CN110035183B - Information sharing method and terminal - Google Patents

Information sharing method and terminal Download PDF

Info

Publication number
CN110035183B
CN110035183B CN201910324178.4A CN201910324178A CN110035183B CN 110035183 B CN110035183 B CN 110035183B CN 201910324178 A CN201910324178 A CN 201910324178A CN 110035183 B CN110035183 B CN 110035183B
Authority
CN
China
Prior art keywords
target information
preset
information
target
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910324178.4A
Other languages
Chinese (zh)
Other versions
CN110035183A (en
Inventor
采光伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910324178.4A priority Critical patent/CN110035183B/en
Publication of CN110035183A publication Critical patent/CN110035183A/en
Application granted granted Critical
Publication of CN110035183B publication Critical patent/CN110035183B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions

Abstract

The embodiment of the invention provides an information sharing method and a terminal, and relates to the technical field of information processing, wherein the information sharing method is applied to the terminal and comprises the following steps: receiving first input of a user for sharing target information to a target object; in response to the first input, obtaining a sharing rule for the target object; and processing the target information according to the sharing rule. By the method, the target information can be prevented from being mistakenly shared to the target object, and the privacy of the user can be better protected.

Description

Information sharing method and terminal
Technical Field
The embodiment of the invention relates to the technical field of information processing, in particular to an information sharing method and a terminal.
Background
In the current society, people can not leave mobile phones in more and more life, and social tools in the mobile phones are used more and more frequently. When the user uses the social tool, some embarrassment or serious consequences happen from time to time, such as: when a user shares information, the user carelessly shares private information of the user to a large group of companies of a working unit, and the user only wants to share the private information to close friends originally.
In view of the above situation, most of the social tools in the prior art provide a revocation function, that is, within a preset time period (for example, within two minutes) after the information is sent, the user may revoke the shared information, but when the user does not realize the wrong information at all, or when the user does not realize the wrong information beyond the preset time period (cannot revoke the piece of information), the information may be wrongly shared.
Therefore, how to avoid the information being shared by mistake is a technical problem to be solved urgently at present.
Disclosure of Invention
The embodiment of the invention provides an information sharing method and a terminal, and aims to solve the problem that information is mistakenly shared in the prior art.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an information sharing method, applied to a terminal, including:
receiving first input of a user for sharing target information to a target object;
in response to the first input, obtaining a sharing rule for the target object;
and processing the target information according to the sharing rule.
In a second aspect, an embodiment of the present invention further provides a terminal, including:
the receiving module is used for receiving first input of a user for sharing target information to a target object;
an obtaining module, configured to obtain, in response to the first input, a sharing rule for the target object;
and the processing module is used for processing the target information according to the sharing rule.
In a third aspect, an embodiment of the present invention further provides a terminal, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements the steps of the information sharing method described above.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the information sharing method are implemented.
In the embodiment of the invention, when the user wants to share the target information to the target object, the sharing rule for the target object is firstly obtained, and then the target information is processed according to the sharing rule, so that the target information can be prevented from being mistakenly shared to the target object, and the privacy of the user can be better protected.
Drawings
Fig. 1 is a schematic flow chart of an information sharing method according to a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of a terminal according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to a third embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a terminal implementing various embodiments of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the drawings of the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the invention, are within the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic flow chart of an information sharing method according to a first embodiment of the present invention, where the method is applied to a terminal, and includes:
step 11: receiving first input of a user for sharing target information to a target object;
step 12: in response to the first input, obtaining a sharing rule for the target object;
step 13: and processing the target information according to the sharing rule.
By adopting the information sharing method provided by the embodiment of the invention, the target information can be prevented from being mistakenly shared to the target object, and the privacy of the user can be better protected.
The target application can be a social application (such as WeChat, QQ, microblog and the like), and the target object can be a friend, a group or a sharing interface (such as WeChat friend circle or microblog circle) of the user in the target application.
In order to prevent the target information from being spread by mistake, a pre-interception mechanism may be adopted, and specifically, in some preferred embodiments of the present invention, the sharing rule includes a preset interception rule, and the processing the target information according to the sharing rule includes:
and under the condition that the target information meets the preset interception rule, forbidding sending the target information. And under the condition that the target information does not meet the preset interception rule, the target information can be shared to the target object.
That is, if the target information that the user wants to share is the information intercepted according to the preset interception rule, the target information is intercepted, otherwise, the target information is shared through the target information.
In the embodiment of the present invention, there are a plurality of preset interception rules, which are exemplified below.
As one of the optional embodiments: the preset interception rule comprises a preset time interception rule, and the preset time interception rule comprises a first time range for forbidding the target object to share the target information and/or a second time range for allowing the target object to share the target information;
the prohibiting sending of the target information under the condition that the target information meets the preset interception rule includes:
and under the condition that the target information is determined not to be allowed (namely, the target information is prohibited) to be shared to the target object according to the first time range and/or the second time range, the target information is prohibited from being sent. Optionally, the target information is shared to the target object when it is determined that the target information is allowed to be shared to the target object according to the first time range and/or the second time range.
For example, a user presets work hours (working days 9:00-12:00 and 13:00-17:00) to prohibit any information sharing among a working group in a social application (i.e. the target object is the working group in the social application), if the user shares target information to the working group at 10:00 of a working day, the target information will be directly intercepted, and if the user shares target information to the working group at 20:00 of the working day, the target information will be shared to the working group.
As another alternative embodiment: the preset interception rules comprise preset keyword interception rules, and the preset keyword interception rules comprise keywords forbidden to be shared with the target object;
the prohibiting sending of the target information under the condition that the target information meets the preset interception rule includes:
judging whether the target information comprises the keyword or not;
and if the target information comprises the keyword, forbidding sending the target information. If the target information does not include (any) of the keywords, the target information can be shared with the target object.
For example, the keywords prohibited from being shared with the target object are a series of keywords related to yellow, gambling and poison, if any keyword in the series of keywords is included in the target information, the target information is directly intercepted, and if the target information does not include all the series of keywords, the target information is shared with the target object.
The keyword may be a default keyword of the terminal, such as: a series of keywords are preset in the terminal when the terminal leaves a factory, so that sensitive information can be prevented from being spread by mistake. The keywords can be preset by the user, so that the requirements of the user can be better met, and the method is more flexible and convenient.
Optionally, when the target information conforms to a preset time interception rule or a preset keyword interception rule, interception is performed and the target information is intercepted, no interception prompt is performed.
That is, if the target information conforms to the preset time interception rule or the preset keyword interception rule, the target information is directly intercepted without any prompt for the user sharing the target information.
As yet another alternative embodiment: the preset interception rule comprises a sharing prompt starting;
the prohibiting sending of the target information under the condition that the target information meets the preset interception rule includes:
displaying a query box to query whether a user confirms to share the target information to the target object;
if a second input that the user confirms the current sharing is received, responding to the second input, and sharing the target information to the target object; otherwise, the target information is intercepted (i.e., prohibited from being sent).
Specifically, the user may define whether to start the sharing prompt for the target object in the target application. If the user starts a sharing prompt for a target object, the user displays a query box each time the user shares the target information with the target object, and queries whether the user determines to share the target information with the target object. And if the user confirms the sharing, the target information is shared to the target object, otherwise, the target information is intercepted. Therefore, the information can be better prevented from being wrongly shared.
In other embodiments of the present invention, the preset time interception rule, the preset keyword interception rule, and the start sharing prompt may be used in combination, that is, two of the three preset interception rules may exist at the same time, or even the three rules may exist at the same time. After receiving a first input of sharing the target information to the target object, the terminal needs to respectively judge whether the target information meets preset interception rules for combined use, if any one of the preset interception rules is met, the terminal prohibits sending the target information, and the terminal sends the target information only under the condition that all the preset interception rules are not met.
In order to avoid the privacy of the user from being revealed, in other preferred embodiments of the present invention, the sharing rule includes a preset privacy rule, and the preset privacy rule includes at least one preset privacy keyword; the processing the target information according to the sharing rule includes:
and executing privacy operation under the condition that the target information contains the preset privacy keywords.
That is, the target information shared by the user touches the preset privacy rule, and then the privacy operation is executed. Thus, the privacy of the user can be prevented from being revealed. Specifically, whether the target information includes a keyword related to the privacy of the user, that is, a preset privacy keyword, may be determined; and if the target information comprises a preset privacy keyword, determining that privacy operation needs to be executed, otherwise, determining that the privacy operation does not need to be executed.
Particularly, the keywords related to the privacy of the user can be keywords such as a payment password, a login password and payroll income of the user, and the user can set the keywords according to actual requirements, so that the method is more flexible and convenient. If the target information shared by the user to the target object includes the keywords related to the privacy of the user, the privacy operation needs to be executed to avoid the privacy of the user from being revealed.
In the embodiments of the present invention, there are various ways to execute the privacy operation, which are described below separately.
As one of the optional embodiments: the performing the privacy operation includes:
encrypting the target information, and sharing the encrypted target information to the target object; the encryption processing includes: at least one of mosaic processing, out-of-order processing, obfuscation processing, and encoding processing.
Specifically, various encryption modes such as mosaic processing, disorder processing, confusion processing and/or coding processing can be adopted to encrypt the target information (for example, encryption processing is carried out on keywords or regular information in the target information), and then the encrypted target information is shared to the target object, so that the content of the target information cannot be directly recognized by human eyes, and even if the target information is mistakenly shared, other people cannot understand the meaning of the target information, thereby protecting the privacy of users.
As another alternative embodiment: the performing the privacy operation includes:
generating withdrawal prompt information for prompting withdrawal of the target information in a case where the target information has been shared to the target object;
that is, after the target information is shared to the target object, a post-remediation mechanism can be adopted to prevent the target information from being spread by mistake. The remedial action may include generating a revocation prompt message to remind of the revocation target message.
Specifically, the generating withdrawal prompt information for prompting to withdraw the target information includes:
displaying the withdrawal prompt information; and/or the presence of a gas in the gas,
and sending the withdrawal prompt information to a preset friend, wherein the preset friend has the authority of withdrawing the target information.
That is, the withdrawal prompt message may be displayed, that is, the user who wrongly shares the target information is alerted to withdraw the target information in time.
And the preset friend who has the authority of canceling the target information can also send canceling prompt information to remind the preset friend to cancel the target information. That is, the user may authorize the preset friend to revoke the permission, and after the user shares some entry mark information, the user does not realize that the target object (for example, a work group) is wrongly sent, the preset friend (for example, the preset friend is in the work group as the target object, that is, the preset friend is a group member of the work group) finds that the shared target information is not suitable for sharing to the target object, and the preset friend may directly revoke the entry mark information.
Preferably, after the sending the withdrawal prompt information to the preset friend, the method further includes:
in a case where it is detected that the target information has been revoked, notification information indicating that the target information has been revoked is displayed.
That is, if the preset friend withdraws the target information shared by the user to the target object, the withdrawal behavior of the preset friend is notified to the user.
Preferably, before the receiving a first input that the user shares the target information with the target object, the method further includes:
receiving revocation authority setting input of a user to the preset friend, and setting the revocation authority of the preset friend in response to the revocation authority setting input. That is, the user needs to authorize the preset friend to revoke the right in advance. The preset friend is a member of the target object.
As yet another alternative embodiment: the performing the privacy operation includes:
and sharing a plurality of preset information to the target object under the condition that the target information is shared to the target object.
That is to say, after the target information is shared to the target object, when the target information is prevented from being spread by mistake by using a post-remediation mechanism, the remediation method may further include sharing a plurality of preset information to the target object, for example: the method includes the steps that a large amount of preset information is shared in a circulating mode, or under the condition that the number of the preset information preset by a user is large, a large amount of preset information is directly shared to a target object, so that other people see the latest large amount of preset information, and time required for withdrawing the target information is strived for users who share the target information by mistake.
In other embodiments of the present invention, the above-mentioned three privacy operations may be used in combination, and preferably, the privacy operation of generating the revocation prompt information for prompting the revocation of the target information and the privacy operation of sharing a plurality of preset information to the target object are used in combination.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a terminal according to a second embodiment of the present invention, where the terminal 20 includes:
the receiving module 21 is configured to receive a first input that a user shares target information with a target object;
an obtaining module 22, configured to obtain, in response to the first input, a sharing rule for the target object;
and the processing module 23 is configured to process the target information according to the sharing rule.
The terminal provided by the embodiment of the invention can prevent the target information from being mistakenly shared to the target object, and can better protect the privacy of the user.
Optionally, the sharing rule includes a preset interception rule;
the processing module 23 is configured to prohibit sending the target information when the target information meets the preset interception rule.
Optionally, the preset interception rule includes at least one of a preset time interception rule and a preset keyword interception rule; the preset time interception rule comprises a first time range for forbidding the target object to share the target information and/or a second time range for allowing the target object to share the target information; the preset keyword intercepting rule comprises keywords forbidden to be shared with the target object;
the processing module 23 is configured to prohibit sending of the target information when the preset interception rule includes the preset time interception rule and it is determined that the target information is not allowed to be shared with the target object according to the first time range and/or the second time range;
the processing module 23 is configured to determine whether the target information includes the keyword under the condition that the preset interception rule includes the preset keyword interception rule; and if the target information comprises the keyword, forbidding sending the target information.
Optionally, the sharing rule includes a preset privacy rule, and the preset privacy rule includes at least one preset privacy keyword;
the processing module 23 is configured to execute a privacy operation when the target information includes the preset privacy keyword.
Optionally, the processing module 23 is configured to perform at least one of the following privacy operations:
encrypting the target information, and sharing the encrypted target information to the target object; the encryption processing includes at least one of mosaic processing, out-of-order processing, obfuscation processing, and encoding processing;
generating withdrawal prompt information for prompting withdrawal of the target information in a case where the target information has been shared to the target object;
and sharing a plurality of preset information to the target object under the condition that the target information is shared to the target object.
Optionally, the processing module 23 is configured to display the revocation prompt information, and/or send the revocation prompt information to a preset friend, where the preset friend has an authority to revoke the target information.
Optionally, the processing module 23 is further configured to display notification information indicating that the target information is revoked, in a case that it is detected that the target information has been revoked.
Preferably, the terminal 20 further includes:
and the determining module is used for receiving the revocation authority setting input of the user to the preset friend, responding to the revocation authority setting input, and setting the revocation authority of the preset friend.
The terminal provided by the embodiment of the present invention can implement each process in the method embodiment corresponding to fig. 1, and is not described herein again to avoid repetition.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a terminal according to a third embodiment of the present invention, where the terminal 30 includes a processor 31, a memory 32, and a computer program stored in the memory 32 and capable of running on the processor 31, where the computer program implements the following steps when executed by the processor 31:
receiving first input of a user for sharing target information to a target object;
in response to the first input, obtaining a sharing rule for the target object;
and processing the target information according to the sharing rule.
The terminal provided by the embodiment of the invention can prevent the target information from being mistakenly shared to the target object, and can better protect the privacy of the user.
Optionally, the sharing rule includes a preset interception rule; the computer program when executed by the processor 31 may further implement the steps of:
the processing the target information according to the sharing rule includes:
and under the condition that the target information meets the preset interception rule, forbidding sending the target information.
Optionally, the preset interception rule includes at least one of a preset time interception rule and a preset keyword interception rule; the preset time interception rule comprises a first time range for forbidding the target object to share the target information and/or a second time range for allowing the target object to share the target information; the preset keyword intercepting rule comprises keywords forbidden to be shared with the target object; the computer program when executed by the processor 31 may further implement the steps of:
under the condition that the preset interception rule includes the preset time interception rule, and under the condition that the target information meets the preset interception rule, prohibiting sending the target information includes:
under the condition that the target information is judged not to be allowed to be shared to the target object according to the first time range and/or the second time range, the target information is forbidden to be sent;
under the condition that the preset interception rule comprises the preset keyword interception rule, and under the condition that the target information meets the preset interception rule, forbidding to send the target information comprises the following steps:
judging whether the target information comprises the keyword or not;
and if the target information comprises the keyword, forbidding sending the target information.
Optionally, the sharing rule includes a preset privacy rule, and the preset privacy rule includes at least one preset privacy keyword; the computer program when executed by the processor 31 may further implement the steps of:
the processing the target information according to the sharing rule includes:
and executing privacy operation under the condition that the target information contains the preset privacy keywords.
Optionally, the computer program may further implement the following steps when executed by the processor 31:
the performing the privacy operation includes at least one of:
encrypting the target information, and sharing the encrypted target information to the target object; the encryption processing includes at least one of mosaic processing, out-of-order processing, obfuscation processing, and encoding processing;
generating withdrawal prompt information for prompting withdrawal of the target information in a case where the target information has been shared to the target object;
and sharing a plurality of preset information to the target object under the condition that the target information is shared to the target object.
Optionally, the computer program may further implement the following steps when executed by the processor 31:
the generating withdrawal prompt information for prompting withdrawal of the target information includes:
displaying the withdrawal prompt information; and/or the presence of a gas in the gas,
and sending the withdrawal prompt information to a preset friend, wherein the preset friend has the authority of withdrawing the target information.
Optionally, the computer program may further implement the following steps when executed by the processor 31:
after the withdrawal prompt information is sent to the preset friend, displaying notification information for indicating that the target information is withdrawn when the situation that the target information is withdrawn is detected.
Optionally, the computer program may further implement the following steps when executed by the processor 31:
before the receiving a first input that the user shares the target information to the target object, the method further includes:
receiving revocation authority setting input of a user to the preset friend, and setting the revocation authority of the preset friend in response to the revocation authority setting input.
The terminal can realize each process of the information sharing method embodiment, can achieve the same technical effect, and is not repeated here to avoid repetition.
Fig. 4 is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention, where the terminal 400 includes, but is not limited to: radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, user input unit 407, interface unit 408, memory 409, processor 410, and power supply 411. Those skilled in the art will appreciate that the terminal configuration shown in fig. 4 is not intended to be limiting, and that the terminal may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 410 is configured to control the user input unit 407 to receive a first input that a user shares target information with a target object; in response to the first input, obtaining a sharing rule for the target object; and processing the target information according to the sharing rule.
The terminal provided by the embodiment of the invention can prevent the target information from being mistakenly shared to the target object, and can better protect the privacy of the user.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 401 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 410; in addition, the uplink data is transmitted to the base station. Typically, radio unit 401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio unit 401 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 402, such as helping the user send and receive e-mails, browse web pages, and access streaming media.
The audio output unit 403 may convert audio data received by the radio frequency unit 401 or the network module 402 or stored in the memory 409 into an audio signal and output as sound. Also, the audio output unit 403 may also provide audio output related to a specific function performed by the terminal 400 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 403 includes a speaker, a buzzer, a receiver, and the like.
The input unit 404 is used to receive audio or video signals. The input Unit 404 may include a Graphics Processing Unit (GPU) 4041 and a microphone 4042, and the Graphics processor 4041 processes image data of a still picture or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 406. The image frames processed by the graphic processor 4041 may be stored in the memory 409 (or other storage medium) or transmitted via the radio frequency unit 401 or the network module 402. The microphone 4042 may receive sound, and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 401 in case of the phone call mode.
The terminal 400 also includes at least one sensor 405, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 4061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 4061 and/or a backlight when the terminal 400 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 405 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which will not be described in detail herein.
The display unit 406 is used to display information input by the user or information provided to the user. The Display unit 406 may include a Display panel 4061, and the Display panel 4061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 407 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 407 includes a touch panel 4071 and other input devices 4072. Touch panel 4071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 4071 using a finger, a stylus, or any suitable object or attachment). The touch panel 4071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 410, receives a command from the processor 410, and executes the command. In addition, the touch panel 4071 can be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 4071, the user input unit 407 may include other input devices 4072. Specifically, the other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 4071 can be overlaid on the display panel 4061, and when the touch panel 4071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 410 to determine the type of the touch event, and then the processor 410 provides a corresponding visual output on the display panel 4061 according to the type of the touch event. Although in fig. 4, the touch panel 4071 and the display panel 4061 are two independent components to implement the input and output functions of the terminal, in some embodiments, the touch panel 4071 and the display panel 4061 may be integrated to implement the input and output functions of the terminal, which is not limited herein.
The interface unit 408 is an interface for connecting an external device to the terminal 400. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 408 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 400 or may be used to transmit data between the terminal 400 and an external device.
The memory 409 may be used to store software programs as well as various data. The memory 409 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 409 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 410 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 409 and calling data stored in the memory 409, thereby integrally monitoring the terminal. Processor 410 may include one or more processing units; preferably, the processor 410 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The terminal 400 may further include a power supply 411 (e.g., a battery) for supplying power to various components, and preferably, the power supply 411 may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the terminal 400 includes some functional modules that are not shown, and are not described in detail herein.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the information sharing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the detailed description is omitted here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. An information sharing method is applied to a terminal and is characterized by comprising the following steps:
receiving first input of a user for sharing target information to a target object;
in response to the first input, obtaining a sharing rule for the target object;
processing the target information according to the sharing rule;
the sharing rule comprises a preset privacy rule, and the preset privacy rule comprises at least one preset privacy keyword;
the processing the target information according to the sharing rule includes:
executing privacy operation under the condition that the target information contains the preset privacy keywords;
the performing the privacy operation includes at least one of:
encrypting the target information, and sharing the encrypted target information to the target object; the encryption processing includes at least one of mosaic processing, out-of-order processing, obfuscation processing, and encoding processing;
sharing a plurality of preset information to the target object under the condition that the target information is shared to the target object;
the performing the privacy operation further comprises:
generating withdrawal prompt information for prompting withdrawal of the target information in a case where the target information has been shared to the target object;
the generating withdrawal prompt information for prompting withdrawal of the target information includes:
and sending the withdrawal prompt information to a preset friend, wherein the preset friend has the authority of withdrawing the target information.
2. The method of claim 1, wherein the sharing rule comprises a preset interception rule;
the processing the target information according to the sharing rule includes:
and under the condition that the target information meets the preset interception rule, forbidding sending the target information.
3. The method according to claim 2, wherein the preset interception rule comprises at least one of a preset time interception rule and a preset keyword interception rule; the preset time interception rule comprises a first time range for forbidding the target object to share the target information and/or a second time range for allowing the target object to share the target information; the preset keyword intercepting rule comprises keywords forbidden to be shared with the target object;
under the condition that the preset interception rule includes the preset time interception rule, and under the condition that the target information meets the preset interception rule, prohibiting sending the target information includes:
under the condition that the target information is judged not to be allowed to be shared to the target object according to the first time range and/or the second time range, the target information is forbidden to be sent;
under the condition that the preset interception rule comprises the preset keyword interception rule, and under the condition that the target information meets the preset interception rule, forbidding to send the target information comprises the following steps:
judging whether the target information comprises the keyword or not;
and if the target information comprises the keyword, forbidding sending the target information.
4. The method according to claim 1, wherein after sending the revocation prompt message to the predetermined buddy, the method further comprises:
in a case where it is detected that the target information has been revoked, notification information indicating that the target information has been revoked is displayed.
5. A terminal, comprising:
the receiving module is used for receiving first input of a user for sharing target information to a target object;
an obtaining module, configured to obtain, in response to the first input, a sharing rule for the target object;
the processing module is used for processing the target information according to the sharing rule;
the sharing rule comprises a preset privacy rule, and the preset privacy rule comprises at least one preset privacy keyword;
the processing module is used for executing privacy operation under the condition that the target information contains the preset privacy keywords;
the processing module is configured to perform at least one of the following privacy operations:
encrypting the target information, and sharing the encrypted target information to the target object; the encryption processing includes at least one of mosaic processing, out-of-order processing, obfuscation processing, and encoding processing;
sharing a plurality of preset information to the target object under the condition that the target information is shared to the target object;
the processing module is further configured to perform the following privacy operations:
generating withdrawal prompt information for prompting withdrawal of the target information in a case where the target information has been shared to the target object;
the processing module is used for sending the withdrawal prompt information to a preset friend, and the preset friend has the authority of withdrawing the target information.
6. The terminal according to claim 5, wherein the sharing rule comprises a preset interception rule;
the processing module is used for forbidding sending the target information under the condition that the target information meets the preset interception rule.
7. The terminal according to claim 6, wherein the preset interception rule comprises at least one of a preset time interception rule and a preset keyword interception rule; the preset time interception rule comprises a first time range for forbidding the target object to share the target information and/or a second time range for allowing the target object to share the target information; the preset keyword intercepting rule comprises keywords forbidden to be shared with the target object;
the processing module is configured to prohibit sending of the target information when the preset interception rule includes the preset time interception rule and it is determined that the target information is not allowed to be shared to the target object according to the first time range and/or the second time range;
the processing module is used for judging whether the target information comprises the keyword or not under the condition that the preset interception rule comprises the preset keyword interception rule; and if the target information comprises the keyword, forbidding sending the target information.
8. The terminal of claim 5, wherein the processing module is further configured to display a notification message indicating that the target information is revoked, if it is detected that the target information has been revoked.
9. A terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the information sharing method according to any one of claims 1 to 4.
CN201910324178.4A 2019-04-22 2019-04-22 Information sharing method and terminal Active CN110035183B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910324178.4A CN110035183B (en) 2019-04-22 2019-04-22 Information sharing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910324178.4A CN110035183B (en) 2019-04-22 2019-04-22 Information sharing method and terminal

Publications (2)

Publication Number Publication Date
CN110035183A CN110035183A (en) 2019-07-19
CN110035183B true CN110035183B (en) 2021-10-12

Family

ID=67239711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910324178.4A Active CN110035183B (en) 2019-04-22 2019-04-22 Information sharing method and terminal

Country Status (1)

Country Link
CN (1) CN110035183B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752893A (en) * 2019-10-16 2020-10-09 北京京东尚科信息技术有限公司 Data sharing method and device, storage medium and computer system
CN111510557B (en) * 2020-04-14 2022-03-29 维沃移动通信有限公司 Content processing method and electronic equipment
CN112527533A (en) * 2020-12-24 2021-03-19 网易(杭州)网络有限公司 Method and device for processing publication information and electronic terminal
CN113840035B (en) * 2021-09-28 2023-03-21 维沃移动通信(杭州)有限公司 Information sharing method and device, electronic equipment and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106527929A (en) * 2016-10-31 2017-03-22 宇龙计算机通信科技(深圳)有限公司 Picture information hiding method and apparatus
CN109547330A (en) * 2018-11-20 2019-03-29 维沃移动通信有限公司 A kind of information sharing method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013084563A1 (en) * 2011-12-05 2013-06-13 インターナショナル・ビジネス・マシーンズ・コーポレーション Privacy information management device, method and program
CN105991670B (en) * 2015-01-28 2020-02-14 中兴通讯股份有限公司 Data sharing method, data sharing device and terminal
CN105630855B (en) * 2015-04-24 2019-06-11 宇龙计算机通信科技(深圳)有限公司 File sharing method, shared file system and terminal
US9996705B2 (en) * 2015-07-14 2018-06-12 International Business Machines Corporation Determining potential sharing of private data associated with a private network domain to improve data security
CN105681166B (en) * 2016-01-27 2019-01-18 网易传媒科技(北京)有限公司 A kind of information sharing method and device
CN108846295B (en) * 2018-07-11 2022-03-25 北京达佳互联信息技术有限公司 Sensitive information filtering method and device, computer equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106527929A (en) * 2016-10-31 2017-03-22 宇龙计算机通信科技(深圳)有限公司 Picture information hiding method and apparatus
CN109547330A (en) * 2018-11-20 2019-03-29 维沃移动通信有限公司 A kind of information sharing method and device

Also Published As

Publication number Publication date
CN110035183A (en) 2019-07-19

Similar Documents

Publication Publication Date Title
CN110035183B (en) Information sharing method and terminal
CN108510022B (en) Two-dimensional code generation and verification method and server
CN109194818B (en) Information processing method and terminal
CN108595946B (en) Privacy protection method and terminal
CN110188524B (en) Information encryption method, information decryption method and terminal
CN109145552B (en) Information encryption method and terminal equipment
CN108629171B (en) Unread message processing method and terminal
CN109753350B (en) Resource management method and terminal equipment
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN110851031A (en) Display control method and electronic equipment
CN110149628B (en) Information processing method and terminal equipment
CN108710806B (en) Terminal unlocking method and mobile terminal
CN111597540B (en) Login method of application program, electronic device and readable storage medium
CN110990849A (en) Encryption and decryption method for private data and terminal
CN111027107B (en) Object display control method and electronic equipment
CN110210206B (en) Authority management method and terminal
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN109815679B (en) Authority management method and mobile terminal
CN110990850A (en) Authority management method and electronic equipment
CN108540645B (en) Mobile terminal operation method and mobile terminal
CN110781488B (en) Password prompting method and terminal equipment
CN110795746B (en) Information processing method and electronic equipment
CN111125680A (en) Permission setting method and terminal equipment
CN109446794B (en) Password input method and mobile terminal thereof
CN111310250A (en) Application sharing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant