WO2016141797A1 - 信息处理方法及装置、计算机可读介质 - Google Patents

信息处理方法及装置、计算机可读介质 Download PDF

Info

Publication number
WO2016141797A1
WO2016141797A1 PCT/CN2016/073881 CN2016073881W WO2016141797A1 WO 2016141797 A1 WO2016141797 A1 WO 2016141797A1 CN 2016073881 W CN2016073881 W CN 2016073881W WO 2016141797 A1 WO2016141797 A1 WO 2016141797A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
communication data
display interface
target
Prior art date
Application number
PCT/CN2016/073881
Other languages
English (en)
French (fr)
Inventor
赵娜
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2016141797A1 publication Critical patent/WO2016141797A1/zh
Priority to US15/642,331 priority Critical patent/US10691818B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to Internet technologies in the field of communications, and in particular, to an information processing method and apparatus, and a computer readable medium.
  • communication applications such as social applications, VoIP applications, and Internet-based communication to support communication between users
  • communication applications have become the mainstream communication methods.
  • users will be sent through communication applications.
  • User's personal privacy information such as bank account number, password, etc.
  • the related art generally encrypts the communication data carrying the information during the transmission process, and decrypts the communication data to present the information after the information is transmitted to the target terminal (such as a mobile phone, a tablet computer, a notebook computer), which can only ensure communication during transmission.
  • the target terminal such as a mobile phone, a tablet computer, a notebook computer
  • the data will not be stolen, but there is no effective solution for how to ensure information security and prevent malicious information from being stolen during the process of presenting information on the target terminal.
  • the embodiment of the invention provides an information processing method and device, and a computer readable medium, which can ensure information security and prevent information from being maliciously stolen in the process of presenting information by the terminal.
  • an embodiment of the present invention provides an information processing method, including:
  • the target information prompting manner in the at least two information prompting manners in the first information prompting manner and the second information prompting manner, and prompting the first information of the communication data bearer in the target information prompting manner;
  • the first information prompting manner when used as the target prompting manner to prompt the first information, the first information and the source information are presented in the first display interface; and when the second information prompting manner is used as the target prompting manner to prompt the first information, The second display interface presents the second information and the source information, and presents the first information when the second display interface receives the specific operation.
  • an embodiment of the present invention provides an information processing apparatus, where the information processing apparatus includes:
  • a communication unit configured to acquire communication data based on the communication link
  • the parsing unit is configured to parse the communication data, obtain attribute information of the communication data, and first information carried by the communication data;
  • the selecting unit is configured to select the target information prompting manner in the at least two information prompting manners in the first information prompting manner and the second information prompting manner based on the attribute information;
  • the prompting unit is configured to prompt the first information of the communication data to be carried in the target information prompting manner; wherein the prompting unit presents the first information in the first display interface when the first information prompting manner is used as the target information prompting manner to prompt the first information And the source information; the prompting unit presents the second information and the source information in the second display interface when the second information prompting manner is used as the target information prompting manner to prompt the first information, and presents the first information when the second display interface receives the specific operation. information.
  • an embodiment of the present invention provides a computer readable medium storing computer executable instructions, when executed, causing at least one processor to perform operations including:
  • the method prompts the first information carried by the communication data; wherein, when the first information is prompted by the first information prompting manner, the first information is displayed in the first display interface
  • the first information and the source information present the second information and the source information on the second display interface when the first information is prompted by the second information prompting manner, and present the first information when the second display interface receives the specific operation.
  • the technical solution provided by the embodiment of the present invention determines the communication data bearer information, that is, the prompting manner of the first information, based on the attribute information of the communication data; when the first information is prompted by the second information prompting manner, the first information prompting manner is different.
  • FIG. 1 is a flowchart 1 of an implementation of an information processing method according to an embodiment of the present invention.
  • FIG. 2a is a flowchart 2 of an implementation of an information processing method according to an embodiment of the present invention.
  • 2b is a schematic diagram 1 of setting information prompt mode in the embodiment of the present invention.
  • 2c is a schematic diagram 1 of a scenario of information prompting in an embodiment of the present invention.
  • FIG. 3a is a flowchart 3 of an implementation of an information processing method according to an embodiment of the present invention.
  • FIG. 3b is a second schematic diagram of a scenario of information prompting in the embodiment of the present invention.
  • FIG. 4a is a flowchart 4 of an implementation of an information processing method in an embodiment of the present invention.
  • 4b is a schematic diagram 3 of a scenario of information prompting in an embodiment of the present invention.
  • FIG. 5 is a flowchart 5 of implementing an information processing method according to an embodiment of the present invention.
  • FIG. 6a is a flowchart 6 of an implementation of an information processing method according to an embodiment of the present invention.
  • FIG. 6b is a schematic diagram 4 of a scenario of information prompting in an embodiment of the present invention.
  • FIG. 7a is a flowchart 7 of an implementation of an information processing method according to an embodiment of the present invention.
  • FIG. 7b is a second schematic diagram of setting information prompting manner in the embodiment of the present invention.
  • FIG. 7c is a schematic diagram 5 of a scenario of information prompting in an embodiment of the present invention.
  • FIG. 8a is a flowchart 8 of an implementation of an information processing method according to an embodiment of the present invention.
  • FIG. 8b is a schematic diagram of a scenario for deleting information records in an embodiment of the present invention.
  • 9a to 9c are schematic diagrams showing the structure of an information processing apparatus in an embodiment of the present invention.
  • the related technology usually encrypts information during the transmission of information, and decrypts the information and presents the information after the information is transmitted to the target terminal device (such as a mobile phone, a tablet computer, a notebook computer), this can only ensure that the information is transmitted. It will not be stolen, but it is difficult to ensure information security in the process of presenting information on the target terminal device. For example, when the user views the information through the terminal device in a public place, how to ensure that the information will not be peeped by others, the related technology still No effective solution;
  • step 101 when the communication data is acquired based on the communication link, the communication data is parsed in step 102, and the attribute information of the communication data and the first information of the communication data bearer are obtained; And selecting, according to the attribute information, one information prompting manner as the target prompting manner in the at least two prompting manners; in step 104, prompting the first information of the communication data bearer in the target information prompting manner; for example, determining the communication based on the attribute information of the communication data
  • the first information prompting manner may be used to prompt the first information, that is, the first information and the source information are presented in the first display interface, which is convenient for the user.
  • the second information prompting manner may be used to prompt the first information, that is, Presenting second information (different from the first information) and source information in the second display interface, and receiving at the second display interface Presenting the first information to a specific operation; that is, using the second information to prompt to receive the first information instead of directly presenting the first information, thereby avoiding the case where directly presenting the first information causes the first information to be stolen. , effectively protect the security of information.
  • This embodiment describes an information processing method, which can be applied to a terminal device such as a smart phone or a tablet computer. As shown in FIG. 2a, the information processing method described in this embodiment includes the following steps:
  • Step 201 Acquire communication data based on the communication link.
  • the communication link here is a data transmission channel based on the following data connections: Fibre Channel data connection; cable data connection; public switched telephone network (PSTN) data connection; based on IEEE 802.3, IEEE 802.11b/g/ n network connection, power line network (POWELINE), cable (CABLE), public switched telephone network (PSTN, Public Switched Telephone Network); based on 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project), 3GPP2 network and other communications IP network connection supported by the network.
  • PSTN Public Switched Telephone Network
  • Step 202 Parse the communication data, and obtain attribute information of the communication data and first information of the communication data bearer.
  • Step 203 Extract source user information and target user information of the communication data from the attribute information.
  • the source user information and the target user information may adopt a unique identifier of the user; for example, when the communication data is social application communication data, the source user information and the target user information may be used by the terminal device to register in the social application.
  • the account number for example, the number method, hereinafter referred to as the social application number
  • the source user information and the target user information may use the mobile phone number.
  • Step 204 Acquire a first preset user information set, where the first preset user information set includes information of at least one user.
  • the target user information represents that the communication data has only one target user.
  • the first preset user information set may be preset in the terminal device according to the user's operation.
  • the information of one or more contacts of the social application in the terminal device ie, user information, It may be set to a first preset user information set in the form of a social application number.
  • Step 205 Match the source user information of the communication data with the user information in the first preset user information set. When the matching fails, perform step 206 and step 207. When the matching is successful, perform step 208 and step 209.
  • the first information characterizing the communication data bearer is generated when the point-to-point communication (that is, the communication in which only two users participate), in the case of a social application, for example, when the social application
  • the message (corresponding to the first information) is a peer-to-peer message
  • the characterizing the social application message only needs to be sent to one user.
  • the source user information of the social application message and the user information in the first preset user information set may be pre-set in the terminal device to match, indicating that the first information needs to be prompted by the second prompting manner to ensure the security of the first information presentation, and the subsequent steps will be described.
  • step 206 the first information prompting manner is selected as the target information prompting manner.
  • Step 207 Present the first information in the first display interface.
  • Step 207 is a process when the first information prompting mode is used as the target information prompting mode, that is, the first information is directly presented on the first display interface, so that the user can obtain the first information in time;
  • the first display interface here can be the terminal device. Full screen window or non-full screen window.
  • Step 208 selecting a second information prompting manner as the target information prompting manner.
  • Step 209 presenting the second information and the source information on the second display interface.
  • Step 209 is a process of prompting the first information in the second information prompting manner, that is, receiving the first information by using the second information different from the first information; for example, when the first information is bank account information, the corresponding
  • the second information may be any information that is different from the first information, such as "hello".
  • the second information may be preset in the terminal device, or may be randomly generated); this achieves the effect of prompting the terminal device user to receive the first information sent by the user in the first preset user set, and does not directly The first information is presented to prevent the first information from being leaked during the presentation.
  • first display interface and the second display interface are both display interfaces of the presentation information of the same application, except that the first display interface is used to directly present the first information, and the second display interface is presented by the user.
  • the second information is presented with the first information, and the first information is presented when the second display interface receives the specific operation, and the subsequent steps will be explained.
  • Step 210 Detect whether a specific operation is received on the second display interface, and if the specific operation is received, perform step 211; otherwise, continue to detect whether a specific operation is received until the second display interface is triggered to be turned off or switched to the background.
  • the specific operation may be a specific touch operation (such as a single touch operation, a multi-touch operation) implemented on the second display interface, or may be a sliding touch specific to a specific track (such as a circle, a triangle, etc.) Control operation.
  • a specific touch operation such as a single touch operation, a multi-touch operation
  • a sliding touch specific to a specific track such as a circle, a triangle, etc.
  • Step 211 presenting the first information on the second display interface.
  • FIG. 2b A schematic diagram of a scenario is shown in FIG. 2b.
  • User A sets the following information corresponding to the social application contact, that is, user B, through the social application setting interface in the first terminal device as shown in FIG. 2b:
  • the information from the user B (which may be identified by the social application number of the user B) is prompted by the second information prompting manner, and the first terminal device is triggered to set the user information of the social application contact B to the first preset user information set;
  • a specific operation is a circular clockwise sliding operation on the second display interface
  • the communication data is parsed.
  • the first terminal device detects user B's user information and The user information in the first user information set matches, so the first message is prompted by the second message prompting manner, the second information from the user B is presented in the second display interface (different from the first information), and the second display interface is displayed.
  • the first information from the user B is presented when a specific operation (the clockwise sliding operation of the circle is circular) is received, so that when the user A does not conveniently view the first information from the user B, the specific operation may not be performed.
  • a terminal device may prompt for unchecked information (for example, prompting an unchecked message in the form of displaying a corner on the social application icon);
  • the wireless accessibility authentication (WiFi) method is used to access the network, and when the corresponding communication data sent by the social application communication server on the network side is parsed, the communication data is parsed.
  • the first information carried in the medium, the communication data source (set to user C, may be identified by the social application number of user C), and the target user information of the communication data (corresponding to user A), the first terminal device detects the user information of user C The user information in the first user information set does not match, so the first message prompting first information is used, and the first information from the user C is presented in the first display interface.
  • This embodiment describes an information processing method, which can be applied to a terminal device. As shown in FIG. 3a, the information processing method described in this embodiment includes the following steps:
  • Step 301 Acquire communication data based on the communication link.
  • the communication link here is a data transmission channel based on the following data connection: Fibre Channel Data connection; Cable data connection; PSTN data connection; IP network connection supported by communication networks such as IEEE 802.3, IEEE802.11b/g/n, POWELINE, CABLE, PSTN; 3GPP, 3GPP2 network.
  • Step 302 parsing the communication data, and obtaining attribute information of the communication data and first information of the communication data bearer.
  • Step 303 Extract source user information and target user information of the communication data from the attribute information.
  • the source user information and the target user information may adopt a unique identifier of the user; for example, when the communication data is social application communication data, the source user information and the target user information may adopt a social application number; the communication data is a mobile phone short message. When communicating data, the source user information and the target user information may use a mobile phone number.
  • Step 304 Acquire a first preset user information set, where the first preset user information set includes information of at least one user.
  • This embodiment discusses the case where the target user information characterizes that the communication data has only one target user.
  • Step 305 Match the source user information of the communication data with the user information in the first preset user information set. When the matching fails, perform step 306 and step 307. When the matching is successful, perform step 308 and step 309.
  • Step 306 selecting the first information prompting manner as the target information prompting manner.
  • Step 307 presenting the first information in the first display interface.
  • Step 307 is a process when the first information prompting mode is used as the target information prompting mode, that is, the first information is directly presented on the first display interface, so that the user can obtain the first information in time; the first display interface here can be in the terminal device. Full screen window or non-full screen window.
  • Step 308 selecting a second information prompting manner as the target information prompting manner.
  • Step 309 presenting the second information and the source information on the second display interface.
  • Step 309 is a process of prompting the first information in a second information prompt manner, that is, receiving the first information by using a second information different from the first information; for example, when the first information is bank account information,
  • the corresponding second information may be any information different from the first information, such as “hello”; this reaches the prompting the terminal device user to receive the first information sent by the user in the first preset user set, and does not The effect of directly presenting the first information.
  • Step 310 Present a combination of specific identifiers on the second display interface, and obtain an operation based on the combination of the specific identifiers.
  • step 311 it is detected whether the sequence of the identifier triggered by the operation matches the preset identification sequence. If yes, step 312 is performed; otherwise, the detection is continued until the second display interface is triggered to be turned off or switched to the background.
  • nine identification sequences may be presented in the form of a nine-square grid (the identifier may be identified by a number or a letter, etc.), and when the operation-triggered identification sequence matches the preset identification sequence (ie, the preset password), the process proceeds to the step. 312 to present the first information; by means of password verification, the security of presenting the first information is guaranteed.
  • the preset identification sequence ie, the preset password
  • Steps 310 and 311 are operations for detecting an operation received on the second display interface and performing an authentication.
  • the identification sequence of the operation performed by the user of the terminal device matches the preset identification sequence (a password composed of a proportional number or a letter)
  • the representation is performed.
  • the authentication can be performed to present the first information; in actual application, step 310 and step 311 can be replaced by the following steps: detecting whether a specific operation is received on the second display interface, and if a specific operation is received, performing step 312; otherwise, Continue to detect whether a specific operation is received until the second display interface is triggered to be turned off or switched to the background.
  • the specific operation here may be a specific touch operation (such as single touch operation, multi-touch operation) implemented on the second display interface. Operation) can also be a sliding touch operation with a specific track (such as a circle, a triangle, etc.).
  • Step 312 presenting the first information on the second display interface.
  • the information from the user B (which may be identified by the social application number of the user B) is prompted by the second information prompting manner, and the first terminal device is triggered to set the user information of the social application user B to the first preset user information set;
  • the second information used in the second information prompting manner, when the user A does not set the second information, the second information may be randomly generated;
  • a specific operation is the implementation of the second display interface of the identification sequence (may be a digital nine-square grid) implementation of the sliding operation, and the sliding operation triggered by the corresponding password 1235789;
  • the communication data is parsed.
  • the first information the communication data source user information (set to user B, may be identified by user B's social application number), and the target user information of the communication data (ie, user A)
  • the first terminal device detects the user B user
  • the information matches the user information in the first user information set, so the first message is prompted by the second message prompting manner, and the second information from the user B is presented in the second display interface (different from the first information) and the identification sequence is formed.
  • the interface is unlocked, and the first information from the user B is presented when the second display interface receives the specific operation (the track of the specific operation passes the identifier 1235789), so that the user may not implement the first information when the user is inconvenient to view the first information from the user B.
  • the first terminal device may prompt for unchecked information (for example, using a form prompt on the social application icon) Unchecked messages);
  • the social application When the social application is run in the first terminal device held by the user A, and the network is accessed through the WiFi, When the corresponding communication data sent by the social application communication server on the network side is parsed, the first information and the communication data source user information carried in the communication data are parsed (set as user C, the social application number identifier of user C may be used), and The target user information of the communication data (that is, the user A may be identified by the social application number of the user A), and the first terminal device detects that the user information of the user C does not match the user information in the first user information set, and therefore uses the first A message prompting mode prompts the first information, and the first information from the user C is presented on the first display interface.
  • This embodiment describes an information processing method, which can be applied to a terminal device. As shown in FIG. 4a, the information processing method described in this embodiment includes the following steps:
  • Step 401 Acquire communication data based on the communication link.
  • the communication link here is a data transmission channel based on the following data connection: Fibre Channel data connection; Cable data connection; PSTN data connection; IEEE 802.3, IEEE802.11b/g/n based network connection, POWELINE, CABLE, PSTN; 3GPP IP network connection supported by communication networks such as 3GPP2 networks.
  • Step 402 Parse the communication data, and obtain attribute information of the communication data and first information of the communication data bearer.
  • Step 403 extracting source user information and target user information of the communication data from the attribute information.
  • Step 404 Acquire a first preset user information set, where the first preset user information set includes information of at least one user.
  • This embodiment discusses the case where the target user information characterizes that the communication data has at least two target users.
  • Step 405 Match the source user information of the communication data and the target user information to the user information in the first preset user information set respectively.
  • step 406 and step 407 when the matching is successful (that is, the source user information and Target user information and first preset user information Steps 408 and 409 are performed when the user information in the set matches.
  • the first preset user set in this embodiment includes the user information of the application corresponding to the terminal device that receives the communication data by default; and the first terminal device that is held by the user A as an example, the first preset user that is stored by the first terminal device
  • the user information of user A is included by default in the collection;
  • the first information characterization of the communication data bearer is generated when the multi-point communication is performed, and the first terminal device held by the user A runs the social application as an example, when the first When the social application message (corresponding to the first information) received by the terminal device is a group message, the message needs to be correspondingly sent to each user except the message sending user in the group. If the user information of the first terminal device corresponding to the user (that is, the user A) matches the user information in the first preset user set, the second information prompting mode first information is required to ensure that the first information is presented.
  • the information prompting method prompts the first information, and the first information prompting manner prompts the first information, that is, directly presents the first information, and the subsequent steps will be described.
  • step 406 the first information prompting manner is selected as the target information prompting manner.
  • Step 407 presenting the first information in the first display interface.
  • the first information display mode is used as the target information presentation mode, that is, the first information is directly displayed on the first display interface, so that the user can obtain the first information in time;
  • the first display interface here can be the terminal device. Full screen window or non-full screen window.
  • step 408 the second information prompting mode is selected as the target information prompting manner.
  • Step 409 presenting the second information and the source information on the second display interface.
  • Step 409 is to perform the process of prompting the first information in the second information prompting manner, that is, to receive the first information by using the second information different from the first information; for example, when the first information is bank account information,
  • the corresponding second information may be any of "nothing" and the like different from the first information. Information; this achieves the effect of prompting the terminal device user to receive the first information sent by the user in the first preset user set, and does not directly present the first information.
  • Step 410 Present a combination of specific identifiers on the second display interface, and obtain an operation based on the combination of the specific identifiers.
  • step 411 it is detected whether the sequence of the identifier triggered by the operation matches the preset identification sequence. If yes, step 412 is performed; otherwise, the detection is continued until the second display interface is triggered to be closed or switched to the background.
  • nine identification sequences may be presented in the form of a nine-square grid (the identifier may be identified by a number or a letter, etc.), and when the operation-triggered identification sequence matches the preset identification sequence (ie, the preset password), the process proceeds to the step. 412 to present the first information; by means of password verification, the security of presenting the first information is guaranteed.
  • the preset identification sequence ie, the preset password
  • Step 412 presenting the first information on the second display interface.
  • Steps 410 and 411 are operations for detecting an operation received on the second display interface and performing authentication.
  • the identification sequence of the operation performed by the user of the terminal device matches the preset identification sequence (a password composed of a proportional number or a letter)
  • the representation is performed.
  • the authentication can be performed to present the first information; in actual application, step 410 and step 411 can be replaced with the following steps: detecting whether a specific operation is received on the second display interface, and if a specific operation is received, performing step 412; otherwise, Continue to detect whether a specific operation is received until the second display interface is triggered to be turned off or switched to the background.
  • the specific operation here may be a specific touch operation (such as single touch operation, multi-touch operation) implemented on the second display interface. Operation), it can also be a sliding touch operation with a specific track (such as a circle, a triangle, etc.).
  • the second information used in the second information prompting manner, when the user A does not set the second information, the second information may be randomly generated;
  • a specific operation is the implementation of the second display interface of the identification sequence (may be a digital nine-square grid) implementation of the sliding operation, and the sliding operation triggered by the corresponding password 1235789;
  • the communication data is parsed.
  • the first information, the source user information of the communication data (set as user B, may be identified by the social application number of user B), and the target user information of the communication data (set to user A and user C, and may use user A, user C
  • the first terminal device detects the source user information of the communication data (the user information of the user B) and the target user information (that is, the user information of the user A and the user C) are both in the first user information set.
  • the user information is matched, so the first message is prompted by the second message prompting manner, and the second information (which is different from the first information) from the user B and the unlocking interface formed by the identification sequence are presented on the second display interface, and the second display interface is displayed.
  • Presenting the first information from User B when receiving a specific operation (the trajectory of the specific operation passes the identification 1235789), thus, when User A is inconvenient to view from User B Specific operation may not be performed when the first information, while the first terminal can not view the information suggestive (for example, by displaying a corner on the social application icon to indicate that there is an unchecked message);
  • Source user information (set to user B, can be identified by user B's social application number), target user information of communication data (set to user A and user D, user A, user D's social application number identification),
  • a terminal device detects that the source user information (user B information of the user B) and the target user information (that is, the user information of the user A and the user D) of the communication data are not all matched with the user information in the first user information set, and thus
  • the first message prompting mode prompts the first information, and presents the first information from the user B in the first display interface, so that the user A can obtain the information in time.
  • This embodiment describes an information processing method, which can be applied to a terminal device. As shown in FIG. 5, the information processing method described in this embodiment includes the following steps:
  • Step 501 Acquire communication data based on the communication link.
  • the communication link here is a data transmission channel based on the following data connection: Fibre Channel data connection; Cable data connection; PSTN data connection; network connection based on IEEE 802.3, IEEE 802.11b/g/n, POWELINE, cable CABLE, PSTN; IP network connection supported by communication networks such as 3GPP and 3GPP2 networks.
  • Step 502 parsing the communication data, obtaining attribute information of the communication data, and first information of the communication data bearer.
  • Step 503 extracting source user information and target user information of the communication data from the attribute information.
  • the source user information and the target user information may adopt a unique identifier of the user; for example, when the communication data is social application communication data, the source user information and the target user information may adopt a social application number; the communication data is a mobile phone short message. Communication data, The source user information and the target user information can be used as a mobile phone number.
  • Step 504 Determine the number of target users of the communication data. When the target user information indicates that the communication data has only one target user, perform steps 505 and 506. When the target user information indicates that the communication data has at least two target users, perform steps. 507 and step 508.
  • the first information characterizing the communication data bearer is generated when the peer-to-peer communication is performed, for example, in the social application, when the social application message (corresponding to the first information) is a peer-to-peer message, Characterizing the message only needs to be sent to a user.
  • the source user information of the social application message and the user information in the first preset user information set (the user information in the first preset user information set may be preset in the terminal)
  • the device is matched, indicating that the second prompt mode prompt is needed for the first information to ensure the security of the first information presentation, and the subsequent steps will be described;
  • the first information characterizing the communication data bearer is generated when the multi-point communication is performed, for example, the social application message (corresponding to the first information) is a group.
  • the message needs to be sent to each user in the group.
  • the second information prompt is not needed.
  • the mode prompts the first information, that is to say, in the embodiment, the first prompt information prompting manner is adopted for the group message, that is, the group message is directly presented.
  • Step 505 Acquire a first preset user information set, where the first preset user information set includes information of at least one user.
  • the first preset user set in this embodiment includes the user information of the application corresponding to the terminal device that receives the communication data by default; and the first terminal device that is held by the user A as an example, the first preset user that is stored by the first terminal device
  • the user information of user A is included by default in the collection.
  • Step 506 Match source user information of the communication data with user information in the first preset user information set, and perform step 507 and step 508 when the matching fails, when the matching is successful Line 509.
  • the first information characterizing the communication data bearer is generated when the peer-to-peer communication is performed, for example, in the social application, when the social application message (corresponding to the first information) is a peer-to-peer message, The characterization of the social application message only needs to be sent to one user.
  • the source user information of the social application message matches the user information in the first preset user information set, it indicates that the second prompt mode is required to prompt the first information to ensure the first
  • the security of an information presentation will be explained in the next steps.
  • step 507 the first information prompting manner is selected as the target information prompting manner.
  • Step 508 presenting the first information in the first display interface.
  • Step 508 is a process when the first information prompting mode is used as the target information prompting mode, that is, the first information is directly presented on the first display interface, so that the user can obtain the first information in time; the first display interface here can be in the terminal device. Full screen window or non-full screen window.
  • step 509 the second information prompting mode is selected as the target information prompting manner.
  • Step 510 Present second information and source information on the second display interface.
  • Step 510 is to perform the process of prompting the first information in the second information prompting manner, that is, to receive the first information by using the second information different from the first information; for example, when the first information is bank account information, the corresponding The second information may be any information that is different from the first information, such as “hello”; this achieves the effect of prompting the terminal device user to receive the first information sent by the user in the first preset user set, and does not The first information is directly presented, avoiding the problem that the first information is leaked when the first information is directly presented.
  • Step 511 Present a combination of specific identifiers on the second display interface, and obtain an operation based on the combination of the specific identifiers.
  • Step 512 It is detected whether the sequence of the identifier triggered by the operation matches the preset identification sequence. If yes, step 513 is performed; otherwise, the detection is continued until the second display interface is triggered to be turned off or switched to the background.
  • nine identification sequences may be presented in the form of a nine-square grid (the identifier may be identified by a number or a letter, etc.), and when the operation-triggered identification sequence matches the preset identification sequence (ie, the preset password), the process proceeds to the step. 512 to present the first information; by means of password verification, the security of presenting the first information is guaranteed.
  • the preset identification sequence ie, the preset password
  • Steps 511 and 512 are operations for detecting an operation received on the second display interface and performing authentication.
  • the identification sequence of the operation performed by the user of the terminal device matches the preset identification sequence (a password composed of a proportional number or a letter)
  • the representation is performed.
  • the first information can be presented by the authentication; in actual application, step 511 and step 512 can be replaced with the following steps: detecting whether a specific operation is received on the second display interface, and if a specific operation is received, performing step 513; otherwise, Continue to detect whether a specific operation is received until the second display interface is triggered to be turned off or switched to the background.
  • the specific operation here may be a specific touch operation (such as single touch operation, multi-touch operation) implemented on the second display interface. Operation), it can also be a sliding touch operation with a specific track (such as a circle, a triangle, etc.).
  • step 513 the first information is presented on the second display interface.
  • This embodiment describes an information processing method, which can be applied to a terminal device.
  • the terminal device prompts the processing of the first information by using the second information prompting manner.
  • the processing method includes the following steps:
  • Step 601 The terminal device presents the second information on the second display interface, and presents the first information when the second display interface receives the specific operation.
  • the first information is information carried by the communication data received by the terminal device, and the second information is any information different from the first information (the actual application may be set in the terminal device in advance); the specific operation may be implemented in the second display interface.
  • Specific touch operation (such as single touch operation or multi-touch
  • the control operation may also be an operation of triggering the identifier received after the identification sequence is displayed on the second display interface, and the sequence of the identifier triggered by the received operation matches the preset identification sequence (the identifier may be a character such as a number or a letter) ).
  • Step 602 Switch display from the second display interface to the third display interface.
  • Step 602 is a process performed when the user controls the operation of the display interface.
  • the user may switch to the display interface of the other application after viewing the first information presented by the social application display interface (corresponding to the second display interface) (corresponding to the third display)
  • An interface that is, a display interface not used for displaying the first information and the second information, such as a display interface of the multimedia application; wherein the second display interface and the third display interface may be in the form of a full screen window or a non-full screen window,
  • the embodiment is not limited.
  • Step 603 when the second display interface is switched again from the third display interface, detecting whether a specific operation is received on the second display interface, if yes, executing step 604; otherwise, continuing to detect until the second display interface is triggered to be closed. Or switch to the background.
  • Step 604 presenting the first information on the second display interface.
  • the security of the first information presented by the second display interface needs to be ensured, after the terminal device presents the first information on the second display interface, if the subsequent second display interface is switched to the background (for example, by the third display interface) Covering or being turned off), the user needs to perform a specific operation on the second display interface to verify the legitimacy of the user and ensure information security.
  • FIG. 6b A scenario diagram is shown in Figure 6b.
  • a social application including QQ and WeChat
  • the network accesses the network through WiFi, and the corresponding communication data sent by the QQ communication server on the network side is parsed.
  • the first information carried in the communication data, the source user of the communication data is the user B, and when the first message sent by the user B is prompted by the second message prompting manner, the second information from the user B is presented on the second display interface (and
  • the first information is different, the second information may be preset or may be randomly generated, so that the user A receives the message sent by the user B in time, and receives the specificity in the combination of presenting the specific identifier (in the form of the digital nine-square grid in FIG. 6b).
  • the operation (the identifier of the operation track of the operation corresponds to the preset identification sequence) presents the first information;
  • the first terminal device When the user A triggers the first terminal device to switch to display the third display interface (such as the desktop, the interface different from the social application), the first terminal device switches the second display interface to the background display (at this time, the second display interface is third.
  • the display interface is closed or the second display interface can be closed; when the user triggers to switch the display of the second display interface again, the second display interface prompts the first information to ensure the security of the information presentation.
  • the second display interface still presents a combination of specific identifiers (in the form of a digital nine-square grid), a specific operation is received (the identifier of the operation track of the operation corresponds to a preset identification sequence) First information.
  • This embodiment describes an information processing method, which can be applied to a terminal device.
  • the terminal device prompts the processing of the first information by using the second information prompting manner.
  • the information recorded in this embodiment is as shown in FIG. 7a.
  • the processing method includes the following steps:
  • Step 701 The terminal device presents the second information on the second display interface, and presents the first information when the second display interface receives the specific operation.
  • the first information is the information carried by the communication data received by the terminal device.
  • the terminal device uses the second information prompt mode that is different from the first information prompting method (presenting the first information on the first display interface).
  • An information, that is, a second information is presented on the second display interface, and the first information is presented when the second display interface receives the specific operation; wherein the specific condition may be one of the following conditions:
  • the target user information parsed from the communication data represents that the communication data has only one target user, and the source user information parsed from the communication data matches the user information in the first preset user information set;
  • the target user information parsed from the communication data represents that the communication data has at least two items The target user, and the source user information and the target user information parsed from the communication data respectively match the user information in the first preset user information set.
  • the second information is any information that is different from the first information (the actual application may be set in the terminal device in advance); the specific operation may be a specific touch operation (such as a single touch operation or multiple points) implemented on the second display interface.
  • the touch operation may also be an operation of triggering the identifier received after the identification sequence is displayed on the second display interface, and the sequence of the identifier triggered by the received operation matches the preset identification sequence (the identifier may be a number, a letter, etc.) character).
  • Step 702 Acquire a second preset user information set, where the second preset user information set includes at least one user information.
  • the second preset user information may be the same as the first preset user information set, or may be different (two different sets of user information may be separately set in the terminal device).
  • Step 703 Match the source user information of the communication data with the user information in the second preset user information set, and when the matching is successful, perform step 704; otherwise, stop the processing.
  • Step 704 Upload the information record presented by the second display interface to the information storage server by using the source user information of the communication data as an index.
  • the information record is used for the communication server to respond to the information record acquisition request of the terminal device, for example, when the user can hold the message in the second display interface of the first terminal device (for example, the chat interface with the specific user in the social application).
  • the record is uploaded to the information storage server by using the source user information (the sender of the corresponding message in the social application); subsequently, the user can hold the second terminal device to request the information record from the information storage server (for example, requesting information storage in the social application)
  • the server roams the message record to the second terminal device, and the second terminal device can decide the legality of the user according to whether the specific operation is received when requesting the roaming information record to the information storage server.
  • the user A sets the following information corresponding to the social application contact, that is, the user B, through the social application setting interface in the first terminal device:
  • the second information prompting mode is used to trigger the first terminal device to set the user information of the user A and the user C to the first preset user information set (the default is User A's user message setting and the first preset user information set);
  • the second information used in the second information prompting manner, when the user A does not set the second information, the second information may be randomly generated;
  • a specific operation is the implementation of the second display interface of the identification sequence (may be a digital nine-square grid) implementation of the sliding operation, and the sliding operation triggered by the corresponding password 1235789;
  • FIG. 7c A schematic diagram of a scenario is shown in FIG. 7c.
  • the communication data is parsed.
  • the first information carried in the first information the source user information of the communication data (set as user B, may be identified by the social application number of user B), the target user information of the communication data (user A), and the first terminal device detects the communication data.
  • the source user information (the user information of the user B) matches the user information in the first user information set, so the first message is prompted by the second message prompting manner, and the second information from the user B is presented in the second display interface (with the first The information is different) and the unlocking interface formed by the identification sequence, and the first information from the user B is presented when the second display interface receives the specific operation (the track of the specific operation passes the identification 1235789), so that when the user A is inconvenient to view from
  • the first information of the user B may not perform a specific operation, and the first terminal device may prompt that the information is not viewed (for example, Application icon is displayed on the post subject in the form of suggestive corner unchecked messages);
  • the first terminal device uploads the information record presented by the second display interface to the information storage server, and when the user A holds the second terminal device to run the social application, requests the information storage server to When the information of the user B is recorded, the information storage server may send the information record of the corresponding user B to the second terminal device.
  • the second terminal device The user A may perform the validity verification corresponding to the specific operation set by the user A at the first terminal device (the information of the specific operation may be transmitted by the first terminal device to the second terminal device through the communication server).
  • This embodiment describes an information processing method, which can be applied to a terminal device.
  • the terminal device prompts the processing of the first information by using a second information prompting manner.
  • the processing method includes the following steps:
  • Step 801 The terminal device presents the second information on the second display interface, and presents the first information when the second display interface receives the specific operation.
  • the first information is the information carried by the communication data received by the terminal device.
  • the terminal device uses the second information prompt mode that is different from the first information prompting method (presenting the first information on the first display interface).
  • An information, that is, a second information is presented on the second display interface, and the first information is presented when the second display interface receives the specific operation; wherein the specific condition may be one of the following conditions:
  • the target user information parsed from the communication data represents that the communication data has only one target user, and the source user information parsed from the communication data matches the user information in the first preset user information set;
  • the target user information parsed from the communication data indicates that the communication data has at least two target users, and the source user information and the target user information parsed from the communication data respectively match the user information in the first preset user information set. .
  • the second information is any information that is different from the first information (the actual application may be set in the terminal device in advance); the specific operation may be a specific touch operation (such as a single touch operation or multiple points) implemented on the second display interface. Touch operation), or after displaying the identification sequence on the second display interface
  • the received trigger identification operation, and the sequence of the received operation triggered identifier matches the preset identification sequence (the identifier may be a character such as a number or a letter).
  • Step 802 Acquire a second preset user information set, where the second preset user information set includes at least one user information.
  • the second preset user information may be the same as the first preset user information set, or may be different (two different sets of user information may be separately set in the terminal device);
  • step 803 the source user information of the communication data is matched with the user information in the second preset user information set.
  • step 804 is performed; otherwise, the processing is stopped.
  • Step 804 Upload the information record presented by the second display interface to the information storage server by using the source user information of the communication data as an index.
  • the information record is used for the information storage server to respond to the information record acquisition request of the other terminal device, for example, when the user can hold the message in the second display interface of the first terminal device (for example, the chat interface with the specific user in the social application)
  • the record is uploaded to the information storage server by using the source user information (the sender of the corresponding message in the social application); subsequently, the user A can hold the second terminal device to request the information record from the information storage server (for example, requesting communication in the social application)
  • the server roams the message record to the second terminal device, and the second terminal device requests the information storage server to roam the information record to determine the legitimacy of the user according to whether the specific operation is received.
  • Step 805 Receive an instruction to delete an information record corresponding to the specific source user information.
  • user A can trigger the deletion of the chat record with the specific contact in the chat record management interface of the social application.
  • Step 806 The trigger information storage server and the target terminal device delete the stored information record corresponding to the specific source user information.
  • the first terminal device may hold the information to the user A through the information storage server.
  • the second terminal device sends the information record deletion command to realize the deletion; the information record stored by the information storage server and the target terminal device (corresponding to the second terminal device) is deleted, thereby avoiding the risk that the information record corresponding to the specific source user information is leaked.
  • This embodiment describes a computer readable medium, which may be a ROM (eg, a read only memory, a FLASH memory, a transfer device, etc.), a magnetic storage medium (eg, a magnetic tape, a disk drive, etc.), an optical storage medium (eg, a CD- ROM, DVD-ROM, paper card, paper tape, etc.) and other well-known types of program memory; the computer readable medium storing computer executable instructions that, when executed, cause at least one processor to execute including the following Operation:
  • Acquiring communication data based on the communication link parsing the communication data, obtaining attribute information of the communication data, and first information of the communication data bearer; selecting a target in at least two information prompting manners based on the attribute information And the information prompting manner; the first information carried by the communication data is prompted by the target information prompting manner; wherein the first information is presented in the first display interface when the first information is prompted by the first information prompting manner
  • the source information presents the second information and the source information on the second display interface when the first information is prompted by the second information prompting manner, and presents the first operation when the second display interface receives the specific operation a message.
  • the instruction when executed, causing at least one processor to perform an operation of: presenting a combination of specific identifiers on the second display interface, acquiring an operation based on the combination of the specific identifiers; parsing the operations Whether the sequence of the triggered identifier matches the preset identification sequence, and the first information is presented on the display interface when matched.
  • the instruction when executed, causing at least one processor to perform an operation of: extracting source user information and target user information of the communication data from the attribute information; acquiring a first preset user a set of information, the first preset user information set includes information of at least one user; and when the target user information indicates that the communication data has only one target user, the source user information of the communication data is compared with the first a preset user information set The user information is matched, and when the matching is successful, the second information prompting manner is selected as the target information prompting manner, and when the matching fails, the first information prompting manner is selected as the target information prompting manner.
  • the at least one processor when executing the instruction, causing the at least one processor to perform an operation of: extracting source user information and target user information of the communication data from the attribute information; when the target user information When the communication data has at least two target users, the source user information and the target user information of the communication data are respectively matched with the user information in the first preset user information set, and when the matching is successful, the selected The second information prompting manner is used as the target information prompting manner, and when the matching fails, the first information prompting manner is selected as the target prompting manner.
  • the instruction when executed, causing at least one processor to perform an operation of: extracting target user information of the communication data from the attribute information; and when the target user information characterizes the communication
  • the first information prompting manner is selected as the target prompting manner.
  • the instruction when executed, causing at least one processor to perform an operation including: switching a display from the second display interface to a third display interface, and switching the display again from the third display interface
  • the second display interface when executed, causing at least one processor to perform an operation including: switching a display from the second display interface to a third display interface, and switching the display again from the third display interface
  • the third display interface is configured to display information different from the first information and the second information.
  • the at least one processor when the executing the instruction, causing the at least one processor to perform the operations of: acquiring the second preset user information set when the first information is prompted by the second information prompting manner,
  • the second preset user information set includes at least one user information
  • the information of the user information is matched, and the information record presented by the second display interface is uploaded to the information storage server by using the source user information of the communication data as an index; wherein the information record is configured to respond to the information record of the terminal device. Get the request.
  • the at least one processor when executed, causing the at least one processor to perform an operation of: triggering the information record corresponding to the specific source user information when the information record stored by the first electronic device is deleted
  • the information storage server and the second electronic device delete the stored information record corresponding to the specific source user information.
  • This embodiment describes an information processing apparatus that can be applied to the terminal device described in the foregoing embodiment to ensure security when the terminal device presents information.
  • the information processing apparatus according to the embodiment includes:
  • the communication unit 10 is configured to acquire communication data based on the communication link
  • the parsing unit 20 is configured to parse the communication data to obtain attribute information of the communication data and first information of the communication data bearer;
  • the selecting unit 30 is configured to select a target information prompting manner in at least two information prompting manners based on the attribute information;
  • the prompting unit 40 is configured to prompt the first information of the communication data bearer in the target information prompting manner
  • the prompting unit 40 includes (not shown):
  • the presentation module 401 is configured to present a combination of specific identifiers on the second display interface, and obtain an operation based on the combination of the specific identifiers;
  • the parsing module 402 (coupled with the presentation module 401) is configured to parse whether the sequence of the identifier triggered by the operation matches the preset identification sequence, and when the matching is performed, triggering the rendering module to present the first information on the display interface .
  • the selecting unit 30 includes (not shown):
  • the first extraction module 301 is configured to extract source user information and target user information of the communication data from the attribute information;
  • the obtaining module 302 is coupled to the first extraction module 301, configured to acquire a first preset user information set, where the first preset user information set includes information of at least one user;
  • the first matching module 303 (coupled with the obtaining module 302) is configured to: when the target user information indicates that the communication data has only one target user, source information of the communication data and the first preset user The user information in the information set is matched. When the matching is successful, the second information prompting manner is selected as the target information prompting manner. When the matching fails, the first information prompting manner is selected as the target information prompting manner.
  • the selecting unit 30 includes (not shown):
  • the second extraction module 304 is configured to extract source user information and target user information of the communication data from the attribute information;
  • the second matching module 305 (coupled with the second extraction module 304) is configured to: when the target user information indicates that the communication data has at least two target users, respectively, the source user information and the target user information of the communication data are respectively Matching with the user information in the first preset user information set, when the matching is successful, selecting the second information prompting manner as the target information prompting manner, and when the matching fails, selecting the first information prompting manner as the The target prompt method.
  • the selecting unit 30 includes (not shown):
  • the third extraction module 306 is configured to extract target user information of the communication data from the attribute information
  • a selection module 307 (coupled to the third extraction module 306) configured to be the target user letter
  • the first information prompting manner is selected as the target prompting manner.
  • the prompting unit 40 is further configured to: switch from the second display interface to the third display interface, and switch to display the second display interface from the third display interface to detect whether The second display interface receives the specific operation, and if received, presents the first information on the second display interface; wherein the third display interface is configured to display the first information, and The second information is different information.
  • the information processing apparatus further includes:
  • the obtaining unit 50 is configured to acquire a second preset user information set when the prompting unit 40 prompts the first information in the second information prompting manner, where the second preset user information set includes at least one user information;
  • the matching unit 60 is configured to match the source user information of the communication data with the user information in the second preset user information set, and trigger the communication unit 10 to present the second display interface when the matching is successful.
  • the information record is uploaded to the information storage server by using the source user information of the communication data as an index; wherein the information record is configured to respond to the information record acquisition request of the terminal device.
  • the information processing apparatus further includes:
  • the information recording unit 70 is configured to trigger the communication server and the second electronic device to delete the stored information when the information record corresponding to the specific source user information is deleted in the information record stored by the first electronic device The information record corresponding to the specific source user information.
  • the communication unit 10 can be implemented by an integrated circuit chip in the information processing device that supports the corresponding communication link.
  • the communication unit 10 can be a WiFi radio chip and WiFi.
  • the antenna implementation; the parsing unit 20, the selecting unit 30, the prompting unit 40, the obtaining unit 50, and the matching unit 60 may be a microprocessor (MCU), a logic programmable gate array (FPGA) or an application specific integrated circuit (ASIC) in the information processing device.
  • MCU microprocessor
  • FPGA logic programmable gate array
  • ASIC application specific integrated circuit
  • the information recording unit 70 can be implemented by a non-volatile storage medium (such as a flash memory) in the information processing apparatus in combination with the above-described MCU, FPGA or ASIC.
  • the first information prompting manner may be used to prompt the first information, that is, the first information is displayed in the display interface.
  • the information and the source information are convenient for the user to obtain the information in time; when the attribute information of the communication data indicates that the first information carried by the communication data has high privacy (that is, the first information is inconvenient to be known by others), the second information prompting manner may be adopted.
  • the first information is prompted, that is, the second information (different from the first information) and the source information are presented on the display interface, and the first information is presented when the display interface receives the specific operation; that is, the second information is used to prompt the reception. Going to the first information instead of directly presenting the first information, which avoids the situation that directly presenting the first information causes the first information to be stolen, thereby effectively securing the information;
  • the operation input by the user on the display interface is verified (whether it is a preset specific operation), that is, the security verification of the first information is realized, and further protection is provided.
  • the target user (one or more) of the communication data and the target user are users in the preset user set
  • the users corresponding to the dual-issue (or multi-party) communication and participating in the communication are all in the preset user information set.
  • the scenario of the user the first information carried by the communication data is presented in a second information prompt manner to ensure the security of the information presentation;
  • the source user of the communication data is the user information in the preset user information set, and the number of the target users of the communication data is greater than or equal to 2, the user in the corresponding preset user information set participates in the multi-party communication, and there is no need at this time.
  • the first information carried by the communication data is prompted by the second information prompting manner, but the first information is directly presented in the display interface, so that the user can obtain the information in time;
  • the first information presented by the second display interface may be processed according to whether the source user of the communication data is the second preset user set, when the source user of the communication data matches the user information in the second preset user set.
  • the first information representing the bearer of the communication data may be uploaded to the information storage server for storage; if the data is not matched, the first information representing the bearer of the communication data is highly private, so the first information is not uploaded to the information storage server for storage, and the information is enhanced. safety;
  • the first terminal device When the first information displayed by the second display interface of the first terminal device is roamed to the second terminal device, if the subsequent first terminal device is triggered to delete the first information, the first terminal device will pass the information storage server to the first The second terminal device sends an instruction to delete the message record, so that other terminal devices still store the message record, and the information is secure.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage medium includes: a mobile storage device, a random access memory (RAM), a read-only memory (ROM), a magnetic disk, or an optical disk.
  • RAM random access memory
  • ROM read-only memory
  • magnetic disk or an optical disk.
  • optical disk A medium that can store program code.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product, which is stored in a storage medium and includes a plurality of instructions for making
  • a computer device which may be a personal computer, server, or network device, etc.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a RAM, a ROM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种信息处理方法及装置、计算机可读介质;方法包括:基于通信链路获取通信数据(101);解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息(102);基于属性信息在至少两个信息提示方式中选定目标信息提示方式(103);以目标信息提示方式提示通信数据承载的第一信息(104);其中,以第一信息提示方式提示第一信息时在第一显示界面中呈现第一信息以及来源信息,以第二信息提示方式提示第一信息时在第二显示界面呈现第二信息以及来源信息,并在第二显示界面接收到特定操作时呈现第一信息。该方法能够在呈现信息的过程中保障信息安全、避免信息被恶意窃取。

Description

信息处理方法及装置、计算机可读介质 技术领域
本发明涉及通信领域的互联网技术,尤其涉及一种信息处理方法及装置、计算机可读介质。
背景技术
伴随互联网的发展,通信应用(如社交应用、网络电话应用、以及基于互联网的以通过互联网通信的方式支持用户之间的通信,成为主流的通信方式,用户在一些情况下会通过通信应用发送涉及用户个人隐私的信息(如银行账号、密码等),这样,如果通信过程中的数据被截取将会度对用户的个人信息造成侵犯,甚至会导致用户的生命、财产损失。
相关技术通常是对承载信息的通信数据在传输过程中进行加密,并在信息传输至目标终端(如手机、平板电脑、笔记本电脑)后解密通信数据以呈现信息,这仅仅能够保证传输过程中通信数据不会被窃取,而对于在目标终端呈现信息的过程中如何保障信息安全、避免信息被恶意窃取,相关技术尚无有效解决方案。
发明内容
本发明实施例提供一种信息处理方法及装置、计算机可读介质,能够在终端呈现信息的过程中保障信息安全、避免信息被恶意窃取。
本发明实施例的技术方案是这样实现的:
第一方面,本发明实施例提供一种信息处理方法,包括:
基于通信链路获取通信数据;
解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一 信息;
基于属性信息在第一信息提示方式和第二信息提示方式至少两个信息提示方式中选定目标信息提示方式,以及,以目标信息提示方式提示通信数据承载的第一信息;
其中,以第一信息提示方式作为目标提示方式提示第一信息时,在第一显示界面中呈现第一信息以及来源信息;以第二信息提示方式作为目标提示方式提示第一信息时,在第二显示界面呈现第二信息以及来源信息,并在第二显示界面接收到特定操作时呈现第一信息。
第二方面,本发明实施例提供一种信息处理装置,信息处理装置包括:
通信单元,配置为基于通信链路获取通信数据;
解析单元,配置为解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息;
选取单元,配置为基于属性信息在第一信息提示方式和第二信息提示方式至少两个信息提示方式中选定目标信息提示方式;
提示单元,配置为以目标信息提示方式提示通信数据承载的第一信息;其中,提示单元以第一信息提示方式作为目标信息提示方式提示第一信息时,在第一显示界面中呈现第一信息以及来源信息;提示单元以第二信息提示方式作为目标信息提示方式提示第一信息时,在第二显示界面呈现第二信息以及来源信息,并在第二显示界面接收到特定操作时呈现第一信息。
第三方面,本发明实施例提供一种计算机可读介质,存储有计算机可执行指令,当执行指令时,引起至少一个处理器执行包括以下的操作:
基于通信链路获取通信数据;解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息;基于属性信息在至少两个信息提示方式中选定目标信息提示方式;以目标信息提示方式提示通信数据承载的第一信息;其中,以第一信息提示方式提示第一信息时在第一显示界面中呈 现第一信息以及来源信息,以第二信息提示方式提示第一信息时在第二显示界面呈现第二信息以及来源信息,并在第二显示界面接收到特定操作时呈现第一信息。
本发明实施例提供的技术方案,基于通信数据的属性信息确定通信数据承载信息也即第一信息的提示方式;采用第二信息提示方式提示第一信息时,与采用第一信息提示方式不同,在显示界面呈现第二信息(与第一信息不同的信息)以及来源信息,并在显示界面接收到特定操作时呈现第一信息,也即是用第二信息来提示接收到第一信息,而非直接呈现第一信息,用户在获取提示第二信息时间接获知接收到第一信息,这就避免了直接呈现第一信息导致第一信息被窥视窃取的情况,有效保障了信息的安全性。
附图说明
图1是本发明实施例中信息处理方法的实现流程图一;
图2a是本发明实施例中信息处理方法的实现流程图二;
图2b是本发明实施例中信息提示方式的设置示意图一;
图2c是本发明实施例中信息提示的场景示意图一;
图3a是本发明实施例中信息处理方法的实现流程图三;
图3b是本发明实施例中信息提示的场景示意图二;
图4a是本发明实施例中信息处理方法的实现流程图四;
图4b是本发明实施例中信息提示的场景示意图三;
图5是本发明实施例中信息处理方法的实现流程图五;
图6a是本发明实施例中信息处理方法的实现流程图六;
图6b是本发明实施例中信息提示的场景示意图四;
图7a是本发明实施例中信息处理方法的实现流程图七;
图7b是本发明实施例中信息提示方式的设置示意图二;
图7c是本发明实施例中信息提示的场景示意图五;
图8a是本发明实施例中信息处理方法的实现流程图八;
图8b是本发明实施例中删除信息记录的场景示意图;
图9a至图9c是本发明实施例中信息处理装置的结构示意图。
具体实施方式
由于相关技术通常是在信息的传输过程中对信息进行加密,并在信息传输至目标终端设备(如手机、平板电脑、笔记本电脑)后解密信息并呈现信息,这仅仅能够保证信息在传输过程中不会被窃取,而对于在目标终端设备呈现信息的过程中,则难以保障信息安全,例如,当用户在公共场合中通过终端设备查看信息时,如何保证信息不会被他人窥视,相关技术尚无有效解决方案;
如图1所示,在步骤101中,当基于通信链路获取到通信数据时,在步骤102中解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息;在步骤103中,基于属性信息在至少两个提示方式中选取一个信息提示方式作为目标提示方式;在步骤104中以目标信息提示方式提示通信数据承载的第一信息;例如,当基于通信数据的属性信息确定通信数据承载的第一信息隐私性不高(如可以被他人得知)时,可以采用第一信息提示方式提示第一信息,也即在第一显示界面中呈现第一信息以及来源信息,便于用户及时获知信息;当通信数据的属性信息表征通信数据承载的第一信息隐私性较高(即第一信息不便被他人得知)时,可以采用第二信息提示方式提示第一信息时,也即在第二显示界面呈现第二信息(与第一信息不同)以及来源信息,并在第二显示界面接收到特定操作时呈现第一信息;也即是用第二信息来提示接收到第一信息,而非直接呈现第一信息,这就避免了直接呈现第一信息导致第一信息被窥视窃取的情况,有效保障了信息的安全性。
以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
实施例一
本实施例记载一种信息处理方法,可以应用于智能手机、平板电脑等终端设备,如图2a所示,本实施例记载的信息处理方法包括以下步骤:
步骤201,基于通信链路获取通信数据。
这里的通信链路为基于以下数据连接的数据传输通道:光纤(Fibre Channel)数据连接;电缆(Cable)数据连接;公共交换电话网络(PSTN)数据连接;基于IEEE 802.3、IEEE 802.11b/g/n的网络连接、电力线网路(POWELINE)、电缆(CABLE)、公共交换电话网络(PSTN,Public Switched Telephone Network);基于第三代合作伙伴计划(3GPP,3rd Generation Partnership Project)、3GPP2网络等通讯网络所支持的IP网络连接。
步骤202,解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息。
步骤203,从属性信息中提取出通信数据的来源用户信息和目标用户信息。
基于通信数据的不同类型,来源用户信息和目标用户信息可以采用用户的唯一标识;例如,通信数据为社交应用通信数据时,来源用户信息和目标用户信息可采用终端设备用于在社交应用中注册的账号(例如号码的方式,以下简称为社交应用号码);通信数据为手机短信的通信数据时,来源用户信息和目标用户信息可采用手机号码。
步骤204,获取第一预设用户信息集合,第一预设用户信息集合包括至少一个用户的信息。
本实施例讨论目标用户信息表征通信数据仅具有一个目标用户的情 况,第一预设用户信息集合可以根据用户的操作在终端设备中预设,以社交应用为例,可以将终端设备中的社交应用的一个或多个联系人的信息(也即用户信息,可以采用社交应用号码的形式)设置为第一预设用户信息集合。
步骤205,将通信数据的来源用户信息与第一预设用户信息集合中的用户信息进行匹配,当匹配失败时执行步骤206和步骤207,当匹配成功时执行步骤208和步骤209。
当目标用户信息表征通信数据仅具有一个目标用户时,表征通信数据承载的第一信息为在点对点通信(也即仅有两个用户参与的通信)时产生,以社交应用为例,当社交应用消息(对应第一信息)为点对点消息时,表征社交应用消息仅需要发送至一个用户,此时,如果社交应用消息的来源用户信息与第一预设用户信息集合中的用户信息(第一预设用户信息集合中的用户信息可以预先设置于终端设备)匹配,表示需要对第一信息采用第二提示方式提示第一信息以保证第一信息呈现的安全性,后续步骤将进行说明。
步骤206,选取第一信息提示方式作为目标信息提示方式。
步骤207,在第一显示界面中呈现第一信息。
步骤207为将第一信息提示方式作为目标信息提示方式时的处理,也即直接在第一显示界面呈现第一信息,便于用户及时获知第一信息;这里的第一显示界面可以为终端设备中的全屏窗口或非全屏窗口。
步骤208,选取第二信息提示方式作为目标信息提示方式。
步骤209,在第二显示界面呈现第二信息以及来源信息。
步骤209为以第二信息提示方式提示第一信息时的处理,也即以区别于第一信息的第二信息提示接收到第一信息;例如,当第一信息为银行账户信息时,对应的第二信息可以为“你好”等区别于第一信息的任意信息 (第二信息可以预设于终端设备中,也可以随机生成);这就达到了提示终端设备用户接收到来自第一预设用户集合中的用户发送的第一信息的效果,且不会直接呈现第一信息,避免第一信息在呈现的过程中被泄露。
需要指出的是,上述的第一显示界面和第二显示界面均为同一应用的呈现信息的显示界面,区别在于,第一显示界面用于直接呈现第一信息,而第二显示界面用户呈现第二信息以提示接收到第一信息,并在第二显示界面接收到特定操作时才呈现第一信息,后续步骤将进行说明。
步骤210,检测是否在第二显示界面接收到特定操作,如果接收到特定操作则执行步骤211;否则,继续检测是否接收到特定操作,直至第二显示界面被触发关闭或切换至后台。
这里,特定操作可以为在第二显示界面实施的特定点触操作(如单点触控操作、多点触控操作),也可以为特定具有特定轨迹(如圆圈、三角形等轨迹)的滑动触控操作。
步骤211,在第二显示界面呈现第一信息。
需要指出的是,本实施例记载的技术方案可以应用于终端设备上任意具有点对点通信功能的应用,后续具体应用场景均以社交应用为例进行说明,但这不应视为对本发明实施例应用场景的限定。
一个场景示意图如图2b所示,用户A通过如图2b所示的第一终端设备中的社交应用设置界面,设置对应社交应用联系人也即用户B的以下信息:
1)来自用户B的信息(可以采用用户B的社交应用号码标识)采用第二信息提示方式提示,触发第一终端设备将社交应用联系人B的用户信息设置于第一预设用户信息集合;
2)第二信息提示方式采用的第二信息,当用户A未设置第二信息时第一终端设备将随机生成第二信息;
3)特定操作,这里设特定操作为在第二显示界面的轨迹为圆形的顺时针滑动操作;
如图2c所示,当用户A持有的第一终端设备中运行社交应用,通过WiFi接入网络,当网络侧的社交应用通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据来源用户信息(设为用户B,可以采用用户B的社交应用号码标识)、以及通信数据目标用户信息(对应用户A),第一终端设备检测到用户B的用户信息与第一用户信息集合中的用户信息匹配,因此采用第二消息提示方式提示第一信息,在第二显示界面呈现来自用户B的第二信息(与第一信息不同),并在第二显示界面接收到特定操作(轨迹为圆形的顺时针滑动操作)时呈现来自用户B的第一信息,这样,当用户A不便于查看来自用户B的第一信息时可以不实施特定操作,此时第一终端设备可以提示有未查看信息(例如采用在社交应用图标上显示角标的形式提示有未查看消息);
当用户A持有的第一终端设备中运行社交应用,通过无线相容性仁者认证(WiFi)方式接入网络,当网络侧的社交应用通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据来源(设为用户C,可以采用用户C的社交应用号码标识)以及通信数据的目标用户信息(对应用户A),第一终端设备检测到用户C的用户信息与第一用户信息集合中的用户信息不匹配,因此采用第一消息提示方式提示第一信息,在第一显示界面呈现来自用户C的第一信息。
实施例二
本实施例记载一种信息处理方法,可以应用于终端设备,如图3a所示,本实施例记载的信息处理方法包括以下步骤:
步骤301,基于通信链路获取通信数据。
这里的通信链路为基于以下数据连接的数据传输通道:Fibre Channel 数据连接;Cable数据连接;PSTN数据连接;基于IEEE 802.3、IEEE802.11b/g/n的网络连接、POWELINE、CABLE、PSTN;3GPP、3GPP2网络等通讯网络所支持的IP网络连接。
步骤302,解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息。
步骤303,从属性信息中提取出通信数据的来源用户信息和目标用户信息。
基于通信数据的不同类型,来源用户信息和目标用户信息可以采用用户的唯一标识;例如,通信数据为社交应用通信数据时,来源用户信息和目标用户信息可采用社交应用号码;通信数据为手机短信的通信数据时,来源用户信息和目标用户信息可采用手机号码。
步骤304,获取第一预设用户信息集合,第一预设用户信息集合包括至少一个用户的信息。
本实施例讨论目标用户信息表征所述通信数据仅具有一个目标用户的情况。
步骤305,将通信数据的来源用户信息与第一预设用户信息集合中的用户信息进行匹配,当匹配失败时执行步骤306和步骤307,当匹配成功时执行步骤308和步骤309。
步骤306,选取第一信息提示方式作为目标信息提示方式。
步骤307,在第一显示界面中呈现第一信息。
步骤307为将第一信息提示方式作为目标信息提示方式时的处理,也即直接在第一显示界面呈现第一信息,便于用户及时获知第一信息;这里的第一显示界面可以为终端设备中的全屏窗口或非全屏窗口。
步骤308,选取第二信息提示方式作为目标信息提示方式。
步骤309,在第二显示界面呈现第二信息以及来源信息。
步骤309为以第二信息提示方式提示所述第一信息时的处理,也即以区别于第一信息的第二信息提示接收到第一信息;例如,当第一信息为银行账户信息时,对应的第二信息可以为“你好”等区别于第一信息的任意信息;这就达到了提示终端设备用户接收到来自第一预设用户集合中的用户发送的第一信息,且不会直接呈现第一信息的效果。
步骤310,在第二显示界面呈现特定标识的组合,基于特定标识的组合获取操作。
步骤311,检测操作所触发的标识的序列与预设标识序列是否匹配,如果匹配则执行步骤312;否则,继续检测直至第二显示界面被触发关闭或切换至后台。
例如,可以采用九宫格的形式呈现9个标识序列(标识可以采用数字或字母等标识),当操作触发的标识序列与预设的标识序列(也即预设的密码)匹配时,才转入步骤312以呈现第一信息;通过密码验证的方式,保障了呈现第一信息的安全性。
步骤310和步骤311为检测在第二显示界面接收的操作并进行鉴权的操作,当终端设备用户实施的操作的标识序列与预设标识序列(比例数字或字母构成的密码)匹配时,表征鉴权通过从而可以呈现第一信息;实际应用中,步骤310和步骤311可以替换为以下步骤,检测是否在第二显示界面接收到特定操作,如果接收到特定操作、则执行步骤312;否则,继续检测是否接收到特定操作,直至第二显示界面被触发关闭或切换至后台,这里的特定操作可以为在第二显示界面实施的特定点触操作(如单点触控操作、多点触控操作),也可以为具有特定轨迹(如圆圈、三角形等轨迹)的滑动触控操作。
步骤312,在第二显示界面呈现第一信息。
需要指出的是,本实施例记载的技术方案可以应用于微信、社交应用 等任意具有点对点通信功能的应用,后续具体应用场景均以社交应用为例进行说明,但这不应视为对本发明实施例应用场景的限定。
设用户A通过第一终端设备中的社交应用设置界面,设置对于几个社交应用联系人也即用户B的以下信息:
1)来自用户B的信息(可以采用用户B的社交应用号码标识)采用第二信息提示方式提示,触发第一终端设备将社交应用用户B的用户信息设置于第一预设用户信息集合;
2)第二信息提示方式采用的第二信息,当用户A未设置第二信息时可以随机生成第二信息;
3)特定操作,这里设特定操作为在第二显示界面的呈现的标识序列(可以为数字九宫格)中的实施的滑动操作,且滑动操作触发的标识对应密码1235789;
如图3b所示,当用户A持有的第一终端设备中运行社交应用,通过WiFi接入网络,当网络侧的社交应用通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据来源用户信息(设为用户B,可以采用用户B的社交应用号码标识)、以及通信数据的目标用户信息(也即用户A),第一终端设备检测到用户B的用户信息与第一用户信息集合中的用户信息匹配,因此采用第二消息提示方式提示第一信息,在第二显示界面呈现来自用户B的第二信息(与第一信息不同)以及标识序列构成的解锁界面,并在第二显示界面接收到特定操作(特定操作的轨迹经过标识1235789)时呈现来自用户B的第一信息,这样,当用户不便于查看来自用户B的第一信息时可以不实施特定操作,此时第一终端设备可以提示有未查看信息(例如采用在社交应用图标上显示角标的形式提示有未查看消息);
当用户A持有的第一终端设备中运行社交应用,通过WiFi接入网络, 当网络侧的社交应用通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据来源用户信息(设为用户C,可以采用用户C的社交应用号码标识)、以及通信数据的目标用户信息(也即用户A,可以采用用户A的社交应用号码标识),第一终端设备检测到用户C的用户信息与第一用户信息集合中的用户信息不匹配,因此采用第一消息提示方式提示第一信息,在第一显示界面呈现来自用户C的第一信息。
实施例三
本实施例记载一种信息处理方法,可以应用于终端设备,如图4a所示,本实施例记载的信息处理方法包括以下步骤:
步骤401,基于通信链路获取通信数据。
这里的通信链路为基于以下数据连接的数据传输通道:Fibre Channel数据连接;Cable数据连接;PSTN数据连接;基于IEEE 802.3、IEEE802.11b/g/n的网络连接、POWELINE、CABLE、PSTN;3GPP、3GPP2网络等通讯网络所支持的IP网络连接。
步骤402,解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息。
步骤403,从属性信息中提取出通信数据的来源用户信息和目标用户信息。
步骤404,获取第一预设用户信息集合,第一预设用户信息集合包括至少一个用户的信息。
本实施例讨论目标用户信息表征通信数据具有至少两个目标用户的情况。
步骤405,将通信数据的来源用户信息以及目标用户信息分别与第一预设用户信息集合中的用户信息匹配,当匹配失败时执行步骤406和步骤407,当匹配成功(也即来源用户信息以及目标用户信息均与第一预设用户信息 集合中的用户信息匹配)时执行步骤408和步骤409。
本实施例中的第一预设用户集合默认包括接收到通信数据的终端设备对应应用的用户信息;以用户A持有的第一终端设备为例,第一终端设备存储的第一预设用户集合中默认包括用户A的用户信息;
当目标用户信息表征通信数据具有至少两个目标用户时,表征通信数据承载的第一信息为在多点通信时产生,以用户A持有的第一终端设备运行社交应用为例,当第一终端设备接收到的社交应用消息(对应第一信息)为群组消息时,表征该消息需要对应发送至群组中的除消息发送用户之外的每个用户,此时,如果群组中除第一终端设备对应用户(也即用户A之外)用户的用户信息均与第一预设用户集合中的用户信息匹配,则需要采用第二信息提示方式第一信息以保障呈现第一信息时的安全性;如果群组中的除第一终端设备对应用户(也即用户A之外)用户中部分用户的用户信息与第一预设用户集合中的用户信息匹配,则不需要采用第二信息提示方式提示第一信息,而采用第一信息提示方式提示第一信息,也即直接呈现第一信息,后续步骤将进行说明。
步骤406,选取第一信息提示方式作为目标信息提示方式。
步骤407,在第一显示界面中呈现第一信息。
步骤407为将第一信息提示方式作为目标信息提示方式时的处理,也即直接在第一显示界面呈现第一信息,便于用户及时获知第一信息;这里的第一显示界面可以为终端设备中的全屏窗口或非全屏窗口。
步骤408,选取第二信息提示方式作为目标信息提示方式。
步骤409,在第二显示界面呈现第二信息以及来源信息。
步骤409为以第二信息提示方式提示所述第一信息时的处理,也即以区别于第一信息的第二信息提示接收到第一信息;例如,当第一信息为银行账户信息时,对应的第二信息可以为“你好”等区别于第一信息的任意 信息;这就达到了提示终端设备用户接收到来自第一预设用户集合中的用户发送的第一信息,且不会直接呈现第一信息的效果。
步骤410,在第二显示界面呈现特定标识的组合,基于特定标识的组合获取操作。
步骤411,检测操作所触发的标识的序列与预设标识序列是否匹配,如果匹配则执行步骤412;否则,继续检测直至第二显示界面被触发关闭或切换至后台。
例如,可以采用九宫格的形式呈现9个标识序列(标识可以采用数字或字母等标识),当操作触发的标识序列与预设的标识序列(也即预设的密码)匹配时,才转入步骤412以呈现第一信息;通过密码验证的方式,保障了呈现第一信息的安全性。
步骤412,在第二显示界面呈现第一信息。
步骤410和步骤411为检测在第二显示界面接收的操作并进行鉴权的操作,当终端设备用户实施的操作的标识序列与预设标识序列(比例数字或字母构成的密码)匹配时,表征鉴权通过从而可以呈现第一信息;实际应用中,步骤410和步骤411可以替换为以下步骤,检测是否在第二显示界面接收到特定操作,如果接收到特定操作、则执行步骤412;否则,继续检测是否接收到特定操作,直至第二显示界面被触发关闭或切换至后台,这里的特定操作可以为在第二显示界面实施的特定点触操作(如单点触控操作、多点触控操作),也可以为特定具有特定轨迹(如圆圈、三角形等轨迹)的滑动触控操作。
需要指出的是,本实施例记载的技术方案可以应用于任意具有点对点通信功能的应用,后续具体应用场景均以社交应用为例进行说明,但这不应视为对本发明实施例应用场景的限定。
设用户A通过第一终端设备中的社交应用设置界面,设置对应社交应 用联系人也即用户B和用户C的以下信息:
1)来自用户B、用户C的信息(可以采用用户B的社交应用号码、以及用户C的社交应用号码标识,用户B的社交应用号码用用于在基于社交应用的通信中唯一表征用户B,用户C的社交应用号码用用于在基于社交应用的通信中唯一表征用户C)采用第二信息提示方式提示,触发第一终端设备将用户A、用户B的用户信息、以及用户C的用户信息设置于第一预设用户信息集合(默认将用户A的用户消息设置与第一预设用户信息集合中);
2)第二信息提示方式采用的第二信息,当用户A未设置第二信息时可以随机生成第二信息;
3)特定操作,这里设特定操作为在第二显示界面的呈现的标识序列(可以为数字九宫格)中的实施的滑动操作,且滑动操作触发的标识对应密码1235789;
如图4b所示,当用户A持有的第一终端设备中运行社交应用,通过WiFi接入网络,当网络侧的社交应用通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据的来源用户信息(设为用户B,可以采用用户B的社交应用号码标识)、通信数据的目标用户信息(设为用户A和用户C,可以采用用户A、用户C的社交应用号码标识),第一终端设备检测到通信数据的来源用户信息(用户B的用户信息)和目标用户信息(也即用户A和用户C的用户信息)均与第一用户信息集合中的用户信息匹配,因此采用第二消息提示方式提示第一信息,在第二显示界面呈现来自用户B的第二信息(与第一信息不同)以及标识序列构成的解锁界面,并在第二显示界面接收到特定操作(特定操作的轨迹经过标识1235789)时呈现来自用户B的第一信息,这样,当用户A不便于查看来自用户B的第一信息时可以不实施特定操作,此时第一终端设备可以提示有未查看信息 (例如采用在社交应用图标上显示角标的形式提示有未查看消息);
当用户A持有的第一终端设备中运行社交应用,通过WiFi接入网络,当网络侧的社交应用通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据来源用户信息(设为用户B,可以采用用户B的社交应用号码标识)、通信数据的目标用户信息(设为用户A和用户D,可以采用用户A、用户D的社交应用号码标识),第一终端设备检测到通信数据的来源用户信息(用户B的用户信息)和目标用户信息(也即用户A和用户D的用户信息)未全与第一用户信息集合中的用户信息匹配,因此采用第一消息提示方式提示第一信息,在第一显示界面呈现来自用户B的第一信息,便于用户A及时获知信息。
实施例四
本实施例记载一种信息处理方法,可以应用于终端设备,如图5所示,本实施例记载的信息处理方法包括以下步骤:
步骤501,基于通信链路获取通信数据。
这里的通信链路为基于以下数据连接的数据传输通道:Fibre Channel数据连接;Cable数据连接;PSTN数据连接;基于IEEE 802.3、IEEE802.11b/g/n的网络连接、POWELINE、电缆CABLE、PSTN;3GPP、3GPP2网络等通讯网络所支持的IP网络连接。
步骤502,解析通信数据,得到通信数据的属性信息、以及通信数据承载的第一信息。
步骤503,从属性信息中提取出通信数据的来源用户信息和目标用户信息。
基于通信数据的不同类型,来源用户信息和目标用户信息可以采用用户的唯一标识;例如,通信数据为社交应用通信数据时,来源用户信息和目标用户信息可采用社交应用号码;通信数据为手机短信的通信数据时, 来源用户信息和目标用户信息可采用手机号码。
步骤504,判断通信数据的目标用户的数量,当目标用户信息表征通信数据仅具有一个目标用户时,执行步骤505和步骤506;当目标用户信息表征通信数据具有至少两个目标用户时,执行步骤507和步骤508。
当目标用户信息表征通信数据仅具有一个目标用户时,表征通信数据承载的第一信息为在点对点通信时产生,以社交应用为例,当社交应用消息(对应第一信息)为点对点消息时,表征该消息仅需要发送至一个用户,此时,如果社交应用消息的来源用户信息与第一预设用户信息集合中的用户信息(第一预设用户信息集合中的用户信息可以预先设置于终端设备)匹配,表示需要对第一信息采用第二提示方式提示以保证第一信息呈现的安全性,后续步骤将进行说明;
当目标用户信息表征通信数据具有至少两个目标用户时,表征通信数据承载的第一信息为在多点通信时产生,以社交应用为例,当社交应用消息(对应第一信息)为群组消息时,该消息需要对应发送至群组中的每个用户,此时,即使群组中用户的用户信息与第一预设用户信息集合中的用户信息匹配,也不需要采用第二信息提示方式提示第一信息,也就是说,本实施例中对群组消息均采用第一提示信息提示方式,也就是直接呈现群组消息。
步骤505,获取第一预设用户信息集合,第一预设用户信息集合包括至少一个用户的信息。
本实施例中的第一预设用户集合默认包括接收到通信数据的终端设备对应应用的用户信息;以用户A持有的第一终端设备为例,第一终端设备存储的第一预设用户集合中默认包括用户A的用户信息。
步骤506,将通信数据的来源用户信息与第一预设用户信息集合中的用户信息进行匹配,当匹配失败时执行步骤507和步骤508,当匹配成功时执 行步骤509。
当目标用户信息表征通信数据仅具有一个目标用户时,表征通信数据承载的第一信息为在点对点通信时产生,以社交应用为例,当社交应用消息(对应第一信息)为点对点消息时,表征社交应用消息仅需要发送至一个用户,此时,如果社交应用消息的来源用户信息与第一预设用户信息集合中的用户信息匹配,表示需要采用第二提示方式提示第一信息以保证第一信息呈现的安全性,后续步骤将进行说明。
步骤507,选取第一信息提示方式作为目标信息提示方式。
步骤508,在第一显示界面中呈现第一信息。
步骤508为将第一信息提示方式作为目标信息提示方式时的处理,也即直接在第一显示界面呈现第一信息,便于用户及时获知第一信息;这里的第一显示界面可以为终端设备中的全屏窗口或非全屏窗口。
步骤509,选取第二信息提示方式作为目标信息提示方式。
步骤510,在第二显示界面呈现第二信息以及来源信息。
步骤510为以第二信息提示方式提示第一信息时的处理,也即以区别于第一信息的第二信息提示接收到第一信息;例如,当第一信息为银行账户信息时,对应的第二信息可以为“你好”等区别于第一信息的任意信息;这就达到了提示终端设备用户接收到来自第一预设用户集合中的用户发送的第一信息的效果,且不会直接呈现第一信息,避免直接呈现第一信息时导致第一信息泄露的问题。
步骤511,在第二显示界面呈现特定标识的组合,基于特定标识的组合获取操作。
步骤512,检测操作所触发的标识的序列与预设标识序列是否匹配,如果匹配则执行步骤513;否则,继续检测直至第二显示界面被触发关闭或切换至后台。
例如,可以采用九宫格的形式呈现9个标识序列(标识可以采用数字或字母等标识),当操作触发的标识序列与预设的标识序列(也即预设的密码)匹配时,才转入步骤512以呈现第一信息;通过密码验证的方式,保障了呈现第一信息的安全性。
步骤511和步骤512为检测在第二显示界面接收的操作并进行鉴权的操作,当终端设备用户实施的操作的标识序列与预设标识序列(比例数字或字母构成的密码)匹配时,表征鉴权通过从而可以呈现第一信息;实际应用中,步骤511和步骤512可以替换为以下步骤,检测是否在第二显示界面接收到特定操作,如果接收到特定操作、则执行步骤513;否则,继续检测是否接收到特定操作,直至第二显示界面被触发关闭或切换至后台,这里的特定操作可以为在第二显示界面实施的特定点触操作(如单点触控操作、多点触控操作),也可以为特定具有特定轨迹(如圆圈、三角形等轨迹)的滑动触控操作。
步骤513,在第二显示界面呈现第一信息。
需要指出的是,本实施例记载的技术方案可以应用于任意具有点对点通信功能的应用。
实施例五
本实施例记载一种信息处理方法,可以应用于终端设备,本实施例对终端设备以第二信息提示方式提示第一信息的处理作进一步说明,如图6a所示,本实施例记载的信息处理方法包括以下步骤:
步骤601,终端设备在第二显示界面呈现第二信息,并在第二显示界面接收到特定操作时呈现第一信息。
第一信息为终端设备接收到的通信数据承载的信息,第二信息为区别于第一信息的任意信息(实际应用中可以预先在终端设备中设置);特定操作可以为在第二显示界面实施的特定点触操作(如单点触控操作或多点触 控操作),也可以为在第二显示界面显示标识序列后所接收到的触发标识的操作,且接收到的操作触发的标识的序列与预设标识序列匹配(标识可以采用数字、字母等字符)。
步骤602,从第二显示界面切换显示到第三显示界面。
步骤602为在用户操控进行显示界面的操作时执行的处理,例如用户可能在查看社交应用显示界面(对应第二显示界面)呈现的第一信息之后切换至其他应用的显示界面(对应第三显示界面,也即不用于显示第一信息、以及第二信息的显示界面,如多媒体应用的显示界面);这里的第二显示界面和第三显示界面可以采用全屏窗口或非全屏窗口的形式,本实施例中不做限定。
步骤603,从第三显示界面再次切换显示第二显示界面时,检测是否在第二显示界面接收到特定操作,如果接收到,则执行步骤604;否则继续检测,直至第二显示界面被触发关闭或切换至后台。
步骤604,在第二显示界面呈现第一信息。
由于需要保证第二显示界面呈现的第一信息的安全性,因此,当终端设备在第二显示界面呈现有第一信息之后,如果后续第二显示界面被切换至后台(例如被第三显示界面覆盖或者被关闭),则需要用户重新在第二显示界面实施特定操作,以验证用户的合法性,保障信息安全。
一个场景示意图如图6b所示,当用户A持有的终端设备中运行社交应用(包括QQ和微信),通过WiFi接入网络,当网络侧的QQ通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据的来源用户为用户B,采用第二消息提示方式提示用户B发送的第一信息时,在第二显示界面呈现来自用户B的第二信息(与第一信息不同,第二信息可以预设或者可以随机生成),便于用户A及时接收到用户B发送了消息,并在呈现特定标识的组合(图6b中采用数字九宫格的形式)中接收到特定 操作(操作的操作轨迹经过的标识对应预设的标识序列)时,呈现第一信息;
当用户A触发第一终端设备切换显示第三显示界面(如桌面、不同于社交应用的界面)时,第一终端设备将第二显示界面切换至后台显示(此时第二显示界面被第三显示界面覆盖)或者可以关闭第二显示界面;当用户触发再次切换显示第二显示界面时,由于之前第二显示界面采用第二信息提示方式提示第一信息以保证信息呈现的安全性,因此,为避免信息泄露的情况,在第二显示界面仍然呈现特定标识的组合(图中采用数字九宫格的形式)中接收到特定操作(操作的操作轨迹经过的标识对应预设的标识序列)时,呈现第一信息。
实施例六
本实施例记载一种信息处理方法,可以应用于终端设备,本实施例对终端设备以第二信息提示方式提示第一信息的处理作进一步说明,如图7a所示,本实施例记载的信息处理方法包括以下步骤:
步骤701,终端设备在第二显示界面呈现第二信息,并在第二显示界面接收到特定操作时呈现第一信息。
第一信息为终端设备接收到的通信数据承载的信息,当满足特定条件时,终端设备采用区别于第一信息提示方式(在第一显示界面呈现第一信息)的第二信息提示方式提示第一信息,也即在第二显示界面呈现第二信息,并在第二显示界面接收到特定操作时呈现第一信息;其中,上述特定条件可以为以下条件之一:
1)从通信数据中解析出的目标用户信息表征通信数据仅具有一个目标用户,且从通信数据解析出的来源用户信息与第一预设用户信息集合中的用户信息匹配;
2)从通信数据中解析出的目标用户信息表征通信数据具有至少两个目 标用户,且从通信数据解析出的来源用户信息以及目标用户信息分别与第一预设用户信息集合中的用户信息匹配。
第二信息为区别于第一信息的任意信息(实际应用中可以预先在终端设备中设置);特定操作可以为在第二显示界面实施的特定点触操作(如单点触控操作或多点触控操作),也可以为在第二显示界面显示标识序列后所接收到的触发标识的操作,且接收到的操作触发的标识的序列与预设标识序列匹配(标识可以采用数字、字母等字符)。
步骤702,获取第二预设用户信息集合,第二预设用户信息集合包括至少一个用户信息。
第二预设用户信息可以与第一预设用户信息集合相同,也可以不同(可以在终端设备中分别设置两组不同的用户信息)。
步骤703,将通信数据的来源用户信息与第二预设用户信息集合中的用户信息匹配,当匹配成功时执行步骤704;否则,停止处理。
步骤704,将第二显示界面呈现的信息记录以通信数据的来源用户信息为索引上传至信息存储服务器。
其中,信息记录用于供通信服务器响应终端设备的信息记录获取请求,例如当用户可以将持有的第一终端设备的第二显示界面(例如社交应用中与特定用户的聊天界面)中的消息记录以来源用户信息(在社交应用中对应消息的发送人)为索引上传至信息存储服务器;后续,用户可以持有第二终端设备向信息存储服务器请求信息记录(例如在社交应用中请求信息存储服务器将消息记录漫游至第二终端设备),第二终端设备在向信息存储服务器请求漫游信息记录时可以根据是否接收到上述特定操作来对用户的合法性进行判决。
如图7b所示,设用户A通过第一终端设备中的社交应用设置界面,设置对应社交应用联系人也即用户B的以下信息:
1)来自用户B(可以采用用户B的社交应用号码)采用第二信息提示方式提示,触发第一终端设备将用户A、以及用户C的用户信息设置于第一预设用户信息集合(默认将用户A的用户消息设置与第一预设用户信息集合中);
2)第二信息提示方式采用的第二信息,当用户A未设置第二信息时可以随机生成第二信息;
3)特定操作,这里设特定操作为在第二显示界面的呈现的标识序列(可以为数字九宫格)中的实施的滑动操作,且滑动操作触发的标识对应密码1235789;
4)信息记录上传,当设置为是时,触发第一终端设备将对应用户B的信息记录上传至信息存储服务器;
一个场景示意图如图7c所示,当用户A持有的第一终端设备中运行社交应用,通过WiFi接入网络,当网络侧的社交应用通信服务器下发的对应通信数据时,解析出通信数据中承载的第一信息、通信数据的来源用户信息(设为用户B,可以采用用户B的社交应用号码标识)、通信数据的目标用户信息(用户A),第一终端设备检测到通信数据的来源用户信息(用户B的用户信息)与第一用户信息集合中的用户信息匹配,因此采用第二消息提示方式提示第一信息,在第二显示界面呈现来自用户B的第二信息(与第一信息不同)以及标识序列构成的解锁界面,并在第二显示界面接收到特定操作(特定操作的轨迹经过标识1235789)时呈现来自用户B的第一信息,这样,当用户A不便于查看来自用户B的第一信息时可以不实施特定操作,此时第一终端设备可以提示有未查看信息(例如采用在社交应用图标上显示角标的形式提示有未查看消息);
第一终端设备将第二显示界面呈现的信息记录上传至信息存储服务器,当用户A持有第二终端设备运行社交应用,向信息存储服务器请求对 应用户B的信息记录时,信息存储服务器可以将对应用户B的信息记录下发至第二终端设备,用户通过第二终端设备向信息存储服务器请求对应用户B的信息记录时,第二终端设备可以利用用户A在第一终端设备设置的特定操作对应用户A进行合法性验证(特定操作的信息可由第一终端设备通过通信服务器发送至第二终端设备)。
实施例七
本实施例记载一种信息处理方法,可以应用于终端设备,本实施例对终端设备以第二信息提示方式提示第一信息的处理作进一步说明,如图8a所示,本实施例记载的信息处理方法包括以下步骤:
步骤801,终端设备在第二显示界面呈现第二信息,并在第二显示界面接收到特定操作时呈现第一信息。
第一信息为终端设备接收到的通信数据承载的信息,当满足特定条件时,终端设备采用区别于第一信息提示方式(在第一显示界面呈现第一信息)的第二信息提示方式提示第一信息,也即在第二显示界面呈现第二信息,并在第二显示界面接收到特定操作时呈现第一信息;其中,上述特定条件可以为以下条件之一:
1)从通信数据中解析出的目标用户信息表征通信数据仅具有一个目标用户,且从通信数据解析出的来源用户信息与第一预设用户信息集合中的用户信息匹配;
2)从通信数据中解析出的目标用户信息表征通信数据具有至少两个目标用户,且从通信数据解析出的来源用户信息以及目标用户信息分别与第一预设用户信息集合中的用户信息匹配。
第二信息为区别于第一信息的任意信息(实际应用中可以预先在终端设备中设置);特定操作可以为在第二显示界面实施的特定点触操作(如单点触控操作或多点触控操作),也可以为在第二显示界面显示标识序列后所 接收到的触发标识的操作,且接收到的操作触发的标识的序列与预设标识序列匹配(标识可以采用数字、字母等字符)。
步骤802,获取第二预设用户信息集合,第二预设用户信息集合包括至少一个用户信息。
第二预设用户信息可以与第一预设用户信息集合相同,也可以不同(可以在终端设备中分别设置两组不同的用户信息);
步骤803,将通信数据的来源用户信息与第二预设用户信息集合中的用户信息匹配,当匹配成功时执行步骤804;否则,停止处理。
步骤804,将第二显示界面呈现的信息记录以通信数据的来源用户信息为索引上传至信息存储服务器。
信息记录用于供信息存储服务器响应其他终端设备的信息记录获取请求,例如当用户可以将持有的第一终端设备的第二显示界面(例如社交应用中与特定用户的聊天界面)中的消息记录以来源用户信息(在社交应用中对应消息的发送人)为索引上传至信息存储服务器;后续,用户A可以持有第二终端设备向信息存储服务器请求信息记录(例如在社交应用中请求通信服务器将消息记录漫游至第二终端设备),第二终端设备在请求信息存储服务器漫游信息记录可以根据是否接收到上述特定操作来对用户的合法性进行判决。
步骤805,接收到删除与特定来源用户信息对应的信息记录的指令。
以社交应用为例,用户A可以在社交应用的聊天记录管理界面中触发删除与特定联系人的聊天记录。
步骤806,触发信息存储服务器、以及目标终端设备删除所存储的与特定来源用户信息对应的信息记录。
如图8b所示,用户触发第一终端设备删除所存储的与特定来源用户信息对应的信息记录时,可由第一终端设备通过信息存储服务器向用户A持 有的第二终端设备发送信息记录删除指令实现;通过删除信息存储服务器、以及目标终端设备(对应第二终端设备)存储的信息记录,避免了特定来源用户信息对应的信息记录被泄露的风险。
实施例八
本实施例记载一种计算机可读介质,可以为ROM(例如,只读存储器、FLASH存储器、转移装置等)、磁存储介质(例如,磁带、磁盘驱动器等)、光学存储介质(例如,CD-ROM、DVD-ROM、纸卡、纸带等)以及其他熟知类型的程序存储器;所述计算机可读介质中存储有计算机可执行指令,当执行所述指令时,引起至少一个处理器执行包括以下的操作:
基于通信链路获取通信数据;解析所述通信数据,得到所述通信数据的属性信息、以及所述通信数据承载的第一信息;基于所述属性信息在至少两个信息提示方式中选定目标信息提示方式;以所述目标信息提示方式提示所述通信数据承载的第一信息;其中,以第一信息提示方式提示所述第一信息时在第一显示界面中呈现所述第一信息以及所述来源信息,以第二信息提示方式提示所述第一信息时在第二显示界面呈现第二信息以及所述来源信息,并在所述第二显示界面接收到特定操作时呈现所述第一信息。
可选地,当执行所述指令时,还引起至少一个处理器执行包括以下的操作:在所述第二显示界面呈现特定标识的组合,基于所述特定标识的组合获取操作;解析所述操作所触发的标识的序列与预设标识序列是否匹配,当匹配时在所述显示界面呈现所述第一信息。
可选地,当执行所述指令时,还引起至少一个处理器执行包括以下的操作:从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;获取第一预设用户信息集合,所述第一预设用户信息集合包括至少一个用户的信息;当所述目标用户信息表征所述通信数据仅具有一个目标用户时,将所述通信数据的来源用户信息与所述第一预设用户信息集合中 的用户信息进行匹配,当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标信息提示方式。
可选地,当执行所述指令时,还引起至少一个处理器执行包括以下的操作:从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;当所述目标用户信息表征所述通信数据具有至少两个目标用户时,将所述通信数据的来源用户信息以及目标用户信息分别与所述第一预设用户信息集合中的用户信息匹配,当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标提示方式。
可选地,当执行所述指令时,还引起至少一个处理器执行包括以下的操作:从所述属性信息中提取出所述通信数据的目标用户信息;当所述目标用户信息表征所述通信数据具有至少两个目标用户时,选取所述第一信息提示方式作为所述目标提示方式。
可选地,当执行所述指令时,还引起至少一个处理器执行包括以下的操作:从所述第二显示界面切换显示到第三显示界面,并从所述第三显示界面再次切换显示所述第二显示界面时;
检测是否在所述第二显示界面接收到所述特定操作,如果接收到,则在所述第二显示界面呈现所述第一信息;其中,
所述第三显示界面用于显示与所述第一信息、以及所述第二信息不同的信息。
可选地,当执行所述指令时,还引起至少一个处理器执行包括以下的操作:以所述第二信息提示方式提示所述第一信息时,获取第二预设用户信息集合,所述第二预设用户信息集合包括至少一个用户信息;
将所述通信数据的来源用户信息与所述第二预设用户信息集合中的用 户信息匹配,当匹配成功时将所述第二显示界面呈现的信息记录以所述通信数据的来源用户信息为索引上传至信息存储服务器;其中,所述信息记录配置为响应终端设备的信息记录获取请求。
可选地,当执行所述指令时,还引起至少一个处理器执行包括以下的操作:在所述第一电子设备存储的信息记录中删除与特定来源用户信息对应的信息记录时,触发所述信息存储服务器、以及所述第二电子设备删除所存储的与所述特定来源用户信息对应的信息记录。
实施例九
本实施例记载一种信息处理装置,可以应用于前述实施例记载的终端设备,以保障终端设备呈现信息时的安全性,如图9a所示,本实施例记载的信息处理装置包括:
通信单元10,配置为基于通信链路获取通信数据;
解析单元20,配置为解析所述通信数据,得到所述通信数据的属性信息、以及所述通信数据承载的第一信息;
选取单元30,配置为基于所述属性信息在至少两个信息提示方式中选定目标信息提示方式;
提示单元40,配置为以所述目标信息提示方式提示所述通信数据承载的第一信息;其中,
以第一信息提示方式提示所述第一信息时在第一显示界面中呈现所述第一信息以及所述来源信息,以第二信息提示方式提示所述第一信息时在第二显示界面呈现第二信息以及所述来源信息,并在所述第二显示界面接收到特定操作时呈现所述第一信息。
可选地,所述提示单元40包括(图中未示出):
呈现模块401,配置为在所述第二显示界面呈现特定标识的组合,基于所述特定标识的组合获取操作;
解析模块402(与呈现模块401耦合),配置为解析所述操作所触发的标识的序列与预设标识序列是否匹配,当匹配时触发所述呈现模块在所述显示界面呈现所述第一信息。
可选地,所述选取单元30包括(图中未示出):
第一提取模块301,配置为从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;
获取模块302(与第一提取模块301耦合),配置为获取第一预设用户信息集合,所述第一预设用户信息集合包括至少一个用户的信息;
第一匹配模块303(与获取模块302耦合),配置为当所述目标用户信息表征所述通信数据仅具有一个目标用户时,将所述通信数据的来源用户信息与所述第一预设用户信息集合中的用户信息进行匹配,当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标信息提示方式。
可选地,所述选取单元30包括(图中未示出):
第二提取模块304,配置为从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;
第二匹配模块305(与第二提取模块304耦合),配置为当所述目标用户信息表征所述通信数据具有至少两个目标用户时,将所述通信数据的来源用户信息以及目标用户信息分别与所述第一预设用户信息集合中的用户信息匹配,当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标提示方式。
可选地,所述选取单元30包括(图中未示出):
第三提取模块306,配置为从所述属性信息中提取出所述通信数据的目标用户信息;
选取模块307(与第三提取模块306耦合),配置为当所述目标用户信 息表征所述通信数据具有至少两个目标用户时,选取所述第一信息提示方式作为所述目标提示方式。
可选地,所述提示单元40还配置为从所述第二显示界面切换显示到第三显示界面,并从所述第三显示界面再次切换显示所述第二显示界面时,检测是否在所述第二显示界面接收到所述特定操作,如果接收到,则在所述第二显示界面呈现所述第一信息;其中,所述第三显示界面配置为显示与所述第一信息、以及所述第二信息不同的信息。
可选地,如图9b所示,所述信息处理装置还包括:
获取单元50,配置为在所述提示单元40以所述第二信息提示方式提示所述第一信息时,获取第二预设用户信息集合,所述第二预设用户信息集合包括至少一个用户信息;
匹配单元60,配置为将所述通信数据的来源用户信息与所述第二预设用户信息集合中的用户信息匹配,当匹配成功时触发所述通信单元10将所述第二显示界面呈现的信息记录以所述通信数据的来源用户信息为索引上传至信息存储服务器;其中,所述信息记录配置为响应终端设备的信息记录获取请求。
可选地,如图9c所示,所述信息处理装置还包括:
信息记录单元70,配置为在所述第一电子设备存储的信息记录中删除与特定来源用户信息对应的信息记录时,触发所述通信服务器、以及所述第二电子设备删除所存储的与所述特定来源用户信息对应的信息记录。
实际应用中,基于不同的通信链路,通信单元10可由信息处理装置中的支持相应通信链路的集成电路芯片实现,如采用基于WiFi的通信链路时,通信单元10可由WiFi射频芯片和WiFi天线实现;解析单元20、选取单元30、提示单元40、获取单元50、匹配单元60可由信息处理装置中的微处理器(MCU)、逻辑可编程门阵列(FPGA)或专用集成电路(ASIC)实现; 信息记录单元70可以信息处理装置中的非易失性存储介质(如闪存)结合上述的MCU、FPGA或ASIC实现。
综上所述,本发明实施例具有以下有益效果:
1)基于通信数据的属性信息确定通信数据承载的第一信息隐私性不高(如可以被他人得知)时,可以采用第一信息提示方式提示第一信息,也即在显示界面中呈现第一信息以及来源信息,便于用户及时获知信息;当通信数据的属性信息表征通信数据承载的第一信息隐私性较高(即第一信息不便被他人得知)时,可以采用第二信息提示方式提示第一信息时,也即在显示界面呈现第二信息(与第一信息不同)以及来源信息,并在显示界面接收到特定操作时呈现第一信息;也即是用第二信息来提示接收到第一信息,而非直接呈现第一信息,这就避免了直接呈现第一信息导致第一信息被窥视窃取的情况,有效保障了信息的安全性;
2)以第二信息提示方式呈现第一信息之前,还对用户在显示界面输入的操作进行验证(是是否为预设的特定操作),也即实现了查看第一信息的安全验证,进一步保障了呈现信息时的安全性;
3)当通信数据的目标用户(一个或一个以上)且目标用户均为预设用户集合中的用户时,对应双发(或多方)通信的且参与通信的用户均为预设用户信息集合中的用户的场景,则将通信数据的承载的第一信息以第二信息提示方式呈现,保证信息呈现的安全性;
4)当通信数据的来源用户为预设用户信息集合中的用户信息,且通信数据的目标用户的数量大于等于2时,对应预设用户信息集合中的用户参与了多方通信,此时没有必要将通信数据承载的第一信息以第二信息提示方式提示,而是直接在显示界面中呈现第一信息,便于用户及时获知信息;
5)当被触发从第三显示界面切换至第二显示界面显示时,由于第二显示界面配置为以第二信息提示方式提示通信数据承载的第一信息,因此需 要用户再次在第二显示界面实施特定操作才会显示通信数据承载的第一信息,进一步提升了呈现信息的安全性;
6)第二显示界面呈现的第一信息可以根据通信数据的来源用户是否为第二预设用户集合中来进行处理,当通信数据的来源用户与第二预设用户集合中的用户信息匹配时,表征通信数据承载的第一信息可以上传至信息存储服务器保存;未匹配时,表征通信数据承载的第一信息隐私度高,因此不将第一信息上传至信息存储服务器保存,增强了信息的安全性;
7)当第一终端设备第二显示界面显示的第一信息被漫游至第二终端设备时,如果后续第一终端设备被触发删除第一信息,则第一终端设备将通过信息存储服务器向第二终端设备发送删除消息记录的指令,避免其他终端设备仍存储有消息记录的情况,保证信息安全。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、随机存取存储器(RAM,Random Access Memory)、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本发明上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、RAM、ROM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (17)

  1. 一种信息处理方法,所述方法包括:
    基于通信链路获取通信数据;
    解析所述通信数据,得到所述通信数据的属性信息、以及所述通信数据承载的第一信息;
    基于所述属性信息在第一信息提示方式和第二信息提示方式至少两个信息提示方式中选定目标信息提示方式,以及,以所述目标信息提示方式提示所述通信数据承载的第一信息;
    其中在第一信息提示方式中,在第一显示界面中呈现所述第一信息以及所述来源信息;
    在第二信息提示方式中在第二显示界面呈现第二信息以及所述来源信息,以及在所述第二显示界面接收到特定操作时呈现所述第一信息。
  2. 如权利要求1所述的方法,其中,所述在第二显示界面接收到特定操作时呈现所述第一信息,包括:
    在所述第二显示界面呈现特定标识的组合,基于所述特定标识的组合获取操作;
    解析所述操作所触发的标识的序列与预设标识序列是否匹配,当匹配时在所述显示界面呈现所述第一信息。
  3. 如权利要求1所述的方法,其中,所述基于所述属性信息在至少两个信息提示方式中选定目标信息提示方式,包括:
    从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;
    获取第一预设用户信息集合,所述第一预设用户信息集合包括至少一个用户的信息;
    当所述目标用户信息表征所述通信数据仅具有一个目标用户时,将所 述通信数据的来源用户信息与所述第一预设用户信息集合中的用户信息进行匹配,当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标信息提示方式。
  4. 如权利要求1所述的方法,其中,所述基于所述属性信息在至少两个信息提示方式中选定目标信息提示方式,包括:
    从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;
    当所述目标用户信息表征所述通信数据具有至少两个目标用户时,将所述通信数据的来源用户信息以及目标用户信息分别与所述第一预设用户信息集合中的用户信息匹配;
    当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标提示方式。
  5. 如权利要求1所述的方法,其中,所述基于所述属性信息在至少两个提示方式中选定目标信息提示方式,包括:
    从所述属性信息中提取出所述通信数据的目标用户信息;
    当所述目标用户信息表征所述通信数据具有至少两个目标用户时,选取所述第一信息提示方式作为所述目标提示方式。
  6. 如权利要求1所述的方法,其中,所述方法还包括:
    以第二信息提示方式提示所述第一信息时,从所述第二显示界面切换显示到第三显示界面,并从所述第三显示界面再次切换显示所述第二显示界面时;
    检测是否在所述第二显示界面接收到所述特定操作,如果接收到,则在所述第二显示界面呈现所述第一信息;其中,
    所述第三显示界面用于显示与所述第一信息、以及所述第二信息不同 的信息。
  7. 如权利要求1所述的方法,其中,所述方法还包括:
    以所述第二信息提示方式提示所述第一信息时,获取第二预设用户信息集合,所述第二预设用户信息集合包括至少一个用户信息;
    将所述通信数据的来源用户信息与所述第二预设用户信息集合中的用户信息匹配,当匹配成功时将所述第二显示界面呈现的信息记录以所述通信数据的来源用户信息为索引上传至信息存储服务器;其中,所述信息记录用于供所述信息存储服务器响应终端设备的信息记录获取请求。
  8. 如权利要求7所述的方法,其中,所述方法还包括:
    在存储的信息记录中删除与特定来源用户信息对应的信息记录时,触发所述信息存储服务器、以及所述终端设备删除所存储的与所述特定来源用户信息对应的信息记录。
  9. 一种信息处理装置,所述信息处理装置包括:
    通信单元,配置为基于通信链路获取通信数据;
    解析单元,配置为解析所述通信数据,得到所述通信数据的属性信息、以及所述通信数据承载的第一信息;
    选取单元,配置为基于所述属性信息在至少两个信息提示方式中选定目标信息提示方式;
    提示单元,配置为以所述目标信息提示方式提示所述通信数据承载的第一信息;其中,
    所述提示单元,还配置为在第一信息提示方式中在第一显示界面中呈现所述第一信息以及所述来源信息;
    所述提示单元,还配置为在第二信息提示方式中在第二显示界面呈现第二信息以及所述来源信息,以及在所述第二显示界面接收到特定操作时呈现所述第一信息。
  10. 如权利要求9所述的信息处理装置,其中,所述提示单元包括:
    呈现模块,配置为在所述第二显示界面呈现特定标识的组合,基于所述特定标识的组合获取操作;
    解析模块,配置为解析所述操作所触发的标识的序列与预设标识序列是否匹配,当匹配时触发所述呈现模块在所述显示界面呈现所述第一信息。
  11. 如权利要求9所述的信息处理装置,其中,所述选取单元包括:
    第一提取模块配置为从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;
    获取模块,配置为获取第一预设用户信息集合,所述第一预设用户信息集合包括至少一个用户的信息;
    第一匹配模块,配置为当所述目标用户信息表征所述通信数据仅具有一个目标用户时,将所述通信数据的来源用户信息与所述第一预设用户信息集合中的用户信息进行匹配,当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标信息提示方式。
  12. 如权利要求9所述的信息处理装置,其中,所述选取单元包括:
    第二提取模块,配置为从所述属性信息中提取出所述通信数据的来源用户信息和目标用户信息;
    第二匹配模块,配置为当所述目标用户信息表征所述通信数据具有至少两个目标用户时,将所述通信数据的来源用户信息以及目标用户信息分别与所述第一预设用户信息集合中的用户信息匹配,当匹配成功时选取所述第二信息提示方式作为所述目标信息提示方式,当匹配失败时选取所述第一信息提示方式作为所述目标提示方式。
  13. 如权利要求9所述的信息处理装置,其中,所述选取单元包括:
    第三提取模块,配置为从所述属性信息中提取出所述通信数据的目标 用户信息;
    选取模块,配置为当所述目标用户信息表征所述通信数据具有至少两个目标用户时,选取所述第一信息提示方式作为所述目标提示方式。
  14. 如权利要求9所述的信息处理装置,其中,
    所述提示单元还配置为从所述第二显示界面切换显示到第三显示界面,并从所述第三显示界面再次切换显示所述第二显示界面时,检测是否在所述第二显示界面接收到所述特定操作,如果接收到,则在所述第二显示界面呈现所述第一信息;其中,所述第三显示界面配置为显示与所述第一信息、以及所述第二信息不同的信息。
  15. 如权利要求9所述的信息处理装置,其中,所述信息处理装置还包括:
    获取单元,配置为在所述提示单元以所述第二信息提示方式提示所述第一信息时,获取第二预设用户信息集合,所述第二预设用户信息集合包括至少一个用户信息;
    匹配单元,配置为将所述通信数据的来源用户信息与所述第二预设用户信息集合中的用户信息匹配,当匹配成功时触发所述通信单元将所述第二显示界面呈现的信息记录以所述通信数据的来源用户信息为索引上传至信息存储服务器;其中,所述信息记录配置为供所述信息存储服务器响应终端设备的信息记录获取请求。
  16. 如权利要求15所述的信息处理装置,其中,所述信息处理装置还包括:
    信息记录单元,配置为在存储的信息记录中删除与特定来源用户信息对应的信息记录时,触发所述信息存储服务器、以及所述终端设备删除所存储的与所述特定来源用户信息对应的信息记录。
  17. 一种计算机可读介质,所述计算机可读介质中存储有可执行指令, 所述可执行指令用于执行权利要求1至8任一项所述的信息处理方法。
PCT/CN2016/073881 2015-03-12 2016-02-16 信息处理方法及装置、计算机可读介质 WO2016141797A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/642,331 US10691818B2 (en) 2015-03-12 2017-07-06 Secure interface for displaying of information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510109265.X 2015-03-12
CN201510109265.XA CN106033518B (zh) 2015-03-12 2015-03-12 信息处理方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/642,331 Continuation US10691818B2 (en) 2015-03-12 2017-07-06 Secure interface for displaying of information

Publications (1)

Publication Number Publication Date
WO2016141797A1 true WO2016141797A1 (zh) 2016-09-15

Family

ID=56879924

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/073881 WO2016141797A1 (zh) 2015-03-12 2016-02-16 信息处理方法及装置、计算机可读介质

Country Status (3)

Country Link
US (1) US10691818B2 (zh)
CN (1) CN106033518B (zh)
WO (1) WO2016141797A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409401A (zh) * 2018-08-30 2019-03-01 深圳市买买提信息科技有限公司 一种信息核对方法、装置和系统
CN109274576A (zh) * 2018-08-30 2019-01-25 连尚(新昌)网络科技有限公司 一种引导开启应用程序的方法及设备
CN109274582B (zh) * 2018-09-20 2021-12-10 腾讯科技(武汉)有限公司 即时通讯消息的展示方法、装置、设备及存储介质
CN112578966B (zh) * 2020-12-25 2022-09-27 维沃移动通信有限公司 应用程序切换方法、装置及电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662765A (zh) * 2008-08-29 2010-03-03 深圳富泰宏精密工业有限公司 手机短信保密系统及方法
CN101815267A (zh) * 2010-03-05 2010-08-25 惠州Tcl移动通信有限公司 一种移动通信终端短消息加密方法
CN101964962A (zh) * 2010-05-31 2011-02-02 宇龙计算机通信科技(深圳)有限公司 一种发送、接收短信的方法及装置
US20120140922A1 (en) * 2010-12-07 2012-06-07 Ramesh Annavajjala Method for Generating Private Keys in Wireless Networks
US20150003610A1 (en) * 2011-08-25 2015-01-01 Swisscom Ag Reducing detectability of an encryption key

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895607A (zh) * 2010-05-10 2010-11-24 华为终端有限公司 一种保护用户隐私信息的方法及终端
WO2012170446A2 (en) * 2011-06-05 2012-12-13 Apple Inc. Systems and methods for displaying notifications received from multiple applications
US9372978B2 (en) * 2012-01-20 2016-06-21 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9208325B2 (en) * 2012-07-26 2015-12-08 International Business Machines Corporation Protecting data on a mobile device
US9014670B2 (en) * 2012-08-01 2015-04-21 Tencent Technology (Shenzhen) Company Limited Method and mobile terminal for notifying and displaying message
US10171454B2 (en) * 2012-08-23 2019-01-01 Alejandro V. Natividad Method for producing dynamic data structures for authentication and/or password identification
US9195388B2 (en) * 2013-03-15 2015-11-24 Apple Inc. Specifying applications to share in a shared access mode
CN104144175B (zh) * 2013-05-06 2019-09-13 腾讯科技(深圳)有限公司 数据迁移的方法、装置及系统
US9400878B2 (en) * 2013-11-08 2016-07-26 Dell Products L.P. Context analysis at an information handling system to manage authentication cycles
US20150281210A1 (en) * 2014-03-31 2015-10-01 Bank Of America Corporation Password-protected application data file with decoy content
CN104318183A (zh) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 用于终端的通信信息的处理方法及装置
CN106709306A (zh) * 2016-12-01 2017-05-24 北京小米移动软件有限公司 消息阅读方法及装置
US10754962B2 (en) * 2016-12-15 2020-08-25 Blackberry Limited System for secure context-aware password management

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662765A (zh) * 2008-08-29 2010-03-03 深圳富泰宏精密工业有限公司 手机短信保密系统及方法
CN101815267A (zh) * 2010-03-05 2010-08-25 惠州Tcl移动通信有限公司 一种移动通信终端短消息加密方法
CN101964962A (zh) * 2010-05-31 2011-02-02 宇龙计算机通信科技(深圳)有限公司 一种发送、接收短信的方法及装置
US20120140922A1 (en) * 2010-12-07 2012-06-07 Ramesh Annavajjala Method for Generating Private Keys in Wireless Networks
US20150003610A1 (en) * 2011-08-25 2015-01-01 Swisscom Ag Reducing detectability of an encryption key

Also Published As

Publication number Publication date
US20170300711A1 (en) 2017-10-19
CN106033518B (zh) 2020-05-26
US10691818B2 (en) 2020-06-23
CN106033518A (zh) 2016-10-19

Similar Documents

Publication Publication Date Title
KR102307665B1 (ko) 신원 인증
US8594632B1 (en) Device to-device (D2D) discovery without authenticating through cloud
US11764966B2 (en) Systems and methods for single-step out-of-band authentication
US12041039B2 (en) System and method for endorsing a new authenticator
US8769612B2 (en) Portable device association
WO2016127845A1 (zh) 语音认证系统和设备的工作方法
US20110319056A1 (en) Remote access to a mobile device
WO2019134303A1 (zh) 直播间人气处理方法、装置、服务器及存储介质
US20140208405A1 (en) Simplified and Safe User Authentication
CN107196917B (zh) 一种服务响应方法及其中间件
WO2017045417A1 (zh) 远程控制方法、装置及移动终端
WO2016141797A1 (zh) 信息处理方法及装置、计算机可读介质
WO2014086222A1 (zh) 设置视频通话参数、和发送能力参数的方法及装置
EP2540028B1 (en) Protecting account security settings using strong proofs
US20170091483A1 (en) Method and Device for Protecting Address Book, and Communication System
WO2018099407A1 (zh) 账户认证登录方法及装置
CN104980919A (zh) 网络服务信息的获取方法及设备
CN106537962B (zh) 无线网络配置、接入和访问方法、装置及设备
US10616766B2 (en) Facilitation of seamless security data transfer for wireless network devices
US20220330020A1 (en) Methods and apparatus for automated multi-factor authentication
TW201021500A (en) Cell-phone and confidentiality protection method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16761024

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16761024

Country of ref document: EP

Kind code of ref document: A1