WO2019184617A1 - Information sharing method and device, computer-readable storage medium and terminal - Google Patents

Information sharing method and device, computer-readable storage medium and terminal Download PDF

Info

Publication number
WO2019184617A1
WO2019184617A1 PCT/CN2019/075388 CN2019075388W WO2019184617A1 WO 2019184617 A1 WO2019184617 A1 WO 2019184617A1 CN 2019075388 W CN2019075388 W CN 2019075388W WO 2019184617 A1 WO2019184617 A1 WO 2019184617A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user space
data information
user
application information
Prior art date
Application number
PCT/CN2019/075388
Other languages
French (fr)
Chinese (zh)
Inventor
张伟杰
张俊
谭春宏
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2019184617A1 publication Critical patent/WO2019184617A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Definitions

  • the present application relates to the field of terminal technologies, and in particular, to an information sharing method and apparatus, a computer readable storage medium, and a terminal.
  • the terminal can set multiple user modes for multiple users to use the same terminal.
  • users need to re-create data such as contacts and applications, which is troublesome and has a low user experience.
  • the embodiments of the present application provide an information sharing method and apparatus, a computer readable storage medium, and a terminal, so as to implement fast sharing of application information and data information, and necessary data and authority isolation.
  • An information sharing method is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles; the method comprising:
  • the application information and the data information that meet the sharing security level and belong to the second user space are provided in the first user space according to the triggering condition.
  • An information sharing apparatus is applied to a system having at least two user spaces, wherein the at least two user spaces belong to different usage roles; and the apparatus includes:
  • An information acquiring module configured to acquire application information and data information belonging to at least two user spaces in the system
  • a security archiving module for archiving the application information and the data information at a security level
  • the sharing processing module provides application information and data information that meets the sharing security level and belongs to the second user space in the first user space according to the triggering condition.
  • a computer readable storage medium having stored thereon a computer program, wherein the computer program is executed by a processor to implement the steps of the method in various embodiments of the present application.
  • a terminal comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor implements the method in various embodiments of the present application when the computer program is executed A step of.
  • the information sharing method and device, the computer readable storage medium, and the terminal provided by the embodiments of the present application can share application information and data information belonging to multiple user spaces, and perform privacy control by using security level archiving. Achieve rapid sharing of application information and data information, and can achieve the necessary data and permission isolation, while also saving data storage space.
  • FIG. 1 is a schematic diagram showing the internal structure of a terminal in an embodiment
  • FIG. 2 is a flow chart of an information sharing method in an embodiment
  • FIG. 3 is a flowchart of processing for performing security level archiving in an embodiment
  • FIG. 4 is a process flow diagram of providing application information and data information belonging to a second user space in a first user space in an embodiment
  • FIG. 5 is a process flow diagram of providing application information and data information belonging to a second user space in a first user space in another embodiment
  • FIG. 6 is a process flow diagram of providing application information and data information belonging to a second user space in a first user space in still another embodiment
  • FIG. 7 is a structural block diagram of an information sharing apparatus according to an embodiment
  • FIG. 8 is a block diagram showing a part of a structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • first may be referred to as a second user space without departing from the scope of the present invention
  • second user space may be referred to as a first user space.
  • Both the first user space and the second user space are user spaces, but not the same user space.
  • FIG. 1 a schematic diagram of an internal structure of a terminal is provided.
  • the terminal includes a processor, memory, and display connected via a system bus.
  • the processor is used to provide computing and control capabilities to support the operation of the entire terminal.
  • the memory is used to store data, programs, and/or instruction codes, etc., and the memory stores at least one computer program, which can be executed by the processor to implement the information sharing method applicable to the terminal provided in the embodiments of the present application.
  • the memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (ROM), or a random storage memory (Random-Access-Memory, RAM).
  • the memory includes a non-volatile storage medium and an internal memory.
  • Non-volatile storage media stores operating systems, databases, and computer programs.
  • the database stores data related to an information sharing method provided by the foregoing various embodiments, such as storing a preset processing policy or preset verification information.
  • the computer program can be executed by a processor for implementing an information sharing method provided by various embodiments of the present application.
  • the internal memory provides a cached operating environment for operating systems, databases, and computer programs in non-volatile storage media.
  • the display screen can be a touch screen, such as a capacitive screen or an electronic screen, for displaying interface information of the terminal.
  • the terminal can be a mobile phone, a tablet or a personal digital assistant or a wearable device.
  • the information sharing method in this embodiment is described by taking an example on the terminal.
  • the information sharing method is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles.
  • the system refers to the operating system of the terminal.
  • the operating system provides multi-user or multi-space functions, so that one terminal can open multiple spaces and be used by multiple users in a time-sharing manner, or one user can enter different spaces in different situations.
  • the space of different users and the multiple spaces of the same user will be collectively referred to as user space without distinction.
  • Use scenarios include but are not limited to:
  • a terminal has more than two users, each user has opened up a user space in the system, such as children's space, visitor space, etc.; one terminal has only one user, and the user has opened up all the systems in the system. More than two user spaces belonging to itself, such as main space and privacy space; one terminal has more than two users, each user opens up a user space in the system, and at least one of them also There is an extra privacy space of your own.
  • the owner space which is used by the owner and has the highest authority.
  • you need to use multiple users or open up multiple spaces you need to create new user space in the system.
  • other user spaces have a life cycle that begins with creation and is finally destroyed. Between creation and destruction is the survival phase.
  • the system allocates storage space for the newly created user space and prepares the running environment, including providing system applications and services. Based on this, in the user space, you can use the system application, download and install a new three-party application, and save the data of the user who uses the user space.
  • the information related to the new three-party application is called application information
  • the data related to the user is called data information.
  • the data information may be data for system applications, such as contact data, or data for three-party applications, such as WeChat data.
  • the information sharing method in an embodiment of the present application includes steps 202 to 206.
  • Step 202 Acquire application information and data information belonging to at least two user spaces in the system.
  • the at least two user spaces may refer to all user spaces in the system. It can also refer to user space that only involves information sharing.
  • the application information and the data information of the at least two user spaces are all stored in a storage space allocated for the user space. Application information and data information belonging to the user space can be obtained from the storage space of each user space. Whether the user space is running in the foreground, running in the background, or not running does not affect the reading of application information and data information from the storage space.
  • Step 204 Archive the application information and the data information at a security level.
  • Each user space has different application information and data information, and the user has different security requirements for the application information and the data information, and affects the sharing of the application information and the data information. For example, after a long period of use, the owner space has more applications and personal data. If a new user space is created, there may be some application information and data information that cannot be shared. .
  • the method of the present application archives application information and data information of each user space at a security level to distinguish the sharing security level of the application information and the data information.
  • the security level includes at least a sharing level indicating that sharing is possible and a private level indicating that sharing is not possible.
  • Step 206 Provide application information and data information that meets the shared security level and belongs to the second user space in the first user space according to the trigger condition.
  • This step may indicate that application information and data information of at least one user space are provided to the first user space, that is, other user spaces other than a certain first user space are referred to as a second user space.
  • This step may also mean that the application information and the data information of the second user space are provided to the first user space multiple times.
  • Trigger conditions are generally related to shared requirements.
  • the system usually only allocates the necessary system applications (such as phone contacts), and there is no three-party application (such as WeChat), and the system application has no user data. Therefore, the trigger condition can be formed when a user space is created.
  • application information and data information of other user spaces are automatically provided to the newly created user space. For example, when the application information and the data information in the owner space are conformed to the sharing security level, the WeChat application and the contact number list in the main space are provided to the newly created child space, privacy space or guest space, and the like.
  • the triggering condition may also be generated in other contexts. For example, when the same user enters the privacy space after downloading and installing an application in the main space, the user may actively initiate a sharing request of the application in the main space. There is no need to download again in the privacy space. It can be understood that the trigger condition can also include other similar conditions.
  • the compliance with the shared security level means that the security level of the application information and the data information of the second user space after being archived conforms to the condition that is shared to the first user space. For example, after a new user space (first user space) is created outside the main space (second user space), the application information and data information in the main space (second user space) are archived at a security level. In the simplest case, it is determined which application information and data information can be shared and which cannot be shared. After the user space (first user space) is newly created, application information and data information that can be shared in the machine main space (second user space) are provided to the newly created user space (first user space).
  • the application information and data information in the owner space may also have multiple sharing levels.
  • the sharing level is higher, the user space with lower privilege can be shared; when the sharing level is lower, the privilege is higher. User space can be shared. Or some shared security levels allow only user space access. Implementations of the present application are not limited to the above.
  • the above information sharing method can share application information and data information belonging to multiple user spaces, and perform privacy control by means of security level archiving, which can realize fast sharing of application information and data information, and can achieve necessary Data and permissions are isolated, while also saving data storage space.
  • the information sharing method is implemented by a service in a system, and each user space calls the service to implement information sharing, that is, each user space calls the service to obtain application information from other user spaces. And data information.
  • the service-based approach allows the method to be resident in the system and act as a public service, so that every user space can be called while the system is running, and it is easy to obtain the storage space of each user space. It is convenient to read application information and data information of user space.
  • the step of performing the security level archiving of the application information and the data information may include:
  • Step 302 Obtain a security level mark of the application information and the data information by the user in each user space.
  • the security level flag includes at least: a shared mark indicating that it can be shared and a private mark indicating that the share cannot be shared.
  • the security level flag may be an attribute added by the system to the application information and the data information. Under different usage conditions, the attributes of the application information and the data information may be changed by rewriting the attribute. For example, the attribute is defined as a Boolean value that can be shared. When the attribute value is true, the security level is marked as indicating a shared mark that can be shared; when the attribute value is false, the security level is marked as indicating that the attribute cannot be shared. Shared private tag.
  • the security level flag may also include a plurality of, in addition to indicating whether sharing is possible, and also indicating what permissions can be shared by the user space.
  • the attribute is defined as an enumerated type with multiple fixed values. The security level flag of the application information and data information within the user space can be specified by the user.
  • the security level flag can also be implemented without adding attributes, but by using a mapping table. For example, the correspondence between the security level and the application information and the unique identifier of the data information is written in the mapping table.
  • Step 304 Perform security level archiving on the application information and the data information according to the security level flag.
  • the purpose of archiving is to facilitate the use of application information and data information of the same security level.
  • application information and data information with attributes added application information and data information having the same attribute value are archived by reading attribute values.
  • application information and data information that implements security level marking by means of a mapping table a plurality of tables with different security level markings can be maintained. Under one category, you can aggregate the unique identifiers of application information and data information that store the same security level tag.
  • the step of providing application information and data information in a first user space that meets a shared security level and belongs to a second user space according to a trigger condition is used to implement data sharing. , but the app does not need to be migrated . That is, the above step 206 may include:
  • Step 402 Read the application information and data information belonging to the second user space.
  • the application information and the data information belonging to the second user space are saved in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background, or is not running does not affect reading application information and data information from the storage space. When the second user space runs in the foreground or runs in the background, the application information and the data information may change at any time, and when the trigger condition is satisfied, the latest application information and data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
  • the shared security level conditions that need to be met when obtaining application information and data information That is, only application information and data information that meet the sharing security level condition and belong to the second user space can be obtained.
  • Step 404 Apply the data information belonging to the second user space to the same application in the first user space.
  • the data information belonging to the second user space is applied to the same application in the first user space.
  • the WeChat chat record of the owner space is used for the newly created privacy space.
  • the WeChat chat record in the privacy space is only saved with the privacy space, so that the entire system will have a public WeChat chat record, which can be read in the owner space and read in the privacy space. It saves the storage space of the data, and also allows the owner to view all the chat records in the privacy space.
  • the system application When the system application performs data sharing, it is similar to the three-party application. For example, the contact number list of the owner space is used for a new user space for the second user to use, and the second user is not required to re-enter the contact once, so that all the contacts can be obtained quickly and quickly. Save storage space.
  • the step of providing application information and data information in a first user space that meets a shared security level and belongs to a second user space according to a trigger condition is used to implement data sharing.
  • application migration that is, the above step 206 may include:
  • Step 502 Read the application information and data information belonging to the second user space.
  • the application information and the data information belonging to the second user space are saved in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background, or is not running does not affect reading application information and data information from the storage space. When the second user space runs in the foreground or runs in the background, the application information and the data information may change at any time, and when the trigger condition is satisfied, the latest application information and data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
  • the shared security level conditions that need to be met when obtaining application information and data information That is, only application information and data information that meet the sharing security level condition and belong to the second user space can be obtained.
  • Step 504 Migrate the application information and data information belonging to the second user space into the first user space.
  • the data information belonging to the second user space is applied to the same application in the first user space.
  • the WeChat chat record of the owner space is used for the newly created privacy space.
  • the WeChat chat record in the privacy space is only saved with the privacy space, so that the entire system will have a public WeChat chat record, which can be read in the owner space and read in the privacy space. It saves the storage space of the data, and also allows the owner to view all the chat records in the privacy space.
  • the system application performs data sharing, it is similar to the three-party application. For example, the contact number list of the owner space is used for a new user space for the second user to use, and the second user is not required to re-enter the contact once, so that all the contacts can be obtained quickly and quickly. Save storage space.
  • the system application itself is at the system level and has features that can be shared. Therefore, system applications do not need to be migrated, only data sharing or data migration is required. Three-way applications are used in multiple user spaces and can only be installed and downloaded in each user space.
  • the application information sharing manner can be used to implement the migration of application information between user spaces.
  • the migration includes several cases, one is completely transferred from the second user space to the first user space, that is, the application information and the data information are not retained in the second user space; the second is to copy the application information and the data information from the second user space to In the first user space; third, the application information is copied from the second user space, and the data information is shared.
  • the step of providing application information and data information in the first user space that meets the shared security level and belongs to the second user space according to the trigger condition is used to implement data sharing.
  • the selected application information and data information migration that is, the above step 206 may include:
  • Step 602 Read the application information and data information belonging to the second user space.
  • the application information and the data information belonging to the second user space are saved in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background, or is not running does not affect reading application information and data information from the storage space. When the second user space runs in the foreground or runs in the background, the application information and the data information may change at any time, and when the trigger condition is satisfied, the latest application information and data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
  • the shared security level conditions that need to be met when obtaining application information and data information That is, only application information and data information that meet the sharing security level condition and belong to the second user space can be obtained.
  • Step 604 Display the list of application information and data information belonging to the second user space in the first user space.
  • step 206 may indicate that application information and data information of at least one user space are provided to the first user space, that is, other user spaces other than a certain first user space are referred to as a second user space.
  • step 206 may also indicate that the application information and the data information of the second user space are provided to the first user space multiple times.
  • the representation of the data information may include a message digest, the last update time, the amount of space occupied by the information, and the like.
  • Step 606 In the first user space, select application information and data information to be migrated from the list.
  • the selection may include separately selecting an application to be migrated, separately selecting data to be migrated, and simultaneously selecting application information and data information to be migrated. For example, in the newly created privacy space, only the required applications are migrated, and the data is shared. For another example, the privacy data of the owner space is migrated into the privacy space. For another example, for a plurality of data applied in multiple user spaces, one of the latest ones is migrated.
  • the selection method is not limited to the above.
  • Step 608 Migrate the selected application information and data information into the first user space.
  • the system application itself is at the system level and has features that can be shared. Therefore, the system application does not need to be migrated, only data sharing or data migration is required.
  • Three-way applications are used in multiple user spaces and can only be installed and downloaded in each user space.
  • the application information and the data information sharing manner can realize the migration of the application information and the data information between user spaces.
  • the migration includes several cases, one is completely transferred from the second user space to the first user space, that is, the application information and the data information are not retained in the second user space; the second is to copy the application information and the data information from the second user space to In the first user space; third, the application information is copied from the second user space, and the data information is shared. Regardless of which method is selected in step 606, migration can be performed.
  • data sharing and data migration can be performed to ensure data consistency. Better data usage across multiple user spaces when security level conditions are met.
  • the foregoing process may further include: synchronizing data information of the same application of at least two user spaces. Synchronization is a continuous work after the migration is completed, and data consistency can be maintained in a good and real-time manner.
  • FIGS. 1-6 are sequentially displayed as indicated by the arrows, these steps are not necessarily performed in the order indicated by the arrows. Except as explicitly stated herein, the execution of these steps is not strictly limited, and the steps may be performed in other orders. Moreover, at least some of the steps in FIGS. 1-6 may include a plurality of sub-steps or stages, which are not necessarily performed at the same time, but may be executed at different times, these sub-steps or stages The order of execution is not necessarily performed sequentially, but may be performed alternately or alternately with at least a portion of other steps or sub-steps or stages of other steps.
  • FIG. 7 is a structural block diagram of an information sharing apparatus according to an embodiment of the present application.
  • the information sharing device is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles; the device comprising:
  • the information obtaining module 702 is configured to acquire application information and data information belonging to at least two user spaces in the system;
  • the security archive module 704 is configured to perform security level archiving of the application information and the data information
  • the sharing processing module 706 provides application information and data information that meets the shared security level and belongs to the second user space in the first user space according to the trigger condition.
  • the information sharing device is implemented using a service component in the system, each user space invoking the service component to obtain application information and data information from other user spaces.
  • the secure archive module 704 includes:
  • a marking unit configured to acquire, by using a user space, a security level mark of the application information and the data information by the user;
  • An archiving unit configured to perform security level archiving on the application information and the data information according to the security level flag
  • the security level flag includes at least: a shared mark indicating that the share can be shared and a private mark indicating that the share cannot be shared.
  • the sharing processing module 706 includes:
  • a reading unit configured to read the application information and data information belonging to the second user space
  • an application unit configured to apply the data information belonging to the second user space to the same application in the first user space.
  • the sharing processing module 706 includes:
  • a reading unit configured to read the application information and data information belonging to the second user space
  • a migration unit configured to migrate the application information and the data information that belong to the second user space into the first user space.
  • the sharing processing module 706 further includes:
  • a display unit configured to display, in the first user space, the list of application information and data information belonging to the second user space;
  • a selecting unit configured to select application information and data information to be migrated from the list in the first user space
  • a migration unit configured to migrate the selected application information and data information into the first user space.
  • the information sharing device further includes: a synchronization module, configured to synchronize data information of the same application of at least two user spaces.
  • the various modules in the above information processing apparatus may be implemented in whole or in part by software, hardware, and combinations thereof.
  • Each of the above modules may be embedded in or independent of the processor in the computer device, or may be stored in a memory in the computer device in a software form, so that the processor invokes the operations corresponding to the above modules.
  • each module in the information processing apparatus provided in the embodiments of the present application may be in the form of a computer program.
  • the computer program can run on a terminal or server.
  • the program modules of the computer program can be stored on the memory of the terminal or server.
  • the embodiment of the present application also provides a computer readable storage medium.
  • One or more non-transitory computer readable storage media containing computer executable instructions that, when executed by one or more processors, cause the processor to perform the steps of the information sharing method.
  • a computer program product comprising instructions that, when run on a computer, cause the computer to perform an information sharing method.
  • the embodiment of the present application further provides a terminal.
  • a terminal As shown in FIG. 8 , for the convenience of description, only the parts related to the embodiments of the present application are shown. For details that are not disclosed, refer to the method part of the embodiment of the present application.
  • the terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the terminal is a mobile phone as an example:
  • FIG. 8 is a block diagram showing a part of a structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components.
  • RF radio frequency
  • the RF circuit 810 can be used for receiving and transmitting information during the transmission or reception of information, and can receive and send the downlink information of the base station, and then send the uplink data to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 810 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • the memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820.
  • the memory 820 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application required for at least one function (such as an application of a sound playing function, an application of an image playing function, etc.);
  • the data storage area can store data (such as audio data, address book, etc.) created according to the use of the mobile phone.
  • memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the handset 800.
  • the input unit 830 may include an operation panel 831 and other input devices 832.
  • the operation panel 831 which may also be referred to as a touch screen, may collect touch operations on or near the user (such as an operation of the user using a finger, a stylus, or the like on any of the appropriate objects or accessories on or near the operation panel 831) And drive the corresponding connection device according to a preset program.
  • the operation panel 831 can include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 880 is provided and can receive commands from the processor 880 and execute them.
  • the operation panel 831 can be realized by various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 830 may also include other input devices 832.
  • other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.).
  • the display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 840 can include a display panel 841.
  • the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the operation panel 831 can cover the display panel 841, and when the operation panel 831 detects a touch operation thereon or nearby, it is transmitted to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event The type provides a corresponding visual output on display panel 841.
  • the operation panel 831 and the display panel 841 are two separate components to implement the input and input functions of the mobile phone, in some embodiments, the operation panel 831 and the display panel 841 may be integrated to implement the mobile phone. Input and output functions.
  • the handset 800 can also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a distance sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the distance sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight.
  • the motion sensor may include an acceleration sensor, and the acceleration sensor can detect the magnitude of the acceleration in each direction, and the magnitude and direction of the gravity can be detected at rest, and can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching), and vibration recognition related functions (such as Pedometer, tapping, etc.; in addition, the phone can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors.
  • the acceleration sensor can detect the magnitude of the acceleration in each direction, and the magnitude and direction of the gravity can be detected at rest, and can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching), and vibration recognition related functions (such as Pedometer, tapping, etc.; in addition, the phone can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors.
  • Audio circuitry 860, speaker 861, and microphone 862 can provide an audio interface between the user and the handset.
  • the audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then processed by the audio data output processor 880, sent to another mobile phone via the RF circuit 810, or outputted to the memory 820 for subsequent processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone 800 and can be omitted as needed.
  • the processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The various functions of the mobile phone and the processing of the data, so that the overall monitoring of the mobile phone.
  • processor 880 can include one or more processing units.
  • processor 880 can integrate an application processor and a modem, where the application processor primarily processes an operating system, user interface, applications, etc.; the modem primarily handles wireless communications. It will be appreciated that the above modem may also not be integrated into the processor 880.
  • the processor 880 can integrate an application processor and a baseband processor, and the baseband processor and other peripheral chips can form a modem.
  • the mobile phone 800 also includes a power source 890 (such as a battery) that supplies power to various components.
  • the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the handset 800 can also include a camera, a Bluetooth module, and the like.
  • the processor included in the mobile phone implements the information sharing method described above when executing a computer program stored in the memory.
  • Non-volatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM), which acts as an external cache.
  • RAM is available in a variety of forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization.
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM dual data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM Link (Synchlink) DRAM
  • SLDRAM Memory Bus
  • Rambus Direct RAM
  • RDRAM Direct Memory Bus Dynamic RAM
  • RDRAM Memory Bus Dynamic RAM

Abstract

The present application relates to an information sharing method and device, a computer-readable storage medium and a terminal. The method is applicable to a system having at least two user spaces, wherein the at least two user spaces belong to different use roles. The method comprises: acquiring application information and data information in a system which belong to at least two user spaces; carrying out security level archiving on the application information and the data information; and providing application information and data information, which conform to a sharing security level and which belong to a second user space, in a first user space according to a triggering condition.

Description

信息共享方法和装置、计算机可读存储介质、终端Information sharing method and device, computer readable storage medium, terminal
相关申请的交叉引用Cross-reference to related applications
本申请要求于2018年3月29日提交中国专利局、申请号为CN2018102702308、申请名称为“信息共享方法和装置、计算机可读存储介质、终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed on March 29, 2018, the Chinese Patent Office, the application number is CN2018102702308, and the application name is "information sharing method and device, computer readable storage medium, terminal", the entire contents of which are The citations are incorporated herein by reference.
技术领域Technical field
本申请涉及终端技术领域,特别是涉及一种信息共享方法和装置、计算机可读存储介质、终端。The present application relates to the field of terminal technologies, and in particular, to an information sharing method and apparatus, a computer readable storage medium, and a terminal.
背景技术Background technique
随着终端设备进入智能时代,手机、通讯平板等移动终端在人们的生活中扮演越来越重要的角色。通过各种软件应用,可以在社交、购物、娱乐、工作、学习等方面满足人们的不同需求。As terminal devices enter the era of intelligence, mobile terminals such as mobile phones and communication tablets play an increasingly important role in people's lives. Through various software applications, people can meet different needs in social, shopping, entertainment, work, and learning.
目前,终端可以设置多种用户模式以供多个用户使用同一终端。在开启新的多用户空间时,由于空间与权限的隔离,用户需要重新创建联系人、应用等数据,使用麻烦、用户体验低。Currently, the terminal can set multiple user modes for multiple users to use the same terminal. When a new multi-user space is opened, due to the isolation of space and permissions, users need to re-create data such as contacts and applications, which is troublesome and has a low user experience.
发明内容Summary of the invention
本申请实施例提供一种信息共享方法和装置、计算机可读存储介质、终端,以实现快速的应用信息和数据信息的共享,以及必要的数据和权限隔离。The embodiments of the present application provide an information sharing method and apparatus, a computer readable storage medium, and a terminal, so as to implement fast sharing of application information and data information, and necessary data and authority isolation.
一种信息共享方法,应用于具有至少两个用户空间的系统,所述至少两个用户空间属于不同的使用角色;所述方法包括:An information sharing method is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles; the method comprising:
获取系统中的属于至少两个用户空间的应用信息和数据信息;Obtaining application information and data information belonging to at least two user spaces in the system;
将所述应用信息和数据信息进行安全级别归档;Archiving the application information and data information at a security level;
根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息。The application information and the data information that meet the sharing security level and belong to the second user space are provided in the first user space according to the triggering condition.
一种信息共享装置,应用于具有至少两个用户空间的系统,所述至少两 个用户空间属于不同的使用角色;其特征在于,所述装置包括:An information sharing apparatus is applied to a system having at least two user spaces, wherein the at least two user spaces belong to different usage roles; and the apparatus includes:
信息获取模块,用于获取系统中的属于至少两个用户空间的应用信息和数据信息;An information acquiring module, configured to acquire application information and data information belonging to at least two user spaces in the system;
安全归档模块,用于将所述应用信息和数据信息进行安全级别归档;a security archiving module for archiving the application information and the data information at a security level;
共享处理模块,根据触发条件在所述第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息。The sharing processing module provides application information and data information that meets the sharing security level and belongs to the second user space in the first user space according to the triggering condition.
一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现本申请各个实施例中的所述方法的步骤。A computer readable storage medium having stored thereon a computer program, wherein the computer program is executed by a processor to implement the steps of the method in various embodiments of the present application.
一种终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现本申请各个实施例中的所述方法的步骤。A terminal comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor implements the method in various embodiments of the present application when the computer program is executed A step of.
本申请实施例所提供的信息共享方法和装置、计算机可读存储介质、终端,能够将属于多个用户空间的应用信息和数据信息进行共享,并采用安全级别归档的方式进行隐私控制,既能够实现快速的应用信息和数据信息的共享,又可以做到必要的数据和权限隔离,同时还能够节省数据的保存空间。The information sharing method and device, the computer readable storage medium, and the terminal provided by the embodiments of the present application can share application information and data information belonging to multiple user spaces, and perform privacy control by using security level archiving. Achieve rapid sharing of application information and data information, and can achieve the necessary data and permission isolation, while also saving data storage space.
附图说明DRAWINGS
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings to be used in the embodiments or the prior art description will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present application, and other drawings can be obtained according to the drawings without any creative work for those skilled in the art.
图1为一个实施例中终端的内部结构示意图;1 is a schematic diagram showing the internal structure of a terminal in an embodiment;
图2为一个实施例中信息共享方法的流程图;2 is a flow chart of an information sharing method in an embodiment;
图3为一个实施例中进行安全级别归档的处理流程图;3 is a flowchart of processing for performing security level archiving in an embodiment;
图4为一个实施例中在第一用户空间内提供属于第二用户空间的应用信息和数据信息的处理流程图;4 is a process flow diagram of providing application information and data information belonging to a second user space in a first user space in an embodiment;
图5为另一个实施例中在第一用户空间内提供属于第二用户空间的应用信息和数据信息的处理流程图;5 is a process flow diagram of providing application information and data information belonging to a second user space in a first user space in another embodiment;
图6为再一个实施例中在第一用户空间内提供属于第二用户空间的应用 信息和数据信息的处理流程图;6 is a process flow diagram of providing application information and data information belonging to a second user space in a first user space in still another embodiment;
图7为一实施例的信息共享装置的结构框图;FIG. 7 is a structural block diagram of an information sharing apparatus according to an embodiment; FIG.
图8为与本申请实施例提供的终端相关的手机的部分结构的框图。FIG. 8 is a block diagram showing a part of a structure of a mobile phone related to a terminal provided by an embodiment of the present application.
具体实施方式detailed description
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the objects, technical solutions, and advantages of the present application more comprehensible, the present application will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the application and are not intended to be limiting.
可以理解,本发明所使用的术语“第一”、“第二”等可在本文中用于描述各种元件,但这些元件不受这些术语限制。这些术语仅用于将第一个元件与另一个元件区分。举例来说,在不脱离本发明的范围的情况下,可以将第一用户空间称为第二用户空间,且类似地,可将第二用户空间称为第一用户空间。第一用户空间和第二用户空间两者都是用户空间,但不是同一用户空间。It will be understood that the terms "first", "second" and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, the first user space may be referred to as a second user space without departing from the scope of the present invention, and similarly, the second user space may be referred to as a first user space. Both the first user space and the second user space are user spaces, but not the same user space.
在一个实施例中,如图1所示,提供了一种终端的内部结构示意图。该终端包括通过系统总线连接的处理器、存储器和显示屏。其中,该处理器用于提供计算和控制能力,支撑整个终端的运行。存储器用于存储数据、程序、和/或指令代码等,存储器上存储至少一个计算机程序,该计算机程序可被处理器执行,以实现本申请实施例中提供的适用于终端的信息共享方法。存储器可包括磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random-Access-Memory,RAM)等。例如,在一个实施例中,存储器包括非易失性存储介质及内存储器。非易失性存储介质存储有操作系统、数据库和计算机程序。该数据库中存储有用于实现以上各个实施例所提供的一种信息共享方法相关的数据,比如可存储预设处理策略或预设验证信息等。该计算机程序可被处理器所执行,以用于实现本申请各个实施例所提供的一种信息共享方法。内存储器为非易失性存储介质中的操作系统、数据库和计算机程序提供高速缓存的运行环境。显示屏可 以是触摸屏,比如为电容屏或电子屏,用于显示终端的界面信息。该终端可以是手机、平板电脑或者个人数字助理或穿戴式设备等。In one embodiment, as shown in FIG. 1, a schematic diagram of an internal structure of a terminal is provided. The terminal includes a processor, memory, and display connected via a system bus. The processor is used to provide computing and control capabilities to support the operation of the entire terminal. The memory is used to store data, programs, and/or instruction codes, etc., and the memory stores at least one computer program, which can be executed by the processor to implement the information sharing method applicable to the terminal provided in the embodiments of the present application. The memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (ROM), or a random storage memory (Random-Access-Memory, RAM). For example, in one embodiment, the memory includes a non-volatile storage medium and an internal memory. Non-volatile storage media stores operating systems, databases, and computer programs. The database stores data related to an information sharing method provided by the foregoing various embodiments, such as storing a preset processing policy or preset verification information. The computer program can be executed by a processor for implementing an information sharing method provided by various embodiments of the present application. The internal memory provides a cached operating environment for operating systems, databases, and computer programs in non-volatile storage media. The display screen can be a touch screen, such as a capacitive screen or an electronic screen, for displaying interface information of the terminal. The terminal can be a mobile phone, a tablet or a personal digital assistant or a wearable device.
本实施例中的信息共享方法,以运行于终端上为例进行描述。所述信息共享方法应用于具有至少两个用户空间的系统,所述至少两个用户空间属于不同的使用角色。The information sharing method in this embodiment is described by taking an example on the terminal. The information sharing method is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles.
本申请中,系统是指终端的操作系统。该操作系统提供多用户或多空间的功能,使得一部终端可以开辟多个空间被多个用户分时使用,或者一个用户在不同的情境下进入不同的空间使用。本申请中将不作区分地将不同用户的空间和同一用户的多个空间统一称为用户空间。当同一用户使用不同的用户空间时,也认为其具有不同的使用角色。使用情境包括但不限于:In this application, the system refers to the operating system of the terminal. The operating system provides multi-user or multi-space functions, so that one terminal can open multiple spaces and be used by multiple users in a time-sharing manner, or one user can enter different spaces in different situations. In this application, the space of different users and the multiple spaces of the same user will be collectively referred to as user space without distinction. When the same user uses different user spaces, they are also considered to have different usage roles. Use scenarios include but are not limited to:
一部终端具有两个以上的用户,每个用户均在系统中开辟了一个属于自身的用户空间,例如儿童空间、访客空间等;一部终端只具有一个用户,该用户在系统中开辟了均属于自身的两个以上的用户空间,例如主空间和隐私空间;一部终端具有两个以上的用户,每个用户均在系统中开辟了一个属于自身的用户空间,并且其中至少有一个用户还额外有一个属于自己的隐私空间。A terminal has more than two users, each user has opened up a user space in the system, such as children's space, visitor space, etc.; one terminal has only one user, and the user has opened up all the systems in the system. More than two user spaces belonging to itself, such as main space and privacy space; one terminal has more than two users, each user opens up a user space in the system, and at least one of them also There is an extra privacy space of your own.
可以理解的是,传统的多用户或多空间的方案中,两个用户空间之间需要进行数据和权限的隔离,以防止多个用户空间的使用相互干扰。因此难免出现多个用户空间的信息重复。It can be understood that in the traditional multi-user or multi-space solution, data and authority isolation are needed between the two user spaces to prevent the use of multiple user spaces from interfering with each other. Therefore, it is inevitable that information in multiple user spaces will be duplicated.
对于提供多用户或多空间的系统而言,在用户初次使用时,系统中一般只有一个空间(通常称为机主空间,给机主使用,具有最高的权限)。当需要给多用户使用或者开辟多空间使用时,需要在系统中新建用户空间。除了机主空间以外,其他的用户空间均存在生命周期,该生命周期始于创建、终于销毁。在创建和销毁之间的则为存续阶段。For a system that provides multiple users or multiple spaces, when the user first uses it, there is usually only one space in the system (usually called the owner space, which is used by the owner and has the highest authority). When you need to use multiple users or open up multiple spaces, you need to create new user space in the system. In addition to the owner space, other user spaces have a life cycle that begins with creation and is finally destroyed. Between creation and destruction is the survival phase.
在创建用户空间时,系统为新建的用户空间分配存储空间,准备运行环境,其中包括提供系统应用和服务。在此基础之上,在用户空间内,既可以使用系统应用,也可以下载和安装新的三方应用,并保存使用该用户空间的用户的数据。其中,与新的三方应用相关的信息称为应用信息,与用户相关的数据称为数据信息。需要说明的是,数据信息既可以是针对系统应用的数 据,例如联系人数据,也可以是针对三方应用的数据,例如微信数据。When creating user space, the system allocates storage space for the newly created user space and prepares the running environment, including providing system applications and services. Based on this, in the user space, you can use the system application, download and install a new three-party application, and save the data of the user who uses the user space. Among them, the information related to the new three-party application is called application information, and the data related to the user is called data information. It should be noted that the data information may be data for system applications, such as contact data, or data for three-party applications, such as WeChat data.
在用户空间的存续阶段,随着用户的使用,应用信息和数据信息都会不断发生变化。例如联系人号码逐渐增加、微信聊天记录逐渐增多等。In the user's space, application information and data information will continue to change with the user's use. For example, the contact number is gradually increasing, and the WeChat chat record is gradually increasing.
在销毁用户空间时,将删除用户空间内的应用信息和数据信息并释放为其分配的存储空间。When the user space is destroyed, the application information and data information in the user space are deleted and the storage space allocated for it is released.
本申请一实施例的信息共享方法如图2所示,包括步骤202至步骤206。As shown in FIG. 2, the information sharing method in an embodiment of the present application includes steps 202 to 206.
步骤202:获取系统中的属于至少两个用户空间的应用信息和数据信息。Step 202: Acquire application information and data information belonging to at least two user spaces in the system.
所述至少两个用户空间可以是指系统中的所有的用户空间。也可以是指仅涉及信息共享的用户空间。所述至少两个用户空间的应用信息和数据信息均保存在为该用户空间分配的存储空间中。能够从每个用户空间的存储空间中获取到属于该用户空间的应用信息和数据信息。用户空间是否在前台运行、后台运行或者未运行,均不影响从存储空间中读取应用信息和数据信息。The at least two user spaces may refer to all user spaces in the system. It can also refer to user space that only involves information sharing. The application information and the data information of the at least two user spaces are all stored in a storage space allocated for the user space. Application information and data information belonging to the user space can be obtained from the storage space of each user space. Whether the user space is running in the foreground, running in the background, or not running does not affect the reading of application information and data information from the storage space.
步骤204:将所述应用信息和数据信息进行安全级别归档。Step 204: Archive the application information and the data information at a security level.
每个用户空间具有的应用信息和数据信息不同,所属用户对其应用信息和数据信息的安全需求不一样,都影响应用信息和数据信息的共享。例如,机主空间在使用很长一段时间以后,其上的应用数量和个人数据都较多,此时若创建新的用户空间,较多的可能是有一些应用信息和数据信息是不能共享的。为此,本申请的方法将每个用户空间的应用信息和数据信息都进行安全级别归档,以分辨应用信息和数据信息的分享安全级别。在一些实施例中,所述安全级别至少包括表示可以共享的共享级别和表示不能共享的私有级别。Each user space has different application information and data information, and the user has different security requirements for the application information and the data information, and affects the sharing of the application information and the data information. For example, after a long period of use, the owner space has more applications and personal data. If a new user space is created, there may be some application information and data information that cannot be shared. . To this end, the method of the present application archives application information and data information of each user space at a security level to distinguish the sharing security level of the application information and the data information. In some embodiments, the security level includes at least a sharing level indicating that sharing is possible and a private level indicating that sharing is not possible.
步骤206:根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息。Step 206: Provide application information and data information that meets the shared security level and belongs to the second user space in the first user space according to the trigger condition.
本步骤可以表示将至少一个用户空间的应用信息和数据信息提供给第一用户空间,即某个第一用户空间之外的其他用户空间均称为第二用户空间。本步骤也可以表示将第二用户空间的应用信息和数据信息多次提供给第一用户空间。This step may indicate that application information and data information of at least one user space are provided to the first user space, that is, other user spaces other than a certain first user space are referred to as a second user space. This step may also mean that the application information and the data information of the second user space are provided to the first user space multiple times.
触发条件一般与共享需求相关。在新建一个用户空间时,系统通常只分配必要的系统应用(例如电话联系人),而没有三方应用(例如微信),系统 应用也没有用户数据。故该触发条件可以是在一个用户空间创建完成时形成。当一个用户空间新建时,自动将其他用户空间的应用信息和数据信息提供给该新建的用户空间。例如,在将机主空间内的应用信息和数据信息符合共享安全级别时,将机主空间内的微信应用和联系人号码列表提供给新创建的儿童空间、隐私空间或者访客空间等等。Trigger conditions are generally related to shared requirements. When creating a new user space, the system usually only allocates the necessary system applications (such as phone contacts), and there is no three-party application (such as WeChat), and the system application has no user data. Therefore, the trigger condition can be formed when a user space is created. When a user space is newly created, application information and data information of other user spaces are automatically provided to the newly created user space. For example, when the application information and the data information in the owner space are conformed to the sharing security level, the WeChat application and the contact number list in the main space are provided to the newly created child space, privacy space or guest space, and the like.
触发条件还可以是在其他情境下产生,例如,当在机主空间下载并安装某应用后,同一用户进入到隐私空间时,可以由用户主动发起机主空间的该应用的共享的请求,而不需要在隐私空间中再进行下载。可以理解,触发条件还可以包括其他类似的条件。The triggering condition may also be generated in other contexts. For example, when the same user enters the privacy space after downloading and installing an application in the main space, the user may actively initiate a sharing request of the application in the main space. There is no need to download again in the privacy space. It can be understood that the trigger condition can also include other similar conditions.
符合共享安全级别是指第二用户空间的应用信息和数据信息的在归档后的安全级别符合被共享到第一用户空间的条件。例如,机主空间(第二用户空间)之外新建一个用户空间(第一用户空间)后,机主空间(第二用户空间)内的应用信息和数据信息都进行了安全级别归档。以最简单的情况来说,就是确定了哪些应用信息和数据信息可以共享,哪些不能共享。在用户空间(第一用户空间)新建完成后,机主空间(第二用户空间)内可以共享的应用信息和数据信息均被提供给新建的用户空间(第一用户空间)。The compliance with the shared security level means that the security level of the application information and the data information of the second user space after being archived conforms to the condition that is shared to the first user space. For example, after a new user space (first user space) is created outside the main space (second user space), the application information and data information in the main space (second user space) are archived at a security level. In the simplest case, it is determined which application information and data information can be shared and which cannot be shared. After the user space (first user space) is newly created, application information and data information that can be shared in the machine main space (second user space) are provided to the newly created user space (first user space).
在其他情境中,机主空间内应用信息和数据信息还可以有多个共享级别,当共享级别更高时,权限更低的用户空间可以获得共享;当共享级别更低时,权限更高的用户空间可以获得共享。或者某些共享安全级别仅允许指定用户空间访问。本申请的实现方式不限于上述。In other scenarios, the application information and data information in the owner space may also have multiple sharing levels. When the sharing level is higher, the user space with lower privilege can be shared; when the sharing level is lower, the privilege is higher. User space can be shared. Or some shared security levels allow only user space access. Implementations of the present application are not limited to the above.
上述信息共享方法,能够将属于多个用户空间的应用信息和数据信息进行共享,并采用安全级别归档的方式进行隐私控制,既能够实现快速的应用信息和数据信息的共享,又可以做到必要的数据和权限隔离,同时还能够节省数据的保存空间。The above information sharing method can share application information and data information belonging to multiple user spaces, and perform privacy control by means of security level archiving, which can realize fast sharing of application information and data information, and can achieve necessary Data and permissions are isolated, while also saving data storage space.
在一些实施例中,所述信息共享方法采用系统中的服务(Service)实现,每个用户空间均调用该服务实现信息共享,即每个用户空间均调用该服务实现从其他用户空间获得应用信息和数据信息。基于服务的方式,可以使该方法常驻于系统中运行,并作为一个公有的服务,使得系统在运行时,每个用户空间都可以调用,并且也容易取得每个用户空间的存储空间的权限,方便 读取用户空间的应用信息和数据信息。In some embodiments, the information sharing method is implemented by a service in a system, and each user space calls the service to implement information sharing, that is, each user space calls the service to obtain application information from other user spaces. And data information. The service-based approach allows the method to be resident in the system and act as a public service, so that every user space can be called while the system is running, and it is easy to obtain the storage space of each user space. It is convenient to read application information and data information of user space.
在一些实施例中,如图3所示,所述将所述应用信息和数据信息进行安全级别归档的步骤,即上述步骤202可以包括:In some embodiments, as shown in FIG. 3, the step of performing the security level archiving of the application information and the data information, that is, the foregoing step 202 may include:
步骤302:在各个用户空间下,获取用户对所述应用信息和数据信息的安全级别标记。Step 302: Obtain a security level mark of the application information and the data information by the user in each user space.
所述安全级别标记至少包括:表示可以共享的共享标记和表示不能共享的私有标记。该安全级别标记可以是系统为应用信息和数据信息添加的属性,在不同的使用条件下,可以通过对该属性进行改写来改变应用信息和数据信息的属性。例如将该属性定义为是否可以共享的布尔值,当该属性值为真时,所述安全级别标记为表示可以共享的共享标记;当该属性值为假时,所述安全级别标记为表示不能共享的私有标记。在其他实施例中,安全级别标记还可以包括多个,除了表示能否共享之外,还表示能被什么权限的用户空间共享。此时,该属性定义为具有多个固定值的枚举类型。可以由用户对其用户空间内的应用信息和数据信息的安全级别标记进行指定。The security level flag includes at least: a shared mark indicating that it can be shared and a private mark indicating that the share cannot be shared. The security level flag may be an attribute added by the system to the application information and the data information. Under different usage conditions, the attributes of the application information and the data information may be changed by rewriting the attribute. For example, the attribute is defined as a Boolean value that can be shared. When the attribute value is true, the security level is marked as indicating a shared mark that can be shared; when the attribute value is false, the security level is marked as indicating that the attribute cannot be shared. Shared private tag. In other embodiments, the security level flag may also include a plurality of, in addition to indicating whether sharing is possible, and also indicating what permissions can be shared by the user space. At this point, the attribute is defined as an enumerated type with multiple fixed values. The security level flag of the application information and data information within the user space can be specified by the user.
安全级别标记也可以不使用添加属性的方式实现,而采用映射表的方式实现。例如在映射表中写入安全级别和应用信息、数据信息的唯一标识的对应关系。The security level flag can also be implemented without adding attributes, but by using a mapping table. For example, the correspondence between the security level and the application information and the unique identifier of the data information is written in the mapping table.
步骤304:根据所述安全级别标记对所述应用信息和数据信息进行安全级别归档。Step 304: Perform security level archiving on the application information and the data information according to the security level flag.
归档的目的是方便将同一安全级别的应用信息和数据信息进行符合条件的使用。The purpose of archiving is to facilitate the use of application information and data information of the same security level.
对于添加了属性的应用信息和数据信息,通过读取属性值,将具有相同属性值的应用信息和数据信息进行归档。对于通过映射表的方式实现安全级别标记的应用信息和数据信息,可以维护多张不同安全级别标记的表格。在一个分类下可以聚集存储同一安全级别标记的应用信息和数据信息的唯一标识。For application information and data information with attributes added, application information and data information having the same attribute value are archived by reading attribute values. For application information and data information that implements security level marking by means of a mapping table, a plurality of tables with different security level markings can be maintained. Under one category, you can aggregate the unique identifiers of application information and data information that store the same security level tag.
经过上述处理,在步骤202中获得的所有应用信息和数据信息均具有确定的安全级别。在共享时,就可以根据安全级别进行符合共享安全级别条件的共享。Through the above processing, all the application information and the data information obtained in step 202 have a certain security level. When sharing, you can share with the security level based on the security level.
在一些实施例中,如图4所示,所述根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息的步骤, 用来实现数据共用,但应用不需要迁移。即上述步骤206可以包括: In some embodiments, as shown in FIG. 4, the step of providing application information and data information in a first user space that meets a shared security level and belongs to a second user space according to a trigger condition is used to implement data sharing. , but the app does not need to be migrated . That is, the above step 206 may include:
步骤402:读取所述属于第二用户空间的应用信息和数据信息。Step 402: Read the application information and data information belonging to the second user space.
属于第二用户空间的应用信息和数据信息保存在第二用户空间对应的存储空间中。第二用户空间是否在前台运行、后台运行或者未运行,均不影响从存储空间中读取应用信息和数据信息。当第二用户空间在前台运行或后台运行时,应用信息和数据信息可能在随时变化,当触发条件满足时,获取最新的应用信息和数据信息。当第二用户空间未运行时,随时都可以获取应用信息和数据信息。The application information and the data information belonging to the second user space are saved in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background, or is not running does not affect reading application information and data information from the storage space. When the second user space runs in the foreground or runs in the background, the application information and the data information may change at any time, and when the trigger condition is satisfied, the latest application information and data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
在获取应用信息和数据信息时,需要满足的共享安全级别条件。即只能获取到符合共享安全级别条件的、且属于第二用户空间的应用信息和数据信息。The shared security level conditions that need to be met when obtaining application information and data information. That is, only application information and data information that meet the sharing security level condition and belong to the second user space can be obtained.
步骤404:将所述属于第二用户空间的数据信息应用于第一用户空间中的相同应用。Step 404: Apply the data information belonging to the second user space to the same application in the first user space.
三方应用进行数据共用时,将属于第二用户空间的数据信息应用于第一用户空间的相同应用。例如将机主空间的微信聊天记录用于新建的隐私空间。但隐私空间的微信聊天记录只保存与隐私空间,这样整个系统中将有一份公用的微信聊天记录,既能在机主空间被读取,也能在隐私空间被读取。节省了数据的存储空间,同时也方便机主在隐私空间中查看所有的聊天记录。When the three-party application performs data sharing, the data information belonging to the second user space is applied to the same application in the first user space. For example, the WeChat chat record of the owner space is used for the newly created privacy space. However, the WeChat chat record in the privacy space is only saved with the privacy space, so that the entire system will have a public WeChat chat record, which can be read in the owner space and read in the privacy space. It saves the storage space of the data, and also allows the owner to view all the chat records in the privacy space.
系统应用进行数据共用时,与三方应用类似。例如将机主空间的联系人号码列表用于新建的一个用户空间供第二个用户使用,此时就不需要第二个用户重新录入一遍联系人,既能快捷地获得所有联系人,又能节省存储空间。When the system application performs data sharing, it is similar to the three-party application. For example, the contact number list of the owner space is used for a new user space for the second user to use, and the second user is not required to re-enter the contact once, so that all the contacts can be obtained quickly and quickly. Save storage space.
在一些实施例中,如图5所示,所述根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息的步骤, 用来实现数据共用,和应用迁移,即上述步骤206可以包括: In some embodiments, as shown in FIG. 5, the step of providing application information and data information in a first user space that meets a shared security level and belongs to a second user space according to a trigger condition is used to implement data sharing. And application migration , that is, the above step 206 may include:
步骤502:读取所述属于第二用户空间的应用信息和数据信息。Step 502: Read the application information and data information belonging to the second user space.
属于第二用户空间的应用信息和数据信息保存在第二用户空间对应的存储空间中。第二用户空间是否在前台运行、后台运行或者未运行,均不影响 从存储空间中读取应用信息和数据信息。当第二用户空间在前台运行或后台运行时,应用信息和数据信息可能在随时变化,当触发条件满足时,获取最新的应用信息和数据信息。当第二用户空间未运行时,随时都可以获取应用信息和数据信息。The application information and the data information belonging to the second user space are saved in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background, or is not running does not affect reading application information and data information from the storage space. When the second user space runs in the foreground or runs in the background, the application information and the data information may change at any time, and when the trigger condition is satisfied, the latest application information and data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
在获取应用信息和数据信息时,需要满足的共享安全级别条件。即只能获取到符合共享安全级别条件的、且属于第二用户空间的应用信息和数据信息。The shared security level conditions that need to be met when obtaining application information and data information. That is, only application information and data information that meet the sharing security level condition and belong to the second user space can be obtained.
步骤504:将所述属于第二用户空间的应用信息和数据信息迁移至第一用户空间中。Step 504: Migrate the application information and data information belonging to the second user space into the first user space.
三方应用进行数据共用时,将属于第二用户空间的数据信息应用于第一用户空间的相同应用。例如将机主空间的微信聊天记录用于新建的隐私空间。但隐私空间的微信聊天记录只保存与隐私空间,这样整个系统中将有一份公用的微信聊天记录,既能在机主空间被读取,也能在隐私空间被读取。节省了数据的存储空间,同时也方便机主在隐私空间中查看所有的聊天记录。系统应用进行数据共用时,与三方应用类似。例如将机主空间的联系人号码列表用于新建的一个用户空间供第二个用户使用,此时就不需要第二个用户重新录入一遍联系人,既能快捷地获得所有联系人,又能节省存储空间。When the three-party application performs data sharing, the data information belonging to the second user space is applied to the same application in the first user space. For example, the WeChat chat record of the owner space is used for the newly created privacy space. However, the WeChat chat record in the privacy space is only saved with the privacy space, so that the entire system will have a public WeChat chat record, which can be read in the owner space and read in the privacy space. It saves the storage space of the data, and also allows the owner to view all the chat records in the privacy space. When the system application performs data sharing, it is similar to the three-party application. For example, the contact number list of the owner space is used for a new user space for the second user to use, and the second user is not required to re-enter the contact once, so that all the contacts can be obtained quickly and quickly. Save storage space.
一般地,系统应用本身就属于系统级别,具有可以共用的特性。因此系统应用不需要迁移,只需要进行数据共用或者数据迁移。三方应用要在多个用户空间中使用,只能在每个用户空间进行安装和下载。本申请中,采用应用信息共享的方式,可以实现应用信息在用户空间之间的迁移。该迁移包括几种情况,一是从第二用户空间完全转移至第一用户空间,即第二用户空间中不保留应用信息和数据信息;二是从第二用户空间复制应用信息和数据信息到第一用户空间中;三是从第二用户空间复制应用信息,数据信息则共用。In general, the system application itself is at the system level and has features that can be shared. Therefore, system applications do not need to be migrated, only data sharing or data migration is required. Three-way applications are used in multiple user spaces and can only be installed and downloaded in each user space. In the application, the application information sharing manner can be used to implement the migration of application information between user spaces. The migration includes several cases, one is completely transferred from the second user space to the first user space, that is, the application information and the data information are not retained in the second user space; the second is to copy the application information and the data information from the second user space to In the first user space; third, the application information is copied from the second user space, and the data information is shared.
在一些实施例中,如图6所示,所述根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息的步骤, 用来实现数据共用,和有选择的应用信息和数据信息迁移,即上述步骤206可以包括: In some embodiments, as shown in FIG. 6, the step of providing application information and data information in the first user space that meets the shared security level and belongs to the second user space according to the trigger condition is used to implement data sharing. And the selected application information and data information migration , that is, the above step 206 may include:
步骤602:读取所述属于第二用户空间的应用信息和数据信息。Step 602: Read the application information and data information belonging to the second user space.
属于第二用户空间的应用信息和数据信息保存在第二用户空间对应的存储空间中。第二用户空间是否在前台运行、后台运行或者未运行,均不影响从存储空间中读取应用信息和数据信息。当第二用户空间在前台运行或后台运行时,应用信息和数据信息可能在随时变化,当触发条件满足时,获取最新的应用信息和数据信息。当第二用户空间未运行时,随时都可以获取应用信息和数据信息。The application information and the data information belonging to the second user space are saved in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background, or is not running does not affect reading application information and data information from the storage space. When the second user space runs in the foreground or runs in the background, the application information and the data information may change at any time, and when the trigger condition is satisfied, the latest application information and data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
在获取应用信息和数据信息时,需要满足的共享安全级别条件。即只能获取到符合共享安全级别条件的、且属于第二用户空间的应用信息和数据信息。The shared security level conditions that need to be met when obtaining application information and data information. That is, only application information and data information that meet the sharing security level condition and belong to the second user space can be obtained.
步骤604:在第一用户空间中展示所述属于第二用户空间的应用信息和数据信息的列表。Step 604: Display the list of application information and data information belonging to the second user space in the first user space.
将在步骤602中获取的应用信息和数据信息以列表的形式展示给用户,并提供选择。如前所述,步骤206可以表示将至少一个用户空间的应用信息和数据信息提供给第一用户空间,即某个第一用户空间之外的其他用户空间均称为第二用户空间。步骤206也可以表示将第二用户空间的应用信息和数据信息多次提供给第一用户空间。The application information and data information acquired in step 602 are presented to the user in the form of a list and provide a selection. As described above, step 206 may indicate that application information and data information of at least one user space are provided to the first user space, that is, other user spaces other than a certain first user space are referred to as a second user space. Step 206 may also indicate that the application information and the data information of the second user space are provided to the first user space multiple times.
在获取多个用户空间的应用信息和数据信息后,有必要提供给第一用户空间进行选择。列表中可以展示应用信息中的易辨识的标识,例如应用的图标。数据信息的表示则可以包括信息摘要、最近一次的更新时间、信息所占用的空间大小等等。After acquiring application information and data information of multiple user spaces, it is necessary to provide a space for the first user to select. An easily identifiable identifier in the application information, such as an icon of the application, can be displayed in the list. The representation of the data information may include a message digest, the last update time, the amount of space occupied by the information, and the like.
步骤606:在第一用户空间中,从所述列表中选择需要迁移的应用信息和数据信息。Step 606: In the first user space, select application information and data information to be migrated from the list.
该选择可以包括:单独选择要迁移的应用、单独选择要迁移的数据、同时选择要迁移的应用信息和数据信息。例如,在新建的隐私空间中仅迁移所需要的应用,数据采用共用的方式。再例如,将机主空间的隐私数据迁移到隐私空间中。再例如,对于一种应用在多个用户空间中的多份数据,因迁移其中一份最新的。选择方式不限于上述。The selection may include separately selecting an application to be migrated, separately selecting data to be migrated, and simultaneously selecting application information and data information to be migrated. For example, in the newly created privacy space, only the required applications are migrated, and the data is shared. For another example, the privacy data of the owner space is migrated into the privacy space. For another example, for a plurality of data applied in multiple user spaces, one of the latest ones is migrated. The selection method is not limited to the above.
步骤608:将选择的应用信息和数据信息迁移至第一用户空间中。Step 608: Migrate the selected application information and data information into the first user space.
一般地,系统应用本身就属于系统级别,具有可以共用的特性。因此系 统应用不需要迁移,只需要进行数据共用或者数据迁移。三方应用要在多个用户空间中使用,只能在每个用户空间进行安装和下载。本申请中,采用应用信息和数据信息共享的方式,可以实现应用信息和数据信息在用户空间之间的迁移。该迁移包括几种情况,一是从第二用户空间完全转移至第一用户空间,即第二用户空间中不保留应用信息和数据信息;二是从第二用户空间复制应用信息和数据信息到第一用户空间中;三是从第二用户空间复制应用信息,数据信息则共用。无论在步骤606中选择哪种方式,都可以进行迁移。In general, the system application itself is at the system level and has features that can be shared. Therefore, the system application does not need to be migrated, only data sharing or data migration is required. Three-way applications are used in multiple user spaces and can only be installed and downloaded in each user space. In the application, the application information and the data information sharing manner can realize the migration of the application information and the data information between user spaces. The migration includes several cases, one is completely transferred from the second user space to the first user space, that is, the application information and the data information are not retained in the second user space; the second is to copy the application information and the data information from the second user space to In the first user space; third, the application information is copied from the second user space, and the data information is shared. Regardless of which method is selected in step 606, migration can be performed.
在上述流程中,可以进行数据共用、数据迁移,都是为了保证数据的一致性。在符合安全级别条件时,能够更好地实现多个用户空间的数据使用。除此以外,在一些实施例中,还可以在上述流程中包括:将至少两个用户空间的同一应用的数据信息进行同步。同步是迁移完成后的持续性工作,能够较好地、实时地保持数据一致性。In the above process, data sharing and data migration can be performed to ensure data consistency. Better data usage across multiple user spaces when security level conditions are met. In addition, in some embodiments, the foregoing process may further include: synchronizing data information of the same application of at least two user spaces. Synchronization is a continuous work after the migration is completed, and data consistency can be maintained in a good and real-time manner.
应该理解的是,虽然图1-6的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图1-6中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the various steps in the flowcharts of FIGS. 1-6 are sequentially displayed as indicated by the arrows, these steps are not necessarily performed in the order indicated by the arrows. Except as explicitly stated herein, the execution of these steps is not strictly limited, and the steps may be performed in other orders. Moreover, at least some of the steps in FIGS. 1-6 may include a plurality of sub-steps or stages, which are not necessarily performed at the same time, but may be executed at different times, these sub-steps or stages The order of execution is not necessarily performed sequentially, but may be performed alternately or alternately with at least a portion of other steps or sub-steps or stages of other steps.
图7为本申请一实施例的信息共享装置的结构框图。信息共享装置应用于具有至少两个用户空间的系统,所述至少两个用户空间属于不同的使用角色;所述装置包括:FIG. 7 is a structural block diagram of an information sharing apparatus according to an embodiment of the present application. The information sharing device is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles; the device comprising:
信息获取模块702,用于获取系统中的属于至少两个用户空间的应用信息和数据信息;The information obtaining module 702 is configured to acquire application information and data information belonging to at least two user spaces in the system;
安全归档模块704,用于将所述应用信息和数据信息进行安全级别归档;The security archive module 704 is configured to perform security level archiving of the application information and the data information;
共享处理模块706,根据触发条件在所述第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息。The sharing processing module 706 provides application information and data information that meets the shared security level and belongs to the second user space in the first user space according to the trigger condition.
在一些实施例中,所述信息共享装置采用系统中的服务组件实现,每个 用户空间均调用该服务组件实现从其他用户空间获得应用信息和数据信息。In some embodiments, the information sharing device is implemented using a service component in the system, each user space invoking the service component to obtain application information and data information from other user spaces.
在一些实施例中,所述安全归档模块704包括:In some embodiments, the secure archive module 704 includes:
标记单元,用于在各个用户空间下,获取用户对所述应用信息和数据信息的安全级别标记;a marking unit, configured to acquire, by using a user space, a security level mark of the application information and the data information by the user;
归档单元,用于根据所述安全级别标记对所述应用信息和数据信息进行安全级别归档;An archiving unit, configured to perform security level archiving on the application information and the data information according to the security level flag;
其中,所述安全级别标记至少包括:表示可以共享的共享标记和表示不能共享的私有标记。The security level flag includes at least: a shared mark indicating that the share can be shared and a private mark indicating that the share cannot be shared.
在一些实施例中,所述共享处理模块706包括:In some embodiments, the sharing processing module 706 includes:
读取单元,用于读取所述属于第二用户空间的应用信息和数据信息;a reading unit, configured to read the application information and data information belonging to the second user space;
应用单元,用于将所述属于第二用户空间的数据信息应用于第一用户空间中的相同应用。And an application unit, configured to apply the data information belonging to the second user space to the same application in the first user space.
在一些实施例中,所述共享处理模块706包括:In some embodiments, the sharing processing module 706 includes:
读取单元,用于读取所述属于第二用户空间的应用信息和数据信息;a reading unit, configured to read the application information and data information belonging to the second user space;
迁移单元,用于将所述属于第二用户空间的应用信息和数据信息迁移至第一用户空间中。And a migration unit, configured to migrate the application information and the data information that belong to the second user space into the first user space.
在一些实施例中,所述共享处理模块706还包括:In some embodiments, the sharing processing module 706 further includes:
展示单元,用于在第一用户空间中展示所述属于第二用户空间的应用信息和数据信息的列表;a display unit, configured to display, in the first user space, the list of application information and data information belonging to the second user space;
选择单元,用于在第一用户空间中从所述列表中选择需要迁移的应用信息和数据信息;a selecting unit, configured to select application information and data information to be migrated from the list in the first user space;
迁移单元,用于将选择的应用信息和数据信息迁移至第一用户空间中。a migration unit, configured to migrate the selected application information and data information into the first user space.
在一些实施例中,所述信息共享装置还包括:同步模块,用于将至少两个用户空间的同一应用的数据信息进行同步。In some embodiments, the information sharing device further includes: a synchronization module, configured to synchronize data information of the same application of at least two user spaces.
关于信息处理装置的具体限定可以参见上文中对于信息共享方法的限定,在此不再赘述。上述信息处理装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。For the specific definition of the information processing apparatus, reference may be made to the definition of the information sharing method in the above, and details are not described herein again. The various modules in the above information processing apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. Each of the above modules may be embedded in or independent of the processor in the computer device, or may be stored in a memory in the computer device in a software form, so that the processor invokes the operations corresponding to the above modules.
本申请实施例中提供的信息处理装置中的各个模块的实现可为计算机程序的形式。该计算机程序可在终端或服务器上运行。该计算机程序构成的程序模块可存储在终端或服务器的存储器上。该计算机程序被处理器执行时,实现本申请实施例中所描述信息共享方法的步骤。The implementation of each module in the information processing apparatus provided in the embodiments of the present application may be in the form of a computer program. The computer program can run on a terminal or server. The program modules of the computer program can be stored on the memory of the terminal or server. When the computer program is executed by the processor, the steps of the information sharing method described in the embodiment of the present application are implemented.
本申请实施例还提供了一种计算机可读存储介质。一个或多个包含计算机可执行指令的非易失性计算机可读存储介质,当所述计算机可执行指令被一个或多个处理器执行时,使得所述处理器执行信息共享方法的步骤。The embodiment of the present application also provides a computer readable storage medium. One or more non-transitory computer readable storage media containing computer executable instructions that, when executed by one or more processors, cause the processor to perform the steps of the information sharing method.
一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行信息共享方法。A computer program product comprising instructions that, when run on a computer, cause the computer to perform an information sharing method.
本申请实施例还提供了一种终端。如图8所示,为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑、穿戴式设备等任意终端设备,以终端为手机为例:The embodiment of the present application further provides a terminal. As shown in FIG. 8 , for the convenience of description, only the parts related to the embodiments of the present application are shown. For details that are not disclosed, refer to the method part of the embodiment of the present application. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the terminal is a mobile phone as an example:
图8为与本申请实施例提供的终端相关的手机的部分结构的框图。参考图8,手机包括:射频(Radio Frequency,RF)电路810、存储器820、输入单元830、显示单元840、传感器850、音频电路860、无线保真(wireless fidelity,WiFi)模块870、处理器880、以及电源890等部件。本领域技术人员可以理解,图8所示的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 8 is a block diagram showing a part of a structure of a mobile phone related to a terminal provided by an embodiment of the present application. Referring to FIG. 8, the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components. It will be understood by those skilled in the art that the structure of the mobile phone shown in FIG. 8 does not constitute a limitation to the mobile phone, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
其中,RF电路810可用于收发信息或通话过程中,信号的接收和发送,可将基站的下行信息接收后,给处理器880处理;也可以将上行的数据发送给基站。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路810还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access, WCDMA)、长期演进(Long Term Evolution,LTE))、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 810 can be used for receiving and transmitting information during the transmission or reception of information, and can receive and send the downlink information of the base station, and then send the uplink data to the base station. Generally, RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), etc.
存储器820可用于存储软件程序以及模块,处理器880通过运行存储在存储器820的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器820可主要包括程序存储区和数据存储区,其中,程序存储区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能的应用程序、图像播放功能的应用程序等)等;数据存储区可存储根据手机的使用所创建的数据(比如音频数据、通讯录等)等。此外,存储器820可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820. The memory 820 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application required for at least one function (such as an application of a sound playing function, an application of an image playing function, etc.); The data storage area can store data (such as audio data, address book, etc.) created according to the use of the mobile phone. Moreover, memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
输入单元830可用于接收输入的数字或字符信息,以及产生与手机800的用户设置以及功能控制有关的键信号输入。具体地,输入单元830可包括操作面板831以及其他输入设备832。操作面板831,也可称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在操作面板831上或在操作面板831附近的操作),并根据预先设定的程式驱动相应的连接装置。在一个实施例中,操作面板831可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器880,并能接收处理器880发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现操作面板831。除了操作面板831,输入单元830还可以包括其他输入设备832。具体地,其他输入设备832可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)等中的一种或多种。The input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the handset 800. Specifically, the input unit 830 may include an operation panel 831 and other input devices 832. The operation panel 831, which may also be referred to as a touch screen, may collect touch operations on or near the user (such as an operation of the user using a finger, a stylus, or the like on any of the appropriate objects or accessories on or near the operation panel 831) And drive the corresponding connection device according to a preset program. In one embodiment, the operation panel 831 can include two portions of a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information. The processor 880 is provided and can receive commands from the processor 880 and execute them. Further, the operation panel 831 can be realized by various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the operation panel 831, the input unit 830 may also include other input devices 832. In particular, other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.).
显示单元840可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元840可包括显示面板841。在一个实施例中,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板841。在一个实施例中,操作面板831可覆盖显示面板841,当操作面板831检测到在 其上或附近的触摸操作后,传送给处理器880以确定触摸事件的类型,随后处理器880根据触摸事件的类型在显示面板841上提供相应的视觉输出。虽然在图8中,操作面板831与显示面板841是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将操作面板831与显示面板841集成而实现手机的输入和输出功能。The display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone. The display unit 840 can include a display panel 841. In one embodiment, the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. In one embodiment, the operation panel 831 can cover the display panel 841, and when the operation panel 831 detects a touch operation thereon or nearby, it is transmitted to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event The type provides a corresponding visual output on display panel 841. Although in FIG. 8, the operation panel 831 and the display panel 841 are two separate components to implement the input and input functions of the mobile phone, in some embodiments, the operation panel 831 and the display panel 841 may be integrated to implement the mobile phone. Input and output functions.
手机800还可包括至少一种传感器850,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及距离传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板841的亮度,距离传感器可在手机移动到耳边时,关闭显示面板841和/或背光。运动传感器可包括加速度传感器,通过加速度传感器可检测各个方向上加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换)、振动识别相关功能(比如计步器、敲击)等;此外,手机还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器等。The handset 800 can also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a distance sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the distance sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight. The motion sensor may include an acceleration sensor, and the acceleration sensor can detect the magnitude of the acceleration in each direction, and the magnitude and direction of the gravity can be detected at rest, and can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching), and vibration recognition related functions (such as Pedometer, tapping, etc.; in addition, the phone can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors.
音频电路860、扬声器861和传声器862可提供用户与手机之间的音频接口。音频电路860可将接收到的音频数据转换后的电信号,传输到扬声器861,由扬声器861转换为声音信号输出;另一方面,传声器862将收集的声音信号转换为电信号,由音频电路860接收后转换为音频数据,再将音频数据输出处理器880处理后,经RF电路810可以发送给另一手机,或者将音频数据输出至存储器820以便后续处理。 Audio circuitry 860, speaker 861, and microphone 862 can provide an audio interface between the user and the handset. The audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then processed by the audio data output processor 880, sent to another mobile phone via the RF circuit 810, or outputted to the memory 820 for subsequent processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块870可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图8示出了WiFi模块870,但是可以理解的是,其并不属于手机800的必须构成,可以根据需要而省略。WiFi is a short-range wireless transmission technology, and the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access. Although FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone 800 and can be omitted as needed.
处理器880是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器820内的软件程序和/或模块,以及调用存储在存储器820内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监听。在一个实施例中,处理器880可包括一个或多个处理单元。在一个实施例中,处理器880可集成应用处理器和调制解调器,其中,应用处理器主要处理操作系统、用户界面和应用程序等;调制解调 器主要处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器880中。比如,该处理器880可集成应用处理器和基带处理器,基带处理器与和其它外围芯片等可组成调制解调器。手机800还包括给各个部件供电的电源890(比如电池),优选的,电源可以通过电源管理系统与处理器880逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The various functions of the mobile phone and the processing of the data, so that the overall monitoring of the mobile phone. In one embodiment, processor 880 can include one or more processing units. In one embodiment, processor 880 can integrate an application processor and a modem, where the application processor primarily processes an operating system, user interface, applications, etc.; the modem primarily handles wireless communications. It will be appreciated that the above modem may also not be integrated into the processor 880. For example, the processor 880 can integrate an application processor and a baseband processor, and the baseband processor and other peripheral chips can form a modem. The mobile phone 800 also includes a power source 890 (such as a battery) that supplies power to various components. Preferably, the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
在一个实施例中,手机800还可以包括摄像头、蓝牙模块等。In one embodiment, the handset 800 can also include a camera, a Bluetooth module, and the like.
在本申请实施例中,该手机所包括的处理器执行存储在存储器上的计算机程序时实现上述所描述的信息共享方法。In the embodiment of the present application, the processor included in the mobile phone implements the information sharing method described above when executing a computer program stored in the memory.
本申请所使用的对存储器、存储、数据库或其它介质的任何引用可包括非易失性和/或易失性存储器。合适的非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM),它用作外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDR SDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)。Any reference to a memory, storage, database or other medium used herein may include non-volatile and/or volatile memory. Suitable non-volatile memories can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as an external cache. By way of illustration and not limitation, RAM is available in a variety of forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization. Link (Synchlink) DRAM (SLDRAM), Memory Bus (Rambus) Direct RAM (RDRAM), Direct Memory Bus Dynamic RAM (DRDRAM), and Memory Bus Dynamic RAM (RDRAM).
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above-described embodiments may be arbitrarily combined. For the sake of brevity of description, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction between the combinations of these technical features, All should be considered as the scope of this manual.
以上所述实施例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。The above-described embodiments are merely illustrative of several embodiments of the present invention, and the description thereof is more specific and detailed, but is not to be construed as limiting the scope of the invention. It should be noted that a number of variations and modifications may be made by those skilled in the art without departing from the spirit and scope of the invention. Therefore, the scope of the invention should be determined by the appended claims.

Claims (18)

  1. 一种信息共享方法,应用于具有至少两个用户空间的系统,所述至少两个用户空间属于不同的使用角色;所述方法包括:An information sharing method is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles; the method comprising:
    获取系统中的属于至少两个用户空间的应用信息和数据信息;Obtaining application information and data information belonging to at least two user spaces in the system;
    将所述应用信息和数据信息进行安全级别归档;Archiving the application information and data information at a security level;
    根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息。The application information and the data information that meet the sharing security level and belong to the second user space are provided in the first user space according to the triggering condition.
  2. 根据权利要求1所述的方法,其中,所述信息共享方法采用系统中的服务实现,每个用户空间均调用所述服务实现从其他用户空间获得应用信息和数据信息。The method according to claim 1, wherein the information sharing method is implemented by a service in a system, and each user space invokes the service to obtain application information and data information from other user spaces.
  3. 根据权利要求1所述的方法,其中,所述触发条件与共享需求相关联,所述触发条件的产生,包括:The method of claim 1, wherein the trigger condition is associated with a sharing requirement, and the generating of the trigger condition comprises:
    在一个用户空间创建完成时产生,或,用户主动发起的共享请求时产生。Generated when a user space is created, or when a user initiates a sharing request.
  4. 根据权利要求1所述的方法,其中,所述将所述应用信息和数据信息进行安全级别归档的步骤包括:The method of claim 1, wherein the step of archiving the application information and the data information at a security level comprises:
    在各个用户空间下,获取用户对所述应用信息和数据信息的安全级别标记;Obtaining a security level mark of the application information and the data information by the user in each user space;
    根据所述安全级别标记对所述应用信息和数据信息进行安全级别归档;Performing security level archiving on the application information and data information according to the security level flag;
    其中,所述安全级别标记至少包括:表示可以共享的共享标记和表示不能共享的私有标记。The security level flag includes at least: a shared mark indicating that the share can be shared and a private mark indicating that the share cannot be shared.
  5. 根据权利要求4所述的方法,其中,所述安全级别标记为所述系统为应用信息和数据信息添加的属性,当所述属性的属性值为真时,所述安全级别标记为表示所述共享标记;当所述属性的属性值为假时,所述安全级别标记为表示所述私有标记。The method of claim 4, wherein the security level is marked as an attribute added by the system to application information and data information, and when the attribute value of the attribute is true, the security level is marked as indicating the Sharing a tag; when the attribute value of the attribute is false, the security level is marked to represent the private tag.
  6. 根据权利要求4所述的方法,其中,所述安全级别标记采用映射表的方式实现,其中,在所述映射表中写入所述安全级别标记和应用信息、数据信息的唯一标识的对应关系。The method according to claim 4, wherein the security level flag is implemented by using a mapping table, wherein a correspondence between the security level flag and the application information and the unique identifier of the data information is written in the mapping table. .
  7. 根据权利要求5所述的方法,其中,所述根据所述安全级别标记对所述应用信息和数据信息进行安全级别归档,包括:The method according to claim 5, wherein said performing security level archiving of said application information and data information according to said security level flag comprises:
    读取添加了属性的应用信息和数据信息的所述属性值,并将具有相同所述属性值的应用信息和数据信息进行归档。The attribute values of the application information and the data information to which the attribute is added are read, and the application information and the data information having the same attribute value are archived.
  8. 根据权利要求6所述的方法,其中,所述根据所述安全级别标记对所述应用信息和数据信息进行安全级别归档,包括:The method according to claim 6, wherein said performing security level archiving of said application information and data information according to said security level flag comprises:
    对于通过所述映射表的方式实现安全级别标记的应用信息和数据信息维护多张具有不同安全级别标记的表格;Maintaining a plurality of forms with different security level markings for application information and data information that implement security level marking by means of the mapping table;
    在一个分类下聚集存储具有同一安全级别标记的应用信息和数据信息的唯一标识。A unique identifier that stores application information and data information with the same security level tag under one category.
  9. 根据权利要求1所述的方法,其中,所述根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息的步骤包括:The method according to claim 1, wherein the step of providing the application information and the data information in the first user space that meets the sharing security level and belongs to the second user space according to the triggering condition comprises:
    读取所述属于第二用户空间的应用信息和数据信息;Reading the application information and data information belonging to the second user space;
    将所述属于第二用户空间的数据信息应用于第一用户空间中的相同应用。The data information belonging to the second user space is applied to the same application in the first user space.
  10. 根据权利要求1所述的方法,其中,所述根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息的步骤包括:The method according to claim 1, wherein the step of providing the application information and the data information in the first user space that meets the sharing security level and belongs to the second user space according to the triggering condition comprises:
    读取所述属于第二用户空间的应用信息和数据信息;Reading the application information and data information belonging to the second user space;
    将所述属于第二用户空间的应用信息和数据信息迁移至第一用户空间中。The application information and data information belonging to the second user space are migrated into the first user space.
  11. 根据权利要求10所述的方法,其中,所述将所述属于第二用户空间的应用信息和数据信息迁移至第一用户空间,包括:The method of claim 10, wherein the migrating the application information and the data information belonging to the second user space to the first user space comprises:
    将所述属于第二用户空间的应用信息和数据信息完全转移至第一用户空间;或,将所述属于第二用户空间的应用信息和数据信息复制到第一用户空间;或,将所述属于第二用户空间的应用信息复制到第一用户空间,所述属于第二用户空间的数据信息共用。And transferring the application information and the data information belonging to the second user space to the first user space; or copying the application information and the data information belonging to the second user space to the first user space; or The application information belonging to the second user space is copied to the first user space, and the data information belonging to the second user space is shared.
  12. 根据权利要求1所述的方法,其中,所述根据触发条件在第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息的步骤包括:The method according to claim 1, wherein the step of providing the application information and the data information in the first user space that meets the sharing security level and belongs to the second user space according to the triggering condition comprises:
    读取所述属于第二用户空间的应用信息和数据信息;Reading the application information and data information belonging to the second user space;
    在第一用户空间中展示所述属于第二用户空间的应用信息和数据信息的列表;Displaying, in the first user space, the list of application information and data information belonging to the second user space;
    在第一用户空间中从所述列表中选择需要迁移的应用信息和数据信息;Selecting application information and data information to be migrated from the list in the first user space;
    将选择的应用信息和数据信息迁移至第一用户空间。Migrate selected application information and data information to the first user space.
  13. 根据权利要求12所述的方法,其中,所述在第一用户空间中从所述列表中选择需要迁移的应用信息和数据信息,包括:The method according to claim 12, wherein the selecting application information and data information to be migrated from the list in the first user space comprises:
    在第一用户空间中从所述列表中单独选择要迁移的应用信息或单独选择要迁移的数据信息或同时选择要迁移的应用信息和数据中信息的任一一种。The application information to be migrated is individually selected from the list in the first user space or the data information to be migrated is individually selected or both the application information to be migrated and the information in the data are simultaneously selected.
  14. 根据权利要求12所述的方法,其中,所述方法进一步包括:将至少两个用户空间的同一应用的数据信息进行同步。The method of claim 12, wherein the method further comprises synchronizing data information of the same application of at least two user spaces.
  15. 根据权利要求4所述的方法,其中,符合所述共享安全级别是指所述第二用户空间的应用信息和数据信息的在归档后的安全级别标记符合被共享到第一用户空间的条件。The method according to claim 4, wherein conforming to the shared security level means that the archived security level flag of the application information and the data information of the second user space conforms to a condition shared to the first user space.
  16. 一种信息共享装置,应用于具有至少两个用户空间的系统,所述至少两个用户空间属于不同的使用角色;所述装置包括:An information sharing device is applied to a system having at least two user spaces, the at least two user spaces belonging to different usage roles; the device comprising:
    信息获取模块,用于获取系统中的属于至少两个用户空间的应用信息和数据信息;An information acquiring module, configured to acquire application information and data information belonging to at least two user spaces in the system;
    安全归档模块,用于将所述应用信息和数据信息进行安全级别归档;a security archiving module for archiving the application information and the data information at a security level;
    共享处理模块,根据触发条件在所述第一用户空间内提供符合共享安全级别的、且属于第二用户空间的应用信息和数据信息。The sharing processing module provides application information and data information that meets the sharing security level and belongs to the second user space in the first user space according to the triggering condition.
  17. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1至15中任一项所述方法的步骤。A computer readable storage medium having stored thereon a computer program, the computer program being executed by a processor to perform the steps of the method of any one of claims 1 to 15.
  18. 一种终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现权利要求1至15中任一项所述方法的步骤。A terminal, comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, the processor executing the computer program to implement the steps of the method of any one of claims 1 to 15. .
PCT/CN2019/075388 2018-03-29 2019-02-18 Information sharing method and device, computer-readable storage medium and terminal WO2019184617A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810270230.8 2018-03-29
CN201810270230.8A CN108509788B (en) 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal

Publications (1)

Publication Number Publication Date
WO2019184617A1 true WO2019184617A1 (en) 2019-10-03

Family

ID=63379244

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/075388 WO2019184617A1 (en) 2018-03-29 2019-02-18 Information sharing method and device, computer-readable storage medium and terminal

Country Status (2)

Country Link
CN (1) CN108509788B (en)
WO (1) WO2019184617A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509788B (en) * 2018-03-29 2021-03-23 Oppo广东移动通信有限公司 Information sharing method and device, computer readable storage medium and terminal
CN114301899B (en) * 2020-09-22 2022-10-25 荣耀终端有限公司 Data transmission method, system, electronic device and storage medium
CN113704209B (en) * 2021-07-27 2023-05-12 荣耀终端有限公司 Data sharing method, electronic device and storage medium
CN115981576B (en) * 2023-03-20 2023-11-17 荣耀终端有限公司 Method for sharing data, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609448A (en) * 2012-01-10 2012-07-25 西北工业大学 Multi-user-version hierarchical document mapping method
CN102932535A (en) * 2012-10-18 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal shared by multiple users and using method for mobile terminal
CN106485137A (en) * 2015-08-26 2017-03-08 北京奇虎科技有限公司 Application control method, application program controlling device and terminal
CN107632775A (en) * 2016-07-19 2018-01-26 中兴通讯股份有限公司 Information sharing method, device and terminal between a kind of user's space
CN108509788A (en) * 2018-03-29 2018-09-07 广东欧珀移动通信有限公司 Information sharing method and device, computer readable storage medium, terminal

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224886B (en) * 2014-06-26 2018-12-07 中国移动通信集团甘肃有限公司 A kind of mobile terminal safety partition method, device and mobile terminal
CN104318176B (en) * 2014-10-28 2021-01-15 东莞宇龙通信科技有限公司 Data management method and device for terminal and terminal
CN104572218B (en) * 2015-01-28 2019-02-01 宇龙计算机通信科技(深圳)有限公司 Progress control method, operation control system and the terminal of application program
CN105653969B (en) * 2015-04-27 2018-05-15 宇龙计算机通信科技(深圳)有限公司 Data processing method, device and electronic equipment
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN106485098B (en) * 2015-08-26 2019-08-02 北京安云世纪科技有限公司 Application program encryption method, application program encryption device and terminal
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN106933555B (en) * 2015-12-30 2020-06-16 中国科学院上海高等研究院 Data framework system
CN105912951A (en) * 2016-04-15 2016-08-31 北京小米移动软件有限公司 Data migration method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609448A (en) * 2012-01-10 2012-07-25 西北工业大学 Multi-user-version hierarchical document mapping method
CN102932535A (en) * 2012-10-18 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal shared by multiple users and using method for mobile terminal
CN106485137A (en) * 2015-08-26 2017-03-08 北京奇虎科技有限公司 Application control method, application program controlling device and terminal
CN107632775A (en) * 2016-07-19 2018-01-26 中兴通讯股份有限公司 Information sharing method, device and terminal between a kind of user's space
CN108509788A (en) * 2018-03-29 2018-09-07 广东欧珀移动通信有限公司 Information sharing method and device, computer readable storage medium, terminal

Also Published As

Publication number Publication date
CN108509788A (en) 2018-09-07
CN108509788B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
US10635449B2 (en) Method and apparatus for running game client
WO2019184617A1 (en) Information sharing method and device, computer-readable storage medium and terminal
CN108536783B (en) Data processing method and device, terminal and computer readable storage medium
US10055220B2 (en) Method, apparatus, and system for processing desktop data of mobile terminal
CN108521494B (en) Terminal control method and device, readable storage medium and terminal
US11337060B2 (en) Electronic business card privacy protection system prevents displaying user account information
WO2017107155A1 (en) Method of displaying multiple application windows on mobile terminal and mobile terminal
KR102628856B1 (en) System for sharing contents between electronic devices and method for sharing contents in an electronic device
WO2017211205A1 (en) Method and device for updating whitelist
CN108563932B (en) Application control method and device, readable storage medium and terminal
CN108549698B (en) File processing method and device, mobile terminal and computer readable storage medium
US20160198321A1 (en) Method for Implementing Card-Free Mobile Phone, Mobile Phone, and Server
CN106843868B (en) Multi-account login method and device and mobile terminal
CN107656743B (en) Application unloading method, terminal and readable storage medium
WO2018049885A1 (en) Data migration method and device
JP2018504708A (en) Method, device, and system for managing information recommendations
EP2869604B1 (en) Method, apparatus and device for processing a mobile terminal resource
WO2019184631A1 (en) Information processing method and apparatus, computer-readable storage medium, and terminal
WO2019128571A1 (en) Resource management method and device, mobile terminal, as well as computer readable storage medium
US10298590B2 (en) Application-based service providing method, apparatus, and system
CN108563754B (en) File processing method and device, mobile terminal and computer readable storage medium
WO2019071609A1 (en) Method and terminal device for loading application and upgrading application
WO2019196704A1 (en) Inter-multi-character message notification method and device within terminal, and terminal
WO2021208991A1 (en) Screen extension method and electronic device
JP2022506052A (en) Model file management method and terminal device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19778091

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19778091

Country of ref document: EP

Kind code of ref document: A1