CN110113321A - A kind of information sharing method, device, storage medium and computer equipment - Google Patents

A kind of information sharing method, device, storage medium and computer equipment Download PDF

Info

Publication number
CN110113321A
CN110113321A CN201910313152.XA CN201910313152A CN110113321A CN 110113321 A CN110113321 A CN 110113321A CN 201910313152 A CN201910313152 A CN 201910313152A CN 110113321 A CN110113321 A CN 110113321A
Authority
CN
China
Prior art keywords
information
combined
combination
application
sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910313152.XA
Other languages
Chinese (zh)
Other versions
CN110113321B (en
Inventor
马良
卢强
林庆杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910313152.XA priority Critical patent/CN110113321B/en
Publication of CN110113321A publication Critical patent/CN110113321A/en
Application granted granted Critical
Publication of CN110113321B publication Critical patent/CN110113321B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72427User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting games or graphical animations

Abstract

The embodiment of the invention discloses a kind of information sharing method, device, storage medium and computer equipments;This method receives female information initiated using neutron application and shares instruction, wherein, son application operates in female application, share multiple objects to be shared in the female application of instruction display according to information, it obtains user and shares object from wait share the target selected in object, the relationship chain information that target shares object is combined with authentication information, information after being combined, the service chaining information of son application is generated based on information after combination, service chaining information includes information after combination, shares object to target and shares service chaining information.The safety of information sharing can be improved in the program.

Description

A kind of information sharing method, device, storage medium and computer equipment
Technical field
This application involves field of computer technology, and in particular to a kind of information sharing method, device, storage medium and calculating Machine equipment.
Background technique
User needs to carry out information using the relationship chain information of female application authorization when carrying out information sharing using son application Sharing, due to needed during information is shared by relation chain authorizing information to son using it is possible that relation chain The illegal situation such as information leakage, theft, the safety for causing user to carry out information sharing in sub- application are poor.
Summary of the invention
The embodiment of the present application provides a kind of information sharing method, device, storage medium and computer equipment, and letter can be improved Cease the safety shared.
The embodiment of the present application provides a kind of information sharing method, comprising:
It receives female information initiated using neutron application and shares instruction, wherein the son application operates in female application In;
Share multiple objects to be shared in instruction display female application according to the information;
It obtains user and shares object wait share the target selected in object from described;
The relationship chain information that the target shares object is combined with authentication information, information after being combined;
The service chaining information of the sub- application is generated based on information after the combination, the service chaining information includes institute State information after combining;
Share object to the target and shares the service chaining information.
The embodiment of the present application also provides another information sharing methods, comprising:
The relationship chain information that target shares object is obtained from terminal;
The relationship chain information is combined with authentication information, information after being combined;
Information after sending the combination to terminal, information shares object sharing letter to target after being based on combination so as to terminal Breath;
Information after the combination is encrypted, combined information after being encrypted.
Correspondingly, the embodiment of the present application also provides a kind of information sharing apparatus, comprising:
Receiving module shares instruction for receiving female information initiated using neutron application, wherein the son application operation In female application;
Display module, for sharing multiple objects to be shared in instruction display female application according to the information;
First obtains module, shares object wait share the target selected in object from described for obtaining user;
First composite module, the relationship chain information for the target to be shared object are combined with authentication information, obtain Information after to combination;
Generation module, for generating the service chaining information of the sub- application, the business based on information after the combination Link information includes information after the combination;
Sharing module shares the service chaining information for sharing object to the target.
Correspondingly, the embodiment of the present application also provides another information sharing apparatus, comprising:
Second obtains module, for obtaining the relationship chain information that target shares object from terminal;
Second composite module, for the relationship chain information to be combined with authentication information, information after being combined;
Sending module, for information after sending the combination to terminal, information is divided to target after being based on combination so as to terminal Enjoy object sharing information;
Encrypting module, for being encrypted to information after the combination, combined information after being encrypted.
Correspondingly, the embodiment of the present application also provides a kind of storage medium, the storage medium is stored with instruction, described instruction The step of information sharing method of any offer of the embodiment of the present application is provided when being executed by processor.
Correspondingly, the embodiment of the present application also provides a kind of computer equipment, the computer equipment includes processor and deposits Reservoir, the memory are stored with a plurality of instruction, and the processor loads instruction from the memory, to execute the application reality The step of information sharing method of any offer of example is provided.
The embodiment of the present application receives female information initiated using neutron application and shares instruction, wherein son application operates in mother In, multiple objects to be shared in the female application of instruction display are shared according to information, user is obtained and is selected from wait share in object The target selected shares object, the relationship chain information that target shares object is combined with authentication information, information after being combined, The service chaining information of son application is generated based on information after combination, service chaining information includes information after combination, is shared to target Object shares service chaining information.The safety of information sharing can be improved in the program.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the schematic diagram of a scenario of information sharing system provided by the embodiments of the present application;
Fig. 2 is the first pass schematic diagram of information sharing method provided by the embodiments of the present application;
Fig. 3 is the second procedure schematic diagram of information sharing method provided by the embodiments of the present application;
Fig. 4 is the third flow diagram of information sharing method provided by the embodiments of the present application;
Fig. 5 is first interface schematic diagram of sharing terminal provided by the embodiments of the present application;
Fig. 6 is sharing terminal second contact surface schematic diagram provided by the embodiments of the present application;
Fig. 7 is sharing terminal third interface schematic diagram provided by the embodiments of the present application;
Fig. 8 is the 4th interface schematic diagram of sharing terminal provided by the embodiments of the present application;
Fig. 9 is provided by the embodiments of the present application by the first interface schematic diagram of sharing terminal;
Figure 10 is provided by the embodiments of the present application by sharing terminal second contact surface schematic diagram;
Figure 11 is provided by the embodiments of the present application by sharing terminal third interface schematic diagram;
Figure 12 is provided by the embodiments of the present application by the 4th interface schematic diagram of sharing terminal;
Figure 13 is the flow diagram of information sharing system provided by the embodiments of the present application;
Figure 14 is the flow diagram provided by the embodiments of the present application for sharing client information sharing method;
Figure 15 is the flow diagram provided by the embodiments of the present application by sharing client information sharing method;
Figure 16 is the first structural schematic diagram of information sharing method provided by the embodiments of the present application;
Figure 17 is second of structural schematic diagram of information sharing method provided by the embodiments of the present application;
Figure 18 is the third structural schematic diagram of information sharing method provided by the embodiments of the present application;
Figure 19 is the structural schematic diagram of computer equipment provided by the embodiments of the present application.
Specific embodiment
Schema is please referred to, wherein identical component symbol represents identical component, the principle of the application is to implement one It is illustrated in computing environment appropriate.The following description be based on illustrated by the application specific embodiment, should not be by It is considered as limitation the application other specific embodiments not detailed herein.
In the following description, the specific embodiment of the application will refer to the step as performed by one or multi-section computer And symbol illustrates, unless otherwise stating clearly.Therefore, these steps and operation will have to mention for several times is executed by computer, this paper institute The computer execution of finger includes by representing with the computer processing unit of the electronic signal of the data in a structuring pattern Operation.This operation is converted at the data or the position being maintained in the memory system of the computer, reconfigurable Or in addition change the running of the computer in mode known to the tester of this field.The maintained data structure of the data For the provider location of the memory, there is the specific feature as defined in the data format.But the application principle is with above-mentioned text Word illustrates that be not represented as a kind of limitation, this field tester will appreciate that plurality of step and behaviour as described below Also it may be implemented in hardware.
Term as used herein " module " can see the software object executed in the arithmetic system as.It is as described herein Different components, module, engine and service can see the objective for implementation in the arithmetic system as.And device as described herein and side Method is preferably implemented in the form of software, can also be implemented on hardware certainly, within the application protection scope.
The embodiment of the present application provides a kind of information sharing method, device, storage medium and computer equipment.
The embodiment of the present application provides a kind of information sharing system, which may include provided by the embodiment of the present application Any first information sharing apparatus and any the second information sharing apparatus suitable for server suitable for terminal. Wherein, first information sharing apparatus can integrate in the terminal, the terminal can for mobile phone, tablet computer, wearable device etc., Second information sharing apparatus can integrate in the server.
For example, the embodiment of the present application provides a kind of information sharing system, which includes: terminal and service Device passes through network connection between terminal and server, wherein can also include router, gateway etc. network entity in network.
As described in Figure 1, when needing sharing information, terminal can receive female information sharing initiated using neutron application and refer to It enables, wherein son application operates in female application, shares multiple objects to be shared in the female application of instruction display according to information, obtains Take family and share object from wait share the target that selects in object, by target share object relationship chain information and authentication information into Row combination, information after being combined generate the service chaining information of son application based on information after combination, and service chaining information includes Information after combination shares object to target and shares service chaining information.
The present embodiment will be described from the angle of first information sharing apparatus, which specifically can be with It integrates in the terminal, which can be mobile phone, tablet computer, wearable device etc..
As shown in Fig. 2, providing a kind of information sharing method, it is suitable for terminal, detailed process can be such that
201, it receives female information initiated using neutron application and shares instruction.
Wherein, female application can be the native applications program of carrying subapplication, can directly run on operating system In.For example, female application can be social application program, mail applications, game application etc., wherein social application program It may include instant messaging application, SNS (Social Network Service, social network sites) application or live streaming application etc. Deng.
Wherein, son application can provide the application program realized in environment to operate in female application program.Son application can be with For social application program, document management application program, mail applications or game application etc..Mother's application specifically may be used Think wechat program (WeChat), corresponding son application is specifically as follows small routine, small routine of such as doing shopping, game small routine, clothes Business small routine etc..Small routine can be the mobile terminal application program operated on content interaction platform, be based on certain programmed language Speech exploitation is completed, and without downloading and installation.
In one embodiment, son application can also be the business service account in some application, such as the industry in female application Be engaged in service account, for example instant messaging application in public platform.
In addition, in some embodiments, son application can also be webpage, such as game webpage, shopping webpage.
That is, the application of neutron of the embodiment of the present invention can be the shapes such as application program (APP), webpage, public platform, small routine Formula.
In practical applications, the user for sharing terminal can open son application by mother's application, enterprising in sub- application interface Row sharing operation, son application can carry out the transmission that information shares instruction according to the sharing operation of user.For example, when needing to touch When photos and sending messages share instruction, interface setting information can be shared in the information of sub- application and share control, user can be answered by mother With son application is entered, the information in antithetical phrase application is shared control and is operated, and shares instruction to trigger information.At this point, sharing eventually End will share instruction to the information and receive.Wherein, information share control the form of expression can there are many, for example, pressing Button, input frame, icon etc..
For example, as shown in Figure 5 and Figure 6, user can enter son application by mother's application, and son applies main boundary when the user clicks When " multiplayer " icon in face, son application can show that information shares interface according to the clicking operation, which shares Interface may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation good friend " icon) etc..When user's point When hitting " inviting good friend " icon at information sharing interface, information can be triggered and share instruction.At this point, terminal can be to the information Share instruction to be received.
202, share multiple objects to be shared in the female application of instruction display according to information.
In practical applications, terminal can share multiple to be shared objects of the instruction display from mother's application according to information. For example, as shown in fig. 7, triggering information when information shares " inviting good friend " icon at interface in son application when the user clicks Share instruction.Terminal can be shared according to the information to be instructed, and is shown Object Selection interface, be may include in the Object Selection interface Multiple objects to be shared, being somebody's turn to do object to be shared can come from the friend information of terminal user, group chat in female application, such as female application Information etc..User can by selecting multiple objects to be shared, such as select " XXX group chat ", so that it is determined that go out need into The target that row information is shared shares object.
In one embodiment, in order to improve information sharing safety, terminal can with antithetical phrase apply sharing permission into Row verification, to guarantee not can be carried out information sharing operation without the son application for sharing permission.Specifically, step is " according to described Information shares multiple objects to be shared in instruction display female application ", may include:
Verify the sharing permission that the son application has;
When the son application has the sharing permission, instruction is shared according to the information and obtains affiliated partner data;
Multiple objects to be shared in female application are shown according to the affiliated partner data.
In practical applications, for example, when user is by the sharing interface of the female application of son application calling, to carry out information sharing When operation, terminal can be verified the sharing permission of the sub- application, if son application has, when sharing permission, terminal can Affiliated partner data are obtained to share instruction according to information, and according to the affiliated partner data pull-up Object Selection interface, display Multiple objects to be shared in mother's application, so that user carries out the selection that target shares object;Divide if son application does not have When enjoying permission, no interface can be returned and call authority information, and the sharing process of Stop message, can also be shared according to information and be referred to Display lack of competence is enabled to carry out the message of information sharing.
203, it obtains user and shares object from wait share the target selected in object.
In practical applications, for example, as shown in fig. 7, user can such as click " XXX groups by clicking Object Selection interface Merely ", determine that target shares object in object wait share from multiple.The target shares the good friend that object can be user, can also Think the group chat etc. where user.
In one embodiment, after user determines that target shares object, information sharing interface, which can accordingly pop up, " to be started to swim Play " icon, the user for sharing terminal can be by clicking the icon, and triggering starts the instruction of game, and son application can be according to this The instruction for starting game starts game.
204, target is shared into the relationship chain information of object and authentication information is combined, information after being combined.
Wherein, relationship chain information can be shared for what the target sharing object acquisition that terminal is selected according to user arrived with target The relevant relationship chain information of object, for example, the relationship chain information may include multiple relation chain sub-informations, such as user information is opened Originator game information, social group information etc..For example, the relationship chain information may include when group is using being game small routine Share the user information of terminal, target share object user information or group information, female application wait share in object Play user information or the group information etc. of the game object.
Wherein, authentication information can be the reference informations such as standard information, the authority information of server setting, for example, the mirror Weighing information may include multiple authentication sub-informations, such as the backstage standard time, gaming jurisdiction information, developer's authority information, share Effective information etc..For example, the backstage standard time can be the background server customized standard time, answered with unified content interaction Time in.Authority information can be the authorized operation information that can be executed or available data information etc..
Wherein, information can be the identification information for including relationship chain information after combination, for example, information can be packet after combination Include the identification code etc. of relationship chain information.
Since the exposure of user's true relation chain information can have an impact the information security of user, it can pass through True relationship chain information is encrypted, information after being combined, so that information and relation chain letter after the combination shared away Breath isolation, so that the relationship chain information of protection is not leaked, has ensured the information security of user.
In practical applications, when determine target share object when, can to target share object relationship chain information and Authentication information is combined, information after being combined, for example, relationship chain information may include multiple relation chain sub-informations, authentication Information may include multiple authentication sub-informations, can be combined, obtain to multiple relation chain sub-informations and multiple authentication sub-informations Information after to combination, can be in order to the sharing that terminal carries out identification code, and the relationship chain information of making is able to be encrypted, thus The true relationship chain information of user will not be exposed, the safety of information sharing is improved.
It in one embodiment, can also be by preset rules to relationship chain information in order to promote the safety that information is shared It is encrypted, to avoid the leakage of information, specifically, the target " is shared the relationship chain information of object and authentication is believed by step Breath is combined, information after being combined ", may include:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained Information after to combination.
In practical applications, after determining that target shares object, the corresponding relation chain of object acquisition can be shared according to target Information and authentication information carry out multiple relation chain sub-informations and multiple authentication sub-informations according to the information field place at place Arrangement, such as puts in order according to the information position of backstage standard time, user information ... and carries out information arrangement.Later according to information Position puts in order, and multiple relation chain sub-informations and multiple authentication sub-informations are combined, the combination of identification code form is obtained Information afterwards.
It in one embodiment, can also be at any time to relationship chain information and mirror in order to protect the true relationship chain information of user The rule of combination of power information carries out replacement adjustment, to adjust the encryption method of relationship chain information, to prevent information leakage.Than Such as, the type of relation chain sub-information and authentication sub-information can also be adjusted, to the row of relationship chain information and authentication information Column rule of combination is adjusted etc..
In one embodiment, the encrypting step of the relationship chain information can also be carried out by background server, specifically, step " being combined the relationship chain information that the target shares object with authentication information, information after being combined " may include:
Obtain the relationship chain information that the target shares object;
Combination request is sent to server, the combination request carries the relationship chain information to be encrypted, the combination Request is used to indicate server and is combined the relationship chain information with authentication information, information after being combined;
Information after the combination that reception server is sent.
In practical applications, after determining that target shares object, terminal can share object acquisition according to target and close accordingly Tethers information sends combination request to background server, and combination request includes relationship chain information to be encrypted, passes through the combination Request instruction background server is combined encryption to relationship chain information.Background server can be believed according to the relation chain got Breath, in conjunction with authentication information, the relationship chain information is combined with authentication information, information after being combined, and by the combination Information is sent to terminal afterwards, so that terminal shares information after the combination.
205, the service chaining information of son application is generated based on information after combination.
In practical applications, terminal is got after combination after information, and the industry of son application can be generated according to information after combination Business link information, for example, as shown in figure 8, terminal can generate the industry of son application by Information encapsulation after combination into service chaining Business link information, the service chaining information may include information etc. after terminal is logined the link information of sub- application and combined Deng.
206, share object to target and share service chaining information.
In practical applications, after terminal generates the service chaining information that son is applied, service chaining information can be shared with Target shares object.As shown in figure 9, target shares object after sharing terminal shares object sharing service chaining information to target Corresponding will be received by sharing terminal carries the service chaining information that link information is logined in son application.
Since the exposure of user's true relation chain information can have an impact the information security of user, it can pass through True relationship chain information is encrypted, encrypted information is obtained, so that developer only can be from encrypted information Judge game logic carry out necessary to information, such as sharing terminal with shared whether terminal comes from the same group, without The true relationship chain information of user can be obtained, to ensure the information security of user.
In one embodiment, in order to ensure the information security of user, the true relation chain information of user is protected to be not exposed, Secondary encryption can also be carried out to relationship chain information, specifically, step " share object and share the service chaining by Xiang Suoshu target After information ", can also include:
Information after the combination is encrypted, combined information after being encrypted, and in the exploitation server of sub- application Pass combined information after the encryption.
In practical applications, terminal can encrypt information after combination, combined information after being encrypted, and this is added Combined information is uploaded to the exploitation server of sub- application after close, so that developer can pass through group after exploitation server acquisition encryption Information is closed, and necessary game logic information is obtained according to combined information after encryption.
In one embodiment, the step of encrypting to information after combination, specifically, step can also be carried out by storage server " information after the combination is encrypted, combined information after being encrypted, and upload described add to the exploitation server of sub- application After combined information after close ", can also include:
CIPHERING REQUEST is sent to storage server, the CIPHERING REQUEST carries information after the combination, so as to storage service Device encrypts information after the combination, and combined information after encryption is sent to the exploitation server of sub- application.
In practical applications, terminal can send the CIPHERING REQUEST of information after carrying combination, storage clothes to storage server Business device can encrypt information after combination according to the CIPHERING REQUEST, generate combined information after encryption, and will combine after encryption Information is sent to the exploitation server of sub- application.For example, information after combination can be returned to this middle layer of public library by terminal, Public library carries out conversion map to information after combination again, to be combined the encryption of rear information, and combined information after encryption is returned Back to exploitation server.
In one embodiment, information after combination can also be encrypted by preset encryption method, specifically, step " encrypting to information after the combination, combined information after being encrypted " may include:
Information after the combination is transformed into hash output information;
It is closed based on crypto map set, Mapping and Converting, combined information after being encrypted, institute is carried out to the hash output information Crypto map set is stated to close including the relationship after the hash output information and the encryption between combined information.
In practical applications, information after combination can be transformed by hash output information based on hashing algorithm, then passed through The corresponding crypto map set of Encryption Algorithm is closed, and hash output information is carried out Mapping and Converting, combined information after being encrypted.One In embodiment, information after combination is encrypted for example, can use the Encryption Algorithm such as MD5, Base64, SHA.
Wherein, MD5 (Message-Digest Algorithm, Message Digest 5) is a kind of Cryptographic Hash Function, can With by producing one 128 hashed values, to ensure the complete consistent of information transmission.MD5 can be used as a kind of information and add Decryption method.
Wherein, the process from binary system to character may be implemented in Base64, indicated based on 64 printable characters two into Data processed.Base64 can be used as a kind of information ciphering method.
Wherein, SHA (Secure Hash Algorithm, secure hash algorithm) is a kind of Cryptographic Hash Function, Neng Gouji Calculate the regular length character string arrived corresponding to a digital massage.SHA can be used as a kind of information ciphering method.
In one embodiment, for example, terminal is got after combination after information, information after combination can also be sent to public In library, public library can use the Encryption Algorithm such as MD5, Base64, SHA and encrypt to information after combination, group after being encrypted Close information.
In one embodiment, exploitation server is got after the encryption from multiple terminals after combined information, developer Combined information after encryption can be obtained by exploitation server, and judge whether multiple terminals come from the same group, so After can carry out corresponding game logic, or develop the game with social attribute accordingly, carry out ranking list in gaming The playing methods such as ranking, to enhance the social interest of game.
In one embodiment, in order not to exposure the true relationship chain information of user, can also by public library to combination after The method that information is encrypted is adjusted, to prevent information leakage.
In one embodiment, as shown in Figure 10, target sharing object is corresponding can receive by sharing terminal to carrying Using the service chaining information for logining link information, by the corresponding user of sharing terminal can by click-to-call service link information into Enter waiting for the start interface, which may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation Good friend " icon) etc..As is illustrated by figs. 11 and 12, after the user for sharing terminal clicks " starting game " button, waiting is opened The participant in game of beginning interface display can carry out game, and ranking list can also be shown after game over.
From the foregoing, it will be observed that the embodiment of the present application, which can receive female information initiated using neutron application, shares instruction, wherein son Using operating in female application, multiple objects to be shared in the female application of instruction display are shared according to information, obtain user to Share the target selected in object and share object, the relationship chain information that target shares object is combined with authentication information, is obtained Information after to combination, the service chaining information of son application is generated based on information after combination, and service chaining information includes believing after combining Breath shares object to target and shares service chaining information.The program can be by way of front end and backstage double control, to pass Tethers information is encrypted, so that the information shared away is isolated with the true relationship chain information of user, thus developer May determine that share terminal with shared on the basis of whether terminal come from the same group, and do not expose the true relation chain of user Information, while passing through the dual control of front end and backstage, control ability is enhanced, the safety of information sharing is improved.
In an embodiment, will be described from the second information sharing apparatus angle, which specifically may be used To integrate in the server.
As shown in figure 3, providing a kind of information sharing method, it is suitable for server, detailed process can be such that
301, the relationship chain information that target shares object is obtained from terminal.
In practical applications, server can obtain the relationship chain information that target shares object, such as background service from terminal Device can obtain the relationship chain information that target shares object from terminal.
302, relationship chain information and authentication information are combined, information after being combined.
In practical applications, after determining that target shares object, terminal can share object acquisition according to target and close accordingly Tethers information, and the relationship chain information is sent to background server, so that background server is combined relationship chain information Encryption.Background server can be according to the relationship chain information got, in conjunction with authentication information, by relation chain sub-information and authentication Information is arranged according to corresponding information field place, and is put in order according to information position, by the relation chain of presetting digit capacity Sub-information is combined with authentication sub-information, information after being combined.
It in one embodiment, can also be by preset rules to relationship chain information in order to promote the safety that information is shared It is encrypted, to avoid the leakage of information, specifically, relationship chain information " is combined with authentication information, is combined by step Information afterwards " may include:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained Information after to combination.
In practical applications, after determining that target shares object, the corresponding relation chain of object acquisition can be shared according to target Information and authentication information carry out multiple relation chain sub-informations and multiple authentication sub-informations according to the information field place at place Arrangement, such as puts in order according to the information position of backstage standard time, user information ... and carries out information arrangement.Later according to information Position puts in order, and multiple relation chain sub-informations and multiple authentication sub-informations are combined, the combination of identification code form is obtained Information afterwards.
It in one embodiment, can also be at any time to relationship chain information and mirror in order to protect the true relationship chain information of user The rule of combination of power information carries out replacement adjustment, to adjust the encryption method of relationship chain information, to prevent information leakage.Than Such as, the type of relation chain sub-information and authentication sub-information can also be adjusted, to the row of relationship chain information and authentication information Column rule of combination is adjusted etc..
303, information after sending combination to terminal, information shares letter to target sharing object after being based on combination so as to terminal Breath.
In practical applications, it after background server is combined relationship chain information and authentication information, can also will combine Information is sent to terminal afterwards, so that information is shared after combination of terminal pairs.
It in one embodiment, can also be to acquisition of information after the combination for sharing terminal in order to ensure the information security of user Permission is verified, prevent after not combining acquisition of information permission sharing terminal from get combination after information, specifically, Step " information after sending the combination to terminal " may include:
Acquisition of information permission after the combination of verification terminal;
After the terminal has the combination when acquisition of information permission, information after sending the combination to terminal.
In practical applications, after background server, which generates, to be combined after information, can believe after the combination to sharing terminal Breath acquisition permission is verified, and after sharing terminal to have combination when acquisition of information permission, background server can be whole to sharing End sends information after combination, carries out information sharing to share information after terminal is based on combination, shares object to target and send packet Include the service chaining information of information after combining;After sharing terminal and not having combination when acquisition of information permission, background server can With the step of sending without information after combination, sharing terminal and can sharing object transmission to target does not include information after combination Service chaining information.
304, information after combination is encrypted, combined information after being encrypted.
In practical applications, terminal can send the CIPHERING REQUEST of information after carrying combination, storage clothes to storage server Business device can encrypt information after combination according to the CIPHERING REQUEST, generate combined information after encryption.For example, terminal can be with Information after combination is returned into this middle layer of public library, public library carries out conversion map to information after combination again, to carry out group The encryption of information after conjunction.
In one embodiment, it can also be taken to the exploitation of sub- application after combined information after storage server generation encryption Business device uploads combined information after encryption.
In one embodiment, in order not to which the true relation chain information of user is exposed to developer, relation chain can be believed Breath is encrypted twice, to prevent relation chain information leakage.Background server can be combined relationship chain information first Transformation, information after being combined complete the encryption of first time information.Public library can carry out information after combination converting and reflect later It penetrates, combined information after being encrypted, completes the encryption of second of information.Therefore, it by the combination of front end and backstage, is supplied to outer The encrypted relationship chain information in portion allows developer that can judge that terminal is without the true relationship chain information of exposure It is no to come from the same group, and while carry out game logic, the true relationship chain information of user cannot be got, to promote letter Cease the safety shared.
In one embodiment, it can also be controlled by the dual permission that front end and backstage carry out, improve the peace that information is shared Quan Xing.For example, background server can verify acquisition of information permission after the combination for sharing terminal, to decide whether group Information is sent to sharing terminal after conjunction.Public library can also the acquisition permission to exploitation server verify, to decide whether Combined information after encryption is sent to exploitation server, so that developer checks.
In one embodiment, it in the case that when backstage, rule starts a leak, can also be advised by adjusting the encryption of public library Then, upgrading terminals version or close associated rights come emergent stopping information sharing, thus improving information safety.
In one embodiment, in order to ensure the information security of user, exploitation server can also be obtained in front end The verification of permission, for the exploitation server of combined information after no acquisition authority acquiring encryption, public library can be without adding The transmission of combined information after close, i.e. developer combine letter after cannot getting encryption by no exploitation server for obtaining permission Breath.Specifically, after step " being encrypted to information after the combination, combined information after being encrypted ", can also include:
Acquisition permission of the exploitation server of syndrome application for combined information after the encryption;
When the exploitation server has the acquisition permission, Xiang Suoshu exploitation server combines after uploading the encryption Information.
It in practical applications, can be right after public library encrypts information after combination after combined information The acquisition permission of exploitation server is verified, with verify exploitation server whether can obtain encryption after combined information.When opening When sending out server has acquisition permission, show that combined information after the available encryption of the exploitation server, public library can will add Combined information is uploaded to exploitation server after close, so that developer looks into combined information after encryption by exploitation server It sees, and carries out game logic;When exploitation server, which does not have, obtains permission, after showing that the exploitation server does not obtain encryption The permission of combined information can only return to interface call result.
From the foregoing, it will be observed that the embodiment of the present application can obtain the relationship chain information that target shares object from terminal, by relation chain Information is combined with authentication information, information after being combined, information after sending combination to terminal, after being based on combination so as to terminal Information shares object sharing information to target, encrypts to information after combination, combined information after being encrypted.The program can be with By way of front end and backstage double control, relationship chain information is encrypted, so that the information and use shared away Family true relationship chain information isolation, thus developer may determine that share terminal with shared whether terminal comes from the same group On the basis of, and the true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, enhance control Ability improves the safety of information sharing.
Citing, is described in further detail by the method according to described in above-described embodiment below.
Referring to Figure 13, a kind of information sharing system is provided, which includes: to share terminal, shared eventually End and server, wherein include router, gateway etc. network in network by being connected to the network between terminal and server Entity does not illustrate in figure.
Referring to Fig. 4, the detailed process of the information sharing method can be such that
401, share the female information sharing instruction initiated using neutron application of terminal reception.
For example, the user for sharing terminal can enter son application by mother's application, as shown in figure 5, son is answered when the user clicks When with " multiplayer " icon of main interface, son application can show that information shares interface, the letter according to the clicking operation It may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation good friend " icon) etc. that breath, which shares interface,.Such as Shown in Fig. 6, when information shares " inviting good friend " icon at interface when the user clicks, information can be triggered and share instruction.This When, information sharing instruction can be received by sharing terminal.
402, share terminal and share the multiple objects to be shared instructed in the female application of display according to information.
For example, as shown in fig. 7, when the user's click information for sharing terminal shares " inviting good friend " icon at interface When, triggering information shares instruction.Instruction can be shared according to the information by sharing terminal, show Object Selection interface, object choosing Selecting in interface may include multiple objects to be shared, should object be shared share terminal in female application, such as female application and use Friend information, the group chat information at family etc..
In one embodiment, for example, in order to improve information sharing safety, can with antithetical phrase apply sharing permission into Row verification guarantees not can be carried out information sharing operation without the son application for sharing permission.As shown in figure 14, when user is answered by son With the sharing interface for calling female application, when carrying out information sharing operation, sharing terminal can be to the sharing permission of the sub- application It is verified, if son application has, when sharing permission, instruction pull-up Object Selection can be shared according to information by sharing terminal Interface, and show multiple objects to be shared in female application;If son application does not have sharing permission, nothing can be returned and connect Mouth calls authority information, and the sharing process of Stop message.
403, share terminal and obtain user from wait share the target selected in object sharing object.
For example, as shown in fig. 7, user can by click Object Selection interface, such as click " XXX group chat ", from it is multiple to Share and determines that target shares object in object.The target shares the good friend that object can be user, or where user Group chat etc..
404, target is shared the relationship chain information of object by background server and authentication information is combined, after obtaining combination Information.
For example, as shown in figure 14, after sharing terminal determines that target shares object, it is corresponding that the available target shares object Relationship chain information, if target shares the corresponding multiple relation chain sub-informations of object, as user information, developer's game information, Social group information etc..The relationship chain information that will acquire later is sent to background server, and background server can basis The relationship chain information and authentication information got is combined, and obtains information after the combination of identification code form.
It in one embodiment, can also be to combined ciphering side in order to protect the true relationship chain information of user not to be leaked Method is adjusted.
405, share the service chaining information that terminal generates son application based on information after combination.
For example, as shown in figure 8, information after combination can be back to sharing terminal by background server, sharing terminal can be with Information encapsulation generates the service chaining information of son application into service chaining after combining, which may include Information etc. after terminal is logined the link information of sub- application and combined.
In one embodiment, background server can also be to sharing terminal for acquisition of information after the combination of information after combination Permission is verified, to judge information after whether the sharing terminal has permission acquisition combination.As shown in figure 14, when sharing terminal tool When having acquisition of information permission after combining, information after background server can send combination to terminal is shared, to share terminal base Information carries out information sharing after combination, shares object to target and sends the service chaining information including information after combination;When point When enjoying terminal and not having acquisition of information permission after combination, the step of can sending without information after combination, sharing terminal can be with Share the service chaining information that object transmission does not include information after combination to target.
406, share terminal and share object sharing service chaining information to target.
For example, as shown in figure 9, share terminal to target share object share service chaining information after, target share object Corresponding will be received by sharing terminal carries the service chaining information that link information is logined in son application.
In one embodiment, as shown in figure 15, target share object service chaining information is received by sharing terminal after, Waiting for the start interface can be entered by click-to-call service link information by the user of sharing terminal, as shown in Figure 10, which opens Beginning interface may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation good friend " icon) etc..Such as Figure 11 With shown in Figure 12, after the user for sharing terminal clicks " start game " button, the participant in game of waiting for the start interface display Game can be carried out, ranking list can also be shown after game over.
In one embodiment, as shown in figure 15, target sharing object is corresponding gets service chaining letter by sharing terminal After breath, information after the combination in service chaining information can be detected, information after in service chaining information including combination When, information after combination can be back to by sharing terminal by this middle layer of public library, public library can by MD5, Base64, The Encryption Algorithm such as SHA carry out conversion map, combined information after being encrypted to information after combination.Public library to information after combination into After row is encrypted after combined information, combined information after the encryption can also be uploaded, to exploitation server to develop Person obtains combined information after encryption by exploitation server.When in service chaining information not including information after combination, The step of public library being back to without information after combining.
407, storage server encrypts information after the combination, combined information after being encrypted.
For example, as shown in figure 14, shares terminal and get after combination after information, information after combination can be back to public affairs This middle layer of library altogether, public library can carry out conversion to information after combination by Encryption Algorithm such as MD5, Base64, SHA and reflect It penetrates, combined information after being encrypted.
In one embodiment, in order not to exposure the true relationship chain information of user, can also by public library to combination after The algorithm that information is encrypted is adjusted, to prevent information leakage.
408, combined information after storage server uploads the encryption to the exploitation server of sub- application.
For example, as shown in figure 14, after public library encrypts information after combination after combined information, may be used also With combined information after uploading the encryption to exploitation server, so as to developer by exploitation server to combined information after encryption into Row obtains.
In one embodiment, public library can also the acquisition permission to exploitation server verify, to judge the exploitation Combined information shows the exploitation service when exploitation server, which has, obtains permission after whether server has permission acquisition encryption Combined information after the available encryption of device, combined information after encryption can be uploaded to exploitation server by public library, to develop Person can check that son application carries out game by combined information after encryption by exploitation server to combined information after encryption Logic;When exploitation server, which does not have, obtains permission, show the power of combined information after the exploitation server does not obtain encryption Limit can only return to interface call result.
In one embodiment, exploitation server is got after the encryption from multiple terminals after combined information, developer Combined information after encryption can be obtained by exploitation server, and judge whether multiple terminals come from the same group, so After can carry out corresponding game logic, or develop the game with social attribute accordingly, carry out ranking list in gaming The playing methods such as ranking, to enhance the social interest of game.For example, developer can be obtained from sharing eventually by exploitation server Combined information and the combined information after the encryption for being shared terminal after the encryption at end, and to share terminal with shared terminal and be It is no to judge from the same group, carry out corresponding game logic.
From the foregoing, it will be observed that the embodiment of the present application can be by sharing the female information sharing initiated using neutron application of terminal reception Instruction shares terminal and shares multiple objects to be shared in the female application of instruction display according to information, share terminal obtain user from Share object wait share the target selected in object, target is shared the relationship chain information and authentication information of object by background server It is combined, information after being combined, shares the service chaining information that terminal generates son application based on information after combination, share eventually It holds to target and shares object sharing service chaining information, storage server encrypts information after the combination, encrypted Combined information afterwards, combined information after storage server uploads the encryption to the exploitation server of sub- application.The program can lead to The mode for crossing front end and backstage double control encrypts relationship chain information, so that the information shared away and user True relationship chain information isolation, thus developer may determine that share terminal with whether shared terminal from the same group's On the basis of, and the true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, enhance control energy Power improves the safety of information sharing.
In order to better implement above method, the embodiment of the present application also provides a kind of information sharing apparatus, which shares Device can be adapted for terminal, as shown in figure 16, the information sharing apparatus may include: receiving module 161, display module 162, First obtains module 163, the first composite module 164, generation module 165 and sharing module 166, as follows:
Receiving module 161 shares instruction for receiving female information initiated using neutron application, wherein the sub- application It operates in female application;
Display module 162, for sharing multiple objects to be shared in instruction display female application according to the information;
First obtains module 163, shares object wait share the target selected in object from described for obtaining user;
First composite module 164, the relationship chain information for the target to be shared object are combined with authentication information, Information after being combined;
Generation module 165, for generating the service chaining information of the sub- application, the industry based on information after the combination Business link information includes information after the combination;
Sharing module 166 shares the service chaining information for sharing object to the target.
In one embodiment, as shown in figure 17, which can also include:
Encrypting module 167, for being encrypted to information after the combination, combined information after being encrypted, and Xiang Ziying Exploitation server uploads combined information after the encryption.
In one embodiment, the encrypting module 167, can be specifically used for:
Information after the combination is transformed into hash output information;
It is closed based on crypto map set, Mapping and Converting, combined information after being encrypted, institute is carried out to the hash output information Crypto map set is stated to close including the relationship after the hash output information and the encryption between combined information.
In one embodiment, the encrypting module 167, can be specifically used for:
CIPHERING REQUEST is sent to storage server, the CIPHERING REQUEST carries information after the combination, so as to storage service Device encrypts information after the combination, and combined information after encryption is sent to the exploitation server of sub- application.
In one embodiment, the display module 162, can be specifically used for:
Verify the sharing permission that the son application has;
When the son application has the sharing permission, instruction is shared according to the information and obtains affiliated partner data;
Multiple objects to be shared in female application are shown according to the affiliated partner data.
In one embodiment, first composite module 164, can be specifically used for:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained Information after to combination.
In one embodiment, first composite module 164, can be specifically used for:
Obtain the relationship chain information that the target shares object;
Combination request is sent to server, the combination request carries the relationship chain information to be encrypted, the combination Request is used to indicate server and is combined the relationship chain information with authentication information, information after being combined;
Information after the combination that reception server is sent.
From the foregoing, it will be observed that the embodiment of the present application can receive female information initiated using neutron application by receiving module 161 Share instruction, wherein son application operates in female application, shares the female application of instruction display according to information by display module 162 In multiple objects to be shared, user is obtained by the first acquisition module 163 and is shared pair from wait share the target that selects in object As the relationship chain information that target shares object being combined with authentication information by the first composite module 164, after obtaining combination Information generates the service chaining information of son application by generation module 165 based on information after combination, and service chaining information includes group Information after conjunction shares object to target by sharing module 166 and shares service chaining information.The program can be by front end with after The mode of platform double control encrypts relationship chain information, so that the information shared away and the true relationship of user Chain information isolation, thus developer may determine that share terminal with shared on the basis of whether terminal come from the same group, again The true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, control ability is enhanced, improves The safety that information is shared.
In order to better implement above method, the embodiment of the present application also provides a kind of information sharing apparatus, which shares Device can be adapted for server, and as shown in figure 18, which may include: 181, second groups of the second acquisition module Block 182, sending module 183 and encrypting module 184 are molded, as follows:
Second obtains module 181, for obtaining the relationship chain information that target shares object from terminal;
Second composite module 182 is believed after being combined for the relationship chain information to be combined with authentication information Breath;
Sending module 183, for information after sending the combination to terminal, so that terminal is based on after combination information to target Share object sharing information;
Encrypting module 184, for being encrypted to information after the combination, combined information after being encrypted.
In one embodiment, second composite module 182, can be specifically used for:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained Information after to combination.
From the foregoing, it will be observed that the embodiment of the present application, which can obtain module 181 by second, obtains target sharing object from terminal Relationship chain information is combined, information after being combined by relationship chain information by the second composite module 182 with authentication information, Information after sending combination to terminal by sending module 183, information is shared to target sharing object after being based on combination so as to terminal Information is encrypted, combined information after being encrypted by information after 184 pairs of encrypting module combinations.The program can be by preceding The mode at end and backstage double control, encrypts relationship chain information, so that the information shared away and user are true Relationship chain information isolation, thus developer may determine that share terminal with shared terminal whether the basis from the same group On, and the true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, control ability is enhanced, Improve the safety of information sharing.
The embodiment of the present application also provides a kind of computer equipment, which can set for server or terminal etc. It is standby, it is integrated with any information sharing apparatus provided by the embodiment of the present application.As shown in figure 19, Figure 19 is that the application is implemented The structural schematic diagram for the computer equipment that example provides, specifically:
The computer equipment may include the processor 191, one or one of one or more than one processing core with The components such as memory 192, power supply 193 and the input unit 194 of upper computer readable storage medium.Those skilled in the art can be with Understand, computer equipment structure shown in Figure 19 does not constitute the restriction to computer equipment, may include more than illustrating Or less component, perhaps combine certain components or different component layouts.Wherein:
Processor 191 is the control centre of the computer equipment, is set using various interfaces and the entire computer of connection Standby various pieces, by running or executing the software program and/or module that are stored in memory 192, and calling storage Data in memory 192 execute the various functions and processing data of computer equipment, to carry out to computer equipment whole Body monitoring.Optionally, processor 191 may include one or more processing cores;Preferably, processor 191 can integrate at Manage device and modem processor, wherein the main processing operation system of application processor, user interface and application program etc. are adjusted Demodulation processor processed mainly handles wireless communication.It is understood that above-mentioned modem processor can not also integrate everywhere It manages in device 191.
Memory 192 can be used for storing software program and module, and processor 191 is stored in memory 192 by operation Software program and module, thereby executing various function application and data processing.Memory 192 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area can be stored to be created according to using for computer equipment Data etc..In addition, memory 192 may include high-speed random access memory, it can also include nonvolatile memory, such as At least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 192 can be with Including Memory Controller, to provide access of the processor 191 to memory 192.
Computer equipment further includes the power supply 193 powered to all parts, it is preferred that power supply 193 can pass through power supply pipe Reason system and processor 191 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.Power supply 193 can also include one or more direct current or AC power source, recharging system, power failure inspection The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
The computer equipment may also include input unit 194, which can be used for receiving the number or word of input Information is accorded with, and generates keyboard related with user setting and function control, mouse, operating stick, optics or trace ball letter Number input.
Although being not shown, computer equipment can also be including display unit etc., and details are not described herein.Specifically in the present embodiment In, the processor 191 in computer equipment can be according to following instruction, by the process pair of one or more application program The executable file answered is loaded into memory 192, and the application journey being stored in memory 192 is run by processor 191 Sequence, thus realize various functions, it is as follows:
It receives female information initiated using neutron application and shares instruction, wherein son application operates in female application, according to letter Breath shares the multiple objects to be shared instructed in the female application of display, obtains user from wait share the target selected in object sharing pair As the relationship chain information that target shares object being combined with authentication information, information after being combined, based on information after combination The service chaining information of son application is generated, service chaining information includes information after combination, shares object to target and shares business chain Connect information.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the embodiment of the present application, which can receive female information initiated using neutron application, shares instruction, wherein son Using operating in female application, multiple objects to be shared in the female application of instruction display are shared according to information, obtain user to Share the target selected in object and share object, the relationship chain information that target shares object is combined with authentication information, is obtained Information after to combination, the service chaining information of son application is generated based on information after combination, and service chaining information includes believing after combining Breath shares object to target and shares service chaining information.The program can be by way of front end and backstage double control, to pass Tethers information is encrypted, so that the information shared away is isolated with the true relationship chain information of user, thus developer May determine that share terminal with shared on the basis of whether terminal come from the same group, and do not expose the true relation chain of user Information, while passing through the dual control of front end and backstage, control ability is enhanced, the safety of information sharing is improved.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present application provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be processed Device is loaded, to execute the step in any information sharing method provided by the embodiment of the present application.For example, the instruction can To execute following steps:
It receives female information initiated using neutron application and shares instruction, wherein son application operates in female application, according to letter Breath shares the multiple objects to be shared instructed in the female application of display, obtains user from wait share the target selected in object sharing pair As the relationship chain information that target shares object being combined with authentication information, information after being combined, based on information after combination The service chaining information of son application is generated, service chaining information includes information after combination, shares object to target and shares business chain Connect information.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
Wherein, which may include: read-only memory (ROM, Read Only Memory), random access memory Body (RAM, Random Access Memory), disk or CD etc..
By the instruction stored in the storage medium, any information provided by the embodiment of the present application point can be executed The step in method is enjoyed, it is thereby achieved that achieved by any information sharing method provided by the embodiment of the present application Beneficial effect is detailed in the embodiment of front, and details are not described herein.
Above to a kind of information sharing method, device, storage medium and computer equipment provided by the embodiment of the present application It is described in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, the above reality The explanation for applying example is merely used to help understand the present processes and its core concept;Meanwhile for those skilled in the art, According to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion in this specification Hold the limitation that should not be construed as to the application.

Claims (14)

1. a kind of information sharing method characterized by comprising
It receives female information initiated using neutron application and shares instruction, wherein the son application operates in female application;
Share multiple objects to be shared in instruction display female application according to the information;
It obtains user and shares object wait share the target selected in object from described;
The relationship chain information that the target shares object is combined with authentication information, information after being combined;
The service chaining information of the sub- application is generated based on information after the combination, the service chaining information includes described group Information after conjunction;
Share object to the target and shares the service chaining information.
2. information sharing method according to claim 1, which is characterized in that Xiang Suoshu target shares object and shares the industry It is engaged in after link information, further includes:
Information after the combination is encrypted, combined information after being encrypted, and uploads institute to the exploitation server of sub- application State combined information after encrypting.
3. information sharing method according to claim 2, which is characterized in that encrypt, obtain to information after the combination Combined information after to encryption, and combined information after uploading the encryption to the exploitation server of sub- application, comprising:
CIPHERING REQUEST is sent to storage server, the CIPHERING REQUEST carries information after the combination, so as to storage server pair Information is encrypted after the combination, and combined information after encryption is sent to the exploitation server of sub- application.
4. information sharing method according to claim 1, which is characterized in that the relation chain information includes multiple relation chains Sub-information;
The relationship chain information that the target shares object is combined with authentication information, information after being combined, comprising:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, group is obtained Information after conjunction.
5. information sharing method according to claim 1, which is characterized in that believe the relation chain that the target shares object Breath is combined with authentication information, information after being combined, comprising:
Obtain the relationship chain information that the target shares object;
Combination request is sent to server, the combination request carries the relationship chain information to be encrypted, the combination request It is used to indicate server and is combined the relationship chain information with authentication information, information after being combined;
Information after the combination that reception server is sent.
6. information sharing method according to claim 1, which is characterized in that shared according to the information and instructed described in display Multiple objects to be shared in mother's application, comprising:
Verify the sharing permission that the son application has;
When the son application has the sharing permission, instruction is shared according to the information and obtains affiliated partner data;
Multiple objects to be shared in female application are shown according to the affiliated partner data.
7. information sharing method according to claim 2, which is characterized in that encrypt, obtain to information after the combination Combined information after to encryption, comprising:
Information after the combination is transformed into hash output information;
It is closed based on crypto map set, Mapping and Converting is carried out to the hash output information, combined information after being encrypted is described to add Close mapping set includes the relationship after the hash output information and the encryption between combined information.
8. a kind of information sharing method characterized by comprising
The relationship chain information that target shares object is obtained from terminal;
The relationship chain information is combined with authentication information, information after being combined;
Information after sending the combination to terminal, information shares object sharing information to target after being based on combination so as to terminal;
Information after the combination is encrypted, combined information after being encrypted.
9. information sharing method according to claim 8, which is characterized in that encrypt, obtain to information after the combination After to encryption after combined information, further includes:
Acquisition permission of the exploitation server of syndrome application for combined information after the encryption;
When the exploitation server has the acquisition permission, Xiang Suoshu exploitation server combines letter after uploading the encryption Breath.
10. information sharing method according to claim 8, which is characterized in that the relation chain information includes multiple relationships Chain sub-information;
The relationship chain information is combined with authentication information, information after being combined, comprising:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, group is obtained Information after conjunction.
11. a kind of information sharing apparatus characterized by comprising
Receiving module shares instruction for receiving female information initiated using neutron application, wherein the son application operates in institute It states in female application;
Display module, for sharing multiple objects to be shared in instruction display female application according to the information;
First obtains module, shares object wait share the target selected in object from described for obtaining user;
First composite module, the relationship chain information for the target to be shared object are combined with authentication information, obtain group Information after conjunction;
Generation module, for generating the service chaining information of the sub- application, the service chaining based on information after the combination Information includes information after the combination;
Sharing module shares the service chaining information for sharing object to the target.
12. a kind of information sharing apparatus characterized by comprising
Second obtains module, for obtaining the relationship chain information that target shares object from terminal;
Second composite module, for the relationship chain information to be combined with authentication information, information after being combined;
Sending module is shared pair so that terminal is based on after combination information to target for information after sending the combination to terminal As sharing information;
Encrypting module, for being encrypted to information after the combination, combined information after being encrypted.
13. a kind of storage medium, which is characterized in that the storage medium is stored with instruction, when described instruction is executed by processor It realizes such as the step of any one of claim 1-10 the method.
14. a kind of computer equipment, which is characterized in that including processor and memory, the memory is stored with a plurality of instruction; The processor loads instruction from the memory, to execute such as the described in any item information sharing methods of claim 1-10 In step.
CN201910313152.XA 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment Active CN110113321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910313152.XA CN110113321B (en) 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910313152.XA CN110113321B (en) 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN110113321A true CN110113321A (en) 2019-08-09
CN110113321B CN110113321B (en) 2020-11-03

Family

ID=67485794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910313152.XA Active CN110113321B (en) 2019-04-18 2019-04-18 Information sharing method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN110113321B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163398A (en) * 2020-09-30 2021-01-01 金蝶软件(中国)有限公司 Chart sharing method and related equipment thereof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5872847A (en) * 1996-07-30 1999-02-16 Itt Industries, Inc. Using trusted associations to establish trust in a computer network
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
CN104052762A (en) * 2013-03-11 2014-09-17 腾讯科技(深圳)有限公司 Data sharing method, device and system
CN104580364A (en) * 2014-12-01 2015-04-29 百度在线网络技术(北京)有限公司 Resource sharing method and device
CN104966211A (en) * 2015-06-04 2015-10-07 广州优蜜移动科技股份有限公司 Method and system for automatically identifying channel relationship
CN107102880A (en) * 2017-05-11 2017-08-29 腾讯科技(深圳)有限公司 Message treatment method, device, storage medium and computer equipment
CN108512829A (en) * 2018-02-26 2018-09-07 平安普惠企业管理有限公司 Information sharing method, device, computer equipment and storage medium
CN108809811A (en) * 2018-06-12 2018-11-13 腾讯科技(深圳)有限公司 Object sharing method and device
CN109241459A (en) * 2018-07-25 2019-01-18 五八有限公司 Content share method, device, computer equipment and computer readable storage medium
CN109600408A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Resource sharing method, device, storage medium and computer equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5872847A (en) * 1996-07-30 1999-02-16 Itt Industries, Inc. Using trusted associations to establish trust in a computer network
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
CN104052762A (en) * 2013-03-11 2014-09-17 腾讯科技(深圳)有限公司 Data sharing method, device and system
CN104580364A (en) * 2014-12-01 2015-04-29 百度在线网络技术(北京)有限公司 Resource sharing method and device
CN104966211A (en) * 2015-06-04 2015-10-07 广州优蜜移动科技股份有限公司 Method and system for automatically identifying channel relationship
CN107102880A (en) * 2017-05-11 2017-08-29 腾讯科技(深圳)有限公司 Message treatment method, device, storage medium and computer equipment
CN109600408A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Resource sharing method, device, storage medium and computer equipment
CN108512829A (en) * 2018-02-26 2018-09-07 平安普惠企业管理有限公司 Information sharing method, device, computer equipment and storage medium
CN108809811A (en) * 2018-06-12 2018-11-13 腾讯科技(深圳)有限公司 Object sharing method and device
CN109241459A (en) * 2018-07-25 2019-01-18 五八有限公司 Content share method, device, computer equipment and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163398A (en) * 2020-09-30 2021-01-01 金蝶软件(中国)有限公司 Chart sharing method and related equipment thereof

Also Published As

Publication number Publication date
CN110113321B (en) 2020-11-03

Similar Documents

Publication Publication Date Title
US11159310B2 (en) Digital security bubble
CN104520805B (en) According to the security application ecosystem with key and data exchange of company information control strategy
CN104838630B (en) Application program management based on strategy
CN103379098B (en) Content sharing method, device and network system thereof
CN108632284A (en) User data authorization method, medium, device and computing device based on block chain
CN111064757B (en) Application access method and device, electronic equipment and storage medium
BRPI0613075A2 (en) secure instant messaging
CN107078942A (en) The method and system that the messaging and content controlled by sender is shared
CN106605232A (en) Preserving data protection with policy
US20170149771A1 (en) Automated device discovery of pairing-eligible devices for authentication
CN108200089A (en) Implementation method, device, system and the storage medium of information security
CN110489946A (en) Copyright authentication method, apparatus, equipment and storage medium based on block chain
CN102902934B (en) Main frame is unknowable integrated and inter-operation system
CN109391476A (en) Internet phone-calling method, apparatus and system
CN108153420A (en) A kind of information push method, device, server and storage medium
CN110113321A (en) A kind of information sharing method, device, storage medium and computer equipment
CN109740319A (en) Digital identity verification method and server
CN109075966B (en) Communication security system and method
CN109120576A (en) Data sharing method and device, computer equipment and storage medium
JP2022504575A (en) Systems and methods for transmitting and retrieving messages using the blockchain
CN110661789B (en) Address resetting method, device, equipment and computer readable storage medium
CN108846266A (en) A kind of method, system and the communication terminal of application program operation authorization
CN115022090B (en) Data sharing method and system, electronic equipment and computer storage medium
CN111787019B (en) Information acquisition method and device based on block chain
Verschoor et al. (In-) Secure messaging with the Silent Circle instant messaging protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant