CN111556021A - Data transmission method, device, storage medium and related equipment - Google Patents

Data transmission method, device, storage medium and related equipment Download PDF

Info

Publication number
CN111556021A
CN111556021A CN202010234470.XA CN202010234470A CN111556021A CN 111556021 A CN111556021 A CN 111556021A CN 202010234470 A CN202010234470 A CN 202010234470A CN 111556021 A CN111556021 A CN 111556021A
Authority
CN
China
Prior art keywords
terminal
contact
list
data
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010234470.XA
Other languages
Chinese (zh)
Inventor
张文俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN202010234470.XA priority Critical patent/CN111556021A/en
Publication of CN111556021A publication Critical patent/CN111556021A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a data transmission method, a data transmission device, a storage medium and related equipment, wherein the method comprises the following steps: when the first terminal successfully logs in, acquiring a contact person protection list associated with the second terminal; the second terminal successfully logs in the server; and not sending the data to be synchronized of each contact in the contact protection list in the first terminal to the second terminal. The user can add the more private contact persons into the contact person protection list, and the related data of each contact person in the contact person protection list in the first terminal cannot be synchronized into the second terminal, so that the risk that some more private information of the user is leaked is reduced, and the use of social software by the user is facilitated.

Description

Data transmission method, device, storage medium and related equipment
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to a data transmission method, an apparatus, a storage medium, and a related device.
Background
A plurality of social software can be logged in through a mobile phone or a computer. When a user logs in the social software to a computer end or a mobile phone end, the chat records in the social software can be synchronized at the computer end or the mobile phone end. The user often has some more private contacts, and after the chatting records of the contacts are synchronized at the computer end or the mobile phone end, some more private information of the user may be leaked, so that the user is inconvenient to use the social software.
Disclosure of Invention
In order to solve the above problem, embodiments of the present invention provide a data transmission method, an apparatus, a storage medium, and a related device.
In a first aspect, an embodiment of the present invention provides a data transmission method, where the method is applied to a server, and includes the following steps:
when the first terminal successfully logs in, acquiring a contact person protection list associated with the second terminal; the second terminal successfully logs in the server;
and not sending the data to be synchronized of each contact in the contact protection list in the first terminal to the second terminal.
Optionally, the method further comprises:
and sending the data to be synchronized of each contact person in the first terminal, which is not in the contact person protection list, to the second terminal.
Optionally, the method further comprises:
judging whether the second terminal has the related data of the protection contact; wherein the protected contact is in the contact protected list;
and if the data exists, controlling the second terminal to delete the related data of the protection contact in the second terminal.
Optionally, the determining whether the second terminal has related data for protecting the contact includes:
acquiring a contact list on the second terminal;
and if the contact person protection list and the contact person list on the second terminal have the matched contact person, determining that the related data of the protection contact person exist in the second terminal.
Optionally, before the controlling the second terminal to delete the data related to the protected contact in the second terminal, the method further includes:
controlling the second terminal to display prompt information; the prompt information is used for prompting a user whether to delete the related data of the protection contact in the second terminal;
and if the selection information input by the user based on the prompt information agrees to delete the relevant data of the protection contact in the second terminal, executing the step of controlling the second terminal to delete the relevant data of the protection contact in the second terminal.
In a second aspect, an embodiment of the present invention provides a data transmission method, where the method is applied to a first terminal, and includes the following steps:
acquiring a contact list of the first terminal; wherein, the contact list at least comprises one contact;
displaying each contact in the contact list for a user to select;
adding the contact person selected by the user into the contact person protected list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
In a third aspect, an embodiment of the present invention provides a data transmission apparatus, where the apparatus is applied to a server, and the apparatus includes:
the acquisition module is used for acquiring a contact person protection list associated with a second terminal when the first terminal successfully logs in; the second terminal successfully logs in the server;
and the sending module is used for not sending the data to be synchronized of each contact in the contact protection list in the first terminal to the second terminal.
In a fourth aspect, an embodiment of the present invention provides a data transmission apparatus, where the apparatus is applied to a first terminal, and includes:
the acquisition module is used for acquiring a contact list of the first terminal; wherein, the contact list at least comprises one contact;
the display module is used for displaying each contact in the contact list for the user to select;
the adding module is used for adding the contact person selected by the user into the contact person protected list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
In a fifth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of any one of the above methods.
In a sixth aspect, an embodiment of the present invention provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of any one of the above methods when executing the program.
In the embodiment of the application, when the first terminal successfully logs in, a contact person protection list associated with the second terminal is obtained; the second terminal successfully logs in the server; and not sending the data to be synchronized of each contact in the contact protection list in the first terminal to the second terminal. The user can add the more private contact persons into the contact person protection list, and the related data of each contact person in the contact person protection list in the first terminal cannot be synchronized into the second terminal, so that the risk that some more private information of the user is leaked is reduced, and the use of social software by the user is facilitated.
Drawings
Fig. 1 is a schematic view illustrating an application scenario of a data transmission method and apparatus provided in an embodiment of the present invention;
fig. 2 is a schematic flowchart of a data transmission method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of another data transmission method according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating another data transmission method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of another data transmission apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of another data transmission apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The present application is further described with reference to the following figures and examples.
In the following description, the terms "first" and "second" are used for descriptive purposes only and are not intended to indicate or imply relative importance. The following description provides embodiments of the invention, which may be combined or substituted for various embodiments, and this application is therefore intended to cover all possible combinations of the same and/or different embodiments described. Thus, if one embodiment includes feature A, B, C and another embodiment includes feature B, D, then this application should also be considered to include an embodiment that includes one or more of all other possible combinations of A, B, C, D, even though this embodiment may not be explicitly recited in text below.
The following description provides examples, and does not limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements described without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For example, the described methods may be performed in an order different than the order described, and various steps may be added, omitted, or combined. Furthermore, features described with respect to some examples may be combined into other examples.
With the increasing privacy requirements of modern society residents, sometimes individual social account numbers have to be used on both computers and mobile phones. Particularly, when the intelligent terminal works, the chat software is logged in the computer, and once the chat software receives the information sent by the private contact person, the information can be easily seen by other people. Some users choose to create two accounts to manage their privacy, but the users are unnecessarily troubled in life and work for a long time. By adopting the scheme of the embodiment of the invention, the user can only display the contact information to be displayed at the computer end or the mobile phone end, so that the personal privacy can be well protected in work or life.
Fig. 1 is a schematic view illustrating an application scenario of a data transmission method and apparatus according to an embodiment of the present invention. The scheme of the embodiment of the invention can comprise the following steps: a server 100, a first terminal 200 and a second terminal 300. In the scheme of the embodiment of the invention, when the data to be synchronized in the first terminal is sent to the second terminal, the related information of the contact person in the contact person protection list associated with the second terminal cannot be synchronized to the second terminal. The user can store the private contact in the contact protection list according to the requirement of the user. Therefore, the method of the embodiment of the invention can protect the safety of the personal information of the user under the condition that the multi-terminal logs in the social account.
The above-mentioned terminals include, but are not limited to, devices such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like. Social software includes, but is not limited to: facebook, WhatsApp, Messenger, WeChat, and the like.
It should be noted that the solution of the embodiment of the present invention may include a plurality of terminals, and the number of the terminals may be set according to actual requirements. Under the condition that the social software logs in at a plurality of terminals, such as the social software which logs in the same account in different mobile phones, different computers or different PADs, the method provided by the embodiment of the invention can be used for ensuring the safety of the privacy information of the user.
Referring to fig. 2, fig. 2 is a schematic flowchart of a data transmission method provided in an embodiment of the present invention, where the method is applied in a server, and the method includes:
s201, when the first terminal logs in successfully, a contact person protection list associated with a second terminal is obtained; and the second terminal successfully logs in the server.
The client of the target application can be logged in through the first terminal and the second terminal. The successful login of the first terminal and the successful login of the second terminal can be realized by using the same account number to login the same target application at the first terminal and the second terminal for the user. The server is deployed for the target application, and the server is used for providing service support for the terminal logging in the target application client.
In the process of data synchronization of the terminal, the related information of the contact in the contact protection list is not synchronized to the terminal. The user can set the contact person with private self in the contact person wave protection list, and the system carries out data synchronization according to the contact person protection list set by the user.
S202, the data to be synchronized of each contact in the contact protection list in the first terminal is not sent to the second terminal.
Different terminals may be associated with different contact protection lists. For example, the contacts in the contact protection list associated with the computer where the user works may be friends and family of the user, and when the user uses the computer to work, the computer does not display the related information of the friends and family of the user. The contact persons in the contact person protection list associated with the PAD used by the user at home for leisure can be colleagues of the user, and when the user uses the PAD for leisure, the PAD cannot display related information sent by the colleagues of the user.
Optionally, the method further comprises:
and sending the data to be synchronized of each contact person in the first terminal, which is not in the contact person protection list, to the second terminal.
And the server performs data synchronization of the terminal through the contact person protection list. Specifically, if the contact is located in the contact protection list, the related information of the contact is not synchronized into the corresponding terminal. If the contact is not located in the contact protection list, the relevant information of the contact is synchronized to the corresponding terminal. Therefore, the server can synchronize the data of the terminal according to the setting of the user, and the information of the contact persons with the private information is only displayed in the terminal which is considered to be safe by the user.
Optionally, the method further comprises:
judging whether the second terminal has the related data of the protection contact; wherein the protected contact is in the contact protected list;
and if the data exists, controlling the second terminal to delete the related data of the protection contact in the second terminal.
If the user logs in the target application client through the second terminal, the second terminal is likely to store the related information of the protection contact. If the related data of the protection contact exists in the second terminal, the second terminal may display the related information of the protection contact, or other people may obtain the related information of the protection contact by inquiring the second terminal, so that the information of the protection contact which the user wants to hide is revealed. Therefore, it is necessary to delete the relevant data of the protected contact on the second terminal to protect the security of the user information.
Optionally, the determining whether the second terminal has related data for protecting the contact includes:
acquiring a contact list on the second terminal;
and if the contact person protection list and the contact person list on the second terminal have the matched contact person, determining that the related data of the protection contact person exist in the second terminal.
And acquiring a contact list of the target application on the second terminal, comparing the contact list on the second terminal with the contact protection list, and if a matched contact exists between the contact list and the contact protection list, indicating that the second terminal has the related information of the matched contact, and deleting the information on the second terminal. The embodiment of the invention provides a method for judging whether the related data of the protection contact exists in the second terminal, which can accurately judge whether the related data of the protection contact exists in the second terminal.
Optionally, before the controlling the second terminal to delete the data related to the protected contact in the second terminal, the method further includes:
controlling the second terminal to display prompt information; the prompt information is used for prompting a user whether to delete the related data of the protection contact in the second terminal;
and if the selection information input by the user based on the prompt information agrees to delete the relevant data of the protection contact in the second terminal, executing the step of controlling the second terminal to delete the relevant data of the protection contact in the second terminal.
And under the condition that the related data of the protection contact exists on the second terminal, sending a prompt to the user, and deleting the related information of the contact on the second terminal when the user agrees to delete the related information of the protection contact on the second terminal. The method of the embodiment of the invention can reduce the risk of mistakenly deleting the data by the system and further ensure the safety of the user data.
According to the method provided by the embodiment of the invention, the user can add the contact persons with the privacy into the contact person protection list, and the related data of each contact person in the contact person protection list in the first terminal cannot be synchronized into the second terminal. Therefore, the method provided by the embodiment of the invention can solve the problem that some private information of the user is easy to leak under the condition of multi-terminal login, and is convenient for the user to use the social software.
Referring to fig. 3, fig. 3 is a schematic flowchart of a data transmission method provided in an embodiment of the present invention, where the method is applied in a first terminal, and the method includes:
s301, acquiring a contact list of the first terminal; wherein, the contact list at least comprises one contact.
S302, displaying each contact in the contact list for the user to select.
S303, adding the contact person selected by the user into the contact person protection list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
The contact list of the first terminal is a contact list which is applied to the first terminal in a target mode. The method comprises the steps of obtaining and displaying a contact list of a first terminal on the first terminal, receiving a protection contact selected by a user based on the contact list, and generating a contact protection list. The contact person protection list is used for controlling that the contact person related information on the contact person list is not sent to the second terminal when the first terminal and the second terminal carry out information synchronization. The user can add the more private contact in the first terminal into the contact protection list, so that the purpose of ensuring that private information cannot be revealed by the second terminal is achieved.
Referring to fig. 4, fig. 4 is a schematic flowchart of a data transmission method provided in an embodiment of the present invention, where the method is applied in a second terminal, and the method includes:
s401, acquiring a contact list of the second terminal; wherein, the contact list at least comprises one contact.
S402, displaying each contact in the contact list for the user to select.
S403, adding the contact person selected by the user into the contact person protected list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
The contact list of the second terminal is a contact list which is applied to the second terminal in a target mode. And acquiring and displaying a contact list of the second terminal on the second terminal, receiving a protection contact selected by the user based on the contact list, and generating a contact protection list. The contact person protection list is used for controlling that the contact person related information on the contact person list is not sent to the second terminal when the first terminal and the second terminal carry out information synchronization. The user can add the more private contact in the second terminal to the contact protection list, so that the purpose of ensuring that private information cannot be revealed by the second terminal is achieved.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a data transmission device according to an embodiment of the present invention, where the data transmission device is used in a server, and as shown in fig. 5, the data transmission device includes:
an obtaining module 501, configured to obtain a contact protection list associated with a second terminal when a first terminal successfully logs in; the second terminal successfully logs in the server;
a sending module 502, configured to not send the data to be synchronized in the first terminal of each contact in the contact protection list to the second terminal.
Optionally, the sending module 502 is further configured to:
and sending the data to be synchronized of each contact person in the first terminal, which is not in the contact person protection list, to the second terminal.
Optionally, the apparatus further comprises:
a deleting module 503, configured to determine whether there is related data for protecting the contact in the second terminal; wherein the protected contact is in the contact protected list;
and if the data exists, controlling the second terminal to delete the related data of the protection contact in the second terminal.
Optionally, the deleting module 503 is specifically configured to:
acquiring a contact list on the second terminal;
and if the contact person protection list and the contact person list on the second terminal have the matched contact person, determining that the related data of the protection contact person exist in the second terminal.
Optionally, the apparatus further comprises:
a display module 504, configured to control the second terminal to display a prompt message; the prompt information is used for prompting a user whether to delete the related data of the protection contact in the second terminal;
and if the selection information input by the user based on the prompt information agrees to delete the relevant data of the protection contact in the second terminal, executing the step of controlling the second terminal to delete the relevant data of the protection contact in the second terminal.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a data transmission device according to an embodiment of the present invention, where the device is used for a first terminal, and as shown in fig. 6, the data transmission device includes:
an obtaining module 601, configured to obtain a contact list of the first terminal; wherein, the contact list at least comprises one contact;
a display module 602, configured to display each contact in the contact list for a user to select;
an adding module 603, configured to add a contact selected by a user to the contact protection list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention, where the apparatus is used for a second terminal, and as shown in fig. 7, the data transmission apparatus includes:
an obtaining module 701, configured to obtain a contact list of the second terminal; wherein, the contact list at least comprises one contact;
a display module 702, configured to display each contact in the contact list for a user to select;
an adding module 703, configured to add a contact selected by a user to the contact protected list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
It is clear to a person skilled in the art that the solution according to the embodiments of the invention can be implemented by means of software and/or hardware. The "unit" and "module" in this specification refer to software and/or hardware that can perform a specific function independently or in cooperation with other components, where the hardware may be, for example, an FPGA (Field-Programmable Gate Array), an IC (Integrated Circuit), or the like.
Each processing unit and/or module according to the embodiments of the present invention may be implemented by an analog circuit that implements the functions described in the embodiments of the present invention, or may be implemented by software that executes the functions described in the embodiments of the present invention.
Embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the data transmission method. The computer-readable storage medium may include, but is not limited to, any type of disk including floppy disks, optical disks, DVD, CD-ROMs, microdrive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
Referring to fig. 8, a schematic structural diagram of an electronic device according to an embodiment of the present invention is shown, where the electronic device may be used to implement the data transmission method provided in the foregoing embodiment. Specifically, the method comprises the following steps:
the memory 1020 may be used to store software programs and modules, and the processor 1080 executes various functional applications and data processing by operating the software programs and modules stored in the memory 1020. The memory 1020 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal device, and the like. Further, the memory 1020 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 1020 may also include a memory controller to provide access to memory 1020 by processor 1080 and input unit 1030.
The input unit 1030 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input unit 1030 may include a touch-sensitive surface 1031 (e.g., a touch screen, a touchpad, or a touch frame). The touch-sensitive surface 1031, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (such as operations by a user on or near the touch-sensitive surface 1031 using any suitable object or attachment, such as a finger, a stylus, etc.) on or near the touch-sensitive surface 1031 and drive the corresponding connection device according to a preset program. Optionally, the touch sensitive surface 1031 may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1080, and can receive and execute commands sent by the processor 1080. In addition, the touch-sensitive surface 1031 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves.
The display unit 1040 may be used to display information input by or provided to a user and various graphical user interfaces of the terminal device, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 1040 may include a Display panel 1041, and optionally, the Display panel 1041 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface 1031 may overlay the display panel 1041, and when a touch operation is detected on or near the touch-sensitive surface 1031, the touch operation is transmitted to the processor 1080 for determining the type of the touch event, and the processor 1080 then provides a corresponding visual output on the display panel 1041 according to the type of the touch event. Although the touch-sensitive surface 1031 and the display panel 1041 may implement input and output functions as two separate components, in some embodiments, the touch-sensitive surface 1031 may be integrated with the display panel 1041 to implement input and output functions.
The processor 1080 is a control center of the terminal device, connects various parts of the whole terminal device by using various interfaces and lines, and executes various functions of the terminal device and processes data by operating or executing software programs and/or modules stored in the memory 1020 and calling data stored in the memory 1020, thereby monitoring the whole terminal device. Optionally, processor 1080 may include one or more processing cores; processor 1080 may integrate an application processor that handles operating system, user interfaces, applications, etc. and a modem processor that handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 1080.
Specifically, in this embodiment, the display unit of the terminal device is a touch screen display, the terminal device further includes a memory and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the one or more processors, and the one or more programs include steps for implementing the data transmission method.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
All functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A data transmission method is applied to a server, and the method comprises the following steps:
when the first terminal successfully logs in, acquiring a contact person protection list associated with the second terminal; the second terminal successfully logs in the server;
and not sending the data to be synchronized of each contact in the contact protection list in the first terminal to the second terminal.
2. The method of claim 1, further comprising:
and sending the data to be synchronized of each contact person in the first terminal, which is not in the contact person protection list, to the second terminal.
3. The method of claim 1, further comprising:
judging whether the second terminal has the related data of the protection contact; wherein the protected contact is in the contact protected list;
and if the data exists, controlling the second terminal to delete the related data of the protection contact in the second terminal.
4. The method of claim 3, wherein the determining whether the data related to the protected contact exists in the second terminal comprises:
acquiring a contact list on the second terminal;
and if the contact person protection list and the contact person list on the second terminal have the matched contact person, determining that the related data of the protection contact person exist in the second terminal.
5. The method according to claim 3, wherein before the controlling the second terminal to delete the data related to the protected contact in the second terminal, the method further comprises:
controlling the second terminal to display prompt information; the prompt information is used for prompting a user whether to delete the related data of the protection contact in the second terminal;
and if the selection information input by the user based on the prompt information agrees to delete the relevant data of the protection contact in the second terminal, executing the step of controlling the second terminal to delete the relevant data of the protection contact in the second terminal.
6. A data transmission method, applied to a first terminal, the method comprising:
acquiring a contact list of the first terminal; wherein, the contact list at least comprises one contact;
displaying each contact in the contact list for a user to select;
adding the contact person selected by the user into the contact person protected list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
7. A data transmission apparatus, wherein the apparatus is applied to a server, the apparatus comprising:
the acquisition module is used for acquiring a contact person protection list associated with a second terminal when the first terminal successfully logs in; the second terminal successfully logs in the server;
and the sending module is used for not sending the data to be synchronized of each contact in the contact protection list in the first terminal to the second terminal.
8. A data transmission apparatus, wherein the apparatus is applied to a first terminal, the apparatus comprising:
the acquisition module is used for acquiring a contact list of the first terminal; wherein, the contact list at least comprises one contact;
the display module is used for displaying each contact in the contact list for the user to select;
the adding module is used for adding the contact person selected by the user into the contact person protected list; the contact person protection list is used for controlling the server not to send the data to be synchronized of each contact person in the contact person protection list in the first terminal to the second terminal when the first terminal successfully logs in.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1-6 are implemented when the program is executed by the processor.
CN202010234470.XA 2020-03-30 2020-03-30 Data transmission method, device, storage medium and related equipment Pending CN111556021A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010234470.XA CN111556021A (en) 2020-03-30 2020-03-30 Data transmission method, device, storage medium and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010234470.XA CN111556021A (en) 2020-03-30 2020-03-30 Data transmission method, device, storage medium and related equipment

Publications (1)

Publication Number Publication Date
CN111556021A true CN111556021A (en) 2020-08-18

Family

ID=72003776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010234470.XA Pending CN111556021A (en) 2020-03-30 2020-03-30 Data transmission method, device, storage medium and related equipment

Country Status (1)

Country Link
CN (1) CN111556021A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069137A (en) * 2020-09-02 2020-12-11 北京百度网讯科技有限公司 Method and device for generating information, electronic equipment and computer readable storage medium

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100241652A1 (en) * 2009-03-13 2010-09-23 Humera Fasihuddin System and method for synchronizing password-protected information across an arbitrary set of networks
CN102368764A (en) * 2011-09-10 2012-03-07 上海量明科技发展有限公司 Method for carrying out communication through multiple points of presence, system and client thereof
WO2014071734A1 (en) * 2012-11-12 2014-05-15 Tencent Technology (Shenzhen) Company Limited Method and apparatus for message synchronization in instant messaging applications
WO2015014310A1 (en) * 2013-08-02 2015-02-05 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and server for displaying information
CN105207900A (en) * 2015-10-28 2015-12-30 上海季诺金融信息服务有限公司 Secret information transmission method based on instant messaging platform
CN105471814A (en) * 2014-07-29 2016-04-06 小米科技有限责任公司 Account number management method and account number management device
CN106230647A (en) * 2016-09-14 2016-12-14 广东欧珀移动通信有限公司 A kind of message treatment method, equipment, server and message handling system
CN106302130A (en) * 2016-09-14 2017-01-04 广东欧珀移动通信有限公司 The method and device that the difference of a kind of chat message synchronizes
CN106357512A (en) * 2016-09-14 2017-01-25 广东欧珀移动通信有限公司 Chat message differentiated synchronization method and chat message differentiated synchronization device
CN106411703A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Information synchronization method and apparatus
CN106412202A (en) * 2016-11-04 2017-02-15 上海传英信息技术有限公司 Contact person hiding method and user terminal
CN106453514A (en) * 2016-09-14 2017-02-22 广东欧珀移动通信有限公司 Chat information distinguishing synchronization method and device
CN106533917A (en) * 2016-11-24 2017-03-22 腾讯科技(深圳)有限公司 Relation chain processing method, device and system
CN106790926A (en) * 2017-02-16 2017-05-31 深圳市金立通信设备有限公司 A kind of contact management method and terminal
CN107154890A (en) * 2016-03-02 2017-09-12 腾讯科技(深圳)有限公司 Method, the apparatus and system of contact person is added in social networks
CN107395850A (en) * 2017-09-05 2017-11-24 深圳市影踪科技有限公司 A kind of social communication information guard method, device and computer-readable recording medium
CN107506198A (en) * 2017-08-25 2017-12-22 维沃移动通信有限公司 The display methods and mobile terminal of a kind of mobile terminal
CN110619199A (en) * 2019-09-25 2019-12-27 深圳传音控股股份有限公司 Private information protection method and device for private contact person and readable storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100241652A1 (en) * 2009-03-13 2010-09-23 Humera Fasihuddin System and method for synchronizing password-protected information across an arbitrary set of networks
CN102368764A (en) * 2011-09-10 2012-03-07 上海量明科技发展有限公司 Method for carrying out communication through multiple points of presence, system and client thereof
WO2014071734A1 (en) * 2012-11-12 2014-05-15 Tencent Technology (Shenzhen) Company Limited Method and apparatus for message synchronization in instant messaging applications
WO2015014310A1 (en) * 2013-08-02 2015-02-05 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and server for displaying information
CN105471814A (en) * 2014-07-29 2016-04-06 小米科技有限责任公司 Account number management method and account number management device
CN105207900A (en) * 2015-10-28 2015-12-30 上海季诺金融信息服务有限公司 Secret information transmission method based on instant messaging platform
CN107154890A (en) * 2016-03-02 2017-09-12 腾讯科技(深圳)有限公司 Method, the apparatus and system of contact person is added in social networks
CN106357512A (en) * 2016-09-14 2017-01-25 广东欧珀移动通信有限公司 Chat message differentiated synchronization method and chat message differentiated synchronization device
CN106302130A (en) * 2016-09-14 2017-01-04 广东欧珀移动通信有限公司 The method and device that the difference of a kind of chat message synchronizes
CN106411703A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Information synchronization method and apparatus
CN106453514A (en) * 2016-09-14 2017-02-22 广东欧珀移动通信有限公司 Chat information distinguishing synchronization method and device
CN106230647A (en) * 2016-09-14 2016-12-14 广东欧珀移动通信有限公司 A kind of message treatment method, equipment, server and message handling system
CN106412202A (en) * 2016-11-04 2017-02-15 上海传英信息技术有限公司 Contact person hiding method and user terminal
CN106533917A (en) * 2016-11-24 2017-03-22 腾讯科技(深圳)有限公司 Relation chain processing method, device and system
CN106790926A (en) * 2017-02-16 2017-05-31 深圳市金立通信设备有限公司 A kind of contact management method and terminal
CN107506198A (en) * 2017-08-25 2017-12-22 维沃移动通信有限公司 The display methods and mobile terminal of a kind of mobile terminal
CN107395850A (en) * 2017-09-05 2017-11-24 深圳市影踪科技有限公司 A kind of social communication information guard method, device and computer-readable recording medium
CN110619199A (en) * 2019-09-25 2019-12-27 深圳传音控股股份有限公司 Private information protection method and device for private contact person and readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069137A (en) * 2020-09-02 2020-12-11 北京百度网讯科技有限公司 Method and device for generating information, electronic equipment and computer readable storage medium
CN112069137B (en) * 2020-09-02 2024-05-17 阿波罗智联(北京)科技有限公司 Method, device, electronic equipment and computer readable storage medium for generating information

Similar Documents

Publication Publication Date Title
US10057627B2 (en) Method, apparatus and system for displaying bullet screen information
US11269981B2 (en) Information displaying method for terminal device and terminal device
US11934505B2 (en) Information content viewing method and terminal
US10133388B2 (en) Input device
EP3082031A1 (en) Portable electronic device including touch-sensitive display and method of providing access to an application
CN109194818B (en) Information processing method and terminal
EP4083780A1 (en) Interface sharing method and electronic devices
US10652287B2 (en) Method, device, and system for managing information recommendation
CN107193664B (en) Message display method and device and mobile terminal
CN109155750B (en) Communication method and device
WO2014206143A1 (en) Method, apparatus and device for displaying number of unread messages
CN106453925B (en) Information transmission method and mobile terminal
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN106951143B (en) Method and device for hiding application icons
WO2018095216A1 (en) Relationship chain processing method, terminal and storage medium
US20080160960A1 (en) Remote processing device management
US11582179B2 (en) Information search method, terminal, network device, and system
US11989405B2 (en) Screen locking method and apparatus
CN108153460B (en) Icon hiding method and terminal
CN103279272A (en) Method and device for starting application program in electronic device
CN107506198B (en) Display method of mobile terminal and mobile terminal
CN105893826A (en) Message display method and intelligent terminal based on fingerprint information
CN111656347A (en) Project display method and terminal
WO2017193645A1 (en) Method and apparatus for displaying data, and terminal
CN108540645B (en) Mobile terminal operation method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200818

RJ01 Rejection of invention patent application after publication