CN111556199A - Method and equipment for presenting background in social application - Google Patents

Method and equipment for presenting background in social application Download PDF

Info

Publication number
CN111556199A
CN111556199A CN202010339178.4A CN202010339178A CN111556199A CN 111556199 A CN111556199 A CN 111556199A CN 202010339178 A CN202010339178 A CN 202010339178A CN 111556199 A CN111556199 A CN 111556199A
Authority
CN
China
Prior art keywords
background
session
user
decryption
context
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010339178.4A
Other languages
Chinese (zh)
Other versions
CN111556199B (en
Inventor
向康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN202010339178.4A priority Critical patent/CN111556199B/en
Publication of CN111556199A publication Critical patent/CN111556199A/en
Application granted granted Critical
Publication of CN111556199B publication Critical patent/CN111556199B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72427User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting games or graphical animations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application aims to provide a method and equipment for presenting a background in a social application, wherein the method comprises the following steps: responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background; and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode. According to the scheme of the application, the curiosity of the user of the social application can be aroused through the shade of the chat background, the chat willingness of the user is enhanced, and the user is helped to establish acquaintance social contact as soon as possible.

Description

Method and equipment for presenting background in social application
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for presenting context in social applications.
Background
With the rapid development of mobile internet and domestic society, economy and culture, the social and entertainment requirements of people on mobile terminals are more and more strong, and in recent years, social applications are more and more widely used and become important tools for people to carry out social relations.
Disclosure of Invention
One object of the present application is to provide a method and apparatus for presenting a background in a social application.
According to an aspect of the present application, there is provided a method for presenting a background in a social application, applied to a first user equipment, the method comprising:
responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to an aspect of the present application, there is provided a method for presenting a background in a social application, applied to a second user equipment, the method including:
receiving a first background and an encryption mode corresponding to the first background, wherein the first background is sent by first user equipment through a server, and the first background is set by a first user in the first user equipment for a target session;
according to the encryption mode, performing encryption operation on the first background to generate a second background;
and presenting the second background in a session page corresponding to the target session.
According to one aspect of the application, a method for presenting a background in a social application is provided, which is applied to a server and comprises the following steps:
receiving a first background sent by first user equipment and an encryption mode corresponding to the first background, wherein the first background is set for a target session by a first user in the first user equipment;
and sending the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session so as to present a second background in a session page corresponding to the target session in the second user equipment, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to one aspect of the application, a method for presenting a background in a social application is provided, which is applied to a server and comprises the following steps:
responding to a background setting triggering event aiming at a target session in a social application, and determining a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
and sending the fourth context and the encryption mode corresponding to the fourth context to first user equipment corresponding to the at least one first user so as to present a fifth context in a session page corresponding to the target session in the first user equipment, wherein the fifth context is generated by performing encryption operation on the fourth context according to the encryption mode.
According to one aspect of the application, a method for presenting a background in a social application is provided, which is applied to a server and comprises the following steps:
receiving a fourth background sent by a server and an encryption mode corresponding to the fourth background, wherein the fourth background is set by the server for a target session;
according to the encryption mode, performing encryption operation on the fourth background to generate a fifth background;
and presenting the fifth background in a session page corresponding to the target session.
According to an aspect of the present application, there is provided a first user device for presenting a context in a social application, the device comprising:
the system comprises a one-to-one module, a first background module and a second background module, wherein the one-to-one module is used for responding to background setting operation of a first user aiming at a target session in social application and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and a second module, configured to send the first context and the encryption manner to at least one second user in the target session via a server corresponding to the social application, so as to present a second context in a corresponding session page in second user equipment corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
According to an aspect of the present application, there is provided a second user equipment for presenting a context in a social application, the apparatus comprising:
a first background and an encryption mode corresponding to the first background, wherein the first background is set by a first user in the first user equipment for a target session;
a second module, configured to perform an encryption operation on the first background according to the encryption manner, and generate a second background;
and a second and third module for presenting the second background in a session page corresponding to the target session.
According to one aspect of the present application, there is provided a server for presenting a context in a social application, the server comprising:
a third module, configured to receive a first context sent by a first user equipment and an encryption manner corresponding to the first context, where the first context is set for a target session by a first user in the first user equipment;
and a third module, configured to send the first context and the encryption manner to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
According to one aspect of the present application, there is provided a server for presenting a context in a social application, the server comprising:
a fourth module, configured to determine, in response to a trigger event set for a context of a target session in a social application, a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context;
a fourth-second module, configured to send the fourth context and the encryption mode corresponding to the fourth context to a first user device corresponding to the at least one first user, so as to present a fifth context in a session page corresponding to the target session in the first user device, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode.
According to an aspect of the present application, there is provided a first user device for presenting a context in a social application, the device comprising:
a fifthly module, configured to receive a fourth background sent by a server and an encryption manner corresponding to the fourth background, where the fourth background is set by the server for a target session;
a fifth-second module, configured to perform an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background;
and a fifthly and a thirteen module, which is used for presenting the fifth background in the session page corresponding to the target session.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a first background and an encryption mode corresponding to the first background, wherein the first background is sent by first user equipment through a server, and the first background is set by a first user in the first user equipment for a target session;
according to the encryption mode, performing encryption operation on the first background to generate a second background;
and presenting the second background in a session page corresponding to the target session.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a first background sent by first user equipment and an encryption mode corresponding to the first background, wherein the first background is set for a target session by a first user in the first user equipment;
and sending the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session so as to present a second background in a session page corresponding to the target session in the second user equipment, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to a background setting triggering event aiming at a target session in a social application, and determining a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
and sending the fourth context and the encryption mode corresponding to the fourth context to first user equipment corresponding to the at least one first user so as to present a fifth context in a session page corresponding to the target session in the first user equipment, wherein the fifth context is generated by performing encryption operation on the fourth context according to the encryption mode.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a fourth background sent by a server and an encryption mode corresponding to the fourth background, wherein the fourth background is set by the server for a target session;
according to the encryption mode, performing encryption operation on the fourth background to generate a fifth background;
and presenting the fifth background in a session page corresponding to the target session.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
receiving a first background and an encryption mode corresponding to the first background, wherein the first background is sent by first user equipment through a server, and the first background is set by a first user in the first user equipment for a target session;
according to the encryption mode, performing encryption operation on the first background to generate a second background;
and presenting the second background in a session page corresponding to the target session.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
receiving a first background sent by first user equipment and an encryption mode corresponding to the first background, wherein the first background is set for a target session by a first user in the first user equipment;
and sending the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session so as to present a second background in a session page corresponding to the target session in the second user equipment, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
responding to a background setting triggering event aiming at a target session in a social application, and determining a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
and sending the fourth context and the encryption mode corresponding to the fourth context to first user equipment corresponding to the at least one first user so as to present a fifth context in a session page corresponding to the target session in the first user equipment, wherein the fifth context is generated by performing encryption operation on the fourth context according to the encryption mode.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
receiving a fourth background sent by a server and an encryption mode corresponding to the fourth background, wherein the fourth background is set by the server for a target session;
according to the encryption mode, performing encryption operation on the fourth background to generate a fifth background;
and presenting the fifth background in a session page corresponding to the target session.
Compared with the prior art, the method and the device have the advantages that the second background generated by performing encryption operation on the first background is presented on the conversation page, so that the user can only see the encrypted second background at the initial stage of chat, and the second background can be gradually decrypted along with the deepening of the chat among the users, so that the curiosity of the social application user is aroused through the shade of the chat background, the chat willingness of the user is enhanced, the chat interaction frequency of the user is increased, the aim of clearing the chat background is fulfilled, the chat interaction frequency among the users is certainly increased through the process, and the acquaintance social interaction of the user can be built as soon as possible.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for presenting context in a social application applied to a first user device, according to one embodiment of the present application;
FIG. 2 illustrates a flow diagram of a method for presenting context in a social application applied to a second user device, according to one embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method for presenting context in a social application applied to a server according to one embodiment of the present application;
FIG. 4 illustrates a flow diagram of a method for presenting context in a social application applied to a server according to one embodiment of the present application;
FIG. 5 illustrates a flow diagram of a method for presenting context in a social application applied to a first user device, according to one embodiment of the present application;
FIG. 6 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application;
FIG. 7 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application;
FIG. 8 illustrates a first user equipment structure diagram presenting context in a social application, according to one embodiment of the present application;
FIG. 9 illustrates a second user equipment structure diagram for presenting context in a social application, according to one embodiment of the present application;
FIG. 10 illustrates a server structure diagram for presenting context in a social application, according to one embodiment of the present application;
FIG. 11 illustrates a server structure diagram for presenting context in a social application, according to one embodiment of the present application;
FIG. 12 illustrates a first user equipment structure diagram presenting context in a social application, according to one embodiment of the present application;
FIG. 13 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 shows a flowchart of a method for presenting a background in a social application applied to a first user equipment according to an embodiment of the present application, the method comprising steps S11 and S12. In step S11, in response to a background setting operation of a first user for a target session in a social application, a first user device obtains a first background set by the first user and an encryption mode corresponding to the first background; in step S12, the first user device sends the first context and the encryption manner to at least one second user in the target session via the server corresponding to the social application, so as to present a second context in a corresponding session page in the second user device corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
In step S11, the first user device, in response to a context setting operation of the first user for the target session in the social application, obtains a first context set by the first user and an encryption manner corresponding to the first context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setting operation includes, but is not limited to, the first user selecting an existing picture from the first user device as the context of the target session, and the first user taking a picture through a camera on the first user device as the context of the target session. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
In step S12, the first user device sends the first context and the encryption manner to at least one second user in the target session via the server corresponding to the social application, so as to present a second context in a corresponding session page in the second user device corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, the first user device sends the first context and the encryption mode set by the first user to at least one second user in the target session via the server, and presents a second context generated after encrypting the first context according to the encryption mode in a session page of the second user, where if the target session is a private chat session, the second user is a session object of the private chat session, and if the target session is a group session where the first user is located, the second user may be all or part of other users in the group session except the first user. In some embodiments, the first user may present, in the session page, the second background generated after encrypting the first background according to the encryption manner, in synchronization with the second user, at this time, decryption schedules of the second backgrounds of the first user and the second user are kept synchronized, and the first user may have a portal in the social application to view the first background before encryption. In some embodiments, the first user may also present the first context before encryption in the conversation page, and the first user may have a portal in the social application to view the decryption progress of the second context of the second user.
Fig. 2 shows a flowchart of a method for presenting a background in a social application applied to a second user equipment according to an embodiment of the present application, the method including step S21, step S22, and step S23. In step S21, the second user equipment receives a first context and an encryption manner corresponding to the first context, where the first context is set for a target session by the first user in the first user equipment, and the first context is sent by the first user equipment via the server; in step S22, the second user equipment performs an encryption operation on the first background according to the encryption manner to generate a second background; in step S23, the second user equipment presents the second background in the session page corresponding to the target session.
In step S21, the second user equipment receives the first context and the encryption manner corresponding to the first context, which are sent by the first user equipment via the server, where the first context is set in the first user equipment for the target session by the first user. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the second user via the server. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
In step S22, the second user equipment performs an encryption operation on the first background according to the encryption method to generate a second background. In some embodiments, the second user equipment encrypts the first background according to an encryption mode set by the first user and sent by the server, generates a second background, and presents the second background in a session page corresponding to the target session.
In step S23, the second user equipment presents the second background in the session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the second background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a third background, then the session page is updated, the third background is presented in the session page, for example, the decryption progress information is 50%, and a half region in the second background is decrypted to generate the third background and present in the session page.
In some embodiments, the method further comprises: the second user equipment acquires decryption progress information corresponding to the second background; according to the decryption progress information and the decryption mode corresponding to the encryption mode, performing decryption operation on the second background to generate a third background; and updating the session page, and presenting the third background in the session page. In some embodiments, the decryption progress information is used to indicate a percentage, e.g., 50%, of the decrypted area in the first background to the entire area of the second background. In some embodiments, if the encryption method is fuzzy encryption, the corresponding decryption method is deblurring, and if the encryption method is mask encryption, the corresponding decryption method is unmasking. In some embodiments, according to the decryption progress information, a partial area in the second background is decrypted to generate a third background, then the session page is updated, the third background is presented in the session page, for example, the decryption progress information is 50%, and a half area in the second background is decrypted to generate the third background and is presented in the session page.
In some embodiments, the method further comprises: the second user equipment acquires decryption area sequence information corresponding to the second background, wherein the decryption area sequence information comprises decryption orders corresponding to a plurality of areas in the second background; wherein, the executing decryption operation on the second background according to the decryption progress information and the decryption mode corresponding to the encryption mode to generate a third background comprises: and decrypting one or more areas in the second background according to the decryption progress information, the decryption mode corresponding to the encryption mode and the decryption area sequence information to generate a third background, wherein the decryption area sequence information comprises decryption orders corresponding to the areas in the second background. In some embodiments, the decryption Area order information of the second background is used to indicate a decryption order of several sub-areas into which the entire Area of the second background is divided, for example, the entire Area of the second background is divided into 4 sub-areas, areas 1, Area2, Area3, and Area4, and at this time, the decryption Area order information may be "sequentially decrypting the second background in the decryption order of Area2, Area1, Area4, and Area 3". In some embodiments, the decryption progress information is 50%, and the decryption Area sequence information may be "sequentially decrypt the second background in the decryption order of Area2, Area1, Area4, and Area 3", and decrypt the Area2 and the Area1 in the second background to generate the third background.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: and receiving decryption progress information which is sent by the server and corresponds to the second background. In some embodiments, the decryption progress information of the second background is determined by the server and then sent to the second user.
In some embodiments, the method further comprises: and the second user equipment receives the decryption area sequence information sent by the server. In some embodiments, the server determines the decryption region sequence information and sends the decryption region sequence information to the second user, or the first user sets the decryption region sequence information and sends the decryption region sequence information to the second user via the server.
In some embodiments, the method further comprises: and if the decryption progress information indicates that the second background is completely decrypted, the second user equipment updates the session page and presents the first background on the session page. In some embodiments, if the decryption progress information indicates that the percentage of the decrypted area in the second background to the whole area of the second background reaches 100%, the session page is updated, and the first background is directly presented in the session page.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: receiving session frequency information which is sent by a server and corresponds to the target session; and determining the decryption progress information of the second background according to the session frequency information. In some embodiments, the session frequency information includes, but is not limited to, session message sending frequency information and sending number information of the target session, and the session frequency information may be used to characterize the activity level of the target session, for example, the session frequency information may be the number of session message sending times (e.g., 100) of the target session within a predetermined time (e.g., the last day) and may also be the session message sending frequency (e.g., 1 session message is sent every 5 minutes on average or 10 session messages are sent every minute on average) of the target session within a predetermined time (e.g., the last week). In some embodiments, the first user determines the decryption progress information of the second background according to the session frequency information of the target session sent by the server, and the higher the activity degree of the target session represented by the session frequency information is, the greater the decryption progress of the second background is. In some embodiments, the session frequency information may be an overall session frequency of the target session, if the target session is a private chat session between the first user and the second user, the session frequency information is the overall session frequency between the first user and the second user, if the target session is a group session where the first user is located, the session frequency information is the overall session frequency of all group members in the group session, at this time, the session frequency information received by each user and sent by the server is the same, and thus the determined decryption progress information is also the same. In some embodiments, the session frequency information may also be the respective speaking frequency of each user in the target session, the respective speaking frequency of each user is independent of each other, if the target session is a private chat session between the first user and the second user, the session frequency information is the speaking frequency of the first user or the second user, if the target session is a group session where the first user is located, the session frequency information is the speaking frequency of each group member in the group session, at this time, the session frequency information received by each user, that is, the speaking frequency of the user itself, sent by the server is independent of each other, and thus the determined decryption progress information is also independent of each other.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. In some embodiments, the predetermined re-encryption conditions include, but are not limited to, the current liveness of the target session being less than or equal to a predetermined liveness threshold, the average liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, the maximum or minimum liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, and the degree of decrease in liveness of the target session over the last predetermined time being greater than or equal to the predetermined decrease threshold. In some embodiments, if it is determined that the liveness of the target session meets the predetermined re-encryption condition according to the session frequency information, at this time, the decryption progress needs to be backed off, the areas needing re-encryption in one or more decrypted areas in the second background are determined first, and then the decryption progress information of the second background is determined according to the areas needing re-encryption, and the decryption progress of the second background is determined to be smaller when the number of the areas needing re-encryption is larger or the ratio of the areas to the whole area of the second background is larger.
In some embodiments, the method further comprises: and if the conversation frequency information is larger than or equal to the preset frequency threshold information, the second user equipment updates the conversation page and presents the first background on the conversation page. In some embodiments, if the received session frequency information sent by the server is greater than or equal to the predetermined frequency threshold information, the session page is updated, and the first background is directly presented in the session page.
In some embodiments, the encryption means comprises mask encryption and/or fuzzy encryption. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
Fig. 3 shows a flowchart of a method for presenting a background in a social application applied to a server according to an embodiment of the present application, and the method includes steps S31 and S32. In step S31, the server receives a first context and an encryption method corresponding to the first context, where the first context is set by a first user in the first user equipment for a target session, and the first context is sent by the first user equipment; in step S32, the server sends the first context and the encryption scheme to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
In step S31, the server receives a first context and an encryption method corresponding to the first context, where the first context is set by a first user in the first user equipment for a target session, and the first context is sent by the first user equipment. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the server.
In step S32, the server sends the first context and the encryption scheme to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
In some embodiments, the method further comprises step S33 (not shown). In step S33, the server obtains decryption area sequence information, where the decryption area sequence information includes a plurality of areas in the second background and decryption sequences corresponding to the areas; and sending the decryption area sequence information to the second user equipment. In some embodiments, the decryption Area order information is used to indicate a decryption order of several sub-areas into which the entire Area of the second background is divided, for example, the entire Area of the second background is divided into 4 sub-areas, areas Area1, Area2, Area3, and Area4, and at this time, the decryption Area order information may be "sequentially decrypt the second background in the decryption order of Area2, Area1, Area4, and Area 3". In some embodiments, the decryption area sequence information may be sent to the second user via the server after the first user has set the decryption area sequence information, or may be sent to the second user after the server automatically determines the decryption area sequence information according to the first context, for example, the server performs a picture recognition operation on the first context and automatically determines the decryption area sequence information according to a recognition result.
In some embodiments, the step S33 includes: and the server receives the decryption area sequence information which is sent by the first user equipment and is set by the first user. In some embodiments, the decryption area sequence information may be sent to the second user via the server after being set by the first user.
In some embodiments, the step S33 includes: and the server identifies the first background and determines the sequence information of the decryption area according to the identification result. In some embodiments, the server automatically determines the decryption region sequence information by performing a picture recognition operation on the first background and according to the recognition result. For example, the first background is a personal photograph, by performing a picture recognition operation on the personal photograph, the entire area of the first background is divided into 4 sub-areas, a leg area, a hand area, a chest area, and a head area according to the recognition result, and the decrypted area order information is determined to be "sequentially decrypted in the order of decryption of the hand area, the leg area, the chest area, and the head area".
In some embodiments, identifying the first background and determining the decryption region order information according to the identification result includes: identifying the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area; and sequencing the plurality of areas according to the importance degree of each area to obtain the decryption area sequence information. In some embodiments, the server performs a picture recognition operation on the first background to recognize a plurality of regions corresponding to the first background and a degree of importance corresponding to each region, then sorts the regions according to the degree of importance of each region, and sequentially decrypts the regions from high to low in order of the degree of importance. For example, the first background is a personal photograph, and by performing a picture recognition operation on the personal photograph, a plurality of regions corresponding to the first background, a leg region (importance degree 70), a hand region (importance degree 60), a chest region (importance degree 80), and a head region (importance degree 90) are recognized and then sorted according to the importance degree of each region, so that the decrypted region order information can be obtained as "sequentially decrypted in the order of decryption of the hand region, the leg region, the chest region, and the head region".
In some embodiments, identifying the first background, and obtaining a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: identifying type information corresponding to the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area according to the type information. In some embodiments, the image recognition operation is performed on the first background, the type information corresponding to the first background is obtained through recognition, the first background is divided into a plurality of regions according to the type information, and the importance degree corresponding to each region is obtained. For example, a picture recognition operation is performed through the first background, the type information of the first background is recognized as a person type, the first background is divided into a plurality of regions according to the type information, and the degree of importance corresponding to each region, a leg region (degree of importance 70), a hand region (degree of importance 60), a chest region (degree of importance 80), and a head region (degree of importance 90) are obtained.
In some embodiments, the obtaining, according to the type information, a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: and if the type information is the type of the person, determining a plurality of areas corresponding to the limb parts of the person, and determining the corresponding importance degree of each area according to the preset weight of the limb parts of the person. For example, if the type information of the first background is a human type, a plurality of regions corresponding to the limb portions of the human, a leg region, a hand region, a chest region, and a head region, are specified, and the degree of importance corresponding to each region, a leg region (degree of importance 70), a hand region (degree of importance 60), a chest region (degree of importance 80), and a head region (degree of importance 90) are specified in accordance with the predetermined weight of the limb portion of the human, leg (weight 0.7), hand (weight 0.6), chest (weight 0.8), and head (weight 0.9).
In some embodiments, the first background is a photograph of the first user. Preferably, the first background is a photograph of the first user.
In some embodiments, the method further comprises step S34 (not shown) and step S35 (not shown). In step S34, the server acquires session frequency information of the target session; in step S35, the server sends the session frequency information to the first user equipment and the second user equipment. In some embodiments, the session frequency information may be an overall session frequency of the target session, if the target session is a private chat session between the first user and the second user, the session frequency information is the overall session frequency between the first user and the second user, if the target session is a group session where the first user is located, the session frequency information is the overall session frequency of all group members in the group session, at this time, the session frequency information received by each user and sent by the server is the same, and thus the determined decryption progress information is also the same. In some embodiments, the session frequency information may also be the respective speaking frequency of each user in the target session, the respective speaking frequency of each user is independent of each other, if the target session is a private chat session between the first user and the second user, the session frequency information is the speaking frequency of the first user or the second user, if the target session is a group session where the first user is located, the session frequency information is the speaking frequency of each group member in the group session, at this time, the session frequency information received by each user, that is, the speaking frequency of the user itself, sent by the server is independent of each other, and thus the determined decryption progress information is also independent of each other. In some embodiments, the server may send the session frequency information to the first user and the second user at regular time, may send the session frequency information to the first user and the second user when the session frequency information is changed, and may return the session frequency information to the first user and the second user in response to a request for acquiring the session frequency information initiated by the first user or the second user.
In some embodiments, the step S34 includes at least one of: acquiring session frequency information of all users in the target session; acquiring the conversation frequency information of the first user and the at least one second user in the target conversation; and obtaining the speaking frequency information of the at least one second user in the target session. In some embodiments, the session frequency information includes, but is not limited to, session message sending frequency information and sending number information of the target session, and the session frequency information may be used to characterize the activity level of the target session, for example, the session frequency information may be the number of session message sending times (e.g., 100) of the target session within a predetermined time (e.g., the last day) and may also be the session message sending frequency (e.g., 1 session message is sent every 5 minutes on average or 10 session messages are sent every minute on average) of the target session within a predetermined time (e.g., the last week). In some embodiments, the session frequency information may be session frequency information of all users in the target session, for example, session frequency information of all users in a group session in which the first user is located, or session frequency information of the first user and the second user in a private chat session between the first user and the second user. In some embodiments, the session frequency information may be session frequency information of the first user and the second user in the target session. For example, the conversation frequency information of the first user and the second user in the group conversation of the first user. In some embodiments, the session frequency information may be speaking frequency information of the second user in the target session, for example, speaking frequency information of the second user in a group session in which the first user is located, or speaking frequency information of the second user in a private chat session between the first user and the second user.
In some embodiments, the method further comprises: the server determines decryption progress information of the second background according to the session frequency information; and sending the decryption progress information to the first user equipment and the second user equipment. In some embodiments, the server determines the decryption progress information of the second background according to the session frequency information of the target session, and the higher the activity degree of the target session represented by the session frequency information is, the greater the decryption progress of the second background is.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and determining a session frequency range in which the session frequency information falls, and taking a decryption progress corresponding to the session frequency range as decryption progress information of the second background. For example, the decryption progress corresponding to the session message sending frequency range 1-100 of the target session in the last day is 10%, the decryption progress corresponding to the session message sending frequency range 101-200 is 20%, the decryption progress corresponding to the session message sending frequency range 201-300 is 30%, and when the session frequency information is the session message sending frequency of the target session in the last day is 150, at this time, the session frequency range in which the session frequency information falls is 101-200, so that 20% of the decryption progress corresponding to the session frequency range 101-200 is used as the decryption progress information of the second context.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. In some embodiments, the predetermined re-encryption conditions include, but are not limited to, the current liveness of the target session being less than or equal to a predetermined liveness threshold, the average liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, the maximum or minimum liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, and the degree of decrease in liveness of the target session over the last predetermined time being greater than or equal to the predetermined decrease threshold. In some embodiments, if it is determined that the liveness of the target session meets the predetermined re-encryption condition according to the session frequency information, at this time, the decryption progress needs to be backed off, the areas needing re-encryption in one or more decrypted areas in the second background are determined first, and then the decryption progress information of the second background is determined according to the areas needing re-encryption, and the decryption progress of the second background is determined to be smaller when the number of the areas needing re-encryption is larger or the ratio of the areas to the whole area of the second background is larger.
Fig. 4 shows a flowchart of a method for presenting a background in a social application applied to a server according to an embodiment of the present application, and the method includes steps S41 and S42. In step S41, in response to a trigger event set for a context of a target session in a social application, a server determines a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context; in step S42, the server sends the fourth context and the encryption mode corresponding to the fourth context to the first user equipment corresponding to the at least one first user, so as to present a fifth context in the session page corresponding to the target session in the first user equipment, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode.
In step S41, in response to a trigger event set for a context of a target session in a social application, the server determines a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setup triggering event includes, but is not limited to, a new setup of a one-to-one private chat session between the first user and the second user, and a new joining of the first user to a group session. In some embodiments, the fourth context may be a private chat session object of the first user or a group member other than the first user in the group session in which the first user is located, which is uploaded to the server in advance, or may be any other context in the server. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
In step S42, the server sends the fourth context and the encryption mode corresponding to the fourth context to the first user equipment corresponding to the at least one first user, so as to present a fifth context in the session page corresponding to the target session in the first user equipment, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
Fig. 5 shows a flowchart of a method for presenting a background in a social application applied to a first user equipment according to an embodiment of the present application, the method comprising steps S51, S52 and S53. In step S51, the first user equipment receives a fourth context and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for a target session; in step S52, the first user equipment performs an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background; in step S53, the first user equipment presents the fifth background in the session page corresponding to the target session.
In step S51, the first user equipment receives a fourth context and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for the target session. In some embodiments, if the target session is a one-to-one private chat session, the first user is a session object in the private chat session, and if the target session is a group session, the first user may be a group member in the group session.
In step S52, the first user equipment performs an encryption operation on the fourth background according to the encryption manner, and generates a fifth background. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
In step S53, the first user equipment presents the fifth background in the session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the fifth background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a sixth background, then the session page is updated, the sixth background is presented in the session page, for example, the decryption progress information is 50%, a half region in the fifth background is decrypted to generate the sixth background and presented in the session page.
Compared with the prior art, the method and the device have the advantages that the second background generated by executing the encryption operation on the first background is presented on the conversation page, so that the user can only see the encrypted second background at the initial chat, and the second background can be gradually decrypted along with the deepening of the chat among the users, so that the curiosity of the instant messaging user is aroused through the shade of the chat background, the chat willingness of the user is enhanced, the chat interaction frequency of the user is increased, the aim of clearly seeing the chat background is fulfilled, the chat interaction frequency among the users is certainly increased through the process, and the acquaintance social contact of the user can be built as soon as possible.
FIG. 6 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application.
As shown in fig. 6, in step S61, in response to a context setting operation of a first user for a target session in a social application, a first user device obtains a first context set by the first user and an encryption manner corresponding to the first context, where step S61 is the same as or similar to step S11, and is not repeated here; in step S62, the first user equipment sends the first background and the encryption manner to a server corresponding to the social application, and step S62 is the same as or similar to step S12, which is not described herein again; in step S63, the server receives the first context and the encryption manner sent by the first user equipment, and sends the first context and the encryption manner to a second user equipment corresponding to at least one second user in the target session, where step S63 is the same as or similar to steps S31 and S32, and is not described herein again; in step S64, the second ue receives the first background and the encryption mode sent by the server, and step S64 is the same as or similar to step S21, which is not described herein again; in step S65, the second user equipment performs an encryption operation on the first background according to the encryption manner, generates a second background, and presents the second background in a session page corresponding to the target session, where step S65 is the same as or similar to steps S22 and S23, and is not described herein again.
FIG. 7 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application.
As shown in fig. 7, in step S71, in response to a trigger event set for the context of the target session in the social application, the server determines a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context, where step S71 is the same as or similar to step S41, and is not repeated here; in step S72, the server sends the fourth context and the encryption mode corresponding to the fourth context to the first user equipment corresponding to the at least one first user, where step S72 is the same as or similar to step S42, and is not described herein again; in step S73, the first user equipment receives the fourth background and the encryption mode sent by the server, and step S73 is the same as or similar to step S51, which is not described herein again; in step S74, the first user equipment performs an encryption operation on the fourth background according to the encryption manner to generate a fifth background, and presents the fifth background in a session page corresponding to the target session, where step S74 is the same as or similar to steps S52 and S53, and is not described herein again.
Fig. 8 shows a first user equipment structure diagram for presenting context in a social application according to an embodiment of the present application, the device comprising a one-module 11 and a two-module 12. A one-to-one module 11, configured to respond to a background setting operation of a first user for a target session in a social application, to obtain a first background set by the first user and an encryption manner corresponding to the first background; a secondary module 12, configured to send the first context and the encryption manner to at least one second user in the target session via a server corresponding to the social application, so as to present a second context in a corresponding session page in second user equipment corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
The one-to-one module 11 is configured to, in response to a context setting operation of a first user for a target session in a social application, obtain a first context set by the first user and an encryption mode corresponding to the first context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setting operation includes, but is not limited to, the first user selecting an existing picture from the first user device as the context of the target session, and the first user taking a picture through a camera on the first user device as the context of the target session. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
A secondary module 12, configured to send the first context and the encryption manner to at least one second user in the target session via a server corresponding to the social application, so as to present a second context in a corresponding session page in second user equipment corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, the first user device sends the first context and the encryption mode set by the first user to at least one second user in the target session via the server, and presents a second context generated after encrypting the first context according to the encryption mode in a session page of the second user, where if the target session is a private chat session, the second user is a session object of the private chat session, and if the target session is a group session where the first user is located, the second user may be all or part of other users in the group session except the first user. In some embodiments, the first user may present, in the session page, the second background generated after encrypting the first background according to the encryption manner, in synchronization with the second user, at this time, decryption schedules of the second backgrounds of the first user and the second user are kept synchronized, and the first user may have a portal in the social application to view the first background before encryption. In some embodiments, the first user may also present the first context before encryption in the conversation page, and the first user may have a portal in the social application to view the decryption progress of the second context of the second user.
Fig. 9 shows a second user equipment structure diagram for presenting a context in a social application according to an embodiment of the present application, the second user equipment structure diagram comprising a two-in-one module 21, a two-in-two module 22 and a two-in-three module 23. A first module 21, configured to receive a first context and an encryption manner corresponding to the first context, where the first context is set by a first user in a first user equipment for a target session, and the first context is sent by the first user equipment via a server; a second module 22, configured to perform an encryption operation on the first background according to the encryption manner, so as to generate a second background; a second and third module 23, configured to present the second background in a session page corresponding to the target session.
A first module 21, configured to receive a first context and an encryption manner corresponding to the first context, where the first context is set by a first user in a first user equipment for a target session, and the first context is sent by the first user equipment via a server. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the second user via the server. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
And a second-second module 22, configured to perform an encryption operation on the first background according to the encryption manner, so as to generate a second background. In some embodiments, the second user equipment encrypts the first background according to an encryption mode set by the first user and sent by the server, generates a second background, and presents the second background in a session page corresponding to the target session.
A second and third module 23, configured to present the second background in a session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the second background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a third background, then the session page is updated, the third background is presented in the session page, for example, the decryption progress information is 50%, and a half region in the second background is decrypted to generate the third background and present in the session page.
In some embodiments, the apparatus is further configured to: acquiring decryption progress information corresponding to the second background; according to the decryption progress information and the decryption mode corresponding to the encryption mode, performing decryption operation on the second background to generate a third background; and updating the session page, and presenting the third background in the session page. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: acquiring decryption area sequence information corresponding to the second background, wherein the decryption area sequence information comprises decryption orders corresponding to a plurality of areas and a plurality of areas in the second background; wherein, the executing decryption operation on the second background according to the decryption progress information and the decryption mode corresponding to the encryption mode to generate a third background comprises: and decrypting one or more areas in the second background according to the decryption progress information, the decryption mode corresponding to the encryption mode and the decryption area sequence information to generate a third background, wherein the decryption area sequence information comprises decryption orders corresponding to the areas in the second background. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: and receiving decryption progress information which is sent by the server and corresponds to the second background. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: and receiving the decryption area sequence information sent by the server. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: and if the decryption progress information indicates that the second background is completely decrypted, updating the session page, and presenting the first background on the session page. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: receiving session frequency information which is sent by a server and corresponds to the target session; and determining the decryption progress information of the second background according to the session frequency information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: and if the conversation frequency information is larger than or equal to the preset frequency threshold information, updating the conversation page, and presenting the first background on the conversation page. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the encryption means comprises mask encryption and/or fuzzy encryption. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
Fig. 10 shows a diagram of a server structure for presenting a background in a social application according to an embodiment of the present application, where the server includes a three-in-one module 31 and a three-in-two module 32. A third-to-first module 31, configured to receive a first context and an encryption manner corresponding to the first context, where the first context is set in a first user equipment for a target session by a first user; a third and second module 32, configured to send the first context and the encryption manner to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
A third module 31, configured to receive a first context sent by a first user equipment and an encryption manner corresponding to the first context, where the first context is set in the first user equipment for a target session by a first user. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the server.
A third and second module 32, configured to send the first context and the encryption manner to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
In some embodiments, the apparatus further comprises a triplex module 33 (not shown). A third module 33, configured to obtain decryption area sequence information, where the decryption area sequence information includes multiple areas in the second background and decryption sequences corresponding to the multiple areas; and sending the decryption area sequence information to the second user equipment. Here, the specific implementation of the three modules 33 is the same as or similar to the embodiment related to step S33 in fig. 3, and therefore, the detailed description is omitted, and the detailed implementation is incorporated herein by reference.
In some embodiments, the thirty-three module 33 is configured to: and receiving decryption area sequence information which is sent by the first user equipment and set by the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the thirty-three module 33 is configured to: and identifying the first background, and determining the sequence information of the decryption area according to the identification result. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, identifying the first background and determining the decryption region order information according to the identification result includes: identifying the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area; and sequencing the plurality of areas according to the importance degree of each area to obtain the decryption area sequence information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, identifying the first background, and obtaining a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: identifying type information corresponding to the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area according to the type information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the obtaining, according to the type information, a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: and if the type information is the type of the person, determining a plurality of areas corresponding to the limb parts of the person, and determining the corresponding importance degree of each area according to the preset weight of the limb parts of the person. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the first background is a photograph of the first user. Preferably, the first background is a photograph of the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus further includes a thirty-four module 34 (not shown) and a thirty-five module 35 (not shown). A thirty-four module 34, configured to obtain session frequency information of the target session; a thirty-five module 35, configured to send the session frequency information to the first user equipment and the second user equipment. Here, the specific implementation manners of the thirty-four module 34 and the thirty-five module 35 are the same as or similar to those of the embodiments related to steps S34 and S35 in fig. 3, and therefore, the detailed descriptions thereof are omitted, and the detailed descriptions thereof are incorporated herein by reference.
In some embodiments, the thirty-four module 34 is for at least one of: acquiring session frequency information of all users in the target session; acquiring the conversation frequency information of the first user and the at least one second user in the target conversation; and obtaining the speaking frequency information of the at least one second user in the target session. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: determining decryption progress information of the second background according to the session frequency information; and sending the decryption progress information to the first user equipment and the second user equipment. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and determining a session frequency range in which the session frequency information falls, and taking a decryption progress corresponding to the session frequency range as decryption progress information of the second background. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
Fig. 11 shows a diagram of a server structure for presenting a context in a social application, according to an embodiment of the present application, the server includes a quad module 41 and a quad module 42. A fourth module 41, configured to determine, in response to a trigger event set for a context of a target session in a social application, a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context; a fourth-second module 42, configured to send the fourth context and the encryption mode corresponding to the fourth context to a first user device corresponding to the at least one first user, so as to present a fifth context in a session page corresponding to the target session in the first user device, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode.
A fourth module 41, configured to determine, in response to a trigger event set for a context of a target session in a social application, a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setup triggering event includes, but is not limited to, a new setup of a one-to-one private chat session between the first user and the second user, and a new joining of the first user to a group session. In some embodiments, the fourth context may be a private chat session object of the first user or a group member other than the first user in the group session in which the first user is located, which is uploaded to the server in advance, or may be any other context in the server. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
A fourth-second module 42, configured to send the fourth context and the encryption mode corresponding to the fourth context to a first user device corresponding to the at least one first user, so as to present a fifth context in a session page corresponding to the target session in the first user device, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
Fig. 12 shows a diagram of a first user equipment structure for presenting context in a social application according to an embodiment of the present application, the equipment comprising a five-one module 51, a five-two module 52 and a five-three module 53. A fifthly-first module 51, configured to receive a fourth context sent by a server and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for a target session; a fifth-second module 52, configured to perform an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background; and a fifthly and thirteen module 53, configured to present the fifth background in a session page corresponding to the target session.
A fifthly-one module 51, configured to receive a fourth context sent by a server and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for a target session. In some embodiments, if the target session is a one-to-one private chat session, the first user is a session object in the private chat session, and if the target session is a group session, the first user may be a group member in the group session.
A fifth-second module 52, configured to perform an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
And a fifthly and thirteen module 53, configured to present the fifth background in a session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the fifth background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a sixth background, then the session page is updated, the sixth background is presented in the session page, for example, the decryption progress information is 50%, a half region in the fifth background is decrypted to generate the sixth background and presented in the session page.
FIG. 13 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
In some embodiments, as shown in FIG. 13, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a holding computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (23)

1. A method for presenting a background in a social application, applied to a first user equipment, wherein the method comprises:
responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
2. A method for presenting a background in a social application, applied to a second user equipment, wherein the method comprises:
receiving a first background and an encryption mode corresponding to the first background, wherein the first background is sent by first user equipment through a server, and the first background is set by a first user in the first user equipment for a target session;
according to the encryption mode, performing encryption operation on the first background to generate a second background;
and presenting the second background in a session page corresponding to the target session.
3. The method of claim 2, wherein the method further comprises:
acquiring decryption progress information corresponding to the second background;
according to the decryption progress information and the decryption mode corresponding to the encryption mode, performing decryption operation on the second background to generate a third background;
and updating the session page, and presenting the third background in the session page.
4. The method of claim 3, wherein the method further comprises:
acquiring decryption area sequence information corresponding to the second background, wherein the decryption area sequence information comprises decryption orders corresponding to a plurality of areas and a plurality of areas in the second background;
wherein, the executing decryption operation on the second background according to the decryption progress information and the decryption mode corresponding to the encryption mode to generate a third background comprises:
and decrypting one or more areas in the second background according to the decryption progress information, the decryption mode corresponding to the encryption mode and the decryption area sequence information to generate a third background.
5. The method according to claim 3, wherein the obtaining decryption progress information corresponding to the second context includes:
and receiving decryption progress information which is sent by the server and corresponds to the second background.
6. The method according to claim 3, wherein the obtaining decryption progress information corresponding to the second context includes:
receiving session frequency information which is sent by a server and corresponds to the target session;
and determining the decryption progress information of the second background according to the session frequency information.
7. The method of claim 6, wherein the determining decryption progress information of the second context according to the session frequency information comprises:
and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information.
8. A method for presenting a background in a social application, applied to a server, wherein the method comprises:
receiving a first background sent by first user equipment and an encryption mode corresponding to the first background, wherein the first background is set for a target session by a first user in the first user equipment;
and sending the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session so as to present a second background in a session page corresponding to the target session in the second user equipment, wherein the second background is generated by executing encryption operation on the first background according to the encryption mode.
9. The method of claim 8, wherein the method further comprises;
acquiring decryption area sequence information, wherein the decryption area sequence information comprises a plurality of areas in the second background and decryption orders corresponding to the areas;
and sending the decryption area sequence information to the second user equipment.
10. The method of claim 9, wherein the obtaining decryption area sequence information comprises:
and identifying the first background, and determining the sequence information of the decryption area according to the identification result.
11. The method of claim 10, wherein identifying the first context and determining the decryption area order information according to the identification result comprises:
identifying the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area;
and sequencing the plurality of areas according to the importance degree of each area to obtain the decryption area sequence information.
12. The method of claim 11, wherein identifying the first background and obtaining a plurality of regions corresponding to the first background and a degree of importance corresponding to each region comprises:
identifying type information corresponding to the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area according to the type information.
13. The method of claim 8, wherein the method further comprises:
acquiring session frequency information of the target session;
and sending the session frequency information to the first user equipment and the second user equipment.
14. The method of claim 13, wherein the obtaining of session frequency information of the target session comprises at least one of:
acquiring session frequency information of all users in the target session;
acquiring the conversation frequency information of the first user and the at least one second user in the target conversation;
and obtaining the speaking frequency information of the at least one second user in the target session.
15. The method of claim 13, wherein the method further comprises:
determining decryption progress information of the second background according to the session frequency information;
and sending the decryption progress information to the first user equipment and the second user equipment.
16. The method of claim 15, wherein the determining decryption progress information of the second context according to the session frequency information comprises:
and determining a session frequency range in which the session frequency information falls, and taking a decryption progress corresponding to the session frequency range as decryption progress information of the second background.
17. The method of claim 15, wherein the determining decryption progress information of the second context according to the session frequency information comprises:
and if the current liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information.
18. A method for presenting a background in a social application, applied to a server, wherein the method comprises:
responding to a background setting triggering event aiming at a target session in a social application, and determining a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
and sending the fourth context and the encryption mode corresponding to the fourth context to first user equipment corresponding to the at least one first user so as to present a fifth context in a session page corresponding to the target session in the first user equipment, wherein the fifth context is generated by performing encryption operation on the fourth context according to the encryption mode.
19. A method for presenting a background in a social application, applied to a first user equipment, wherein the method comprises:
receiving a fourth background sent by a server and an encryption mode corresponding to the fourth background, wherein the fourth background is set by the server for a target session;
according to the encryption mode, performing encryption operation on the fourth background to generate a fifth background;
and presenting the fifth background in a session page corresponding to the target session.
20. A method of presenting context in a social application, wherein the method comprises:
the method comprises the steps that first user equipment responds to background setting operation of a first user for a target session in social application, and obtains a first background set by the first user and an encryption mode corresponding to the first background;
the first user equipment sends the first background and the encryption mode to a server corresponding to the social application;
the server receives the first background and the encryption mode sent by the first user equipment, and sends the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session;
the second user equipment receives the first background and the encryption mode sent by the server;
and the second user equipment executes encryption operation on the first background according to the encryption mode to generate a second background, and presents the second background in a session page corresponding to the target session.
21. A method of presenting context in a social application, wherein the method comprises:
the method comprises the steps that a server responds to a background setting triggering event aiming at a target session in a social application, and determines a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
the server sends the fourth background and the encryption mode corresponding to the fourth background to first user equipment corresponding to the at least one first user;
the first user equipment receives the fourth background and the encryption mode sent by the server;
and the first user equipment executes encryption operation on the fourth background according to the encryption mode to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
22. An apparatus for presenting a background in a social application, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer-executable instructions that, when executed, cause the processor to perform operations of any of claims 1 to 19.
23. A computer-readable medium storing instructions that, when executed, cause a system to perform the operations of any of claims 1 to 19.
CN202010339178.4A 2020-04-26 2020-04-26 Method and equipment for presenting background in social application Active CN111556199B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010339178.4A CN111556199B (en) 2020-04-26 2020-04-26 Method and equipment for presenting background in social application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010339178.4A CN111556199B (en) 2020-04-26 2020-04-26 Method and equipment for presenting background in social application

Publications (2)

Publication Number Publication Date
CN111556199A true CN111556199A (en) 2020-08-18
CN111556199B CN111556199B (en) 2021-04-13

Family

ID=72004447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010339178.4A Active CN111556199B (en) 2020-04-26 2020-04-26 Method and equipment for presenting background in social application

Country Status (1)

Country Link
CN (1) CN111556199B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103312506A (en) * 2013-05-06 2013-09-18 西安电子科技大学 Multi-receiver sign-cryption method for receivers with anonymous identities
CN103442146A (en) * 2013-08-30 2013-12-11 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method and system thereof for displaying session interface with contacts
CN104010299A (en) * 2014-05-21 2014-08-27 中国人民解放军信息工程大学 Mobile communication conversion privacy enhancing mehtod based on physical layer safety
CN104134042A (en) * 2013-07-18 2014-11-05 腾讯科技(深圳)有限公司 Private file encryption method and private file encryption device
TW201508520A (en) * 2013-08-21 2015-03-01 Alibaba Group Services Ltd Method, Server and System for Setting Background Image
WO2015161690A1 (en) * 2014-04-25 2015-10-29 天地融科技股份有限公司 Secure data interaction method and system
CN105991513A (en) * 2015-01-27 2016-10-05 中兴通讯股份有限公司 Data protection method, device and mobile terminal
CN106682967A (en) * 2017-01-05 2017-05-17 胡开标 Online translation and chat system
CN106776774A (en) * 2016-11-11 2017-05-31 努比亚技术有限公司 Mobile terminal chooses picture device and method
CN107579903A (en) * 2017-07-11 2018-01-12 深圳市中易通安全芯科技有限公司 A kind of image information safe transmission method and system based on mobile device
US20180025140A1 (en) * 2016-07-24 2018-01-25 Darrin Edelman Identity Assurance Method
US9924447B1 (en) * 2017-02-20 2018-03-20 Sprint Spectrum L.P. Distinguishing between foreground and background communications based on analysis of context information
US10045172B2 (en) * 2014-04-23 2018-08-07 Huawei Technologies Co., Ltd. Information sending method, network device, and terminal
CN110099159A (en) * 2018-01-29 2019-08-06 优酷网络技术(北京)有限公司 A kind of methods of exhibiting and client of chat interface

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103312506A (en) * 2013-05-06 2013-09-18 西安电子科技大学 Multi-receiver sign-cryption method for receivers with anonymous identities
CN104134042A (en) * 2013-07-18 2014-11-05 腾讯科技(深圳)有限公司 Private file encryption method and private file encryption device
TW201508520A (en) * 2013-08-21 2015-03-01 Alibaba Group Services Ltd Method, Server and System for Setting Background Image
CN103442146A (en) * 2013-08-30 2013-12-11 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method and system thereof for displaying session interface with contacts
US10045172B2 (en) * 2014-04-23 2018-08-07 Huawei Technologies Co., Ltd. Information sending method, network device, and terminal
WO2015161690A1 (en) * 2014-04-25 2015-10-29 天地融科技股份有限公司 Secure data interaction method and system
CN104010299A (en) * 2014-05-21 2014-08-27 中国人民解放军信息工程大学 Mobile communication conversion privacy enhancing mehtod based on physical layer safety
CN105991513A (en) * 2015-01-27 2016-10-05 中兴通讯股份有限公司 Data protection method, device and mobile terminal
US20180025140A1 (en) * 2016-07-24 2018-01-25 Darrin Edelman Identity Assurance Method
CN106776774A (en) * 2016-11-11 2017-05-31 努比亚技术有限公司 Mobile terminal chooses picture device and method
CN106682967A (en) * 2017-01-05 2017-05-17 胡开标 Online translation and chat system
US9924447B1 (en) * 2017-02-20 2018-03-20 Sprint Spectrum L.P. Distinguishing between foreground and background communications based on analysis of context information
CN107579903A (en) * 2017-07-11 2018-01-12 深圳市中易通安全芯科技有限公司 A kind of image information safe transmission method and system based on mobile device
CN110099159A (en) * 2018-01-29 2019-08-06 优酷网络技术(北京)有限公司 A kind of methods of exhibiting and client of chat interface

Also Published As

Publication number Publication date
CN111556199B (en) 2021-04-13

Similar Documents

Publication Publication Date Title
CN110336735B (en) Method and equipment for sending reminding message
KR20150126484A (en) Apparatas and method for transforming source code into machine code in an electronic device
CN106250770B (en) Electronic device and method for encrypting content
CN112822431B (en) Method and equipment for private audio and video call
CN110765395A (en) Method and equipment for providing novel information
CN110780955B (en) Method and equipment for processing expression message
CN110535755B (en) Method and equipment for deleting session message
CN110046000B (en) Applet running method and device
CN113794706B (en) Data processing method and device, electronic equipment and readable storage medium
CN112968899B (en) Method and equipment for encrypted communication
CN112822430B (en) Conference group merging method and device
JP2021535497A (en) Data processing methods, servers, client devices and media for security authentication
CN111556199B (en) Method and equipment for presenting background in social application
CN112866302A (en) Method, apparatus, medium and program product for integrity checking of cluster data
CN110166955B (en) Method and equipment for reminding schedule
CN111932230A (en) Method and equipment for modifying red envelope
CN108833504B (en) Cross-site information synchronization method and device
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN111314210B (en) Method and equipment for social interaction
CN111680249B (en) Method and device for pushing presentation information
CN110492998B (en) Method for encrypting and decrypting data
CN111934981A (en) Method and equipment for withdrawing red packet
JP2021513712A (en) Systems and methods for distributed data storage
CN111767550A (en) Data storage method and device
CN114338578B (en) Method, device, medium and program product for sending friend application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant