and generating the operation completion instruction after completing the operation according to the red packet information;
the server further configured to: and decrypting the encrypted first information according to the operation completion instruction, determining the first information obtained after decryption as the information request item, and returning the information request item to the at least one third terminal.
In the foregoing solution, the server is further configured to:
setting the first information to be displayed in a user interface where a social group is located according to a mode of viewing with an interactive authority, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
and when the interaction right is opened for the at least one second terminal and the at least one third terminal, enabling the at least one second terminal and the at least one third terminal to acquire the first information in the user interface and displaying the second information in the user interface.
In the foregoing solution, the server is further configured to:
the second information is set to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the interaction right is forbidden to the at least one third terminal, the at least one third terminal is made invisible to partial information of the second information in the user interface.
In the foregoing solution, when the request viewing end is the third terminal, the method is further configured to:
generating an information request item according to the viewing requirement of the partially invisible second information, carrying the information request item in the second request and sending the information request item;
and packaging corresponding operation amount into the red packet information according to the operation instruction, generating the operation completion instruction after completing operation according to the red packet information, decrypting the encrypted second information by the server according to the operation completion instruction, determining the second information obtained after decryption as the information request item, and returning the information request item to the at least one third terminal.
In the foregoing solution, the first terminal is further configured to generate third information according to the first information;
the server further configured to:
setting the third information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the interaction right is forbidden for the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal are/is made invisible to partial information of the third information in the user interface.
In the foregoing solution, the server is further configured to:
storing the third information, and carrying out encryption preprocessing on the third information according to a preset strategy to obtain an encryption result;
when the request viewing end is the second terminal and/or the third terminal, the second terminal and/or the third terminal is further configured to generate an information request item according to a viewing requirement for the partially invisible third information, carry the information request item in the second request, and send the information request item;
the second terminal and/or the third terminal are further used for packaging corresponding operation amount into the red packet information according to the operation instruction, and generating the operation completion instruction after completing operation according to the red packet information;
and the server is further used for decrypting the encrypted third information according to the operation completion instruction, determining the third information obtained after decryption as the information request item and returning the information request item to the at least one third terminal.
In the above solution, the system further includes a display unit, configured to:
displaying the first information at a first position of the user interface where the first terminal initiates a question;
displaying the second information at a second position of the user interface where the second terminal initiates a reply; or, displaying the second information at a third location in the user interface that is associated with the first location.
In the foregoing solution, the server is further configured to:
generating operation cashback information according to the operation amount in the red packet information;
the first terminal is further configured to receive the operation cashback information sent by the server.
An information processing method according to an embodiment of the present invention includes:
storing the first information and the second information in a server; the first information is derived from a first request sent by a first terminal; the second information is derived from information which is generated by at least one second terminal corresponding to the user ID specified by the first terminal, analyzes the first information from the first request and generates according to the first information;
the server carries out encryption preprocessing on the first information and/or the second information according to a preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden;
the server selectively sends the encryption result to a specified request viewing terminal for displaying, wherein the request viewing terminal comprises: the at least one second terminal or at least one third terminal corresponding to the non-specified user ID;
the server receives a second request sent by the request viewing terminal based on the encryption result, wherein the second request carries an information request item;
the server responds to the second request and sends an operation instruction;
and after the request viewing end finishes the operation according to the operation instruction, the server decrypts the encrypted result to obtain a decrypted result, and the decrypted result is used as the information request item and fed back to the request viewing end.
A server according to an embodiment of the present invention includes:
a storage unit for storing first information and second information; the first information is derived from a first request sent by a first terminal; the second information is derived from information which is generated by at least one second terminal corresponding to the user ID specified by the first terminal, analyzes the first information from the first request and generates according to the first information;
the encryption unit is used for carrying out encryption preprocessing on the first information and/or the second information according to a preset strategy to obtain an encryption result, and the encryption result is partial information obtained after information details are hidden;
a sending unit, configured to send the encryption result to a specified request viewing end for display, where the request viewing end includes: the at least one second terminal or at least one third terminal corresponding to the non-specified user ID;
a receiving unit, configured to receive a second request sent by the request viewing end based on the encryption result, where the second request carries an information request item;
the response unit is used for responding to the second request and sending an operation instruction;
and the decryption unit is used for decrypting the encrypted result to obtain a decrypted result after the request viewing end completes operation according to the operation instruction, and feeding the decrypted result back to the request viewing end as the information request item.
An information processing method according to an embodiment of the present invention includes: a first terminal sends a first request to at least one second terminal corresponding to a specified user ID, wherein the first request carries first information; the at least one second terminal analyzes the first information from the first request and generates second information according to the first information; storing the first information and the second information in a server, and carrying out encryption preprocessing on the first information and/or the second information by the server according to a preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden; the server selectively sends the encryption result to a specified request viewing terminal for displaying; the request viewing end sends a second request to the server, the second request carries an information request item, and the server responds to the second request and prompts that the operation is required to be completed according to an operation instruction; the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after the encryption result is decrypted; the request viewing end comprises: the at least one second terminal or at least one third terminal corresponding to the unspecified user ID.
By adopting the embodiment of the invention, a first request sent by a first terminal to at least one second terminal corresponding to an appointed user ID carries first information, the second terminal generates second information according to the first information, the first information and the second information are stored in a server, in order to guarantee information security, the server encrypts and preprocesses the first information and/or the second information according to a preset strategy to obtain an encryption result, and the encryption result is partial information obtained after information details are hidden; the server selectively sends the encryption result to a specified request viewing terminal for displaying; when a request viewing end including a second terminal and/or a third terminal wants to view the encrypted result stored in the server and related to the first information and/or the second information, a second request needs to be sent to the server, the second request carries an information request item, the server responds to the second request, and from the perspective of information security, a prompt is given that the encrypted information needs to be decrypted, for example, a prompt needs to complete operation according to an operation instruction. And the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after the encryption result is decrypted. Because the information is encrypted in advance, the information is developed for users who actually need the information in a post-event reminding and corresponding paid mode, the information safety is really improved, the information is not limited to a single selection way of whether the information is a friend or is open to all people, and the method is suitable for all scenes. The processing logic does not need to be modified again, and the cost can be reduced.
Drawings
FIG. 1 is a diagram of hardware entities performing information interaction in an embodiment of the present invention;
fig. 2 is a schematic diagram of interaction between a terminal and a server according to a first embodiment of the present invention;
FIG. 3 is a schematic flow chart of an implementation of a second embodiment of the present invention;
FIGS. 4-6 are schematic diagrams of various user interfaces to which embodiments of the present invention may be applied;
FIG. 7 is a diagram of a system architecture to which embodiments of the present invention are applied;
fig. 8 is a flow chart of a practical application to which the embodiment of the present invention is applied.
Detailed Description
The following describes the embodiments in further detail with reference to the accompanying drawings.
A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the description of the embodiments of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks disclosed have not been described in detail as not to unnecessarily obscure aspects of the embodiments.
In addition, although the terms "first", "second", etc. are used herein several times to describe various elements (or various thresholds or various applications or various instructions or various operations), etc., these elements (or thresholds or applications or instructions or operations) should not be limited by these terms. These terms are only used to distinguish one element (or threshold or application or instruction or operation) from another element (or threshold or application or instruction or operation). For example, a first operation may be referred to as a second operation, and a second operation may be referred to as a first operation, without departing from the scope of the invention, the first operation and the second operation being operations, except that they are not the same operation.
The steps in the embodiment of the present invention are not necessarily processed according to the described step sequence, and may be optionally rearranged in a random manner, or steps in the embodiment may be deleted, or steps in the embodiment may be added according to requirements.
The term "and/or" in embodiments of the present invention refers to any and all possible combinations including one or more of the associated listed items. It is also to be noted that: when used in this specification, the term "comprises/comprising" specifies the presence of stated features, integers, steps, operations, elements and/or components but does not preclude the presence or addition of one or more other features, integers, steps, operations, elements and/or components and/or groups thereof.
The intelligent terminal (e.g., mobile terminal) of the embodiments of the present invention may be implemented in various forms. For example, the mobile terminal described in the embodiments of the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a Digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Multimedia Player (PMP), a navigation device, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic diagram of hardware entities performing information interaction in an embodiment of the present invention, where fig. 1 includes: at least one first terminal 1, shown as terminals 11-14, a server 2, at least one second terminal 3, shown as terminals 31-35, at least one third terminal 4, shown as terminals 41-44. The types of the first terminal, the second terminal and the third terminal comprise: mobile phone, desktop computer, PC computer, all-in-one machine, etc. And all the terminals carry out information interaction with the server through a wired network or a wireless network. The second terminal may be an appointed user in the friend chain of the first terminal, for example, the first terminal may appoint the second terminal to perform information interaction of appointed first information, and the second terminal submits the second information after obtaining the second information according to the first information, thereby completing the information interaction. The third terminal may be a non-designated user in the friend chain of the first terminal, for example, the first terminal may designate the second terminal to perform information interaction designating the first information, the second terminal submits the second information to complete the information interaction after obtaining the second information according to the first information, and the third terminal is prompted to join in the information interaction through various information display modes and information viewing prompt modes. In a practical application, the information between the first terminal and the second terminal is transparently disclosed, and does not need to be shielded (for example, the information which is transparently displayed is shielded and hidden by a masking mode and the like), and the third terminal is a non-appointed user in the friend chain of the first terminal, that is, the third terminal is not in the information chain with the trust base, so that some rights are not opened to the third terminal, for example, the first information and/or the second information need to be shielded (for example, the information which is transparently displayed is shielded and hidden by a masking mode and the like) to the third terminal. By adopting the embodiment of the invention, the first terminal sends the first request to at least one second terminal corresponding to the appointed user ID, and the first request carries the first information, and one specific implementation is as follows: the server forwards the first request, the at least one second terminal parses the first information (such as the proposed question) from the first request, and generates second information (such as a reply or comment to the question) according to the first information, and one specific implementation is as follows: the server receives the uploading of the second information (reply or comment to the question), so that the server stores the first information (such as the proposed question) and the second information (such as reply or comment to the question) in the server through the processing logic 10 and encrypts the first information and the second information according to a preset strategy. In view of information security, in an actual application, the server may respond to the viewing request of the third terminal, and prompt the third terminal to decrypt the encrypted information, for example, prompt to complete an operation (e.g., a payment operation) according to an operation instruction (e.g., a payment instruction). And the third terminal obtains the information request item after finishing operation (such as payment operation) according to the operation instruction (such as a payment instruction), wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is the first information and/or the second information obtained after decryption. Further, if the first terminal itself generates third information (such as a reply or comment of the terminal itself to a question) according to the first information (such as a proposed question), it is desired that the second terminal replies to the first information (such as a proposed question) within a predetermined time, and if the second terminal does not reply and it is desired to view the third information (such as a reply or comment of the terminal itself to a question), the server stores the third information (such as a reply or comment of the terminal itself to a question) in the server through the processing logic 10 in advance, and performs encryption processing according to a preset policy. The server may respond to the viewing request of the second terminal, and prompt the second terminal to decrypt the encrypted information, for example, prompt to complete an operation (e.g., a payment operation) according to an operation instruction (e.g., a payment instruction), and the decryption of the encrypted information is performed by using the paid method, instead of decrypting the viewing request of any user, which is also a means for improving information security. And the second terminal obtains the information request item after finishing operation (such as payment operation) according to the operation instruction (such as a payment instruction), wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is third information obtained after decryption. In the processing logic 10 corresponding to the server, when the operation instruction is specifically a payment instruction, the logic specifically includes: s1, storing the first information and the second information in a server, and carrying out encryption preprocessing on the first information and/or the second information and/or according to a preset strategy by the server to obtain an encryption result; the encryption result is part of information obtained after information details are hidden, and the encryption result is selectively sent to a specified request viewing terminal to be displayed; s2, responding to the second request, and prompting that the operation is required to be completed according to the payment instruction; and S3, receiving the payment completion instruction, decrypting the encrypted result according to a preset strategy to obtain a decrypted result, inquiring the information request item from the decrypted result, and returning the information request item to the request viewing end. The operation instruction herein includes, but is not limited to, an instruction related to an operation, such as an operation instruction.
The above example of fig. 1 is only an example of a system architecture for implementing the embodiment of the present invention, and the embodiment of the present invention is not limited to the system architecture described in the above fig. 1, and various embodiments of the method of the present invention are proposed based on the system architecture described in the above fig. 1.
The first embodiment is as follows:
as shown in fig. 2, an information processing method according to an embodiment of the present invention includes:
step 101-.
Step 103, the at least one second terminal parses the first information from the first request, and generates second information according to the first information.
Here, through step 101-. The third terminal is a non-designated user in the friend chain of the first terminal, that is, the third terminal is not in the information chain with the trust basis, and some rights are not opened to the third terminal, for example, the first information and/or the second information need to shield the third terminal (for example, the information that is transparently displayed is shielded and hidden by a masking manner and the like).
If the first terminal is a user A, the second terminal is a user B, and the third terminal is a user C, the first information is a question provided by the user A, and the user B is expected to reply or comment. And after the user B replies or comments, taking the information replied or commented by the user B as second information and uploading the second information, wherein the second information is invisible to the user.
And step 104, the server stores the first information and the second information in the server, and the server performs encryption preprocessing on the first information and/or the second information according to a preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden.
Here, from the viewpoint of information security, the server stores the first information (such as the proposed question) and the second information (such as the reply or comment to the question) in the server, and performs encryption processing according to a preset policy, for example, the first information (such as the proposed question) may be encrypted singly, the second information (such as the reply or comment to the question) may be encrypted singly, or both of them may be encrypted, and so on, and performs "preprocessing" with the policy.
And 105, the server selectively sends the encryption result to a specified request viewing terminal for displaying.
And 106, the request viewing end sends a second request to the server, wherein the second request carries an information request item, and the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction.
Here, the request viewer includes: at least one second terminal corresponding to the appointed user ID or at least one third terminal corresponding to the non-appointed user ID. The second terminal is a friend appointed by the first terminal; the third terminal is a non-designated friend. One special case is: the message sent by the first terminal is also encrypted for the second terminal, and the second terminal is required to send a red packet to be viewed, so that the message is not limited to the third terminal, but is a "request viewer", which may include the second terminal in a broad sense, or may be only a third terminal different from the second terminal.
For the second terminal, the specific processing procedure of step 106 includes: step 106a1, at least one second terminal sends a second request to the server, wherein the second request carries an information request item; step 106a2, the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction; 106a3, the at least one second terminal sends an operation complete instruction to the server.
For the third terminal, the specific processing procedure of step 106 includes: step 106b1, at least one third terminal sends a second request to the server, wherein the second request carries the information request item; step 106b2, the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction; 106b3, the at least one second terminal sends an operation completion instruction to the server.
And step 107, after the request viewing terminal finishes the operation according to the operation instruction, the server decrypts according to a preset strategy to obtain the information request item after decryption and returns the information request item to the request viewing terminal, wherein the information request item is derived from a decryption result obtained by decrypting the encryption result.
Here, the request viewer includes: at least one second terminal corresponding to the appointed user ID or at least one third terminal corresponding to the non-appointed user ID. After the request viewing end completes the operation according to the operation instruction, the server performs decryption processing according to a preset strategy to obtain a decryption result, wherein the decryption result comprises: the decrypted first information and/or second information and/or third information and the like; and the at least one second terminal obtains a corresponding decryption result, such as third information, according to the information item requested to be viewed by the second terminal. At least one third terminal obtains a corresponding decryption result, such as the first information and/or the second information, according to the information item requested to be viewed by the third terminal.
For the second terminal, in an actual application, if the first terminal itself generates third information (such as a reply or comment of the terminal itself to a question) according to the first information (such as a question), it is desired that the second terminal replies to the first information (such as the question) within a predetermined time, and if the second terminal does not reply and wants to check the third information (such as a reply or comment of the terminal itself to a question), the server stores the third information (such as the reply or comment of the terminal itself to a question) in the server in advance, and performs encryption processing according to a preset policy. The server can respond to the viewing request of the second terminal, and prompt the second terminal to decrypt the encrypted information, for example, prompt to complete the operation according to the operation instruction, so that the decryption of the encrypted information is performed for the user who actually needs the encrypted information through the paid way, but not the viewing request of any user, and the paid way is also a means for improving the information security. And the second terminal obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is third information obtained after decrypting.
For the third terminal, in a practical application, if a first message (e.g., a proposed question) sent by the first terminal is answered by the second terminal, a second message (e.g., a reply or comment to the question by the terminal itself) is obtained, the first message and the second message are notified to the third terminal, the third terminal wants to join in an information interaction, and wants to check the first message (e.g., the proposed question) and/or the second message (e.g., a reply or comment to the question), the server stores the first message (e.g., the proposed question) and/or the second message (e.g., a reply or comment to the question) in the server in advance, and performs encryption processing according to a preset policy. The server can respond to the viewing request of the third terminal, and prompt the third terminal to decrypt the encrypted information, for example, prompt to complete the operation according to the operation instruction, so that the decryption of the encrypted information is performed for the user who actually needs the encrypted information through the paid way, but not the viewing request of any user, and the paid way is also a means for improving the information security. And the third terminal obtains the information request item after completing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is the first information and/or the second information obtained after decrypting.
In an actual application, an information initiator and an information receiver in information sharing have 2 application scenes, 1) an information relationship chain with a trust relationship comprises the information initiator such as Zhang III and the information receiver such as Li IV; 2) the information relationship chain comprises an information initiator and a plurality of information receivers, such as an information initiator 'Zhang III', a plurality of information receivers 'WangYi', 'Li II', 'Zhao III', 'Li IV', 'LiuWu' and the like. Specifically, the first terminal sends the first request to at least one second terminal, and locks the corresponding second terminal according to the acquired specified user ID. If the user identification is a plurality of friend IDs on the friend relationship chain of the user, the first terminal acquires the plurality of friend IDs on the friend relationship chain; the privacy information of the first terminal, namely the question A to be requested to be answered by the second terminal, of the first terminal, and the selected at least one friend ID are directly sent to the at least one second terminal corresponding to the at least one friend ID, of course, the privacy information of the first terminal, namely the question A to be asked by the first terminal, and the selected at least one friend ID can also be transferred through the server, and are sent to the server, and the server forwards the question A to the at least one second terminal corresponding to the at least one friend ID. Meanwhile or afterwards, the first terminal sends the privacy information of the first terminal, namely a question A asked by the first terminal, to other friends on the friend relationship chain except the selected at least one friend ID in an encryption mode, and the terminals logged by other friends are represented by a third terminal so as to be distinguished from the second terminal. However, the third terminal is not in the information relationship chain with trust relationship formed by the first terminal and the second terminal, and therefore, the interactive authority is not opened, and only the encrypted information "question B encrypted to question a" sent by the first terminal or the second terminal is received, or the encrypted information "reply D encrypted to reply C" sent by the first terminal or the second terminal is received, if the third terminal needs to decrypt the two information "question B and reply D", it needs to request the first terminal and the second terminal for the key for decrypting the two information, one way is that: it requests the password from line decryption by the red packet or requests the server to perform decryption processing by the red packet to get the required "question a and reply C".
By adopting the embodiment of the invention, the question reply of the asked user can be checked by sending the question to the specified friend in the user chain (the question answer prompt can be sent to the asked user through various prompt means), and other users can check the question reply of the asked user through sending a red packet to the asked user based on the friend circle message. The public information is selected by the appointed friends and other non-appointed friends according to the interaction authority, so that a point-to-point communication mechanism in a user chain is formed, and information safety guarantee is improved.
Example two:
as shown in fig. 3, an information processing method according to an embodiment of the present invention includes:
step 201, a first terminal sends a first request to at least one second terminal corresponding to a user ID according to the specified user ID, wherein the first request carries first information to be replied by the at least one second terminal.
Here, if the first terminal is user a, the second terminal is user B, and the third terminal is user C, that is: the user a asks the user B to answer a question as the first information.
Step 202, the at least one second terminal parses the first information from the first request, and generates second information according to the first information.
Here, if the first terminal is user a, the second terminal is user B, and the third terminal is user C, that is: the user B answers the question, gets a reply or comment, and takes it as the second information.
Step 203, storing the first information and the second information in a server.
Here, the questions, replies or comments are stored in the server so that, subsequently, the user in need sends a request to it to get the questions, replies or comments.
And 204, after the server performs encryption preprocessing on the first information and/or the second information according to a preset strategy, obtaining an encryption result, wherein the encryption result is part of information obtained after information details are hidden.
Here, the question, reply, or comment is encrypted according to the policy.
And step 205, the server selectively sends the encryption result to a specified request viewing terminal for displaying.
And step 206, the third terminal sends a second request to the server, wherein the second request carries an information request item to be checked.
Here, if the first terminal is user a, the second terminal is user B, and the third terminal is user C, that is: user C wants to view questions, replies, or comments.
And step 207, the server responds to the second request and feeds back an operation instruction to the third terminal.
Here, if the first terminal is user a, the second terminal is user B, and the third terminal is user C, that is: the server prompts user C to see, but requires prior action (e.g., payment) to open the interactive right.
And 208, the third terminal operates according to the operation instruction and sends an operation completion instruction to the server.
Here, if the first terminal is user a, the second terminal is user B, and the third terminal is user C, that is: user C says that i have operated (e.g., paid), and can view questions, replies, or comments to the bar.
And 209, the server receives the operation completion instruction, decrypts the encrypted result according to a preset strategy to obtain a decrypted result, queries the information request item from the decrypted result, and returns the information request item to the third terminal.
Here, the server decrypts according to the policy to obtain the question, the reply or the comment, and matches the request of the third terminal, so that the queried question, the reply or the comment is pertinently improved for the third terminal from the decrypted result.
Example three:
step 301, the first terminal sends the first request to the server.
Step 302, the server forwards the first request to at least one second terminal corresponding to the specified user ID in a preset transmission mode.
Here, the transmission method includes: social network, short message, mail.
The first terminal sends a first request to at least one second terminal corresponding to the appointed user ID through a server, wherein the first request carries first information.
Step 303, the at least one second terminal parses the first information from the first request, and generates second information according to the first information.
Here, through the step 301-. The third terminal is a non-designated user in the friend chain of the first terminal, that is, the third terminal is not in the information chain with the trust basis, and some rights are not opened to the third terminal, for example, the first information and/or the second information need to shield the third terminal (for example, the information that is transparently displayed is shielded and hidden by a masking manner and the like).
If the first terminal is a user A, the second terminal is a user B, and the third terminal is a user C, the first information is a question provided by the user A, and the user B is expected to reply or comment. And after the user B replies or comments, taking the information replied or commented by the user B as second information and uploading the second information, wherein the second information is invisible to the user.
And step 304, the server stores the first information and the second information in the server, and the server performs encryption preprocessing on the first information and/or the second information according to a preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden.
Here, from the viewpoint of information security, the server stores the first information (such as the proposed question) and the second information (such as the reply or comment to the question) in the server, and performs encryption processing according to a preset policy, for example, the first information (such as the proposed question) may be encrypted singly, the second information (such as the reply or comment to the question) may be encrypted singly, or both of them may be encrypted, and so on, and performs "preprocessing" with the policy.
And 305, the server selectively sends the encryption result to a specified request viewing terminal for displaying.
Step 306, the request viewing end sends a second request to the server, the second request carries an information request item, and the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction.
Here, the request viewer includes: at least one second terminal corresponding to the appointed user ID or at least one third terminal corresponding to the non-appointed user ID. The second terminal is a friend appointed by the first terminal; the third terminal is a non-designated friend. One special case is: the message sent by the first terminal is also encrypted for the second terminal, and the second terminal is required to send a red packet to be viewed, so that the message is not limited to the third terminal, but is a "request viewer", which may include the second terminal in a broad sense, or may be only a third terminal different from the second terminal.
For the second terminal, the specific processing procedure of step 306 includes: at least one second terminal sends a second request to the server, wherein the second request carries an information request item; the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction; and at least one second terminal sends an operation completion instruction to the server.
For the third terminal, the specific processing procedure of step 306 includes: at least one third terminal sends a second request to the server, wherein the second request carries an information request item; the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction; and at least one second terminal sends an operation completion instruction to the server.
And 307, the request viewing end performs operation according to the operation instruction and sends an operation completion instruction to the server.
And 308, the server receives the operation completion instruction, decrypts the encrypted result according to a preset strategy to obtain the decrypted result, inquires the information request item from the decrypted result, and returns the information request item to the request viewing end.
Here, through step 307 and step 308, after the request viewing end completes the operation according to the operation instruction, the information request item is obtained, where the information request item is derived from the decryption result obtained by decrypting the encryption result.
Wherein, the request viewing end comprises: at least one second terminal corresponding to the appointed user ID or at least one third terminal corresponding to the non-appointed user ID. After the request viewing end completes the operation according to the operation instruction, the server performs decryption processing according to a preset strategy to obtain a decryption result, wherein the decryption result comprises: the decrypted first information and/or second information and/or third information and the like; and the at least one second terminal obtains a corresponding decryption result, such as third information, according to the information item requested to be viewed by the second terminal. At least one third terminal obtains a corresponding decryption result, such as the first information and/or the second information, according to the information item requested to be viewed by the third terminal.
For the second terminal, in an actual application, if the first terminal itself generates third information (such as a reply or comment of the terminal itself to a question) according to the first information (such as a question), it is desired that the second terminal replies to the first information (such as the question) within a predetermined time, and if the second terminal does not reply and wants to check the third information (such as a reply or comment of the terminal itself to a question), the server stores the third information (such as the reply or comment of the terminal itself to a question) in the server in advance, and performs encryption processing according to a preset policy. The server can respond to the viewing request of the second terminal, and prompt the second terminal to decrypt the encrypted information, for example, prompt to complete the operation according to the operation instruction, so that the decryption of the encrypted information is performed for the user who actually needs the encrypted information through the paid way, but not the viewing request of any user, and the paid way is also a means for improving the information security. And the second terminal obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is third information obtained after decrypting.
For the third terminal, in a practical application, if a first message (e.g., a proposed question) sent by the first terminal is answered by the second terminal, a second message (e.g., a reply or comment to the question by the terminal itself) is obtained, the first message and the second message are notified to the third terminal, the third terminal wants to join in an information interaction, and wants to check the first message (e.g., the proposed question) and/or the second message (e.g., a reply or comment to the question), the server stores the first message (e.g., the proposed question) and/or the second message (e.g., a reply or comment to the question) in the server in advance, and performs encryption processing according to a preset policy. The server can respond to the viewing request of the third terminal, and prompt the third terminal to decrypt the encrypted information, for example, prompt to complete the operation according to the operation instruction, so that the decryption of the encrypted information is performed for the user who actually needs the encrypted information through the paid way, but not the viewing request of any user, and the paid way is also a means for improving the information security. And the third terminal obtains the information request item after completing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is the first information and/or the second information obtained after decrypting.
In an actual application, an information initiator and an information receiver in information sharing have 2 application scenes, 1) an information relationship chain with a trust relationship comprises the information initiator such as Zhang III and the information receiver such as Li IV; 2) the information relationship chain comprises an information initiator and a plurality of information receivers, such as an information initiator 'Zhang III', a plurality of information receivers 'WangYi', 'Li II', 'Zhao III', 'Li IV', 'LiuWu' and the like. Specifically, the first terminal sends the first request to at least one second terminal, and locks the corresponding second terminal according to the acquired specified user ID. If the user identification is a plurality of friend IDs on the friend relationship chain of the user, the first terminal acquires the plurality of friend IDs on the friend relationship chain; the privacy information of the first terminal, namely the question A to be requested to be answered by the second terminal, of the first terminal, and the selected at least one friend ID are directly sent to the at least one second terminal corresponding to the at least one friend ID, of course, the privacy information of the first terminal, namely the question A to be asked by the first terminal, and the selected at least one friend ID can also be transferred through the server, and are sent to the server, and the server forwards the question A to the at least one second terminal corresponding to the at least one friend ID. Meanwhile or afterwards, the first terminal sends the privacy information of the first terminal, namely a question A asked by the first terminal, to other friends on the friend relationship chain except the selected at least one friend ID in an encryption mode, and the terminals logged by other friends are represented by a third terminal so as to be distinguished from the second terminal. However, the third terminal is not in the information relationship chain with trust relationship formed by the first terminal and the second terminal, and therefore, the interactive authority is not opened, and only the encrypted information "question B encrypted to question a" sent by the first terminal or the second terminal is received, or the encrypted information "reply D encrypted to reply C" sent by the first terminal or the second terminal is received, if the third terminal needs to decrypt the two information "question B and reply D", it needs to request the first terminal and the second terminal for the key for decrypting the two information, one way is that: it requests the password from line decryption by the red packet or requests the server to perform decryption processing by the red packet to get the required "question a and reply C".
By adopting the embodiment of the invention, the question reply of the asked user can be checked by sending the question to the specified friend in the user chain (the question answer prompt can be sent to the asked user through various prompt means), and other users can check the question reply of the asked user through sending a red packet to the asked user based on the friend circle message. The public information is selected by the appointed friends and other non-appointed friends according to the interaction authority, so that a point-to-point communication mechanism in a user chain is formed, and information safety guarantee is improved.
Based on the first to third embodiments, in an embodiment of the present invention, the server sets the first information to be displayed in a user interface where a social group is located in a manner of viewing according to an interactive authority, where the social group is composed of the first terminal, the at least one second terminal, and the at least one third terminal. 1) And when the server opens the interaction right for the at least one second terminal, the at least one second terminal can acquire the first information in the user interface and display the second information in the user interface. 2) And when the server disables the interaction right for the at least one third terminal, the at least one third terminal is made invisible to partial information of the first information in the user interface. For example, if a first message (e.g., a question) is displayed in a WeChat friend circle, the interaction rights may restrict viewing to some people and not others. Here, the second terminal (e.g., lie four) can see the problem posed by the first terminal (zhang san), and the third terminal (wang five) cannot see the problem posed by the first terminal (zhang san).
Based on the first to third embodiments, in an implementation manner of the first embodiment of the present invention, the sending, by the request viewer, the second request to the server includes: the request viewing end is the at least one third terminal, and the at least one third terminal generates an information request item according to the viewing requirement for the partially invisible first information, and carries the information request item in the second request to be sent. Correspondingly, the request viewing end obtains the information request item after completing the operation according to the operation instruction, where the information request item is derived from the decryption result obtained after decrypting the encryption result, and the method includes: and the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted first information according to the operation completion instruction, determines the first information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal. For example, if a first message (e.g., a question) is displayed in a WeChat friend circle, the interaction rights may restrict viewing to some people and not others. Here, the second terminal (e.g., lie four) can see and answer the question posed by the first terminal (zhang san), while the third terminal (wang five) cannot see the question posed by the first terminal (zhang san), and wang five needs to get a red parcel if you want to see the question posed by zhang san.
Based on the first to third embodiments, in an implementation manner of an embodiment of the present invention, the method further includes: the server sets the first information to be displayed in a user interface where a social group is located according to an interactive permission viewing mode, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal; and when the server opens the interaction right for the at least one second terminal and the at least one third terminal, enabling the at least one second terminal and the at least one third terminal to acquire the first information in the user interface and displaying the second information in the user interface. For example, a first message (e.g., a question asked) is displayed in a WeChat friend circle, and the interaction right is that the question of Zhang III is open to all people. Here, the second terminal and the third terminal can see the question posed by the first terminal, but the answer to the question lie four is masked from wang five. The concrete implementation is as follows: the server sets the second information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode; and when the server disables the interaction right for the at least one third terminal, the at least one third terminal cannot see part of the second information in the user interface. For example, the comment of lie four is invisible to king five, i.e.: the server hides the Wangwu according to the second information based on the interactive permission, and at the moment, the Wangwu needs to give a red packet according to the prompt, so that the comment of the plum four can be seen.
Based on the foregoing embodiments, in an implementation manner of an embodiment of the present invention, the sending, by a request viewer, a second request to the server includes: the request viewing end is the at least one third terminal, and the at least one third terminal generates an information request item according to the viewing requirement for the partially invisible second information, and carries the information request item in the second request to be sent. Correspondingly, the request viewing end obtains the information request item after completing the operation according to the operation instruction, where the information request item is derived from the decryption result obtained after decrypting the encryption result, and the method includes: and the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted second information according to the operation completion instruction, determines the second information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal. For example, if the first message (e.g., the question) is displayed in a WeChat friend circle, the interaction rights may be restricted from being visible to some people, invisible to some people, or open to all people. Here, the second terminal (e.g., liqi) can see the problem posed by the first terminal (zhang san), the third terminal (wang wu) cannot see the problem posed by the first terminal (zhang san), wang wu needs to send a red packet according to the prompt to see the comment of liqi, the process of sending the red packet is to respond according to multiple prompt modes of the server, the operation instruction of the server is correspondingly carried out, the operation is completed, and after the operation completion instruction is formed, wang wu can see the comment of liqi.
Based on the foregoing embodiments, in an implementation manner of an embodiment of the present invention, the method further includes: the first terminal generates third information according to the first information (if the first terminal answers the question by itself); the server sets the third information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode; and when the server disables the interaction right for the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal are/is made invisible to partial information of the third information in the user interface. And storing the third information in a server, and carrying out encryption preprocessing on the third information by the server according to a preset strategy to obtain an encryption result. Correspondingly, the request viewing end sends a second request to the server, including: the request viewing end is the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal generates an information request item according to viewing requirements for partially invisible third information, and the information request item is carried in the second request to be sent; the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and the method comprises the following steps: and the at least one second terminal and/or the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted third information according to the operation completion instruction, determines the third information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal. For example, the first terminal (zhang san) answers the question itself, and the second terminal (lie si) needs to give zhuang package to zhang san if the answer is desired to be seen.
Based on the foregoing embodiments, in an implementation manner of an embodiment of the present invention, the method further includes: displaying the first information at a first position of the user interface where the first terminal initiates a question; displaying the second information at a second position of the user interface where the second terminal initiates a reply; or, displaying the second information at a third location in the user interface that is associated with the first location.
Based on the foregoing embodiments, in an implementation manner of an embodiment of the present invention, after the at least one third terminal completes an operation according to the red packet information, the method further includes: the server generates operation cashback information according to the operation amount in the red packet information; and the first terminal receives the operation cashback information sent by the server.
Example four:
an information processing system according to an embodiment of the present invention includes: the system comprises a first terminal, a server and a request viewing terminal, wherein the request viewing terminal further comprises: at least one second terminal corresponding to the appointed user ID and at least one third terminal corresponding to the non-appointed user ID.
The first terminal is configured to send a first request to at least one second terminal corresponding to a specified user ID, where the first request carries first information. The second terminal is used for analyzing the first information from the first request and generating second information according to the first information. The server is used for storing the first information and the second information, and encrypting and preprocessing the first information and/or the second information according to a preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden; and selectively sending the encryption result to a specified request viewing terminal for displaying. The request viewing end is used for sending a second request to the server, the second request carries an information request item, and the server responds to the second request and prompts that the operation is required to be completed according to an operation instruction; and after the operation is completed according to the operation instruction, obtaining the information request item, wherein the information request item is derived from a decryption result obtained by decrypting the encryption result.
The first terminal and the second terminal form an information chain or a user chain (such as a friend chain) with a trust basis, and in a practical application, information between the first terminal and the second terminal is transparently disclosed without information shielding (such as shielding and hiding the transparently displayed information through a masking mode). The third terminal is a non-designated user in the friend chain of the first terminal, that is, the third terminal is not in the information chain with the trust basis, and some rights are not opened to the third terminal, for example, the first information and/or the second information need to shield the third terminal (for example, the information that is transparently displayed is shielded and hidden by a masking manner and the like). If the first terminal is a user A, the second terminal is a user B, and the third terminal is a user C, the first information is a question provided by the user A, and the user B is expected to reply or comment. And after the user B replies or comments, taking the information replied or commented by the user B as second information and uploading the second information, wherein the second information is invisible to the user. From the perspective of information security, the server stores the first information (such as the proposed question) and the second information (such as the reply or comment to the question) in the server, and encrypts the first information (such as the proposed question) and the second information (such as the reply or comment to the question) according to a preset policy, for example, the first information and the second information may be encrypted separately, or both of the first information and the second information may be encrypted, and the like, and performs "preprocessing" using the policy.
The request viewing end comprises: at least one second terminal corresponding to the appointed user ID or at least one third terminal corresponding to the non-appointed user ID. The second terminal is a friend appointed by the first terminal; the third terminal is a non-designated friend. One special case is: the message sent by the first terminal is also encrypted for the second terminal, and the second terminal is required to send a red packet to be viewed, so that the message is not limited to the third terminal, but is a "request viewer", which may include the second terminal in a broad sense, or may be only a third terminal different from the second terminal. Wherein, for the second terminal, the specific processing procedure includes: at least one second terminal sends a second request to the server, wherein the second request carries an information request item; the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction; and at least one second terminal sends an operation completion instruction to the server. For the third terminal, the specific processing procedure includes: at least one third terminal sends a second request to the server, wherein the second request carries an information request item; the server responds to the second request and prompts that the operation is required to be completed according to the operation instruction; and at least one second terminal sends an operation completion instruction to the server.
After the request viewing end completes the operation according to the operation instruction, the server performs decryption processing according to a preset strategy to obtain a decryption result, wherein the decryption result comprises: the decrypted first information and/or second information and/or third information and the like; and the at least one second terminal obtains a corresponding decryption result, such as third information, according to the information item requested to be viewed by the second terminal. At least one third terminal obtains a corresponding decryption result, such as the first information and/or the second information, according to the information item requested to be viewed by the third terminal.
For the second terminal, in an actual application, if the first terminal itself generates third information (such as a reply or comment of the terminal itself to a question) according to the first information (such as a question), it is desired that the second terminal replies to the first information (such as the question) within a predetermined time, and if the second terminal does not reply and wants to check the third information (such as a reply or comment of the terminal itself to a question), the server stores the third information (such as the reply or comment of the terminal itself to a question) in the server in advance, and performs encryption processing according to a preset policy. The server can respond to the viewing request of the second terminal, and prompt the second terminal to decrypt the encrypted information, for example, prompt to complete the operation according to the operation instruction, so that the decryption of the encrypted information is performed for the user who actually needs the encrypted information through the paid way, but not the viewing request of any user, and the paid way is also a means for improving the information security. And the second terminal obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is third information obtained after decrypting.
For the third terminal, in a practical application, if a first message (e.g., a proposed question) sent by the first terminal is answered by the second terminal, a second message (e.g., a reply or comment to the question by the terminal itself) is obtained, the first message and the second message are notified to the third terminal, the third terminal wants to join in an information interaction, and wants to check the first message (e.g., the proposed question) and/or the second message (e.g., a reply or comment to the question), the server stores the first message (e.g., the proposed question) and/or the second message (e.g., a reply or comment to the question) in the server in advance, and performs encryption processing according to a preset policy. The server can respond to the viewing request of the third terminal, and prompt the third terminal to decrypt the encrypted information, for example, prompt to complete the operation according to the operation instruction, so that the decryption of the encrypted information is performed for the user who actually needs the encrypted information through the paid way, but not the viewing request of any user, and the paid way is also a means for improving the information security. And the third terminal obtains the information request item after completing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and specifically is the first information and/or the second information obtained after decrypting.
In an actual application, an information initiator and an information receiver in information sharing have 2 application scenes, 1) an information relationship chain with a trust relationship comprises the information initiator such as Zhang III and the information receiver such as Li IV; 2) the information relationship chain comprises an information initiator and a plurality of information receivers, such as an information initiator 'Zhang III', a plurality of information receivers 'WangYi', 'Li II', 'Zhao III', 'Li IV', 'LiuWu' and the like. Specifically, the first terminal sends the first request to at least one second terminal, and locks the corresponding second terminal according to the acquired specified user ID. If the user identification is a plurality of friend IDs on the friend relationship chain of the user, the first terminal acquires the plurality of friend IDs on the friend relationship chain; the privacy information of the first terminal, namely the question A to be requested to be answered by the second terminal, of the first terminal, and the selected at least one friend ID are directly sent to the at least one second terminal corresponding to the at least one friend ID, of course, the privacy information of the first terminal, namely the question A to be asked by the first terminal, and the selected at least one friend ID can also be transferred through the server, and are sent to the server, and the server forwards the question A to the at least one second terminal corresponding to the at least one friend ID. Meanwhile or afterwards, the first terminal sends the privacy information of the first terminal, namely a question A asked by the first terminal, to other friends on the friend relationship chain except the selected at least one friend ID in an encryption mode, and the terminals logged by other friends are represented by a third terminal so as to be distinguished from the second terminal. However, the third terminal is not in the information relationship chain with trust relationship formed by the first terminal and the second terminal, and therefore, the interactive authority is not opened, and only the encrypted information "question B encrypted to question a" sent by the first terminal or the second terminal is received, or the encrypted information "reply D encrypted to reply C" sent by the first terminal or the second terminal is received, if the third terminal needs to decrypt the two information "question B and reply D", it needs to request the first terminal and the second terminal for the key for decrypting the two information, one way is that: it requests the password from line decryption by the red packet or requests the server to perform decryption processing by the red packet to get the required "question a and reply C".
By adopting the embodiment of the invention, the question reply of the asked user can be checked by sending the question to the specified friend in the user chain (the question answer prompt can be sent to the asked user through various prompt means), and other users can check the question reply of the asked user through sending a red packet to the asked user based on the friend circle message. The public information is selected by the appointed friends and other non-appointed friends according to the interaction authority, so that a point-to-point communication mechanism in a user chain is formed, and information safety guarantee is improved.
In an implementation manner of the embodiment of the present invention, the request view end is further configured to: the request viewing end operates according to the operation instruction and sends an operation completion instruction to the server; the server is further configured to receive the operation completion instruction, decrypt the encrypted result according to a preset policy to obtain the decrypted result, query the information request item from the decrypted result, and return the information request item to the request viewing end.
In an implementation manner of the embodiment of the present invention, the first terminal is further configured to send the first request to the server; the server is further configured to forward the first request to the at least one second terminal in a preset transmission manner; wherein, the transmission mode comprises: social network, short message, mail.
In an implementation manner of the embodiment of the present invention, the server is further configured to: setting the first information to be displayed in a user interface where a social group is located according to a mode of viewing with an interactive authority, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal; 1) when the interaction right is opened for the at least one second terminal, the at least one second terminal can acquire the first information in the user interface and display the second information in the user interface; 2) and when the interaction right is forbidden to the at least one third terminal, the at least one third terminal is made invisible to partial information of the first information in the user interface.
In an embodiment of the present invention, when the request view end is the third terminal, the method further includes: generating an information request item according to the viewing requirement of the partially invisible first information, carrying the information request item in the second request and sending the information request item; and packaging the corresponding operation amount into the red packet information according to the operation instruction, and generating the operation completion instruction after completing the operation according to the red packet information. The server further configured to: and decrypting the encrypted first information according to the operation completion instruction, determining the first information obtained after decryption as the information request item, and returning the information request item to the at least one third terminal.
In an implementation manner of the embodiment of the present invention, the server is further configured to: setting the first information to be displayed in a user interface where a social group is located according to a mode of viewing with an interactive authority, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal; and when the interaction right is opened for the at least one second terminal and the at least one third terminal, enabling the at least one second terminal and the at least one third terminal to acquire the first information in the user interface and displaying the second information in the user interface.
In an implementation manner of the embodiment of the present invention, the server is further configured to: the second information is set to be displayed in a user interface where the social group is located according to an interactive permission viewing mode; and when the interaction right is forbidden to the at least one third terminal, the at least one third terminal is made invisible to partial information of the second information in the user interface.
In an embodiment of the present invention, when the request view end is a third terminal, the method further includes: generating an information request item according to the viewing requirement of the partially invisible second information, carrying the information request item in the second request and sending the information request item; and packaging corresponding operation amount into the red packet information according to the operation instruction, generating the operation completion instruction after completing operation according to the red packet information, decrypting the encrypted second information by the server according to the operation completion instruction, determining the second information obtained after decryption as the information request item, and returning the information request item to the at least one third terminal.
In an implementation manner of the embodiment of the present invention, the first terminal is further configured to generate third information according to the first information; the server further configured to: setting the third information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode; and when the interaction right is forbidden for the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal are/is made invisible to partial information of the third information in the user interface.
In an embodiment of the present invention, the method further includes: storing the third information, and carrying out encryption preprocessing on the third information according to a preset strategy to obtain an encryption result; when the request viewing end is the second terminal and/or the third terminal, the second terminal and/or the third terminal is further configured to generate an information request item according to a viewing requirement for the partially invisible third information, carry the information request item in the second request, and send the information request item; and the second terminal and/or the third terminal are further used for packaging the corresponding operation amount into the red packet information according to the operation instruction, and generating the operation completion instruction after completing the operation according to the red packet information. And the server is further used for decrypting the encrypted third information according to the operation completion instruction, determining the third information obtained after decryption as the information request item and returning the information request item to the at least one third terminal.
In an implementation manner of the embodiment of the present invention, the system further includes a display unit, configured to: displaying the first information at a first position of the user interface where the first terminal initiates a question; displaying the second information at a second position of the user interface where the second terminal initiates a reply; or, displaying the second information at a third location in the user interface that is associated with the first location.
In an implementation manner of the embodiment of the present invention, the server is further configured to: generating operation cashback information according to the operation amount in the red packet information; the first terminal is further configured to receive the operation cashback information sent by the server.
As for the processor for data Processing, when executing Processing, the processor can be implemented by a microprocessor, a Central Processing Unit (CPU), a Digital Signal Processor (DSP), or a Programmable logic Array (FPGA); for the storage medium, the storage medium contains operation instructions, which may be computer executable codes, and the operation instructions implement the steps in the flow of the information processing method according to the above-described embodiment of the present invention.
Here, it should be noted that: the above description related to the terminal and the server items is similar to the above description of the method, and the description of the beneficial effects of the same method is omitted for brevity. For technical details not disclosed in the embodiments of the terminal and the server of the present invention, please refer to the description of the embodiments of the method flow of the present invention.
The embodiment of the invention is explained by taking a practical application scene as an example as follows:
in the SNS social scene, the WeChat friend circle is taken as an example, but not limited to the WeChat friend circle, by adopting the embodiment of the invention, in the information interaction among users, the information is disclosed to all friends, and the current friend circle information (social network) lacks a more effective point-to-point communication mechanism (the current friend circle is disclosed to all friends but not to specified friends), so that the information safety is difficult to guarantee. Based on this scenario, a peer-to-peer communication mechanism inside the circle of friends needs to be implemented, so as to improve information security guarantee. The question may be asked at a friend circle (question answer prompts may be sent to the asked user through various prompting means), and other users may check the question reply of the asked user by sending a red packet to the asked user based on the friend circle message, and the red packet is only one way of opening the interactive authority, and is not limited to the specific implementation way. As shown in fig. 4-6, the information content displayed in the user interface of the WeChat friend circle includes first information (a question asked by the first terminal), second information (a question answered or commented by the second terminal) and third information (a question answered or commented by the first terminal). As shown in fig. 4, zhang san edits the friend circle, and issues a question to zhang xi, which can make a comment at the comment of zhang san edited friend circle to answer a question, but for zhang san and common friends of zhang san, it can only know that he has a comment, and the comment content is covered, and it cannot know what he says. It can be understood that the covering form can be covering the question and the answer besides only covering the comment content of lie four, and the comment situation information is reserved at the time. At this point, other buddies may click on the overlay area, present a dialog box, and request to issue a certain amount of red envelope, as shown in fig. 5. The specific number can be determined by Zhang three, or Li four, or preset by the system. As shown in fig. 6, when the other friends complete the payment, the reply of lie four in the circle of friends with three blogs can be seen.
In a practical application, the red packet amount can be the same for each friend, or the amount of each person can be random small, and Zhang three or Li four can set red packets with different amounts for different friends.
In one practical application, once the Li four answers the question in the circle of friends with three, the following can be automatically acquired: obtaining the authority of the red envelope, checking the authority of other friends for replying questions, and the like.
In a practical application, Zhang III can ask questions of multiple friends at the same time, and the multiple friends hide their responses at the same time to wait for receiving a red packet.
In one practical application, Zhang III can also answer the question by itself, and the answer is displayed only after receiving the red packet.
In a practical application, besides the red packet of the plum four-way friend, the third Zhang can also be extracted from the fourth plum.
In one implementation, it may be desirable to red pack prune four if the prune four does not answer the question beyond a preset time.
In a practical application, the question set by Zhang III can be a non-question, a choice question or a question-and-answer question, and if the question is a non-question or a choice question, different option entries can be set for Li IV to select without replying at the comment place.
In a practical application, the method for prompting the Li IV to answer the question can be added with short message notification, mail notification and the like besides the WeChat notification.
The embodiment of the invention is adopted in the SNS social scene, and is specifically realized as follows:
as shown in fig. 7, a specific system architecture diagram is shown, the system comprising: terminals 111, 112, 113 … …, server 120 and communication network 130. Wherein:
terminals 111, 112, 113. . . The terminal device with data calculation processing function can be terminal device, including but not limited to smart phone (equipped with communication module), palm computer, tablet computer, etc. These communication terminals are all installed with an operating system, including but not limited to: the Android operating system, the Symbian operating system, the Windows mobile operating system, and the apple iPhone OS operating system, among others.
The communication network 130 may be a wireless or wired communication network, such as an IP network, a cellular mobile communication network, or the like.
The server 120 may be a computer system including one or more servers. In addition, the server 120 may also include a plurality of hardware components (not labeled in fig. 7), such as a display, a keyboard, a mouse, a hard disk, and so on. The server 120 includes at least: the data reading and writing interface (data transmission interface) is used for writing the friend circle information published by the publisher into the friend circle database and providing reading friend circle information for a reader from the friend circle database; a function setting interface (command transmission interface) for transmitting various control commands of the publisher, such as setting friend visible commands, system identification commands, and the like; the processor is used for receiving various instructions and sending various control commands; a memory for storing a database including, but not limited to, various circle of friends.
By adopting the embodiment of the invention, in a practical application, the first terminal is Zhang III, the second terminal is Li IV, the third terminal is Wang Wu, and the information interaction among the terminals in the WeChat friend circle can be as follows: after three questions are released, friends called to answer the questions such as Lifours can see the question content, and other friends not called such as Wangwu cannot see the question content, but Wangwu can see that three questions release the content. The corresponding specific technical implementation scheme is as follows: 1) and acquiring a plurality of friend IDs on the friend relationship chain. 2) The privacy information (equivalent to a question) and the selected at least one first friend ID (equivalent to lie four, hereinafter abbreviated: the second user) to the server. 3) And any friend ID in the selected at least one first friend ID sends second information (corresponding to answers of Liquan) corresponding to the privacy information (corresponding to question questions) to a server. 4) The server sends the privacy message (equivalent to a question) to the selected at least one first friend ID in a transparent transmission manner, and transmits the privacy message (equivalent to a question) to other friends on a friend relationship chain except the selected at least one first friend ID in an encryption manner or to all friend IDs on the friend relationship chain (for receiving the second information, hereinafter simply referred to as: a third user). In this embodiment, lie four replies to the friend circle message of zhang three after seeing it, and zhang three can see the reply content of lie four at this moment, but friends of zhang three cannot see the reply of lie four.
Of course, in another embodiment, the question of Zhang three is not only visible to Li four, but is visible to all but replies to others designated to friends needing to reply to the question are masked and these people need to do so by giving a red envelope or completing other tasks if they need to view the reply content. That is to say, in this embodiment, the friend circle of zhang is transparently disclosed to lie four, and encrypted to other friends, and if other friends want to know the content of the questions and answers of zhang and lie four, other friends may request to view the question and answer message through a red packet or in another manner, for example, when the request is sent in the form of a red packet, the corresponding technical implementation scheme is as follows: 1) the third user sends a request viewing instruction (equivalent to refreshing a friend circle) to the server; and the server sends the privacy information, or the second information corresponding to the privacy information or the payment request information corresponding to the second information or both to the third user according to the request viewing instruction. 2) And the third user completes payment according to the payment request information and sends a payment completion instruction to the server. 3) And the server acquires a key of a corresponding encryption mode according to the payment completion instruction, decrypts the privacy message according to the key, and sends the decrypted message content to the personal user terminal of a third user for display.
Fig. 8 is a specific schematic diagram of an embodiment of the present invention, which includes:
step 401, Zhang three asks questions to Li four in the circle of friends, and the content of the questions is sent to the server.
Step 402, the server informs lie four through various ways including but not limited to social network, short message and mail;
step 403, the Li IV answers the third question in the third friend circle, and the answers are uploaded to the server;
step 404, the server hides the answer of lie four and informs other friends that the answer needs to be seen and red packages need to be sent first;
step 405, refreshing a friend circle by wangwu;
step 406, informing king five that the friend circle content and the plum four sent by Zhang III have responded, but hiding the response of the plum four unless the red packet is given to the plum four;
407, the Wangwu sends a red packet to the plum four;
and step 408, the server sends the answer of the plum four to the king five.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (27)

1. An information processing method, characterized in that the method comprises:
a first terminal sends a first request to at least one second terminal corresponding to a specified user Identification (ID), wherein the first request carries first information;
the at least one second terminal analyzes the first information from the first request and generates second information according to the first information;
storing the first information and the second information in a server, wherein the server performs encryption preprocessing on the first information and the second information according to a preset strategy or performs encryption preprocessing on the second information according to the preset strategy to obtain an encryption result, and the encryption result is partial information obtained after information details are hidden;
the server selectively sends the encryption result to a specified request viewing terminal for displaying;
the request viewing end sends a second request to the server based on the encryption result, the second request carries an information request item, and the server responds to the second request and sends an operation instruction;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after the encryption result is decrypted;
the request viewing end is at least one third terminal corresponding to the non-specified user ID.
2. The method according to claim 1, wherein the requesting and viewing end obtains the information request item after completing the operation according to the operation instruction, and the information request item is derived from a decryption result obtained by decrypting the encryption result, and the method includes:
the request viewing end operates according to the operation instruction and sends an operation completion instruction to the server;
and the server receives the operation completion instruction, decrypts the encrypted result according to a preset strategy to obtain the decrypted result, inquires the information request item from the decrypted result, and returns the information request item to the request viewing end.
3. The method according to claim 1, wherein the first terminal sends a first request to at least one second terminal corresponding to a specified user ID, and the first request carries first information, and the method comprises:
the first terminal sends the first request to the server;
the server forwards the first request to the at least one second terminal in a preset transmission mode; wherein, the transmission mode comprises: social network, short message, mail.
4. The method of claim 1, further comprising:
the server sets the first information to be displayed in a user interface where a social group is located according to an interactive permission viewing mode, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
when the server opens the interaction right for the at least one second terminal, the at least one second terminal can acquire the first information in the user interface and display the second information in the user interface;
and when the server disables the interaction right for the at least one third terminal, the at least one third terminal is made invisible to partial information of the first information in the user interface.
5. The method of claim 4, wherein the requesting viewer sends a second request to the server based on the encrypted result, comprising:
the request viewing end is the at least one third terminal, the at least one third terminal generates an information request item according to the viewing requirement on the partially invisible first information, and the information request item is carried in the second request to be sent;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and the method comprises the following steps:
and the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted first information according to the operation completion instruction, determines the first information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal.
6. The method of claim 1, further comprising:
the server sets the first information to be displayed in a user interface where a social group is located according to an interactive permission viewing mode, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
and when the server opens the interaction right for the at least one second terminal and the at least one third terminal, enabling the at least one second terminal and the at least one third terminal to acquire the first information in the user interface and displaying the second information in the user interface.
7. The method according to any one of claims 4 to 6, further comprising:
the server sets the second information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the server disables the interaction right for the at least one third terminal, the at least one third terminal cannot see part of the second information in the user interface.
8. The method of claim 7, wherein the requesting viewer sending a second request to the server based on the encrypted result, comprising:
the request viewing end is the at least one third terminal, the at least one third terminal generates an information request item according to the viewing requirement on the partially invisible second information, and the information request item is carried in the second request to be sent;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and the method comprises the following steps:
and the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted second information according to the operation completion instruction, determines the second information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal.
9. The method of claim 4, further comprising:
the first terminal generates third information according to the first information;
the server sets the third information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the server disables the interaction right for the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal are/is made invisible to partial information of the third information in the user interface.
10. The method of claim 9, further comprising:
storing the third information in a server, and carrying out encryption preprocessing on the third information by the server according to a preset strategy to obtain an encryption result;
the request viewing end sends a second request to the server based on the encryption result, and the second request comprises the following steps:
the request viewing end is the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal generates an information request item according to viewing requirements for partially invisible third information, and the information request item is carried in the second request to be sent;
the request viewing end obtains the information request item after finishing the operation according to the operation instruction, wherein the information request item is derived from a decryption result obtained after decrypting the encryption result, and the method comprises the following steps:
and the at least one second terminal and/or the at least one third terminal encapsulates corresponding operation amount into the red packet information according to the operation instruction, generates the operation completion instruction after completing operation according to the red packet information, decrypts the encrypted third information according to the operation completion instruction, determines the third information obtained after decryption as the information request item, and returns the information request item to the at least one third terminal.
11. The method of claim 4, further comprising:
displaying the first information at a first position of the user interface where the first terminal initiates a question;
displaying the second information at a second position of the user interface where the second terminal initiates a reply; or, displaying the second information at a third location in the user interface that is associated with the first location.
12. The method according to claim 8, wherein after the at least one third terminal completes the operation according to the red packet information, the method further comprises:
the server generates operation cashback information according to the operation amount in the red packet information;
and the first terminal receives the operation cashback information sent by the server.
13. An information processing system, the system comprising: the system comprises a first terminal, a server and a request viewing end, wherein the request viewing end is at least one third terminal corresponding to a non-specified user ID;
the first terminal is used for sending a first request to at least one second terminal corresponding to the specified user ID, wherein the first request carries first information;
the second terminal is used for analyzing the first information from the first request and generating second information according to the first information;
the server is used for storing the first information and the second information, and carrying out encryption preprocessing on the first information and the second information according to a preset strategy or carrying out encryption preprocessing on the second information according to the preset strategy to obtain an encryption result, wherein the encryption result is partial information obtained after information details are hidden; the encryption result is selectively sent to a specified request viewing terminal for displaying;
the request viewing end is used for sending a second request to the server, the second request carries an information request item, and the server responds to the second request and prompts that the operation is required to be completed according to an operation instruction; and after the operation is completed according to the operation instruction, obtaining the information request item, wherein the information request item is derived from a decryption result obtained by decrypting the encryption result.
14. The system of claim 13, wherein the request viewer is further configured to:
the request viewing end carries out operation according to the operation instruction and sends an operation completion instruction to the server;
the server is further configured to receive the operation completion instruction, decrypt the encrypted result according to a preset policy to obtain the decrypted result, query the information request item from the decrypted result, and return the information request item to the request viewing end.
15. The system of claim 13, wherein the first terminal is further configured to send the first request to the server;
the server is further configured to forward the first request to the at least one second terminal in a preset transmission manner; wherein, the transmission mode comprises: social network, short message, mail.
16. The system of claim 13, wherein the server is further configured to:
setting the first information to be displayed in a user interface where a social group is located according to a mode of viewing with an interactive authority, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
when the interaction right is opened for the at least one second terminal, the at least one second terminal can acquire the first information in the user interface and display the second information in the user interface;
and when the interaction right is forbidden to the at least one third terminal, the at least one third terminal is made invisible to partial information of the first information in the user interface.
17. The system of claim 16, wherein when the request viewer is the third terminal, the system is further configured to:
generating an information request item according to the viewing requirement of the partially invisible first information, carrying the information request item in the second request and sending the information request item;
packaging the corresponding operation amount into the red packet information according to the operation instruction, and generating the operation completion instruction after completing the operation according to the red packet information;
the server further configured to: and decrypting the encrypted first information according to the operation completion instruction, determining the first information obtained after decryption as the information request item, and returning the information request item to the at least one third terminal.
18. The system of claim 13, wherein the server is further configured to:
setting the first information to be displayed in a user interface where a social group is located according to a mode of viewing with an interactive authority, wherein the social group is composed of the first terminal, the at least one second terminal and the at least one third terminal;
and when the interaction right is opened for the at least one second terminal and the at least one third terminal, enabling the at least one second terminal and the at least one third terminal to acquire the first information in the user interface and displaying the second information in the user interface.
19. The system of any of claims 16 to 18, wherein the server is further configured to:
the second information is set to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the interaction right is forbidden to the at least one third terminal, the at least one third terminal is made invisible to partial information of the second information in the user interface.
20. The system of claim 19, wherein when the requesting viewer is a third terminal, the requesting viewer is further configured to:
generating an information request item according to the viewing requirement of the partially invisible second information, carrying the information request item in the second request and sending the information request item;
and packaging corresponding operation amount into the red packet information according to the operation instruction, generating the operation completion instruction after completing operation according to the red packet information, decrypting the encrypted second information by the server according to the operation completion instruction, determining the second information obtained after decryption as the information request item, and returning the information request item to the at least one third terminal.
21. The system of claim 16, wherein the first terminal is further configured to generate third information according to the first information;
the server further configured to:
setting the third information to be displayed in a user interface where the social group is located according to an interactive permission viewing mode;
and when the interaction right is forbidden for the at least one second terminal and/or the at least one third terminal, the at least one second terminal and/or the at least one third terminal are/is made invisible to partial information of the third information in the user interface.
22. The system of claim 21, wherein the server is further configured to:
storing the third information, and carrying out encryption preprocessing on the third information according to a preset strategy to obtain an encryption result;
when the request viewing end is the second terminal and/or the third terminal, the second terminal and/or the third terminal is further configured to generate an information request item according to a viewing requirement for the partially invisible third information, carry the information request item in the second request, and send the information request item;
the second terminal and/or the third terminal are further used for packaging corresponding operation amount into the red packet information according to the operation instruction, and generating the operation completion instruction after completing operation according to the red packet information;
and the server is further used for decrypting the encrypted third information according to the operation completion instruction, determining the third information obtained after decryption as the information request item and returning the information request item to the at least one third terminal.
23. The system of claim 16, further comprising a display unit for:
displaying the first information at a first position of the user interface where the first terminal initiates a question;
displaying the second information at a second position of the user interface where the second terminal initiates a reply; or, displaying the second information at a third location in the user interface that is associated with the first location.
24. The system of claim 20, wherein the server is further configured to:
generating operation cashback information according to the operation amount in the red packet information;
the first terminal is further configured to receive the operation cashback information sent by the server.
25. An information processing method, characterized in that the method comprises:
storing the first information and the second information in a server; the first information is derived from a first request sent by a first terminal; the second information is derived from information which is generated by at least one second terminal corresponding to the user ID specified by the first terminal, analyzes the first information from the first request and generates according to the first information;
the server carries out encryption preprocessing on the first information and the second information according to a preset strategy, or carries out encryption preprocessing on the second information according to the preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden;
the server selectively sends the encryption result to a specified request viewing end for displaying, wherein the request viewing end is at least one third terminal corresponding to the non-specified user ID;
the server receives a second request sent by the request viewing terminal based on the encryption result, wherein the second request carries an information request item;
the server responds to the second request and sends an operation instruction;
and after the request viewing end finishes the operation according to the operation instruction, the server decrypts the encrypted result to obtain a decrypted result, and the decrypted result is used as the information request item and fed back to the request viewing end.
26. A server, characterized in that the server comprises:
a storage unit for storing first information and second information; the first information is derived from a first request sent by a first terminal; the second information is derived from information which is generated by at least one second terminal corresponding to the user ID specified by the first terminal, analyzes the first information from the first request and generates according to the first information;
the encryption unit is used for carrying out encryption preprocessing on the first information and the second information according to a preset strategy or carrying out encryption preprocessing on the second information according to the preset strategy to obtain an encryption result, wherein the encryption result is part of information obtained after information details are hidden;
the sending unit is used for selectively sending the encryption result to a specified request viewing end for displaying, wherein the request viewing end is at least one third terminal corresponding to the non-specified user ID;
a receiving unit, configured to receive a second request sent by the request viewing end based on the encryption result, where the second request carries an information request item;
the response unit is used for responding to the second request and sending an operation instruction;
and the decryption unit is used for decrypting the encrypted result to obtain a decrypted result after the request viewing end completes operation according to the operation instruction, and feeding the decrypted result back to the request viewing end as the information request item.
27. A computer-readable storage medium storing executable instructions for implementing the information processing method according to any one of claims 1 to 12 and 25 when executed.
CN201610826742.9A 2016-09-14 2016-09-14 Information processing method and system Active CN107819735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610826742.9A CN107819735B (en) 2016-09-14 2016-09-14 Information processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610826742.9A CN107819735B (en) 2016-09-14 2016-09-14 Information processing method and system

Publications (2)

Publication Number Publication Date
CN107819735A CN107819735A (en) 2018-03-20
CN107819735B true CN107819735B (en) 2020-10-02

Family

ID=61600362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610826742.9A Active CN107819735B (en) 2016-09-14 2016-09-14 Information processing method and system

Country Status (1)

Country Link
CN (1) CN107819735B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108899035B (en) * 2018-08-02 2021-08-17 科大讯飞股份有限公司 Message processing method and device
CN109766721A (en) * 2019-01-17 2019-05-17 深圳市沃特沃德股份有限公司 Mission bit stream processing method, device, storage medium and computer equipment
CN110035004B (en) * 2019-04-19 2021-03-02 腾讯科技(深圳)有限公司 User name card sharing method, friend adding method and related device
CN110708294A (en) * 2019-09-12 2020-01-17 上海掌门科技有限公司 Interactive information issuing and processing method and device, electronic equipment and medium
CN111415171B (en) * 2020-02-24 2020-11-10 柳州达迪通信技术股份有限公司 SDH transmission system-based data acquisition and verification system
CN111431795B (en) * 2020-03-19 2022-05-03 维沃移动通信有限公司 Shared content display method and electronic equipment
CN114827066B (en) * 2021-01-18 2024-02-20 北京字跳网络技术有限公司 Information processing method, apparatus, electronic device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8571989B2 (en) * 2010-10-13 2013-10-29 Square, Inc. Decoding systems with a decoding engine running on a mobile device and coupled to a social network
CN105653909A (en) * 2016-01-26 2016-06-08 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal, server and system
CN105681309A (en) * 2016-01-26 2016-06-15 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8571989B2 (en) * 2010-10-13 2013-10-29 Square, Inc. Decoding systems with a decoding engine running on a mobile device and coupled to a social network
CN105653909A (en) * 2016-01-26 2016-06-08 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal, server and system
CN105681309A (en) * 2016-01-26 2016-06-15 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal and server

Also Published As

Publication number Publication date
CN107819735A (en) 2018-03-20

Similar Documents

Publication Publication Date Title
CN107819735B (en) Information processing method and system
US10943208B2 (en) Methods and apparatus to emulate a toy
US20220353085A1 (en) Secure distributed information system for public device authentication
US9940477B2 (en) Geolocation-based encryption method and system
ES2877110T3 (en) Procedure and system for obtaining identification information on a mobile device
RU2402068C2 (en) System, device, method and computer software for sharing digital information
WO2017114444A1 (en) Method, device and system for sharing resource data
ES2895110T3 (en) Confidential data management procedure and device, and security authentication procedure and system
US20150127940A1 (en) Secure distributed information and password management
US20180331986A1 (en) Media information release method, system, and computer storage medium
CN103927464A (en) Common validation method, and method, device and system for generating two dimensional code
CN111447133B (en) Message transmission method and device, storage medium and electronic device
US10460117B2 (en) System and method for removing internet attack surface from internet connected devices
CN108880806A (en) Encryption and decryption method, chip and readable storage medium storing program for executing
CN104137090B (en) Data assembling, transmission and storage
CN109428940A (en) The means of communication, information sharing method and device
CN111615105A (en) Information providing method, information obtaining method, information providing device, information obtaining device and terminal
CN102857495B (en) A kind of document player method and equipment
CN104573548A (en) Information encryption and decryption methods and devices and terminal
CN106685897B (en) Safe input method, device and system
US11855985B2 (en) Protected user information verification system
EP3041188B1 (en) Method, device and system for controlling presentation of application
CN111199486A (en) Data processing method and device based on block chain network and storage medium
CN114240347A (en) Business service secure docking method and device, computer equipment and storage medium
CN110266686B (en) Data sharing method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant