Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing the devices, modules or units, and are not used for limiting the devices, modules or units to be different devices, modules or units, and also for limiting the sequence or interdependence relationship of the functions executed by the devices, modules or units.
It is noted that references to "a" or "an" in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will appreciate that references to "one or more" are intended to be exemplary and not limiting unless the context clearly indicates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The following describes the technical solutions of the present disclosure and how to solve the above technical problems in specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present disclosure will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of an information processing method according to an embodiment of the present disclosure, and as shown in fig. 1, the method may include:
step S101, responding to the hiding setting operation of the selected target message in the message interface, and setting the display attribute of the target message to be hidden;
the execution main body of the method provided by the embodiment of the disclosure can be a terminal of a user, such as a computer, a mobile phone and the like of the user.
The message interface can comprise an interactive interface which has a chat function and shows chat messages in the communication platform. The communication platform may include, but is not limited to, a game platform, a video and audio publishing platform, a chat and friend making platform, and the like.
The user can select the message on the message interface in various ways, the terminal takes the message selected by the user as a target message, and displays a display attribute setting interface aiming at the target message, wherein the display attribute can include but is not limited to: and displaying and hiding. And receiving a setting operation aiming at the display attribute input by the user on the display attribute setting interface, and when the user clicks a 'hide' button, setting the display attribute of the selected message to be hidden by the terminal in response to the hiding setting operation aiming at the selected message by the user.
Specific implementations for targeting messages on the message interface may include a variety of implementations, as described in the following examples.
In one possible implementation, the method further includes:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as the target message.
In practical application, the terminal may determine the target message according to a selection operation of the user on the message in the message interface, and take the message corresponding to the selection operation of the user as the target message. The user interface can display a plurality of messages, and the terminal takes at least one message corresponding to the user selection operation as a target message.
In addition to determining the target message according to the selection operation of the user, the target message can be determined according to the time setting operation of the user on the message interface, and the message received (or sent) in the time period set by the time setting operation is taken as the target message.
In one example, if the user is to select a message received within the 9 am-10 pm time period of day 6/20, then "select message by received time" is selected in the message interface, the user is presented with a time input interface to receive the message reception time entered by the user at the time input interface: and 9-10 am of 20 days in 6 months, and selecting the message with the receiving time of 9-10 am of 20 days in 6 months as the target message by the terminal according to the time setting operation of the user.
In the embodiment of the application, the target message can be determined according to the selection operation of the user, and can also be determined according to the time setting operation of the user, the determination mode of the target message is flexible, and different requirements of the user can be met.
In one possible implementation manner, in response to a message selection operation for a message interface, determining a message corresponding to the message selection operation as a target message includes:
and in response to the message selection operation aiming at the message corresponding to the at least one target user in the message interface, determining the message corresponding to the at least one target user as the target message.
In practical application, all messages corresponding to one target user may be selected as target messages for message selection operation, a part of messages corresponding to one target user may also be selected as target messages, and all messages corresponding to two or more target users may also be selected as target messages.
In an example, all chat messages between the user a and the user B may be selected, some chat messages between the user a and the user B may be selected, all chat messages between the user a and the user B, and all chat messages between the user a and the user C may be selected, and the terminal takes a message corresponding to the selection operation as a target message.
Optionally, the user may also select the target user first, and then perform a time setting operation on the message corresponding to the target user. The terminal determines a target user according to the selection operation of the user, determines a target message corresponding to the target user according to the time setting operation of the message corresponding to the target user, and takes the message sent by the target user (or sent to the target user) received within the time period set by the time setting operation as the target message.
And S102, hiding the target message with the display attribute being hidden on a message interface by adopting a preset hidden message form.
The preset hidden message form may include, but is not limited to, the content of the hidden target message, or the content and format of the hidden target message. When the content of the target message is hidden, the format of the target message can be reserved at the position corresponding to the target message, and a user is prompted to have the hidden message; when the content and the format of the target message are hidden, in order to display the prompt information at the corresponding position of the target message or the designated position in the message interface, the user is prompted to have the hidden message through the prompt information.
In one example, the message interface before hiding is shown in fig. 7, and includes message 1, message 2, message 3, and message 4; when the content of the target message is hidden, the format of the target message can be reserved at the position corresponding to the target message to prompt a user that the hidden message exists, the message 2 in fig. 7 is hidden as the target message, the content of the message 2 is hidden, and the format is reserved, as shown in fig. 8, the format of the hidden target message is represented by a black line frame; when hiding the content and format of the target message, in order to display the prompt message at the position corresponding to the target message or the designated position in the message interface, the user is prompted to have the hidden message by the prompt message, the message 2 in fig. 7 is hidden as the target message, and the content and format of the message 2 are hidden, as shown in fig. 9, the user is prompted to have the hidden message by the hidden message shown in fig. 9; or a user identifier corresponding to the target message, for example, a user name, a user avatar, or the like, may be displayed at the position corresponding to the target message, and the user identifier prompts that the hidden message exists at the position.
In one possible implementation, the hidden setting operation includes a message encryption operation, and the method further includes:
responding to the message encryption operation, and acquiring encryption information;
storing the encrypted information and the content of the target message in a specified storage space in an associated manner;
setting the display attribute of the target message as hidden, comprising:
and setting the display attribute of the target message to be encrypted and hidden.
In practical application, the hidden setting operation may include multiple hidden setting modes, and may directly hide the target message in the message interface, and further, for better privacy protection, the target message may be hidden in an encrypted mode, and the display attribute of the target message is set to be encrypted and hidden. And acquiring encryption information according to the message encryption operation. The specific form of the encrypted information may include at least one of numbers, letters, symbols, images, videos, audios, and the like.
And after the encrypted information of the user aiming at the selected message is obtained, establishing an association relation between the encrypted information and the corresponding target message. The user can input corresponding encryption information for each target message, that is, one target message corresponds to one encryption information; in addition, the same encryption information may also be input for two or more target messages, that is, two or more target messages correspond to one encryption information, which is not limited in this disclosure. When a user inputs corresponding encryption information for each target message, establishing an association relationship between the target message and the corresponding encryption information; when a user inputs the same encrypted information aiming at two or more than two target messages, the encrypted information and two or more than two chatting records are established into an association relation.
If the user logging in the communication platform at the current terminal is the user A, when the chat message in the chat interactive interface is at least one chat message of the user corresponding to the first user identifier, the first user identifier can be a user establishing a friend relationship with the user A, the user identifier of the user B, the friend relationship is a friend request sent by one user, and after the other user receives the request, the two users can send messages to each other for chatting. If the chat messages in the chat interactive interface are messages for chatting between the user A and the user B, each chat message comprises a corresponding message identifier, and when the user sets encryption operation on one or more chat messages, the encryption information can be associated with the message identifier of each message, and the corresponding encryption information can be determined according to the message identifier of each message.
In addition, the message interface may also be a user identifier list interface, the chat message may be a chat message corresponding to at least one second user identifier displayed in the user identifier list interface, and if the user whose current terminal logs in the communication platform is the user a, when the chat message in the chat interaction interface is a chat message corresponding to each of a plurality of second user identifiers, the second user identifier may be a user who has established a friend relationship with the user a: the chat messages in the chat interactive interface are respectively the chat message records of the chat between the user A and the user B, between the user A and the user C and the like, each chat message corresponds to the corresponding second user identifier, after the user A sets the encryption information for the chat message corresponding to the user B, the encryption information is set for all the chat messages before the user A and the user B by the user A, the association relationship between the encryption information and the user identifier of the user B is established, and the corresponding encryption information can be determined according to the user identifier of the user B.
After the encrypted information is associated with the message identifier of at least one chat message, the encrypted information and the chat message corresponding to the message identifier associated with the encrypted information can be sent to the server for storage, after a response message returned by the server is received, the terminal deletes the chat message corresponding to the encrypted information in the chat interactive interface, or stores the chat message corresponding to the encrypted information in a local encrypted database, so that the encrypted chat message is not displayed in the current chat interactive interface any more. In the embodiment of the disclosure, part or all of all the chat messages corresponding to the current user and a certain friend user can be encrypted, so that the privacy protection requirement of the current user on the chat messages is met, and the security of the chat messages is improved.
In one possible implementation, obtaining encryption information in response to a message encryption operation includes:
responding to the message encryption operation aiming at the target message, and displaying an encryption information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In practical application, when a terminal receives a message encryption operation aiming at a target message, an encryption information acquisition interface is displayed, wherein the encryption information acquisition interface can comprise but is not limited to a button for a user to select default encryption information and a button for customizing encryption information, and when the user selects the default encryption information, the pre-stored encryption information is used as the encryption information of the target message; and when the user selects the custom encryption information, receiving the custom encryption information set by the user as the encryption information of the target message.
In one possible implementation mode, a candidate encryption mode option is displayed on an encryption information acquisition interface;
obtaining the encrypted information through an encrypted information obtaining interface, comprising:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring the encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In practical application, the encryption information acquisition interface displays candidate encryption mode options, and the candidate encryption modes may include, but are not limited to: inputting password encryption, selecting password encryption and encrypting user characteristic information. User characteristic information may include, but is not limited to: fingerprint features, facial features of the user. And acquiring encryption information according to the encryption mode corresponding to the selection operation, and encrypting the target message. In the embodiment of the application, the encrypted information acquisition interface provides multiple encryption modes for a user to select, and the personalized requirements of the user can be met.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of the following:
acquiring encrypted information input by aiming at an encrypted information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on an encrypted information acquisition interface;
and acquiring user characteristic information through an encrypted information acquisition interface, and taking the user characteristic information as encrypted information.
In practical application, the requirements of users on various encryption modes can be met. The encryption scheme may include any of: inputting a password, selecting the password and encrypting the user characteristics. When the user selects the password input mode for encryption, displaying a password input interface, and receiving a password input by the user on the password input interface as encryption information of the target message; when a user selects a password encryption mode, a password selection interface is displayed for the user, the password selection interface comprises numbers, characters, symbols and the like, and each component of encryption information is determined according to the selection operation of the user aiming at least one of the numbers, the characters and the symbols to obtain the encryption information; when the user selects user feature encryption, fingerprint features or facial features of the user are collected to serve as encryption information of the target message.
In one possible implementation, the method further comprises:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In practical application, for a target message hidden in a message interface, a position corresponding to the target message or a designated position in the message interface may display a prompt message to prompt a user that the position has the hidden message. When the user needs to view the message content, the content of the target message is displayed to the user according to the message display operation of the user, for example, the click operation aiming at the prompt message.
In one possible implementation, the method further includes:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in a message interface, and acquiring encryption information of the target message;
and acquiring the content of the target message from the specified storage space according to the encrypted information and displaying the content.
The message display operation may be a decryption operation, after the encrypted information is obtained, the encrypted information is verified, and if the verification is passed, the content of the target message is obtained from the specified storage space and displayed.
For the encrypted hidden target message, the corresponding position of the target message or the designated position in the message interface can display decryption guide information, and the decryption guide information is used for guiding a user to decrypt the encrypted chat message. The decryption guidance information may be text information, image information, a combination of text and image, an encryption information input box, and the like. After the decryption guide information is triggered, the encryption information input by the user can be received, and decryption is performed by using the encryption information. The decryption guidance information may also be triggered by the user, and then the user characteristics are collected according to the user trigger, which includes but is not limited to: fingerprint features, facial features, etc.
In an example, the message interface includes 5 chat messages, and if the user sets the same encryption information for the first chat message and the third chat message, the first chat message and the third chat message are hidden in the message interface, and the decryption guidance information is displayed at a position of the first chat message in the message interface before encryption: the text content 'please input the encrypted information' and a corresponding encrypted information input box; likewise, the decryption guidance information is displayed at the position of the third chat message in the message interface before encryption: the text content 'please input the encryption information' and the corresponding encryption information input box.
In the embodiment of the disclosure, because the two users have time sequence when chatting, when the chatting messages are encrypted, in order to avoid disturbing the display sequence of the chatting messages, the decryption guide information is displayed at the corresponding position of each chatting message, so that the users can conveniently check the context information.
After a user encrypts two or more chat messages with continuous positions in the message interface, one piece of decryption guide information can be displayed at the positions corresponding to the two or more chat messages, so that the display sequence of the chat messages is not disturbed, the display area can be saved, the problem that the user can check the corresponding chat messages by multiple operations when the plurality of pieces of decryption guide information are displayed in the message interface is avoided, and the operation times are reduced.
As in the above example, if the user sets the same encryption information for the first chat message, the third chat message, and the fourth chat message in the message interface, the first chat message, the third chat message, and the fourth chat message are hidden in the message interface, and the decryption guidance information is displayed at the position of the first chat message in the message interface before encryption: the text content 'please input the encrypted information' and a corresponding encrypted information input box; displaying a decryption guide message at the position of the third chat message and the fourth chat message in the message interface before encryption: the text content 'please input the encryption information' and the corresponding encryption information input box.
In addition, if the chat message in the message interface is a chat message corresponding to each of the plurality of users, when the decryption guidance information is displayed, one piece of decryption guidance information may be displayed at a designated position in the message interface. For example, displaying decryption guidance information at the top of the page: the text content 'private chat group' and the encrypted information input box; or displaying the text content 'private chat group', and displaying an encrypted information input box when receiving the click operation of the user.
When the chat messages in the message interface are the chat messages corresponding to a plurality of users, each chat message corresponds to each user identifier, and the problem of display sequence can be not considered among the chat messages, so that the decryption guide information can be displayed in the message interface after each chat message is encrypted, and the decryption guide information corresponding to each user identifier can be displayed at the appointed position in the message interface when the encryption information corresponding to each chat message is different; when the encryption information corresponding to a plurality of chat messages is the same, one piece of decryption guide information corresponding to more than two user identifications can be displayed at the appointed position in the message interface, so that the problem that the page area is excessively occupied is avoided.
After a user triggers decryption guide information, a terminal sends a decryption request to a server, the decryption request carries encrypted information, the server verifies the encrypted information, and after the verification is successful, a corresponding chat message is determined based on the content of the encrypted information and is sent to the terminal; or after receiving the encrypted information, the server verifies the encrypted information, sends a notification message to the terminal after the verification is passed, and the terminal inquires the chat message content corresponding to the encrypted information from the local encrypted database based on the notification message and displays the chat message content.
When the encrypted information is in the form of a password, in order to improve the smoothness of user operation and reduce the problem of password re-input caused by misoperation and the like, optionally, the length of the password can be set to 4-6 characters, if the password continuously input by the user comprises the passwords in the correct sequence, the password is input correctly, if the length of the continuously input password exceeds a certain number of characters, the password is input in failure, when the failure frequency of the password input by the user reaches a threshold value, a cooling period is entered, the user cannot input the password for decryption in the cooling period, the input failure information can be recorded in a server, and the cooling state cannot be released when the user logs in again or clears the cache and the like, so that the security of private data is improved. After the cooling period is over, the user may again enter the encrypted information for decryption. And after the server successfully verifies the encrypted information, the terminal obtains the chat messages corresponding to the encrypted information, and displays the chat messages in a message interface for the user to browse.
For better explanation of the technical solution of the present disclosure, how to display the decryption guidance information when the chat message in the message interface is a chat message corresponding to a user is described below by using an example.
As shown in fig. 2, the message interface (e.g. the private letter detail page shown in the figure) includes a plurality of chat messages, where the plurality of chat messages are chat messages corresponding to the first user identifier. After a second chat message in the message interface is encrypted, the second chat message is hidden in the message interface, and decryption guide information is displayed at a position corresponding to the second chat message, such as "enter password to unlock private chat" and a numeric keypad, as shown in the figure, through which the user can decrypt the encrypted chat message.
How to display the decryption guidance information when the message interface is a user identifier list interface and each chat message is a chat message corresponding to at least one second user identifier displayed in the user identifier list interface is described as an example below.
As shown in FIG. 3, the message interface is a user identification list interface (e.g., private messenger page as shown), where "Rachel Jayson" is shown as the user identification and "Can't wait to see you! "identify the content of the corresponding latest chat message for the user. When at least one of the chat messages is encrypted, a user identifier and the chat message corresponding to the encrypted chat message are hidden in a message interface, decryption guide information is displayed at the top end of the message interface, the specific form of the decryption guide information is a text content 'private chat' and an encryption information input box in a rotating wheel mode, and a user can select a password in an up-and-down sliding rotating wheel mode to decrypt the encrypted chat message.
To better explain the decryption process of the chat message in the embodiment of the present disclosure, the decryption process is described below by way of an example.
As shown in fig. 4, if the message interface is a chat message interaction interface corresponding to the first user identifier, in an encrypted state, at least one piece of decryption guidance information and at least one piece of chat message corresponding to the first user identifier are displayed in the interface. When receiving a decryption operation of a user for the decryption guide information, displaying a password input interface; when a password input by a user is received, verifying the password, acquiring a corresponding chat message when the verification is successful (the password is correct as shown in the figure), displaying the chat message on a message interface, and quitting the message interface (quitting the private chat detail page as shown in the figure) when a quitting operation of the user is received; if the password authentication fails and the failure times reach the threshold value, entering a locking state, entering a cooling period, wherein in the cooling period, the user cannot input the password again for decryption, and after the cooling period is finished, entering an encryption state again, and the user can input the password again for decryption.
As shown in fig. 5, if the message interface is a user identifier list interface, in an encrypted state, the user identifier list interface displays decryption guide information and a second user identifier corresponding to an unencrypted chat message, the second user identifier corresponding to the encrypted chat message is hidden in the current page (in a hidden state shown in the figure), when a downward sliding operation of the user for the decryption guide information is received (as a private list page slides down) the password input box is displayed, the state is to be unlocked, when the password input by the user is received, the password is verified, if the verification is successful (as the password shown in the figure is correct), the second user identifier corresponding to the decryption guide information is displayed on the user identifier list interface (as the displayed state shown in the figure), if the password is input incorrectly and the number of input errors reaches a threshold value, the state is unlocked and the user cannot input the password again for decryption, after the cooling period is over, the user can input the password again for decryption.
The information processing method provided by the embodiment of the disclosure sets the display attribute of the target message to be hidden in response to the hidden setting operation for the selected target message in the message interface; and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form. According to the technical scheme, the message with the hiding requirement can be hidden on the message interface, and the problem of poor privacy caused by the fact that the message needing to be hidden is displayed on the message interface is solved, so that better privacy protection is achieved under the condition that the message interface does not need to be quitted.
Based on the same principle as the method shown in fig. 1, an embodiment of the present disclosure also provides an information processing apparatus 30, as shown in fig. 6, where the information processing apparatus 30 may include:
a setting module 31, configured to set a display attribute of a selected target message in a message interface as hidden in response to a hidden setting operation for the target message;
and the hiding module 32 is configured to hide the target message with the display attribute being hidden on the message interface in a preset hidden message form.
In one possible implementation, the hidden setting operation includes a message encryption operation, and the information processing apparatus 30 further includes an obtaining module configured to:
responding to the message encryption operation, and acquiring encryption information;
storing the encrypted information and the content of the target message in a specified storage space in an associated manner;
the setting module 31, when setting the display attribute of the target message to be hidden, is configured to:
and setting the display attribute of the target message as encryption hiding.
In one possible implementation manner, the obtaining module is configured to:
responding to the message encryption operation aiming at the target message, and displaying an encrypted information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In a possible implementation manner, a candidate encryption mode option is displayed on the encryption information acquisition interface;
the obtaining module is used for obtaining the encrypted information through the encrypted information obtaining interface:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring the encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of the following:
acquiring encrypted information input by aiming at an encrypted information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on an encrypted information acquisition interface;
and acquiring user characteristic information through an encrypted information acquisition interface, and taking the user characteristic information as encrypted information.
The information processing apparatus 30 further includes a target message determination module for:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as the target message.
In one possible implementation manner, when the target message determination module determines, in response to a message selection operation for the message interface, a message corresponding to the message selection operation as a target message, the target message determination module is configured to:
and in response to a message selection operation aiming at the message corresponding to the at least one target user in the message interface, determining the message corresponding to the at least one target user as a target message.
In one possible implementation, the information processing apparatus 30 further includes a content display module configured to:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In one possible implementation, the information processing apparatus 30 further includes a message display module configured to:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in a message interface, and acquiring encryption information of the target message;
and acquiring the content of the target message from the specified storage space according to the encrypted information and displaying the content.
The information processing apparatus according to the embodiment of the present disclosure may execute the information processing method provided by the embodiment of the present disclosure, and the implementation principle is similar, the actions executed by the modules in the information processing apparatus according to the embodiments of the present disclosure correspond to the steps in the information processing method according to the embodiments of the present disclosure, and for the detailed functional description of the modules in the information processing apparatus, reference may be specifically made to the description in the corresponding information processing method shown in the foregoing, and details are not repeated here.
In the information processing apparatus provided in the embodiment of the present disclosure, in response to a hiding setting operation for a selected target message in a message interface, a display attribute of the target message is set to be hidden; and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form. According to the technical scheme, the message with the hiding requirement can be hidden on the message interface, the problem of poor privacy caused by the fact that the message needing to be hidden is displayed on the message interface is solved, and therefore better privacy protection is achieved under the condition that the message interface does not need to be quitted.
Referring now to FIG. 10, shown is a schematic diagram of an electronic device 600 suitable for use in implementing embodiments of the present disclosure. The execution subject of the technical solution of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle-mounted terminal (e.g., a car navigation terminal), etc., and a stationary terminal such as a digital TV, a desktop computer, etc. The electronic device shown in fig. 10 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
The electronic device includes: a memory and a processor, wherein the processor may be referred to as a processing device 601 described below, and the memory may include at least one of a Read Only Memory (ROM) 602, a Random Access Memory (RAM) 603, and a storage device 608, which are described below:
as shown in fig. 10, the electronic device 600 may include a processing means (e.g., central processing unit, graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 600 to communicate with other devices wirelessly or by wire to exchange data. While fig. 10 illustrates an electronic device 600 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: in response to a hiding setting operation for a selected target message in the message interface, setting a display attribute of the target message to be hidden; and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules or units described in the embodiments of the present disclosure may be implemented by software or hardware. Wherein the designation of a module or unit does not in some cases constitute a limitation of the unit itself.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one or more embodiments of the present disclosure, there is provided an information processing method including:
in response to a hiding setting operation for a selected target message in a message interface, setting a display attribute of the target message to be hidden;
and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form.
In one possible implementation, the hiding setting operation includes a message encryption operation, and the method further includes:
responding to the message encryption operation, and acquiring encryption information;
storing the encryption information and the content of the target message in a specified storage space in an associated manner;
the setting the display attribute of the target message to be hidden comprises:
and setting the display attribute of the target message as encryption hiding.
In one possible implementation, the obtaining encryption information in response to the message encryption operation includes:
responding to the message encryption operation aiming at the target message, and displaying an encryption information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In a possible implementation manner, the encryption information acquisition interface displays candidate encryption mode options;
the acquiring of the encrypted information through the encrypted information acquisition interface includes:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of:
acquiring encryption information input by aiming at the encryption information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on the encrypted information acquisition interface;
and acquiring user characteristic information through the encrypted information acquisition interface, and taking the user characteristic information as the encrypted information.
In one possible implementation, the method further includes:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as a target message.
In one possible implementation manner, the determining, in response to a message selection operation for the message interface, a message corresponding to the message selection operation as a target message includes:
and in response to a message selection operation aiming at a message corresponding to at least one target user in the message interface, determining the message corresponding to the at least one target user as a target message.
In one possible implementation, the method further includes:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In one possible implementation, the method further includes:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in the message interface, and acquiring encryption information of the target message;
and acquiring and displaying the content of the target message from the specified storage space according to the encrypted information.
According to one or more embodiments of the present disclosure, there is provided an information processing apparatus including:
the setting module is used for responding to hiding setting operation aiming at the selected target message in the message interface and setting the display attribute of the target message to be hidden;
and the hiding module is used for hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form.
In a possible implementation manner, the hidden setting operation includes a message encryption operation, and the information processing apparatus further includes an obtaining module configured to:
responding to the message encryption operation, and acquiring encryption information;
storing the encryption information and the content of the target message in a specified storage space in an associated manner;
the setting module is configured to, when the display attribute of the target message is set to be hidden:
and setting the display attribute of the target message as encryption hiding.
In a possible implementation manner, the obtaining module is configured to:
responding to the message encryption operation aiming at the target message, and displaying an encrypted information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In a possible implementation manner, the encryption information acquisition interface displays candidate encryption mode options;
the acquisition module is configured to:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of:
acquiring encryption information input by aiming at the encryption information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on the encrypted information acquisition interface;
and acquiring user characteristic information through the encrypted information acquisition interface, and taking the user characteristic information as the encrypted information.
In one possible implementation manner, the information processing apparatus further includes a target message determination module configured to:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as a target message.
In one possible implementation manner, when the target message determination module determines, in response to a message selection operation for the message interface, that a message corresponding to the message selection operation is a target message, the target message determination module is configured to:
and in response to a message selection operation aiming at a message corresponding to at least one target user in the message interface, determining the message corresponding to the at least one target user as a target message.
In one possible implementation manner, the information processing apparatus further includes a content display module configured to:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In one possible implementation manner, the information processing apparatus further includes a message display module configured to:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in the message interface, and acquiring encryption information of the target message;
and acquiring the content of the target message from the specified storage space according to the encryption information and displaying the content.
In accordance with one or more embodiments of the present disclosure, there is provided an electronic device including:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the information processing method is executed.
According to one or more embodiments of the present disclosure, there is provided a computer-readable medium for storing computer instructions which, when executed on a computer, make the computer perform the information processing method.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.