CN109547330A - A kind of information sharing method and device - Google Patents

A kind of information sharing method and device Download PDF

Info

Publication number
CN109547330A
CN109547330A CN201811384523.5A CN201811384523A CN109547330A CN 109547330 A CN109547330 A CN 109547330A CN 201811384523 A CN201811384523 A CN 201811384523A CN 109547330 A CN109547330 A CN 109547330A
Authority
CN
China
Prior art keywords
strategy
shares
information
safety
sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811384523.5A
Other languages
Chinese (zh)
Other versions
CN109547330B (en
Inventor
周杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811384523.5A priority Critical patent/CN109547330B/en
Publication of CN109547330A publication Critical patent/CN109547330A/en
Application granted granted Critical
Publication of CN109547330B publication Critical patent/CN109547330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services

Abstract

The present invention provides a kind of information sharing method and devices.The described method includes: detecting whether to exist and sharing strategy with matched first safety of the target information in the sharing instruction for monitoring target information;If it does not exist, then it detects whether to exist and shares strategy with matched second safety of the target information;When sharing strategy there are second safety, shares strategy according to second safety and share the target information.The present invention can effectively avoid the problem that the sharing of user information causes privacy of user to reveal, and ensure that the safety of privacy of user, improve the usage experience of user.

Description

A kind of information sharing method and device
Technical field
The present invention relates to mobile communication technology fields, share dress with a kind of information more particularly to a kind of information sharing method It sets.
Background technique
Now with the rapid development of the communication technology, mobile terminal (such as mobile phone) occupies in people's lives work Very big specific gravity.
The time of user's stop at present on the mobile apparatus is increasingly longer, and privacy also becomes more and more important, and network society The rise of friendship causes to share the article sharing that this function is more and more common, carries out after reading a good article such as user Deng.
But guaranteeing the privacy control shared about none good security mechanism is shared, equipment is by other people Having taken arbitrarily to cause the leakage of private information of user to network by sharing information, it is most likely that lead to the property of user Loss, reduces the usage experience of user.
Summary of the invention
The embodiment of the present invention provides a kind of information sharing method and device, and sharing to lack to solve information in the prior art has The security mechanism of effect is come the problem of guaranteeing the privacy of user, reduce user experience.
In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:
In a first aspect, the embodiment of the invention provides a kind of information sharing methods, comprising: in point for monitoring target information When enjoying instruction, detects whether to exist and share strategy with matched first safety of the target information;If it does not exist, then it detects whether Share strategy in the presence of with matched second safety of the target information;When sharing strategy there are second safety, according to institute It states the second safety and shares the strategy sharing target information.
Second aspect, the embodiment of the invention provides a kind of information sharing apparatus, comprising: first shares strategy detection mould Block, in the sharing instruction for monitoring target information, detecting whether exist and matched first safety of the target information Share strategy;Second shares tactful detection module, for detecting whether exist when sharing strategy there is no first safety Share strategy with matched second safety of the target information;First object information share module, for there are described second When safety shares strategy, shares strategy according to second safety and share the target information.
The third aspect the embodiment of the invention provides a kind of mobile terminal, including processor, memory and is stored in described It is real when the computer program is executed by the processor on memory and the computer program that can run on the processor The step of existing information sharing method as described in any one of the above embodiments.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, the computer program realizes information as described in any one of the above embodiments point when being executed by processor The step of enjoying method.
In embodiments of the present invention, by when the sharing for monitoring target information instructs, detecting whether to exist and target First safety of information matches shares strategy, if it does not exist, then detects whether exist and matched second safety point of target information Strategy is enjoyed, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the target information.The present invention is real It applies example and strategy is shared by addition safety, the sharing that strategy carries out information is shared according to safety, compared to the prior art scheme, energy It is enough effectively to avoid the problem that privacy of user caused by the sharing of user information is revealed, it ensure that the safety of privacy of user, improve User experience.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of information sharing method provided in an embodiment of the present invention;
Fig. 2 is a kind of step flow chart of information sharing method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention;
Fig. 5 is a kind of structural block diagram of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Embodiment one
Referring to Fig.1, a kind of step flow chart of information sharing method provided in an embodiment of the present invention, the information point are shown The method of enjoying can be applied to mobile terminal, can specifically include following steps:
Step 101: in the sharing instruction for monitoring target information, detecting whether to exist matched with the target information First safety shares strategy.
In embodiments of the present invention, mobile terminal can for mobile phone, PDA (Personal Digital Assistant, it is a Personal digital assistant), the mobile electronic devices such as tablet computer.
Target information can refer to the information of the types such as video, picture, text, and specifically, the embodiment of the present invention is not subject to Limitation.
When the sharing instruction of target information refers to that the sharing operation button for the click target information that user executes is shared The instruction of triggering, when sharing this article, is clicked corresponding " sharing " for example, reading an article from microblogging in user The instruction etc. that button is triggered.
First safety shares strategy can share strategy, i.e., point of all information occurred in mobile terminal for global dimension Enjoy the strategy for being required to carry out safety verification.The monitoring program for sharing instruction can be preset in mobile terminal system, it can Real-time monitoring is carried out with the sharing of the target information executed to user, in the sharing instruction for monitoring target information, is then detected In mobile terminal system with the presence or absence of in target information it is matched first safety share strategy, that is, detect in the terminal whether It pre-sets global dimension and shares strategy.
In the case where there is the first safety sharing strategy in the terminal, strategy sharing can be shared according to the first safety Target information will specifically be described in detail, the embodiment of the present invention is not repeated here herein in following embodiments two.
In the case where sharing strategy there is no the first safety in the terminal, step 102 is executed.
Step 102: detecting whether to exist and share strategy with matched second safety of the target information.
In embodiments of the present invention, it may include: to share strategy to include file type dimension point that the second safety, which shares strategy, Enjoy strategy, geography dimension shares strategy, time dimension shares strategy, file directory dimension is shared in the strategy such as strategy extremely Few one kind.
In the case where there are a variety of above-mentioned described second safety sharing strategies in the terminal, it can preset A variety of safety share the detection priority of strategy.
In the present invention, it is arranged successively according to the sequence of detection priority from high to low are as follows: file type dimension shares plan Slightly, geography dimension shares strategy, time dimension shares strategy, file directory dimension shares strategy, i.e., in the terminal In the case where sharing strategy there is no the first safety, it can be detected according to the sequence of priority from high to low, there are excellent When the first higher safety of grade shares strategy, then preferentially shares strategy according to the higher safety of priority and target information is divided It enjoys, for example, being previously provided in mobile phone, file type dimension shares strategy, geography dimension shares strategy, time dimension Share strategy, then first detection file type dimension share strategy, in the presence of, then with file type dimension share strategy to mesh Mark information is shared.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating Example, not as the sole limitation to the embodiment of the present invention.
In embodiments of the present invention, the position that can also be presently according to the historical behavior data of user, mobile terminal And the file directory of file locating for target information, automatic addition safety are shared strategy, specifically, are carried out with embodiments discussed below Detailed description.
In a preferred embodiment of an embodiment of the present invention, before above-mentioned steps 101, can also include:
Sub-step S1: according to the historical behavior data of user, determine that the user's operation number is greater than the behaviour of setting number Make the corresponding target information type of behavior;
Sub-step S2: file type dimension is added for the corresponding first information of the target information type and shares strategy;Or
Sub-step S3: the current location of the mobile terminal is obtained;
Sub-step S4: when the current location is in setting privacy scene, geography dimension is added for all information Share strategy;Or
Sub-step S5: file directory where the second information is obtained;
Sub-step S6: when the file directory is setting privacy catalogue, file directory dimension is added for second information Degree shares strategy.
In embodiments of the present invention, the situation for sharing strategy safely for above-mentioned automatic addition is described below respectively.
1, file type dimension is added based on user's history behavioral data automatically and shares strategy
The user's history behavioral data in mobile terminal system can be acquired, and is determined from user's history behavioral data User's operation number is greater than the corresponding target information type of operation behavior of setting number, for example, user has a large amount of often recordings Section video, hair social category update blit piece the case where, and for setting number can preset, the embodiment of the present invention to this not It limits.
In this case, then file type dimension is added for the corresponding first information of target information type automatically share plan Slightly, for example, sharing limitation etc. for video class, the corresponding information addition of picture category.
2, geography dimension is added based on mobile terminal current location automatically and shares strategy
Mobile terminal can also obtain the position being presently in automatically, be setting privacy field in the current position of mobile terminal Scape, such as bank, secret unit, when it is high privacy scene (i.e. setting privacy scene) that mobile terminal, which is presently in position, All information as in mobile terminal add geography dimension automatically and share strategy, namely hidden in setting in mobile terminal When private scene, the sharing to all information of mobile terminal is needed to add security restriction, to avoid privacy of user leakage.
Certainly, when detecting that mobile terminal is in except setting privacy scene, then above-mentioned foundation can be automatically closed Geography dimension shares strategy.
3, it adds file directory dimension automatically based on file directory and shares strategy
In the present invention, the second information refers under the information such as the picture of mobile terminal side, video namely All Files catalogue Information.File directory where available each second information is in setting privacy catalogue in the second information, and such as financial class is contour Privacy application data directory etc. can add file directory dimension for the second information under setting privacy catalogue automatically and share plan Slightly.
In the embodiment of the present invention, by intelligentized to there are the data files of high privacy risk to add sharing password automatically Control strategy can reinforce the personal secrets of user.
Certainly, in practical applications, the corresponding safety of different types of information can also be preset by user shares plan Slightly, it is also possible to use aforesaid way to be arranged automatically by system, the embodiments of the present invention are not limited thereto.
When sharing strategy there are the second safety, step 103 is executed.
Step 103: when there are the second safety sharing strategy, sharing described in strategy sharing according to second safety Target information.
When there is the second safety sharing strategy in the terminal, then it can share strategy sharing target according to the second safety Information specifically can issue the user with sharing verification, and obtain the check information of user's input when sharing target information. When the check information of user's input is verified, then share target information, does not pass through in the check information verifying of user's input When, then cancel the sharing of target information, specifically, will be described in detail in following embodiments two, the embodiment of the present invention pair This is without restriction.
Information sharing method provided in an embodiment of the present invention, by detecting when the sharing for monitoring target information instructs Share strategy with the presence or absence of with matched first safety of target information, if it does not exist, then detects whether exist and target information The second safety matched shares strategy, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the mesh Mark information.The embodiment of the present invention shares strategy by addition safety, shares the sharing that strategy carries out information according to safety, compared to Prior art can effectively avoid the problem that privacy of user caused by the sharing of user information is revealed, ensure that user is hidden Private safety, improves user experience.
Embodiment two
Referring to Fig. 2, a kind of step flow chart of information sharing method provided in an embodiment of the present invention, the information point are shown The method of enjoying can be applied to mobile terminal, can specifically include following steps:
Step 201: in the sharing instruction for monitoring target information, detecting whether to exist matched with the target information First safety shares strategy.
In embodiments of the present invention, mobile terminal can for mobile phone, PDA (Personal Digital Assistant, it is a Personal digital assistant), the mobile electronic devices such as tablet computer.
Target information can refer to the information of the types such as video, picture, text, and specifically, the embodiment of the present invention is not subject to Limitation.
When the sharing instruction of target information refers to that the sharing operation button for the click target information that user executes is shared The instruction of triggering, when sharing this article, is clicked corresponding " sharing " for example, reading an article from microblogging in user The instruction etc. that button is triggered.
First safety shares strategy can share strategy, i.e., point of all information occurred in mobile terminal for global dimension Enjoy the strategy for being required to carry out safety verification.The monitoring program for sharing instruction can be preset in mobile terminal system, it can Real-time monitoring is carried out with the sharing of the target information executed to user, in the sharing instruction for monitoring target information, is then detected In mobile terminal system with the presence or absence of in target information it is matched first safety share strategy, that is, detect in the terminal whether It pre-sets global dimension and shares strategy.
In the case where there is the first safety sharing strategy in the terminal, step 202 is executed.And in the terminal not In the case where sharing strategy there are the first safety, step 205 is executed.
Step 202: when sharing strategy there are first safety, obtaining and show and share strategy with first safety Matched first verification mode.
In embodiments of the present invention, the first verification mode can be cryptographic check mode, finger-mark check mode, recognition of face Any one of verification modes such as verification mode, the embodiments of the present invention are not limited thereto.
The mapping relations that the first safety shares strategy with verification mode are pre-saved in mobile terminal side, are obtaining first After safety shares strategy, with first it can share the first verification side of strategy matching safely by Relation acquisition according to above-mentioned mapping Formula.
After obtaining the first verification mode, the first verification mode, example can be shown in the displaying interface of mobile terminal Such as, when user clicks and shares, Password Input frame can be shown to obtain the password of user's input, or show fingerprint authentication figure Mark to obtain the finger print information of user's input, or shows recognition of face frame, to obtain the face information etc. of user's input.
Step 203: obtaining the first check information that user inputs according to first verification mode.
It, can be by user according to the first verification mode after the first verification mode to be showed in mobile terminal and shows interface Corresponding check information is inputted, and then executes step 204.
Step 204: when first check information is proved to be successful, sharing the target information.
The corresponding correct check information of the first verification mode is also preserved in the terminal, just such as cryptographic check mode True check information is " 0123456 ", and the correct check information of finger-mark check mode is " user's A left hand thumb finger print information " etc. Deng.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating Example, not as the sole limitation to the embodiment of the present invention.
Obtain user according to the first verification mode input the first check information after, can by the first check information with The corresponding correct check information of first verification mode is compared, to determine whether the two matches, in the first check information and just When true check information matching, then it represents that the first check information of user's input is proved to be successful, and in the first check information and correctly When check information mismatches, then it represents that the first check information authentication failed of user's input.
In the first check information authentication failed of user's input, then cancel the sharing of target information.
When the first check information of user's input is proved to be successful, then share target information.
Step 205: there is no it is described first safety share strategy when, detect whether exist matched with the target information Second safety share strategy.
In embodiments of the present invention, it may include: to share strategy to include file type dimension point that the second safety, which shares strategy, Enjoy strategy, geography dimension shares strategy, time dimension shares strategy, file directory dimension is shared in the strategy such as strategy extremely Few one kind.
In the case where there are a variety of above-mentioned described second safety sharing strategies in the terminal, it can preset A variety of safety share the detection priority of strategy.
In the present invention, it is arranged successively according to the sequence of detection priority from high to low are as follows: file type dimension shares plan Slightly, geography dimension shares strategy, time dimension shares strategy, file directory dimension shares strategy, i.e., in the terminal In the case where sharing strategy there is no the first safety, it can be detected according to the sequence of priority from high to low, there are excellent When the first higher safety of grade shares strategy, then preferentially shares strategy according to the higher safety of priority and target information is divided It enjoys, for example, being previously provided in mobile phone, file type dimension shares strategy, geography dimension shares strategy, time dimension Share strategy, then first detection file type dimension share strategy, in the presence of, then with file type dimension share strategy to mesh Mark information is shared.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating Example, not as the sole limitation to the embodiment of the present invention.
When sharing strategy there is no the first safety in the terminal, then detect in mobile terminal with the presence or absence of the second safety Share strategy, and executes step 206.
Step 206: when sharing strategy there are second safety, obtaining and show and share strategy with second safety Matched second verification mode.
In embodiments of the present invention, the second verification mode can be cryptographic check mode, finger-mark check mode, recognition of face Any one of verification modes such as verification mode, the embodiments of the present invention are not limited thereto.
The mapping relations that the second safety shares strategy with verification mode are pre-saved in mobile terminal side, are obtaining second After safety shares strategy, with second it can share the second verification side of strategy matching safely by Relation acquisition according to above-mentioned mapping Formula, for example, being provided in mobile phone, file type dimension shares strategy, geography dimension shares strategy, time dimension shares plan Slightly three kinds of safety share strategy, and file type dimension shares strategy, geography dimension shares strategy, time dimension shares plan Slightly three kinds of strategies, corresponding second verification mode are cryptographic check mode, finger-mark check mode, recognition of face verification side Formula can then determine that the second verification mode is password school when determining the second verification mode is that file type dimension shares strategy Proved recipe formula.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating Example, not as the sole limitation to the embodiment of the present invention.It, can be in the displaying of mobile terminal after obtaining the second verification mode The second verification mode is shown in interface, for example, can show Password Input frame when user clicks and shares to obtain user's input Password, or show fingerprint authentication icon, with obtain user input finger print information, or show recognition of face frame, to obtain use The face information etc. of family input.
Obtain and show with second safety shares the second verification mode of strategy matching after, execution step 207.
Step 207: obtaining the second check information that user inputs according to second verification mode.
It, can be by user according to the second verification mode after the second verification mode to be showed in mobile terminal and shows interface Corresponding check information is inputted, and then executes step 208.
Step 208: when second check information is proved to be successful, sharing the target information.
The corresponding correct check information of the second verification mode is also preserved in the terminal, just such as cryptographic check mode True check information is " 018456 ", and the correct check information of finger-mark check mode is " user's A right hand thumb finger print information " etc. Deng.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating Example, not as the sole limitation to the embodiment of the present invention.
Obtain user according to the second verification mode input the second check information after, can by the second check information with The corresponding correct check information of second verification mode is compared, to determine whether the two matches, in the second check information and just When true check information matching, then it represents that the second check information of user's input is proved to be successful, and in the second check information and correctly When check information mismatches, then it represents that the second check information authentication failed of user's input.
In the second check information authentication failed of user's input, then cancel the sharing of target information.
When the second check information of user's input is proved to be successful, then share target information.
Information sharing method provided in an embodiment of the present invention, except being had with information sharing method shown in embodiment one Outside some beneficial effects, user identity can also be verified with corresponding verification mode, so that it is guaranteed that sharing information be by Performed by mobile terminal affiliated user, and then the information that other users arbitrarily share mobile terminal affiliated user is avoided, kept away The privacy leakage for having exempted from mobile terminal affiliated user, further improves user experience.
Embodiment three
Referring to Fig. 3, a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention is shown, it specifically can be with Include:
First shares tactful detection module 310, for detecting whether exist in the sharing instruction for monitoring target information Share strategy with matched first safety of the target information;Second shares tactful detection module 320, for there is no described in When second safety shares strategy, detects whether to exist and share strategy with matched second safety of the target information;First object Information share module 330, for sharing strategy according to second safety and sharing when sharing strategy there are second safety The target information.
Preferably, further includes: target information determination type module determines institute for the historical behavior data according to user State the corresponding target information type of operation behavior that user's operation number is greater than setting number;File type strategy adding module, Share strategy for adding file type dimension for the corresponding first information of the target information type;Or current location obtains mould Block, for obtaining the current location of the mobile terminal;Geographical location strategy adding module, for being in the current location When setting privacy scene, geography dimension is added for all information and shares strategy;Or file directory obtains module, for obtaining File directory where second information;File directory strategy adding module is used for when the file directory is setting privacy catalogue, File directory dimension, which is added, for second information shares strategy.
Preferably, it includes that global dimension shares strategy that first safety, which shares strategy, and second safety shares strategy It include that file type dimension shares strategy, geography dimension shares strategy, time dimension shares strategy, text including sharing strategy Part catalogue dimension shares at least one of strategy;Wherein, it is each it is described second safety share strategy detection priority according to by High to low sequence arrangement is followed successively by the file type dimension sharing strategy, the geography dimension shares strategy, described Time dimension shares strategy, the file directory dimension shares strategy.
Information sharing apparatus provided in an embodiment of the present invention, by detecting when the sharing for monitoring target information instructs Share strategy with the presence or absence of with matched first safety of target information, if it does not exist, then detects whether exist and target information The second safety matched shares strategy, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the mesh Mark information.The embodiment of the present invention shares strategy by addition safety, shares the sharing that strategy carries out information according to safety, compared to Prior art can effectively avoid the problem that privacy of user caused by the sharing of user information is revealed, ensure that user is hidden Private safety, improves user experience.
Example IV
Referring to Fig. 4, a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention is shown, it specifically can be with Include:
First shares tactful detection module 410, for detecting whether exist in the sharing instruction for monitoring target information Share strategy with matched first safety of the target information;First verification mode obtains module 420, for there are described the When one safety shares strategy, obtains and show the first verification mode for sharing strategy matching with first safety;First verification Data obtaining module 430, the first check information inputted for obtaining user according to first verification mode;Second target letter Sharing module 440 is ceased, for sharing the target information when first check information is proved to be successful;Second shares strategy Detection module 450 is matched for detecting whether to exist when sharing strategy there is no first safety with the target information Second safety share strategy;First object information share module 460, for there are it is described second safety share strategy when, Share strategy according to second safety and shares the target information.
Preferably, the first object information share module 460 includes: the second verification mode acquisition submodule 4601, is used In there are it is described second safety share strategy when, obtain and show and it is described second safety shares strategy matching second verify Mode;Second check information acquisition submodule 4602, the second school inputted for obtaining user according to second verification mode Test information;Target information shares submodule 4603, for when second check information is proved to be successful, sharing the target letter Breath.
Information sharing apparatus provided in an embodiment of the present invention, except being had with information sharing apparatus shown in embodiment three Outside some beneficial effects, user identity can also be verified with corresponding verification mode, so that it is guaranteed that sharing information be by Performed by mobile terminal affiliated user, and then the information that other users arbitrarily share mobile terminal affiliated user is avoided, kept away The privacy leakage for having exempted from mobile terminal affiliated user, further improves user experience.
Embodiment five
Referring to Fig. 5, the hardware structural diagram of a kind of mobile terminal of each embodiment to realize the present invention.
The mobile terminal 500 includes but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, defeated Enter unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor The components such as 510 and power supply 511.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 5 is not constituted Restriction to mobile terminal, mobile terminal may include than illustrating more or fewer components, perhaps combine certain components or Different component layouts.In embodiments of the present invention, mobile terminal include but is not limited to mobile phone, tablet computer, laptop, Palm PC, car-mounted terminal, wearable device and pedometer etc..
Processor 510, for detecting whether exist and the target information in the sharing instruction for monitoring target information Matched first safety shares strategy;If it does not exist, then detect whether exist and matched second safety point of the target information Enjoy strategy;When sharing strategy there are second safety, shares strategy according to second safety and share the target information.
In embodiments of the present invention, by when the sharing for monitoring target information instructs, detecting whether to exist and target First safety of information matches shares strategy, if it does not exist, then detects whether exist and matched second safety point of target information Strategy is enjoyed, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the target information.The present invention is real It applies example and strategy is shared by addition safety, the sharing that strategy carries out information is shared according to safety, compared to the prior art scheme, energy It is enough effectively to avoid the problem that privacy of user caused by the sharing of user information is revealed, it ensure that the safety of privacy of user, improve User experience.
It should be understood that the embodiment of the present invention in, radio frequency unit 501 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 510 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 501 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 501 can also by wireless communication system and network and other set Standby communication.
Mobile terminal provides wireless broadband internet by network module 502 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 503 can be received by radio frequency unit 501 or network module 502 or in memory 509 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 503 can also be provided and be moved The relevant audio output of specific function that dynamic terminal 500 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 503 includes loudspeaker, buzzer and receiver etc..
Input unit 504 is for receiving audio or video signal.Input unit 504 may include graphics processor (Graphics Processing Unit, GPU) 5041 and microphone 5042, graphics processor 5041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 506.Through graphics processor 5041, treated that picture frame can be deposited Storage is sent in memory 509 (or other storage mediums) or via radio frequency unit 501 or network module 502.Mike Wind 5042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 501 is converted in the case where telephone calling model.
Mobile terminal 500 further includes at least one sensor 505, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 5061, and proximity sensor can close when mobile terminal 500 is moved in one's ear Display panel 5061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 505 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 506 is for showing information input by user or being supplied to the information of user.Display unit 506 can wrap Display panel 5061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 5061.
User input unit 507 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 507 include touch panel 5071 and Other input equipments 5072.Touch panel 5071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 5071 or in touch panel 5071 Neighbouring operation).Touch panel 5071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 510, receiving area It manages the order that device 510 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 5071.In addition to touch panel 5071, user input unit 507 can also include other input equipments 5072.Specifically, other input equipments 5072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 5071 can be covered on display panel 5061, when touch panel 5071 is detected at it On or near touch operation after, send processor 510 to determine the type of touch event, be followed by subsequent processing device 510 according to touching The type for touching event provides corresponding visual output on display panel 5061.Although in Fig. 5, touch panel 5071 and display Panel 5061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments In, can be integrated by touch panel 5071 and display panel 5061 and realize the function that outputs and inputs of mobile terminal, it is specific this Place is without limitation.
Interface unit 508 is the interface that external device (ED) is connect with mobile terminal 500.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 508 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in mobile terminal 500 or can be used in 500 He of mobile terminal Data are transmitted between external device (ED).
Memory 509 can be used for storing software program and various data.Memory 509 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 509 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 510 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 509, and calls and is stored in storage Data in device 509 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 510 may include one or more processing units;Preferably, processor 510 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 510.
Mobile terminal 500 can also include the power supply 511 (such as battery) powered to all parts, it is preferred that power supply 511 Can be logically contiguous by power-supply management system and processor 510, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, mobile terminal 500 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 510, and memory 509 is stored in On memory 509 and the computer program that can run on the processor 510, the computer program are executed by processor 510 Each process of Shi Shixian above- mentioned information sharing method embodiment, and identical technical effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes each process of above- mentioned information sharing method embodiment, and energy when the computer program is executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (12)

1. a kind of information sharing method is applied to mobile terminal characterized by comprising
In the sharing instruction for monitoring target information, detects whether to exist and share with matched first safety of the target information Strategy;
If it does not exist, then it detects whether to exist and shares strategy with matched second safety of the target information;
When sharing strategy there are second safety, shares strategy according to second safety and share the target information.
2. the method according to claim 1, wherein it is described detect whether to exist match with the target information First safety share strategy step after, further includes:
When sharing strategy there are first safety, obtains and show the first school for sharing strategy matching with first safety Proved recipe formula;
Obtain the first check information that user inputs according to first verification mode;
When first check information is proved to be successful, share the target information.
3. the method according to claim 1, wherein it is described there are it is described second safety share strategy when, according to Share the step of strategy shares the target information according to second safety, comprising:
When sharing strategy there are second safety, obtains and show the second school for sharing strategy matching with second safety Proved recipe formula;
Obtain the second check information that user inputs according to second verification mode;
When second check information is proved to be successful, share the target information.
4. the method according to claim 1, wherein it is described monitor target information sharing instruction when, It detects whether in the presence of before the step for sharing strategy with matched first safety of the target information, further includes:
According to the historical behavior data of user, determine that the user's operation number is greater than the corresponding mesh of operation behavior of setting number Mark information type;
File type dimension, which is added, for the corresponding first information of the target information type shares strategy;Or
Obtain the current location of the mobile terminal;
When the current location is in setting privacy scene, geography dimension is added for all information and shares strategy;Or
File directory where obtaining the second information;
When the file directory is setting privacy catalogue, file directory dimension is added for second information and shares strategy.
5. according to the method described in claim 4, it is characterized in that, it includes that global dimension is shared that first safety, which shares strategy, Strategy, it includes that file type dimension shares tactful, geography dimension point that second safety, which shares strategy including sharing strategy, Enjoy strategy, time dimension shares strategy, file directory dimension shares at least one of strategy;
Wherein, the detection priority that each second safety shares strategy is followed successively by the text according to sequence arrangement from high to low Part type dimension shares strategy, the geography dimension shares strategy, the time dimension shares strategy, the file directory Dimension shares strategy.
6. a kind of information sharing apparatus characterized by comprising
First shares tactful detection module, in the sharing instruction for monitoring target information, detect whether to exist with it is described Matched first safety of target information shares strategy;
Second shares tactful detection module, for detecting whether exist and institute when sharing strategy there is no first safety It states matched second safety of target information and shares strategy;
First object information share module, for dividing according to second safety when sharing strategy there are second safety It enjoys strategy and shares the target information.
7. device according to claim 6, which is characterized in that further include:
First verification mode obtains module, for obtaining and showing and described the when sharing strategy there are first safety One safety shares the first verification mode of strategy matching;
First check information obtains module, the first check information inputted for obtaining user according to first verification mode;
Second target information sharing module, for sharing the target information when first check information is proved to be successful.
8. device according to claim 6, which is characterized in that the first object information share module includes:
Second verification mode acquisition submodule, for there are it is described second safety share strategy when, obtain and show with it is described Second safety shares the second verification mode of strategy matching;
Second check information acquisition submodule, the second verification letter inputted for obtaining user according to second verification mode Breath;
Target information shares submodule, for sharing the target information when second check information is proved to be successful.
9. device according to claim 6, which is characterized in that further include:
Target information determination type module determines that the user's operation number is greater than for the historical behavior data according to user Set the corresponding target information type of operation behavior of number;
File type strategy adding module, for adding file type dimension for the corresponding first information of the target information type Share strategy;Or
Current location obtains module, for obtaining the current location of the mobile terminal;
Geographical location strategy adding module, for being added for all information when the current location is in setting privacy scene Geography dimension shares strategy;Or
File directory obtains module, for file directory where obtaining the second information;
File directory strategy adding module, for adding for second information when the file directory is setting privacy catalogue Add file catalogue dimension shares strategy.
10. device according to claim 9, which is characterized in that it includes global dimension point that first safety, which shares strategy, Strategy is enjoyed, it includes that file type dimension shares tactful, geography dimension that second safety, which shares strategy including sharing strategy, Share strategy, time dimension shares strategy, file directory dimension shares at least one of strategy;
Wherein, the detection priority that each second safety shares strategy is followed successively by the text according to sequence arrangement from high to low Part type dimension shares strategy, the geography dimension shares strategy, the time dimension shares strategy, the file directory Dimension shares strategy.
11. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is executed by the processor Any one of described in information sharing method the step of.
12. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence, the information sharing method as described in any one of claims 1 to 5 is realized when the computer program is executed by processor Step.
CN201811384523.5A 2018-11-20 2018-11-20 Information sharing method and device Active CN109547330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811384523.5A CN109547330B (en) 2018-11-20 2018-11-20 Information sharing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811384523.5A CN109547330B (en) 2018-11-20 2018-11-20 Information sharing method and device

Publications (2)

Publication Number Publication Date
CN109547330A true CN109547330A (en) 2019-03-29
CN109547330B CN109547330B (en) 2021-08-27

Family

ID=65848491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811384523.5A Active CN109547330B (en) 2018-11-20 2018-11-20 Information sharing method and device

Country Status (1)

Country Link
CN (1) CN109547330B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035183A (en) * 2019-04-22 2019-07-19 维沃移动通信有限公司 Information sharing method and terminal
CN110808900A (en) * 2019-10-28 2020-02-18 维沃移动通信有限公司 Information sharing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223420A (en) * 2011-07-07 2011-10-19 河南科技大学 Digital content distribution method for multimedia social network
CN104317620A (en) * 2014-10-24 2015-01-28 中兴通讯股份有限公司 Multi-screen sharing based application management method and device
CN104809406A (en) * 2015-04-30 2015-07-29 努比亚技术有限公司 Method and device for safe file sharing
CN107480167A (en) * 2017-06-26 2017-12-15 北京珠穆朗玛移动通信有限公司 Method, mobile terminal and storage medium based on the quick sharing information of fingerprint

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223420A (en) * 2011-07-07 2011-10-19 河南科技大学 Digital content distribution method for multimedia social network
CN104317620A (en) * 2014-10-24 2015-01-28 中兴通讯股份有限公司 Multi-screen sharing based application management method and device
CN104809406A (en) * 2015-04-30 2015-07-29 努比亚技术有限公司 Method and device for safe file sharing
CN107480167A (en) * 2017-06-26 2017-12-15 北京珠穆朗玛移动通信有限公司 Method, mobile terminal and storage medium based on the quick sharing information of fingerprint

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035183A (en) * 2019-04-22 2019-07-19 维沃移动通信有限公司 Information sharing method and terminal
CN110035183B (en) * 2019-04-22 2021-10-12 维沃移动通信有限公司 Information sharing method and terminal
CN110808900A (en) * 2019-10-28 2020-02-18 维沃移动通信有限公司 Information sharing method and device
CN110808900B (en) * 2019-10-28 2021-11-16 维沃移动通信有限公司 Information sharing method and device

Also Published As

Publication number Publication date
CN109547330B (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN107608514A (en) Information processing method and mobile terminal
CN108491123A (en) A kind of adjusting application program image target method and mobile terminal
CN107832110A (en) A kind of information processing method and mobile terminal
CN108256853A (en) A kind of method of payment and mobile terminal
CN109743503A (en) Reminding method and terminal
CN109885257A (en) A kind of disk file reading/writing method and device
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN108256308A (en) A kind of recognition of face solution lock control method and mobile terminal
CN110149628A (en) A kind of information processing method and terminal device
CN110035183A (en) Information sharing method and terminal
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN108650408A (en) A kind of unlocking screen method and mobile terminal
CN108429856A (en) A kind of location information acquisition methods and mobile terminal
CN110213438A (en) A kind of processing method and terminal device of application program
CN109800606A (en) A kind of display control method and mobile terminal
CN109547330A (en) A kind of information sharing method and device
CN109618055A (en) A kind of position sharing method and mobile terminal
CN108540951A (en) A kind of recharge method and mobile terminal
CN107895108A (en) A kind of operation management method and mobile terminal
CN107704334A (en) A kind of SDK processing method and mobile terminal
CN109753776A (en) A kind of method, apparatus and mobile terminal of information processing
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN108848240A (en) A kind of protecting information safety method and terminal
CN110191106A (en) A kind of data transmission method for uplink, terminal and communication system
CN109062492A (en) A kind of application access method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant