CN113727335A - Sharing processing method and device - Google Patents

Sharing processing method and device Download PDF

Info

Publication number
CN113727335A
CN113727335A CN202110998602.0A CN202110998602A CN113727335A CN 113727335 A CN113727335 A CN 113727335A CN 202110998602 A CN202110998602 A CN 202110998602A CN 113727335 A CN113727335 A CN 113727335A
Authority
CN
China
Prior art keywords
sharing
user
password
terminal
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110998602.0A
Other languages
Chinese (zh)
Other versions
CN113727335B (en
Inventor
吴超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AlipayCom Co ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202410124941.XA priority Critical patent/CN117896716A/en
Priority to CN202110998602.0A priority patent/CN113727335B/en
Publication of CN113727335A publication Critical patent/CN113727335A/en
Application granted granted Critical
Publication of CN113727335B publication Critical patent/CN113727335B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • G06F9/453Help systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the specification provides a sharing processing method and a sharing processing device, wherein the sharing processing method comprises the following steps: acquiring configuration editing information submitted by a first terminal after editing aiming at application configuration of a target user in an application mode; generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal; and issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.

Description

Sharing processing method and device
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a sharing method and an apparatus.
Background
With the development of mobile communication, the functions of mobile terminals are more and more abundant, and more scenes are needed to use the mobile terminals, so that users covered by the mobile terminals are more and more comprehensive, and with the rapid development of internet technology, the users increasingly rely on obtaining information through networks, wherein, the use of information products by old users is obviously different from that of young users due to the change of physiology and psychology. In the life scene of the modern society, the dependence on the mobile terminal equipment is increasingly greater. The mobile terminal equipment is inconvenient for the old user to use, so that a huge 'digital gap' is formed in the aspects of payment, entertainment, communication and the like, and great inconvenience is brought to the life of the old user.
Disclosure of Invention
One or more embodiments of the present specification provide a first sharing processing method. The sharing processing method is applied to a server and comprises the following steps: and acquiring configuration editing information submitted by a first terminal after editing the application configuration of the target user in the application mode. And generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal. And issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
One or more embodiments of the present specification provide a second sharing processing method, which is applied to a first terminal, and includes: and acquiring a target user selected by the sharing user after the server returns the associated user list. And displaying an editing page edited according to the application configuration of the target user in the application mode, reading the configuration editing information submitted by the sharing user and submitting the configuration editing information to the server. And receiving the sharing password sent by the server, and sending the sharing password to the target user.
One or more embodiments of the present specification provide a third sharing processing method, which is applied to a second terminal, and includes: and receiving and displaying the sharing password shared by the sharing user. And submitting an access request to a server under the condition that the access user is detected to access the sharing password in the application program. And according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
One or more embodiments of the present specification provide a first shared processing apparatus, operating on a server, including: the editing information acquisition module is configured to acquire configuration editing information submitted by the first terminal after editing the application configuration of the target user in the application mode. And the sharing password generating module is configured to generate a sharing password based on the configuration editing information and send the sharing password to the first terminal. And the editing information issuing module is configured to issue the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
One or more embodiments of the present specification provide a second sharing processing apparatus, operating in a first terminal, including: and the target user acquisition module is configured to acquire the target user selected by the sharing user after the server returns the associated user list. And the editing information reading module is configured to display an editing page edited according to the application configuration of the target user in the application mode, read the configuration editing information submitted by the sharing user and submit the configuration editing information to the server. And the sharing password sending module is configured to receive the sharing password sent by the server and send the sharing password to the target user.
One or more embodiments of the present specification provide a third sharing processing apparatus, operating in a second terminal, including: and the sharing password receiving module is configured to receive and display the sharing password shared by the sharing user. And the access request submitting module is configured to submit an access request to the server under the condition that the access user is detected to access the sharing password in the application program. And the application mode loading module is configured to load the configuration of the application mode in the application program according to the configuration editing information sent by the server.
One or more embodiments of the present specification provide a first shared processing apparatus including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring configuration editing information submitted by a first terminal after editing the application configuration of the target user in the application mode. And generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal. And issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
One or more embodiments of the present specification provide a second shared processing apparatus, including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring a target user selected by the sharing user after the server returns the associated user list. And displaying an editing page edited according to the application configuration of the target user in the application mode, reading the configuration editing information submitted by the sharing user and submitting the configuration editing information to the server. And receiving the sharing password sent by the server, and sending the sharing password to the target user.
One or more embodiments of the present specification provide a third sharing processing device, including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and receiving and displaying the sharing password shared by the sharing user. And submitting an access request to a server under the condition that the access user is detected to access the sharing password in the application program. And according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
One or more embodiments of the present specification provide a first storage medium storing computer-executable instructions that, when executed by a processor, implement the following: and acquiring configuration editing information submitted by a first terminal after editing the application configuration of the target user in the application mode. And generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal. And issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
One or more embodiments of the present specification provide a second storage medium storing computer-executable instructions that, when executed by a processor, implement the following: and acquiring a target user selected by the sharing user after the server returns the associated user list. And displaying an editing page edited according to the application configuration of the target user in the application mode, reading the configuration editing information submitted by the sharing user and submitting the configuration editing information to the server. And receiving the sharing password sent by the server, and sending the sharing password to the target user.
One or more embodiments of the present specification provide a third storage medium storing computer-executable instructions that, when executed by a processor, implement the following: and receiving and displaying the sharing password shared by the sharing user. And submitting an access request to a server under the condition that the access user is detected to access the sharing password in the application program. And according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
Drawings
In order to more clearly illustrate one or more embodiments or technical solutions in the prior art in the present specification, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without inventive exercise;
fig. 1 is a flowchart of a first sharing processing method provided in one or more embodiments of the present specification;
FIG. 2 is a schematic illustration of a shared guide page provided in one or more embodiments of the disclosure;
FIG. 3 is a schematic diagram of a first target user capture page provided in one or more embodiments of the present disclosure;
FIG. 4 is a schematic diagram of a second target user capture page provided in one or more embodiments of the present disclosure;
FIG. 5 is a schematic diagram of an editing page provided in one or more embodiments of the present specification;
FIG. 6 is a schematic illustration of a preview display page provided by one or more embodiments of the present specification;
FIG. 7 is a schematic illustration of a password display page provided in one or more embodiments of the specification;
FIG. 8 is a schematic illustration of a guide page provided in one or more embodiments of the disclosure;
FIG. 9 is a diagram of a grandparent mode home page in accordance with one or more embodiments of the present disclosure;
fig. 10 is a processing sequence diagram of a sharing processing method applied to a scene of an elderly user according to one or more embodiments of the present disclosure;
fig. 11 is a flowchart of a second sharing processing method provided in one or more embodiments of the present specification;
fig. 12 is a flowchart illustrating a third sharing processing method according to one or more embodiments of the present disclosure;
fig. 13 is a schematic diagram of a first shared processing device according to one or more embodiments of the present disclosure;
FIG. 14 is a schematic diagram of a second shared processing device according to one or more embodiments of the present disclosure;
fig. 15 is a schematic diagram of a third sharing processing apparatus according to one or more embodiments of the present disclosure;
fig. 16 is a schematic structural diagram of a first shared processing device according to one or more embodiments of the present specification;
fig. 17 is a schematic structural diagram of a second shared processing device according to one or more embodiments of the present specification;
fig. 18 is a schematic structural diagram of a third sharing processing device according to one or more embodiments of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present disclosure, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
A first sharing method embodiment provided in this specification:
referring to fig. 1, which shows a processing flow diagram of a sharing processing method provided in this embodiment, referring to fig. 2, which shows a schematic view of a sharing guidance page provided in this embodiment, referring to fig. 3, which shows a schematic view of a first target user collection page provided in this embodiment, referring to fig. 4, which shows a schematic view of a second target user collection page provided in this embodiment, referring to fig. 5, which shows a schematic view of an edit page provided in this embodiment, referring to fig. 6, which shows a schematic view of a preview presentation page provided in this embodiment, referring to fig. 7, which shows a schematic view of a password presentation page provided in this embodiment, referring to fig. 8, which shows a schematic view of a guidance page provided in this embodiment, referring to fig. 9, which shows a schematic view of a senior mode home page provided in this embodiment, referring to fig. 10, the processing sequence diagram of the sharing processing method applied to the scene of the elderly user is shown in the figure.
Referring to fig. 1, the sharing processing method provided in this embodiment is applied to a server, and specifically includes steps S102 to S106.
Step S102, configuration editing information submitted by the first terminal after the first terminal edits the application configuration of the target user in the application mode is obtained.
In the sharing processing method provided by this embodiment, the sharing user sets the application configuration of the application mode for the target user, and the application configuration set by the sharing user is loaded on the user terminal of the target user under the condition that the target user confirms. Specifically, a sharing user edits application configuration under an application mode for a target user through a user terminal of the sharing user, after the application configuration of the target user is edited, a sharing password generated based on configuration editing information after the application configuration is edited is sent to the user terminal of the target user, after the sharing password shared by the sharing user is confirmed by the target user, the configuration loading of the application mode is carried out in an application program operated by the user terminal of the target user, so that for special users (such as old users, users with abnormal body and children users), the application configuration of the application program of the special user under the application mode can be edited by a guardian (such as children of the old users and parents of the children users), after the application configuration edited by the special user is confirmed by the guardian, the loading configuration of the application mode is carried out in the application program operated by the user terminal of the special user, the perception degree of the special user to the application program is improved, the use threshold of the special user to the application program is reduced, and the application experience of the user to the application service is improved.
The application modes include preset operation modes of an application program running on the user terminal, such as: elder mode (elderly mode), child mode. The application configuration includes a page configuration of an access page of the application program in a preset operation mode, such as: the third party pays for the application's page configuration to access the home page in grandparent mode.
In this embodiment, a sharing user (e.g., a guardian) edits an access home page of an application program of a special user in a preset operation mode through a user terminal of the sharing user, specifically, the sharing user can edit a default sub-application in the access home page in the preset operation mode, after the editing is completed, a sub-application identifier of the edited access home page is collected according to a configuration sequence, and after the sub-application identifier with the sequence identifier is collected, a sharing password is generated according to the sub-application identifier and a user identifier of the special user selected by the sharing user and sent to the selected special user, so that the special user uses the preset operation mode edited by the sharing user in the application program. A user terminal of the sharing user is a first terminal, and a special user selected by the sharing user is a target user; the configuration editing information comprises a sub-application identifier with a sequence identifier and a target user identifier.
In specific implementation, in the process of sharing from a target user by a sharing user, the sharing user submits a sharing access instruction for the sharing service through an application program operated by a first terminal of the sharing user, in order to improve the perception degree of the sharing user for the sharing service and enable the sharing user to more accurately perceive the service content of the sharing service, the first terminal displays a sharing guide page after detecting the sharing access instruction, and submits a configuration access request to a server under the condition that the sharing user submits the configuration access instruction through the sharing guide page, so that the server queries an associated user and/or a history invitation user of the sharing user based on the configuration access request. In an optional implementation manner provided by this embodiment, before obtaining the configuration editing information submitted by the first terminal, the server performs the following steps:
inquiring whether a sharing user has at least one history sharing user according to a configuration access request submitted by the first terminal;
if not, transmitting the user identification of the sharing user into an associated user query interface for associated user confirmation; desensitizing the associated user identifier of the associated user returned by the associated user query interface, and returning an associated user list obtained by desensitizing to the first terminal;
if so, reading the user identification and the sharing state of the at least one history sharing user, and desensitizing the user identification of the history sharing user; determining the associated user list based on the user identification of the sharing user; and returning the desensitized user identification and the sharing state of the at least one history sharing user and the associated user list to the first terminal.
Specifically, a first terminal submits a configuration access request to a server after detecting a configuration access instruction of a sharing user, the server inquires whether the sharing user has at least one history sharing user after receiving the configuration access request, if yes, history user information obtained after desensitization processing is carried out on a user identifier of the at least one history sharing user is determined, an associated user list obtained after desensitization processing is carried out on a user identifier of an associated user of the sharing user is determined, and the history user information and the associated user list are sent to the first terminal, so that the first terminal renders a target user acquisition page and displays the target user acquisition page based on the history user list and the associated user, wherein the history user information comprises the user identifier subjected to desensitization processing and a sharing state of each history sharing user; it should be noted that, because the user identifiers of the history sharing user and the associated user belong to the privacy of the history sharing user and the associated user to some extent, in order to ensure the data privacy of the history sharing user and the associated user, the user identifiers in the associated user list and the history user information sent to the first terminal are the user identifiers subjected to desensitization processing, where the user identifiers include name identifiers and/or communication identifiers of users.
And if not, determining an associated user list obtained after desensitization treatment is carried out on the user identification of the sharing user, and sending the associated user list to the first terminal so that the first terminal renders a target user acquisition page based on the associated user list and displays the target user acquisition page. The associated user refers to a user who has a relationship with the sharing user.
Further, in an optional implementation manner provided by this embodiment, if the first terminal receives an associated user list returned by the server, the first terminal renders and displays a target user acquisition page including a recommended user area based on the associated user list; enabling the sharing user to select the target user from the associated users displayed in the recommended user area, or searching and inputting the target user through the target user collection page;
in addition, if history user information and an associated user list returned by the server are received, namely the associated user list, the sharing state of at least one history sharing user and desensitized user identification, at first, the at least one history sharing user is ranked according to the sharing state of each history sharing user in the at least one history sharing user to obtain a history user list, and then a target user acquisition page containing a recommended user area and a history user area is rendered and displayed based on the history user list and the associated user list.
For example, a user P accesses a sharing service through a first terminal, the first terminal displays a sharing guide page as shown in fig. 2 when detecting that the user P submits a sharing access request for the sharing service, when detecting that the user P triggers a "unset" control configured in fig. 2, submits a configuration access request to a server, the server receives the configuration access request, queries whether the user P has a history sharing user, if not, transmits a user identifier of the user P into an associated user query interface for associated user query, performs desensitization processing on a user identifier in an associated user list returned by the associated user query interface, and transmits the desensitized associated user list to the first terminal, and after receiving the associated user list, the first terminal renders a target user acquisition page as shown in fig. 3 and displays the target user acquisition page;
if the query result is yes, reading the user identifier and the sharing state of the history sharing user, transmitting the user identifier of the user P into the associated user query interface to query the associated user of the user, desensitizing the user identifier of the history sharing user and the user identifier in the associated user list returned by the associated user query interface, transmitting the desensitized associated user list, the user identifier of the history sharing user and the sharing state to the first terminal, and after receiving the associated user list, the user identifier of the history sharing user and the sharing state by the first terminal, and sequencing the history sharing users according to the priority of 'waiting for agreement' and the second agreed priority, and rendering and displaying a target user acquisition page as shown in fig. 4 according to the sequence of the sequenced history sharing users and the sequence of the associated users in the associated user list.
It should be noted that fig. 3 includes a recommended user area 301, where a user P may determine a selected associated user as a target user by triggering any associated user in the recommended user area, if the number of associated users in the associated user area exceeds a threshold, only a preset number of associated users are displayed in the recommended user area 301, after clicking a "expand" control configured in the recommended user area 301, all associated users in the associated user area are displayed, in addition, a control 302 is further configured in fig. 3, and in a case where the control 302 is triggered, a buddy list of the user P is displayed so that the user P selects the target user in the buddy list; fig. 4 includes a recommended user area 401 and a historical user area 402, where desensitized user identifiers and sharing states of historical sharing users are displayed in the historical user area 402, and for the historical sharing users waiting for an agreeable state, the user P may select to remind again, or may modify configuration editing information; for the agreed history sharing users, the user P may modify the configuration edit information.
In addition, in order to avoid user interference and influence on user experience caused by sending passwords by a plurality of users of the sharing users, the upper limit of the history sharing users of the sharing users can be set, that is, if the number of the inquired history sharing users exceeds the sharing threshold, the sharing permission of the sharing users is closed, and a closing prompt of the sharing permission is sent to the first terminal, so that the first terminal performs the display of the closing prompt.
For the two situations that only the associated user is queried and the history sharing user is queried, if the server returns to the first terminal as the associated user list, the target user acquisition page containing the recommended user area is rendered and displayed on the basis of the associated user list, so that the sharing user selects any associated user in the recommended user area as the target user through the target user acquisition page or inputs the target user identifier of the target user through the target user acquisition page;
and if the server returns to the first terminal and is the associated user list, the user identifier of the historical sharing user and the sharing state, rendering and displaying the target user acquisition page including the recommended user area and the historical user area based on the associated user list, the historical user identifier and the sharing state, so that the sharing user can select the target user through the recommended user area and check the invitation details of any historical invitation user through the historical user area.
In specific implementation, in order to improve the perception degree of the sharing user on the selection of the target user and improve the convenience of the sharing user in selecting the target user, the sharing user is prevented from inputting associated users with a relationship of relatives and friends by recommending the associated users to the sharing user, in addition, in order to avoid the inconvenience brought to the sharing user by the sharing user needing to query the user identifier of the target user for many times under the condition of not knowing the user identifier of the target user, after the first terminal displays the acquisition page of the target user, the sharing user can select the associated users in the recommended user area as the target user, the target user can be selected by viewing a friend list (such as a communication friend list and an application friend list), and the target user can be further determined by searching the acquisition page of the target user.
In this embodiment, specifically, in the process of the sharing user selecting the target user for sharing, in order to further improve the convenience of the sharing user selecting the target user, in this embodiment, if the sharing user performs user search through the target user acquisition page to further determine the target user, the first terminal performs the following steps:
acquiring an identification field input by the sharing user through the target user acquisition page;
querying at least one candidate target user based on the identification field;
and performing desensitization processing on the candidate user identification of the at least one candidate target user, and recommending the candidate user identification obtained through desensitization to the sharing user.
Specifically, a sharing user can initiate query by inputting a communication identifier on a target acquisition page, when the first terminal detects that the sharing user inputs an identifier field, the first terminal performs accurate query and/or fuzzy query based on the identifier field, performs desensitization processing on a user identifier of a candidate target user obtained by query if at least one candidate target user is obtained by query, and recommends the desensitized candidate user identifier to the sharing user, wherein the accurate query includes query in a user library of an application program, and query candidate target users matched with the identifier field; the fuzzy query comprises querying candidate target users matched with the identification field in the application friend list and/or the communication friend list.
It should be noted that, if the user identifier corresponding to the identifier field entered by the sharing user is queried, desensitization processing display is performed on the user identifier, so that the sharing user selects a candidate target user corresponding to the desensitized user identifier as a target user, and if the user identifier corresponding to the identifier field is not queried, a query failure prompt is displayed, for example: "the user who searches for you does not exist or the other party sets privacy protection"; if the user identifier corresponding to the identifier field is detected to be the user identifier of the sharing user, displaying login account reminding, such as: "the user identification input by you is the user identification currently logged in, and retry after checking is required"; if the format of the identification field input by the sharing user is detected to be inconsistent with the preset format of the communication identification, displaying a format prompt, such as: please enter the correct communication id.
The sharing user selects or inputs a target user based on the target user acquisition page, and the first terminal displays an editing page edited for the application configuration of the target user in the application mode after acquiring the target user selected by the sharing user after the server returns the associated user list, so that the sharing user edits the application configuration of the target user in the application mode for the target user.
In an optional implementation manner provided by this embodiment, the editing, by the first terminal, of the application configuration of the target user in the application mode includes: replacing the sub-application identification in the default display area configured by the editing page; the editing page comprises a default display area and a recommended display area; transferring the sub-application identification of the default display area to the recommended display area after being deselected; and adding the sub-application identification of the recommended display area to the default display area after being selected.
For example, after an old user entered by a user P through a target collection page is acquired, an initial editing page is displayed, so that the user P edits an access home page of the old user in a grand mode, a default display downslide action guide is provided in a display process of the initial editing page, after the user P downslide, a guide identifier disappears, the editing page shown in fig. 5 is displayed, the editing page comprises a default display area 501 and a recommended display area 502, a sub-application identifier displayed in the default display area 501 is selected by default, the user P can select the selected sub-application identifier, the selected sub-application identifier is transferred to the recommended display area 502, the user P can further drag the sub-application identifier in the default display area to change a sub-application sequence, and the user P can further add the sub-application identifier in the recommended display area 502 to the default display area 501. If the situation that the preview control configured in the editing page is triggered is detected, the preview editing page as shown in fig. 6 is generated based on the edited default display area, wherein after the storage of the configuration in the preview editing page and the notification of the control is triggered, the configuration editing information is read, and after the return modification control configured in the preview editing page is triggered, the preview editing page is returned to the editing page as shown in fig. 5.
After that, the first terminal reads the configuration editing information when detecting that the sharing user submits an editing confirmation instruction, in an optional implementation manner provided in this embodiment, the first terminal reads the configuration editing information by using the following manner:
reading a sub-application identifier of a default display area in an editing page according to an editing confirmation instruction submitted by a sharing user;
sequentially marking the sub-application identifications according to the sub-application sequence of the default display area to obtain marking information;
and determining the marking information, the target user identification and the sharing user identification as the configuration editing information.
Specifically, after acquiring an edit confirmation instruction, the first terminal reads the sub-application identifiers in the default display area configured by the edited edit page (i.e., the sub-application identifiers in the preview display page), sequentially marks the read sub-application identifiers according to the display order of the sub-application identifiers in the default display area, and submits marked information, user identifiers of sharing users, and user identifiers of target users selected by the sharing users as configuration edit information to the server, so that the server generates a sharing password according to the configuration edit information. The marking information includes sub-application identifier ordering with sequence relation after sequentially marking the sub-application identifiers of the read default display area configured on the editing page according to the display sequence of the sub-application identifiers of the default display area, such as: a list of child application identifications with an order relationship.
For example, when a user P edits an edited page, and submits a preview control configured for the edited page, the first terminal renders a preview displayed page based on the sub-application identifier of the default display area in the edited page, reads the sub-application identifier in the preview displayed page when the preview displayed page configuration is stored and the control is notified to be triggered, sequentially marks the sub-application identifiers according to the display sequence of the preview displayed page to the sub-application identifiers, and submits the sequentially marked sub-application identifiers, the user identifier of an elderly user, and the user identifier of the user P as configuration editing information to the server.
And step S104, generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal.
In this embodiment, the sharing password may be a character string, and the form of the character string may be a numeric character, an english character, a chinese character, or a character string in a link form, or the like.
In specific implementation, when the first terminal detects an edit confirmation instruction, the first terminal collects the sub-application identifier and determines that the configuration editing information is submitted to the server, and after the server receives the configuration editing information, in order to enable the sharing user to send a sharing prompt to the target user, the sharing password is generated based on the configuration editing information and sent to the first terminal, so that the first terminal sends the sharing password to the target user. In the process of generating the sharing password, in an optional implementation manner provided by this embodiment, the sharing password is generated and sent to the first terminal in the following manner:
generating the sharing password based on the mark information in the configuration editing information;
establishing an association relationship between the sharing password and the sharing user identifier and the target user identifier contained in the configuration editing information, and sending the sharing password carrying the association relationship to the first terminal;
alternatively, the first and second electrodes may be,
and generating the sharing password containing the sharing user identification and the target user identification based on the marking information, and sending the sharing password to the first terminal.
Specifically, the sharing password may be generated according to the identification information, the association relationship between the sharing user identification and the target user included in the sharing password and the configuration editing information is established, and finally the sharing password with the association relationship is sent to the first terminal; the method includes the steps that a sharing password containing a sharing user identifier and a target user identifier is generated based on mark information and then sent to a first terminal, in addition, a password generation interface is called to generate a random password under the condition that configuration editing information is obtained, the association relation between the random password and the configuration editing information is established, the random password with the association relation is used as the sharing password and sent to the first terminal, and therefore the first terminal sends the sharing password.
For example, after acquiring the sub-application identifier, the user identifier of the user P, and the user identifier of the old user, which are submitted by the server and arranged in sequence, a password request is sent to the password generation interface, so that the password generation interface generates a random password, and after acquiring the random password returned by the password generation interface, an association relationship between the random password and the sub-application identifier, the user identifier of the user P, and the user identifier of the old user is established, and the random password with the association relationship established is sent to the first terminal, so that the first terminal renders and displays a password display page as shown in fig. 7.
In addition, in order to avoid that the sharing user cannot set the application configuration of the application program in the application mode for other users because the target user does not confirm the sharing password for a long time and the sharable number of the sharing user is influenced, an effective period can be set for the sharing password, and the sharing password is marked to be in an invalid state when the effective period reaches and the confirmation of the target user is obtained.
Under the condition of generating the sharing password, after receiving the sharing password, the first terminal renders a password display page and displays the password display page based on the sharing password, wherein a sharing user can jump to a third-party communication application through the password display page to send the sharing password, in order to improve the operation simplicity of the sharing user, the sharing user is not required to actively copy the sharing password, and when a jump control (sharing control) triggered by the user is detected, a copied prompt can be displayed through a pop-up window and the user directly jumps to the third-party communication application; in order to further improve the operation simplicity of the sharing user, countdown can be configured for the password display page, the countdown is started when the password display page is displayed, and the third-party communication application is actively skipped after the preset time is reached.
In order to improve the perception degree of a target user for sending and processing a sharing password by the sharing user, if the sharing user is detected to trigger a jump control, sending a sharing request to a server, so that the server pushes sharing information to the target user associated with the sharing password in an application program according to the sharing request.
In an optional implementation manner provided by this embodiment, the first terminal submits the sharing request to the server after detecting that the sharing user triggers the jump control, and the server performs the following operations:
receiving a sharing request for the sharing password submitted by the first terminal;
inquiring a target user identifier having an association relation with the sharing password according to the sharing request;
and pushing a sharing reminder in an application program of the target user based on the target user identification.
In practical application, because the old user is inconvenient to operate the mobile terminal, in order to avoid the problem that the old user cannot confirm the configuration loading of the application mode due to the fact that the old user is unfamiliar with the operation flow of sharing the password, the password display page is also provided with an operation guide control, and the sharing user can download operation guides and send the operation guides to the old user, so that the old user can confirm the sharing password according to the operation guides. In this embodiment, if the first terminal detects that the operation guidance control configured on the password display page is triggered, the first terminal downloads the pre-stored operation guidance to the first terminal, so that the first terminal sends the operation guidance.
As shown in fig. 7, when detecting that the control 701 is triggered, the first terminal submits a sharing request for the shared password to the server, and the server queries, according to the sharing request, a user identifier of an old user and a user identifier of a user P, which have an association relationship with the shared password, and pushes, by means of message push in an application, a sharing reminder to a user terminal bound to the user identifier of the old user (for example, the user P customizes a elder model for you, experiences the user immediately |), so that the old user can access the shared password through the sharing reminder. The first terminal reads the pre-stored operation guide and downloads the operation guide to the first terminal when detecting that the control 702 is triggered. The downloading form may be a picture or a document, and this embodiment is not limited herein.
It should be noted that, in the process of sending the sharing password to the second terminal by the first terminal, the first terminal may send the sharing password through a third-party communication application (e.g., a mailbox, a social application), or may send the sharing password in an application program. If the first terminal sends the sharing password to the second terminal through the third-party communication application, after the second terminal displays the sharing password, an access user corresponding to the second terminal can copy the sharing password to the application program to access; if the first terminal sends the sharing password to the second terminal through the friend list of the application program, the access user can trigger the sharing password in the friend message list in the application program to access the sharing password.
To sum up, the way for the first terminal to send the shared password to the second terminal includes, but is not limited to, the following three ways:
(1) out-of-application delivery
And the first terminal sends the sharing password through a third-party communication application commonly used by the target user after receiving the sharing password, and the second terminal also displays the sharing password through the third-party communication application after receiving the sharing password. And if the access user wants to access the sharing password, copying the sharing password in the third-party communication application and pasting the sharing password in the application program so as to access the sharing password.
(2) Application-plus-application delivery
The method comprises the steps that after a first terminal receives a sharing password, the first terminal jumps to a third-party communication application to send the sharing password, when a user jump instruction is detected, the first terminal submits a sharing request to a server, the server inquires a target user related to the sharing password according to the sharing request, and message pushing is carried out on the target user in an in-application message pushing mode; the access user can receive the sharing password sent by the sharing user through the third-party communication application and can also receive message pushing in the application program, and further, the access user can access the sharing password in two ways, namely: pasting a sharing password in the third-party communication application to an application program for access; and the second method comprises the following steps: access to the shared password is made through a pushed message that accesses the application.
(3) In-application delivery
After receiving a sharing instruction, a sharing user sends a sharing password through a friend list in an application program, when a first terminal detects that the sharing user selects an access user in the friend list to send the sharing password, the first terminal submits a user identifier of the access user and the sharing password to a server so that the server sends the sharing password to a second terminal of the access user, the second terminal displays the sharing password in a message list of the sharing user and the access user when receiving the sharing password sent by the server, and the access user can access through triggering the displayed sharing password.
According to the method for sending the sharing password from the first terminal to the second terminal, the first terminal sends the sharing password to the second terminal through the application program, sends the sharing password to the second terminal through the third-party communication application or sends the sharing password to the second terminal through the combination of the two, the visiting user needs to submit the visit to the sharing password in the application program, and under the condition that the second terminal detects that the visiting user visits the sharing password in the application program, because whether the access user is the target user cannot be confirmed, in order to ensure the data security of the sharing user, the mode prompt of the application mode is generated and displayed based on the desensitized sharing user identification, and after the access user is detected to submit the mode confirmation instruction through the mode prompt, submitting a password access request to the server so that the server can effectively verify the shared password based on the password access request.
In order to ensure that the target user accesses the shared password, and avoid the situation that the target user cannot confirm due to the fact that other users confirm the shared password, and further cause the situation that the target user cannot perform configuration loading of an application mode, after the fact that the second terminal submits a password access request for the shared password is detected, the shared password is effectively verified. In an optional implementation manner provided by this embodiment, after receiving a password access request for a shared password submitted by a second terminal, the following operations are performed:
according to a password access request submitted by the second terminal after the second terminal detects that the sharing password is accessed in the application program, the sharing password is effectively checked;
if the verification is passed, issuing a pass prompt to the second terminal so that the second terminal displays a guide page based on the pass prompt;
if the verification fails, reading the failure reason, and sending a failure prompt to the second terminal based on the failure reason so that the second terminal displays the verification result;
wherein the performing a valid verification of the shared password comprises:
verifying whether the sharing password is in a valid period, whether the using state of the sharing password is in an unused state and/or whether an access user corresponding to the second terminal is the target user; if yes, determining that the verification is passed; if not, the verification is determined not to pass.
Specifically, when it is detected that the access user copies the sharing password sent by the sharing user to the application program, it is checked first whether the access user is a target user associated with the sharing password, whether the sharing password is in a valid period and/or whether the sharing password is in an unused state, and if so, a pass prompt including a user identifier of the sharing user is sent to the second terminal, so that the second terminal displays a guidance page based on the user identifier of the sharing user.
For example, the first terminal sends a sharing password to the second terminal through the third-party communication application, the second terminal displays the sharing password in the third-party communication application after receiving the sharing password, the access user copies the sharing password from the third-party communication application and opens the sharing password in the application program, the second terminal reads the user identification of the sharing user corresponding to the sharing password and carries out desensitization treatment under the condition that the access user is detected to paste the sharing password in the application program, mode reminding is generated according to the desensitized sharing user identification and displayed in a popup window mode, a password access request is submitted to a server after the mode confirmation instruction of the mode reminding is detected to be submitted by the access user, the server verifies whether the access user is an old user associated with the sharing password after receiving the password access request, and verifies whether the sharing password is in the valid period, verifying whether the using state of the sharing password is an unused state, if so, sending a pass prompt to the second terminal so that the second terminal renders a guide page as shown in fig. 8 based on the user identifier of the user P which is not desensitized and displays the guide page; and if not, reading the reason of the failure verification, and sending a failure prompt to the second terminal based on the failure reason.
If the failure reason in the failure prompt received by the second terminal is that the access user is not the sharing user, displaying the failure prompt (for example, the sharing password is not given to you, and the user asks the other party to confirm and then retries); if the failure reason is that the sharing password is not in the validity period, displaying a failure prompt (for example, if the sharing password is expired and invalid, please contact relatives and friends to resend); if the failure reason is that the using state of the sharing password is the used state, displaying a failure reminder (for example, you are using the preset operation mode customized by the relatives and friends without repeated setting).
And after receiving the pass prompt, the second terminal renders and displays a guide page based on the user identifier of the sharing user, and the access user can confirm the sharing password through the guide page and also can choose not to use the configuration editing information associated with the sharing password temporarily. And if the access user triggers a confirmation control for guiding the page configuration, submitting an access request to the server so that the server issues configuration editing information to the second terminal according to the access request. As shown in fig. 8, when the "use immediately" control is triggered, an access request is submitted to the server, so that the server issues the configuration editing information. And if the access user triggers the temporary unused control for guiding the page configuration, returning to the access home page of the access user in the application program. It should be noted that, if the access user triggers the control not to be used for the moment, but the sharing password is still in the valid period, when the access user accesses the sharing password again, the mode prompt is still displayed to the access user.
In addition, the sharing password can be forwarded, so as to avoid that the sharing user adopts the same setting for different target users for many times, in this embodiment, the sharing user can send the sharing password to at least one user after receiving the sharing password sent by the server, or can forward the sharing password by the target user after sending the sharing password to the target user, specifically, in a forwarding scene, if the sharing password is effectively verified, only whether the sharing password is within the validity period is verified. In order to further expand the sharing range, the verification process is not required to be set, namely, the sharing password applied to the sharing user can be sent to a plurality of access users or can be forwarded for a plurality of times.
It should be noted that the first terminal may also send the shared password directly without displaying the shared password after receiving the shared password sent by the server, and this embodiment is not limited herein.
And step S106, issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password.
In specific implementation, after receiving an access request submitted by a second terminal, configuration editing information is issued to the second terminal, so that an application program running at the second terminal performs configuration loading of the application mode.
In an optional implementation manner provided in this embodiment, after receiving the configuration editing information, the second terminal performs configuration loading of an application mode on an application program run by the second terminal in the following manner:
inquiring whether the application program starts the application mode;
if yes, reading mark information in the configuration editing information, and loading and displaying an access page of the application mode based on the mark information;
if not, the application mode of the application program is started, and the access page of the application mode is loaded and displayed based on the marking information.
Specifically, whether the application program running at the second terminal starts the application mode is firstly inquired, if yes, the access page of the application mode is loaded only according to the mark information in the configuration editing information, and if not, the application mode of the application program is started first, and then the access page of the application mode is loaded. In addition, if the flag information included in the configuration editing information is empty or a default access page, only the application mode of the application program is started.
For example, when detecting that an old user triggers an "immediate use" control configured by the guidance page shown in fig. 8, the second terminal sends an access instruction to the server, the server issues configuration editing information to the second terminal according to the access instruction, after receiving the configuration editing information, the second terminal firstly queries whether an application program run by the second terminal starts a grandparent mode, if so, reads a sub-application identifier having a sequence mark in the configuration editing information, and renders and displays a head page of the grandparent mode shown in fig. 9 according to the sequence of the sub-application identifier; if not, the ancestor mode of the application program is started first, then the sub-application identifiers with the sequence marks in the configuration editing information are read, and the ancestor mode top page shown in the figure 9 is rendered and displayed according to the sequence of the sub-application identifiers.
As shown in fig. 9, the font of the access page in the elder mode is enlarged, the operation is more convenient, the entry of the "closed elder mode" is configured on the top page of the elder mode, in order to prevent the aged user from directly exiting the elder mode due to error points, the "closed elder mode" triggered by the aged user is a popup prompt when the aged user is detected, and the access page returns to the regular page after the aged user confirms.
After the target user is successfully set, in order to improve the perception degree of the sharing user on the use condition of the target user, after configuration editing information is sent to the second terminal, the use state of the sharing password is marked as a used state, and a successful prompt is set to be pushed to the first terminal of the sharing user associated with the sharing password, wherein the successful prompt comprises the user identification of the target user and the confirmation time of the target user on the sharing password.
The following takes an application of the sharing processing method provided in this embodiment in an old user scenario as an example, and further describes the sharing processing method provided in this embodiment, with reference to fig. 10, the sharing processing method applied in the old user scenario specifically includes the following steps.
Step S1004, querying a history sharing user and an associated user of the sharing user according to the sharing user identifier carried in the configuration access request.
Before the configuration access request is submitted to a server, when a configuration access instruction submitted through a sharing guide page is detected by a first terminal; the sharing guide page is displayed when the sharing user accesses the sharing service, and the sharing service can be edited for the application configuration of the application program of the old user in the elder mode through the sharing service.
Step S1006, sending the associated user identifier, the user identifier of the history sharing user, and the sharing status to the first terminal.
Then, the first terminal renders a target user acquisition page according to the associated user identification, the user identification of the history sharing user and the sharing state and displays the target user acquisition page; displaying an editing page under the condition that the old user is acquired through the target user acquisition page; acquiring an editing confirmation instruction submitted by a sharing user after editing operation is carried out on an editing page; reading the sub-application identification in the default display area in the edited editing page according to the editing confirmation instruction; sequentially marking the sub-application identifications according to the sub-application display sequence of the default display area to obtain the sub-application identifications with sequential marks; and submitting the sub-application identification and the old user identification with the sequence marks as configuration editing information to a server.
Step S1020, generating a sharing password according to the sub-application identifier in the configuration editing information, and establishing an association relationship between the sharing password and the old user identifier and the sharing user identifier.
The sub-application identifications in the configuration edit information have order marks.
Step S1022, the sharing password with the association relationship is sent to the first terminal.
After that, the first terminal generates a password display page based on the sharing password, and sends the sharing password to the second terminal when detecting a sharing instruction of the sharing user; and the first terminal sends the sharing password to the second terminal through the third-party communication application. And the second terminal submits a password access request to the server under the condition that the access user is detected to access the sharing password in the application program.
And step S1028, effectively verifying the shared password according to the password access request, and reminding the second terminal of passing the verification after the verification is passed.
Then, the second terminal reads the sharing user identification associated with the sharing password according to the reminding, and displays a guide page based on the sharing user identification; submitting an access request to a server according to a confirmation instruction submitted by an access user to the display guide page; and carrying out configuration loading of the application program in the elder mode according to the editing configuration information sent by the server. The configuration loading is to firstly inquire whether the application program starts a elder mode or not; if yes, reading a sub-application identifier with a sequence mark in the configuration editing information, and sequencing and loading the access home page of the elder mode according to the sequence of the sub-application identifier; if not, firstly starting the elder mode of the application program, then taking the sub-application identification with the sequence mark in the configuration editing information, and loading the access home page of the elder mode according to the sequence of the sub-application identification.
In summary, in the sharing processing method provided in this embodiment, first, configuration editing information submitted by a first terminal after editing an application configuration of a target user in an application mode is obtained, then, a sharing password is generated based on the configuration editing information and sent to the first terminal, and then, according to an access request submitted by a second terminal based on the sharing password, the configuration editing information is sent to the second terminal, so as to perform configuration loading of the application mode on an application program running at the second terminal, so that the sharing user can set the application configuration of the application program in the application mode for the target user, thereby reducing a use threshold of the application program.
A second sharing method embodiment provided in this specification:
referring to fig. 11, which shows a processing flow diagram of a sharing processing method provided in this embodiment, referring to fig. 2, which shows a schematic view of a sharing guidance page provided in this embodiment, referring to fig. 3, which shows a schematic view of a first target user collection page provided in this embodiment, referring to fig. 4, which shows a schematic view of a second target user collection page provided in this embodiment, referring to fig. 5, which shows a schematic view of an edit page provided in this embodiment, referring to fig. 6, which shows a schematic view of a preview presentation page provided in this embodiment, referring to fig. 7, which shows a schematic view of a password presentation page provided in this embodiment, referring to fig. 8, which shows a schematic view of a guidance page provided in this embodiment, referring to fig. 9, which shows a schematic view of a senior mode home page provided in this embodiment, referring to fig. 10, the processing sequence diagram of the sharing processing method applied to the scene of the elderly user is shown in the figure.
Referring to fig. 11, the sharing processing method provided in this embodiment is applied to a first terminal, and specifically includes steps S1102 to S1106.
An execution main body of the sharing processing method provided in this embodiment is a first terminal, an execution main body of the sharing processing method embodiment provided in the above is a server, and an execution main body of the sharing processing method embodiment provided in the following is a second terminal.
Step S1102 is to acquire a target user selected by the sharing user after the server returns the associated user list.
In the sharing processing method provided by this embodiment, the sharing user sets the application configuration of the application mode for the target user, and the application configuration set by the sharing user is loaded on the user terminal of the target user under the condition that the target user confirms. Specifically, a sharing user edits application configuration under an application mode for a target user through a user terminal of the sharing user, after the application configuration of the target user is edited, a sharing password generated based on configuration editing information after the application configuration is edited is sent to the user terminal of the target user, after the sharing password shared by the sharing user is confirmed by the target user, the configuration loading of the application mode is carried out in an application program operated by the user terminal of the target user, so that for special users (such as old users, users with abnormal body and children users), the application configuration of the application program of the special user under the application mode can be edited by a guardian (such as children of the old users and parents of the children users), after the application configuration edited by the special user is confirmed by the guardian, the loading configuration of the application mode is carried out in the application program operated by the user terminal of the special user, the perception degree of the special user to the application program is improved, and the use threshold of the special user to the application program is reduced.
In this embodiment, the configuration editing information includes a sub-application identifier having a sequence identifier and a target user identifier.
In specific implementation, in the process of sharing from a target user by a sharing user, the sharing user submits a sharing access instruction for the sharing service through an application program operated by a first terminal of the sharing user, in order to improve the perception degree of the sharing user for the sharing service and enable the sharing user to more accurately perceive the service content of the sharing service, the first terminal displays a sharing guide page after detecting the sharing access instruction, and submits a configuration access request to a server under the condition that the sharing user submits the configuration access instruction through the sharing guide page, so that the server queries an associated user and/or a history invitation user of the sharing user based on the configuration access request.
In this embodiment, before the target user is obtained, the following operations are further performed:
after a sharing access instruction of the sharing user is detected, displaying a sharing guide page;
submitting a configuration access request to the server according to a configuration access instruction submitted by the sharing user through the sharing guide page;
receiving the associated user list returned by the server based on the configuration access request;
and rendering and displaying a target user acquisition page containing the recommended user area based on the associated user list.
Alternatively, the first and second electrodes may be,
acquiring a configuration access instruction submitted by the sharing user, and submitting a configuration access request to the server based on the configuration access instruction;
receiving the associated user list sent by the server and desensitized user identification and sharing state of at least one history sharing user;
sequencing the at least one history sharing user according to the sharing state of the at least one history sharing user to obtain a history user list;
and rendering and displaying a target user acquisition page comprising a recommended user area and a historical user area based on the historical user list and the associated user list.
In this embodiment, before the server obtains the configuration editing information submitted by the first terminal, the server performs the following steps:
inquiring whether a sharing user has at least one history sharing user according to a configuration access request submitted by the first terminal;
if not, transmitting the user identification of the sharing user into an associated user query interface for associated user confirmation; desensitizing the associated user identifier of the associated user returned by the associated user query interface, and returning an associated user list obtained by desensitizing to the first terminal;
if so, reading the user identification and the sharing state of the at least one history sharing user, and desensitizing the user identification of the history sharing user; determining the associated user list based on the user identification of the sharing user; and returning the desensitized user identification and the sharing state of the at least one history sharing user and the associated user list to the first terminal.
Specifically, a first terminal submits a configuration access request to a server after detecting a configuration access instruction of a sharing user, the server inquires whether the sharing user has at least one history sharing user after receiving the configuration access request, if yes, history user information obtained after desensitization processing is carried out on a user identifier of the at least one history sharing user is determined, an associated user list obtained after desensitization processing is carried out on a user identifier of an associated user of the sharing user is determined, and the history user information and the associated user list are sent to the first terminal, so that the first terminal renders a target user acquisition page and displays the target user acquisition page based on the history user list and the associated user, wherein the history user information comprises the user identifier subjected to desensitization processing and a sharing state of each history sharing user; it should be noted that, because the user identifiers of the history sharing user and the associated user belong to the privacy of the history sharing user and the associated user to some extent, in order to ensure the data privacy of the history sharing user and the associated user, the user identifiers in the associated user list and the history user information sent to the first terminal are the user identifiers subjected to desensitization processing, where the user identifiers include name identifiers and/or communication identifiers of users.
And if not, determining an associated user list obtained after desensitization treatment is carried out on the user identification of the sharing user, and sending the associated user list to the first terminal so that the first terminal renders a target user acquisition page based on the associated user list and displays the target user acquisition page. The associated user refers to a user who has a relationship with the sharing user.
Further, in an optional implementation manner provided by this embodiment, if the first terminal receives an associated user list returned by the server, the first terminal renders and displays a target user acquisition page including a recommended user area based on the associated user list; enabling the sharing user to select the target user from the associated users displayed in the recommended user area, or searching and inputting the target user through the target user collection page;
in addition, if history user information and an associated user list returned by the server are received, namely the associated user list, the sharing state of at least one history sharing user and desensitized user identification, at first, the at least one history sharing user is ranked according to the sharing state of each history sharing user in the at least one history sharing user to obtain a history user list, and then a target user acquisition page containing a recommended user area and a history user area is rendered and displayed based on the history user list and the associated user list.
For example, a user P accesses a sharing service through a first terminal, the first terminal displays a sharing guide page as shown in fig. 2 when detecting that the user P submits a sharing access request for the sharing service, when detecting that the user P triggers a "unset" control configured in fig. 2, submits a configuration access request to a server, the server receives the configuration access request, queries whether the user P has a history sharing user, if not, transmits a user identifier of the user P into an associated user query interface for associated user query, performs desensitization processing on a user identifier in an associated user list returned by the associated user query interface, and transmits the desensitized associated user list to the first terminal, and after receiving the associated user list, the first terminal renders a target user acquisition page as shown in fig. 3 and displays the target user acquisition page;
if the query result is yes, reading the user identifier and the sharing state of the history sharing user, transmitting the user identifier of the user P into the associated user query interface to query the associated user of the user, desensitizing the user identifier of the history sharing user and the user identifier in the associated user list returned by the associated user query interface, transmitting the desensitized associated user list, the user identifier of the history sharing user and the sharing state to the first terminal, and after receiving the associated user list, the user identifier of the history sharing user and the sharing state by the first terminal, and sequencing the history sharing users according to the priority of 'waiting for agreement' and the second agreed priority, and rendering and displaying a target user acquisition page as shown in fig. 4 according to the sequence of the sequenced history sharing users and the sequence of the associated users in the associated user list.
It should be noted that fig. 3 includes a recommended user area 301, where a user P may determine a selected associated user as a target user by triggering any associated user in the recommended user area, if the number of associated users in the associated user area exceeds a threshold, only a preset number of associated users are displayed in the recommended user area 301, after clicking a "expand" control configured in the recommended user area 301, all associated users in the associated user area are displayed, in addition, a control 302 is further configured in fig. 3, and in a case where the control 302 is triggered, a buddy list of the user P is displayed so that the user P selects the target user in the buddy list; fig. 4 includes a recommended user area 401 and a historical user area 402, where desensitized user identifiers and sharing states of historical sharing users are displayed in the historical user area 402, and for the historical sharing users waiting for an agreeable state, the user P may select to remind again, or may modify configuration editing information; for the agreed history sharing users, the user P may modify the configuration edit information.
In addition, in order to avoid the interference of the sharing users to different users for sharing for multiple times, the history sharing user upper limit of the sharing users can be set, that is, if the number of the inquired history sharing users exceeds the sharing threshold, the sharing permission of the sharing users is closed and the closing prompt of the sharing permission is sent to the first terminal, so that the first terminal can display the closing prompt.
In summary, if the association user list returned by the server to the first terminal is the association user list, rendering and displaying the target user acquisition page including the recommended user area based on the association user list, so that the sharing user selects any associated user in the recommended user area as the target user through the target user acquisition page, or inputs the target user identifier of the target user through the target user acquisition page;
and if the server returns to the first terminal and is the associated user list, the user identifier of the historical sharing user and the sharing state, rendering and displaying the target user acquisition page including the recommended user area and the historical user area based on the associated user list, the historical user identifier and the sharing state, so that the sharing user can select the target user through the recommended user area and check the invitation details of any historical invitation user through the historical user area.
In specific implementation, in order to improve the perception degree of the sharing user on the selection of the target user and improve the convenience of the sharing user in selecting the target user, the sharing user is prevented from inputting associated users with a relationship of relatives and friends by recommending the associated users to the sharing user, in addition, in order to avoid the inconvenience brought to the sharing user by the sharing user needing to query the user identifier of the target user for many times under the condition of not knowing the user identifier of the target user, after the first terminal displays the acquisition page of the target user, the sharing user can select the associated users in the recommended user area as the target user, the target user can be selected by viewing a friend list (such as a communication friend list and an application friend list), and the target user can be further determined by searching the acquisition page of the target user.
In order to further improve the convenience of the sharing user in selecting the target user, in this embodiment, if the sharing user performs user search through the target user acquisition page to further determine the target user, the first terminal performs the following steps:
acquiring an identification field input by the sharing user through the target user acquisition page;
querying at least one candidate target user based on the identification field;
and performing desensitization processing on the candidate user identification of the at least one candidate target user, and recommending the candidate user identification obtained through desensitization to the sharing user.
Specifically, a sharing user can initiate query by inputting a communication identifier on a target acquisition page, when the first terminal detects that the sharing user inputs an identifier field, the first terminal performs accurate query and/or fuzzy query based on the identifier field, performs desensitization processing on a user identifier of a candidate target user obtained by query if at least one candidate target user is obtained by query, and recommends the desensitized candidate user identifier to the sharing user, wherein the accurate query includes query in a user library of an application program, and query candidate target users matched with the identifier field; the fuzzy query comprises querying candidate target users matched with the identification field in the application friend list and/or the communication friend list.
It should be noted that, if the user identifier corresponding to the identifier field entered by the sharing user is queried, desensitization processing display is performed on the user identifier, so that the sharing user selects a candidate target user corresponding to the desensitized user identifier as a target user, and if the user identifier corresponding to the identifier field is not queried, a query failure prompt is displayed, for example: "the user who searches for you does not exist or the other party sets privacy protection"; if the user identifier corresponding to the identifier field is detected to be the user identifier of the sharing user, displaying login account reminding, such as: "the user identification input by you is the user identification currently logged in, and retry after checking is required"; if the format of the identification field input by the sharing user is detected to be inconsistent with the preset format of the communication identification, displaying a format prompt, such as: please enter the correct communication id.
Step S1104, displaying an edit page edited for the application configuration of the target user in the application mode, reading the configuration edit information submitted by the sharing user, and submitting the configuration edit information to the server.
The sharing user selects or inputs a target user based on the target user acquisition page, and the first terminal displays an editing page edited for the application configuration of the target user in the application mode after acquiring the target user selected by the sharing user after the server returns the associated user list, so that the sharing user edits the application configuration of the target user in the application mode for the target user.
In an optional implementation manner provided by this embodiment, the editing, by the first terminal, of the application configuration of the target user in the application mode includes: replacing the sub-application identification in the default display area configured by the editing page; the editing page comprises a default display area and a recommended display area; transferring the sub-application identification of the default display area to the recommended display area after being deselected; and adding the sub-application identification of the recommended display area to the default display area after being selected.
For example, after an old user entered by a user P through a target collection page is acquired, an initial editing page is displayed, so that the user P edits an access home page of the old user in a grand mode, a default display downslide action guide is provided in a display process of the initial editing page, after the user P downslide, a guide identifier disappears, the editing page shown in fig. 5 is displayed, the editing page comprises a default display area 501 and a recommended display area 502, a sub-application identifier displayed in the default display area 501 is selected by default, the user P can select the selected sub-application identifier, the selected sub-application identifier is transferred to the recommended display area 502, the user P can further drag the sub-application identifier in the default display area to change a sub-application sequence, and the user P can further add the sub-application identifier in the recommended display area 502 to the default display area 501. If the situation that the preview control configured in the editing page is triggered is detected, the preview editing page as shown in fig. 6 is generated based on the edited default display area, wherein after the storage of the configuration in the preview editing page and the notification of the control is triggered, the configuration editing information is read, and after the return modification control configured in the preview editing page is triggered, the preview editing page is returned to the editing page as shown in fig. 5.
In specific implementation, when it is detected that the sharing user submits an edit confirmation instruction, the configuration edit information submitted by the sharing user is read, and in an optional implementation manner provided in this embodiment, the configuration edit information is read in the following manner:
reading the sub-application identification of the default display area in the editing page according to the editing confirmation instruction submitted by the sharing user;
sequentially marking the sub-application identifications according to the sub-application sequence of the default display area to obtain marking information;
and submitting the marking information, the target user identification of the target user and the user identification of the sharing user to the server as the configuration editing information.
Specifically, after the edit confirmation instruction is acquired, reading sub-application identifiers (i.e., sub-application identifiers in the preview display page) in a default display area configured by the edited edit page, sequentially marking the read sub-application identifiers according to a display sequence of each sub-application identifier in the default display area, and submitting marked information, user identifiers of sharing users and user identifiers of target users selected by the sharing users to the server as configuration edit information, so that the server generates a sharing password according to the configuration edit information. The marking information includes sub-application identifier ordering with sequential relationship, such as a sub-application identifier list with sequential relationship, after sequentially marking the sub-application identifiers of the default display area configured on the read editing page according to the display sequence of the sub-application identifiers of the default display area.
For example, when a user P edits an edited page, and submits a preview control configured for the edited page, the first terminal renders a preview displayed page based on the sub-application identifier of the default display area in the edited page, reads the sub-application identifier in the preview displayed page when the preview displayed page configuration is stored and the control is notified to be triggered, sequentially marks the sub-application identifiers according to the display sequence of the preview displayed page to the sub-application identifiers, and submits the sequentially marked sub-application identifiers, the user identifier of an elderly user, and the user identifier of the user P as configuration editing information to the server.
Step S1106 is to receive the shared password sent by the server, and perform sending processing of the shared password for the target user.
In this embodiment, the sharing password may be a character string, and the characters included in the character string may be numeric characters, english characters, chinese characters, and the like. The application modes include preset operation modes of an application program running on the user terminal, such as: elder mode, child mode. The application configuration includes a page configuration of an access page of the application program in a preset operation mode, such as: the third party pays for the application's page configuration to access the home page in grandparent mode.
In specific implementation, when an edit confirmation instruction is detected, the sub-application identification is collected, the configuration editing information is confirmed to be submitted to the server, and after the server receives the configuration editing information, in order to enable the sharing user to send a sharing prompt to the target user, a sharing password is generated based on the configuration editing information and sent to the first terminal, so that the first terminal sends the sharing password to the target user.
In this embodiment, the sharing password is generated and sent to the first terminal as follows:
generating the sharing password based on the mark information in the configuration editing information;
establishing an association relationship between the sharing password and the sharing user identifier and the target user identifier contained in the configuration editing information, and sending the sharing password carrying the association relationship to the first terminal;
alternatively, the first and second electrodes may be,
and generating the sharing password containing the sharing user identification and the target user identification based on the marking information, and sending the sharing password to the first terminal.
Specifically, the sharing password may be generated according to the identification information, the association relationship between the sharing user identification and the target user included in the sharing password and the configuration editing information is established, and finally the sharing password with the association relationship is sent to the first terminal; the method includes the steps that a sharing password containing a sharing user identifier and a target user identifier is generated based on mark information and then sent to a first terminal, in addition, a password generation interface is called to generate a random password under the condition that configuration editing information is obtained, the association relation between the random password and the configuration editing information is established, the random password with the association relation is used as the sharing password and sent to the first terminal, and therefore the first terminal sends the sharing password.
For example, after acquiring the sub-application identifier, the user identifier of the user P, and the user identifier of the old user, which are submitted by the server and arranged in sequence, a password request is sent to the password generation interface, so that the password generation interface generates a random password, and after acquiring the random password returned by the password generation interface, an association relationship between the random password and the sub-application identifier, the user identifier of the user P, and the user identifier of the old user is established, and the random password with the association relationship established is sent to the first terminal, so that the first terminal renders and displays a password display page as shown in fig. 7.
In addition, in order to avoid that the sharing user cannot set the application configuration of the application program in the application mode for other users because the target user does not confirm the sharing password for a long time and the sharable number of the sharing user is influenced, an effective period can be set for the sharing password, and the sharing password is marked to be in an invalid state when the effective period reaches and the confirmation of the target user is obtained.
The method comprises the steps that after a first terminal receives a sharing password, a password display page is rendered and displayed based on the sharing password, wherein a sharing user can jump to a third-party communication application through the password display page to send the sharing password, in order to improve the operation simplicity of the sharing user, the sharing user does not need to copy the sharing password actively, when a jump control (sharing control) triggered by the user is detected, a copied prompt can be displayed through a pop-up window, and the user can jump to the third-party communication application directly; in order to further improve the operation simplicity of the sharing user, countdown can be configured for the password display page, the countdown is started when the password display page is displayed, and the third-party communication application is actively skipped after the preset time is reached. In order to improve the perception degree of a target user on the sending processing of the sharing password by the sharing user, if the sharing user is detected to trigger the jump control, sending a sharing request to the server, so that the server pushes sharing information to the target user associated with the sharing password in the application program according to the sharing request.
In this embodiment, the first terminal submits the sharing request to the server after detecting that the sharing user triggers the jump control, and the server executes the following operations:
receiving a sharing request for the sharing password submitted by the first terminal;
inquiring a target user identifier having an association relation with the sharing password according to the sharing request;
and pushing a sharing reminder in an application program of the target user based on the target user identification.
In addition, in order to avoid that the target user cannot confirm the configuration loading of the application mode due to the fact that the target user is unfamiliar with the operation flow of sharing the password, the password display page is also provided with an operation guide control, and the sharing user can download the operation guide and send the operation guide to the target user, so that the target user confirms the sharing password according to the operation guide. In this embodiment, if the first terminal detects that the operation guidance control configured on the password display page is triggered, the first terminal downloads the pre-stored operation guidance to the first terminal, so that the first terminal sends the operation guidance.
As shown in fig. 7, when detecting that the control 701 is triggered, the first terminal submits a sharing request for the shared password to the server, and the server queries, according to the sharing request, a user identifier of an old user and a user identifier of a user P, which have an association relationship with the shared password, and pushes, by means of message push in an application, a sharing reminder to a user terminal bound to the user identifier of the old user (for example, the user P customizes a elder model for you, experiences the user immediately |), so that the old user can access the shared password through the sharing reminder. The first terminal reads the pre-stored operation guide and downloads the operation guide to the first terminal when detecting that the control 702 is triggered. The downloading form may be a picture or a document, and this embodiment is not limited herein.
In specific implementation, the first terminal sends the shared password through the password display page, and may send the shared password through a third-party communication application (e.g., a mailbox or a social application), or send the shared password in an application program in a message push manner in the application, or send the shared password through an instant messaging message (e.g., a short message), and the specific sending manner is not limited in this embodiment. And after the first terminal shares the sharing password, the second terminal receiving the sharing password displays the received sharing password.
If the sharing password is sent to the second terminal through the third-party communication application or the instant communication message, after the sharing password is displayed by the second terminal, an access user corresponding to the second terminal can copy the sharing password to the application program for access; if the first terminal sends the sharing password to the second terminal in an in-application message pushing mode of the application program, the access user can trigger in-application message pushing to access the sharing password; the second terminal generates mode reminding of an application mode and displays the mode reminding based on the desensitized sharing user identification under the condition that the access user is detected to access the sharing password in the application program and cannot confirm whether the access user is a target user or not, and submits a password access request to the server after detecting that the access user submits a mode confirmation instruction through the mode reminding so that the server can effectively check the sharing password based on the password access request.
It should be noted that, in the process of sending the sharing password to the second terminal by the first terminal, the first terminal may send the sharing password through a third-party communication application (e.g., a mailbox, a social application), or may send the sharing password in an application program. If the first terminal sends the sharing password to the second terminal through the third-party communication application, after the second terminal displays the sharing password, an access user corresponding to the second terminal can copy the sharing password to the application program to access; if the first terminal sends the sharing password to the second terminal through the friend list of the application program, the access user can trigger the sharing password in the friend message list in the application program to access the sharing password.
To sum up, the way for the first terminal to send the shared password to the second terminal includes, but is not limited to, the following three ways:
(1) out-of-application delivery
And the first terminal sends the sharing password through a third-party communication application commonly used by the target user after receiving the sharing password, and the second terminal also displays the sharing password through the third-party communication application after receiving the sharing password. And if the access user wants to access the sharing password, copying the sharing password in the third-party communication application and pasting the sharing password in the application program so as to access the sharing password.
(2) Application-plus-application delivery
The method comprises the steps that after a first terminal receives a sharing password, the first terminal jumps to a third-party communication application to send the sharing password, when a user jump instruction is detected, the first terminal submits a sharing request to a server, the server inquires a target user related to the sharing password according to the sharing request, and message pushing is carried out on the target user in an in-application message pushing mode; the access user can receive the sharing password sent by the sharing user through the third-party communication application and can also receive message pushing in the application program, and further, the access user can access the sharing password in two ways, namely: pasting a sharing password in the third-party communication application to an application program for access; and the second method comprises the following steps: access to the shared password is made through a pushed message that accesses the application.
(3) In-application delivery
After receiving a sharing instruction, a sharing user sends a sharing password through a friend list in an application program, when a first terminal detects that the sharing user selects an access user in the friend list to send the sharing password, the first terminal submits a user identifier of the access user and the sharing password to a server so that the server sends the sharing password to a second terminal of the access user, the second terminal displays the sharing password in a message list of the sharing user and the access user when receiving the sharing password sent by the server, and the access user can access through triggering the displayed sharing password.
According to the method for sending the sharing password from the first terminal to the second terminal, the first terminal sends the sharing password to the second terminal through the application program, sends the sharing password to the second terminal through the third-party communication application or sends the sharing password to the second terminal through the combination of the two, the visiting user needs to submit the visit to the sharing password in the application program, and under the condition that the second terminal detects that the visiting user visits the sharing password in the application program, because whether the access user is the target user cannot be confirmed, in order to ensure the data security of the sharing user, the mode prompt of the application mode is generated and displayed based on the desensitized sharing user identification, and after the access user is detected to submit the mode confirmation instruction through the mode prompt, submitting a password access request to the server so that the server can effectively verify the shared password based on the password access request.
In order to ensure that the target user accesses the shared password and avoid that the target user cannot confirm the shared password due to the confirmation of other users, and further cause that the target user cannot perform configuration loading of an application mode, after the fact that the second terminal submits a password access request for the shared password is detected, the shared password is effectively verified. In this embodiment, after receiving a password access request for a shared password submitted by a second terminal, the server performs the following operations:
according to a password access request submitted by the second terminal after the second terminal detects that the sharing password is accessed in the application program, the sharing password is effectively checked;
if the verification is passed, issuing a pass prompt to the second terminal so that the second terminal displays a guide page based on the pass prompt;
if the verification fails, reading the failure reason, and sending a failure prompt to the second terminal based on the failure reason so that the second terminal displays the verification result;
wherein the performing a valid verification of the shared password comprises:
verifying whether the sharing password is in a valid period, whether the using state of the sharing password is in an unused state and/or whether an access user corresponding to the second terminal is the target user; if yes, determining that the verification is passed; if not, the verification is determined not to pass.
Specifically, when it is detected that the access user copies the sharing password sent by the sharing user to the application program, it is checked first whether the access user is a target user associated with the sharing password, whether the sharing password is in a valid period and/or whether the sharing password is in an unused state, and if so, a pass prompt including a user identifier of the sharing user is sent to the second terminal, so that the second terminal displays a guidance page based on the user identifier of the sharing user.
For example, the first terminal sends a sharing password to the second terminal through the third-party communication application, the second terminal displays the sharing password in the third-party communication application after receiving the sharing password, the access user copies the sharing password from the third-party communication application and opens the sharing password in the application program, the second terminal reads the user identification of the sharing user corresponding to the sharing password and carries out desensitization treatment under the condition that the access user is detected to paste the sharing password in the application program, mode reminding is generated according to the desensitized sharing user identification and displayed in a popup window mode, a password access request is submitted to a server after the mode confirmation instruction of the mode reminding is detected to be submitted by the access user, the server verifies whether the access user is an old user associated with the sharing password after receiving the password access request, and verifies whether the sharing password is in the valid period, verifying whether the using state of the sharing password is an unused state, if so, sending a pass prompt to the second terminal so that the second terminal renders a guide page as shown in fig. 8 based on the user identifier of the user P which is not desensitized and displays the guide page; and if not, reading the reason of the failure verification, and sending a failure prompt to the second terminal based on the failure reason.
If the failure reason in the failure prompt received by the second terminal is that the access user is not the sharing user, displaying the failure prompt (for example, the sharing password is not given to you, and the user asks the other party to confirm and then retries); if the failure reason is that the sharing password is not in the validity period, displaying a failure prompt (for example, if the sharing password is expired and invalid, please contact relatives and friends to resend); if the failure reason is that the using state of the sharing password is the used state, displaying a failure reminder (for example, you are using the preset operation mode customized by the relatives and friends without repeated setting).
And after receiving the pass prompt, the second terminal renders and displays a guide page based on the user identifier of the sharing user, and the access user can confirm the sharing password through the guide page and also can choose not to use the configuration editing information associated with the sharing password temporarily. And if the access user triggers a confirmation control for guiding the page configuration, submitting an access request to the server so that the server issues configuration editing information to the second terminal according to the access request. As shown in fig. 8, when the "use immediately" control is triggered, an access request is submitted to the server, so that the server issues the configuration editing information. And if the access user triggers the temporary unused control for guiding the page configuration, returning to the access home page of the access user in the application program. It should be noted that, if the access user triggers the control not to be used for the moment, but the sharing password is still in the valid period, when the access user accesses the sharing password again, the mode prompt is still displayed to the access user.
In addition, the sharing password may be forwarded, so as to avoid that the sharing user sets the sharing password for multiple times when the sharing user needs to adopt the same setting for different target users, so as to affect application experience, in this embodiment, the sharing user may send the sharing password to at least one user after receiving the sharing password sent by the server, or the sharing password may be forwarded by the target user after being sent by the sharing user to the target user, specifically, in a forwarding scenario, if the sharing password is effectively verified, only whether the sharing password is within the validity period is verified. In order to further expand the sharing range, the verification process is not required to be set, namely, the sharing password applied to the sharing user can be sent to a plurality of access users or can be forwarded for a plurality of times.
In specific implementation, after receiving an access request submitted by a second terminal, the server issues configuration editing information to the second terminal, so that an application program running at the second terminal performs configuration loading of the application mode.
In this embodiment, after receiving the configuration editing information, the second terminal performs configuration loading of an application mode on an application program run by the second terminal in the following manner:
inquiring whether the application program starts the application mode;
if yes, reading mark information in the configuration editing information, and loading and displaying an access page of the application mode based on the mark information;
if not, the application mode of the application program is started, and the access page of the application mode is loaded and displayed based on the marking information.
Specifically, whether the application program running at the second terminal starts the application mode is firstly inquired, if yes, the access page of the application mode is loaded only according to the mark information in the configuration editing information, and if not, the application mode of the application program is started first, and then the access page of the application mode is loaded. In addition, if the flag information included in the configuration editing information is empty or a default access page, only the application mode of the application program is started.
For example, when detecting that an old user triggers an "immediate use" control configured by the guidance page shown in fig. 8, the second terminal sends an access instruction to the server, the server issues configuration editing information to the second terminal according to the access instruction, after receiving the configuration editing information, the second terminal firstly queries whether an application program run by the second terminal starts a grandparent mode, if so, reads a sub-application identifier having a sequence mark in the configuration editing information, and renders and displays a head page of the grandparent mode shown in fig. 9 according to the sequence of the sub-application identifier; if not, the ancestor mode of the application program is started first, then the sub-application identifiers with the sequence marks in the configuration editing information are read, and the ancestor mode top page shown in the figure 9 is rendered and displayed according to the sequence of the sub-application identifiers.
As shown in fig. 9, the font of the access page in the elder mode is enlarged, the operation is more convenient, the entry of the "closed elder mode" is configured on the top page of the elder mode, in order to prevent the aged user from directly exiting the elder mode due to error points, the "closed elder mode" triggered by the aged user is a popup prompt when the aged user is detected, and the access page returns to the regular page after the aged user confirms.
After the target user is successfully set, in order to improve the perception degree of the sharing user on the use condition of the target user, after configuration editing information is sent to the second terminal, the use state of the sharing password is marked as a used state, and a successful prompt is set to be pushed to the first terminal of the sharing user associated with the sharing password, wherein the successful prompt comprises the user identification of the target user and the confirmation time of the target user on the sharing password.
The following takes an application of the sharing processing method provided in this embodiment in an old user scenario as an example, and further describes the sharing processing method provided in this embodiment, with reference to fig. 10, the sharing processing method applied in the old user scenario specifically includes the following steps.
Step S1002, when a configuration access instruction submitted through the sharing guidance page is detected, submit a configuration access request to the server.
The sharing guide page is displayed when the sharing user accesses the sharing service, and the sharing service can be edited for the application configuration of the application program of the old user in the elder mode through the sharing service.
After that, the server queries the historical sharing users and the associated users of the sharing users according to the sharing user identification carried in the configuration access request; and sending the associated user identification, the user identification of the history sharing user and the sharing state to the first terminal.
And step S1008, rendering and displaying the target user acquisition page according to the associated user identification, the user identification of the history sharing user and the sharing state.
Step S1010, displaying the edit page in a case where the elderly user is collected through the target user collection page.
In step S1012, an edit confirmation instruction submitted by the sharing user after performing an editing operation on the edit page is acquired.
Step 1014, reading the sub-application identifier in the default display area in the edited editing page according to the editing confirmation instruction.
And step S1016, sequentially marking the sub-application identifications according to the sub-application display sequence of the default display area to obtain the sub-application identifications with the sequential marks.
In step S1018, the sub-application identifier and the old user identifier with the sequence flag are submitted to the server as configuration editing information.
Then, the server generates a sharing password according to the sub-application identification in the configuration editing information, and establishes an association relation between the sharing password and the old user identification and the sharing user identification; and sending the sharing password carrying the association relation to the first terminal.
And step S1024, generating a password display page based on the sharing password, and sending the sharing password to the second terminal when a sharing instruction of the sharing user is detected.
After that, the second terminal submits a password access request to the server under the condition that the access user is detected to access the sharing password in the application program; the server effectively verifies the shared password according to the password access request and prompts the second terminal to pass after the shared password passes the verification; the second terminal reads the sharing user identification associated with the sharing password according to the reminding, and displays a guide page based on the sharing user identification; submitting an access request to a server according to a confirmation instruction submitted by an access user to the display guide page; and carrying out configuration loading of the application program in the elder mode according to the editing configuration information sent by the server. The configuration loading is to firstly inquire whether the application program starts a elder mode or not; if yes, reading a sub-application identifier with a sequence mark in the configuration editing information, and sequencing and loading the access home page of the elder mode according to the sequence of the sub-application identifier; if not, firstly starting the elder mode of the application program, then taking the sub-application identification with the sequence mark in the configuration editing information, and loading the access home page of the elder mode according to the sequence of the sub-application identification.
In summary, in the sharing processing method provided in this embodiment, the target user selected by the sharing user after returning the associated user list to the server is first obtained, then an edit page for editing the application configuration of the target user in the application mode is displayed, the configuration edit information submitted by the sharing user is read and submitted to the server, and finally the sharing password sent by the server is received, and the sharing password is sent to the target user, so that the sharing user can set the application configuration of the application program in the application mode for the target user, and thus the use threshold of the application program is reduced.
A third embodiment of a sharing processing method provided in this specification:
referring to fig. 12, which shows a processing flow diagram of a sharing processing method provided in this embodiment, referring to fig. 2, which shows a schematic view of a sharing guidance page provided in this embodiment, referring to fig. 3, which shows a schematic view of a first target user collection page provided in this embodiment, referring to fig. 4, which shows a schematic view of a second target user collection page provided in this embodiment, referring to fig. 5, which shows a schematic view of an edit page provided in this embodiment, referring to fig. 6, which shows a schematic view of a preview presentation page provided in this embodiment, referring to fig. 7, which shows a schematic view of a password presentation page provided in this embodiment, referring to fig. 8, which shows a schematic view of a guidance page provided in this embodiment, referring to fig. 9, which shows a schematic view of a senior mode home page provided in this embodiment, referring to fig. 10, the processing sequence diagram of the sharing processing method applied to the scene of the elderly user is shown in the figure.
Referring to fig. 12, the sharing processing method provided in this embodiment is applied to the second terminal, and specifically includes steps S1202 to S1206.
Step S1202, receiving and displaying the sharing password shared by the sharing user.
In the sharing processing method provided by this embodiment, the sharing user sets the application configuration of the application mode for the target user, and the application configuration set by the sharing user is loaded on the user terminal of the target user under the condition that the target user confirms. Specifically, a sharing user edits application configuration under an application mode for a target user through a user terminal of the sharing user, after the application configuration of the target user is edited, a sharing password generated based on configuration editing information after the application configuration is edited is sent to the user terminal of the target user, after the sharing password shared by the sharing user is confirmed by the target user, the configuration loading of the application mode is carried out in an application program operated by the user terminal of the target user, so that for special users (such as old users, users with abnormal body and children users), the application configuration of the application program of the special user under the application mode can be edited by a guardian (such as children of the old users and parents of the children users), after the application configuration edited by the special user is confirmed by the guardian, the loading configuration of the application mode is carried out in the application program operated by the user terminal of the special user, the perception degree of the special user to the application program is improved, and the use threshold of the special user to the application program is reduced.
The application modes include preset operation modes of an application program running on the user terminal, such as: elder mode, child mode. The application configuration includes a page configuration of an access page of the application program in a preset operation mode, such as: the third party pays for the application's page configuration to access the home page in grandparent mode.
In this embodiment, the configuration editing information includes a sub-application identifier having a sequence identifier, a target user identifier, and/or a sharing user identifier.
In specific implementation, in the process of sharing from a target user by a sharing user, the sharing user submits a sharing access instruction for the sharing service through an application program operated by a first terminal of the sharing user, in order to improve the perception degree of the sharing user for the sharing service and enable the sharing user to more accurately perceive the service content of the sharing service, the first terminal displays a sharing guide page after detecting the sharing access instruction, and submits a configuration access request to a server under the condition that the sharing user submits the configuration access instruction through the sharing guide page, so that the server queries an associated user and/or a history invitation user of the sharing user based on the configuration access request. In this embodiment, before the server obtains the configuration editing information submitted by the first terminal, the server performs the following steps:
inquiring whether a sharing user has at least one history sharing user according to a configuration access request submitted by the first terminal;
if not, transmitting the user identification of the sharing user into an associated user query interface for associated user confirmation; desensitizing the associated user identifier of the associated user returned by the associated user query interface, and returning an associated user list obtained by desensitizing to the first terminal;
if so, reading the user identification and the sharing state of the at least one history sharing user, and desensitizing the user identification of the history sharing user; determining the associated user list based on the user identification of the sharing user; and returning the desensitized user identification and the sharing state of the at least one history sharing user and the associated user list to the first terminal.
Specifically, a first terminal submits a configuration access request to a server after detecting a configuration access instruction of a sharing user, the server inquires whether the sharing user has at least one history sharing user after receiving the configuration access request, if yes, history user information obtained after desensitization processing is carried out on a user identifier of the at least one history sharing user is determined, an associated user list obtained after desensitization processing is carried out on a user identifier of an associated user of the sharing user is determined, and the history user information and the associated user list are sent to the first terminal, so that the first terminal renders a target user acquisition page and displays the target user acquisition page based on the history user list and the associated user, wherein the history user information comprises the user identifier subjected to desensitization processing and a sharing state of each history sharing user; it should be noted that, because the user identifiers of the history sharing user and the associated user belong to the privacy of the history sharing user and the associated user to some extent, in order to ensure the data privacy of the history sharing user and the associated user, the user identifiers in the associated user list and the history user information sent to the first terminal are the user identifiers subjected to desensitization processing, where the user identifiers include name identifiers and/or communication identifiers of users.
And if not, determining an associated user list obtained after desensitization treatment is carried out on the user identification of the sharing user, and sending the associated user list to the first terminal so that the first terminal renders a target user acquisition page based on the associated user list and displays the target user acquisition page. The associated user refers to a user who has a relationship with the sharing user.
Further, in this embodiment, if the first terminal receives an associated user list returned by the server, the first terminal renders and displays a target user acquisition page including a recommended user area based on the associated user list; enabling the sharing user to select the target user from the associated users displayed in the recommended user area, or searching and inputting the target user through the target user collection page;
in addition, if history user information and an associated user list returned by the server are received, namely the associated user list, the sharing state of at least one history sharing user and desensitized user identification, at first, the at least one history sharing user is ranked according to the sharing state of each history sharing user in the at least one history sharing user to obtain a history user list, and then a target user acquisition page containing a recommended user area and a history user area is rendered and displayed based on the history user list and the associated user list.
For example, a user P accesses a sharing service through a first terminal, the first terminal displays a sharing guide page as shown in fig. 2 when detecting that the user P submits a sharing access request for the sharing service, when detecting that the user P triggers a "unset" control configured in fig. 2, submits a configuration access request to a server, the server receives the configuration access request, queries whether the user P has a history sharing user, if not, transmits a user identifier of the user P into an associated user query interface for associated user query, performs desensitization processing on a user identifier in an associated user list returned by the associated user query interface, and transmits the desensitized associated user list to the first terminal, and after receiving the associated user list, the first terminal renders a target user acquisition page as shown in fig. 3 and displays the target user acquisition page;
if the query result is yes, reading the user identifier and the sharing state of the history sharing user, transmitting the user identifier of the user P into the associated user query interface to query the associated user of the user, desensitizing the user identifier of the history sharing user and the user identifier in the associated user list returned by the associated user query interface, transmitting the desensitized associated user list, the user identifier of the history sharing user and the sharing state to the first terminal, and after receiving the associated user list, the user identifier of the history sharing user and the sharing state by the first terminal, and sequencing the history sharing users according to the priority of 'waiting for agreement' and the second agreed priority, and rendering and displaying a target user acquisition page as shown in fig. 4 according to the sequence of the sequenced history sharing users and the sequence of the associated users in the associated user list.
It should be noted that fig. 3 includes a recommended user area 301, where a user P may determine a selected associated user as a target user by triggering any associated user in the recommended user area, if the number of associated users in the associated user area exceeds a threshold, only a preset number of associated users are displayed in the recommended user area 301, after clicking a "expand" control configured in the recommended user area 301, all associated users in the associated user area are displayed, in addition, a control 302 is further configured in fig. 3, and in a case where the control 302 is triggered, a buddy list of the user P is displayed so that the user P selects the target user in the buddy list; fig. 4 includes a recommended user area 401 and a historical user area 402, where desensitized user identifiers and sharing states of historical sharing users are displayed in the historical user area 402, and for the historical sharing users waiting for an agreeable state, the user P may select to remind again, or may modify configuration editing information; for the agreed history sharing users, the user P may modify the configuration edit information.
In addition, in order to avoid the interference of the sharing users to different users for sharing for multiple times, the history sharing user upper limit of the sharing users can be set, that is, if the number of the inquired history sharing users exceeds the sharing threshold, the sharing permission of the sharing users is closed and the closing prompt of the sharing permission is sent to the first terminal, so that the first terminal can display the closing prompt.
In summary, if the association user list returned by the server to the first terminal is the association user list, rendering and displaying the target user acquisition page including the recommended user area based on the association user list, so that the sharing user selects any associated user in the recommended user area as the target user through the target user acquisition page, or inputs the target user identifier of the target user through the target user acquisition page;
and if the server returns to the first terminal and is the associated user list, the user identifier of the historical sharing user and the sharing state, rendering and displaying the target user acquisition page including the recommended user area and the historical user area based on the associated user list, the historical user identifier and the sharing state, so that the sharing user can select the target user through the recommended user area and check the invitation details of any historical invitation user through the historical user area.
In specific implementation, in order to improve the perception degree of the sharing user on the selection of the target user and improve the convenience of the sharing user in selecting the target user, the sharing user is prevented from inputting associated users with a relationship of relatives and friends by recommending the associated users to the sharing user, in addition, in order to avoid the inconvenience brought to the sharing user by the sharing user needing to query the user identifier of the target user for many times under the condition of not knowing the user identifier of the target user, after the first terminal displays the acquisition page of the target user, the sharing user can select the associated users in the recommended user area as the target user, the target user can be selected by viewing a friend list (such as a communication friend list and an application friend list), and the target user can be further determined by searching the acquisition page of the target user.
In order to further improve the convenience of the sharing user in selecting the target user, in this embodiment, if the sharing user performs user search through the target user acquisition page to further determine the target user, the first terminal performs the following steps:
acquiring an identification field input by the sharing user through the target user acquisition page;
querying at least one candidate target user based on the identification field;
and performing desensitization processing on the candidate user identification of the at least one candidate target user, and recommending the candidate user identification obtained through desensitization to the sharing user.
Specifically, a sharing user can initiate query by inputting a communication identifier on a target acquisition page, when the first terminal detects that the sharing user inputs an identifier field, the first terminal performs accurate query and/or fuzzy query based on the identifier field, performs desensitization processing on a user identifier of a candidate target user obtained by query if at least one candidate target user is obtained by query, and recommends the desensitized candidate user identifier to the sharing user, wherein the accurate query includes query in a user library of an application program, and query candidate target users matched with the identifier field; the fuzzy query comprises querying candidate target users matched with the identification field in the application friend list and/or the communication friend list.
It should be noted that, if the user identifier corresponding to the identifier field entered by the sharing user is queried, desensitization processing display is performed on the user identifier, so that the sharing user selects a candidate target user corresponding to the desensitized user identifier as a target user, and if the user identifier corresponding to the identifier field is not queried, a query failure prompt is displayed, for example: "the user who searches for you does not exist or the other party sets privacy protection"; if the user identifier corresponding to the identifier field is detected to be the user identifier of the sharing user, displaying login account reminding, such as: "the user identification input by you is the user identification currently logged in, and retry after checking is required"; if the format of the identification field input by the sharing user is detected to be inconsistent with the preset format of the communication identification, displaying a format prompt, such as: please enter the correct communication id.
The sharing user selects or inputs a target user based on the target user acquisition page, and the first terminal displays an editing page edited for the application configuration of the target user in the application mode after acquiring the target user selected by the sharing user after the server returns the associated user list, so that the sharing user edits the application configuration of the target user in the application mode for the target user.
In this embodiment, the editing, by the first terminal, the application configuration of the target user in the application mode includes: replacing the sub-application identification in the default display area configured by the editing page; the editing page comprises a default display area and a recommended display area; transferring the sub-application identification of the default display area to the recommended display area after being deselected; and adding the sub-application identification of the recommended display area to the default display area after being selected.
For example, after an old user entered by a user P through a target collection page is acquired, an initial editing page is displayed, so that the user P edits an access home page of the old user in a grand mode, a default display downslide action guide is provided in a display process of the initial editing page, after the user P downslide, a guide identifier disappears, the editing page shown in fig. 5 is displayed, the editing page comprises a default display area 501 and a recommended display area 502, a sub-application identifier displayed in the default display area 501 is selected by default, the user P can select the selected sub-application identifier, the selected sub-application identifier is transferred to the recommended display area 502, the user P can further drag the sub-application identifier in the default display area to change a sub-application sequence, and the user P can further add the sub-application identifier in the recommended display area 502 to the default display area 501. If the situation that the preview control configured in the editing page is triggered is detected, the preview editing page as shown in fig. 6 is generated based on the edited default display area, wherein after the storage of the configuration in the preview editing page and the notification of the control is triggered, the configuration editing information is read, and after the return modification control configured in the preview editing page is triggered, the preview editing page is returned to the editing page as shown in fig. 5.
In specific implementation, the first terminal reads the configuration editing information submitted by the sharing user when detecting that the sharing user submits an editing confirmation instruction, in this embodiment, the first terminal reads the configuration editing information in the following manner:
reading a sub-application identifier of a default display area in an editing page according to an editing confirmation instruction submitted by a sharing user;
sequentially marking the sub-application identifications according to the sub-application sequence of the default display area to obtain marking information;
and determining the marking information, the target user identification and the sharing user identification as the configuration editing information.
Specifically, after acquiring an edit confirmation instruction, the first terminal reads the sub-application identifiers in the default display area configured by the edited edit page (i.e., the sub-application identifiers in the preview display page), sequentially marks the read sub-application identifiers according to the display order of the sub-application identifiers in the default display area, and submits marked information, user identifiers of sharing users, and user identifiers of target users selected by the sharing users as configuration edit information to the server, so that the server generates a sharing password according to the configuration edit information. The marking information includes sub-application identifier ordering with sequence relation after sequentially marking the sub-application identifiers of the read default display area configured on the editing page according to the display sequence of the sub-application identifiers of the default display area, such as: a list of child application identifications with an order relationship.
For example, when a user P edits an edited page, and submits a preview control configured for the edited page, the first terminal renders a preview displayed page based on the sub-application identifier of the default display area in the edited page, reads the sub-application identifier in the preview displayed page when the preview displayed page configuration is stored and the control is notified to be triggered, sequentially marks the sub-application identifiers according to the display sequence of the preview displayed page to the sub-application identifiers, and submits the sequentially marked sub-application identifiers, the user identifier of an elderly user, and the user identifier of the user P as configuration editing information to the server.
In this embodiment, the sharing password may be a character string, and the characters included in the character string may be numeric characters, english characters, chinese characters, and the like.
In specific implementation, when the first terminal detects an edit confirmation instruction, the first terminal collects the sub-application identifier and determines that the configuration editing information is submitted to the server, and after the server receives the configuration editing information, in order to enable the sharing user to send a sharing prompt to the target user, the sharing password is generated based on the configuration editing information and sent to the first terminal, so that the first terminal sends the sharing password to the target user.
In this embodiment, the sharing password is generated and sent to the first terminal as follows:
generating the sharing password based on the mark information in the configuration editing information;
establishing an association relationship between the sharing password and the sharing user identifier and the target user identifier contained in the configuration editing information, and sending the sharing password carrying the association relationship to the first terminal;
alternatively, the first and second electrodes may be,
and generating the sharing password containing the sharing user identification and the target user identification based on the marking information, and sending the sharing password to the first terminal.
Specifically, the sharing password may be generated according to the identification information, the association relationship between the sharing user identification and the target user included in the sharing password and the configuration editing information is established, and finally the sharing password with the association relationship is sent to the first terminal; the method includes the steps that a sharing password containing a sharing user identifier and a target user identifier is generated based on mark information and then sent to a first terminal, in addition, a password generation interface is called to generate a random password under the condition that configuration editing information is obtained, the association relation between the random password and the configuration editing information is established, the random password with the association relation is used as the sharing password and sent to the first terminal, and therefore the first terminal sends the sharing password.
For example, after acquiring the sub-application identifier, the user identifier of the user P, and the user identifier of the old user, which are submitted by the server and arranged in sequence, a password request is sent to the password generation interface, so that the password generation interface generates a random password, and after acquiring the random password returned by the password generation interface, an association relationship between the random password and the sub-application identifier, the user identifier of the user P, and the user identifier of the old user is established, and the random password with the association relationship established is sent to the first terminal, so that the first terminal renders and displays a password display page as shown in fig. 7.
In addition, in order to avoid that the sharing user cannot set the application configuration of the application program in the application mode for other users because the target user does not confirm the sharing password for a long time and the sharable number of the sharing user is influenced, an effective period can be set for the sharing password, and the sharing password is marked to be in an invalid state when the effective period reaches and the confirmation of the target user is obtained.
The method comprises the steps that after a first terminal receives a sharing password, a password display page is rendered and displayed based on the sharing password, wherein a sharing user can jump to a third-party communication application through the password display page to send the sharing password, in order to improve the operation simplicity of the sharing user, the sharing user does not need to copy the sharing password actively, when a jump control (sharing control) triggered by the user is detected, a copied prompt can be displayed through a pop-up window, and the user can jump to the third-party communication application directly; in order to further improve the operation simplicity of the sharing user, countdown can be configured for the password display page, the countdown is started when the password display page is displayed, and the third-party communication application is actively skipped after the preset time is reached. In order to improve the perception degree of a target user on the sending processing of the sharing password by the sharing user, if the sharing user is detected to trigger the jump control, sending a sharing request to the server, so that the server pushes sharing information to the target user associated with the sharing password in the application program according to the sharing request.
In an optional implementation manner provided by this embodiment, the first terminal submits the sharing request to the server after detecting that the sharing user triggers the jump control, and the server performs the following operations:
receiving a sharing request for the sharing password submitted by the first terminal;
inquiring a target user identifier having an association relation with the sharing password according to the sharing request;
and pushing a sharing reminder in an application program of the target user based on the target user identification.
In addition, in order to avoid that the target user cannot confirm the configuration loading of the application mode due to the fact that the target user is unfamiliar with the operation flow of sharing the password, the password display page is also provided with an operation guide control, and the sharing user can download the operation guide and send the operation guide to the target user, so that the target user confirms the sharing password according to the operation guide. In this embodiment, if the first terminal detects that the operation guidance control configured on the password display page is triggered, the first terminal downloads the pre-stored operation guidance to the first terminal, so that the first terminal sends the operation guidance.
As shown in fig. 7, when detecting that the control 701 is triggered, the first terminal submits a sharing request for the shared password to the server, and the server queries, according to the sharing request, a user identifier of an old user and a user identifier of a user P, which have an association relationship with the shared password, and pushes, by means of message push in an application, a sharing reminder to a user terminal bound to the user identifier of the old user (for example, the user P customizes a elder model for you, experiences the user immediately |), so that the old user can access the shared password through the sharing reminder. The first terminal reads the pre-stored operation guide and downloads the operation guide to the first terminal when detecting that the control 702 is triggered. The downloading form may be a picture or a document, and this embodiment is not limited herein.
It should be noted that, in the process of sending the sharing password to the second terminal by the first terminal, the first terminal may send the sharing password through a third-party communication application (e.g., a mailbox, a social application), or may send the sharing password in an application program. If the first terminal sends the sharing password to the second terminal through the third-party communication application, after the second terminal displays the sharing password, an access user corresponding to the second terminal can copy the sharing password to the application program to access; if the first terminal sends the sharing password to the second terminal through the friend list of the application program, the access user can trigger the sharing password in the friend message list in the application program to access the sharing password.
To sum up, the way for the first terminal to send the shared password to the second terminal includes, but is not limited to, the following three ways:
(1) out-of-application delivery
And the first terminal sends the sharing password through a third-party communication application commonly used by the target user after receiving the sharing password, and the second terminal also displays the sharing password through the third-party communication application after receiving the sharing password. And if the access user wants to access the sharing password, copying the sharing password in the third-party communication application and pasting the sharing password in the application program so as to access the sharing password.
(2) Application-plus-application delivery
The method comprises the steps that after a first terminal receives a sharing password, the first terminal jumps to a third-party communication application to send the sharing password, when a user jump instruction is detected, the first terminal submits a sharing request to a server, the server inquires a target user related to the sharing password according to the sharing request, and message pushing is carried out on the target user in an in-application message pushing mode; the access user can receive the sharing password sent by the sharing user through the third-party communication application and can also receive message pushing in the application program, and further, the access user can access the sharing password in two ways, namely: pasting a sharing password in the third-party communication application to an application program for access; and the second method comprises the following steps: access to the shared password is made through a pushed message that accesses the application.
(3) In-application delivery
After receiving a sharing instruction, a sharing user sends a sharing password through a friend list in an application program, when a first terminal detects that the sharing user selects an access user in the friend list to send the sharing password, the first terminal submits a user identifier of the access user and the sharing password to a server so that the server sends the sharing password to a second terminal of the access user, the second terminal displays the sharing password in a message list of the sharing user and the access user when receiving the sharing password sent by the server, and the access user can access through triggering the displayed sharing password.
According to the method for sending the sharing password from the first terminal to the second terminal, the first terminal sends the sharing password to the second terminal through the application program, sends the sharing password to the second terminal through the third-party communication application or sends the sharing password to the second terminal through the combination of the two, the visiting user needs to submit the visit to the sharing password in the application program, and under the condition that the second terminal detects that the visiting user visits the sharing password in the application program, because whether the access user is the target user cannot be confirmed, in order to ensure the data security of the sharing user, the mode prompt of the application mode is generated and displayed based on the desensitized sharing user identification, and after the access user is detected to submit the mode confirmation instruction through the mode prompt, submitting a password access request to the server so that the server can effectively verify the shared password based on the password access request.
Step S1204, under the situation that it is detected that the access user accesses the sharing password in the application program, an access request is submitted to the server.
In specific implementation, if the first terminal sends the sharing password to the second terminal through the third-party communication application or the instant communication message, after the sharing password is displayed by the second terminal, an access user corresponding to the second terminal can copy the sharing password to the application program for access; if the first terminal sends the sharing password to the second terminal in an in-application message pushing mode of the application program, the access user can trigger in-application message pushing to access the sharing password; the second terminal generates mode reminding of an application mode and displays the mode reminding based on the desensitized sharing user identification under the condition that the access user is detected to access the sharing password in the application program and cannot confirm whether the access user is a target user or not, and submits a password access request to the server after detecting that the access user submits a mode confirmation instruction through the mode reminding so that the server can effectively check the sharing password based on the password access request.
In order to ensure that the target user accesses the shared password and avoid that the target user cannot confirm the shared password due to the confirmation of other users, and further cause that the target user cannot perform configuration loading of an application mode, after the fact that the second terminal submits a password access request for the shared password is detected, the shared password is effectively verified.
In an optional implementation manner provided by this embodiment, when it is detected that the access user accesses the sharing password in the application program, in a process of submitting an access request to the server, the following operations are performed:
when the condition that the access user accesses the sharing password in the application program is detected, desensitizing the sharing user identification corresponding to the sharing password;
generating and displaying a mode prompt of the application mode based on the desensitized sharing user identification;
after the access user is detected to submit a mode confirmation instruction through the mode prompt, submitting a password access request to the server so that the server can effectively check the shared password;
receiving a passing prompt issued by the server, and displaying a guide page based on the sharing user identification which is not desensitized;
and submitting the access instruction to the server according to the confirmation instruction of the guide page submitted by the access user.
Correspondingly, after receiving a password access request for the shared password submitted by the second terminal, the server executes the following operations:
according to a password access request submitted by the second terminal after the second terminal detects that the sharing password is accessed in the application program, the sharing password is effectively checked;
if the verification is passed, issuing a pass prompt to the second terminal so that the second terminal displays a guide page based on the pass prompt;
if the verification fails, reading the failure reason, and sending a failure prompt to the second terminal based on the failure reason so that the second terminal displays the verification result;
wherein the performing a valid verification of the shared password comprises:
verifying whether the sharing password is in a valid period, whether the using state of the sharing password is in an unused state and/or whether an access user corresponding to the second terminal is the target user; if yes, determining that the verification is passed; if not, the verification is determined not to pass.
Specifically, when it is detected that the access user copies the sharing password sent by the sharing user to the application program, it is checked first whether the access user is a target user associated with the sharing password, whether the sharing password is in a valid period and/or whether the sharing password is in an unused state, and if so, a pass prompt including a user identifier of the sharing user is sent to the second terminal, so that the second terminal displays a guidance page based on the user identifier of the sharing user.
For example, the first terminal sends a sharing password to the second terminal through the third-party communication application, the second terminal displays the sharing password in the third-party communication application after receiving the sharing password, the access user copies the sharing password from the third-party communication application and opens the sharing password in the application program, the second terminal reads the user identification of the sharing user corresponding to the sharing password and carries out desensitization treatment under the condition that the access user is detected to paste the sharing password in the application program, mode reminding is generated according to the desensitized sharing user identification and displayed in a popup window mode, a password access request is submitted to a server after the mode confirmation instruction of the mode reminding is detected to be submitted by the access user, the server verifies whether the access user is an old user associated with the sharing password after receiving the password access request, and verifies whether the sharing password is in the valid period, verifying whether the using state of the sharing password is an unused state, if so, sending a pass prompt to the second terminal so that the second terminal renders a guide page as shown in fig. 8 based on the user identifier of the user P which is not desensitized and displays the guide page; and if not, reading the reason of the failure verification, and sending a failure prompt to the second terminal based on the failure reason.
If the failure reason in the failure prompt received by the second terminal is that the access user is not the sharing user, displaying the failure prompt (for example, the sharing password is not given to you, and the user asks the other party to confirm and then retries); if the failure reason is that the sharing password is not in the validity period, displaying a failure prompt (for example, if the sharing password is expired and invalid, please contact relatives and friends to resend); if the failure reason is that the using state of the sharing password is the used state, displaying a failure reminder (for example, you are using the preset operation mode customized by the relatives and friends without repeated setting).
And after receiving the pass prompt, the second terminal renders and displays a guide page based on the user identifier of the sharing user, and the access user can confirm the sharing password through the guide page and also can choose not to use the configuration editing information associated with the sharing password temporarily. And if the access user triggers a confirmation control for guiding the page configuration, submitting an access request to the server so that the server issues configuration editing information to the second terminal according to the access request. As shown in fig. 8, when the "use immediately" control is triggered, an access request is submitted to the server, so that the server issues the configuration editing information. And if the access user triggers the temporary unused control for guiding the page configuration, returning to the access home page of the access user in the application program. It should be noted that, if the access user triggers the control not to be used for the moment, but the sharing password is still in the valid period, when the access user accesses the sharing password again, the mode prompt is still displayed to the access user.
In addition, the sharing password can be forwarded, so as to avoid that the sharing user adopts the same setting for different target users for many times, in this embodiment, the sharing user can send the sharing password to at least one user after receiving the sharing password sent by the server, or can forward the sharing password by the target user after sending the sharing password to the target user, specifically, in a forwarding scene, if the sharing password is effectively verified, only whether the sharing password is within the validity period is verified. In order to further expand the sharing range, the verification process is not required to be set, namely, the sharing password applied to the sharing user can be sent to a plurality of access users or can be forwarded for a plurality of times.
Step S1206, according to the configuration editing information issued by the server, performs configuration loading of the application mode in the application program.
In specific implementation, after receiving an access request submitted by a second terminal, configuration editing information is issued to the second terminal, so that an application program running at the second terminal performs configuration loading of the application mode.
In an optional implementation manner provided in this embodiment, after receiving the configuration editing information, the second terminal performs configuration loading of an application mode on an application program run by the second terminal in the following manner:
inquiring whether the application program starts the application mode;
if yes, reading mark information in the configuration editing information, and loading and displaying an access page of the application mode based on the mark information;
if not, the application mode of the application program is started, and the access page of the application mode is loaded and displayed based on the marking information.
Specifically, whether the application program running at the second terminal starts the application mode is firstly inquired, if yes, the access page of the application mode is loaded only according to the mark information in the configuration editing information, and if not, the application mode of the application program is started first, and then the access page of the application mode is loaded. In addition, if the flag information included in the configuration editing information is empty or a default access page, only the application mode of the application program is started.
For example, when detecting that an old user triggers an "immediate use" control configured by the guidance page shown in fig. 8, the second terminal sends an access instruction to the server, the server issues configuration editing information to the second terminal according to the access instruction, after receiving the configuration editing information, the second terminal firstly queries whether an application program run by the second terminal starts a grandparent mode, if so, reads a sub-application identifier having a sequence mark in the configuration editing information, and renders and displays a head page of the grandparent mode shown in fig. 9 according to the sequence of the sub-application identifier; if not, the ancestor mode of the application program is started first, then the sub-application identifiers with the sequence marks in the configuration editing information are read, and the ancestor mode top page shown in the figure 9 is rendered and displayed according to the sequence of the sub-application identifiers.
As shown in fig. 9, the font of the access page in the elder mode is enlarged, the operation is more convenient, the entry of the "closed elder mode" is configured on the top page of the elder mode, in order to prevent the aged user from directly exiting the elder mode due to error points, the "closed elder mode" triggered by the aged user is a popup prompt when the aged user is detected, and the access page returns to the regular page after the aged user confirms.
After the target user is successfully set, in order to improve the perception degree of the sharing user on the use condition of the target user, after configuration editing information is sent to the second terminal, the use state of the sharing password is marked as a used state, and a successful prompt is set to be pushed to the first terminal of the sharing user associated with the sharing password, wherein the successful prompt comprises the user identification of the target user and the confirmation time of the target user on the sharing password.
The following takes an application of the sharing processing method provided in this embodiment in an old user scenario as an example, and further describes the sharing processing method provided in this embodiment, with reference to fig. 10, the sharing processing method applied in the old user scenario specifically includes the following steps.
Step S1026, submitting a password access request to the server when detecting that the accessing user accesses the sharing password in the application program.
Before the configuration access request is submitted to a server, when a configuration access instruction submitted through a sharing guide page is detected by a first terminal; the sharing guide page is displayed when the sharing user accesses the sharing service, and the sharing service can be edited for the application configuration of the application program of the old user in the elder mode through the sharing service. The server inquires historical sharing users and associated users of the sharing users according to the sharing user identification carried in the configuration access request; sending the associated user identification, the user identification of the history sharing user and the sharing state to a first terminal; the first terminal renders a target user acquisition page according to the associated user identification, the user identification of the history sharing user and the sharing state and displays the target user acquisition page; displaying an editing page under the condition that the old user is acquired through the target user acquisition page; acquiring an editing confirmation instruction submitted by a sharing user after editing operation is carried out on an editing page; reading the sub-application identification in the default display area in the edited editing page according to the editing confirmation instruction; sequentially marking the sub-application identifications according to the sub-application display sequence of the default display area to obtain the sub-application identifications with sequential marks; submitting the sub-application identification and the old user identification with the sequence marks as configuration editing information to a server; the server generates a sharing password according to the sub-application identification in the configuration editing information, and establishes an association relation between the sharing password and the old user identification and the sharing user identification; sending a sharing password carrying the association relation to a first terminal; the first terminal generates a password display page based on the sharing password, and sends the sharing password to the second terminal when a sharing instruction of a sharing user is detected.
And then, the server effectively verifies the sharing password according to the password access request, and the second terminal is reminded of passing the verification after the verification is passed.
Step S1030, reading the sharing user identifier associated with the sharing password according to the prompt, and displaying a guidance page based on the sharing user identifier.
Step S1032, the access request is submitted to the server according to the confirmation instruction submitted by the access user to the display guiding page.
Step S1034, the configuration loading of the application program in the elder mode is carried out according to the editing configuration information issued by the server.
The configuration loading is to firstly inquire whether the application program starts a elder mode or not; if yes, reading a sub-application identifier with a sequence mark in the configuration editing information, and sequencing and loading the access home page of the elder mode according to the sequence of the sub-application identifier; if not, firstly starting the elder mode of the application program, then taking the sub-application identification with the sequence mark in the configuration editing information, and loading the access home page of the elder mode according to the sequence of the sub-application identification.
In summary, the sharing processing method provided in this embodiment first receives and displays the sharing password shared by the sharing user, then submits the access request to the server when detecting that the access user accesses the sharing password in the application program, and finally performs configuration loading of the application mode in the application program according to the configuration editing information issued by the server, so that the sharing user can set the application configuration of the application program in the application mode for the target user, thereby reducing the use threshold of the application program.
The first sharing processing apparatus embodiment provided in this specification is as follows:
in the above embodiments, a sharing processing method is provided, and correspondingly, a sharing processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 13, a schematic diagram of a sharing processing apparatus provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides a sharing processing apparatus, which runs on a server, and includes:
an edit information obtaining module 1302, configured to obtain configuration edit information submitted by a first terminal after editing an application configuration of an application mode for a target user;
a sharing password generating module 1304 configured to generate a sharing password based on the configuration editing information and send the sharing password to the first terminal;
the edit information issuing module 1306 is configured to issue the configuration edit information to the second terminal according to an access request submitted by the second terminal based on the sharing password, so as to perform configuration loading of the application mode on an application program run by the second terminal.
The second sharing processing apparatus embodiment provided in this specification is as follows:
in the above embodiments, a sharing processing method is provided, and correspondingly, a sharing processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 14, a schematic diagram of a sharing processing apparatus provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides a sharing processing apparatus, operating in a first terminal, including:
a target user obtaining module 1402, configured to obtain a target user selected by the sharing user after the server returns the associated user list;
an edit information reading module 1404 configured to present an edit page edited for the application configuration of the target user in the application mode, read the configuration edit information submitted by the sharing user, and submit the configuration edit information to the server;
a sharing password sending module 1406 configured to receive the sharing password sent by the server, and perform sending processing of the sharing password for the target user.
The third embodiment of the sharing processing apparatus provided in this specification is as follows:
in the above embodiments, a sharing processing method is provided, and correspondingly, a sharing processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 15, a schematic diagram of a sharing processing apparatus provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides a sharing processing apparatus, operating in a second terminal, including:
a sharing password receiving module 1502 configured to receive and display a sharing password shared by a sharing user;
an access request submitting module 1504 configured to submit an access request to a server in the case that it is detected that the accessing user accesses the sharing password in the application program;
the application mode loading module 1506 is configured to perform configuration loading of the application mode in the application program according to the configuration editing information sent by the server.
The first sharing processing device embodiment provided in this specification is as follows:
corresponding to the above-described sharing processing method, based on the same technical concept, one or more embodiments of the present specification further provide a sharing processing device, where the sharing processing device is configured to execute the above-described sharing processing method, and fig. 16 is a schematic structural diagram of a sharing processing device provided in one or more embodiments of the present specification.
The sharing processing device provided by the embodiment comprises:
as shown in fig. 16, the shared processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 1601 and a memory 1602, where one or more stored applications or data may be stored. Wherein the memory 1602 may be a transient storage or a persistent storage. The application programs stored in memory 1602 may include one or more modules (not shown), each of which may include a series of computer-executable instructions that are shared among the processing devices. Still further, the processor 1601 may be configured to communicate with the memory 1602, executing a series of computer-executable instructions in the memory 1602 on a shared processing device. The sharing processing device may also include one or more power supplies 1603, one or more wired or wireless network interfaces 1604, one or more input/output interfaces 1605, one or more keyboards 1606, and the like.
In one particular embodiment, the shared processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the shared processing device, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
acquiring configuration editing information submitted by a first terminal after editing aiming at application configuration of a target user in an application mode;
generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal;
and issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
The second sharing processing apparatus embodiment provided in this specification is as follows:
corresponding to the above-described sharing processing method, based on the same technical concept, one or more embodiments of the present specification further provide a sharing processing device, where the sharing processing device is configured to execute the above-described sharing processing method, and fig. 17 is a schematic structural diagram of a sharing processing device provided in one or more embodiments of the present specification.
The sharing processing device provided by the embodiment comprises:
as shown in fig. 17, the shared processing device may have a large difference due to different configurations or performances, and may include one or more processors 1701 and a memory 1702, where one or more stored applications or data may be stored in the memory 1702. Memory 1702 may be transient or persistent storage, among other things. The application programs stored in memory 1702 may include one or more modules (not shown), each of which may include a series of computer-executable instructions that are shared among the processing devices. Further, the processor 1701 may be configured to communicate with the memory 1702 to execute a series of computer-executable instructions in the memory 1702 on a shared processing device. The shared processing apparatus may also include one or more power supplies 1703, one or more wired or wireless network interfaces 1704, one or more input/output interfaces 1705, one or more keyboards 1706, and the like.
In one particular embodiment, the shared processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the shared processing device, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
acquiring a target user selected by a sharing user after the sharing user returns an associated user list in a server;
displaying an editing page edited according to the application configuration of the target user in an application mode, reading configuration editing information submitted by the sharing user and submitting the configuration editing information to the server;
and receiving the sharing password sent by the server, and sending the sharing password to the target user.
The third embodiment of the sharing processing device provided in this specification is as follows:
corresponding to the above-described sharing processing method, based on the same technical concept, one or more embodiments of the present specification further provide a sharing processing device, where the sharing processing device is configured to execute the above-described sharing processing method, and fig. 18 is a schematic structural diagram of a sharing processing device provided in one or more embodiments of the present specification.
The sharing processing device provided by the embodiment comprises:
as shown in fig. 18, the shared processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 1801 and a memory 1802, and the memory 1802 may store one or more stored applications or data. Memory 1802 may be, among other things, transient storage or persistent storage. The application programs stored in memory 1802 may include one or more modules (not shown), each of which may include a series of computer-executable instructions that are shared among the processing devices. Still further, the processor 1801 may be configured to communicate with the memory 1802, and execute a series of computer-executable instructions in the memory 1802 on a shared processing device. The shared processing apparatus may also include one or more power supplies 1803, one or more wired or wireless network interfaces 1804, one or more input/output interfaces 1805, one or more keyboards 1806, etc.
In one particular embodiment, the shared processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the shared processing device, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
receiving and displaying a sharing password shared by a sharing user;
submitting an access request to a server under the condition that an access user is detected to access the sharing password in an application program;
and according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
The first storage medium embodiment provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the sharing processing method described above.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when the computer-executable instructions are executed by the processor, the following processes are implemented:
acquiring configuration editing information submitted by a first terminal after editing aiming at application configuration of a target user in an application mode;
generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal;
and issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the sharing processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The second storage medium example provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the sharing processing method described above.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when the computer-executable instructions are executed by the processor, the following processes are implemented:
acquiring a target user selected by a sharing user after the sharing user returns an associated user list in a server;
displaying an editing page edited according to the application configuration of the target user in an application mode, reading configuration editing information submitted by the sharing user and submitting the configuration editing information to the server;
and receiving the sharing password sent by the server, and sending the sharing password to the target user.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the sharing processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The third storage medium embodiment provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the sharing processing method described above.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when the computer-executable instructions are executed by the processor, the following processes are implemented:
receiving and displaying a sharing password shared by a sharing user;
submitting an access request to a server under the condition that an access user is detected to access the sharing password in an application program;
and according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the sharing processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 30 s of the 20 th century, improvements in a technology could clearly be distinguished between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: the ARC625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in multiple software and/or hardware when implementing the embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of this document and is not intended to limit this document. Various modifications and changes may occur to those skilled in the art from this document. Any modifications, equivalents, improvements, etc. which come within the spirit and principle of the disclosure are intended to be included within the scope of the claims of this document.

Claims (25)

1. A sharing processing method is applied to a server and comprises the following steps:
acquiring configuration editing information submitted by a first terminal after editing aiming at application configuration of a target user in an application mode;
generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal;
and issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
2. The sharing processing method according to claim 1, wherein the configuration loading of the application mode includes:
inquiring whether the application program starts the application mode;
if yes, reading mark information in the configuration editing information, and loading and displaying an access page of the application mode based on the mark information;
if not, the application mode of the application program is started, and the access page of the application mode is loaded and displayed based on the marking information.
3. The sharing processing method according to claim 1, wherein after the step of generating the sharing password based on the configuration editing information and sending the sharing password to the first terminal is executed, and before the step of issuing the configuration editing information to the second terminal according to the access request submitted by the second terminal based on the sharing password is executed, the method further comprises:
receiving a sharing request for the sharing password submitted by the first terminal;
inquiring a target user identifier having an association relation with the sharing password according to the sharing request;
and pushing a sharing reminder in an application program of the target user based on the target user identification.
4. The sharing processing method according to claim 1, wherein the generating and sending a sharing password to the first terminal based on the configuration editing information includes:
generating the sharing password based on the mark information in the configuration editing information;
establishing an association relationship between the sharing password and the sharing user identifier and the target user identifier contained in the configuration editing information, and sending the sharing password carrying the association relationship to the first terminal;
alternatively, the first and second electrodes may be,
and generating the sharing password containing the sharing user identification and the target user identification based on the marking information, and sending the sharing password to the first terminal.
5. The sharing processing method according to claim 1, wherein the first terminal edits the application configuration of the target user in the application mode, and the editing process includes:
replacing the sub-application identification in the default display area configured by the editing page;
the editing page comprises a default display area and a recommended display area; transferring the sub-application identification of the default display area to the recommended display area after being deselected; and adding the sub-application identification of the recommended display area to the default display area after being selected.
6. The sharing processing method according to claim 1, wherein the configuration editing information is obtained by:
reading a sub-application identifier of a default display area in an editing page according to an editing confirmation instruction submitted by a sharing user;
sequentially marking the sub-application identifications according to the sub-application sequence of the default display area to obtain marking information;
and determining the marking information, the target user identification and the sharing user identification as the configuration editing information.
7. The sharing processing method according to claim 1, wherein after the step of generating the sharing password based on the configuration editing information and sending the sharing password to the first terminal is executed, and before the step of issuing the configuration editing information to the second terminal according to the access request submitted by the second terminal based on the sharing password is executed, the method includes:
according to a password access request submitted by the second terminal after the second terminal detects that the sharing password is accessed in the application program, the sharing password is effectively checked;
if the verification is passed, issuing a pass prompt to the second terminal so that the second terminal displays a guide page based on the pass prompt;
wherein the performing a valid verification of the shared password comprises:
verifying whether the sharing password is in a valid period, whether the using state of the sharing password is in an unused state and/or whether an access user corresponding to the second terminal is the target user; if yes, the verification is determined to be passed.
8. The sharing processing method according to claim 1, wherein before the step of obtaining the configuration editing information submitted by the first terminal after the target user edits the application configuration in the application mode, the method further comprises:
inquiring whether a sharing user has at least one history sharing user according to a configuration access request submitted by the first terminal;
if not, transmitting the user identification of the sharing user into an associated user query interface to perform associated user query;
desensitizing the associated user identifier of the associated user returned by the associated user query interface, and returning the associated user list obtained by desensitizing to the first terminal.
9. The sharing processing method according to claim 8, wherein if the query sharing user has at least one history sharing user operation executed after the execution result is yes, the following steps are executed:
reading the user identification and the sharing state of the at least one history sharing user, and desensitizing the user identification of each history sharing user;
determining the associated user list based on the user identification of the sharing user;
and returning the desensitized user identification and the sharing state of the at least one history sharing user and the associated user list to the first terminal.
10. The sharing processing method according to claim 8, wherein after receiving the associated user list, the first terminal performs the following operations:
and rendering and displaying a target user acquisition page containing a recommended user area based on the associated user list, so that the sharing user selects the target user from the associated users displayed in the recommended user area, or searching and inputting the target user through the target user acquisition page.
11. A sharing processing method is applied to a first terminal and comprises the following steps:
acquiring a target user selected by a sharing user after the sharing user returns an associated user list in a server;
displaying an editing page edited according to the application configuration of the target user in an application mode, reading configuration editing information submitted by the sharing user and submitting the configuration editing information to the server;
and receiving the sharing password sent by the server, and sending the sharing password to the target user.
12. The sharing processing method according to claim 11, wherein the reading of the configuration editing information submitted by the sharing user and the submission to the server includes:
reading the sub-application identification of the default display area in the editing page according to the editing confirmation instruction submitted by the sharing user;
sequentially marking the sub-application identifications according to the sub-application sequence of the default display area to obtain marking information;
and submitting the marking information, the target user identification of the target user and the user identification of the sharing user to the server as the configuration editing information.
13. The sharing processing method according to claim 11, wherein before the step of obtaining the target user selected by the sharing user after the server returns the associated user list is executed, the method further comprises:
after a sharing access instruction of the sharing user is detected, displaying a sharing guide page;
submitting a configuration access request to the server according to a configuration access instruction submitted by the sharing user through the sharing guide page;
receiving the associated user list returned by the server based on the configuration access request;
rendering and displaying a target user acquisition page containing a recommended user area based on the associated user list;
alternatively, the first and second electrodes may be,
acquiring a configuration access instruction submitted by the sharing user, and submitting a configuration access request to the server based on the configuration access instruction;
receiving the associated user list sent by the server and desensitized user identification and sharing state of at least one history sharing user;
sequencing the at least one history sharing user according to the sharing state of the at least one history sharing user to obtain a history user list;
and rendering and displaying a target user acquisition page comprising a recommended user area and a historical user area based on the historical user list and the associated user list.
14. A sharing processing method is applied to a second terminal and comprises the following steps:
receiving and displaying a sharing password shared by a sharing user;
submitting an access request to a server under the condition that an access user is detected to access the sharing password in an application program;
and according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
15. The sharing processing method according to claim 14, wherein the submitting an access request to a server in case that it is detected that the accessing user accesses the sharing password in an application program comprises:
when the condition that the access user accesses the sharing password in the application program is detected, desensitizing the sharing user identification corresponding to the sharing password;
generating and displaying a mode prompt of the application mode based on the desensitized sharing user identification;
after the access user is detected to submit a mode confirmation instruction through the mode prompt, submitting a password access request to the server so that the server can effectively check the shared password;
receiving a passing prompt issued by the server, and displaying a guide page based on the sharing user identification which is not desensitized;
and submitting the access instruction to the server according to the confirmation instruction of the guide page submitted by the access user.
16. The sharing processing method according to claim 14, wherein the performing configuration loading of the application mode in the application program comprises:
inquiring whether the application program starts the application mode;
if yes, reading mark information in the configuration editing information, and loading and displaying an access page of the application mode based on the mark information;
if not, the application mode of the application program is started, and the access page of the application mode is loaded and displayed based on the marking information.
17. A sharing processing apparatus, operating on a server, comprising:
the editing information acquisition module is configured to acquire configuration editing information submitted by a first terminal after editing aiming at the application configuration of a target user in an application mode;
the sharing password generating module is configured to generate a sharing password based on the configuration editing information and send the sharing password to the first terminal;
and the editing information issuing module is configured to issue the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
18. A sharing processing device, operating in a first terminal, comprises:
the target user acquisition module is configured to acquire a target user selected by the sharing user after the server returns the associated user list;
the editing information reading module is configured to display an editing page edited according to the application configuration of the target user in the application mode, read the configuration editing information submitted by the sharing user and submit the configuration editing information to the server;
and the sharing password sending module is configured to receive the sharing password sent by the server and send the sharing password to the target user.
19. A sharing processing device, operating in a second terminal, comprises:
the sharing password receiving module is configured to receive and display a sharing password shared by a sharing user;
the access request submitting module is configured to submit an access request to a server under the condition that the access user is detected to access the sharing password in the application program;
and the application mode loading module is configured to load the configuration of the application mode in the application program according to the configuration editing information sent by the server.
20. A shared processing device, comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring configuration editing information submitted by a first terminal after editing aiming at application configuration of a target user in an application mode;
generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal;
and issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
21. A shared processing device, comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring a target user selected by a sharing user after the sharing user returns an associated user list in a server;
displaying an editing page edited according to the application configuration of the target user in an application mode, reading configuration editing information submitted by the sharing user and submitting the configuration editing information to the server;
and receiving the sharing password sent by the server, and sending the sharing password to the target user.
22. A shared processing device, comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
receiving and displaying a sharing password shared by a sharing user;
submitting an access request to a server under the condition that an access user is detected to access the sharing password in an application program;
and according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
23. A storage medium storing computer-executable instructions that when executed by a processor implement the following:
acquiring configuration editing information submitted by a first terminal after editing aiming at application configuration of a target user in an application mode;
generating a sharing password based on the configuration editing information and sending the sharing password to the first terminal;
and issuing the configuration editing information to the second terminal according to an access request submitted by the second terminal based on the sharing password so as to perform configuration loading of the application mode on an application program operated by the second terminal.
24. A storage medium storing computer-executable instructions that when executed by a processor implement the following:
acquiring a target user selected by a sharing user after the sharing user returns an associated user list in a server;
displaying an editing page edited according to the application configuration of the target user in an application mode, reading configuration editing information submitted by the sharing user and submitting the configuration editing information to the server;
and receiving the sharing password sent by the server, and sending the sharing password to the target user.
25. A storage medium storing computer-executable instructions that when executed by a processor implement the following:
receiving and displaying a sharing password shared by a sharing user;
submitting an access request to a server under the condition that an access user is detected to access the sharing password in an application program;
and according to the configuration editing information sent by the server, carrying out configuration loading of the application mode in the application program.
CN202110998602.0A 2021-08-27 2021-08-27 Sharing processing method and device Active CN113727335B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202410124941.XA CN117896716A (en) 2021-08-27 2021-08-27 Sharing processing method and device
CN202110998602.0A CN113727335B (en) 2021-08-27 2021-08-27 Sharing processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110998602.0A CN113727335B (en) 2021-08-27 2021-08-27 Sharing processing method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202410124941.XA Division CN117896716A (en) 2021-08-27 2021-08-27 Sharing processing method and device

Publications (2)

Publication Number Publication Date
CN113727335A true CN113727335A (en) 2021-11-30
CN113727335B CN113727335B (en) 2024-02-20

Family

ID=78678569

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110998602.0A Active CN113727335B (en) 2021-08-27 2021-08-27 Sharing processing method and device
CN202410124941.XA Pending CN117896716A (en) 2021-08-27 2021-08-27 Sharing processing method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202410124941.XA Pending CN117896716A (en) 2021-08-27 2021-08-27 Sharing processing method and device

Country Status (1)

Country Link
CN (2) CN113727335B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114448928A (en) * 2022-01-26 2022-05-06 北京达佳互联信息技术有限公司 Command display method, device, computer equipment and medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060013237A (en) * 2004-08-06 2006-02-09 엘지전자 주식회사 Communication apparatus and method for editing function of menu
US20130166789A1 (en) * 2011-12-23 2013-06-27 Kt Corporation Controlling device setting based on device setting guide information
CN104104699A (en) * 2013-04-03 2014-10-15 上海卓石科技有限公司 Handset remote configuration system and configuration method for the same
US20160197773A1 (en) * 2015-01-07 2016-07-07 Kii, Inc. Techniques for sharing applications
CN107239527A (en) * 2017-05-27 2017-10-10 北京小米移动软件有限公司 web access method and device
CN107483556A (en) * 2017-07-25 2017-12-15 努比亚技术有限公司 A kind of remote configuring method, equipment and computer-readable recording medium
CN109542293A (en) * 2018-11-19 2019-03-29 维沃移动通信有限公司 A kind of menu interface setting method and mobile terminal
CN109831532A (en) * 2019-03-18 2019-05-31 北京字节跳动网络技术有限公司 Data sharing method, device, equipment and medium
CN110888701A (en) * 2018-09-06 2020-03-17 上海伴我科技有限公司 Method, electronic device and medium for remotely configuring software resources
CN111327458A (en) * 2020-01-22 2020-06-23 维沃移动通信有限公司 Configuration information sharing method, terminal device and computer readable storage medium
CN111368232A (en) * 2020-02-28 2020-07-03 北京达佳互联信息技术有限公司 Password sharing reflux method and device, electronic equipment and storage medium
CN111694603A (en) * 2019-03-12 2020-09-22 腾讯科技(深圳)有限公司 Screen sharing method and device, computer equipment and storage medium
US20200364143A1 (en) * 2019-05-15 2020-11-19 Adp, Llc Externalized configurations and caching solution
CN112346797A (en) * 2020-09-29 2021-02-09 苏宁智能终端有限公司 Personalized desktop configuration method, device and system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060013237A (en) * 2004-08-06 2006-02-09 엘지전자 주식회사 Communication apparatus and method for editing function of menu
US20130166789A1 (en) * 2011-12-23 2013-06-27 Kt Corporation Controlling device setting based on device setting guide information
CN104104699A (en) * 2013-04-03 2014-10-15 上海卓石科技有限公司 Handset remote configuration system and configuration method for the same
US20160197773A1 (en) * 2015-01-07 2016-07-07 Kii, Inc. Techniques for sharing applications
CN107239527A (en) * 2017-05-27 2017-10-10 北京小米移动软件有限公司 web access method and device
CN107483556A (en) * 2017-07-25 2017-12-15 努比亚技术有限公司 A kind of remote configuring method, equipment and computer-readable recording medium
CN110888701A (en) * 2018-09-06 2020-03-17 上海伴我科技有限公司 Method, electronic device and medium for remotely configuring software resources
CN109542293A (en) * 2018-11-19 2019-03-29 维沃移动通信有限公司 A kind of menu interface setting method and mobile terminal
CN111694603A (en) * 2019-03-12 2020-09-22 腾讯科技(深圳)有限公司 Screen sharing method and device, computer equipment and storage medium
CN109831532A (en) * 2019-03-18 2019-05-31 北京字节跳动网络技术有限公司 Data sharing method, device, equipment and medium
US20200364143A1 (en) * 2019-05-15 2020-11-19 Adp, Llc Externalized configurations and caching solution
CN111327458A (en) * 2020-01-22 2020-06-23 维沃移动通信有限公司 Configuration information sharing method, terminal device and computer readable storage medium
CN111368232A (en) * 2020-02-28 2020-07-03 北京达佳互联信息技术有限公司 Password sharing reflux method and device, electronic equipment and storage medium
CN112346797A (en) * 2020-09-29 2021-02-09 苏宁智能终端有限公司 Personalized desktop configuration method, device and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114448928A (en) * 2022-01-26 2022-05-06 北京达佳互联信息技术有限公司 Command display method, device, computer equipment and medium
CN114448928B (en) * 2022-01-26 2023-12-19 北京达佳互联信息技术有限公司 Command display method, device, computer equipment and medium

Also Published As

Publication number Publication date
CN113727335B (en) 2024-02-20
CN117896716A (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CN109286724B (en) Data interaction method and device based on short message
US9398142B2 (en) Mobile computing terminal with more than one lock screen and method of using the same
TWI571097B (en) System and method for providing information interactively by instant messaging application
WO2017117509A1 (en) Universal interaction platform for people, services, and devices
CN111752968A (en) Identity file processing method, device, equipment and storage medium
CN112333086B (en) Service method and device based on chat group and electronic equipment
CN107294999B (en) Information verification processing method, device and system, client and server
US10817355B2 (en) Method and apparatus for communication between webpage and operating system
CN107301052A (en) The display methods and mobile terminal of a kind of help information
CN110704053B (en) Style information processing method and device
CN113727335B (en) Sharing processing method and device
Hawker Developer's Guide to Social Programming: Building Social Context Using Facebook, Google Friend Connect, and the Twitter API, The
CN114500421B (en) Message processing method and system
CN110020361A (en) A kind of web page processing method, device, storage medium and electronic equipment
CN109144600B (en) Application program running method and device and computer readable medium
CN106445479B (en) Information-pushing method and device
CN109582297A (en) A kind of generation method of Code Template, device, electronic equipment and storage medium
Krosnick et al. Promises and Pitfalls of Using LLMs for Scraping Web UIs
CN112988549B (en) Method for obtaining log based on vehicle machine system and electronic equipment
CN109656995A (en) Method, apparatus, terminal derived from data, server and storage medium
CN113051170A (en) Verification system and method for webpage form control
JP6378727B2 (en) Message transmission method, message transmission program, and message transmission apparatus
US20130239027A1 (en) Apparatus and method for generating wiki previews
CN114139200A (en) Service authorization processing method and device
CN117555644B (en) Front-end page construction method and device based on natural language interaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230105

Address after: 200120 Floor 15, No. 447, Nanquan North Road, China (Shanghai) Pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Alipay.com Co.,Ltd.

Address before: 310000 801-11 section B, 8th floor, 556 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province

Applicant before: Alipay (Hangzhou) Information Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant