CN115484086B - Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium - Google Patents

Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN115484086B
CN115484086B CN202211087721.1A CN202211087721A CN115484086B CN 115484086 B CN115484086 B CN 115484086B CN 202211087721 A CN202211087721 A CN 202211087721A CN 115484086 B CN115484086 B CN 115484086B
Authority
CN
China
Prior art keywords
authorized user
application
authorized
mobile phone
cloud mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211087721.1A
Other languages
Chinese (zh)
Other versions
CN115484086A (en
Inventor
温海欣
王嘉
党戈
胡涵
陈有权
梁小龙
庞永良
谭康才
温志阳
曾亮洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202211087721.1A priority Critical patent/CN115484086B/en
Publication of CN115484086A publication Critical patent/CN115484086A/en
Application granted granted Critical
Publication of CN115484086B publication Critical patent/CN115484086B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a cloud mobile phone screen sharing method, electronic equipment and a computer readable storage medium, and the scheme provided by the application comprises the following steps: acquiring a page image frame displayed on a cloud mobile phone screen of an authorized user; based on the application authorized to be shared by the authorized user, privacy protection processing is carried out on unauthorized applications in the page image frames; and pushing the video stream corresponding to the page image frame after privacy protection processing to an authorized user for display. The method and the device can effectively and comprehensively protect privacy security of the authorized user under the condition of authorized sharing of the cloud mobile phone screen.

Description

Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a cloud mobile phone screen sharing method, an electronic device, and a computer readable storage medium.
Background
The cloud mobile phone is a virtual mobile phone which applies a cloud computing technology to network terminal services and realizes cloud services through a cloud server. Compared with the traditional mobile phone, the cloud mobile phone has larger storage and calculation capacity, and a user performs control interaction with a remote server through an audio and video stream. The cloud computing technology is applied to provide technical implementation possibility for the cloud mobile phone to co-screen collaboration sharing, and meets the requirement that a user authorizes the cloud mobile phone to other users provided with cloud mobile phone clients to control so as to complete actual work or entertainment.
When the user A authorizes the cloud mobile phone to another user B for control, the user B can control all pages of the cloud mobile phone, and at the moment, the application condition and the privacy information of the user A used by the user A in a personal way are easily exposed.
In view of this, how to protect privacy security of authorized users under the condition of authorized sharing of the cloud mobile phone screen is a technical problem to be solved at present.
Disclosure of Invention
The embodiment of the application aims to provide a cloud mobile phone screen sharing method, electronic equipment and a computer readable storage medium, which are used for solving the privacy problem existing in the existing cloud mobile phone screen sharing.
In order to solve the technical problems, the present specification is implemented as follows:
in a first aspect, a cloud mobile phone screen sharing method is provided, including:
acquiring a page image frame displayed on a cloud mobile phone screen of an authorized user;
based on the application authorized to be shared by the authorized user, privacy protection processing is carried out on unauthorized applications in the page image frames;
and pushing the video stream corresponding to the page image frame after privacy protection processing to an authorized user for display.
Optionally, based on the application authorized by the authorized user to be shared, privacy protection processing is performed on the unauthorized application in the page image frame, including:
acquiring each application icon included in a main interface image under the condition that the page image frame is the main interface image where the application icon is located;
identifying the application authorized to be shared by the authorized user from the application icons according to the preset identification of the application authorized to be shared by the authorized user;
and shielding or blurring unauthorized application icons except for the icons of the shared application authorized by the authorized user in the main interface image.
Optionally, before pushing the video stream corresponding to the page image frame after the privacy protection processing to the authorized user for display, the method further includes:
based on the application authorized to be shared by the authorized user, privacy protection processing is carried out on page contents of the application authorized to be shared in the page image frame;
the privacy protection processing for the page content of the application authorized to be shared in the page image frame based on the application authorized to be shared by the authorized user comprises the following steps:
acquiring text information in the page content of the application authorized to be shared;
identifying the sensitive text from the text information according to the sensitive text database;
and shielding or blurring the sensitive text in the page content of the application authorized to be shared.
Optionally, after obtaining the page image frame displayed on the cloud mobile phone screen of the authorized user, the method further includes:
and pushing the video stream corresponding to the page image frame to the authorized user.
Optionally, after pushing the video stream corresponding to the page image frame to the authorized user, the method further includes:
receiving a sensitive keyword added by the authorized user;
and adding the sensitive keyword into the sensitive text database to update the sensitive text database.
Optionally, after pushing the video stream corresponding to the page image frame to the authorized user, the method further includes:
receiving a first operation instruction returned by the authorized user;
and if the first operation instruction corresponds to the operation of the authorized user on the unauthorized sharing application of the authorized user, carrying out privacy protection processing on all page images displayed on the cloud mobile phone screen according to the first operation instruction until the authorized user exits the unauthorized sharing application.
Optionally, before the privacy protection processing is performed on the page image frame, the method further includes:
receiving a sharing instruction sent by the authorized user, wherein the sharing instruction is used for an application of which the authorized user requests to authorize sharing;
responding to the sharing instruction, and generating application information and a server address of the application which requests to authorize sharing;
transmitting the application information and server address information to the authorized user so that the authorized user generates and provides the shared information of the application requesting authorization for sharing to the authorized user;
and after receiving a second operation instruction returned by the authorized user for the shared information, sending equipment information and address information of the cloud mobile phone to the authorized user so that the authorized user can acquire authorized connection access to the cloud mobile phone.
Optionally, the method further comprises:
receiving a third operation instruction returned by the authorized user under the condition that the authorized user is connected to access the cloud mobile phone;
if the third operation instruction is the operation of the authorized user on the application authorized to be shared by the authorized user, controlling the page image frame displayed by the cloud mobile phone screen according to the third operation instruction;
and if the third operation instruction is the operation of the authorized user on the unauthorized application of the authorized user, not responding to the third operation instruction.
In a second aspect, there is provided an electronic device comprising a memory and a processor electrically connected to the memory, the memory storing a computer program executable by the processor to perform the steps of the method according to the first aspect.
In a third aspect, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method according to the first aspect.
In the embodiment of the application, the page image frames displayed on the cloud mobile phone screen of the authorized user are acquired; based on the application authorized to be shared by the authorized user, privacy protection processing is carried out on unauthorized applications in the page image frames; and pushing the video stream corresponding to the page image frame after privacy protection processing to an authorized user for display, so that privacy security of the authorized user can be effectively and comprehensively protected under the condition of authorized sharing of the cloud mobile phone screen.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 is a flow chart of a cloud mobile phone screen sharing method according to an embodiment of the present application.
Fig. 2 is an example flowchart of a cloud handset screen sharing method according to an embodiment of the application.
Fig. 3 is a block diagram of the structure of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application. The reference numerals in the present application are only used for distinguishing the steps in the scheme, and are not used for limiting the execution sequence of the steps, and the specific execution sequence controls the description in the specification.
In order to solve the problems in the prior art, the embodiment of the application provides a cloud mobile phone screen sharing method which can be executed at a cloud mobile phone end or used for interfacing a cloud mobile phone with a cloud mobile phone intermediate management platform of a user. As shown in fig. 1, the method comprises the following steps:
step 102, acquiring a page image frame displayed on a cloud mobile phone screen of an authorized user;
104, performing privacy protection processing on unauthorized applications in the page image frames based on the applications authorized to be shared by the authorized users;
and 106, pushing the video stream corresponding to the page image frame after privacy protection processing to an authorized user for display.
The authorized user is a user which can authorize and share the cloud mobile phone providing cloud service for other users, and the authorized user is a user which can be connected with the cloud mobile phone accessing the authorized user after the authorized user is authorized.
In general, when a user accesses a cloud mobile phone, a picture image displayed on a cloud mobile phone screen is pushed to the user through a video stream, so that after the cloud mobile phone is authorized to share, first, a page image frame displayed on the cloud mobile phone screen of the authorized user needs to be acquired, and in step 104, privacy protection processing is further performed on each acquired page image frame.
The privacy protection process is performed based on the needs of an authorized user, who would have pre-designated a cloud cell phone application that can authorize sharing, for example. The authorized user can authorize an application of a cloud mobile phone to be shared by a plurality of authorized users, and a plurality of different applications can be installed on the cloud mobile phone, and the authorized user can authorize the shared application to be the same or different for different users. Therefore, the mapping relation between the authorized user and the shared cloud mobile phone application can be pre-stored.
Whether privacy protection processing is performed on the page image frames of the cloud mobile phone screen acquired in the step 102 needs to be judged first to authorize whether an application authorizing sharing exists in the cloud mobile phone currently.
Optionally, before the privacy protection processing is performed on the page image frame, the method further includes: receiving a sharing instruction sent by the authorized user, wherein the sharing instruction is used for an application of which the authorized user requests to authorize sharing; responding to the sharing instruction, and generating application information and a server address of the application which requests to authorize sharing; transmitting the application information and server address information to the authorized user so that the authorized user generates and provides the shared information of the application requesting authorization for sharing to the authorized user; and after receiving a second operation instruction returned by the authorized user for the shared information, sending equipment information and address information of the cloud mobile phone to the authorized user so that the authorized user can acquire authorized connection access to the cloud mobile phone.
The generated sharing information of the application which requests to authorize sharing is, for example, a sharing two-dimensional code or a sharing link, and the authorized user can be connected and accessed to the application which authorizes sharing on the cloud mobile phone according to the sharing information.
This step describes how the authorized user shares the target application on the cloud handset to the authorized user, whereby the correspondence of the authorized user to the authorized sharing application on the cloud handset can be obtained. And under the condition that the authorized sharing application is detected to be used by the current authorized user, privacy protection processing is carried out on the page image frames displayed on the cloud mobile phone screen.
Optionally, based on the application authorized by the authorized user to be shared, privacy protection processing is performed on the unauthorized application in the page image frame, including: acquiring each application icon included in a main interface image under the condition that the page image frame is the main interface image where the application icon is located; identifying the application authorized to be shared by the authorized user from the application icons according to the preset identification of the application authorized to be shared by the authorized user; and shielding or blurring unauthorized application icons except for the icons of the shared application authorized by the authorized user in the main interface image.
In this step, if the authorized user currently accesses the main interface where the authorized shared application icon is located, and icons of various applications installed on the cloud mobile phone with the authorized application are displayed on the main interface, privacy protection processing is required for other unauthorized shared application icons of the authorized user.
The preset identifier of the application authorized to be shared is, for example, an icon feature corresponding to the application, and the icon feature corresponding to each application can be obtained through extracting the image content features of the currently hot downloaded application icon in advance to form an icon feature library. Therefore, the mapping relation between the authorized user and the corresponding authorized user can be established through the icon features of the cloud mobile phone application which the authorized user authorizes to share.
When an authorized user is connected to the cloud mobile phone for access, the icon features of the application authorized to share corresponding to the authorized user are searched, and the application authorized to share on the main interface can be identified based on the icon features and the icons on the current main interface of the cloud mobile phone for comparison. That is, unauthorized shared applications on the primary interface may be identified. Further, privacy protection processing such as shielding or blurring processing is performed on unauthorized application icons in the image frames corresponding to the main interface.
Therefore, after the video frame corresponding to the main interface picture is pushed to the authorized user, the authorized user cannot view the icons of other unauthorized applications installed on the cloud mobile phone of the authorized user.
The privacy protection processing is carried out on the unauthorized application on the cloud mobile phone, and besides the shielding or blurring processing can be carried out on the application icon of the unauthorized application of the main interface, the privacy protection processing can be carried out on the page image frame acquired after the authorized user enters the authorized sharing application.
Optionally, before pushing the video stream corresponding to the page image frame after the privacy protection processing to the authorized user for display, the method further includes: and carrying out privacy protection processing on the page content of the application authorized to be shared in the page image frame based on the application authorized to be shared by the authorized user.
The privacy protection processing for the page content of the application authorized to be shared in the page image frame based on the application authorized to be shared by the authorized user comprises the following steps: acquiring text information in the page content of the application authorized to be shared; identifying the sensitive text from the text information according to the sensitive text database; and shielding or blurring the sensitive text in the page content of the application authorized to be shared.
During the process of authorized users accessing the cloud mobile phone to authorize the sharing of the application, the internal pages of the application may contain content that the authorized users consider to be involved in privacy protection. After the page image frames of the application authorized to be shared are acquired, the characters corresponding to the character information are acquired through the page image frame character information grabbing, and the characters are matched with a preset sensitive character database, so that whether the sensitive characters exist in the page or not is identified. And after the presence of the sensitive characters is identified, shielding or blurring the sensitive characters.
Thus, after pushing the video frame corresponding to the internal page of the application authorized to share to the authorized user, the authorized user cannot view the sensitive text appearing on the internal page of the application authorized to share.
Key sensitive characters related to the authorized user can be preset in the sensitive character database, and meanwhile, the user can add related character information according to actual requirements.
In the process that the authorized user accesses the authorized sharing application, the corresponding video stream can be pushed to the authorized user at the same time.
Optionally, after obtaining the page image frame displayed on the cloud mobile phone screen of the authorized user, the method further includes: and pushing the video stream corresponding to the page image frame to the authorized user.
Thus, the authorized user can know the condition that the authorized user uses the authorized sharing application, and can execute the operation of interrupting or exiting the authorized application at any time.
Optionally, after pushing the video stream corresponding to the page image frame to the authorized user, the method further includes: receiving a first operation instruction returned by the authorized user; and if the first operation instruction corresponds to the operation of the authorized user on the unauthorized sharing application of the authorized user, carrying out privacy protection processing on all page images displayed on the cloud mobile phone screen according to the first operation instruction until the authorized user exits the unauthorized sharing application.
When the authorized user authorizes the application of the shared cloud mobile phone, the display page of the cloud mobile phone seen by the authorized user is not different from the display page of the cloud mobile phone which is normally used by the authorized user. When the authorized user clicks and accesses the application which is not authorized to share on the cloud mobile phone, the full screen of the interface displayed by the authorized user terminal is blurred until the main client terminal is judged to exit the application. That is, in the process that the authorized user accesses the cloud mobile phone, if the authorized user currently operates to access the unauthorized sharing application on the cloud mobile phone, all privacy protection processing is performed on the unauthorized sharing application, so that the authorized user side cannot normally display the interface of the unauthorized sharing application, and privacy security of the unauthorized sharing application of the authorized user is improved.
In addition, the authorized user can add the sensitive text at any time according to the page displayed when the sharing application is authorized to use.
Optionally, after pushing the video stream corresponding to the page image frame to the authorized user, the method further includes: receiving a sensitive keyword added by the authorized user; and adding the sensitive keyword into the sensitive text database to update the sensitive text database.
Therefore, the privacy security protection of the authorized user authorized sharing application can be further improved by the user-defined addition of the needed sensitive text at any time.
In one embodiment, privacy protection can also be performed on unauthorized sharing applications of authorized users during the process of accessing the cloud mobile phone by the authorized users.
Optionally, receiving a third operation instruction returned by the authorized user under the condition that the authorized user is connected to access the cloud mobile phone; if the third operation instruction is the operation of the authorized user on the application authorized to be shared by the authorized user, controlling the page image frame displayed by the cloud mobile phone screen according to the third operation instruction; and if the third operation instruction is the operation of the authorized user on the unauthorized application of the authorized user, not responding to the third operation instruction.
In the process of accessing the authorized sharing application of the cloud mobile phone, the authorized user can operate the authorized sharing application, so that the cloud mobile phone responds to the operation to display a corresponding page. But before displaying in response to the operation, it is necessary to detect whether or not the operation instruction sent by the authorized user relates to privacy security. If the operation is the normal operation on the authorized sharing application, the cloud mobile phone normally responds to the operation instruction; if the operation instruction is a click signal for the unauthorized sharing application, the click signal is interrupted, namely the operation instruction is not responded.
In addition, when the authorized user finds that other applications with authorization sharing need to be newly added in the process of accessing the application with authorization sharing, the authorized user can initiate an application authorization request, and newly add the application with authorization sharing under the condition of being agreed by the authorized user.
The cloud mobile phone screen sharing method according to the embodiment of the present application is described below with reference to the example of fig. 2.
As shown in fig. 2, the master mobile phone 20 corresponds to an authorized user, and the cloud mobile phone 10 normally provides cloud services for the user of the master mobile phone. One or more applications (applications 1,2,3, … n) on cloud handset 10 may be authorized to share access to other users in the event that master handset 20 actively shares or other user requests. For example, master handset 20 may authorize multiple users to use applications on their cloud handsets 10, with authorized handsets 1,2, ·n corresponding to the authorized users.
Master handset 20, while sharing the screen of its cloud handset 10, comprises the steps of:
step 202, capturing a page, and acquiring a page image frame displayed on a screen of the cloud mobile phone 10;
step 204, comparing the content of the captured page with the icon feature library and/or the sensitive database to determine whether an application icon or sensitive text requiring privacy protection exists;
step 206, performing, for example, masking preprocessing on the page image to be subjected to privacy protection processing;
step 208, performing H265 video compression coding on the page image frame after the shielding treatment, and then converting the video into (real-time message transmission protocol) RTMP push stream;
in step 210, after the video stream is pushed to the corresponding authorized mobile phone, the video is decoded by the media computing service, so that the screen displayed on the cloud mobile phone screen is displayed on the authorized mobile phone end, and the authorized mobile phone can also initiate a request for applying for an authorization application on the newly added cloud mobile phone to the cloud mobile phone 10.
212, directly carrying out H265 video compression coding on the captured page image frames without shielding treatment, and then converting the video into RTMP push stream;
step 214, after the video stream is pushed to the corresponding master mobile phone 10, the video is decoded by the media computing service, so that the picture displayed on the cloud mobile phone screen is displayed on the master mobile phone end, and the master mobile phone 20 can set the shielding keywords while viewing the picture displayed on the cloud mobile phone, i.e. add the customized sensitive keywords, and send the set shielding keywords to the sensitive database at the cloud mobile phone 10 end.
The master control mobile phone 20 and the authorized mobile phone respectively receive two different video push streams, a cloud mobile phone screen interface displayed by the master control mobile phone 20 end is unchanged, and the application icons in the cloud mobile phone screen interface received by the authorized mobile phone end are subjected to fuzzy processing, so that personal privacy information security can be effectively protected while sharing cloud mobile phone application operation.
In the embodiment of the application, the page image frames displayed on the cloud mobile phone screen of the authorized user are acquired; based on the application authorized to be shared by the authorized user, privacy protection processing is carried out on unauthorized applications in the page image frames; and pushing the video stream corresponding to the page image frame after privacy protection processing to an authorized user for display, so that privacy security of the authorized user can be effectively and comprehensively protected under the condition of authorized sharing of the cloud mobile phone screen.
Optionally, the embodiment of the present application further provides an electronic device, and fig. 3 is a block diagram of the structure of the electronic device according to the embodiment of the present application.
As shown in the figure, the electronic device 2000 includes a memory 2200 and a processor 2400 electrically connected to the memory 2200, where the memory 2200 stores a computer program that can be executed by the processor 2400, and the computer program implements each process of any one of the embodiments of the cloud mobile phone screen sharing method when executed by the processor, and can achieve the same technical effect, so that repetition is avoided and no further description is given here.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements each process of any one of the cloud mobile phone screen sharing method embodiments described above, and can achieve the same technical effect, so that repetition is avoided, and no further description is provided herein. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (8)

1. The cloud mobile phone screen sharing method is executed by a cloud mobile phone or a cloud mobile phone intermediate management platform for interfacing the cloud mobile phone with a user, and is characterized by comprising the following steps:
acquiring a page image frame displayed on a cloud mobile phone screen of an authorized user;
based on the application authorized to be shared by the authorized user, privacy protection processing is carried out on unauthorized applications in the page image frames;
pushing the video stream corresponding to the page image frame after privacy protection treatment to an authorized user for display;
the authorized user is a user who can authorize and share the cloud mobile phone providing cloud service for the authorized user to other users, and the authorized user is a user who can connect the cloud mobile phone accessing the authorized user after the authorized user is authorized;
after the acquiring of the page image frame displayed by the cloud mobile phone screen of the authorized user, the method further comprises: pushing the video stream corresponding to the page image frame to the authorized user;
wherein, before the privacy protection processing is performed on the unauthorized application in the page image frame, the method further includes: receiving a sharing instruction sent by the authorized user, wherein the sharing instruction is used for an application of which the authorized user requests to authorize sharing; responding to the sharing instruction, and generating application information and a server address of the application which requests to authorize sharing; transmitting the application information and server address information to the authorized user so that the authorized user generates and provides the shared information of the application requesting authorization for sharing to the authorized user; and after receiving a second operation instruction returned by the authorized user for the shared information, sending equipment information and address information of the cloud mobile phone to the authorized user so that the authorized user can acquire authorized connection access to the cloud mobile phone.
2. The method of claim 1, wherein privacy preserving unauthorized applications in the page image frames based on the applications authorized for sharing by the authorized user comprises:
acquiring each application icon included in a main interface image under the condition that the page image frame is the main interface image where the application icon is located;
identifying the application authorized to be shared by the authorized user from the application icons according to the preset identification of the application authorized to be shared by the authorized user;
and shielding or blurring unauthorized application icons except for the icons of the shared application authorized by the authorized user in the main interface image.
3. The method of claim 1, wherein the method further comprises, before pushing the video stream corresponding to the privacy-preserving processed page image frame to an authorized user for display:
based on the application authorized to be shared by the authorized user, privacy protection processing is carried out on page contents of the application authorized to be shared in the page image frame;
the privacy protection processing for the page content of the application authorized to be shared in the page image frame based on the application authorized to be shared by the authorized user comprises the following steps:
acquiring text information in the page content of the application authorized to be shared;
identifying the sensitive text from the text information according to the sensitive text database;
and shielding or blurring the sensitive text in the page content of the application authorized to be shared.
4. The method of claim 1, wherein pushing the video stream corresponding to the page image frame to the authorized user further comprises:
receiving a sensitive keyword added by the authorized user;
and adding the sensitive keyword into a sensitive text database to update the sensitive text database.
5. The method of claim 1, wherein pushing the video stream corresponding to the page image frame to the authorized user further comprises:
receiving a first operation instruction returned by the authorized user;
and if the first operation instruction corresponds to the operation of the authorized user on the unauthorized sharing application of the authorized user, carrying out privacy protection processing on all page images displayed on the cloud mobile phone screen according to the first operation instruction until the authorized user exits the unauthorized sharing application.
6. The method as recited in claim 1, further comprising:
receiving a third operation instruction returned by the authorized user under the condition that the authorized user is connected to access the cloud mobile phone;
if the third operation instruction is the operation of the authorized user on the application authorized to be shared by the authorized user, controlling the page image frame displayed by the cloud mobile phone screen according to the third operation instruction;
and if the third operation instruction is the operation of the authorized user on the unauthorized application of the authorized user, not responding to the third operation instruction.
7. An electronic device, comprising: a memory and a processor electrically connected to the memory, the memory storing a computer program executable by the processor, the computer program implementing the steps of the method of any one of claims 1 to 6 when executed by the processor.
8. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, implements the steps of the method according to any one of claims 1 to 6.
CN202211087721.1A 2022-09-07 2022-09-07 Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium Active CN115484086B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211087721.1A CN115484086B (en) 2022-09-07 2022-09-07 Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211087721.1A CN115484086B (en) 2022-09-07 2022-09-07 Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN115484086A CN115484086A (en) 2022-12-16
CN115484086B true CN115484086B (en) 2023-10-27

Family

ID=84424171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211087721.1A Active CN115484086B (en) 2022-09-07 2022-09-07 Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN115484086B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115695052B (en) * 2023-01-03 2023-03-31 平安银行股份有限公司 Data protection method and device for shared interface
CN116156009B (en) * 2023-01-12 2023-10-20 杭州龙境科技有限公司 Method for sharing display service between An Zhuoyun mobile phone containers

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603667A (en) * 2016-12-16 2017-04-26 北京小米移动软件有限公司 Screen information sharing method and device
CN107592576A (en) * 2017-09-15 2018-01-16 威创集团股份有限公司 A kind of video sharing method, system, share end and be shared end
CN111694603A (en) * 2019-03-12 2020-09-22 腾讯科技(深圳)有限公司 Screen sharing method and device, computer equipment and storage medium
CN111736787A (en) * 2020-06-24 2020-10-02 北京云族佳科技有限公司 Screen sharing method and device, storage medium and electronic equipment
CN113163215A (en) * 2020-01-22 2021-07-23 华为技术有限公司 Live broadcast method and live broadcast system based on cloud mobile phone
CN113946870A (en) * 2021-11-10 2022-01-18 深圳瞬玩科技有限公司 Privacy protection method, system, equipment and storage medium for shared interface
WO2022142492A1 (en) * 2020-12-31 2022-07-07 中兴通讯股份有限公司 Screen sharing method for mobile terminals, mobile terminal, and storage medium
CN115361184A (en) * 2022-08-10 2022-11-18 深圳乐播科技有限公司 Privacy protection method and related product

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603667A (en) * 2016-12-16 2017-04-26 北京小米移动软件有限公司 Screen information sharing method and device
CN107592576A (en) * 2017-09-15 2018-01-16 威创集团股份有限公司 A kind of video sharing method, system, share end and be shared end
CN111694603A (en) * 2019-03-12 2020-09-22 腾讯科技(深圳)有限公司 Screen sharing method and device, computer equipment and storage medium
CN113163215A (en) * 2020-01-22 2021-07-23 华为技术有限公司 Live broadcast method and live broadcast system based on cloud mobile phone
CN111736787A (en) * 2020-06-24 2020-10-02 北京云族佳科技有限公司 Screen sharing method and device, storage medium and electronic equipment
WO2022142492A1 (en) * 2020-12-31 2022-07-07 中兴通讯股份有限公司 Screen sharing method for mobile terminals, mobile terminal, and storage medium
CN113946870A (en) * 2021-11-10 2022-01-18 深圳瞬玩科技有限公司 Privacy protection method, system, equipment and storage medium for shared interface
CN115361184A (en) * 2022-08-10 2022-11-18 深圳乐播科技有限公司 Privacy protection method and related product

Also Published As

Publication number Publication date
CN115484086A (en) 2022-12-16

Similar Documents

Publication Publication Date Title
CN115484086B (en) Cloud mobile phone screen sharing method, electronic equipment and computer readable storage medium
US10198587B2 (en) System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
US20090089803A1 (en) Notifying a User of Access to Information by an Application
CN111460503B (en) Data sharing method, device, equipment and storage medium
CN111861228A (en) Customer service information processing method, device, equipment and medium based on user behaviors
CN113225610B (en) Screen projection method, device, equipment and storage medium
CN111182021B (en) File sharing method and device, electronic equipment and computer readable storage medium
US11405403B2 (en) Method and device, and server and terminal for processing network resource access
CN113992414B (en) Data access method, device and equipment
CN107172466A (en) Shared image data display method and system
CN114386059A (en) Webpage text confusion anti-crawler method and device, electronic equipment and storage medium
CN111460502B (en) Data sharing method, device, equipment and storage medium
CN112417407A (en) Data authorization processing method, device, equipment and storage medium
AU2019214074B2 (en) Method for processing data
CN116319764A (en) Cloud desktop security management and control method, device, storage medium and system
CN115242779B (en) File transmission method and system based on applet and electronic equipment
CN113965385B (en) Monitoring processing method, device, equipment and medium for abnormal website
CN112637635B (en) File confidentiality method and system, computer readable storage medium and processor
CN106992995A (en) View data shares display methods and system
CN115186248A (en) Login method of application page, terminal equipment, server and storage medium
CN112149177B (en) Bidirectional protection method and system for network information security
CN107707630B (en) Method and device for file transmission
CN107071589A (en) The sharing method and image data server of shared view data
CN113660290A (en) Signaling transmission method, device, equipment and storage medium
CN112785312A (en) Information sharing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant