CN115509774A - Content sharing method based on different application programs and related equipment thereof - Google Patents

Content sharing method based on different application programs and related equipment thereof Download PDF

Info

Publication number
CN115509774A
CN115509774A CN202211326819.8A CN202211326819A CN115509774A CN 115509774 A CN115509774 A CN 115509774A CN 202211326819 A CN202211326819 A CN 202211326819A CN 115509774 A CN115509774 A CN 115509774A
Authority
CN
China
Prior art keywords
application program
password information
link
target
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211326819.8A
Other languages
Chinese (zh)
Inventor
刘攀伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202211326819.8A priority Critical patent/CN115509774A/en
Publication of CN115509774A publication Critical patent/CN115509774A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application relates to a content sharing method based on different application programs and related equipment thereof, wherein the method comprises the following steps: generating initial password information according to sharing operation through a first application program; generating target password information according to the initial password information, and storing the target password information to the pasting board; acquiring a first link according to the target password information; judging whether the first link is located in a preset white list or not; if the first link is located in the white list, storing the local cache of the first link to the second application program, and emptying the content of the pasting board; and if the first link is positioned outside the white list, directly clearing the content of the pasting board. Whether the first link of cache and the board of pasting of emptying are judged through setting up the white list to this application, can reduce the interference of outside first application program, reduce user's identification cost, promote the efficiency that the password was shared, paste the board at application layer in time clearance simultaneously, can reduce the risk that password information revealed, promote the security that the password was shared.

Description

Content sharing method based on different application programs and related equipment thereof
Technical Field
The present application relates to the field of computer technologies, and in particular, to a content sharing method based on different application programs and a related device thereof.
Background
In the related art, staff in a bank adopts a staff application program as an important platform for daily work. The platform is connected with a plurality of service lines, provides a plurality of functions such as service handling, data reporting, course learning, online stores, opinion feedback and the like, and is rich in content.
In the actual use process, the sharing requirement is large due to the multi-service line and multi-functional characteristics of the application program of the members. For example, users often need to share content such as premium content, questionnaires, product recommendations, and the like to others. Meanwhile, other external applications also have a need to share with the administrator application. The diversity and complexity of sharing present challenges to users and application administrators, one of which is how to identify numerous passwords.
Disclosure of Invention
In view of this, the present application provides a content sharing method based on different application programs and related devices thereof, which can reduce interference of an external first application program, reduce the identification cost of a user, and improve the password sharing efficiency, and meanwhile, the sticky board is cleaned in time at the application level, so that the risk of password information leakage can be reduced, and the password sharing security can be improved.
According to an aspect of the present application, a content sharing method based on different application programs is provided, and the content sharing method based on different application programs includes: generating initial password information corresponding to sharing content according to a sharing target triggered by sharing operation of a first application program and the sharing content related to a second application program; generating target password information for sharing to the second application program according to the initial password information, and storing the target password information to a pasting board; acquiring a first link related to the second application program according to the target password information; judging whether the first link is located in a white list preset by the second application program; if the first link is located in the white list, storing the first link to a local cache of the second application program, and emptying the content of the pasting board; and if the first link is positioned outside the white list, directly emptying the content of the pasting board.
Further, generating target password information for sharing to the second application program according to the initial password information, including: acquiring initial access information corresponding to the initial password information; generating an initial link corresponding to the shared content according to the initial access information; acquiring a preset coding format of the second application program; and splicing the initial link and the preset coding format to generate target password information for sharing to the second application program.
Further, before acquiring the first link related to the second application according to the target password information, the content sharing method based on different applications further includes: acquiring the running state of the second application program; and under the condition that the second application program is switched to the foreground from the background or the second application program is restarted and opened, acquiring the content of the sticky board.
Further, obtaining a first link associated with the second application according to the target password information includes: judging whether the target password information is matched with a character cluster preset by the second application program or not; under the condition that the target password information is matched with a character cluster preset by the second application program, acquiring a first link related to the second application program according to the target password information; and under the condition that the target password information is not matched with the character cluster preset by the second application program, not acquiring a first link related to the second application program.
Further, the determining whether the target password information matches with a character cluster preset by the second application program includes: acquiring a regular expression corresponding to the target password information according to the target password information; comparing the regular expression corresponding to the target password information with a character cluster preset by the second application program to obtain a comparison result corresponding to the target password information; judging whether the target password information is matched with a character cluster preset by the second application program or not according to the comparison result, wherein under the condition that a regular expression corresponding to the target password information is located in the character cluster preset by the second application program, the target password information is determined to be matched with the character cluster preset by the second application program; and under the condition that the regular expression corresponding to the target password information is located outside the character cluster preset by the second application program, determining that the target password information is not matched with the character cluster preset by the second application program.
Further, determining whether the first link is located in a white list preset by the second application includes: reading a white list preset by the second application program; extracting a target keyword related to the second application program according to the first link; and judging whether the first link is located in a white list preset by the second application program by inquiring whether the target keywords are all located in the white list.
Further, the content sharing method based on different application programs further includes: jumping to a target display page of the second application program through a preset plug-in of the second application program; calling an Aladdin method in the target password information under the target display page to acquire a second link related to the second application program; and jumping to a target page corresponding to the target password information based on the second link.
According to another aspect of the present application, there is provided a content sharing apparatus based on different applications, including: the initial password generation module is used for generating initial password information corresponding to the sharing content according to a sharing target triggered by the sharing operation of the first application program and the sharing content related to the second application program; the target password generating module is used for generating target password information shared to the second application program according to the initial password information and storing the target password information to the pasting board; the first link acquisition module is used for acquiring a first link related to the second application program according to the target password information; the white list judging module is used for judging whether the first link is located in a white list preset by the second application program; an emptying module, configured to store the local cache of the second application program from the first link and empty the content of the sticky board if the first link is located in the white list; and if the first link is positioned outside the white list, directly emptying the content of the pasting board.
According to yet another aspect of the present application, a computer-readable medium is provided, on which a computer program is stored, which, when being executed by a processor, implements the method for content sharing based on different applications.
According to still another aspect of the present application, there is provided an electronic device including: one or more processors; a storage device to store one or more programs that, when executed by the one or more processors, cause the one or more processors to implement the disparate application based content sharing method.
The method comprises the steps of generating initial password information through sharing operation based on a first application program, generating target password information according to the initial password information, storing the target password information to a paste board, acquiring a first link related to a second application program, setting a white list to judge whether to cache the first link and empty the paste board, reducing interference of the first application program outside according to the aspects of the application, reducing the identification cost of a user, improving the password sharing efficiency, timely cleaning the paste board on an application layer, reducing the risk of password information leakage and improving the password sharing safety.
Drawings
The technical solutions and other advantages of the present application will become apparent from the following detailed description of specific embodiments of the present application when taken in conjunction with the accompanying drawings.
Fig. 1 shows a flowchart of a content sharing method based on different application programs according to an embodiment of the present application.
Fig. 2 is a schematic diagram illustrating a content sharing method based on different applications according to an embodiment of the present disclosure.
Fig. 3 shows a block diagram of a content sharing apparatus based on different applications according to an embodiment of the present application.
Fig. 4 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is to be understood that the terms "center," "longitudinal," "lateral," "length," "width," "thickness," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," "clockwise," "counterclockwise," and the like are used in the orientations and positional relationships indicated in the drawings for convenience in describing the present application and for simplicity in description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed in a particular orientation, and be operated in a particular manner, and are not to be construed as limiting the present application. Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or to implicitly indicate the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
In the description of the present application, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; may be mechanically connected, may be electrically connected or may be in communication with each other; either directly or indirectly through intervening media, either internally or in any other suitable relationship. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
The following disclosure provides many different embodiments or examples for implementing different features of the application. In order to simplify the disclosure of the present application, specific example components and arrangements are described below. Of course, they are merely examples and are not intended to limit the present application. Further, the present application may repeat reference numerals and/or reference letters in the various examples for simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or arrangements discussed. In addition, examples of various specific processes and materials are provided herein, but one of ordinary skill in the art may recognize the application of other processes and/or the use of other materials. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present application.
Fig. 1 shows a flowchart of a content sharing method based on different application programs according to an embodiment of the present application. As shown in fig. 1, the content sharing method based on different application programs may include:
step S1: generating initial password information corresponding to sharing content according to a sharing target triggered by sharing operation of a first application program and the sharing content related to a second application program;
the content sharing method based on different application programs can be used in an application environment comprising a first terminal, a second terminal and a server. The first application program is installed on the first terminal, and the second application program is installed in the second terminal. The first terminal and the second terminal can communicate through the server. The first terminal and the second terminal can be mobile phones, tablets, computers, embedded devices and the like. The server can be operated based on a Linux platform and can also be operated by other platforms such as Windows and the like. The content sharing method based on different application programs can be operated on a server. It is to be understood that the present application is not limited to the specific implementation of the first terminal, the second terminal, and the server.
Illustratively, the second application program may be an administrator APP developed by a bank, running on a mobile operating system such as android or IOS. The first application program can be other application programs developed in the bank except for the application program of the member, and can also be external application programs outside the bank, such as a pay bank, internet news and the like.
Specifically, after the sharing operation of a first user in a first application program is detected, a sharing target triggered by the sharing operation and sharing content related to a second application program are obtained, and initial password information corresponding to the sharing content is generated according to the sharing target and the sharing content. The first user is a sharing initiator.
In one example, a sharing button is arranged on an interface of the first application program. When the first user reads the financial news needing to be shared, the sharing button can be called out, and therefore the sharing operation of the first application program is achieved. The sharing operation can trigger a corresponding sharing target and sharing content, wherein the sharing target comprises a destination to which the sharing content is to be sent, and the sharing content comprises an interface of a first application program currently used by a first user.
The initial password information may include a title, complete initial password text content, and prompt information. For example, the title may be "copy current password", the prompt may be "go to the waiter application to paste", and the title, initial password text content, and prompt may be sequentially presented on a fixed page of the first application.
Step S2: generating target password information for sharing to the second application program according to the initial password information, and storing the target password information to a pasting board;
wherein the target password information may include a corresponding link and a title. The data structure of the target password information may be set as needed. It is to be understood that the specific content of the target password information is not limited in the present application.
Further, generating target password information for sharing to the second application program according to the initial password information, including:
step S21: acquiring initial access information corresponding to the initial password information;
wherein the initial access information may include a current access link and a password parameter. The current access link corresponds to the shared content, and the password parameter is associated with the first application.
Step S22: generating an initial link corresponding to the shared content according to the initial access information;
specifically, initial access information corresponding to the initial password information is acquired, and an initial link corresponding to the shared content is generated according to the initial access information. Further, a short link corresponding to the initial password information may be acquired according to the current access link and the password parameter, and then the initial link corresponding to the shared content may be generated by deleting a preset general domain name in the short link.
Step S23: acquiring a preset coding format of the second application program;
illustratively, the preset encoding format may include a password encoding format and a page open type encoding format. The password encoding format of different application programs can be different, and the page opening type encoding format can be the same or different. For example, the page opening modes in different applications can be popup window type display, or both direct page jump and native page opening modes of the applications. It is to be understood that the present application is not limited to the type of the preset encoding format.
Step S24: and splicing the initial link and the preset coding format to generate target password information shared to the second application program.
Specifically, the initial link, the password encoding format and the page opening type encoding format may be spliced to generate a spliced field corresponding to the shared content, and then the spliced field is transcoded to generate the target password information for sharing to the second application program.
Wherein when the target password information is associated with the password encoding format and the page open type encoding format of the second application, the generated splice field already has preliminary characteristics that can be recognized and opened by the second application. Next, if the target password information is to be identified and analyzed by the second application program and corresponding shared content is opened, the white list of the embodiment of the present application needs to be used for further determination.
And step S3: acquiring a first link related to the second application program according to the target password information;
wherein the first link is associated with the second application. The first link may include a Uniform Resource Locator (URL) corresponding to the shared content. The uniform resource locator may include letters, numbers, and special characters such as a stroke associated with the first link.
Further, obtaining a first link associated with the second application according to the target password information includes:
step S31: judging whether the target password information is matched with a character cluster preset by the second application program;
the target password information is generated based on the first application program, and in view of a difference between the first application program and the second application program, it needs to first determine whether the target password information matches with the second application program, and then determine whether the first link is located in a preset white list of the second application program on the basis that the target password information can match with the second application program.
Specifically, the determining whether the target password information matches with a character cluster preset by the second application includes:
step S311: acquiring a regular expression corresponding to the target password information according to the target password information;
wherein the regular expression corresponding to the target password information may include a string associated with the second application. The string may include letters as well as numbers, and other special characters such as a slash. For example, a character string related to the second application program may be directly extracted from the target password information, and then a regular expression corresponding to the target password information may be obtained.
Step S312: comparing the regular expression corresponding to the target password information with a character cluster preset by the second application program to obtain a comparison result corresponding to the target password information;
specifically, the character cluster of the second application program may be a character set, and is preset in a configuration file of the second application program. Before executing step S312, the server may read the character cluster of the second application program in advance.
Step S313: judging whether the target password information is matched with a character cluster preset by the second application program or not according to the comparison result, wherein the target password information is determined to be matched with the character cluster preset by the second application program under the condition that a regular expression corresponding to the target password information is located in the character cluster preset by the second application program; and under the condition that the regular expression corresponding to the target password information is located outside the character cluster preset by the second application program, determining that the target password information is not matched with the character cluster preset by the second application program.
For example, the character cluster of the second application program can be represented as: and ^ a-z ] [0-9] $. ^ denotes the previous boundary of the cluster and $ denotes the following boundary of the cluster. At this time, if the regular expression corresponding to the target password information contains any letters of a-z and any numbers of 0-9, it can be shown that the target password information is matched with a character cluster preset by the second application program; if the regular expression corresponding to the target password information does not contain any alpha-z letter, any number from 0 to 9, or only contains any alpha-z letter and any number from 0 to 9, it can be shown that the target password information is not matched with the character cluster preset by the second application program.
Step S32: under the condition that the target password information is matched with a character cluster preset by the second application program, acquiring a first link related to the second application program according to the target password information; and under the condition that the target password information is not matched with the character cluster preset by the second application program, not acquiring a first link related to the second application program.
Step S32 is performed according to the determination result of step S31. Step S31 is to generate a corresponding matching result after determining whether the target password information matches with the character cluster preset by the second application, and then determine to acquire the first link related to the second application or not to acquire the first link related to the second application according to the matching result in step S32. In the event that it is determined that the first link associated with the second application is to be obtained, the asynchronous thread may invoke a corresponding network request and then obtain the first link associated with the second application based on the network request.
Further, before acquiring the first link related to the second application according to the target password information, the content sharing method based on different applications further includes:
step S301: acquiring the running state of the second application program;
the running state of the second application program can comprise an activated state and a non-activated state. For the active state, there are two operational scenarios for the second application. One of the scenarios may be that the second application program is switched from a background to a foreground, and the other scenario may be that the second application program is restarted and is in an open state. The inactive state may refer to a state in which the second application is not open, or a state in which use is forcibly suspended by setting an option, or the like.
Step S302: and under the condition that the second application program is switched to the foreground from the background or the second application program is restarted and opened, acquiring the content of the sticky board.
In step S302, the entire contents of the sticker sheet may be acquired, or partial contents of the sticker sheet may be acquired. Preferably, the entire contents of the sticker sheet are obtained. It should be noted that the content of the sticker board is acquired only when the second application is in an active state, for example, the second application is switched from a background to a foreground or the second application is restarted and opened. Otherwise, if the second application program is in an inactive state, the content of the sticker sheet may not be acquired.
And step S4: judging whether the first link is located in a white list preset by the second application program;
specifically, the determining whether the first link is located in a preset white list of the second application includes:
step S41: reading a white list preset by the second application program;
wherein the white list is pre-configurable in a configuration file of the second application. Illustratively, the white list may include a plurality of predetermined links, such as www.baidu.com, or keywords associated with the links, such as baidu.
Step S42: extracting a target keyword related to the second application program according to the first link;
illustratively, the first link is www.baidu.com/wenku. At this time, the target keywords "baidu" and "wenku" may be extracted from the first link. If the white list comprises two keywords, namely "baidu" and "wenku", the target keyword is located in the white list, so that the first link is located in the white list preset by the second application program, otherwise, the target keyword is located outside the white list, so that the first link is located outside the white list preset by the second application program. For another example, the white list may also include a link such as "www.baidu.com", and if the first link is www.baidu.com/wenku, which indicates that the first link is a sub-link of "www.baidu.com", it may also indicate that the first link is located in the white list preset by the second application.
Step S43: and judging whether the first link is in a white list preset by the second application program or not by inquiring whether the target keywords are all in the white list or not.
In step S43, whether the target keyword is located in the white list may be queried according to the priority of each link or the priority of each keyword in the preset white list, so as to determine whether the first link is located in the preset white list of the second application. It can be understood that the priority of each link or the priority of each keyword in the white list may be set according to needs, and the present application is not limited thereto.
Step S5: if the first link is located in the white list, storing the first link to a local cache of the second application program, and emptying the content of the pasting board; and if the first link is positioned outside the white list, directly emptying the content of the pasting board.
And step S5 is performed based on the determination result obtained in step S4, that is, whether the first link is located in the white list preset by the second application. Specifically, under the condition that the first link is located in the white list, it is described that the shared content corresponding to the first link may be shared to the second application program, and at this time, the local cache of the first link to the second application program may be saved so as to be further invoked, and meanwhile, the content of the pasting board is cleared, so that the risk of leakage of content information of the pasting board is reduced. And under the condition that the first link is positioned outside the white list, the shared content corresponding to the first link cannot be shared to the second application program, and at the moment, the content of the sticky board can be directly emptied, so that the risk of leakage of content information of the sticky board is further reduced.
In addition, since the data structure of the password may contain a title, when the first local cache linked to the second application is saved, the title may also be saved to the local cache of the second application at the same time.
Further, the content sharing method based on different application programs further includes:
step S61: jumping to a target display page of the second application program through a preset plug-in of the second application program;
the target presentation page of the second application program may be a home page of the second application program. In one example, the default plug-in for the second application is associated with a home page of the second application. And after the preset plug-in is clicked, the second application program automatically jumps to the target display page.
Step S62: calling an Aladdin method in the target password information under the target display page, and acquiring a second link related to the second application program;
for example, the alading method is aladdin. Banka _ command. Getcommandinfo. Assume that the target password information includes the following data structure:
{ "data" { "url": sicaih5/dist/module/colMainPage. Html., "" title ": play pocket coin, we wait for" }
Wherein url may be the second link and title may be a title. By calling the alatin method, a second link and a corresponding title associated with the second application may be obtained.
Step S63: and jumping to a target page corresponding to the target password information based on the second link.
The second link can be used for directly jumping to a page pointed by the target password information under the target display page, and the page pointed by the target password information is the target page.
Fig. 2 is a schematic diagram illustrating a content sharing method based on different applications according to an embodiment of the present disclosure.
As shown in fig. 2, for example, the server may first obtain a sharing operation of a first application program, then generate initial password information corresponding to a sharing content according to a sharing target triggered by the sharing operation of the first application program and the sharing content related to a second application program, generate target password information for sharing to the second application program according to the initial password information, and store the target password information to the pasting board.
Then, the running state of the second application program can be judged. If the second application program is in an activated state, the content of the pasting board can be obtained; and if the second application program is in the non-activated state, no response is given. After the content of the sticky board is obtained, a first link related to the second application program can be obtained according to the target password information, and whether the first link is located in a white list preset by the second application program or not is judged. If the first link is located in the white list, storing the first link to a local cache of the second application program, and emptying the content of the pasting board; and if the first link is positioned outside the white list, directly emptying the content of the pasting board.
In fig. 2, other decision branches may also be provided. For example, before the first link is acquired, whether the target password information matches with the character cluster preset by the second application program may be determined through regular matching. For other logic branches related to the method, reference may be made to the content sharing method based on different application programs, which is not described in detail.
In summary, initial password information is generated through sharing operation based on a first application program, target password information is generated according to the initial password information, the target password information is stored in a pasting board, a first link related to a second application program is acquired, and then a white list is set to judge whether the first link is cached or not and the pasting board is cleared.
Fig. 3 shows a block diagram of a content sharing device based on different applications according to an embodiment of the present application.
As shown in fig. 3, the content sharing device 30 based on different application programs according to the embodiment of the present disclosure may include:
an initial password generation module 31, configured to generate initial password information corresponding to a sharing content according to a sharing target triggered by a sharing operation of a first application and the sharing content related to a second application;
a target password generating module 32, configured to generate target password information for sharing to the second application program according to the initial password information, and store the target password information to the pasting board;
a first link obtaining module 33, configured to obtain a first link related to the second application according to the target password information;
a white list determining module 34, configured to determine whether the first link is located in a preset white list of the second application;
an emptying module 35, configured to, if the first link is located in the white list, store the first link to the local cache of the second application program, and empty the content of the sticky board; and if the first link is positioned outside the white list, directly emptying the content of the pasting board.
In this embodiment, the content sharing device based on different application programs may further include other modules. It should be understood that the present application is not limited to the specific components of the content sharing device based on different application programs. For specific details of the content sharing device based on different applications, reference may be made to the content sharing method based on different applications, which is not described in detail.
Furthermore, the present application provides a computer-readable medium, on which a computer program is stored, which, when being executed by a processor, implements the method for content sharing based on different applications.
Further, the present application also provides an electronic device, including: one or more processors; a storage device to store one or more programs that, when executed by the one or more processors, cause the one or more processors to implement the disparate application based content sharing method.
Fig. 4 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
As shown in fig. 4, the electronic device may be configured to implement the content sharing method based on different applications. In particular, the electronic device may comprise a computer system. It should be noted that the electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the use range of the embodiment of the present application.
As shown in fig. 4, the computer system includes a Central Processing Unit (CPU) 1801, which can perform various appropriate actions and processes, such as executing the method described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) 1802 or a program loaded from a storage portion 1808 into a Random Access Memory (RAM) 1803. In the RAM 1803, various programs and data necessary for system operation are also stored. The CPU 1801, ROM 1802, and RAM 1803 are connected to each other via a bus 1804. An Input/Output (I/O) interface 1805 is also connected to bus 1804.
The following components are connected to the I/O interface 1805: an input portion 1806 including a keyboard, a mouse, and the like; an output section 1807 including a Display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 1808 including a hard disk and the like; and a communication section 1809 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 1809 performs communication processing via a network such as the internet. A driver 1810 is also connected to the I/O interface 1805 as needed. A removable medium 1811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1810 as necessary, so that a computer program read out therefrom is mounted in the storage portion 1808 as necessary.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method illustrated by the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communication portion 1809, and/or installed from the removable media 1811. The computer program executes various functions defined in the system of the present application when executed by a Central Processing Unit (CPU) 1801.
It should be noted that the computer readable media shown in the embodiments of the present application may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with a computer program embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiment; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs, which when executed by one of the electronic devices, cause the electronic device to implement the method described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, and may also be implemented by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The content sharing method based on different application programs and the related devices thereof provided by the embodiments of the present application are introduced in detail above, and specific examples are applied herein to explain the principles and embodiments of the present application, and the description of the embodiments above is only used to help understanding the technical solutions and core ideas of the present application; those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications or substitutions do not depart from the spirit and scope of the present disclosure as defined by the appended claims.

Claims (10)

1. A content sharing method based on different application programs is characterized by comprising the following steps:
generating initial password information corresponding to sharing content according to a sharing target triggered by sharing operation of a first application program and the sharing content related to a second application program;
generating target password information for sharing to the second application program according to the initial password information, and storing the target password information to a pasting board;
acquiring a first link related to the second application program according to the target password information;
judging whether the first link is located in a white list preset by the second application program;
if the first link is located in the white list, storing the first link to a local cache of the second application program, and emptying the content of the pasting board; and if the first link is positioned outside the white list, directly emptying the content of the pasting board.
2. The content sharing method based on different applications according to claim 1, wherein generating target password information for sharing to the second application according to the initial password information comprises:
acquiring initial access information corresponding to the initial password information;
generating an initial link corresponding to the shared content according to the initial access information;
acquiring a preset coding format of the second application program;
and splicing the initial link and the preset coding format to generate target password information shared to the second application program.
3. The disparate-application-based content sharing method according to claim 1, wherein prior to obtaining the first link related to the second application according to the target-password information, the disparate-application-based content sharing method further comprises:
acquiring the running state of the second application program;
and under the condition that the second application program is switched to the foreground from the background or the second application program is restarted and opened, acquiring the content of the sticky board.
4. The method according to claim 1, wherein obtaining a first link associated with the second application according to the target password information comprises:
judging whether the target password information is matched with a character cluster preset by the second application program;
under the condition that the target password information is matched with a character cluster preset by the second application program, acquiring a first link related to the second application program according to the target password information; and under the condition that the target password information is not matched with the character cluster preset by the second application program, not acquiring a first link related to the second application program.
5. The method according to claim 4, wherein determining whether the target password information matches a character cluster preset by the second application comprises:
acquiring a regular expression corresponding to the target password information according to the target password information;
comparing the regular expression corresponding to the target password information with a character cluster preset by the second application program to obtain a comparison result corresponding to the target password information;
judging whether the target password information is matched with a character cluster preset by the second application program or not according to the comparison result, wherein the target password information is determined to be matched with the character cluster preset by the second application program under the condition that a regular expression corresponding to the target password information is located in the character cluster preset by the second application program; and under the condition that the regular expression corresponding to the target password information is located outside the character cluster preset by the second application program, determining that the target password information is not matched with the character cluster preset by the second application program.
6. The method according to claim 1, wherein determining whether the first link is on a preset white list of the second application comprises:
reading a white list preset by the second application program;
extracting a target keyword related to the second application program according to the first link;
and judging whether the first link is located in a white list preset by the second application program by inquiring whether the target keywords are all located in the white list.
7. The disparate application based content sharing method according to claim 1, wherein the disparate application based content sharing method further comprises:
jumping to a target display page of the second application program through a preset plug-in of the second application program;
calling an Aladdin method in the target password information under the target display page to acquire a second link related to the second application program;
and jumping to a target page corresponding to the target password information based on the second link.
8. A content sharing device based on different applications is characterized in that the content sharing device based on different applications comprises:
the initial password generation module is used for generating initial password information corresponding to the sharing content according to a sharing target triggered by the sharing operation of the first application program and the sharing content related to the second application program;
the target password generating module is used for generating target password information shared to the second application program according to the initial password information and storing the target password information to the pasting board;
the first link acquisition module is used for acquiring a first link related to the second application program according to the target password information;
a white list judging module, configured to judge whether the first link is in a white list preset by the second application;
an emptying module, configured to store the local cache of the second application program from the first link and empty the content of the sticky board if the first link is located in the white list; and if the first link is positioned outside the white list, directly emptying the content of the pasting board.
9. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, implements a heterogeneous application based content sharing method according to any one of claims 1 to 7.
10. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to implement the heterogeneous application based content sharing method of any one of claims 1 to 7.
CN202211326819.8A 2022-10-25 2022-10-25 Content sharing method based on different application programs and related equipment thereof Pending CN115509774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211326819.8A CN115509774A (en) 2022-10-25 2022-10-25 Content sharing method based on different application programs and related equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211326819.8A CN115509774A (en) 2022-10-25 2022-10-25 Content sharing method based on different application programs and related equipment thereof

Publications (1)

Publication Number Publication Date
CN115509774A true CN115509774A (en) 2022-12-23

Family

ID=84513281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211326819.8A Pending CN115509774A (en) 2022-10-25 2022-10-25 Content sharing method based on different application programs and related equipment thereof

Country Status (1)

Country Link
CN (1) CN115509774A (en)

Similar Documents

Publication Publication Date Title
US9870268B2 (en) Virtual computing instance migration
CN111414407A (en) Data query method and device of database, computer equipment and storage medium
US20080228504A1 (en) Technique to Deflect Incident Ticket Submission in Real-Time
WO2022121221A1 (en) Token-based application access method and apparatus, computer device, and medium
US11113126B2 (en) Verifying transfer of detected sensitive data
CN109995523B (en) Activation code management method and device and activation code generation method and device
CN113811866A (en) Sensitive data management
CN109951553B (en) Data processing method, system, electronic device and computer readable storage medium
US20180365219A1 (en) Determining context using weighted parsing scoring
CN111242462B (en) Data processing method and device, computer storage medium and electronic equipment
CN109857575A (en) Interface call method, device, electronic equipment and storage medium
CN110781505A (en) System construction method and device, retrieval method and device, medium and equipment
CN110826036A (en) User operation behavior safety identification method and device and electronic equipment
CN114070583A (en) Information access control method, information access control device, computer equipment and medium
US20220245208A1 (en) Method for switching skin of mini-program page, and electronic device
CN114328132A (en) Method, device, equipment and medium for monitoring state of external data source
US20210397646A1 (en) Method, electronic device, and storage medium for processing visual data of deep model
CN109948332A (en) A kind of physical machine login password remapping method and device
CN111538922A (en) Link skip method, application client, device and storage medium
CN114327802B (en) Method, apparatus, device and medium for block chain access to data outside chain
CN115509774A (en) Content sharing method based on different application programs and related equipment thereof
CN110177096A (en) Client certificate method, apparatus, medium and calculating equipment
CN113742104A (en) AI-based RPA (resilient packet Access) body-separating function generation method and device
CN109471849B (en) Model processing method and device, storage medium and electronic equipment
CN108768742B (en) Network construction method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination