CN112785312A - Information sharing method and device, electronic equipment and readable storage medium - Google Patents

Information sharing method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN112785312A
CN112785312A CN202110083234.7A CN202110083234A CN112785312A CN 112785312 A CN112785312 A CN 112785312A CN 202110083234 A CN202110083234 A CN 202110083234A CN 112785312 A CN112785312 A CN 112785312A
Authority
CN
China
Prior art keywords
information
sharing
target
information sharing
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110083234.7A
Other languages
Chinese (zh)
Inventor
陈锐敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202110083234.7A priority Critical patent/CN112785312A/en
Publication of CN112785312A publication Critical patent/CN112785312A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • G06Q20/3255Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The application discloses an information sharing method, an information sharing device, electronic equipment and a readable storage medium, belongs to the technical field of communication, and aims to solve the problems of complex steps and low efficiency in an information sharing process. The method comprises the following steps: receiving target information, the target information comprising a verification message; determining a sharing object associated with the first information sharing device according to the target information; sharing the authentication message to the shared object; wherein the shared object comprises at least one of: a shared account, a target information sharing device. The method and the device are applied to scenes of quickly sharing information by using the electronic equipment.

Description

Information sharing method and device, electronic equipment and readable storage medium
Technical Field
The application belongs to the technical field of communication, and particularly relates to an information sharing method and device, electronic equipment and a readable storage medium.
Background
With the development of electronic devices, the functions of the electronic devices are more and more powerful, and users have higher and higher requirements on the security of the electronic devices. For example, when a user wants to log in to a video account in a video application, the user is usually required to input a verification code sent by a server corresponding to the video application to verify personal information.
Currently, when the user 1 wants to log in to the video account registered by the user 2, the verification code is transmitted to the electronic device of the user 2. Therefore, user 1 is typically required to first send a message to user 2 via the electronic device requesting the authentication code. When the user 2 receives the message requesting the verification code sent by the user 1 through the electronic device and receives the verification code sent by the server corresponding to the video application program, the user 2 can manually send the received verification code to the user 1 through the electronic device.
However, if the user 2 receives a large number of verification codes, the user 2 needs to manually send the large number of verification codes to the user 1 one by one through the electronic device, so that the information sharing process is complicated in steps and low in efficiency.
Disclosure of Invention
An object of the embodiments of the present application is to provide an information sharing method, an information sharing apparatus, an electronic device, and a readable storage medium, which can solve the problems of complicated steps and low efficiency in an information sharing process.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides an information sharing method, which is applied to a first information sharing apparatus, and the method includes: receiving target information, the target information comprising a verification message; determining a sharing object associated with the first information sharing device according to the target information; sharing the authentication message to the shared object; wherein the shared object comprises at least one of: a shared account, a target information sharing device.
In a second aspect, an embodiment of the present application provides another information sharing method, which is applied to a second information sharing apparatus, and the method includes: receiving first information sent by a first information sharing device, wherein the first information is used for indicating an authentication message; acquiring the verification message under the condition of meeting a target preset condition; wherein the target preset condition comprises at least one of: the first biological characteristic information of the user using the second information sharing device is matched with the preset biological characteristic information, a Data Network (DN) is authorized, the obtaining time of the verification message is in the effective sharing time period, and the obtaining time of the verification message is less than or equal to the allowed sharing time.
In a third aspect, an embodiment of the present application provides an information sharing apparatus, including: the device comprises a receiving module, a determining module and a sharing module; a receiving module, configured to receive target information, where the target information includes a verification message; a determining module, configured to determine, according to the target information received by the receiving module, a shared object associated with the first information sharing apparatus; a sharing module, configured to share the verification message with the shared object determined by the determining module; wherein the shared object comprises at least one of: a shared account, a target information sharing device.
In a fourth aspect, an embodiment of the present application provides another information sharing apparatus, including: the device comprises a receiving module and an obtaining module; the device comprises a receiving module, a verification module and a sending module, wherein the receiving module is used for receiving first information sent by a first information sharing device, and the first information is used for indicating a verification message; the acquisition module is used for acquiring the verification message under the condition that a target preset condition is met; wherein the target preset condition comprises at least one of: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message is less than or equal to the allowed sharing times.
In a fifth aspect, the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect or the second aspect.
In a sixth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first or second aspect.
In a seventh aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect or the second aspect.
In an embodiment of the present application, the first information sharing device may determine the shared object associated with the first information sharing device after receiving the target information including the verification message. Then, the first information sharing apparatus may share the authentication message to the shared object. Wherein the shared object comprises at least one of: a shared account, a target information sharing device. By the scheme, after the first information sharing device receives the verification message, the shared object associated with the first information sharing device can be directly determined, and the verification message is shared to the shared object. Compared with the scheme of the verification message which needs to be manually forwarded by the user in the related technology, the method and the device for the information sharing can realize the information sharing with other users without manually forwarding any information by the user, so that the information sharing process is simple and convenient in step and high in efficiency.
Drawings
Fig. 1 is a schematic flow chart of an information sharing method according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of another information sharing method according to an embodiment of the present disclosure;
fig. 3 is a schematic flow chart of related secondary authentication and authorization of 5GNR DNs according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an information sharing apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of another information sharing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 7 is a second schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein. The objects distinguished by "first", "second", and the like are usually a class, and the number of the objects is not limited, and for example, the first object may be one or a plurality of objects. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The information sharing method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Fig. 1 is a schematic flow chart of an information sharing method provided in an embodiment of the present application, applied to a first information sharing apparatus, including steps 201 to 203:
step 201: the first information sharing apparatus receives target information.
Wherein the target information comprises a verification message.
In an embodiment of the present application, the first information sharing apparatus may receive target information from a target device. The target device may be an operator device, a third party device, or the like, which is not limited in this embodiment of the present application. For example, the third party device may be a server corresponding to the target application in the first information sharing apparatus. Illustratively, the target application may be any application. For example, the target application may be a chat application, a video application, a banking application, an application provided in the system, and the like, which is not limited in this embodiment of the present application.
In this embodiment of the present application, the target information may be a short message or third-party information, and this is not limited in this embodiment of the present application. In one example, in a case where the third party device is a server corresponding to a target application program in the first information sharing apparatus, the third party information may be system information in the target application program.
In an embodiment of the present application, the target information may include at least one of the following: characters and pictures. Wherein the characters may include at least one of: words, numbers, letters, symbols, etc.
In an embodiment of the present application, the verification message may include at least one of the following: characters and pictures. Wherein the characters may include at least one of: words, numbers, letters, symbols, etc. For example, the verification message may be a digital verification code.
Optionally, in this embodiment of the application, the first information sharing apparatus may filter the received information, determine information including the verification message as the target information, and determine information not including the verification message as the interference information. The first information sharing apparatus may not perform any processing for the interference information.
Step 202: the first information sharing device determines a sharing object associated with the first information sharing device according to the target information.
Wherein the shared object comprises at least one of: a shared account, a target information sharing device. The target information sharing apparatus includes a second information sharing apparatus described below.
In this embodiment of the present application, the shared object may be set by default in the system or set by a user, which is not limited in this embodiment of the present application. In this embodiment of the present application, the shared object may include one object or may include a plurality of objects, which is not limited in this embodiment of the present application.
In this embodiment of the present application, the account in this application may be a phone number, an account number in an application program, an account name, and the like, which are not limited in this embodiment of the present application.
Optionally, in this embodiment of the present application, the step 202 may specifically include the following steps: the first information sharing device determines a sharing object associated with the first information sharing device according to the information type corresponding to the target information.
For example, the information category may be a short message category, or may be a third party information category, or may be a system information category, and the like, which is not limited in the embodiment of the present application.
For example, the first information sharing device may further refine the information category. For example, when the information category is a short message category, the information category can be further detailed into a bank short message category, a payment platform short message category, a storage tool short message category, and the like; in the case where the information type is the third-party information type, the information type may be further refined into the application 1 information type, the application 2 information type, and the like.
For example, the mobile phone receives a short message 1 (i.e. the above target information) sent by the server of bank a, where the content of the short message 1 is "verification code: and the account payment element of the tail number A. [ bank A ] ". The mobile phone can identify the short message 1 as a bank short message through character recognition. Then, the mobile phone can determine that the shared account associated with the mobile phone is the mobile phone number 1 according to the bank short message class.
It should be noted that, in the present application, determining the shared object associated with the first information sharing apparatus may be understood as: a sharing object associated with an account corresponding to the first information sharing device is determined.
Illustratively, the step 202 may specifically include the following steps 202a and 202 b:
step 202 a: and the first information sharing device determines a target account according to the target information.
Illustratively, the target account includes at least one of: an account corresponding to the first information sharing device, a third party account. For example, the third party account may be a name of an operator, a name of a third party company, or the like, and this is not limited in this embodiment of the application. For example, the third party company may be a bank, or a video company, or a gaming company, etc.
Step 202 b: the first information sharing device determines a sharing object associated with the first information sharing device according to the target account.
In example 1, the mobile phone receives a short message 1 (i.e. the above target information) sent by the server of bank a, where the content of the short message 1 is "verification code: and the account payment element of the tail number A. [ bank A ] ". The mobile phone can recognize that the third party account corresponding to the short message 1 is bank a and the account corresponding to the mobile phone is account a through character recognition. Then, the mobile phone can determine that the shared account associated with the mobile phone is the mobile phone number 1 according to the bank a and the account a.
Example 2, the mobile phone receives a short message 2 (i.e. the above target information) sent by the server of bank B, where the content of the short message 2 is "verification code: and the account payment element of the tail number B. [ B Bank ] ". The mobile phone can recognize that the third party account corresponding to the short message 2 is bank B and the account corresponding to the mobile phone is account B through character recognition. Then, the mobile phone can determine that the shared account associated with the mobile phone is the mobile phone number 2 according to the bank B and the account B.
Step 203: the first information sharing apparatus shares the authentication message with the shared object.
It should be noted that the sharing of the verification message to the shared object by the first information sharing apparatus may be specifically shared in at least three possible implementation manners.
Example 1, the first information sharing apparatus transmits the authentication message to the sharing object.
Example 2, the shared object acquires the authentication message from the first information sharing apparatus.
Example 3, the first information sharing apparatus stores the authentication message to a first server, and then the shared object acquires the authentication message from the first server.
For example, the first server may be a cloud server or an operator server, which is not limited in the embodiment of the present application.
Optionally, in this embodiment of the application, the step 203 may specifically include the following step 203 a:
step 203 a: the first information sharing apparatus may share the authentication message to the shared object in a targeted manner.
For example, the target mode may be a short message mode, a third party information mode, a website mode, and the like, which is not limited in the embodiment of the present application. For example, the third party information may be chat information in a chat application, or system information in a game application, and the website may be a Uniform Resource Locator (URL).
In one example, the first information sharing apparatus may send first information to the shared object, where the first information indicates the authentication message.
For example, taking the verification code stored in the server a as an example, in combination with example 1, after the mobile phone determines that the shared account associated with the mobile phone is the mobile phone number 1, the mobile phone may send a short message 3 (i.e. the above-mentioned first message) to the mobile phone number 1, where the content of the short message 3 includes a URL address and the character "click the URL to check the verification code". After the mobile phone a corresponding to the mobile phone number 1 receives the short message, if the user of the mobile phone a wants to check the verification code, the user of the mobile phone a can click the URL. At this time, the mobile phone a may use the URL address as an entry to search for the verification code stored in the server a.
In the information sharing method provided by the embodiment of the application, after the first information sharing device receives the target information including the verification message, the first information sharing device may determine the sharing object associated with the first information sharing device. Then, the first information sharing apparatus may share the authentication message to the shared object. Wherein the shared object comprises at least one of: a shared account, a target information sharing device. By the scheme, after the first information sharing device receives the verification message, the shared object associated with the first information sharing device can be directly determined, and the verification message is shared to the shared object. Compared with the scheme of the verification message which needs to be manually forwarded by the user in the related technology, the method and the device for the information sharing can realize the information sharing with other users without manually forwarding any information by the user, so that the information sharing process is simple and convenient in step and high in efficiency.
Optionally, in this embodiment of the present application, the shared object may be set by the user.
Illustratively, before the step 201, the method may further include the following steps 201a and 201 b:
step 201 a: the first information sharing device receives first input of a user to a first setting control in a target sharing setting interface.
For example, the target sharing setting interface described above may be displayed at any position in the display screen of the first information sharing apparatus. For example, the target sharing setting interface may be displayed above the display screen of the first information sharing device, or displayed below the display screen of the first information sharing device, or displayed on the left side of the display screen of the first information sharing device, or displayed on the right side of the display screen of the first information sharing device, and the like, which is not limited in the embodiment of the present application.
For example, the first setting control described above may be displayed at any position in the target sharing setting interface. For example, the first setting control may include one control, or may include a plurality of controls, which is not limited in this embodiment of the application.
It is to be appreciated that the first setting control described above is for setting at least one of the shared account and the target information sharing device described above.
Illustratively, the first input may be: the click input of the user to the first setting control, or the voice instruction input by the user, or the specific gesture input by the user may be specifically determined according to the actual use requirement, which is not limited in the embodiment of the present application.
The specific gesture in the embodiment of the application can be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure identification gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application can be click input, double-click input, click input of any number of times and the like, and can also be long-time press input or short-time press input.
Step 201 b: in response to the first input, the first information sharing device determines the sharing object associated with the first information sharing device.
The information sharing method provided by the embodiment of the application can be applied to a scene of setting the shared object, the first information sharing device can be operated conveniently by a user in a mode of displaying a target sharing setting interface, then the user sets the shared object through the first setting control according to requirements, so that the determination process of the shared object is flexible and convenient, and the safety of information sharing can be ensured by setting the shared object.
Optionally, in this embodiment of the application, the user may set not only the shared object but also other shared information.
For example, in the case that the target sharing setting interface further includes N second setting controls, the method may further include the following steps 201c and 201 d:
201 c: and the first information sharing device receives second input of the target setting control in the N second setting controls from the user.
For example, the second input may be: the click input of the target setting control by the user, or the voice instruction input by the user, or the specific gesture input by the user may be specifically determined according to the actual use requirement, which is not limited in the embodiment of the present application.
The N second setting controls are used for setting N pieces of shared information, and N is a positive integer.
Illustratively, the N pieces of shared information may include at least one of: the allowed sharing times, the effective sharing time period and the sharing mode. It should be noted that the N pieces of shared information include, but are not limited to, the aforementioned 3 pieces of information. For example, the N shared information may further include a sharing rule.
It should be noted that the N pieces of shared information are used to verify the identity of the shared object.
Illustratively, the sharing rule includes at least one of: and adopting which data network authentication or authorization protocol to match with the biological characteristic information. For example, the first information sharing device may set a New Radio (NR) DN authentication protocol using 5G.
Illustratively, the number of allowed shares described above may be any number of times. For example, the number of allowed shares may be 1 or 3. It is to be understood that when the number of sharing is greater than the permitted number of sharing, the first information sharing apparatus will no longer share the above-described authentication message to the sharing object.
Illustratively, the effective sharing time period described above may include a date and a time period. The date may specifically include year, month, and day. For example, the validation message is effectively shared for a period of 10 x years x months x days to 12 x days.
It should be noted that the first information sharing apparatus may set the effective sharing time period, in addition to the effective sharing time period. For example, the valid sharing duration may be counted by the first information sharing device from the sharing of the authentication code to the sharing object. For example, the authentication message valid sharing duration is 3 hours.
For example, the sharing mode may be a short message mode, a third party information mode, a website mode, and the like, which is not limited in the embodiment of the present application. For example, the third party information may be chat information in a chat application, or system information in a game application, and the website may be a URL.
In the case where the first information sharing apparatus is provided with the sharing scheme, the target scheme described above is the sharing scheme.
Step 201 d: in response to the second input, the first information sharing apparatus determines the N pieces of shared information corresponding to the target information.
It should be noted that there is no obvious sequence between the first information sharing apparatus executing the step 201c and executing the step 201 a. For example, the first information sharing device may execute step 201a after executing step 201c, may execute step 201a before executing step 201c, and may also execute step 201a while executing step 201c, which is not limited in this embodiment of the present application.
Optionally, in an embodiment of the present application, the method may further include the following step a1 and step a 2:
step A1: the first information sharing device receives a third input from the user.
Illustratively, the third input may be: the specific input of the user to a click on the display screen of the first information sharing device, or a voice instruction input by the user, or a specific gesture input by the user may be determined according to actual use requirements, and the embodiment of the present application does not limit this.
Step A2: and responding to the third input, and displaying the target sharing setting interface by the first information sharing device.
The target sharing setting interface is displayed with at least one setting control, where the at least one setting control may include the first setting control or may also include the N second setting controls, which is not limited in this embodiment of the application.
The information sharing method provided by the embodiment of the application can be applied to scenes for setting other shared information, the first information sharing device can be convenient for a user to operate in a mode of displaying a target sharing setting interface, then the user sets the shared information through N second setting controls according to requirements, for example, the number of times of sharing is allowed through setting, the time period and the sharing mode are effectively shared, so that the shared information can be enriched, the determination process of the shared information is flexible and convenient, and after the entry of verification information or user name passwords and the like are leaked, malicious access of lawbreakers is avoided, and the safety of information sharing is ensured.
Optionally, in this embodiment of the application, after the user sets the shared object and other shared information, the shared object and other shared information may be stored.
Illustratively, the method may further include the step 204 of:
step 204: the first information sharing apparatus transmits the object information of the sharing object and the N pieces of sharing information to a target server.
For example, the target server may be an operator server, and may also be a cloud server with any authentication security, which is not limited in the embodiment of the present application.
Illustratively, the object information may include at least one of: name, model number. The object information includes, but is not limited to, the two kinds of information described above.
It should be noted that the device for verifying the identity of the shared object may obtain the object information of the shared object and the N pieces of shared information from the target server.
The target server may be the same as the first server or may be a different server, which is not limited in this embodiment of the application.
The information sharing method provided by the embodiment of the application can be applied to a scene of storing shared information, and the first information sharing device can store the determined shared object and the N pieces of shared information in the target server, so that the memory of the first information sharing device can be released, and the device for verifying the identity of the shared object can conveniently acquire the object information of the shared object and the N pieces of shared information.
Fig. 2 is a schematic flow chart of another information sharing method provided in the embodiment of the present application, which is applied to a second information sharing apparatus, and includes steps 301 and 302:
step 301: the second information sharing device receives the first information sent by the first information sharing device.
Wherein, the first information is used for indicating the verification message. In one example, the first information may include the verification message.
In an embodiment of the present application, the first information sharing apparatus may transmit the first information in a first manner. For example, the first method may be a short message method, a third party information method, a website method, and the like, which is not limited in the embodiment of the present application. For example, the third party information may be chat information in a chat application, or system information in a game application, and the website may be a URL.
In an embodiment of the present application, the verification message may include at least one of the following: characters and pictures. Wherein the characters may include at least one of: words, numbers, letters, symbols, etc. For example, the verification message may be a digital verification code.
Step 302: and the second information sharing device acquires the verification message under the condition that a target preset condition is met.
Wherein the target preset condition comprises at least one of the following conditions: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message is less than or equal to the allowed sharing times.
In one example, obtaining the verification message as described above may be understood as directly displaying the verification message.
Illustratively, the first biometric information is biometric information collected by the second information sharing device. Illustratively, the biometric information in the embodiments of the present application may include at least one of: fingerprint, face, voiceprint, pupil.
For example, the current sharing time may be a time at which the user triggers the second information sharing device to acquire the authentication message. For example, the current shared time may be a time, or may be a time period, which is not limited in this embodiment of the application.
For example, the above-mentioned DN authorization may be authorized by using a secondary authentication of a 5GNR DN, or may be authorized by using a 4G authentication, which is not limited in this embodiment of the present application.
For example, taking the second sharing device as the UE and performing authorization by using 5GNR DN secondary authentication as an example, the network side Session Management Function (SMF) may determine whether to perform secondary authentication and authorization according to authentication information or data network identifier carried by the UE. Among them, the data network authentication, authorization and accounting (DN-AAA) is mainly the work of the DN-AAA authentication server. Fig. 3 is a schematic flow chart of related secondary authentication and authorization of 5GNR DNs, and a specific process of secondary authentication and authorization of 5GNR DNs is exemplarily described below with reference to fig. 3.
1. N4 session establishment. If there is no N4 session available to carry DN-related messages between the SMF and the DN-AAA server, the SMF will select a User Plane Function (UPF) and trigger an N4 session establishment. Where the N4 session is the reference point between SMF and UPF.
2. Authentication/authorization request. The SMF sends a first instruction (e.g., SMPDUDNRequestContainer) received from the UE to be sent to the DN-AAA server via the UPF. The first instruction is used for signaling transmission between a network element UPF and DN-AAA, and comprises Protocol Data Unit (PDU) information.
3a, authentication/authorization response. The DN-AAA server sends a secondary authentication and authorization message to the SMF, which is transmitted over the UPF.
3b, Namf interaction (N1N2 messaging). The SMF transmits an authentication message (e.g., dnrequestconnectivity information) received from the DN-AAA server to an Access and Mobility Management Function (AMF).
3c, Non-Access Stratum (NAS) Session Management (SM) transmission (authentication message). The AMF sends the N1NAS message to the UE.
3d, NAS SM transport (authentication message). The UE sends an authentication message to the AMF.
3e, updating SM context through Nsmf PDU session (N1 SM message). The AMF transmits an authentication message (e.g., DNRequestContainerinformation) received from the UE to the DN-AAA server.
3f, authentication/authorization request. The SMF sends the contents of the authentication message to the DN-AAA server via the UPF.
4. An authentication/authorization response. The DN-AAA server confirms that the authentication and authorization of the PDU session are successful.
5. The PDU session setup procedure continues and completes.
6. If a request is requested in the above 3 or the request is configured according to a local policy, the SMF may notify the DN-AAA server of at least one of an Internet Protocol (IP) address, a Media Access Control (MAC) address, N6 traffic routing information allocated to the PDU session, and a General Public Subscription Identifier (GPSI).
It should be noted that the authentication and authorization message may be sent to the DN-AAA server in the form of DNRequestContainerInformation.
In one example, since the 5GNRDN secondary authentication cannot effectively verify the validity of the user, the 5GNR DN secondary authentication is combined with the biometric information matching during the PDU session, so that the biometric information of the user needs to be verified in case the 5GNR DN secondary authentication is successful. And only under the condition that the first biological characteristic information of the user using the second sharing device is matched with the preset biological characteristic information, the authentication is successful, so that the verification message is obtained. Thus, the information sharing process is safer.
In the information sharing method provided in the embodiment of the present application, after receiving the first information sent by the first information sharing apparatus, the second information sharing apparatus obtains the verification when a target preset condition is satisfied. Wherein the first information indicates the verification message, and the target preset condition includes at least one of: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message is less than or equal to the allowed sharing times. Through the scheme, compared with the scheme that the user needs to request the verification message from the user receiving the verification message in the related technology, the method and the device for sharing the information do not need the user to request the verification message from the user receiving the verification message, and therefore the information sharing step is simplified. Meanwhile, after the second information sharing device receives the first information, the verification message can be acquired only when the target preset condition is met, so that the safety of the information sharing process can be improved.
It should be noted that, in the information sharing method provided in the embodiment of the present application, the execution subject may be an information sharing apparatus, or a control module in the information sharing apparatus for executing the information sharing method. In the embodiment of the present application, an information sharing method performed by an information sharing apparatus is taken as an example to describe the information sharing apparatus provided in the embodiment of the present application.
Fig. 4 is a schematic diagram of a possible structure of an information sharing device according to an embodiment of the present disclosure, and as shown in fig. 4, the information sharing device 400 includes: a receiving module 401, a determining module 402 and a sharing module 403, wherein: a receiving module 401, configured to receive target information, where the target information includes a verification message; a determining module 402, configured to determine, according to the target information received by the receiving module 401, a shared object associated with the first information sharing apparatus; a sharing module 403, configured to share the verification message with the sharing object determined by the determining module 402; wherein the shared object comprises at least one of: a shared account, a target information sharing device.
Optionally, the determining module 402 is specifically configured to determine, according to the information category corresponding to the target information, a sharing object associated with the first information sharing device.
Optionally, the receiving module 401 is further configured to receive a first input of a first setting control in the target sharing setting interface from a user; the determining module 402 is further configured to determine the shared object in response to the first input received by the receiving module 401.
Optionally, the target sharing setting interface further includes N second setting controls, one second setting control is used for setting one piece of shared information, the N second setting controls are used for setting N pieces of shared information, and N is a positive integer; the receiving module 401 is further configured to receive a second input of the target setting control in the N second setting controls from the user; the determining module 402 is further configured to determine, in response to the second input received by the receiving module 401, the N pieces of shared information associated with the verification message.
Optionally, the N pieces of shared information include at least one of: the allowed sharing times, the effective sharing time period and the sharing mode.
Optionally, as shown in fig. 4, the information sharing apparatus 400 further includes: a sending module 404; a sending module 404, configured to send the object information of the shared object and the N pieces of shared information to a target server.
It should be noted that, as shown in fig. 4, modules that are necessarily included in the information sharing apparatus 400 are illustrated by solid line boxes, such as the receiving module 401; modules that may or may not be included in the information sharing device 400 are illustrated with dashed boxes, such as the sending module 404.
In the information sharing apparatus provided by the embodiment of the present application, after receiving the target information including the verification message, the first information sharing apparatus may determine the sharing object associated with the first information sharing apparatus. Then, the first information sharing apparatus may share the authentication message to the shared object. Wherein the shared object comprises at least one of: a shared account, a target information sharing device. By the scheme, after the first information sharing device receives the verification message, the shared object associated with the first information sharing device can be directly determined, and the verification message is shared to the shared object. Compared with the scheme of the verification message which needs to be manually forwarded by the user in the related technology, the method and the device for the information sharing can realize the information sharing with other users without manually forwarding any information by the user, so that the information sharing process is simple and convenient in step and high in efficiency.
The information sharing apparatus in the embodiment of the present application may be an apparatus, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. Illustratively, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The information sharing apparatus in the embodiment of the present application may be an apparatus having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The information sharing apparatus provided in the embodiment of the present application can implement each process implemented in the method embodiment of fig. 1, and is not described here again to avoid repetition.
Fig. 5 is a schematic diagram of a possible structure of another information sharing device according to an embodiment of the present disclosure, and as shown in fig. 5, an information sharing device 500 includes: a receiving module 501 and an obtaining module 502, wherein: a receiving module 501, configured to receive first information sent by a first information sharing apparatus, where the first information is used to indicate an authentication message; an obtaining module 502, configured to obtain the verification message when a target preset condition is met; wherein the target preset condition comprises at least one of: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message is less than or equal to the allowed sharing times.
In the information sharing apparatus provided in the embodiment of the present application, after receiving the first information sent by the first information sharing apparatus, the second information sharing apparatus obtains the verification when a target preset condition is satisfied. Wherein the first information indicates the verification message, and the target preset condition includes at least one of: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message is less than or equal to the allowed sharing times. Through the scheme, compared with the scheme that the user needs to request the verification message from the user receiving the verification message in the related technology, the method and the device for sharing the information do not need the user to request the verification message from the user receiving the verification message, and therefore the information sharing step is simplified. Meanwhile, after the second information sharing device receives the first information, the verification message can be acquired only when the target preset condition is met, so that the safety of the information sharing process can be improved.
The information sharing apparatus in the embodiment of the present application may be an apparatus, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. Illustratively, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The information sharing apparatus in the embodiment of the present application may be an apparatus having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The information sharing apparatus provided in the embodiment of the present application can implement each process implemented in the method embodiment of fig. 2, and is not described here again to avoid repetition.
Optionally, as shown in fig. 6, an electronic device 600 is further provided in this embodiment of the present application, and includes a processor 601, a memory 602, and a program or an instruction stored in the memory 602 and capable of being executed on the processor 601, where the program or the instruction is executed by the processor 601 to implement each process of the above-mentioned information sharing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, it is not described here again.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Fig. 7 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 100 includes, but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, and a processor 110.
Those skilled in the art will appreciate that the electronic device 100 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 7 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The radio frequency unit 101 is configured to receive target information, where the target information includes a verification message; a processor 110, configured to determine, according to the target information received by the radio frequency unit 101, a sharing object associated with the first information sharing apparatus; and sharing the verification message to the shared object; wherein the shared object comprises at least one of: a shared account, a target information sharing device.
Optionally, the processor 110 is specifically configured to determine a sharing object associated with the first information sharing device according to the information category corresponding to the target information.
Optionally, the user input unit 107 is configured to receive a first input of a first setting control in the target sharing setting interface from a user; the processor 110 is further configured to determine the shared object in response to the first input received by the user input unit 107.
Optionally, the target sharing setting interface further includes N second setting controls, one second setting control is used for setting one piece of shared information, the N second setting controls are used for setting N pieces of shared information, and N is a positive integer; the user input unit 107 is further configured to receive a second input of the user to a target setting control in the N second setting controls; the processor 110 is further configured to determine the N pieces of shared information associated with the verification message in response to a second input received by the user input unit 107.
Optionally, the N pieces of shared information include at least one of: the allowed sharing times, the effective sharing time period and the sharing mode.
Optionally, the radio frequency unit 101 is configured to send the object information of the shared object and the N pieces of shared information to a target server.
According to the electronic device provided by the embodiment of the application, after the electronic device receives the target information including the verification message, the electronic device can determine the shared object associated with the electronic device. The electronic device may then share the verification message with the shared object. Wherein the shared object comprises at least one of: a shared account, a target information sharing device. Through the scheme, after the electronic equipment receives the verification message, the shared object associated with the electronic equipment can be directly determined, and the verification message is shared to the shared object. Compared with the scheme of the verification message which needs to be manually forwarded by the user in the related technology, the method and the device for the information sharing can realize the information sharing with other users without manually forwarding any information by the user, so that the information sharing process is simple and convenient in step and high in efficiency.
Alternatively, the first and second electrodes may be,
a radio frequency unit 101, configured to receive first information sent by a first information sharing apparatus, where the first information is used to indicate an authentication message; the processor 110 is configured to obtain the verification message when a target preset condition is met; wherein the target preset condition comprises at least one of: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message is less than or equal to the allowed sharing times.
According to the electronic device provided by the embodiment of the application, after receiving the first information sent by the first information sharing device, the electronic device obtains the verification under the condition that the target preset condition is met. Wherein the first information indicates the verification message, and the target preset condition includes at least one of: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message is less than or equal to the allowed sharing times. Through the scheme, compared with the scheme that the user needs to request the verification message from the user receiving the verification message in the related technology, the method and the device for sharing the information do not need the user to request the verification message from the user receiving the verification message, and therefore the information sharing step is simplified. Meanwhile, after the electronic device receives the first information, the verification message can be acquired only when the target preset condition is met, so that the safety of the information sharing process can be improved.
It should be understood that, in the embodiment of the present application, the input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics Processing Unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 107 includes a touch panel 1071 and other input devices 1072. The touch panel 1071 is also referred to as a touch screen. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 109 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 110 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned information sharing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the above embodiment of the information sharing method, and can achieve the same technical effect, and the details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (16)

1. An information sharing method applied to a first information sharing device, the method comprising:
receiving target information, wherein the target information comprises a verification message;
determining a sharing object associated with the first information sharing device according to the target information;
sharing the verification message to the shared object;
wherein the shared object comprises at least one of: a shared account, a target information sharing device.
2. The method of claim 1, wherein the determining, according to the target information, a shared object associated with the first information sharing device comprises:
and determining a sharing object associated with the first information sharing device according to the information category corresponding to the target information.
3. The method of claim 1 or 2, wherein prior to said receiving target information, the method further comprises:
receiving a first input of a user to a first setting control in a target sharing setting interface;
in response to the first input, determining the shared object.
4. The method according to claim 3, wherein the target sharing setting interface further comprises N second setting controls, one second setting control is used for setting one sharing information, the N second setting controls are used for setting N sharing information, and N is a positive integer;
the method further comprises the following steps:
receiving second input of a user to a target setting control in the N second setting controls;
in response to the second input, determining the N shared information associated with the verification message.
5. The method of claim 4, wherein the N shared information comprises at least one of: the allowed sharing times, the effective sharing time period and the sharing mode.
6. The method of claim 4, further comprising:
and sending the object information of the shared object and the N pieces of shared information to a target server.
7. An information sharing method applied to a second information sharing device, the method comprising:
receiving first information sent by a first information sharing device, wherein the first information is used for indicating a verification message;
acquiring the verification message under the condition that a target preset condition is met;
wherein the target preset condition comprises at least one of: the first biological characteristic information of the user using the second information sharing device is matched with the preset biological characteristic information, the data network DN is authorized, the obtaining time of the verification message is in the effective sharing time period, and the obtaining times of the verification message is less than or equal to the allowed sharing times.
8. An information sharing apparatus, characterized in that the information sharing apparatus comprises: the device comprises a receiving module, a determining module and a sharing module;
the receiving module is used for receiving target information, and the target information comprises a verification message;
the determining module is used for determining a sharing object associated with the first information sharing device according to the target information received by the receiving module;
the sharing module is used for sharing the verification message to the sharing object determined by the determining module;
wherein the shared object comprises at least one of: a shared account, a target information sharing device.
9. The information sharing apparatus according to claim 8, wherein the determining module is specifically configured to determine the sharing object associated with the first information sharing apparatus according to an information category corresponding to the target information.
10. The information sharing apparatus according to claim 8 or 9,
the receiving module is further used for receiving a first input of a first setting control in the target sharing setting interface from a user;
the determining module is further configured to determine the shared object in response to the first input received by the receiving module.
11. The information sharing apparatus according to claim 10, wherein the target sharing setting interface further includes N second setting controls, one second setting control is used for setting one sharing information, the N second setting controls are used for setting N sharing information, N is a positive integer;
the receiving module is further configured to receive a second input of the target setting control in the N second setting controls from the user;
the determining module is further configured to determine the N shared information associated with the verification message in response to the second input received by the receiving module.
12. The information sharing apparatus according to claim 11, wherein the N pieces of shared information include at least one of: the allowed sharing times, the effective sharing time period and the sharing mode.
13. The information sharing apparatus according to claim 11, wherein the information sharing apparatus comprises: a sending module;
the sending module is configured to send the object information of the shared object and the N pieces of shared information to a target server.
14. An information sharing apparatus, characterized in that the information sharing apparatus comprises: the device comprises a receiving module and an obtaining module;
the receiving module is configured to receive first information sent by a first information sharing apparatus, where the first information is used to indicate a verification message;
the acquisition module is used for acquiring the verification message under the condition that a target preset condition is met;
wherein the target preset condition comprises at least one of: and matching the first biological characteristic information of the user using the second information sharing device with preset biological characteristic information, wherein the DN is authorized, the acquisition time of the verification message is in a valid sharing time period, and the acquisition times of the verification message are less than or equal to the allowed sharing times.
15. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the information sharing method as claimed in any one of claims 1 to 6 or claim 7.
16. A readable storage medium, characterized in that the readable storage medium stores thereon a program or instructions which, when executed by a processor, implement the steps of the information sharing method according to any one of claims 1 to 6 or claim 7.
CN202110083234.7A 2021-01-21 2021-01-21 Information sharing method and device, electronic equipment and readable storage medium Pending CN112785312A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110083234.7A CN112785312A (en) 2021-01-21 2021-01-21 Information sharing method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110083234.7A CN112785312A (en) 2021-01-21 2021-01-21 Information sharing method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112785312A true CN112785312A (en) 2021-05-11

Family

ID=75758273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110083234.7A Pending CN112785312A (en) 2021-01-21 2021-01-21 Information sharing method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112785312A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301506A (en) * 2021-05-27 2021-08-24 维沃移动通信有限公司 Information sharing method and device, electronic equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495638A (en) * 2018-09-27 2019-03-19 维沃移动通信有限公司 A kind of information display method and terminal
CN109670322A (en) * 2018-12-10 2019-04-23 杭州安恒信息技术股份有限公司 A kind of method and system of data sharing re-authentication
CN111597542A (en) * 2020-04-23 2020-08-28 维沃移动通信(杭州)有限公司 Verification information sharing method and device, electronic equipment and storage medium
CN111641550A (en) * 2020-05-09 2020-09-08 维沃移动通信有限公司 Communication object adding method and device and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495638A (en) * 2018-09-27 2019-03-19 维沃移动通信有限公司 A kind of information display method and terminal
CN109670322A (en) * 2018-12-10 2019-04-23 杭州安恒信息技术股份有限公司 A kind of method and system of data sharing re-authentication
CN111597542A (en) * 2020-04-23 2020-08-28 维沃移动通信(杭州)有限公司 Verification information sharing method and device, electronic equipment and storage medium
CN111641550A (en) * 2020-05-09 2020-09-08 维沃移动通信有限公司 Communication object adding method and device and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301506A (en) * 2021-05-27 2021-08-24 维沃移动通信有限公司 Information sharing method and device, electronic equipment and medium
CN113301506B (en) * 2021-05-27 2023-07-25 维沃移动通信有限公司 Information sharing method, device, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN105530175B (en) Message processing method, device and system
CN109039990B (en) Behavior verification method and device based on verification code
TW201635181A (en) On demand passwords
WO2015055095A1 (en) Identity authentication method and device and storage medium
CN108234124B (en) Identity verification method, device and system
CN110826043A (en) Digital identity application system and method, identity authentication system and method
CN111368232A (en) Password sharing reflux method and device, electronic equipment and storage medium
CN111783055A (en) Account information management method and device and electronic equipment
CN108475304A (en) A kind of method, apparatus and mobile terminal of affiliate application and biological characteristic
WO2023025054A1 (en) Remote assistance method and apparatus, and electronic device and medium
EP3118760B1 (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
CN110120933B (en) Wind control, man-machine recognition and data processing method, equipment and system
CN108200075B (en) Identity authentication method, system, terminal and storage medium
CN111669744B (en) Information processing method and device and electronic equipment
CN112785312A (en) Information sharing method and device, electronic equipment and readable storage medium
CN108234412B (en) Identity verification method and device
CN108234113B (en) Identity verification method, device and system
CN110990821B (en) Identity type verification method, device and storage medium
CN108156071B (en) Method for adding members to community, terminal device and computer readable storage medium
CN106254226A (en) A kind of information synchronization method and device
WO2014169498A1 (en) Method and system for third-party service platform login
CN114124462B (en) Verification code transmission method and device, electronic equipment and storage medium
CN108234409B (en) Identity verification method and device
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
CN111031013B (en) Application authentication mode determining method, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination