CN110113321A - A kind of information sharing method, device, storage medium and computer equipment - Google Patents
A kind of information sharing method, device, storage medium and computer equipment Download PDFInfo
- Publication number
- CN110113321A CN110113321A CN201910313152.XA CN201910313152A CN110113321A CN 110113321 A CN110113321 A CN 110113321A CN 201910313152 A CN201910313152 A CN 201910313152A CN 110113321 A CN110113321 A CN 110113321A
- Authority
- CN
- China
- Prior art keywords
- information
- combined
- combination
- application
- sharing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72427—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting games or graphical animations
Abstract
The embodiment of the invention discloses a kind of information sharing method, device, storage medium and computer equipments;This method receives female information initiated using neutron application and shares instruction, wherein, son application operates in female application, share multiple objects to be shared in the female application of instruction display according to information, it obtains user and shares object from wait share the target selected in object, the relationship chain information that target shares object is combined with authentication information, information after being combined, the service chaining information of son application is generated based on information after combination, service chaining information includes information after combination, shares object to target and shares service chaining information.The safety of information sharing can be improved in the program.
Description
Technical field
This application involves field of computer technology, and in particular to a kind of information sharing method, device, storage medium and calculating
Machine equipment.
Background technique
User needs to carry out information using the relationship chain information of female application authorization when carrying out information sharing using son application
Sharing, due to needed during information is shared by relation chain authorizing information to son using it is possible that relation chain
The illegal situation such as information leakage, theft, the safety for causing user to carry out information sharing in sub- application are poor.
Summary of the invention
The embodiment of the present application provides a kind of information sharing method, device, storage medium and computer equipment, and letter can be improved
Cease the safety shared.
The embodiment of the present application provides a kind of information sharing method, comprising:
It receives female information initiated using neutron application and shares instruction, wherein the son application operates in female application
In;
Share multiple objects to be shared in instruction display female application according to the information;
It obtains user and shares object wait share the target selected in object from described;
The relationship chain information that the target shares object is combined with authentication information, information after being combined;
The service chaining information of the sub- application is generated based on information after the combination, the service chaining information includes institute
State information after combining;
Share object to the target and shares the service chaining information.
The embodiment of the present application also provides another information sharing methods, comprising:
The relationship chain information that target shares object is obtained from terminal;
The relationship chain information is combined with authentication information, information after being combined;
Information after sending the combination to terminal, information shares object sharing letter to target after being based on combination so as to terminal
Breath;
Information after the combination is encrypted, combined information after being encrypted.
Correspondingly, the embodiment of the present application also provides a kind of information sharing apparatus, comprising:
Receiving module shares instruction for receiving female information initiated using neutron application, wherein the son application operation
In female application;
Display module, for sharing multiple objects to be shared in instruction display female application according to the information;
First obtains module, shares object wait share the target selected in object from described for obtaining user;
First composite module, the relationship chain information for the target to be shared object are combined with authentication information, obtain
Information after to combination;
Generation module, for generating the service chaining information of the sub- application, the business based on information after the combination
Link information includes information after the combination;
Sharing module shares the service chaining information for sharing object to the target.
Correspondingly, the embodiment of the present application also provides another information sharing apparatus, comprising:
Second obtains module, for obtaining the relationship chain information that target shares object from terminal;
Second composite module, for the relationship chain information to be combined with authentication information, information after being combined;
Sending module, for information after sending the combination to terminal, information is divided to target after being based on combination so as to terminal
Enjoy object sharing information;
Encrypting module, for being encrypted to information after the combination, combined information after being encrypted.
Correspondingly, the embodiment of the present application also provides a kind of storage medium, the storage medium is stored with instruction, described instruction
The step of information sharing method of any offer of the embodiment of the present application is provided when being executed by processor.
Correspondingly, the embodiment of the present application also provides a kind of computer equipment, the computer equipment includes processor and deposits
Reservoir, the memory are stored with a plurality of instruction, and the processor loads instruction from the memory, to execute the application reality
The step of information sharing method of any offer of example is provided.
The embodiment of the present application receives female information initiated using neutron application and shares instruction, wherein son application operates in mother
In, multiple objects to be shared in the female application of instruction display are shared according to information, user is obtained and is selected from wait share in object
The target selected shares object, the relationship chain information that target shares object is combined with authentication information, information after being combined,
The service chaining information of son application is generated based on information after combination, service chaining information includes information after combination, is shared to target
Object shares service chaining information.The safety of information sharing can be improved in the program.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the schematic diagram of a scenario of information sharing system provided by the embodiments of the present application;
Fig. 2 is the first pass schematic diagram of information sharing method provided by the embodiments of the present application;
Fig. 3 is the second procedure schematic diagram of information sharing method provided by the embodiments of the present application;
Fig. 4 is the third flow diagram of information sharing method provided by the embodiments of the present application;
Fig. 5 is first interface schematic diagram of sharing terminal provided by the embodiments of the present application;
Fig. 6 is sharing terminal second contact surface schematic diagram provided by the embodiments of the present application;
Fig. 7 is sharing terminal third interface schematic diagram provided by the embodiments of the present application;
Fig. 8 is the 4th interface schematic diagram of sharing terminal provided by the embodiments of the present application;
Fig. 9 is provided by the embodiments of the present application by the first interface schematic diagram of sharing terminal;
Figure 10 is provided by the embodiments of the present application by sharing terminal second contact surface schematic diagram;
Figure 11 is provided by the embodiments of the present application by sharing terminal third interface schematic diagram;
Figure 12 is provided by the embodiments of the present application by the 4th interface schematic diagram of sharing terminal;
Figure 13 is the flow diagram of information sharing system provided by the embodiments of the present application;
Figure 14 is the flow diagram provided by the embodiments of the present application for sharing client information sharing method;
Figure 15 is the flow diagram provided by the embodiments of the present application by sharing client information sharing method;
Figure 16 is the first structural schematic diagram of information sharing method provided by the embodiments of the present application;
Figure 17 is second of structural schematic diagram of information sharing method provided by the embodiments of the present application;
Figure 18 is the third structural schematic diagram of information sharing method provided by the embodiments of the present application;
Figure 19 is the structural schematic diagram of computer equipment provided by the embodiments of the present application.
Specific embodiment
Schema is please referred to, wherein identical component symbol represents identical component, the principle of the application is to implement one
It is illustrated in computing environment appropriate.The following description be based on illustrated by the application specific embodiment, should not be by
It is considered as limitation the application other specific embodiments not detailed herein.
In the following description, the specific embodiment of the application will refer to the step as performed by one or multi-section computer
And symbol illustrates, unless otherwise stating clearly.Therefore, these steps and operation will have to mention for several times is executed by computer, this paper institute
The computer execution of finger includes by representing with the computer processing unit of the electronic signal of the data in a structuring pattern
Operation.This operation is converted at the data or the position being maintained in the memory system of the computer, reconfigurable
Or in addition change the running of the computer in mode known to the tester of this field.The maintained data structure of the data
For the provider location of the memory, there is the specific feature as defined in the data format.But the application principle is with above-mentioned text
Word illustrates that be not represented as a kind of limitation, this field tester will appreciate that plurality of step and behaviour as described below
Also it may be implemented in hardware.
Term as used herein " module " can see the software object executed in the arithmetic system as.It is as described herein
Different components, module, engine and service can see the objective for implementation in the arithmetic system as.And device as described herein and side
Method is preferably implemented in the form of software, can also be implemented on hardware certainly, within the application protection scope.
The embodiment of the present application provides a kind of information sharing method, device, storage medium and computer equipment.
The embodiment of the present application provides a kind of information sharing system, which may include provided by the embodiment of the present application
Any first information sharing apparatus and any the second information sharing apparatus suitable for server suitable for terminal.
Wherein, first information sharing apparatus can integrate in the terminal, the terminal can for mobile phone, tablet computer, wearable device etc.,
Second information sharing apparatus can integrate in the server.
For example, the embodiment of the present application provides a kind of information sharing system, which includes: terminal and service
Device passes through network connection between terminal and server, wherein can also include router, gateway etc. network entity in network.
As described in Figure 1, when needing sharing information, terminal can receive female information sharing initiated using neutron application and refer to
It enables, wherein son application operates in female application, shares multiple objects to be shared in the female application of instruction display according to information, obtains
Take family and share object from wait share the target that selects in object, by target share object relationship chain information and authentication information into
Row combination, information after being combined generate the service chaining information of son application based on information after combination, and service chaining information includes
Information after combination shares object to target and shares service chaining information.
The present embodiment will be described from the angle of first information sharing apparatus, which specifically can be with
It integrates in the terminal, which can be mobile phone, tablet computer, wearable device etc..
As shown in Fig. 2, providing a kind of information sharing method, it is suitable for terminal, detailed process can be such that
201, it receives female information initiated using neutron application and shares instruction.
Wherein, female application can be the native applications program of carrying subapplication, can directly run on operating system
In.For example, female application can be social application program, mail applications, game application etc., wherein social application program
It may include instant messaging application, SNS (Social Network Service, social network sites) application or live streaming application etc.
Deng.
Wherein, son application can provide the application program realized in environment to operate in female application program.Son application can be with
For social application program, document management application program, mail applications or game application etc..Mother's application specifically may be used
Think wechat program (WeChat), corresponding son application is specifically as follows small routine, small routine of such as doing shopping, game small routine, clothes
Business small routine etc..Small routine can be the mobile terminal application program operated on content interaction platform, be based on certain programmed language
Speech exploitation is completed, and without downloading and installation.
In one embodiment, son application can also be the business service account in some application, such as the industry in female application
Be engaged in service account, for example instant messaging application in public platform.
In addition, in some embodiments, son application can also be webpage, such as game webpage, shopping webpage.
That is, the application of neutron of the embodiment of the present invention can be the shapes such as application program (APP), webpage, public platform, small routine
Formula.
In practical applications, the user for sharing terminal can open son application by mother's application, enterprising in sub- application interface
Row sharing operation, son application can carry out the transmission that information shares instruction according to the sharing operation of user.For example, when needing to touch
When photos and sending messages share instruction, interface setting information can be shared in the information of sub- application and share control, user can be answered by mother
With son application is entered, the information in antithetical phrase application is shared control and is operated, and shares instruction to trigger information.At this point, sharing eventually
End will share instruction to the information and receive.Wherein, information share control the form of expression can there are many, for example, pressing
Button, input frame, icon etc..
For example, as shown in Figure 5 and Figure 6, user can enter son application by mother's application, and son applies main boundary when the user clicks
When " multiplayer " icon in face, son application can show that information shares interface according to the clicking operation, which shares
Interface may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation good friend " icon) etc..When user's point
When hitting " inviting good friend " icon at information sharing interface, information can be triggered and share instruction.At this point, terminal can be to the information
Share instruction to be received.
202, share multiple objects to be shared in the female application of instruction display according to information.
In practical applications, terminal can share multiple to be shared objects of the instruction display from mother's application according to information.
For example, as shown in fig. 7, triggering information when information shares " inviting good friend " icon at interface in son application when the user clicks
Share instruction.Terminal can be shared according to the information to be instructed, and is shown Object Selection interface, be may include in the Object Selection interface
Multiple objects to be shared, being somebody's turn to do object to be shared can come from the friend information of terminal user, group chat in female application, such as female application
Information etc..User can by selecting multiple objects to be shared, such as select " XXX group chat ", so that it is determined that go out need into
The target that row information is shared shares object.
In one embodiment, in order to improve information sharing safety, terminal can with antithetical phrase apply sharing permission into
Row verification, to guarantee not can be carried out information sharing operation without the son application for sharing permission.Specifically, step is " according to described
Information shares multiple objects to be shared in instruction display female application ", may include:
Verify the sharing permission that the son application has;
When the son application has the sharing permission, instruction is shared according to the information and obtains affiliated partner data;
Multiple objects to be shared in female application are shown according to the affiliated partner data.
In practical applications, for example, when user is by the sharing interface of the female application of son application calling, to carry out information sharing
When operation, terminal can be verified the sharing permission of the sub- application, if son application has, when sharing permission, terminal can
Affiliated partner data are obtained to share instruction according to information, and according to the affiliated partner data pull-up Object Selection interface, display
Multiple objects to be shared in mother's application, so that user carries out the selection that target shares object;Divide if son application does not have
When enjoying permission, no interface can be returned and call authority information, and the sharing process of Stop message, can also be shared according to information and be referred to
Display lack of competence is enabled to carry out the message of information sharing.
203, it obtains user and shares object from wait share the target selected in object.
In practical applications, for example, as shown in fig. 7, user can such as click " XXX groups by clicking Object Selection interface
Merely ", determine that target shares object in object wait share from multiple.The target shares the good friend that object can be user, can also
Think the group chat etc. where user.
In one embodiment, after user determines that target shares object, information sharing interface, which can accordingly pop up, " to be started to swim
Play " icon, the user for sharing terminal can be by clicking the icon, and triggering starts the instruction of game, and son application can be according to this
The instruction for starting game starts game.
204, target is shared into the relationship chain information of object and authentication information is combined, information after being combined.
Wherein, relationship chain information can be shared for what the target sharing object acquisition that terminal is selected according to user arrived with target
The relevant relationship chain information of object, for example, the relationship chain information may include multiple relation chain sub-informations, such as user information is opened
Originator game information, social group information etc..For example, the relationship chain information may include when group is using being game small routine
Share the user information of terminal, target share object user information or group information, female application wait share in object
Play user information or the group information etc. of the game object.
Wherein, authentication information can be the reference informations such as standard information, the authority information of server setting, for example, the mirror
Weighing information may include multiple authentication sub-informations, such as the backstage standard time, gaming jurisdiction information, developer's authority information, share
Effective information etc..For example, the backstage standard time can be the background server customized standard time, answered with unified content interaction
Time in.Authority information can be the authorized operation information that can be executed or available data information etc..
Wherein, information can be the identification information for including relationship chain information after combination, for example, information can be packet after combination
Include the identification code etc. of relationship chain information.
Since the exposure of user's true relation chain information can have an impact the information security of user, it can pass through
True relationship chain information is encrypted, information after being combined, so that information and relation chain letter after the combination shared away
Breath isolation, so that the relationship chain information of protection is not leaked, has ensured the information security of user.
In practical applications, when determine target share object when, can to target share object relationship chain information and
Authentication information is combined, information after being combined, for example, relationship chain information may include multiple relation chain sub-informations, authentication
Information may include multiple authentication sub-informations, can be combined, obtain to multiple relation chain sub-informations and multiple authentication sub-informations
Information after to combination, can be in order to the sharing that terminal carries out identification code, and the relationship chain information of making is able to be encrypted, thus
The true relationship chain information of user will not be exposed, the safety of information sharing is improved.
It in one embodiment, can also be by preset rules to relationship chain information in order to promote the safety that information is shared
It is encrypted, to avoid the leakage of information, specifically, the target " is shared the relationship chain information of object and authentication is believed by step
Breath is combined, information after being combined ", may include:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained
Information after to combination.
In practical applications, after determining that target shares object, the corresponding relation chain of object acquisition can be shared according to target
Information and authentication information carry out multiple relation chain sub-informations and multiple authentication sub-informations according to the information field place at place
Arrangement, such as puts in order according to the information position of backstage standard time, user information ... and carries out information arrangement.Later according to information
Position puts in order, and multiple relation chain sub-informations and multiple authentication sub-informations are combined, the combination of identification code form is obtained
Information afterwards.
It in one embodiment, can also be at any time to relationship chain information and mirror in order to protect the true relationship chain information of user
The rule of combination of power information carries out replacement adjustment, to adjust the encryption method of relationship chain information, to prevent information leakage.Than
Such as, the type of relation chain sub-information and authentication sub-information can also be adjusted, to the row of relationship chain information and authentication information
Column rule of combination is adjusted etc..
In one embodiment, the encrypting step of the relationship chain information can also be carried out by background server, specifically, step
" being combined the relationship chain information that the target shares object with authentication information, information after being combined " may include:
Obtain the relationship chain information that the target shares object;
Combination request is sent to server, the combination request carries the relationship chain information to be encrypted, the combination
Request is used to indicate server and is combined the relationship chain information with authentication information, information after being combined;
Information after the combination that reception server is sent.
In practical applications, after determining that target shares object, terminal can share object acquisition according to target and close accordingly
Tethers information sends combination request to background server, and combination request includes relationship chain information to be encrypted, passes through the combination
Request instruction background server is combined encryption to relationship chain information.Background server can be believed according to the relation chain got
Breath, in conjunction with authentication information, the relationship chain information is combined with authentication information, information after being combined, and by the combination
Information is sent to terminal afterwards, so that terminal shares information after the combination.
205, the service chaining information of son application is generated based on information after combination.
In practical applications, terminal is got after combination after information, and the industry of son application can be generated according to information after combination
Business link information, for example, as shown in figure 8, terminal can generate the industry of son application by Information encapsulation after combination into service chaining
Business link information, the service chaining information may include information etc. after terminal is logined the link information of sub- application and combined
Deng.
206, share object to target and share service chaining information.
In practical applications, after terminal generates the service chaining information that son is applied, service chaining information can be shared with
Target shares object.As shown in figure 9, target shares object after sharing terminal shares object sharing service chaining information to target
Corresponding will be received by sharing terminal carries the service chaining information that link information is logined in son application.
Since the exposure of user's true relation chain information can have an impact the information security of user, it can pass through
True relationship chain information is encrypted, encrypted information is obtained, so that developer only can be from encrypted information
Judge game logic carry out necessary to information, such as sharing terminal with shared whether terminal comes from the same group, without
The true relationship chain information of user can be obtained, to ensure the information security of user.
In one embodiment, in order to ensure the information security of user, the true relation chain information of user is protected to be not exposed,
Secondary encryption can also be carried out to relationship chain information, specifically, step " share object and share the service chaining by Xiang Suoshu target
After information ", can also include:
Information after the combination is encrypted, combined information after being encrypted, and in the exploitation server of sub- application
Pass combined information after the encryption.
In practical applications, terminal can encrypt information after combination, combined information after being encrypted, and this is added
Combined information is uploaded to the exploitation server of sub- application after close, so that developer can pass through group after exploitation server acquisition encryption
Information is closed, and necessary game logic information is obtained according to combined information after encryption.
In one embodiment, the step of encrypting to information after combination, specifically, step can also be carried out by storage server
" information after the combination is encrypted, combined information after being encrypted, and upload described add to the exploitation server of sub- application
After combined information after close ", can also include:
CIPHERING REQUEST is sent to storage server, the CIPHERING REQUEST carries information after the combination, so as to storage service
Device encrypts information after the combination, and combined information after encryption is sent to the exploitation server of sub- application.
In practical applications, terminal can send the CIPHERING REQUEST of information after carrying combination, storage clothes to storage server
Business device can encrypt information after combination according to the CIPHERING REQUEST, generate combined information after encryption, and will combine after encryption
Information is sent to the exploitation server of sub- application.For example, information after combination can be returned to this middle layer of public library by terminal,
Public library carries out conversion map to information after combination again, to be combined the encryption of rear information, and combined information after encryption is returned
Back to exploitation server.
In one embodiment, information after combination can also be encrypted by preset encryption method, specifically, step
" encrypting to information after the combination, combined information after being encrypted " may include:
Information after the combination is transformed into hash output information;
It is closed based on crypto map set, Mapping and Converting, combined information after being encrypted, institute is carried out to the hash output information
Crypto map set is stated to close including the relationship after the hash output information and the encryption between combined information.
In practical applications, information after combination can be transformed by hash output information based on hashing algorithm, then passed through
The corresponding crypto map set of Encryption Algorithm is closed, and hash output information is carried out Mapping and Converting, combined information after being encrypted.One
In embodiment, information after combination is encrypted for example, can use the Encryption Algorithm such as MD5, Base64, SHA.
Wherein, MD5 (Message-Digest Algorithm, Message Digest 5) is a kind of Cryptographic Hash Function, can
With by producing one 128 hashed values, to ensure the complete consistent of information transmission.MD5 can be used as a kind of information and add
Decryption method.
Wherein, the process from binary system to character may be implemented in Base64, indicated based on 64 printable characters two into
Data processed.Base64 can be used as a kind of information ciphering method.
Wherein, SHA (Secure Hash Algorithm, secure hash algorithm) is a kind of Cryptographic Hash Function, Neng Gouji
Calculate the regular length character string arrived corresponding to a digital massage.SHA can be used as a kind of information ciphering method.
In one embodiment, for example, terminal is got after combination after information, information after combination can also be sent to public
In library, public library can use the Encryption Algorithm such as MD5, Base64, SHA and encrypt to information after combination, group after being encrypted
Close information.
In one embodiment, exploitation server is got after the encryption from multiple terminals after combined information, developer
Combined information after encryption can be obtained by exploitation server, and judge whether multiple terminals come from the same group, so
After can carry out corresponding game logic, or develop the game with social attribute accordingly, carry out ranking list in gaming
The playing methods such as ranking, to enhance the social interest of game.
In one embodiment, in order not to exposure the true relationship chain information of user, can also by public library to combination after
The method that information is encrypted is adjusted, to prevent information leakage.
In one embodiment, as shown in Figure 10, target sharing object is corresponding can receive by sharing terminal to carrying
Using the service chaining information for logining link information, by the corresponding user of sharing terminal can by click-to-call service link information into
Enter waiting for the start interface, which may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation
Good friend " icon) etc..As is illustrated by figs. 11 and 12, after the user for sharing terminal clicks " starting game " button, waiting is opened
The participant in game of beginning interface display can carry out game, and ranking list can also be shown after game over.
From the foregoing, it will be observed that the embodiment of the present application, which can receive female information initiated using neutron application, shares instruction, wherein son
Using operating in female application, multiple objects to be shared in the female application of instruction display are shared according to information, obtain user to
Share the target selected in object and share object, the relationship chain information that target shares object is combined with authentication information, is obtained
Information after to combination, the service chaining information of son application is generated based on information after combination, and service chaining information includes believing after combining
Breath shares object to target and shares service chaining information.The program can be by way of front end and backstage double control, to pass
Tethers information is encrypted, so that the information shared away is isolated with the true relationship chain information of user, thus developer
May determine that share terminal with shared on the basis of whether terminal come from the same group, and do not expose the true relation chain of user
Information, while passing through the dual control of front end and backstage, control ability is enhanced, the safety of information sharing is improved.
In an embodiment, will be described from the second information sharing apparatus angle, which specifically may be used
To integrate in the server.
As shown in figure 3, providing a kind of information sharing method, it is suitable for server, detailed process can be such that
301, the relationship chain information that target shares object is obtained from terminal.
In practical applications, server can obtain the relationship chain information that target shares object, such as background service from terminal
Device can obtain the relationship chain information that target shares object from terminal.
302, relationship chain information and authentication information are combined, information after being combined.
In practical applications, after determining that target shares object, terminal can share object acquisition according to target and close accordingly
Tethers information, and the relationship chain information is sent to background server, so that background server is combined relationship chain information
Encryption.Background server can be according to the relationship chain information got, in conjunction with authentication information, by relation chain sub-information and authentication
Information is arranged according to corresponding information field place, and is put in order according to information position, by the relation chain of presetting digit capacity
Sub-information is combined with authentication sub-information, information after being combined.
It in one embodiment, can also be by preset rules to relationship chain information in order to promote the safety that information is shared
It is encrypted, to avoid the leakage of information, specifically, relationship chain information " is combined with authentication information, is combined by step
Information afterwards " may include:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained
Information after to combination.
In practical applications, after determining that target shares object, the corresponding relation chain of object acquisition can be shared according to target
Information and authentication information carry out multiple relation chain sub-informations and multiple authentication sub-informations according to the information field place at place
Arrangement, such as puts in order according to the information position of backstage standard time, user information ... and carries out information arrangement.Later according to information
Position puts in order, and multiple relation chain sub-informations and multiple authentication sub-informations are combined, the combination of identification code form is obtained
Information afterwards.
It in one embodiment, can also be at any time to relationship chain information and mirror in order to protect the true relationship chain information of user
The rule of combination of power information carries out replacement adjustment, to adjust the encryption method of relationship chain information, to prevent information leakage.Than
Such as, the type of relation chain sub-information and authentication sub-information can also be adjusted, to the row of relationship chain information and authentication information
Column rule of combination is adjusted etc..
303, information after sending combination to terminal, information shares letter to target sharing object after being based on combination so as to terminal
Breath.
In practical applications, it after background server is combined relationship chain information and authentication information, can also will combine
Information is sent to terminal afterwards, so that information is shared after combination of terminal pairs.
It in one embodiment, can also be to acquisition of information after the combination for sharing terminal in order to ensure the information security of user
Permission is verified, prevent after not combining acquisition of information permission sharing terminal from get combination after information, specifically,
Step " information after sending the combination to terminal " may include:
Acquisition of information permission after the combination of verification terminal;
After the terminal has the combination when acquisition of information permission, information after sending the combination to terminal.
In practical applications, after background server, which generates, to be combined after information, can believe after the combination to sharing terminal
Breath acquisition permission is verified, and after sharing terminal to have combination when acquisition of information permission, background server can be whole to sharing
End sends information after combination, carries out information sharing to share information after terminal is based on combination, shares object to target and send packet
Include the service chaining information of information after combining;After sharing terminal and not having combination when acquisition of information permission, background server can
With the step of sending without information after combination, sharing terminal and can sharing object transmission to target does not include information after combination
Service chaining information.
304, information after combination is encrypted, combined information after being encrypted.
In practical applications, terminal can send the CIPHERING REQUEST of information after carrying combination, storage clothes to storage server
Business device can encrypt information after combination according to the CIPHERING REQUEST, generate combined information after encryption.For example, terminal can be with
Information after combination is returned into this middle layer of public library, public library carries out conversion map to information after combination again, to carry out group
The encryption of information after conjunction.
In one embodiment, it can also be taken to the exploitation of sub- application after combined information after storage server generation encryption
Business device uploads combined information after encryption.
In one embodiment, in order not to which the true relation chain information of user is exposed to developer, relation chain can be believed
Breath is encrypted twice, to prevent relation chain information leakage.Background server can be combined relationship chain information first
Transformation, information after being combined complete the encryption of first time information.Public library can carry out information after combination converting and reflect later
It penetrates, combined information after being encrypted, completes the encryption of second of information.Therefore, it by the combination of front end and backstage, is supplied to outer
The encrypted relationship chain information in portion allows developer that can judge that terminal is without the true relationship chain information of exposure
It is no to come from the same group, and while carry out game logic, the true relationship chain information of user cannot be got, to promote letter
Cease the safety shared.
In one embodiment, it can also be controlled by the dual permission that front end and backstage carry out, improve the peace that information is shared
Quan Xing.For example, background server can verify acquisition of information permission after the combination for sharing terminal, to decide whether group
Information is sent to sharing terminal after conjunction.Public library can also the acquisition permission to exploitation server verify, to decide whether
Combined information after encryption is sent to exploitation server, so that developer checks.
In one embodiment, it in the case that when backstage, rule starts a leak, can also be advised by adjusting the encryption of public library
Then, upgrading terminals version or close associated rights come emergent stopping information sharing, thus improving information safety.
In one embodiment, in order to ensure the information security of user, exploitation server can also be obtained in front end
The verification of permission, for the exploitation server of combined information after no acquisition authority acquiring encryption, public library can be without adding
The transmission of combined information after close, i.e. developer combine letter after cannot getting encryption by no exploitation server for obtaining permission
Breath.Specifically, after step " being encrypted to information after the combination, combined information after being encrypted ", can also include:
Acquisition permission of the exploitation server of syndrome application for combined information after the encryption;
When the exploitation server has the acquisition permission, Xiang Suoshu exploitation server combines after uploading the encryption
Information.
It in practical applications, can be right after public library encrypts information after combination after combined information
The acquisition permission of exploitation server is verified, with verify exploitation server whether can obtain encryption after combined information.When opening
When sending out server has acquisition permission, show that combined information after the available encryption of the exploitation server, public library can will add
Combined information is uploaded to exploitation server after close, so that developer looks into combined information after encryption by exploitation server
It sees, and carries out game logic;When exploitation server, which does not have, obtains permission, after showing that the exploitation server does not obtain encryption
The permission of combined information can only return to interface call result.
From the foregoing, it will be observed that the embodiment of the present application can obtain the relationship chain information that target shares object from terminal, by relation chain
Information is combined with authentication information, information after being combined, information after sending combination to terminal, after being based on combination so as to terminal
Information shares object sharing information to target, encrypts to information after combination, combined information after being encrypted.The program can be with
By way of front end and backstage double control, relationship chain information is encrypted, so that the information and use shared away
Family true relationship chain information isolation, thus developer may determine that share terminal with shared whether terminal comes from the same group
On the basis of, and the true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, enhance control
Ability improves the safety of information sharing.
Citing, is described in further detail by the method according to described in above-described embodiment below.
Referring to Figure 13, a kind of information sharing system is provided, which includes: to share terminal, shared eventually
End and server, wherein include router, gateway etc. network in network by being connected to the network between terminal and server
Entity does not illustrate in figure.
Referring to Fig. 4, the detailed process of the information sharing method can be such that
401, share the female information sharing instruction initiated using neutron application of terminal reception.
For example, the user for sharing terminal can enter son application by mother's application, as shown in figure 5, son is answered when the user clicks
When with " multiplayer " icon of main interface, son application can show that information shares interface, the letter according to the clicking operation
It may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation good friend " icon) etc. that breath, which shares interface,.Such as
Shown in Fig. 6, when information shares " inviting good friend " icon at interface when the user clicks, information can be triggered and share instruction.This
When, information sharing instruction can be received by sharing terminal.
402, share terminal and share the multiple objects to be shared instructed in the female application of display according to information.
For example, as shown in fig. 7, when the user's click information for sharing terminal shares " inviting good friend " icon at interface
When, triggering information shares instruction.Instruction can be shared according to the information by sharing terminal, show Object Selection interface, object choosing
Selecting in interface may include multiple objects to be shared, should object be shared share terminal in female application, such as female application and use
Friend information, the group chat information at family etc..
In one embodiment, for example, in order to improve information sharing safety, can with antithetical phrase apply sharing permission into
Row verification guarantees not can be carried out information sharing operation without the son application for sharing permission.As shown in figure 14, when user is answered by son
With the sharing interface for calling female application, when carrying out information sharing operation, sharing terminal can be to the sharing permission of the sub- application
It is verified, if son application has, when sharing permission, instruction pull-up Object Selection can be shared according to information by sharing terminal
Interface, and show multiple objects to be shared in female application;If son application does not have sharing permission, nothing can be returned and connect
Mouth calls authority information, and the sharing process of Stop message.
403, share terminal and obtain user from wait share the target selected in object sharing object.
For example, as shown in fig. 7, user can by click Object Selection interface, such as click " XXX group chat ", from it is multiple to
Share and determines that target shares object in object.The target shares the good friend that object can be user, or where user
Group chat etc..
404, target is shared the relationship chain information of object by background server and authentication information is combined, after obtaining combination
Information.
For example, as shown in figure 14, after sharing terminal determines that target shares object, it is corresponding that the available target shares object
Relationship chain information, if target shares the corresponding multiple relation chain sub-informations of object, as user information, developer's game information,
Social group information etc..The relationship chain information that will acquire later is sent to background server, and background server can basis
The relationship chain information and authentication information got is combined, and obtains information after the combination of identification code form.
It in one embodiment, can also be to combined ciphering side in order to protect the true relationship chain information of user not to be leaked
Method is adjusted.
405, share the service chaining information that terminal generates son application based on information after combination.
For example, as shown in figure 8, information after combination can be back to sharing terminal by background server, sharing terminal can be with
Information encapsulation generates the service chaining information of son application into service chaining after combining, which may include
Information etc. after terminal is logined the link information of sub- application and combined.
In one embodiment, background server can also be to sharing terminal for acquisition of information after the combination of information after combination
Permission is verified, to judge information after whether the sharing terminal has permission acquisition combination.As shown in figure 14, when sharing terminal tool
When having acquisition of information permission after combining, information after background server can send combination to terminal is shared, to share terminal base
Information carries out information sharing after combination, shares object to target and sends the service chaining information including information after combination;When point
When enjoying terminal and not having acquisition of information permission after combination, the step of can sending without information after combination, sharing terminal can be with
Share the service chaining information that object transmission does not include information after combination to target.
406, share terminal and share object sharing service chaining information to target.
For example, as shown in figure 9, share terminal to target share object share service chaining information after, target share object
Corresponding will be received by sharing terminal carries the service chaining information that link information is logined in son application.
In one embodiment, as shown in figure 15, target share object service chaining information is received by sharing terminal after,
Waiting for the start interface can be entered by click-to-call service link information by the user of sharing terminal, as shown in Figure 10, which opens
Beginning interface may include game difficulty, participant in game head portrait, invitation interface (i.e. " invitation good friend " icon) etc..Such as Figure 11
With shown in Figure 12, after the user for sharing terminal clicks " start game " button, the participant in game of waiting for the start interface display
Game can be carried out, ranking list can also be shown after game over.
In one embodiment, as shown in figure 15, target sharing object is corresponding gets service chaining letter by sharing terminal
After breath, information after the combination in service chaining information can be detected, information after in service chaining information including combination
When, information after combination can be back to by sharing terminal by this middle layer of public library, public library can by MD5, Base64,
The Encryption Algorithm such as SHA carry out conversion map, combined information after being encrypted to information after combination.Public library to information after combination into
After row is encrypted after combined information, combined information after the encryption can also be uploaded, to exploitation server to develop
Person obtains combined information after encryption by exploitation server.When in service chaining information not including information after combination,
The step of public library being back to without information after combining.
407, storage server encrypts information after the combination, combined information after being encrypted.
For example, as shown in figure 14, shares terminal and get after combination after information, information after combination can be back to public affairs
This middle layer of library altogether, public library can carry out conversion to information after combination by Encryption Algorithm such as MD5, Base64, SHA and reflect
It penetrates, combined information after being encrypted.
In one embodiment, in order not to exposure the true relationship chain information of user, can also by public library to combination after
The algorithm that information is encrypted is adjusted, to prevent information leakage.
408, combined information after storage server uploads the encryption to the exploitation server of sub- application.
For example, as shown in figure 14, after public library encrypts information after combination after combined information, may be used also
With combined information after uploading the encryption to exploitation server, so as to developer by exploitation server to combined information after encryption into
Row obtains.
In one embodiment, public library can also the acquisition permission to exploitation server verify, to judge the exploitation
Combined information shows the exploitation service when exploitation server, which has, obtains permission after whether server has permission acquisition encryption
Combined information after the available encryption of device, combined information after encryption can be uploaded to exploitation server by public library, to develop
Person can check that son application carries out game by combined information after encryption by exploitation server to combined information after encryption
Logic;When exploitation server, which does not have, obtains permission, show the power of combined information after the exploitation server does not obtain encryption
Limit can only return to interface call result.
In one embodiment, exploitation server is got after the encryption from multiple terminals after combined information, developer
Combined information after encryption can be obtained by exploitation server, and judge whether multiple terminals come from the same group, so
After can carry out corresponding game logic, or develop the game with social attribute accordingly, carry out ranking list in gaming
The playing methods such as ranking, to enhance the social interest of game.For example, developer can be obtained from sharing eventually by exploitation server
Combined information and the combined information after the encryption for being shared terminal after the encryption at end, and to share terminal with shared terminal and be
It is no to judge from the same group, carry out corresponding game logic.
From the foregoing, it will be observed that the embodiment of the present application can be by sharing the female information sharing initiated using neutron application of terminal reception
Instruction shares terminal and shares multiple objects to be shared in the female application of instruction display according to information, share terminal obtain user from
Share object wait share the target selected in object, target is shared the relationship chain information and authentication information of object by background server
It is combined, information after being combined, shares the service chaining information that terminal generates son application based on information after combination, share eventually
It holds to target and shares object sharing service chaining information, storage server encrypts information after the combination, encrypted
Combined information afterwards, combined information after storage server uploads the encryption to the exploitation server of sub- application.The program can lead to
The mode for crossing front end and backstage double control encrypts relationship chain information, so that the information shared away and user
True relationship chain information isolation, thus developer may determine that share terminal with whether shared terminal from the same group's
On the basis of, and the true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, enhance control energy
Power improves the safety of information sharing.
In order to better implement above method, the embodiment of the present application also provides a kind of information sharing apparatus, which shares
Device can be adapted for terminal, as shown in figure 16, the information sharing apparatus may include: receiving module 161, display module 162,
First obtains module 163, the first composite module 164, generation module 165 and sharing module 166, as follows:
Receiving module 161 shares instruction for receiving female information initiated using neutron application, wherein the sub- application
It operates in female application;
Display module 162, for sharing multiple objects to be shared in instruction display female application according to the information;
First obtains module 163, shares object wait share the target selected in object from described for obtaining user;
First composite module 164, the relationship chain information for the target to be shared object are combined with authentication information,
Information after being combined;
Generation module 165, for generating the service chaining information of the sub- application, the industry based on information after the combination
Business link information includes information after the combination;
Sharing module 166 shares the service chaining information for sharing object to the target.
In one embodiment, as shown in figure 17, which can also include:
Encrypting module 167, for being encrypted to information after the combination, combined information after being encrypted, and Xiang Ziying
Exploitation server uploads combined information after the encryption.
In one embodiment, the encrypting module 167, can be specifically used for:
Information after the combination is transformed into hash output information;
It is closed based on crypto map set, Mapping and Converting, combined information after being encrypted, institute is carried out to the hash output information
Crypto map set is stated to close including the relationship after the hash output information and the encryption between combined information.
In one embodiment, the encrypting module 167, can be specifically used for:
CIPHERING REQUEST is sent to storage server, the CIPHERING REQUEST carries information after the combination, so as to storage service
Device encrypts information after the combination, and combined information after encryption is sent to the exploitation server of sub- application.
In one embodiment, the display module 162, can be specifically used for:
Verify the sharing permission that the son application has;
When the son application has the sharing permission, instruction is shared according to the information and obtains affiliated partner data;
Multiple objects to be shared in female application are shown according to the affiliated partner data.
In one embodiment, first composite module 164, can be specifically used for:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained
Information after to combination.
In one embodiment, first composite module 164, can be specifically used for:
Obtain the relationship chain information that the target shares object;
Combination request is sent to server, the combination request carries the relationship chain information to be encrypted, the combination
Request is used to indicate server and is combined the relationship chain information with authentication information, information after being combined;
Information after the combination that reception server is sent.
From the foregoing, it will be observed that the embodiment of the present application can receive female information initiated using neutron application by receiving module 161
Share instruction, wherein son application operates in female application, shares the female application of instruction display according to information by display module 162
In multiple objects to be shared, user is obtained by the first acquisition module 163 and is shared pair from wait share the target that selects in object
As the relationship chain information that target shares object being combined with authentication information by the first composite module 164, after obtaining combination
Information generates the service chaining information of son application by generation module 165 based on information after combination, and service chaining information includes group
Information after conjunction shares object to target by sharing module 166 and shares service chaining information.The program can be by front end with after
The mode of platform double control encrypts relationship chain information, so that the information shared away and the true relationship of user
Chain information isolation, thus developer may determine that share terminal with shared on the basis of whether terminal come from the same group, again
The true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, control ability is enhanced, improves
The safety that information is shared.
In order to better implement above method, the embodiment of the present application also provides a kind of information sharing apparatus, which shares
Device can be adapted for server, and as shown in figure 18, which may include: 181, second groups of the second acquisition module
Block 182, sending module 183 and encrypting module 184 are molded, as follows:
Second obtains module 181, for obtaining the relationship chain information that target shares object from terminal;
Second composite module 182 is believed after being combined for the relationship chain information to be combined with authentication information
Breath;
Sending module 183, for information after sending the combination to terminal, so that terminal is based on after combination information to target
Share object sharing information;
Encrypting module 184, for being encrypted to information after the combination, combined information after being encrypted.
In one embodiment, second composite module 182, can be specifically used for:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, obtained
Information after to combination.
From the foregoing, it will be observed that the embodiment of the present application, which can obtain module 181 by second, obtains target sharing object from terminal
Relationship chain information is combined, information after being combined by relationship chain information by the second composite module 182 with authentication information,
Information after sending combination to terminal by sending module 183, information is shared to target sharing object after being based on combination so as to terminal
Information is encrypted, combined information after being encrypted by information after 184 pairs of encrypting module combinations.The program can be by preceding
The mode at end and backstage double control, encrypts relationship chain information, so that the information shared away and user are true
Relationship chain information isolation, thus developer may determine that share terminal with shared terminal whether the basis from the same group
On, and the true relationship chain information of user is not exposed, while passing through the dual control of front end and backstage, control ability is enhanced,
Improve the safety of information sharing.
The embodiment of the present application also provides a kind of computer equipment, which can set for server or terminal etc.
It is standby, it is integrated with any information sharing apparatus provided by the embodiment of the present application.As shown in figure 19, Figure 19 is that the application is implemented
The structural schematic diagram for the computer equipment that example provides, specifically:
The computer equipment may include the processor 191, one or one of one or more than one processing core with
The components such as memory 192, power supply 193 and the input unit 194 of upper computer readable storage medium.Those skilled in the art can be with
Understand, computer equipment structure shown in Figure 19 does not constitute the restriction to computer equipment, may include more than illustrating
Or less component, perhaps combine certain components or different component layouts.Wherein:
Processor 191 is the control centre of the computer equipment, is set using various interfaces and the entire computer of connection
Standby various pieces, by running or executing the software program and/or module that are stored in memory 192, and calling storage
Data in memory 192 execute the various functions and processing data of computer equipment, to carry out to computer equipment whole
Body monitoring.Optionally, processor 191 may include one or more processing cores;Preferably, processor 191 can integrate at
Manage device and modem processor, wherein the main processing operation system of application processor, user interface and application program etc. are adjusted
Demodulation processor processed mainly handles wireless communication.It is understood that above-mentioned modem processor can not also integrate everywhere
It manages in device 191.
Memory 192 can be used for storing software program and module, and processor 191 is stored in memory 192 by operation
Software program and module, thereby executing various function application and data processing.Memory 192 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area can be stored to be created according to using for computer equipment
Data etc..In addition, memory 192 may include high-speed random access memory, it can also include nonvolatile memory, such as
At least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 192 can be with
Including Memory Controller, to provide access of the processor 191 to memory 192.
Computer equipment further includes the power supply 193 powered to all parts, it is preferred that power supply 193 can pass through power supply pipe
Reason system and processor 191 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.Power supply 193 can also include one or more direct current or AC power source, recharging system, power failure inspection
The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
The computer equipment may also include input unit 194, which can be used for receiving the number or word of input
Information is accorded with, and generates keyboard related with user setting and function control, mouse, operating stick, optics or trace ball letter
Number input.
Although being not shown, computer equipment can also be including display unit etc., and details are not described herein.Specifically in the present embodiment
In, the processor 191 in computer equipment can be according to following instruction, by the process pair of one or more application program
The executable file answered is loaded into memory 192, and the application journey being stored in memory 192 is run by processor 191
Sequence, thus realize various functions, it is as follows:
It receives female information initiated using neutron application and shares instruction, wherein son application operates in female application, according to letter
Breath shares the multiple objects to be shared instructed in the female application of display, obtains user from wait share the target selected in object sharing pair
As the relationship chain information that target shares object being combined with authentication information, information after being combined, based on information after combination
The service chaining information of son application is generated, service chaining information includes information after combination, shares object to target and shares business chain
Connect information.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the embodiment of the present application, which can receive female information initiated using neutron application, shares instruction, wherein son
Using operating in female application, multiple objects to be shared in the female application of instruction display are shared according to information, obtain user to
Share the target selected in object and share object, the relationship chain information that target shares object is combined with authentication information, is obtained
Information after to combination, the service chaining information of son application is generated based on information after combination, and service chaining information includes believing after combining
Breath shares object to target and shares service chaining information.The program can be by way of front end and backstage double control, to pass
Tethers information is encrypted, so that the information shared away is isolated with the true relationship chain information of user, thus developer
May determine that share terminal with shared on the basis of whether terminal come from the same group, and do not expose the true relation chain of user
Information, while passing through the dual control of front end and backstage, control ability is enhanced, the safety of information sharing is improved.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with
It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one
In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present application provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be processed
Device is loaded, to execute the step in any information sharing method provided by the embodiment of the present application.For example, the instruction can
To execute following steps:
It receives female information initiated using neutron application and shares instruction, wherein son application operates in female application, according to letter
Breath shares the multiple objects to be shared instructed in the female application of display, obtains user from wait share the target selected in object sharing pair
As the relationship chain information that target shares object being combined with authentication information, information after being combined, based on information after combination
The service chaining information of son application is generated, service chaining information includes information after combination, shares object to target and shares business chain
Connect information.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
Wherein, which may include: read-only memory (ROM, Read Only Memory), random access memory
Body (RAM, Random Access Memory), disk or CD etc..
By the instruction stored in the storage medium, any information provided by the embodiment of the present application point can be executed
The step in method is enjoyed, it is thereby achieved that achieved by any information sharing method provided by the embodiment of the present application
Beneficial effect is detailed in the embodiment of front, and details are not described herein.
Above to a kind of information sharing method, device, storage medium and computer equipment provided by the embodiment of the present application
It is described in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, the above reality
The explanation for applying example is merely used to help understand the present processes and its core concept;Meanwhile for those skilled in the art,
According to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion in this specification
Hold the limitation that should not be construed as to the application.
Claims (14)
1. a kind of information sharing method characterized by comprising
It receives female information initiated using neutron application and shares instruction, wherein the son application operates in female application;
Share multiple objects to be shared in instruction display female application according to the information;
It obtains user and shares object wait share the target selected in object from described;
The relationship chain information that the target shares object is combined with authentication information, information after being combined;
The service chaining information of the sub- application is generated based on information after the combination, the service chaining information includes described group
Information after conjunction;
Share object to the target and shares the service chaining information.
2. information sharing method according to claim 1, which is characterized in that Xiang Suoshu target shares object and shares the industry
It is engaged in after link information, further includes:
Information after the combination is encrypted, combined information after being encrypted, and uploads institute to the exploitation server of sub- application
State combined information after encrypting.
3. information sharing method according to claim 2, which is characterized in that encrypt, obtain to information after the combination
Combined information after to encryption, and combined information after uploading the encryption to the exploitation server of sub- application, comprising:
CIPHERING REQUEST is sent to storage server, the CIPHERING REQUEST carries information after the combination, so as to storage server pair
Information is encrypted after the combination, and combined information after encryption is sent to the exploitation server of sub- application.
4. information sharing method according to claim 1, which is characterized in that the relation chain information includes multiple relation chains
Sub-information;
The relationship chain information that the target shares object is combined with authentication information, information after being combined, comprising:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, group is obtained
Information after conjunction.
5. information sharing method according to claim 1, which is characterized in that believe the relation chain that the target shares object
Breath is combined with authentication information, information after being combined, comprising:
Obtain the relationship chain information that the target shares object;
Combination request is sent to server, the combination request carries the relationship chain information to be encrypted, the combination request
It is used to indicate server and is combined the relationship chain information with authentication information, information after being combined;
Information after the combination that reception server is sent.
6. information sharing method according to claim 1, which is characterized in that shared according to the information and instructed described in display
Multiple objects to be shared in mother's application, comprising:
Verify the sharing permission that the son application has;
When the son application has the sharing permission, instruction is shared according to the information and obtains affiliated partner data;
Multiple objects to be shared in female application are shown according to the affiliated partner data.
7. information sharing method according to claim 2, which is characterized in that encrypt, obtain to information after the combination
Combined information after to encryption, comprising:
Information after the combination is transformed into hash output information;
It is closed based on crypto map set, Mapping and Converting is carried out to the hash output information, combined information after being encrypted is described to add
Close mapping set includes the relationship after the hash output information and the encryption between combined information.
8. a kind of information sharing method characterized by comprising
The relationship chain information that target shares object is obtained from terminal;
The relationship chain information is combined with authentication information, information after being combined;
Information after sending the combination to terminal, information shares object sharing information to target after being based on combination so as to terminal;
Information after the combination is encrypted, combined information after being encrypted.
9. information sharing method according to claim 8, which is characterized in that encrypt, obtain to information after the combination
After to encryption after combined information, further includes:
Acquisition permission of the exploitation server of syndrome application for combined information after the encryption;
When the exploitation server has the acquisition permission, Xiang Suoshu exploitation server combines letter after uploading the encryption
Breath.
10. information sharing method according to claim 8, which is characterized in that the relation chain information includes multiple relationships
Chain sub-information;
The relationship chain information is combined with authentication information, information after being combined, comprising:
Authentication information is obtained, the authentication information includes multiple authentication sub-informations;
Based on information field place, the relation chain sub-information and the authentication sub-information are arranged;
It is put in order based on information position, the relation chain sub-information of presetting digit capacity and authentication sub-information is combined, group is obtained
Information after conjunction.
11. a kind of information sharing apparatus characterized by comprising
Receiving module shares instruction for receiving female information initiated using neutron application, wherein the son application operates in institute
It states in female application;
Display module, for sharing multiple objects to be shared in instruction display female application according to the information;
First obtains module, shares object wait share the target selected in object from described for obtaining user;
First composite module, the relationship chain information for the target to be shared object are combined with authentication information, obtain group
Information after conjunction;
Generation module, for generating the service chaining information of the sub- application, the service chaining based on information after the combination
Information includes information after the combination;
Sharing module shares the service chaining information for sharing object to the target.
12. a kind of information sharing apparatus characterized by comprising
Second obtains module, for obtaining the relationship chain information that target shares object from terminal;
Second composite module, for the relationship chain information to be combined with authentication information, information after being combined;
Sending module is shared pair so that terminal is based on after combination information to target for information after sending the combination to terminal
As sharing information;
Encrypting module, for being encrypted to information after the combination, combined information after being encrypted.
13. a kind of storage medium, which is characterized in that the storage medium is stored with instruction, when described instruction is executed by processor
It realizes such as the step of any one of claim 1-10 the method.
14. a kind of computer equipment, which is characterized in that including processor and memory, the memory is stored with a plurality of instruction;
The processor loads instruction from the memory, to execute such as the described in any item information sharing methods of claim 1-10
In step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910313152.XA CN110113321B (en) | 2019-04-18 | 2019-04-18 | Information sharing method and device, storage medium and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910313152.XA CN110113321B (en) | 2019-04-18 | 2019-04-18 | Information sharing method and device, storage medium and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110113321A true CN110113321A (en) | 2019-08-09 |
CN110113321B CN110113321B (en) | 2020-11-03 |
Family
ID=67485794
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910313152.XA Active CN110113321B (en) | 2019-04-18 | 2019-04-18 | Information sharing method and device, storage medium and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113321B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112163398A (en) * | 2020-09-30 | 2021-01-01 | 金蝶软件(中国)有限公司 | Chart sharing method and related equipment thereof |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5872847A (en) * | 1996-07-30 | 1999-02-16 | Itt Industries, Inc. | Using trusted associations to establish trust in a computer network |
CN103297484A (en) * | 2012-03-05 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Resource sharing method and device |
CN104052762A (en) * | 2013-03-11 | 2014-09-17 | 腾讯科技(深圳)有限公司 | Data sharing method, device and system |
CN104580364A (en) * | 2014-12-01 | 2015-04-29 | 百度在线网络技术(北京)有限公司 | Resource sharing method and device |
CN104966211A (en) * | 2015-06-04 | 2015-10-07 | 广州优蜜移动科技股份有限公司 | Method and system for automatically identifying channel relationship |
CN107102880A (en) * | 2017-05-11 | 2017-08-29 | 腾讯科技(深圳)有限公司 | Message treatment method, device, storage medium and computer equipment |
CN108512829A (en) * | 2018-02-26 | 2018-09-07 | 平安普惠企业管理有限公司 | Information sharing method, device, computer equipment and storage medium |
CN108809811A (en) * | 2018-06-12 | 2018-11-13 | 腾讯科技(深圳)有限公司 | Object sharing method and device |
CN109241459A (en) * | 2018-07-25 | 2019-01-18 | 五八有限公司 | Content share method, device, computer equipment and computer readable storage medium |
CN109600408A (en) * | 2017-09-30 | 2019-04-09 | 腾讯科技(深圳)有限公司 | Resource sharing method, device, storage medium and computer equipment |
-
2019
- 2019-04-18 CN CN201910313152.XA patent/CN110113321B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5872847A (en) * | 1996-07-30 | 1999-02-16 | Itt Industries, Inc. | Using trusted associations to establish trust in a computer network |
CN103297484A (en) * | 2012-03-05 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Resource sharing method and device |
CN104052762A (en) * | 2013-03-11 | 2014-09-17 | 腾讯科技(深圳)有限公司 | Data sharing method, device and system |
CN104580364A (en) * | 2014-12-01 | 2015-04-29 | 百度在线网络技术(北京)有限公司 | Resource sharing method and device |
CN104966211A (en) * | 2015-06-04 | 2015-10-07 | 广州优蜜移动科技股份有限公司 | Method and system for automatically identifying channel relationship |
CN107102880A (en) * | 2017-05-11 | 2017-08-29 | 腾讯科技(深圳)有限公司 | Message treatment method, device, storage medium and computer equipment |
CN109600408A (en) * | 2017-09-30 | 2019-04-09 | 腾讯科技(深圳)有限公司 | Resource sharing method, device, storage medium and computer equipment |
CN108512829A (en) * | 2018-02-26 | 2018-09-07 | 平安普惠企业管理有限公司 | Information sharing method, device, computer equipment and storage medium |
CN108809811A (en) * | 2018-06-12 | 2018-11-13 | 腾讯科技(深圳)有限公司 | Object sharing method and device |
CN109241459A (en) * | 2018-07-25 | 2019-01-18 | 五八有限公司 | Content share method, device, computer equipment and computer readable storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112163398A (en) * | 2020-09-30 | 2021-01-01 | 金蝶软件(中国)有限公司 | Chart sharing method and related equipment thereof |
Also Published As
Publication number | Publication date |
---|---|
CN110113321B (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11159310B2 (en) | Digital security bubble | |
CN104520805B (en) | According to the security application ecosystem with key and data exchange of company information control strategy | |
CN104838630B (en) | Application program management based on strategy | |
CN103379098B (en) | Content sharing method, device and network system thereof | |
CN108632284A (en) | User data authorization method, medium, device and computing device based on block chain | |
CN111064757B (en) | Application access method and device, electronic equipment and storage medium | |
BRPI0613075A2 (en) | secure instant messaging | |
CN107078942A (en) | The method and system that the messaging and content controlled by sender is shared | |
CN106605232A (en) | Preserving data protection with policy | |
US20170149771A1 (en) | Automated device discovery of pairing-eligible devices for authentication | |
CN108200089A (en) | Implementation method, device, system and the storage medium of information security | |
CN110489946A (en) | Copyright authentication method, apparatus, equipment and storage medium based on block chain | |
CN102902934B (en) | Main frame is unknowable integrated and inter-operation system | |
CN109391476A (en) | Internet phone-calling method, apparatus and system | |
CN108153420A (en) | A kind of information push method, device, server and storage medium | |
CN110113321A (en) | A kind of information sharing method, device, storage medium and computer equipment | |
CN109740319A (en) | Digital identity verification method and server | |
CN109075966B (en) | Communication security system and method | |
CN109120576A (en) | Data sharing method and device, computer equipment and storage medium | |
JP2022504575A (en) | Systems and methods for transmitting and retrieving messages using the blockchain | |
CN110661789B (en) | Address resetting method, device, equipment and computer readable storage medium | |
CN108846266A (en) | A kind of method, system and the communication terminal of application program operation authorization | |
CN115022090B (en) | Data sharing method and system, electronic equipment and computer storage medium | |
CN111787019B (en) | Information acquisition method and device based on block chain | |
Verschoor et al. | (In-) Secure messaging with the Silent Circle instant messaging protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |