WO2022083721A1 - 一种群组内群成员隐私保护方法与终端设备 - Google Patents

一种群组内群成员隐私保护方法与终端设备 Download PDF

Info

Publication number
WO2022083721A1
WO2022083721A1 PCT/CN2021/125531 CN2021125531W WO2022083721A1 WO 2022083721 A1 WO2022083721 A1 WO 2022083721A1 CN 2021125531 W CN2021125531 W CN 2021125531W WO 2022083721 A1 WO2022083721 A1 WO 2022083721A1
Authority
WO
WIPO (PCT)
Prior art keywords
group
terminal device
group member
user
phone number
Prior art date
Application number
PCT/CN2021/125531
Other languages
English (en)
French (fr)
Inventor
马志伟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202011565926.7A external-priority patent/CN114465967B/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to US18/249,734 priority Critical patent/US20230388782A1/en
Priority to EP21882135.3A priority patent/EP4210295A4/en
Publication of WO2022083721A1 publication Critical patent/WO2022083721A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27467Methods of retrieving data
    • H04M1/27475Methods of retrieving data using interactive graphical means or pictorial representations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages

Definitions

  • the present application relates to the field of terminal technologies, and in particular, to a method and terminal device for protecting the privacy of group members in a group.
  • IM instant messaging
  • group members in a group can invite their own friends into the group, but the friends may be strangers relative to other group members in the group. If the private information of group members (such as mobile phone numbers) is displayed in plain text, it is easy to expose the private information of group members to strangers in the group. Therefore, how to protect the private information of group members in the group is a problem that needs to be considered.
  • group members in a group can invite their own friends into the group, but the friends may be strangers relative to other group members in the group. If the private information of group members (such as mobile phone numbers) is displayed in plain text, it is easy to expose the private information of group members to strangers in the group. Therefore, how to protect the private information of group members in the group is a problem that needs to be considered.
  • the purpose of this application is to provide a method and a terminal device for protecting the privacy of group members in a group, so as to protect the privacy information of group members in a group.
  • a privacy protection method for group members in a group is provided, and the method is applicable to a terminal device, where the mobile phone number of the terminal device is a first mobile phone number, the terminal device includes a first address book, and the first An address book includes a first user, the mobile phone number of the first user is a second mobile phone number, and both the first mobile phone number and the second mobile phone number have an instant messaging function enabled, and the method includes: responding to the first mobile phone number.
  • the terminal device establishes a group based on the first mobile phone number and the second mobile phone number; the group joins the second user in response to the operation of adding a group member by the first user; the first user The mobile phone number of the second user activates the instant messaging function; in response to the operation for viewing the information of the second user, the terminal device determines whether the second user is included in the first address book, and if the first address book includes the second user The second user is not included in the first address book, and the avatar and nickname of the second user are displayed, and the avatar and nickname are used when the second user activates the instant messaging function by using the phone number of the second user avatar and nickname.
  • determining by the terminal device whether the first address book includes the second user includes: the terminal device sending the first address book to a cloud server, and the cloud server It is a server that provides users with the instant messaging function, and the cloud server stores the mobile phone numbers of all users who have activated the instant messaging function;
  • the terminal device sends a query request to the cloud server, where the query request is used to request to query whether the mobile phone number of the second user exists in the first address book;
  • the terminal device receives the first indication from the cloud server, and determines based on the first indication that the mobile phone number of the second user does not exist in the first address book.
  • group member A in the group checks the information of group member B, he can check whether the mobile phone number of group member B exists in the address book of group member A through the cloud server. You can see the mobile phone number of group member B. Otherwise, you cannot see the mobile phone number of group member B.
  • the method further includes: in response to the operation of adding the second user to the first address book, determining whether the call record of the terminal device includes the second user's Mobile phone number, if yes, save the phone number of the second user in the call record in the first address book.
  • group member A in the group checks the information of group member B, if group member B is not in the address book of group member A, member A cannot see the mobile phone number of member B, so if group member B is not in the address book of group member A If member A wants to chat with group member B individually, he can add group member B as a contact. For example, group member A can check whether the mobile phone number of group member B exists in the call record. If so, it means that group member A has contacted group member B, but the mobile phone number of group member B has not been saved in the address book. In this case, the mobile phone number of group member B can be directly added to the address book of group member A.
  • judging whether the call record of the terminal device includes the mobile phone number of the second user includes: the terminal device sending the call record to a cloud server, and the cloud server is for a server for the user to provide the instant messaging function, and the cloud server stores the phone number of the second user; the cloud server is used to determine whether the phone number of the second user exists in the call record; the When the terminal device receives the confirmation instruction sent from the cloud server, it is determined that the call record of the terminal device includes the mobile phone number of the second user.
  • the group member A can determine whether the mobile phone number of the group member B exists in the communication record of the group member B through the cloud server. In this way, the mobile phone number of the group member B in the group can be prevented from being directly exposed to the group member A, and the security is high.
  • the method further includes: in response to the operation of adding the second user to the first address book, the terminal device determines whether the second user's second address book is in the second address book. Including the first mobile phone number, if so, obtain the second user's mobile phone number from the cloud server, and store the second user's phone number in the first address book, where the cloud
  • the server is a server that provides the instant messaging function for the user, and the cloud server stores the mobile phone number of the user who has activated the instant messaging function.
  • group member A in the group checks the information of group member B, if group member B is not in the address book of group member A, member A cannot see the mobile phone number of member B, so if group member B is not in the address book of group member A If member A wants to chat with group member B individually, he can add group member B as a contact. For example, group member A can query whether group member A's mobile phone number exists in the address book of group member B. If so, it means that group member B has saved group member A in the address book. In this case, group member A can directly Add the mobile phone number of group member B to the address book of group member A.
  • the cloud server further stores a second address book of the second user, and the terminal device determines whether the second address book of the second user includes the first mobile phone number , including: the terminal device sends a query request to the cloud server, where the query request is used to query whether the first mobile phone number exists in the second address book with the second user; the terminal device receives data from the cloud server When the server confirms the instruction, it is determined that the first phone number exists in the second address book.
  • group member A can determine whether the mobile phone number of group member A exists in the address book of group member B through the cloud server. In this way, the mobile phone number of the group member B in the group can be prevented from being directly exposed to the group member A, and the security is high.
  • a method for protecting the privacy of group members in a group is provided.
  • the method is applicable to a cloud server, the cloud server provides users with an instant messaging function, and the cloud server stores a store in the cloud server to activate the instant messaging function based on a mobile phone number.
  • the cloud server also includes the first user's phone number a first address book, where the first address book includes the second mobile phone number of the second user, and the method includes: receiving a first request from the first user, where the first request is used to request creation a group including the first user and the second user; in response to the first request, the cloud server creates a group based on the first mobile phone number and the second mobile phone number; in response to the first request The second request of the second user, adding a third user to the group, the third user has activated the instant messaging function based on the third phone number; it is determined that the third phone number does not exist in the third user
  • the cloud server sends the avatar and nickname of the third user to the first user; the nickname and avatar are the third user's use of the third mobile phone number to activate the instant messaging Avatars and nicknames to use when functions.
  • an instant messaging application based on mobile phone number communication such as Huawei Connect App or RCS, etc.
  • the cloud server may not store the mobile phone number of group member B. Sent to group member B to protect the member's mobile number from being exposed.
  • the method further includes: receiving a call record of the first user sent by the first user, where the call record includes a mobile phone number of a user who is on a call with the first user; In response to an adding request from the first user, the adding request is used to add the third user to the first address book of the first user, and the cloud server determines whether the first call record contains the third user. Including the third mobile phone number of the third user; when it is determined that the call record of the first user includes the third mobile phone number, sending the third mobile phone number to the first user, so that the The first user saves the third mobile phone number in the first address book.
  • group member B is not in the address book of group member A, group member A cannot see the mobile phone number of group member B, so if group member A wants to chat with group member B alone, he Member B is added as a contact.
  • the cloud server can query whether the phone number of group member B exists in the call records of group member A. If so, it means that group member A has contacted group member B, but the mobile phone number of group member B has not been saved in the address book. , in this case, the mobile phone number of group member B can be sent to group member A.
  • the method further includes: when it is determined that the call record of the first user does not include the third mobile phone number, sending the adding request to the third user; sending the third mobile phone number to the first user after the third user agrees to add the instruction, so that the first user saves the third mobile phone number in the first address book .
  • the cloud server may also ask group member B whether they agree to transfer their mobile phone number to group member A.
  • the number is provided to group member A, and with the consent of group member B, its mobile phone number is sent to group member A.
  • the method further includes: receiving a third address book of the third user, where the third address book includes phone numbers of contacts stored by the third user; responding to An adding request from the first user, the adding request is used to add the third user in the first address book of the first user, and the cloud server determines whether the third address book includes all the first mobile phone number of the first user; when it is determined that the first mobile phone number is included in the third address book, send the third mobile phone number to the first user, so that the first user can The third mobile phone number is stored in the first address book.
  • the cloud server can query whether the mobile phone number of group member A exists in the address book of group member B, and if so, it can send the mobile phone number of group member B to group member A.
  • the method further includes: when it is determined that the first mobile phone number is not included in the third address book, sending the adding request to the third user; After the third user agrees to add the instruction, the third mobile phone number is sent to the first user, so that the first user saves the third mobile phone number in the first address book.
  • the cloud server may also ask group member B whether they agree to transfer their mobile phone number to group member B.
  • the number is provided to group member A, and with the consent of group member B, its mobile phone number is sent to group member A.
  • a terminal device wherein the mobile phone number of the terminal device is a first mobile phone number, the terminal device includes a first address book, the first address book includes a first user, and the first address book includes a first user.
  • a user's mobile phone number is a second mobile phone number, and both the first mobile phone number and the second mobile phone number have an instant messaging function enabled, and the terminal device includes:
  • processors one or more processors
  • the one or more memories store one or more computer programs, the one or more computer programs including instructions that, when executed by the one or more processors, cause the first
  • the electronic device performs the following steps:
  • the terminal device In response to the first operation, the terminal device establishes a group based on the first mobile phone number and the second mobile phone number; the group joins the second user in response to the operation of adding a group member by the first user; The mobile phone number of the second user enables the instant messaging function;
  • the terminal device determines whether the second user is included in the first address book, and if the first address book does not include the second user, displaying The avatar and nickname of the second user, where the avatar and nickname are the avatar and nickname used by the second user to activate the instant messaging function by using the second user's phone number.
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to specifically perform the following steps:
  • the cloud server is a server that provides the instant messaging function for users, and the cloud server stores the mobile phone numbers of all users who have activated the instant messaging function;
  • a first indication from the cloud server is received, and it is determined based on the first indication that the mobile phone number of the second user does not exist in the first address book.
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to further perform the following steps:
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to specifically perform the following steps:
  • the cloud server is a server that provides the user with the instant messaging function, and the cloud server stores the phone number of the second user; the cloud server is used to determine the Whether the phone number of the second user exists in the call record;
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to further perform the following steps:
  • the terminal device determines whether the second address book of the second user includes the first mobile phone number, and if so, obtains the information from the cloud server The mobile phone number of the second user is obtained at the location, and the phone number of the second user is stored in the first address book, wherein the cloud server is a server that provides the user with the instant messaging function, so The mobile phone number of the user who has activated the instant messaging function is stored in the cloud server.
  • the cloud server further stores a second address book of the second user, and when the instruction is executed by the one or more processors, the first electronic device is made specific Perform the following steps:
  • a cloud server provides an instant messaging function for a user, the cloud server stores a first user and a second user who have activated the instant messaging function based on a mobile phone number, the first user and the second user
  • the phone number of the user is the first phone number
  • the phone number of the second user is the second phone number
  • the cloud server further includes the first address book of the first user, and the first address book includes The second mobile phone number of the second user
  • the cloud server includes:
  • processors one or more processors
  • the one or more memories store one or more computer programs, the one or more computer programs including instructions that, when executed by the one or more processors, cause the first
  • the electronic device performs the following steps:
  • the cloud server creates a group based on the first mobile phone number and the second mobile phone number;
  • the third user In response to the second request of the second user, adding a third user to the group, the third user has activated the instant messaging function based on the third phone number;
  • the cloud server sends the avatar and nickname of the third user to the first user; the nickname and avatar are the avatar and the avatar of the third user The avatar and nickname used when the user activates the instant messaging function by using the third mobile phone number.
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to further perform the following steps:
  • the adding request is used to add the third user to the first address book of the first user, and the cloud server determines whether the first call record contains the third user. Including the third mobile phone number of the third user;
  • the third mobile phone number is sent to the first user, so that the first user saves the third mobile phone number to in the first address book.
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to further perform the following steps:
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to further perform the following steps:
  • the adding request is used to add the third user in the first address book of the first user, and the cloud server determines whether the third address book is in the third address book. Including the first mobile phone number of the first user;
  • the third mobile phone number is sent to the first user, so that the first user saves the third mobile phone number to the in the first address book.
  • the first electronic device when the instructions are executed by the one or more processors, the first electronic device is caused to further perform the following steps:
  • an embodiment of the present application further provides a terminal device, where the electronic device includes modules/units for executing the above-mentioned first aspect or any possible design method of the first aspect; these modules/units can be configured by It can be realized by hardware, and can also be realized by executing corresponding software by hardware.
  • an embodiment of the present application further provides a cloud server, where the cloud server includes modules/units for executing the above-mentioned second aspect or any possible design method of the second aspect; these modules/units can be configured by It can be realized by hardware, and can also be realized by executing corresponding software by hardware.
  • a system comprising:
  • At least three terminal devices and cloud servers At least three terminal devices and cloud servers;
  • each of the at least three terminal devices corresponds to a mobile phone number
  • each terminal device is used to implement the method provided in the first aspect above
  • the cloud server is used to implement the method provided in the second aspect above.
  • an embodiment of the present application further provides a chip, which is coupled to a memory in an electronic device, and is used to call a computer program stored in the memory and execute the first aspect of the embodiment of the present application and any one of the first aspects thereof.
  • the technical solutions that may be designed, or the technical solutions used to invoke the computer program stored in the memory and execute the second aspect and any possible design of the second aspect of the embodiments of the present application, “coupling” in the embodiments of the present application refers to two The components are directly or indirectly combined with each other.
  • a computer-readable storage medium comprising a computer program, when the computer program is run on an electronic device, the electronic device is caused to perform the method provided in the first aspect; Alternatively, when the computer program is run on an electronic device, the electronic device is caused to perform the method provided in the second aspect above.
  • a program product comprising instructions, when the instructions are run on a computer, causing the computer to execute the method provided in the first aspect; or, when the instructions are run on the computer, The computer is caused to perform the method provided by the second aspect above.
  • a graphical user interface on an electronic device, the electronic device having a display screen, one or more memories, and one or more processors for executing storage One or more computer programs in the one or more memories, the graphical user interface comprising a graphical user interface displayed when the electronic device performs the method as provided in the first aspect above or the method as provided in the second aspect above interface.
  • a twelfth aspect further provides a privacy protection method for group members in a group, the method is applicable to a communication system, the communication system includes a terminal device and a cloud server, and the method includes:
  • the terminal device displays a group member list of the group; the group member list includes a first user and a second user;
  • the terminal device In response to the operation of adding the first user as a contact, the terminal device sends first verification information to the first user through the cloud server, so that the first user can determine through the first verification information Whether to agree to be added as a contact of the terminal device;
  • the terminal device In response to the consent instruction of the first user, the terminal device saves the first user as a contact;
  • the terminal device determines whether the mobile phone number of the second user exists in the historical communication record, and if so, automatically saves the second user as a contact; or ,
  • the method further includes: when the terminal device determines that the mobile phone number of the second user does not exist in the historical communication record, the terminal device sends the second user to the second user through the cloud server Sending verification information, so that the second user determines whether to agree to be added as a contact of the terminal device through the verification information;
  • the terminal device In response to the consent instruction of the second user, the terminal device saves the second user as a contact;
  • the method further includes: when the terminal device determines from the cloud server side that the address book of the second user does not include the mobile phone number of the user of the terminal device, The cloud server sends verification information to the second user, so that the second user can use the verification information to determine whether to agree to be added as a contact of the terminal device; in response to the consent instruction of the second user, the The terminal device saves the second user as a contact.
  • a thirteenth aspect provides a system, including: a terminal device and a cloud server;
  • the terminal device displays a group member list of the group; the group member list includes a first user and a second user;
  • the terminal device displays the first nickname and the first avatar of the first user
  • the terminal device displays the second nickname and the second avatar of the second user
  • the terminal device In response to the operation of adding the first user as a contact, the terminal device sends verification information to the first user through the cloud server, so that the first user can determine whether to agree to add as a contact through the verification information. the contact person of the terminal device;
  • the terminal device In response to the consent instruction of the first user, the terminal device saves the first user as a contact;
  • the terminal device determines whether the mobile phone number of the second user exists in the historical communication record, and if so, automatically saves the second user as a contact; or ,
  • the terminal device is further configured to: when it is determined that the mobile phone number of the second user does not exist in the historical communication record, the terminal device sends a message to the second user through the cloud server verification information, so that the second user determines whether to agree to be added as a contact of the terminal device through the verification information;
  • the terminal device is further configured to: when it is determined from the cloud server side that the mobile phone number of the user of the terminal device is not included in the address book of the second user, pass the cloud server sending verification information to the second user, so that the second user determines whether to agree to be added as a contact of the terminal device through the verification information;
  • the second user In response to the consent instruction of the second user, the second user is saved as a contact.
  • a fourteenth aspect further provides a computer-readable storage medium, the computer-readable storage medium comprising a computer program, when the computer program is run on an electronic device, the electronic device causes the electronic device to perform the twelfth aspect above. method.
  • a program product comprising instructions which, when executed on a computer, cause the computer to perform the method as provided in the twelfth aspect above.
  • a sixteenth aspect further provides a graphical user interface on an electronic device, the electronic device having a display screen, one or more memories, and one or more processors for executing storage
  • the one or more computer programs in the one or more memories, the graphical user interface comprising the graphical user interface displayed when the electronic device performs the method as provided in the twelfth aspect above.
  • a seventeenth aspect provides a privacy protection method for group members in a group, the method comprising: displaying, by the terminal device, a group member list of a group in an instant messaging application, the group member list including the first group members and members of the second group;
  • the terminal device In response to the first operation for selecting the first group member, displays the first phone number of the first group member, where the first phone number is saved in the address book of the terminal device the phone number of the first group member; the terminal device, in response to the second operation for selecting the second group member, displays the avatar and/or user name of the second group member, and is used to add a contact a person control; the terminal device sends a first request to the cloud server in response to the third operation for the add contact control, where the first request is used to request to add the second group member as a contact; In response to the first request, the cloud server sends the second phone number of the second group member to the terminal device; the terminal device saves the second group member as the second phone number based on the second phone number. contact.
  • the terminal device views different group members in the group
  • the displayed information is different.
  • members of the first group can see their phone numbers, because members of the first group exist in the address book of the terminal device, but members of the second group cannot directly see their phone numbers, so they need to add contacts.
  • the phone numbers of the members of the second group are obtained. In this way, the phone numbers of the group members can be prevented from being directly exposed to all members in the group, and the privacy of the group members can be protected.
  • the cloud server sends the second number of the second group member to the terminal device in response to the first request, including: in response to the first request, the cloud server The server sends a second request to the second group member; the second request is used to instruct the terminal device to request to add the second group member as a contact; when the cloud server receives a message from the second group When the member agrees to the instruction, the second phone number of the second group member is sent to the terminal device.
  • the cloud server before the cloud server sends the phone number of the second group member to the terminal device, it will request the authentication of the second group member, and if the second group member agrees, it will send the phone number to the terminal device, which is more secure. .
  • the terminal device sends a first request to the cloud server in response to a third operation for the add contact control, including: in response to the third operation, the terminal device determines that the whether the phone number of the second group member exists in the historical communication record of the terminal device; when it is determined that the phone number of the second group member does not exist in the historical communication record, the terminal device sends the cloud The server sends the first request.
  • the terminal device can first check whether the phone number of the second group member exists in the historical communication record, and if so, save the second group member as a contact, otherwise, request the phone number of the second group member from the cloud server side Number. In this way, the phone numbers of the group members can be prevented from being directly exposed to all the members in the group, and the privacy of the group members can be protected.
  • the terminal device determines whether the phone number of the second group member exists in the historical communication record of the terminal device, including: the avatars corresponding to all numbers in the historical call record of the terminal device Find the avatar that matches the avatar of the member of the second group in User name; when the avatar matching the avatar of the second group member is not found in the historical communication record, and/or the user name matching the user ticket of the second group member is not found, determine The telephone number of the second group member is not in the historical communication record.
  • the terminal device can find out whether the phone number of the second group member exists in the historical communication record by means of avatar matching and/or user name matching, which is convenient to operate.
  • the terminal device judging whether the phone number of the second group member exists in the historical communication record of the terminal device includes: the terminal device sends the history to the cloud server communication record; the terminal device sends a third request to the cloud server, where the third request is used to request to determine whether the phone number of the second group member exists in the historical communication record; the cloud server responds In response to the third request, determine whether the phone number of the second group member exists in the historical communication record, and send the determination result to the terminal device; the terminal device determines the first group based on the determination result. Whether the phone numbers of members of the second group exist in the historical communication records.
  • the terminal device can also inquire whether the phone number of the second group member exists in the historical communication record through the cloud server, which is more accurate.
  • the historical communication records include: recent call records and/or historical short message records. That is to say, the terminal device can look up whether there is a phone number of a member of the second group in the recent call record and/or the historical short message record.
  • the cloud server stores the address book of the second group member, and the cloud server sends the first request of the second group member to the terminal device in response to the first request.
  • Two phone numbers including: in response to the first request, the cloud server determines whether the phone number of the terminal device exists in the address book of the second group member; when the cloud server determines that the terminal device When the phone number of the second group member exists in the address book of the second group member, the second phone number of the second group member is sent to the terminal device.
  • the cloud server can determine whether the address book of the other party (that is, the second group member) includes the phone number of the terminal device, and if so, it can directly send the other party's phone number to the terminal device. Expose the phone numbers of members of the second group.
  • the method further includes: when the cloud server determines that the phone number of the terminal device does not exist in the address book of the second group member, sending the cloud server to the second group member.
  • the group member sends a second request; the second request is used to instruct the terminal device to request to add the second group member as a contact; when the cloud server receives the consent instruction from the second group member, Sending the second phone number of the second group member to the terminal device.
  • the cloud server can determine whether the phone number of the terminal device is included in the address book of the other party (that is, the member of the second group), and if not, it can request the confirmation of the member of the second group. , the phone number of the second group member is sent to the terminal device, which is more secure.
  • the method further includes: displaying, by the terminal device, first group joining information, the first joining The group information is used to indicate that the first group member is invited to join the group chat; the information of the first group member displayed in the first group joining message is the information about the first user in the address book of the terminal device. the remark name; the terminal device displays second group joining information, the second group joining information is used to indicate that the second group member is invited to join the group chat, the The information of the second group member is the user name of the second group member.
  • the member of the second group displays the user name in the second group joining information, so as to avoid directly exposing the second group in the group joining information (for example, XXX joins the group chat). Member's phone number.
  • the inviter for inviting the members of the first group to join the group is the first inviter
  • the inviter for inviting the members of the second group to join the group is the second inviter
  • the information of the first inviter displayed in the first group joining message is the remark name of the first inviter in the address book
  • the information of the first inviter displayed in the first group joining message is the username of the first inviter
  • the information of the second inviter displayed in the second group joining message is the remark name of the second inviter in the address book
  • the information of the second inviter displayed in the second group joining message is the username of the second inviter.
  • the inviter and/or the invitee do not exist in the address book of the terminal device, the user name is displayed, and if they exist in the address book of the terminal device, the remark name is displayed. In this way, it is avoided to directly expose the phone numbers of the inviter and/or the invitee in the group joining information (for example, XXX invites YYY to join the group chat).
  • the terminal device sends a first request to the cloud server in response to the third operation for the add contact control, including: in response to the third operation, the terminal device displays the first request. an interface, the first interface includes a verification information input box; the terminal device receives an input operation, and the input operation is used to input verification information in the verification information input box, and the verification information is used to describe the identity information of the terminal device; the terminal device sends a first request to the server in response to the fourth operation for sending the verification information, where the first request carries the verification information.
  • the terminal device can send verification information, such as "I am AAA in the group chat", to the second group member, so that the second group member can identify the identity of the other party according to the verification information, and the security is higher.
  • verification information such as "I am AAA in the group chat”
  • a method for protecting privacy of group members in a group is provided, and the method is applicable to a terminal device.
  • the method includes: the terminal device displays a group member list of the group in the instant messaging application, and the group member list includes the first group member and the second group member; the terminal device responds to selecting the selected group member.
  • the terminal device In response to the second operation for selecting the second group member, the terminal device displays the avatar and/or user name of the second group member, and a control for adding a contact; the terminal device responds to For the third operation of the add contact control, a first request is sent to the cloud server, where the first request is used to request to add the second group member as a contact; the terminal device receives from the cloud server The second phone number of the second group member; the terminal device saves the second group member as a contact based on the second phone number.
  • the terminal device sends a first request to the cloud server in response to a third operation for the add contact control, including: in response to the third operation, the terminal device determines that the whether the phone number of the second group member exists in the historical communication record of the terminal device; when it is determined that the phone number of the second group member does not exist in the historical communication record, the terminal device sends the cloud The server sends the first request.
  • the terminal device determines whether the phone number of the second group member exists in the historical communication record of the terminal device, including: the avatars corresponding to all numbers in the historical call record of the terminal device Find the avatar that matches the avatar of the member of the second group in User name; when the avatar matching the avatar of the second group member is not found in the historical communication record, and/or the user name matching the user name of the second group member is not found, determine The telephone number of the second group member is not in the historical communication record.
  • the terminal device judging whether the phone number of the second group member exists in the historical communication record of the terminal device includes: the terminal device sends the history to the cloud server communication records;
  • the terminal device sends a third request to the cloud server, where the third request is used to request to determine whether the phone number of the second group member exists in the historical communication record; the cloud server responds to the The third request is to determine whether the phone number of the second group member exists in the historical communication record, and send the determination result to the terminal device; the terminal device determines the second group member based on the determination result Whether the phone number exists in the historical communication record.
  • the historical communication records include: recent call records and/or historical short message records.
  • the method further includes: displaying, by the terminal device, first group joining information, the first joining The group information is used to indicate that the first group member is invited to join the group chat; the information of the first group member displayed in the first group joining message is the information about the first user in the address book of the terminal device. the remark name; the terminal device displays second group joining information, the second group joining information is used to indicate that the second group member is invited to join the group chat, the The information of the second group member is the user name of the second group member.
  • the inviter for inviting the members of the first group to join the group is the first inviter
  • the inviter for inviting the members of the second group to join the group is the second inviter
  • the information of the first inviter displayed in the first group joining message is the remark name of the first inviter in the address book
  • the information of the first inviter displayed in the first group joining message is the username of the first inviter
  • the information of the second inviter displayed in the second group joining message is the remark name of the second inviter in the address book
  • the information of the second inviter displayed in the second group joining message is the username of the second inviter.
  • the terminal device sends a first request to the cloud server in response to the third operation for the add contact control, including: in response to the third operation, the terminal device displays the first request. an interface, the first interface includes a verification information input box; the terminal device receives an input operation, and the input operation is used to input verification information in the verification information input box, and the verification information is used to describe the identity information of the terminal device; the terminal device sends a first request to the server in response to the fourth operation for sending the verification information, where the first request carries the verification information.
  • a nineteenth aspect provides a privacy protection method for group members in a group, and the method can be applied to a cloud server.
  • the method includes: the cloud server creates a group of instant messaging applications, the group includes a third group member and a second group member; the cloud server receives a first request from a third group member, the first The request is used to request to add a second group member as a contact; the cloud server, in response to the first request, sends the third group member's second phone number of the second group member.
  • the cloud server when the cloud server creates a group or a new member joins the group, the phone number of each group member is announced, so each group member can see the phone numbers of other group members, which cannot protect user privacy. .
  • the cloud server only discloses the phone number of the second group member to the third group member when it receives the request from the third group member for adding the second group member as a contact, so as to avoid the phone number of the second group member The number is directly exposed and the security is high.
  • the cloud server in response to the first request, sends the third group member the second phone number of the second group member, including:
  • the cloud server In response to the first request, the cloud server sends a second request to the second group member; the second request is used to instruct the third group member to request to add the second group member as a contact;
  • the cloud server When the cloud server receives the consent instruction from the second group member, it sends the second phone number of the second group member to the third group member.
  • the cloud server in response to the first request, sends the third group member the second phone number of the second group member, including:
  • the cloud server determines whether the phone number of the second group member exists in the historical communication record of the third group member;
  • the telephone number of the second group member is sent to the third group member.
  • the method further includes: when it is determined that the telephone number of the second group member does not exist in the historical communication record, the cloud server sends a second request to the second group member ; the second request is used to instruct the third group member to request to add the second group member as a contact;
  • the cloud server When the cloud server receives the consent instruction from the second group member, it sends the second phone number of the second group member to the third group member.
  • the historical communication records include: recent call records and/or historical short message records.
  • the cloud server stores the address book of the second group member, and the cloud server sends the second group member to the third group member in response to the first request 's second phone number, including:
  • the cloud server determines whether the phone number of the third group member exists in the address book of the second group member;
  • the cloud server determines that the phone number of the third group member exists in the address book of the second group member, the cloud server sends the second phone number of the second group member to the third group member.
  • the method further includes: when the cloud server determines that the phone number of the third group member does not exist in the address book of the second group member, the cloud server sends a notification to the cloud server The second group member sends a second request; the second request is used to instruct the terminal device to request to add the second group member as a contact;
  • the cloud server When the cloud server receives the consent instruction from the second group member, it sends the second phone number of the second group member to the third group member.
  • the method before the cloud server receives the first request from the third group member, the method further includes:
  • the cloud server determines that the second group member joins the group, it sends second group joining information to the third group member, where the second group joining information is used to indicate that the second group member is invited Joining a group chat, the information of the second group member displayed in the second group joining message is the user name of the second group member;
  • the inviter for inviting the members of the second group to join the group is the second inviter
  • the information of the second inviter displayed in the second group joining message is that the second inviter is in the third group
  • the remark name in the address book of the group member; when the second inviter does not exist in the address book of the third group member, the information of the second inviter displayed in the second group joining message is: The username of the second inviter.
  • the method further includes: when the cloud server determines that the first group member joins the group, sending first group joining information to the third group member, the first joining the group
  • the information is used to indicate that the first group member is invited to join the group chat
  • the information of the first group member displayed in the first group joining message is the communication of the first group member in the third group member Note name in the record.
  • the inviter for inviting the members of the first group to join the group is the first inviter
  • the information of the first inviter displayed in the first group joining message is that the first inviter is in the third group
  • the remark name in the address book of the group member; when the first inviter does not exist in the address book of the third group member, the information of the first inviter displayed in the first group joining message is: The username of the first inviter.
  • the first request carries the verification information of the third contact
  • the second request carries the verification information of the third contact
  • the verification information is used to describe the the identity information of the third contact.
  • a twentieth aspect provides a communication system, including: a terminal device and a cloud server;
  • the terminal device includes: a processor; a memory; wherein the memory stores one or more computer programs, and the one or more computer programs include instructions that, when executed by the processor, cause all The terminal device performs the steps of the terminal device in the method provided in the seventeenth aspect above;
  • the cloud server includes: a processor; a memory; wherein the memory stores one or more computer programs, and the one or more computer programs include instructions that, when executed by the processor, cause all The cloud server executes the steps of the cloud server in the method provided in the seventeenth aspect above.
  • a twenty-first aspect provides a terminal device, including:
  • processor memory, and, one or more programs
  • the one or more programs are stored in the memory, and the one or more programs include instructions, when the instructions are executed by the processor, cause the terminal device to execute the above eighteenth The method steps provided by the aspect.
  • a twenty-second aspect provides a cloud server, including:
  • processor memory, and, one or more programs
  • the one or more programs are stored in the memory, and the one or more programs include instructions, when the instructions are executed by the processor, cause the terminal device to execute the nineteenth above The method steps provided by the aspect.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store a computer program, and when the computer program is run on a computer, the computer is made to execute the seventeenth aspect above.
  • the method provided by any one of the to nineteenth aspects.
  • a twenty-fourth aspect provides a computer program product, comprising a computer program that, when the computer program is run on a computer, causes the computer to perform any one of the seventeenth to nineteenth aspects above. method.
  • a twenty-fifth aspect provides a graphical user interface on an electronic device, the electronic device having a display screen, a memory, and a processor for executing one or more computer programs stored in the memory , the graphical user interface includes a graphical user interface displayed when the electronic device executes the method provided in any one of the seventeenth to nineteenth aspects.
  • an embodiment of the present application further provides a chip, which is coupled to a memory in an electronic device and used to call a computer program stored in the memory and execute the seventeenth to nineteenth aspects of the embodiment of the present application
  • "coupled" in the embodiments of the present application means that two components are directly or indirectly combined with each other.
  • 1A is a schematic diagram of a hardware structure of a terminal device provided by an embodiment of the application.
  • FIG. 1B is a schematic diagram of a software structure of a terminal device according to an embodiment of the application.
  • FIGS. 2A to 2D are schematic diagrams of GUIs of instant messaging applications provided by an embodiment of the present application.
  • FIG. 2E is a schematic diagram of an application scenario provided by an embodiment of the application.
  • 3A is a schematic diagram of a registration process of an instant messaging application provided by an embodiment of the present application.
  • 3B to 3C are schematic diagrams of GUIs of a registration process of an instant messaging application according to an embodiment of the present application.
  • FIGS. 4A to 4B are schematic diagrams of relevant GUIs of an instant messaging application provided by an embodiment of the present application.
  • 5A is a schematic diagram of a process of creating a group by an instant messaging application according to an embodiment of the present application
  • 5B is a schematic diagram of a GUI for creating a group by an instant messaging application according to an embodiment of the present application
  • 5C is a schematic diagram of a GUI of a user invited to a group provided by an embodiment of the present application.
  • 5D is a schematic diagram of a GUI provided by an embodiment of the present application after inviting a contact to join a group;
  • 5E is a schematic diagram of a GUI of a group member list in a group provided by an embodiment of the present application.
  • 6A is a schematic diagram of a process of adding another group member as a contact in a group in a group provided by an embodiment of the present application;
  • 6B to 6C are schematic diagrams of GUIs when a group member in a group adds another group member as a contact according to an embodiment of the present application;
  • FIG. 7A is a schematic diagram of another process of adding another group member as a contact in a group in a group provided by an embodiment of the present application;
  • FIG. 7B is a schematic diagram of a GUI when saving a contact according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of still another process of adding another group member as a contact in a group in a group provided by an embodiment of the present application;
  • FIG. 9 is a schematic diagram of a structure of a terminal device or a cloud server provided by an embodiment of the present application.
  • Applications can be of various types, such as video playback applications, image capture applications, and instant messaging applications.
  • instant messaging applications include, for example, Huawei Changlian application, various mailbox applications, WhatsApp Kakao or Wait.
  • the applications mentioned below can be applications that have been installed when the electronic device leaves the factory, or applications that are downloaded from the network or obtained from other electronic devices by the user during the use of the electronic device (for example, applications sent by other electronic devices) .
  • the mobile phone address book refers to the contact list in which the phone number is stored in the mobile phone, and the user can search for the contact person in the mobile phone address book, and then dial the phone number of the contact person.
  • At least one refers to one or more, and “multiple” refers to two or more.
  • And/or which describes the relationship of the associated objects, indicates that there can be three kinds of relationships, for example, A and/or B, it can indicate that A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects are an “or” relationship.
  • At least one item(s) below” or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s).
  • ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the size, content, order, and timing of multiple objects , priority or importance, etc.
  • first and second mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the size, content, order, and timing of multiple objects , priority or importance, etc.
  • the first user, the second user, and the third user, etc. are only for distinguishing different users, and do not indicate differences in the priority or importance of these users.
  • the privacy protection method for group members in a group provided by the embodiments of the present application can be applied to electronic devices.
  • the following describes electronic devices, a graphical user interface (GUI) for such electronic devices, and methods for using such electronic devices.
  • GUI graphical user interface
  • the electronic device may be a portable electronic device, such as a mobile phone, a PAD, a portable computer, a wearable device with a wireless communication function (such as a smart watch, smart glasses, smart bracelet, or smart helmet, etc.), or in-vehicle equipment, etc.
  • portable electronic devices include, but are not limited to, carry-on Or portable electronic devices with other operating systems.
  • FIG. 1A shows a schematic structural diagram of an electronic device.
  • the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charge management module 140, a power management module 141, a battery 142, Antenna 1, Antenna 2, Mobile Communication Module 150, Wireless Communication Module 160, Audio Module 170, Speaker 170A, Receiver 170B, Microphone 170C, Headphone Interface 170D, Sensor Module 180, Key 190, Motor 191, Indicator 192, Camera 193, Display screen 194, and subscriber identification module (subscriber identification module, SIM) card interface 195 and so on.
  • SIM subscriber identification module
  • the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
  • the processor 110 may include one or more processing units, for example, the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait.
  • different processing units may be independent devices, or may be integrated in one or more processors.
  • the controller can be the nerve center and command center of the electronic device. The controller can generate an operation control signal according to the instruction operation code and timing signal, and complete the control of fetching and executing instructions.
  • a memory may also be provided in the processor 110 for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may hold instructions or data that have just been used or recycled by the processor 110 . If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby increasing the efficiency of the system.
  • the USB interface 130 is an interface that conforms to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 130 can be used to connect a charger to charge the electronic device, and can also be used to transmit data between the electronic device and peripheral devices.
  • the charging management module 140 is used to receive charging input from the charger.
  • the power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 .
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140 and supplies power to the processor 110 , the internal memory 121 , the external memory, the display screen 194 , the camera 193 , and the wireless communication module 160 .
  • the wireless communication function of the electronic device can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modulation and demodulation processor, the baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in an electronic device can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • the antenna 1 can be multiplexed as a diversity antenna of the wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 150 can provide a wireless communication solution including 2G/3G/4G/5G etc. applied on the electronic device.
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA) and the like.
  • the mobile communication module 150 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modulation and demodulation processor, and then turn it into an electromagnetic wave for radiation through the antenna 1 .
  • at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 may be provided in the same device as at least part of the modules of the processor 110.
  • the wireless communication module 160 can provide applications on electronic devices including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • WLAN wireless local area networks
  • BT wireless fidelity
  • GNSS global navigation satellite system
  • frequency modulation frequency modulation
  • FM near field communication technology
  • NFC near field communication
  • IR infrared technology
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110 , perform frequency modulation on it, amplify it, and convert it into electromagnetic waves for radiation through
  • the antenna 1 of the electronic device is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the electronic device can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technologies may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code Division Multiple Access (WCDMA), Time Division Code Division Multiple Access (TD-SCDMA), Long Term Evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include a global positioning system (global positioning system, GPS), a global navigation satellite system (GLONASS), a Beidou navigation satellite system (BDS), a quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the display screen 194 is used to display the display interface of the application and the like.
  • Display screen 194 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode or an active-matrix organic light-emitting diode (active-matrix organic light).
  • LED diode AMOLED
  • flexible light-emitting diode flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (quantum dot light emitting diodes, QLED) and so on.
  • the electronic device may include 1 or N display screens 194 , where N is a positive integer greater than 1.
  • Camera 193 is used to capture still images or video.
  • the camera 193 may include a front camera and a rear camera.
  • Internal memory 121 may be used to store computer executable program code, which includes instructions.
  • the processor 110 executes various functional applications and data processing of the electronic device by executing the instructions stored in the internal memory 121 .
  • the internal memory 121 may include a storage program area and a storage data area.
  • the storage program area may store the operating system, and the software code of at least one application (eg, iQIYI application, WeChat application, etc.).
  • the storage data area can store data (such as images, videos, etc.) generated during the use of the electronic device.
  • the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (UFS), and the like.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to realize the data storage function. Such as saving pictures, videos and other files in an external memory card.
  • the electronic device can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone jack 170D, and the application processor. Such as music playback, recording, etc.
  • the pressure sensor 180A is used to sense pressure signals, and can convert the pressure signals into electrical signals.
  • pressure sensor 180A may be provided on display screen 194.
  • the gyro sensor 180B can be used to determine the motion attitude of the electronic device.
  • the angular velocity of the electronic device about three axes ie, the x, y, and z axes
  • the gyro sensor 180B can be used for image stabilization.
  • the air pressure sensor 180C is used to measure air pressure.
  • the electronic device calculates the altitude from the air pressure value measured by the air pressure sensor 180C to assist in positioning and navigation.
  • the magnetic sensor 180D includes a Hall sensor.
  • the electronic device can use the magnetic sensor 180D to detect the opening and closing of the flip holster.
  • the electronic device when the electronic device is a flip machine, the electronic device can detect the opening and closing of the flip according to the magnetic sensor 180D. Further, according to the detected opening and closing state of the leather case or the opening and closing state of the flip cover, characteristics such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 180E can detect the magnitude of the acceleration of the electronic device in various directions (generally three axes).
  • the magnitude and direction of gravity can be detected when the electronic device is stationary. It can also be used to identify the posture of electronic devices, and can be used in applications such as horizontal and vertical screen switching, pedometers, etc.
  • Distance sensor 180F for measuring distance.
  • Electronic devices can measure distances by infrared or laser. In some embodiments, when shooting a scene, the electronic device can use the distance sensor 180F to measure the distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, light emitting diodes (LEDs) and light detectors, such as photodiodes.
  • the light emitting diodes may be infrared light emitting diodes.
  • Electronic devices emit infrared light outward through light-emitting diodes.
  • Electronic devices use photodiodes to detect reflected infrared light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object in the vicinity of the electronic device.
  • the electronic device can determine that there is no object in the vicinity of the electronic device.
  • the electronic device can use the proximity light sensor 180G to detect that the user holds the electronic device close to the ear to talk, so as to automatically turn off the screen to save power.
  • the proximity light sensor 180G can also be used in holster mode, pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 180L is used to sense ambient light brightness.
  • the electronic device can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device is in the pocket to prevent accidental touch.
  • the fingerprint sensor 180H is used to collect fingerprints. Electronic devices can use the collected fingerprint characteristics to unlock fingerprints, access application locks, take photos with fingerprints, and answer incoming calls with fingerprints.
  • the temperature sensor 180J is used to detect the temperature.
  • the electronic device utilizes the temperature detected by the temperature sensor 180J to implement a temperature handling strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold value, the electronic device may reduce the performance of the processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection.
  • the electronic device when the temperature is lower than another threshold, the electronic device heats the battery 142 to avoid abnormal shutdown of the electronic device caused by the low temperature.
  • the electronic device boosts the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 180K also called “touch panel”.
  • the touch sensor 180K may be disposed on the display screen 194 , and the touch sensor 180K and the display screen 194 form a touch screen, also called a “touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near it.
  • the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
  • Visual output related to touch operations may be provided through display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the electronic device, which is different from the location where the display screen 194 is located.
  • the bone conduction sensor 180M can acquire vibration signals.
  • the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human voice.
  • the bone conduction sensor 180M can also contact the pulse of the human body and receive the blood pressure beating signal.
  • the keys 190 include a power-on key, a volume key, and the like. Keys 190 may be mechanical keys. It can also be a touch key.
  • the electronic device may receive key input and generate key signal input related to user settings and function control of the electronic device.
  • Motor 191 can generate vibrating cues.
  • the motor 191 can be used for vibrating alerts for incoming calls, and can also be used for touch vibration feedback. For example, touch operations acting on different applications (such as taking pictures, playing audio, etc.) can correspond to different vibration feedback effects.
  • the indicator 192 can be an indicator light, which can be used to indicate the charging state, the change of the power, and can also be used to indicate a message, a missed call, a notification, and the like.
  • the SIM card interface 195 is used to connect a SIM card. The SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to achieve contact and separation with the electronic device.
  • FIG. 1A do not constitute a specific limitation on the electronic device.
  • Electronic devices in embodiments of the present invention may include more or fewer components than in FIG. 1A .
  • the combination/connection relationship between the components in FIG. 9 can also be adjusted and modified.
  • FIG. 1B shows a software structural block diagram of an electronic device provided by an embodiment of the present application.
  • the software structure of the electronic device may be a layered architecture, for example, the software may be divided into several layers, and each layer has a clear role and division of labor. Layers communicate with each other through software interfaces.
  • the Android system is divided into four layers, which are, from top to bottom, an application layer, an application framework layer (framework, FWK), an Android runtime (Android runtime) and system libraries, and a kernel layer.
  • the application layer can include a series of application packages. As shown in FIG. 1B , the application layer may include cameras, settings, skin modules, user interface (UI), third-party applications, and the like. Among them, third-party applications can include Gallery, Calendar, Call, Map, Navigation, WLAN, Bluetooth, Music, Video, SMS, etc.
  • UI user interface
  • third-party applications can include Gallery, Calendar, Call, Map, Navigation, WLAN, Bluetooth, Music, Video, SMS, etc.
  • the application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer.
  • the application framework layer can include some predefined functions. As shown in FIG. 1B, the application framework layer may include window managers, content providers, view systems, telephony managers, resource managers, notification managers, and the like.
  • a window manager is used to manage window programs.
  • the window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, take screenshots, etc.
  • Content providers are used to store and retrieve data and make these data accessible to applications.
  • the data may include video, images, audio, calls made and received, browsing history and bookmarks, phone book, etc.
  • the view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on. View systems can be used to build applications.
  • a display interface can consist of one or more views.
  • the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
  • the phone manager is used to provide the communication function of the electronic device. For example, the management of call status (including connecting, hanging up, etc.).
  • the resource manager provides various resources for the application, such as localization strings, icons, pictures, layout files, video files and so on.
  • the notification manager enables applications to display notification information in the status bar, which can be used to convey notification-type messages, and can disappear automatically after a brief pause without user interaction. For example, the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also display notifications in the status bar at the top of the system in the form of graphs or scroll bar text, such as notifications of applications running in the background, and notifications that appear on the screen in the form of dialog windows. For example, text information is prompted in the status bar, a prompt sound is issued, the electronic device vibrates, and the indicator light flashes.
  • the Android runtime includes core libraries and a virtual machine. Android runtime is responsible for scheduling and management of the Android system.
  • the core library consists of two parts: one is the function functions that the java language needs to call, and the other is the core library of Android.
  • the application layer and the application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application layer and the application framework layer as binary files.
  • the virtual machine is used to perform functions such as object life cycle management, stack management, thread management, safety and exception management, and garbage collection.
  • a system library can include multiple functional modules. For example: surface manager (surface manager), media library (media library), 3D graphics processing library (eg: OpenGL ES), 2D graphics engine (eg: SGL), etc.
  • surface manager surface manager
  • media library media library
  • 3D graphics processing library eg: OpenGL ES
  • 2D graphics engine eg: SGL
  • the Surface Manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as still image files.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing.
  • 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display drivers, camera drivers, audio drivers, and sensor drivers.
  • the hardware layer may include various types of sensors, for example, an acceleration sensor, a gyroscope sensor, and a touch sensor involved in the embodiments of the present application.
  • instant messaging applications may be installed in a user's device (such as a mobile phone and a tablet computer).
  • a user's device such as a mobile phone and a tablet computer.
  • mainstream instant messaging applications can be divided into two categories, one is an application for communication based on an independent account, and the other is an application for communication based on a mobile phone number.
  • the first category is instant messaging applications based on independent accounts. This type of application needs to add the other party as a friend in order to exchange messages with the other party. For example, see FIG. 2A(a) for a schematic diagram of a friend list of the first type of instant messaging application. The nickname or remarks of the added friends are displayed in the friend list, and the user can send messages to and from the friends in the friend list. for example, Facetime etc. belong to the first category of applications. There are many ways to add friends. For example, continue to refer to (a) in FIG. 2A, when the mobile phone detects the operation of clicking the button 101, the interface as shown in (b) in FIG. 2A is displayed, and the interface includes Search box, scan, mobile phone contacts and other ways to add friends.
  • the mobile phone address book can be displayed.
  • the user can select a contact in the mobile phone address book and send a request to add a friend to the contact. If it is successfully added as a friend, the friend list will be displayed. Add the friend in the , and users can send messages to each other. That is to say, for the first type of application, even contacts already stored in the mobile phone address book need to be added as friends before they can send messages to each other.
  • the first category of applications can create groups (ie, group chats).
  • the group includes user A, user B, and user C.
  • the group can display relevant information of the group members, such as the avatars, nicknames, personalized signatures, etc. of the group members when they register.
  • user A assuming that user C is not in user A's friend list, if user A wants to chat with user C, he can initiate an application for adding a friend to add him as a friend. After the other party agrees, he can send messages to each other. .
  • the second category is instant messaging applications based on mobile phone numbers.
  • the main feature of this type of application is that it does not need to add friends like the first type of application to send messages to each other.
  • the second type of application can directly select a contact in the mobile phone address book and communicate with the contact. For example, taking the Changlian app as an example, after the user registers the Changlian app with a mobile phone number, he can check which contacts have registered with the Changlian app in the mobile phone address book, and then he can directly establish a smooth connection with these contacts in the mobile phone address book. For calls (such as video, voice calls, or mutual messaging), there is no need to add the other party as a friend first, as in the first category of applications.
  • FIG. 2B is a schematic diagram of a mobile phone address book.
  • the mobile phone address book includes contacts whose phone numbers have been saved in the mobile phone, such as John, David, and Nick. Assuming that John has opened the Changlian application, the mobile phone address book will display the Changlian mark, such as a video call mark 102 and a voice call mark 103 . The user can initiate a smooth video call with John through the video call mark 102, and initiate a smooth voice call with John through the voice call mark 103. The operation is simple and can be directly initiated in the mobile phone address book without adding friends.
  • the Huawei Changlian app, etc. also belong to the second category of instant messaging applications. Compared with the first type of instant messaging application, the second type of instant messaging application is more convenient to operate.
  • the second type of application can also create a group. Different from the first type of application, because the second type of application communicates based on mobile phone numbers, the mobile phone numbers of the group members in the group created by the second type of application are displayed in plain text. of.
  • the group includes user A, user B, and user C.
  • the mobile phone of user A is a schematic diagram of the chat interface of the group on the mobile phone of user A, assuming that the mobile phone detects the operation for the control 104, the mobile phone displays as shown in FIG. 2C ( The interface shown in b), the interface includes the information of the group members in the group. Since user C is not in the mobile phone address book of user A, the phone number of user C is displayed in plain text, that is, "131xxxxxxxx". In this case, the user The phone number of C is directly exposed to user A, and user A may call or send text messages to the number alone, causing harassment to the other party.
  • the group chat interface as shown in FIG. 2D can be displayed.
  • the chat interface includes prompt information: User B invites "131xxxxxxxx" to join the group chat.
  • user D's mobile phone number 131xxxxxxxx is directly exposed to everyone in the group.
  • the present application provides a privacy protection method for group members in a group, which can protect private information (such as mobile phone numbers) of group members from being exposed.
  • user A, user B, and user C have all registered the Changlian app and uploaded their avatars and nicknames.
  • user A, user B, and user C are in the same group. If user C is not in user A's mobile phone address book, user A cannot see user C's mobile phone number, but can only see user C's nickname and/or avatar, preventing user C's mobile phone number from being exposed to user A.
  • the mobile phone numbers of the group members can be prevented from being leaked to strangers in the group, and the harassment of short messages and phone calls caused by the leakage of the mobile phone numbers can be avoided, and the security is high.
  • FIG. 2E is a schematic diagram of a system provided by the present application.
  • the system includes a first device, a second device, a third device and a Changlian cloud service.
  • the hardware structure of the first device, the second device and the third device may refer to FIG. 1A
  • the software structure may refer to FIG. 1B .
  • the three devices can be of the same type, for example, all three devices are mobile phones or all are tablet computers. Alternatively, the types of the three devices may be different, for example, the first device and the second device are mobile phones, the third device is a tablet computer, etc. In short, the embodiments of the present application do not limit the types of the three devices.
  • the phone number of the first device is the first number
  • the phone number of the second device is the second number
  • the phone number of the third device is the third number
  • the first device, the second device, and the third device are all installed with an instant messaging application based on a mobile phone number, such as the Huawei Changlian application.
  • the third device registers with the Changlian cloud service based on the third number and uploads the third nickname and the third avatar. Therefore, three users are recorded on the Changlian cloud service, namely the first user, the second user and the third user, as follows:
  • the first user the first number, the first nickname, the first avatar;
  • Second user second number, second nickname, second avatar
  • Third user third number, third nickname, third avatar.
  • the second number is not in the first user's mobile phone address book, when the first device views the information of the second user in the group, it cannot see the second user's second number, but only the second user's first number. Second nickname and/or second avatar. If the first user wants to communicate with the second user, he can send a contact adding request, and if the other party agrees, add the second user's second number to the first user's mobile phone address book, and then communicate with the second user. communication.
  • the third user's third number is in the first user's mobile phone address book, when the first device views the information of the third user in the group, it can see the third user's third number, and can also directly access the The third number communicates with the third user without adding contacts again.
  • the system shown in FIG. 2E is used as an example for introduction, and the first device, the second device and the third device are all mobile phones, and the smooth connection application is installed in the three mobile phones as an example.
  • the user relationship of the three devices satisfies the following:
  • the user of the first device is Amy, the first nickname is AAA, and the first number is 185 xxxx xxxx;
  • the user of the second device is David, the second nickname is DW, and the second number is 156 xxxx xxxx;
  • the user of the third device is Tom, the third nickname is flower, and the third number is 138 xxxx xxxx.
  • the first embodiment to the fifth embodiment are included.
  • the first embodiment introduces the registration process of the Changlian application;
  • the second embodiment introduces the process of establishing the group of the Changlian application;
  • the third embodiment to the fifth embodiment respectively introduce the realization process of the independent chat between two group members in the group.
  • This Embodiment 1 introduces the registration process of the Changlian application. It should be noted that the current second type of instant messaging applications do not need to upload avatars and nicknames when registering, and users register directly based on their mobile phone numbers, so the cloud side uses mobile phone numbers to distinguish different users, so when the cloud side establishes a group , send the mobile phone numbers of the group members to the group to identify different group members, which will lead to the exposure of the mobile phone numbers of the group members.
  • users need to upload nicknames and avatars when registering the Changlian application based on their mobile phone numbers, so the cloud side knows the mobile phone number of each registered user, and also knows the nickname and avatar of each registered user, so the nickname and avatar can be used. / or avatars to mark different users, then when creating a group, you can use nicknames and/or avatars to identify different group members, so as to avoid directly exposing the phone numbers of group members.
  • FIGS. 3A to 4B The drawings involved in the first embodiment include FIGS. 3A to 4B .
  • FIG. 3A it is a schematic diagram of the registration process of the Changlian application. As shown in Figure 3A, the process includes:
  • the mobile phone receives a first operation for registering a Changlian application.
  • FIG. 3B shows a graphical user interface (graphical user interface, GUI) of the mobile phone, where the GUI is the home screen (home screen) of the mobile phone.
  • the main interface includes icons of various applications, for example, the icon of the camera application, the icon of the application market, the icon of the Changlian application, and so on.
  • GUI graphical user interface
  • the login interface displays a mobile phone number input box and a password input box, where the user can enter the mobile phone number and password to log in. It is understandable that if you are using the Changlian app for the first time, you can register first.
  • the mobile phone when the mobile phone detects that the user clicks the "register” control, it displays the interface shown in (c) in Figure 3B, the interface includes a mobile phone number input box, and the user can Enter the mobile phone number in this input box, such as 185 xxxx xxxx.
  • the above-mentioned first operation may be an operation of clicking the "Next" control in the interface shown in (c) in FIG. 3B ; or, the first operation may also be other types of operations, such as a voice for instructing the registration of the Changlian application. Instructions, etc., are not limited in the embodiments of the present application.
  • the mobile phone sends a registration application to the Changlian cloud service.
  • the mobile phone number of the user may be carried in the registration application, for example, the mobile phone number 185 xxxx xxxx in (c) in FIG. 3B .
  • the mobile phone receives the SMS verification code sent by the Changlian cloud service.
  • Changlian Cloud Service After receiving the registration application sent by the mobile phone, Changlian Cloud Service will send an SMS verification code to the mobile phone number carried in the registration application. For example, if the mobile phone number carried in the registration application is 185 xxxx xxxx, the Changlian cloud service will send a SMS verification code to the mobile phone number 185 xxxx xxxx, such as 123456.
  • the mobile phone After the mobile phone receives the verification code, it can enter the verification code into the verification code input box, as shown in (d) in Figure 3B, the user enters the SMS verification code "123456", when the mobile phone detects the operation of the "complete" control , and send the entered SMS verification code to the Changlian Cloud service.
  • the “Complete” control in (d) of FIG. 3B may not be displayed. For example, when it is detected that the verification code input is completed (for example, the verification code is 6 digits, it is detected that the user has input 6 digits to confirm the input completion), the default Send the entered SMS verification code to Changlian Cloud Service
  • the mobile phone sends an SMS verification code to the Changlian cloud service.
  • the Changlian cloud service record sends the SMS verification code 123456 to the mobile phone number 185xxxxxxxx.
  • the Changlian cloud server receives the SMS verification code from the mobile phone number 185xxxxxxxx, it can verify the SMS verification code, for example, to determine whether the received SMS verification code is consistent with the sent SMS verification code, and if so, then The verification is passed, otherwise, the verification is not passed.
  • the time difference between the receiving time and the sending time of the SMS verification code is less than a preset time. The length of time, if yes, the verification is passed, otherwise, the verification is not passed.
  • the Changlian cloud service can send a successful registration response to the mobile phone; of course, when the verification fails, it can also send a registration failed response to the mobile phone.
  • the Changlian cloud service sends a response of successful registration to the mobile phone.
  • the specific process includes S107 to S108.
  • the mobile phone uploads information such as the user's avatar, nickname and so on.
  • the Changlian cloud service stores information such as user avatars, nicknames, and the like.
  • the mobile phone displays an interface as shown in (a) in FIG. 3C , and the interface displays the default avatar and nickname input boxes.
  • an interface as shown in (b) of FIG. 3C may be displayed, and the interface includes a control of "select an image from an album".
  • the mobile phone detects the operation of the "select image from album” control, it opens the album, as shown in (c) in FIG.
  • the mobile phone displays the interface shown in (d) of FIG. 3C , in which the avatar is displayed as the image 300 selected by the user.
  • 3C is displayed, in which the avatar is displayed as the image 300 selected by the user.
  • the user inputs a nickname: Amy, when the mobile phone detects When the user clicks the "Upload” control, the avatar, nickname and other information will be uploaded to the Changlian cloud service.
  • the interface shown in (e) of FIG. 3C further includes a personalized signature input box, and the user can input the user's personalized signature in the input box and upload it to the Changlian cloud service.
  • FIG. 3B to FIG. 3C illustrate the process of a user using his mobile phone to register the Changlian application based on the user's mobile phone number (eg, 185 xxxx xxxx). It is understandable that multiple users can use their mobile phone numbers to register the Changlian app, and the registration principle is the same as the above. That is to say, a large number of registered users can be stored in the Changlian cloud service. For example, see Table 1 below, which is an example of registered users stored in the Changlian cloud service.
  • the second user in addition to the first user (such as 185 xxxx xxxx), the second user whose mobile number is 156 xxxx xxxx, the third user whose mobile number is 138 xxxx xxxx, and the fourth user whose mobile number is 131 xxxx xxxx respectively All registered the Huawei Changlian app and uploaded their avatars.
  • the Changlian cloud service sends a response that the upload is successful to the mobile phone.
  • the mobile phone is registered with the Changlian application
  • the first user's mobile phone address book includes 100 contacts, and 50 of them may be registered with the Changlian app, then the first user's mobile phone can mark the contacts registered with the Changlian app in a certain way.
  • the first user's mobile phone sends his mobile phone address book to the Changlian cloud service.
  • Changlian cloud service know the mobile phone number of each registered Changlian app.
  • the Changlian cloud service After the Changlian cloud service receives the first user's mobile phone address book, it can be determined that the user who has registered the Changlian application in the mobile phone address book, so the Changlian cloud service can instruct the first user's mobile phone through a certain instruction method. Users who have registered the Changlian app in the address book.
  • FIG. 4A is a schematic diagram of the interface of the Connect application in the mobile phone of the first user, and the interface includes a contact option 402 , a Connect option 403 , and a call option 404 .
  • the contact option 402 when the contact option 402 is selected, the mobile phone displays the address book, for example, including contacts John, David and Nick. Among them, John and David have registered the Changlian application, so in (a) of FIG. 4A , the contacts John and the contact David are displayed with corresponding Changlian marks, such as the Changlian video mark and the Changlian voice mark. Since the contact Nick has not registered the Changlian app, the contact Nick does not display the Changlian mark in this interface.
  • the mobile phone can also filter out the contacts registered with the Changlian application from the mobile phone address book, so as to facilitate the user to find.
  • the contacts registered with the Changlian application filtered from the mobile phone address book are collectively referred to as the Changlian address book. That is to say, the mobile phone address book includes all the contacts stored on the phone, while the Changlian address book includes the contacts in the mobile phone address book that have been registered with the Changlian app.
  • the Changlian address book is a subset of the phone address book. .
  • the Changlian address book can be updated in real time. For example, after a contact in the first user's mobile phone address book registers the Changlian app, the Changlian cloud service notifies the first user's mobile phone. The contact is added to the Changlian address book in the user's mobile phone.
  • FIG. 4A also includes a connection option 403 and a call option 404 .
  • the connection option 403 When the connection option 403 is selected, the mobile phone can display an interface as shown in (c) in FIG. 4A , in which messages are displayed with contacts John and David.
  • the call option 404 When the call option 404 is selected, the mobile phone displays the interface shown in (d) of FIG. 4A , and the interface includes the call records, such as the calls with John, David, etc. yesterday.
  • FIG. 4A Continuing to take (a) in FIG. 4A as an example, assuming that the user wants to chat with John in the mobile phone address book alone, he can do it in three ways: a video call, a voice call, and a message.
  • the user can initiate a call to John through the video mark and voice mark corresponding to contact John in the interface shown in (a) of FIG. 4A .
  • you can also initiate a call to John in other ways.
  • display interface which includes John's related information, such as avatar, nickname, etc.
  • the interface also includes a Changlian video mark 411 , a Changlian voice mark 412 , and a Changlian message mark 413 .
  • the mobile phone detects that the user clicks on the Connected Video mark 411, and initiates a Connected Video call to John, for example, see (b) in FIG. 4B .
  • the mobile phone detects that the user clicks on the unblocked voice mark 412, it initiates a unblocked voice call to John, for example, see (c) in FIG. 4B.
  • the interface shown in (d) in FIG. 4B can be displayed, which can be understood as a chat interface with John, in which the user can send text to John , picture, location, expression, etc.
  • the second embodiment introduces the process of establishing a group by the Changlian application.
  • the drawings involved in the second embodiment include FIG. 5A to FIG. 5D .
  • 5A is a schematic flowchart of establishing a group.
  • S201 to S206 are processes in which the first user invites a second user to join the group
  • S206 to S211 are processes in which the second user invites a third user to join the group.
  • the mobile phone of the group member will display a new member joining the group prompt, which is used to prompt the new member to join the group. It can be seen from Figure 2D that the current second type of instant messaging application displays the new member joining the group.
  • the mobile numbers of the inviter and/or invitee are displayed in clear text in the prompt.
  • the second embodiment of the present invention displays the nickname of the inviter and/or the nickname of the invitee in the group-entry prompt of the new member, so as to avoid direct exposure of the mobile phone numbers of the inviter and/or the invitee.
  • FIG. 5A is a schematic diagram of a flow of establishing a group. As shown in Figure 5A, the process includes:
  • the registration process may refer to Embodiment 1, which will not be repeated here.
  • the first user detects an operation for inviting a second user to join the group chat.
  • the mobile phone of the first user displays an interface as shown in (a) in FIG. 5B , the interface includes a control 501, and when an operation on the control 501 is detected, the interface shown in (b) in FIG. 5B is displayed.
  • the interface includes the contacts in the Changlian address book, from which the user can select the contacts to be invited into the group. For example, the user selects the contact David (ie, the second user), and when the mobile phone detects that the user clicks the "OK" control, it invites David to join the chat.
  • the above takes the establishment of a group through the control 501 as an example. It can be understood that the group can also be established in other ways, for example, establishing a face-to-face group, or pulling another contact to join in a separate chat interface with a certain contact etc., which are not limited in this embodiment.
  • the first user sends an invitation to join the group of the second user to the Changlian cloud service.
  • the group joining invitation may carry the mobile phone number of the second user, and optionally may also carry information such as the nickname and avatar of the second user.
  • the Changlian cloud service sends a group invitation to the second user.
  • FIG. 5C is a schematic diagram of the display interface of the second user.
  • the interface displays prompt information: Amy invites you to join the group chat.
  • the Changlian cloud service receives a notification of agreeing to join the group from the second user.
  • S203 and S204 may be executed or not executed (so indicated by a dotted line in FIG. 5A ).
  • S203 and S204 may be executed or not executed (so indicated by a dotted line in FIG. 5A ).
  • the second user is directly added to the group by the Changlian cloud service without the consent of the second user.
  • the Changlian cloud service generates a group including the first user and the second user.
  • the Changlian cloud service sends group information to the first user and the second user.
  • the group information may be, for example, a prompt for a new member to join the group, that is, prompt information for prompting the second user to join the group.
  • the interface shown in (c) in FIG. 5B is displayed on the mobile phone of the first user, and the interface displays new members Group joining reminder: You invite "David" to join the group chat, that is, the group includes the first user (Amy) and the second user (David).
  • the second user may also pull contacts in the second user's Changlian address book, such as the third user, into the group.
  • the process of pulling the third user into the group chat by the second user includes S206 to S211.
  • the second user sends an invitation to join the group of the third user to the Changlian cloud service.
  • the third user is a contact in the Changlian address book of the second user.
  • the Changlian cloud service sends a group invitation to the third user.
  • the Changlian cloud service receives an indication of agreeing to join the group sent by the third user.
  • S208 and S209 may be performed or not performed (so indicated by dotted lines in FIG. 5A ).
  • the Changlian cloud service updates the group including the first user and the second user to a group including the first user, the second user and the fourth user.
  • the Changlian cloud service sends updated group information to the first user, the second user, and the third user.
  • the group information is a prompt for a new member to join the group, for example, it may be prompt information for instructing the third user to join the group.
  • a group chat interface is displayed on the mobile phone of the first user, the chat interface includes prompt information, and David (ie the second user) invites "flower” (ie the nickname of the third user) to join the group chat.
  • the display style of the new member joining the group prompt may be: "X" invites "Y" to join the group chat.
  • X is the name of the inviter and Y is the name of the invitee.
  • X is the nickname of the inviter, and/or, Y is the nickname of the invitee.
  • the group member's mobile phone displays the new member's notification message: "X" invites "Y” to join the group chat, where X is the inviter's nickname , Y is the nickname of the invitee.
  • the prompt information displayed on the first user's mobile phone can be: "DW" invites "flower” Join the group chat, where DW is the nickname of the second user and flower is the nickname of the third user.
  • the mobile phone of the group member will display: You invite Y to join the group chat, where Y is the nickname of the invitee.
  • the mobile phone of the group member will display: X invites you to join the group chat, where X is the inviter's nickname.
  • the nickname of the inviter and/or the nickname of the invitee is displayed in the new member joining the group, so the mobile phone number of the new member who is invited to join the group will not be directly exposed.
  • the way to display the mobile number of new members the user privacy is higher.
  • Method 2 When a group member's mobile phone number includes the inviter's mobile phone number and is marked as X1, and the invitee's mobile phone number is not saved, the group member's mobile phone will display a new member joining the group prompt: X1 invites Y joins the group chat, where Y is the nickname of the invitee.
  • the mobile phone number of the second user (David) is saved in the mobile phone address book of the first user, and is marked as David, but the mobile phone number of the third user is not saved, so the first user
  • the group entry prompt displayed on his mobile phone is: “David” invites “flower” to join the group chat; among them, "flower” is the nickname of the third user.
  • Method 3 When the mobile phone number of the invitee is included in the mobile phone number of the group member and the mobile phone number of the inviter is not saved, the mobile phone number of the inviter will be displayed on the mobile phone of the group member. Y1 joins the group chat, at this time X is the nickname of the inviter.
  • Method 4 When the mobile phone number of the inviter is saved in the mobile phone address book of the group member and the note is X1, and the mobile phone number of the invitee is saved and the note is Y1, the new member entered on the mobile phone of the group member will be added.
  • the group prompt is that X1 invites Y1 to join the group chat.
  • the above methods 2 to 4 are different from method 1.
  • the nickname of the inviter The methods 2 to 4 consider the situation that the phone numbers of the inviter and the invitee may exist in the contact list of the group members. For example, for a group member who has saved the inviter's mobile phone number, the new member's group entry prompt on his mobile phone displays the remark name of the inviter, and for a group member who has not saved the inviter's mobile phone number, the nickname is displayed on his mobile phone. .
  • an implementable method is that, before the Changlian cloud service sends a group member a prompt for a new member to join the group, it can be determined that the mobile phone numbers of the inviter and/or the invitee are saved in the Changlian address book group members. Since the Changlian cloud service knows the Changlian address book of each group member, and also knows the mobile phone numbers of the inviter and/or the invitee, the Changlian cloud service can determine which group member is in the Changlian address book. Include mobile numbers of invitees and/or invitees.
  • the Changlian cloud server uses one of the above methods 2 to 4. For example, when Changlian Cloud Service determines that a certain group member's Changlian address book includes the mobile phone numbers of the inviter and the invitee, the Changlian Cloud Service can use the style of Method 4 above to generate a prompt for new members to join the group, and Send the generated new member joining notification to the group members. For group members who have not saved the mobile phone numbers of the inviter and the invitee in the Changlian address book, the Changlian cloud server uses the above method 1 to generate a new member joining the group prompt.
  • the above embodiment takes the display style of the new member joining the group as: "X” invites "Y” to join the group chat as an example.
  • the display style of the new member joining the group can also be "Y joins the group chat", that is, the inviter is not included, only the invitee is included. Repeat.
  • the above embodiment takes the example that the new member joining the group prompt will not directly reveal the mobile phone numbers of the inviter and the invitee.
  • a group member in the group wants to view the information of another group member, if the other group member is not in the mobile phone address book of the group member, he cannot see the mobile phone number of the other group member. of.
  • the interface shown in Fig. 5E can be displayed, and the interface includes the relevant information of the group , such as including group members.
  • the group members include: Amy (the first user), David (the second user), and flower (the third user). Since the third user is a stranger to the first user, the first user can only see the nickname (flower) of the third user on the mobile phone of the first user, and cannot directly see the mobile phone number of the third user.
  • the third embodiment introduces the implementation process of two group members chatting independently in the group. It should be noted that the mobile phone numbers of the group members in the group of the current second-type instant messaging application are displayed in plain text, so when a group member wants to talk with another group member, there is no need to add the other group member to the In the mobile phone address book, because the mobile phone number of the other group member is already known, the mobile phone number can be directly contacted.
  • group member A in the group wants to chat (audio/video or send a message) with group member A alone
  • the mobile phone number of group member B is already in the mobile phone address book of group member A
  • the mobile phone number of group member B is not in the mobile phone address book of group member A, since group member A does not know the mobile phone number of group member B, it can send a request to add a contact to group member B, only with the consent of the other party.
  • Obtain the mobile phone number of group member B add the mobile phone number of group member B to the mobile phone address book, and then chat with group member B individually.
  • FIGS. 6A to 6C The drawings involved in the third embodiment include FIGS. 6A to 6C .
  • FIG. 6A is a schematic flowchart of adding a stranger in a group as a contact.
  • This process can be understood as a process after a group including the first user (Amy), the second user (David) and the third user (nickname flower) has been established, wherein the third user does not exist on the mobile phone of the first user in the address book.
  • the process includes:
  • the mobile phone of the first user detects an operation for adding a third user as a contact.
  • FIG. 6B is a schematic diagram of the GUI on the mobile phone of the first user.
  • the first user wants to chat privately with the third user whose nickname is "flower", he can add him as a contact and chat privately.
  • the mobile phone of the first user detects a click operation on the avatar of the third user, an interface as shown in (b) in FIG. 6B is displayed, and the interface includes the nickname flower and the avatar of the third user, and the connection is added. Human controls.
  • the operation for adding the third user as a contact in S301 may be an operation for the user to click the control for adding a contact; or, it may also be other operations, such as a voice instruction for adding the third user as a contact etc., which are not limited in the embodiments of the present application.
  • the interface 6B is displayed, because David exists in the Changlian address book of the first user, so the interface includes David's mobile phone number, avatar, nickname, etc.
  • a call record with David can also be displayed in the interface, and the first user can directly make a call with David.
  • the first user sends a request for adding a third user as a contact to the Changlian cloud service.
  • the request includes the number of the first user and the avatar and/or nickname of the third user.
  • the Changlian cloud service verifies the first user and the third user. S303 may or may not be performed.
  • the Changlian cloud service can verify whether the first user and the third user are legitimate users (whether they have registered the Changlian application), if so, the verification is passed, and the next steps are continued, otherwise, the verification fails.
  • the Changlian cloud service sends a request for adding the third user as a contact to the third user.
  • the request may carry the nickname, avatar of the first user, and optionally, the phone number of the first user.
  • S304 and S305 are optional steps, which may or may not be performed, so S304 to S305 are represented by dotted lines in FIG. 6A . If not executed, that is, without the consent of the third user, the Changlian cloud service may directly execute S306.
  • the Changlian cloud service sends the mobile phone number of the third user to the first user.
  • the first user saves the mobile phone number of the third user in the address book.
  • the mobile phone of the first user in FIG. 6B detects an operation for adding a contact control, it directly sends a request to add a third user as a contact to the Changlian cloud service as an example.
  • a request for adding a third user as a contact may not be sent to the Changlian cloud service first, for example, ( b)
  • the mobile phone of the first user detects the click operation on the control for adding a contact, an interface as shown in (a) in FIG.
  • the interface includes verification information, for example, hello, I am a group "xxx" in chat, where "xxx" can be the nickname of the first user.
  • the mobile phone detects the operation for the "send” control, it sends a request for adding the third user as a contact to the Changlian cloud service, and the request may carry the verification information.
  • the request may also carry the nickname, avatar, etc. of the third user.
  • the first user can input a name in the input box of the contact name, when the other party agrees to the request for adding a contact, the first user's mobile phone address book saves the other party's name.
  • mobile phone number, and the remark name of the mobile phone number is the name entered in the input box.
  • the mobile phone of the first user receives the mobile phone number of the third user
  • the mobile phone number of the third user is saved.
  • the first user's mobile phone address book includes a third user, and if the user wants to chat with the third user alone, he can click on the avatar or nickname of the third user to open the In the interface shown in (c) of FIG. 6C , an individual chat is initiated through the Changlian call mark, the Changlian voice mark, and the Changlian message mark in the interface.
  • the chat can be initiated directly through the chat mark or the chat mark in the interface shown in (b) of FIG. 6C .
  • the above process describes the process in which the first user requests to add the third user as a contact.
  • the third user can add the first user as a contact by default, for example, by The following steps S308 to S309 are implemented.
  • the Changlian cloud service sends the mobile phone number of the first user to the third user.
  • the third user saves the mobile phone number of the first user in the address book.
  • S308 and S309 are optional steps, so they are indicated by dotted lines in the figure.
  • a request for adding a contact may also be sent to the first user, and if the first user agrees, S308 and S309 are performed.
  • group member A in the group wants to chat with group member A alone
  • group member B is not in the mobile phone address book of group member A
  • a request for adding a contact is sent to group member B. Only if you agree can you obtain the mobile phone number of group member B, add group member B to the mobile phone address book, and then chat with group member B individually.
  • group member A once chatted with group member B alone. For example, group member A dialed the phone number of group member B, but group member A did not save the phone number in the mobile phone address book, so the group Member B is identified as a stranger of group member A. In this case, since group member A's call history already contains group member B's mobile phone number, there is no need to send group member B a contact adding request.
  • the fourth embodiment differs from the third embodiment in that: in the fourth embodiment, before group member A sends a request to add a contact to group member B, it can also determine whether there is a group in the historical call records of group member A. Member B, if it exists, can directly store the mobile phone number of group member B in the call history in the mobile phone address book without sending a contact adding request to group member B. If it does not exist, send a contact adding request to group member B. .
  • FIG. 7A is a schematic flowchart of adding a stranger in a group as a contact.
  • This process can be understood as the process after establishing a group including the first user (Amy), the second user (David) and the third user (nickname flower), wherein the third user does not exist in the first user's mobile phone communication recording.
  • the process includes:
  • the mobile phone of the first user detects an operation for adding a third user as a contact.
  • the operation may be an operation of clicking the control added as a contact in (b) of FIG. 6B .
  • the mobile phone of the first user determines whether the mobile phone number of the third user exists in the historical call record, and if so, S408 can be directly executed, otherwise, S403 is executed.
  • the historical call records may be recent call records, such as the recent call records shown in (d) in FIG. 4A . Alternatively, it may also be the historical short message record shown in (c) in 4A, which is not limited in this application.
  • the mobile phone of the first user can locally determine whether there is a third user in the historical call records.
  • the local historical call records include the user's avatar and nickname. By comparing the avatar and nickname, it can be determined whether there is a third user's avatar and nickname in the historical call records. If so, it is determined that the third user exists in the historical call records. , otherwise, it is determined that the third user does not exist in the historical call records.
  • the mobile phone of the first user determines that the mobile phone number of the third user exists in the historical call record, it can directly enter S408. For example, taking (b) in FIG. 6B as an example, in response to the operation of the user clicking the add contact control, the mobile phone of the first user determines whether the third user exists in the historical call records of the first user, and if so, directly S408 is directly executed when the third user is saved in the address book. Alternatively, when the mobile phone of the first user determines that the mobile phone number of the third user exists in the historical call record, a prompt message pops up, prompting whether to save as a contact, and if a confirmation instruction is received, go to S408. For example, continuing to take (b) in FIG.
  • the mobile phone of the first user does not directly save the third user in the address book in response to the operation of the user clicking the add contact control, but displays the display as shown in FIG. 7B .
  • the interface includes a save button, and when the mobile phone detects an operation on the save button, the third user is added as a contact.
  • a prompt message is displayed to prompt the user whether to send a request to add a contact to the other party, and if a confirmation instruction is detected, send to the Changlian cloud service.
  • the contact adding request is S403. For example, continuing to take (b) in FIG. 6B as an example, in response to the operation of the user clicking the add contact control, the mobile phone of the first user determines whether the third user exists in the historical call records of the first user, and if not, displays the In the interface shown in (a) of FIG. 6C , when an operation for the "send" control is detected, the process proceeds to S403.
  • the first user sends a request for adding a third user as a contact to the Changlian cloud service.
  • the Changlian cloud service verifies the first user and the third user.
  • the Changlian cloud service sends a request for adding the third user as a contact to the third user.
  • the third user sends an consent instruction to the Changlian cloud service.
  • the Changlian cloud service sends the mobile phone number of the third user to the first user.
  • the Changlian cloud service sends the mobile phone number of the first user to the third user.
  • the third user saves the first user in the address book.
  • the mobile phone of the first user locally determines whether there is a third user in the historical call record as an example.
  • the mobile phone of the first user can send a query request to the Changlian cloud service, and the query request is used to request to query the first user Whether there is a third user in the call history of .
  • the query request includes the call history of the first user and the nickname and/or avatar of the third user.
  • the Changlian cloud service can determine whether the mobile phone number of the third user exists in the historical call record, and feed back the indication information to the mobile phone. Assuming that a certain phone number in the historical call records, such as 131 xxxx xxxx is the mobile phone number of the third user after the confirmation of the Changlian cloud service, the Changlian cloud server sends the first prompt message to the first user, and the first prompt message indicates that The phone number 131 xxxx xxxx in the call history is the mobile phone number of the third user. If the mobile phone number of the third user does not exist in the historical call record determined by the Changlian Cloud service, the second prompt information that does not include the third user may be sent to the first user.
  • Embodiment 4 Determine whether the mobile phone number of group member B exists in the historical call record of group member A, and determine whether it is necessary to send a contact adding request to group member B according to the judgment result.
  • This embodiment 5 introduces another method.
  • group member A wants to chat with group member B alone, group member A can determine whether there is a group member in the mobile phone address book of the other party (ie, group member B) through the Changlian cloud service A's mobile phone number, if it is, obtain the other party's mobile phone number from the Changlian cloud service and save it in the mobile phone address book, without sending a contact adding request to the other party, otherwise, you need to send the other party a contact adding request.
  • FIG. 8 is a schematic flowchart of adding a stranger in a group as a contact.
  • This process can be understood as the process after establishing a group including the first user (Amy), the second user (David) and the third user (nickname flower), wherein the third user does not exist in the first user's mobile phone communication recording.
  • the process includes:
  • the mobile phone of the first user detects an operation for adding a third user as a contact.
  • the operation may be an operation of clicking the control added as a contact in (b) of FIG. 6B .
  • the mobile phone of the first user sends a request for adding the third user as a contact to the Changlian cloud service.
  • the request carries the mobile phone number of the first user, and the nickname and/or nickname of the third user.
  • the Changlian cloud service verifies the first user and the third user. S503 may or may not be performed.
  • the Changlian cloud service queries whether the first user exists in the mobile phone address book of the third user. If yes, go to S507 directly, otherwise, go to S505.
  • the Changlian cloud service can know the mobile phone address book of the third user.
  • the Changlian cloud service also knows the mobile phone number of the first user, so the Changlian cloud service The service can determine whether the mobile phone number of the first user exists in the mobile phone address book of the third user.
  • the Changlian cloud service When the Changlian cloud service queries that the first user exists in the mobile phone address book of the third user, it may directly enter S507, that is, send the mobile phone number of the third user to the first user.
  • the mobile phone of the first user receives the mobile phone number of the third user, it can be directly stored in the address book, or the interface shown in FIG. 7B can be popped up first. Three users are saved to the address book.
  • the Changlian cloud service finds that the first user does not exist in the mobile phone address book of the third user, it may directly enter S505.
  • it can first send instruction information to the first user to indicate that the first user does not exist in the mobile phone address book of the third user.
  • the mobile phone of the first user can display the interface shown in (a) in Figure 6C, when the operation for the "send" control is detected, a confirmation instruction is sent to the Changlian cloud service, which is used to instruct the confirmation to the third user.
  • a contact adding request is sent, and when the Changlian cloud service receives the confirmation instruction, it goes to S505.
  • the Changlian cloud service sends a request for adding the third user as a contact to the third user.
  • the third user sends an consent instruction to the Changlian cloud service.
  • the Changlian cloud service sends the mobile phone number of the third user to the first user.
  • the Changlian cloud service sends the mobile phone number of the first user to the third user.
  • the third user saves the first user in the address book.
  • S503 and S505 to S510 are the same as the implementation principles of S303 to S310 in the third embodiment, and will not be described repeatedly.
  • the method of judging whether it is necessary to send a contact adding request to the other party provided in Embodiment 4 is used as the first method
  • the method of judging whether it is necessary to send a contact adding request to the other party provided in Embodiment 5 is used as the second method.
  • the first method or the second method can be used by default; or, the first method and the second method can also be used in combination, for example, the first method is used first, and when the first method is used to judge the first method
  • the second method is used to determine whether the first user exists in the third user's mobile phone address book, and whether to send a contact adding request to the other party is determined according to the judgment result.
  • FIG. 9 shows a cloud server 900 provided by the present application.
  • the cloud server 900 may be the Changlian cloud service mentioned above.
  • some other embodiments of the present application disclose a cloud server 900.
  • the cloud server 900 may include: one or more processors 901; one or more memories 902; a communication interface 903, and one or more A computer program 904, the various devices described above may be connected by one or more communication buses 905.
  • the one or more computer programs 904 are stored in the aforementioned memory 902 and configured to be executed by the one or more processors 901, the one or more computer programs 904 include instructions that may be used to perform the above Relevant steps of the Changlian cloud service in the corresponding embodiment.
  • the communication interface 903 is used to implement communication with other devices (such as terminal devices), for example, the communication interface may be a transceiver.
  • the methods provided by the embodiments of the present application are introduced from the perspective of an electronic device (for example, a terminal device or a Changlian cloud server) as an execution subject.
  • the electronic device may include a hardware structure and/or software modules, and implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module. Whether one of the above functions is performed in the form of a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraints of the technical solution.
  • references in this specification to "one embodiment” or “some embodiments” and the like mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically emphasized otherwise.
  • the terms “including”, “including”, “having” and their variants mean “including but not limited to” unless specifically emphasized otherwise.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.
  • magnetic media eg, floppy disks, hard disks, magnetic tapes
  • optical media eg, DVD
  • semiconductor media eg, Solid State Disk (SSD)

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

一种群组内群成员隐私保护方法与终端设备。终端设备显示即时通信应用中群组的群组成员列表,群组成员列表中包括第一群成员和第二群成员;终端设备响应于第一操作,显示第一群成员的第一电话号码,第一电话号码为通讯录中保存的第一群成员的电话号码;终端设备响应于第二操作,显示第二群成员的头像和/或用户名、用于添加联系人的控件;终端设备响应于针对添加联系人控件的第三操作,向云服务器发送用于请求将第二群成员添加为联系人的第一请求;云服务器向终端设备发送第二群成员的第二电话号码;终端设备将第二群成员保存为联系人。通过这种方式,避免群成员的电话号码直接暴露给群组内其他群成员,保护群成员的隐私(如,电话号码)。

Description

一种群组内群成员隐私保护方法与终端设备
相关申请的交叉引用
本申请要求在2020年10月22日提交中国专利局、申请号为202011142021.9、申请名称为“一种群组内群成员隐私保护方法与系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中;本申请要求在2020年12月25日提交中国专利局、申请号为202011565926.7、申请名称为“一种群组内群成员隐私保护方法与终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端技术领域,尤其涉及一种群组内群成员隐私保护方法与终端设备。
背景技术
随着通信技术的进步,即时通信应用(instant messaging,IM)的功能越来越丰富,不仅可以实现用户与用户之间的视频/语音通话或者消息收发,还可以建立群组。
一般来讲,群组中的群成员可以将自己的好友邀请入群,但是该好友相对于群组内的其它群成员而言可能是陌生人。如果群成员的隐私信息(如手机号码)是明文显示的话,容易导致群成员的隐私信息暴露给群组内的陌生人。因此,如何保护群组内群成员的隐私信息是需要思考的问题。
发明内容
本申请的目的在于提供了一种群组内群成员隐私保护方法与终端设备,保护群组内群成员的隐私信息。
第一方面,提供一种群组内群成员隐私保护方法,该方法适用于终端设备,所述终端设备的手机号码是第一手机号码,所述终端设备中包括第一通信录,所述第一通信录中包括第一用户,所述第一用户的手机号码为第二手机号码,所述第一手机号码和所述第二手机号码均开通即时通信功能,所述方法包括:响应于第一操作,所述终端设备基于所述第一手机号码和所述第二手机号码建立群组;所述群组响应于所述第一用户添加群成员的操作,加入第二用户;所述第二用户的手机号码开通所述即时通信功能;响应于用于查看所述第二用户的信息的操作,所述终端设备判断所述第一通信录中是否包括所述第二用户,如果所述第一通信录中不包括第二用户,显示所述第二用户的头像和昵称,所述头像和昵称是所述第二用户使用所述第二用户的电话号码开通所述即时通信功能时使用的头像和昵称。
也就是说,基于手机号码通信的即时通信应用比如华为畅连应用或RCS等建立群组时,当群组内的群成员A查看群成员B的信息时,如果群成员B不在群成员A的通信录中,则群成员A无法看到群成员B的手机号码,以保护成员的手机号码不被暴露。其中,关于基于手机号码进行通信的即时通信应用的介绍参见本文具体实施例部分。
在一种可能的设计中,所述终端设备判断所述第一通信录中是否包括所述第二用户, 包括:所述终端设备将所述第一通信录发送给云服务器,所述云服务器是为用户提供所述即时通信功能的服务器,所述云服务器中存储开通所述即时通功能的所有用户的手机号码;
所述终端设备向所述云服务器发送查询请求,所述查询请求用于请求查询所述第二用户的手机号码是否存在于所述第一通讯录中;
所述终端设备接收到来自所述云服务器的第一指示,基于所述第一指示确定所述第二用户的手机号不存在于所述第一通信录中。
也就是说,当群组内的群成员A查看群成员B的信息时,可以通过云服务器查看群成员B的手机号码是否存在于群成员A的通信录中,如果是,则群成员A可以看到群成员B的手机号码,否则,无法看到群成员B的手机号码。
在一种可能的设计中,所述方法还包括:响应于将所述第二用户添加到所述第一通信录的操作,判断所述终端设备的通话记录中是否包括所述第二用户的手机号码,如果是,将所述通话记录中所述第二用户的电话号码保存在所述第一通信录中。
也就是说,当群组内的群成员A查看群成员B的信息时,如果群成员B不在群成员A的通讯录中,成员A是无法看到的成员B的手机号码的,所以如果群成员A想要和群成员B单独聊天,可以将群成员B添加为联系人。比如,群成员A可以查询通话记录中是否存在群成员B的手机号码,如果是,说明群成员A与群成员B联系过,只是没有将群成员B的手机号码保存到通信录中,这种情况下,可以直接将群成员B的手机号码添加到群成员A的通信录中。
在一种可能的设计中,判断所述终端设备的通话记录中是否包括所述第二用户的手机号码,包括:所述终端设备将所述通话记录发送给云服务器,所述云服务器是为用户提供所述即时通信功能的服务器,所述云服务器中存储所述第二用户的电话号码;所述云服务器用于判断所述通话记录中是否存在所述第二用户的电话号码;所述终端设备接收到来自云服务器发送的确认指令时,确定所述终端设备的通话记录中包括所述第二用户的手机号码。
也就是说,群成员A可以通过云服务器判断群成员B的手机号码是否存在于群成员B的通信记录中。通过这种方式,可以避免群组内群成员B的手机号码直接暴露给群成员A,安全性高。
在一种可能的设计中,所述方法还包括:响应于将所述第二用户添加到所述第一通信录的操作,所述终端设备判断所述第二用户的第二通信录中是否包括所述第一手机号码,如果是,从云服务器处获取所述第二用户的手机号码,并将所述第二用户的电话号码存储在所述第一通信录中,其中,所述云服务器是为用户提供所述即时通信功能的服务器,所述云服务器中存储开通所述即时通功能的用户的手机号码。
也就是说,当群组内的群成员A查看群成员B的信息时,如果群成员B不在群成员A的通讯录中,成员A是无法看到的成员B的手机号码的,所以如果群成员A想要和群成员B单独聊天,可以将群成员B添加为联系人。比如,群成员A可以查询群成员B的通信录中是否存在群成员A的手机号码,如果是,说明群成员B已经将群成员A保存到通信录,这种情况下,群成员A可以直接将群成员B的手机号码添加到群成员A的通信录中。
在一种可能的设计中,所述云服务器中还存储所述第二用户的第二通信录,所述终端设备判断所述第二用户的第二通信录中是否包括所述第一手机号码,包括:所述终端设备 向云服务器发送查询请求,所述查询请求用于查询所述第一手机号码是否存在与所述第二用户的第二通信录中;所述终端设备接收到来自云服务器的确认指令时,确定所述第一电话号码存在与所述第二通信录中。
也就是说,群成员A可以通过云服务器判断群成员A的手机号码是否存在于群成员B的通信录中。通过这种方式,可以避免群组内群成员B的手机号码直接暴露给群成员A,安全性高。
第二方面,提供一种群组内群成员隐私保护方法,所述方法适用于云服务器,所述云服务器为用户提供即时通信功能,所述云服务器中存储基于手机号码开通所述即时通信功能的第一用户和第二用户,所述第一用户的电话号码是第一电话号码,所述第二用户的电话号码是第二电话号码,所述云服务器中还包括所述第一用户的第一通信录,所述第一通信录中包括所述第二用户的第二手机号码,所述方法包括:接收到所述第一用户的第一请求,所述第一请求用于请求创建包括所述第一用户和所述第二用户的群组;响应于所述第一请求,所述云服务器基于所述第一手机号码和所述第二手机号码创建群组;响应于所述第二用户的第二请求,在所述群组中添加第三用户,所述第三用户已基于第三电话号码开通所述即时通信功能;确定所述第三手机号码不存在于所述第一通信录时,所述云服务器将所述第三用户的头像和昵称发送给所述第一用户;所述昵称和头像是所述第三用户使用所述第三手机号码开通所述即时通信功能时使用的头像和昵称。
也就是说,基于手机号码通信的即时通信应用比如华为畅连应用或RCS等建立群组时,如果群成员B不在群成员A的通信录中,那么云服务器可以不将群成员B的手机号码发送给群成员B以保护成员的手机号码不被暴露。
在一种可能的设计中,所述方法还包括:接收所述第一用户发送的所述第一用户的通话记录,所述通话记录中包括与所述第一用户通话的用户的手机号码;响应于来自所述第一用户的添加请求,所述添加请求用于在所述第一用户的第一通信录中添加所述第三用户,所述云服务器判断所述第一通话记录中是否包括所述第三用户的第三手机号码;在确定所述第一用户的通话记录中包括所述第三手机号码时,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
也就是说,如果群成员B不在群成员A的通讯录中,群成员A是无法看到的群成员B的手机号码的,所以如果群成员A想要和群成员B单独聊天,可以将群成员B添加为联系人。比如,云服务器可以查询群成员A的通话记录中是否存在群成员B的手机号码,如果是,说明群成员A与群成员B联系过,只是没有将群成员B的手机号码保存到通信录中,这种情况下,可以将群成员B的手机号码发送给群成员A。
在一种可能的设计中,所述方法还包括:在确定所述第一用户的通话记录中不包括所述第三手机号码时,向所述第三用户发送所述添加请求;在接收到来自所述第三用户的同意添加的指示后,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
也就是说,在确定群成员A的通话记录中不包括群成员B的手机号码时,云服务器在向群成员A发送群成员B的手机号码之前,还可以询问群成员B是否同意将其手机号码提供给群成员A,在群成员B同意的情况下,将其手机号码发送给群成员A。
在一种可能的设计中,所述方法还包括:接收所述第三用户的第三通讯录,所述第三通讯录中包括所述第三用户所存储的联系人的电话号码;响应于来自所述第一用户的添加 请求,所述添加请求用于在所述第一用户的第一通信录中添加所述第三用户,所述云服务器判断所述第三通信录中是否包括所述第一用户的第一手机号码;在确定所述第三通信录中包括所述第一手机号码时,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
也就是说,如果群成员B不在群成员A的通讯录中,群成员A是无法看到的群成员B的手机号码的,所以如果群成员A想要和群成员B单独聊天,可以将群成员B添加为联系人。比如,云服务器可以查询群成员B的通信录中是否存在群成员A的手机号码,如果是,可以将群成员B的手机号码发送给群成员A。
在一种可能的设计中,所述方法还包括:在确定所述第三通信录中不包括所述第一手机号码时,向所述第三用户发送所述添加请求;在接收到来自所述第三用户的同意添加的指示后,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
也就是说,在确定群成员B的通信录中不包括群成员A的手机号码时,云服务器在向群成员A发送群成员B的手机号码之前,还可以询问群成员B是否同意将其手机号码提供给群成员A,在群成员B同意的情况下,将其手机号码发送给群成员A。
第三方面,还提供一种终端设备,所述终端设备的手机号码是第一手机号码,所述终端设备中包括第一通信录,所述第一通信录中包括第一用户,所述第一用户的手机号码为第二手机号码,所述第一手机号码和所述第二手机号码均开通即时通信功能,所述终端设备包括:
一个或多个处理器;
一个或多个存储器;
其中,所述一个或多个存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备执行如下步骤:
响应于第一操作,所述终端设备基于所述第一手机号码和所述第二手机号码建立群组;所述群组响应于所述第一用户添加群成员的操作,加入第二用户;所述第二用户的手机号码开通所述即时通信功能;
响应于用于查看所述第二用户的信息的操作,所述终端设备判断所述第一通信录中是否包括所述第二用户,如果所述第一通信录中不包括第二用户,显示所述第二用户的头像和昵称,所述头像和昵称是所述第二用户使用所述第二用户的电话号码开通所述即时通信功能时使用的头像和昵称。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备具体执行如下步骤:
将所述第一通信录发送给云服务器,所述云服务器是为用户提供所述即时通信功能的服务器,所述云服务器中存储开通所述即时通功能的所有用户的手机号码;
向所述云服务器发送查询请求,所述查询请求用于请求查询所述第二用户的手机号码是否存在于所述第一通讯录中;
接收到来自所述云服务器的第一指示,基于所述第一指示确定所述第二用户的手机号不存在于所述第一通信录中。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电 子设备还执行如下步骤:
响应于将所述第二用户添加到所述第一通信录的操作,判断所述终端设备的通话记录中是否包括所述第二用户的手机号码,如果是,将所述通话记录中所述第二用户的电话号码保存在所述第一通信录中。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备具体执行如下步骤:
将所述通话记录发送给云服务器,所述云服务器是为用户提供所述即时通信功能的服务器,所述云服务器中存储所述第二用户的电话号码;所述云服务器用于判断所述通话记录中是否存在所述第二用户的电话号码;
接收到来自云服务器发送的确认指令时,确定所述终端设备的通话记录中包括所述第二用户的手机号码。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备还执行如下步骤:
响应于将所述第二用户添加到所述第一通信录的操作,所述终端设备判断所述第二用户的第二通信录中是否包括所述第一手机号码,如果是,从云服务器处获取所述第二用户的手机号码,并将所述第二用户的电话号码存储在所述第一通信录中,其中,所述云服务器是为用户提供所述即时通信功能的服务器,所述云服务器中存储开通所述即时通功能的用户的手机号码。
在一种可能的设计中,所述云服务器中还存储所述第二用户的第二通信录,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备具体执行如下步骤:
向云服务器发送查询请求,所述查询请求用于查询所述第一手机号码是否存在与所述第二用户的第二通信录中;
接收到来自云服务器的确认指令时,确定所述第一电话号码存在与所述第二通信录中。
第四方面,还提供一种云服务器,所述云服务器为用户提供即时通信功能,所述云服务器中存储基于手机号码开通所述即时通信功能的第一用户和第二用户,所述第一用户的电话号码是第一电话号码,所述第二用户的电话号码是第二电话号码,所述云服务器中还包括所述第一用户的第一通信录,所述第一通信录中包括所述第二用户的第二手机号码,所述云服务器包括:
一个或多个处理器;
一个或多个存储器;
其中,所述一个或多个存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备执行如下步骤:
接收到所述第一用户的第一请求,所述第一请求用于请求创建包括所述第一用户和所述第二用户的群组;
响应于所述第一请求,所述云服务器基于所述第一手机号码和所述第二手机号码创建群组;
响应于所述第二用户的第二请求,在所述群组中添加第三用户,所述第三用户已基于第三电话号码开通所述即时通信功能;
确定所述第三手机号码不存在于所述第一通信录时,所述云服务器将所述第三用户的 头像和昵称发送给所述第一用户;所述昵称和头像是所述第三用户使用所述第三手机号码开通所述即时通信功能时使用的头像和昵称。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备还执行如下步骤:
接收所述第一用户发送的所述第一用户的通话记录,所述通话记录中包括与所述第一用户通话的用户的手机号码;
响应于来自所述第一用户的添加请求,所述添加请求用于在所述第一用户的第一通信录中添加所述第三用户,所述云服务器判断所述第一通话记录中是否包括所述第三用户的第三手机号码;
在确定所述第一用户的通话记录中包括所述第三手机号码时,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备还执行如下步骤:
在确定所述第一用户的通话记录中不包括所述第三手机号码时,向所述第三用户发送所述添加请求;
在接收到来自所述第三用户的同意添加的指示后,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备还执行如下步骤:
接收所述第三用户的第三通讯录,所述第三通讯录中包括所述第三用户所存储的联系人的电话号码;
响应于来自所述第一用户的添加请求,所述添加请求用于在所述第一用户的第一通信录中添加所述第三用户,所述云服务器判断所述第三通信录中是否包括所述第一用户的第一手机号码;
在确定所述第三通信录中包括所述第一手机号码时,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
在一种可能的设计中,当所述指令被所述一个或多个处理器执行时,使得所述第一电子设备还执行如下步骤:
在确定所述第三通信录中不包括所述第一手机号码时,向所述第三用户发送所述添加请求;
在接收到来自所述第三用户的同意添加的指示后,向所述第一用户发送所述第三手机号码,以使所述第一用户将所述第三手机号码保存到所述第一通信录中。
第五方面,本申请实施例还提供了一种终端设备,所述电子设备包括执行上述第一方面或者第一方面的任意一种可能的设计的方法的模块/单元;这些模块/单元可以通过硬件实现,也可以通过硬件执行相应的软件实现。
第六方面,本申请实施例还提供了一种云服务器,所述云服务器包括执行上述第二方面或者第二方面的任意一种可能的设计的方法的模块/单元;这些模块/单元可以通过硬件实现,也可以通过硬件执行相应的软件实现。
第七方面,还提供一种系统,包括:
至少三个终端设备、以及云服务器;
其中,所述至少三个终端设备中每个终端设备对应一个手机号码,所述每个终端设备用于实现如上述第一方面提供的方法,所述云服务器用于实现如上述第二方面提供的方法。
第八方面,本申请实施例还提供一种芯片,所述芯片与电子设备中的存储器耦合,用于调用存储器中存储的计算机程序并执行本申请实施例第一方面及其第一方面任一可能设计的技术方案,或者,用于调用存储器中存储的计算机程序并执行本申请实施例第二方面及其第二方面任一可能设计的技术方案,本申请实施例中“耦合”是指两个部件彼此直接或间接地结合。
第九方面,还提供一种计算机可读存储介质,所述计算机可读存储介质包括计算机程序,当计算机程序在电子设备上运行时,使得所述电子设备执行如上述第一方面提供的方法;或者,当计算机程序在电子设备上运行时,使得所述电子设备执行如上述第二方面提供的方法。
第十方面,还提供一种程序产品,包括指令,当所述指令在计算机上运行时,使得所述计算机执行如上述第一方面提供的方法;或者,当所述指令在计算机上运行时,使得所述计算机执行如上述第二方面提供的方法。
第十一方面,还提供一种电子设备上的图形用户界面,所述电子设备具有显示屏、一个或多个存储器、以及一个或多个处理器,所述一个或多个处理器用于执行存储在所述一个或多个存储器中的一个或多个计算机程序,所述图形用户界面包括所述电子设备执行如上述第一方面提供的方法或如上述第二方面提供的方法时显示的图形用户界面。
第十二方面,还提供一种群组内群成员隐私保护方法,所述方法适用于通信系统,所述通信系统中包括终端设备和云服务器,所述方法包括:
所述终端设备显示群组的群组成员列表;所述群组成员列表中包括第一用户和第二用户;
响应于添加所述第一用户为联系人的操作,所述终端设备通过所述云服务器向所述第一用户发送第一验证信息,以使所述第一用户通过所述第一验证信息确定是否同意添加为所述终端设备的联系人;
响应于所述第一用户的同意指令,所述终端设备将所述第一用户保存为联系人;
响应于添加所述第二用户为联系人的操作,所述终端设备判断历史通信记录中是否存在所述第二用户的手机号码,如果是,自动将所述第二用户保存为联系人;或者,
响应于添加所述第二用户为联系人的操作,向所述云服务器发送查询请求,以请求所述云服务器判断所述第二用户的通信录中是否包括终端设备的用户的手机号,如果是,从所述云服务器接收所述第二用户的手机号码,将所述第二用户保存为联系人。
也就是说,群组中用户A如果想要将用户B添加到本地通信录,有两种方式。一种是,向该用户B发送验证信息,在对方同意的情况下将该用户B添加为联系人。另一种是,在该用户B存在于用户A历史通信记录中或用户A存在与用户B的通信录中的情况下,用户A可以无需向用户B发送验证信息,直接将其保存为联系人。
在一种可能的设计中,所述方法还包括;所述终端设备确定历史通信记录中不存在所述第二用户的手机号码时,所述终端设备通过所述云服务器向所述第二用户发送验证信息,以使所述第二用户通过所述验证信息确定是否同意添加为所述终端设备的联系人;
响应于所述第二用户的同意指令,所述终端设备将所述第二用户保存为联系人;
在一种可能的设计中,所述方法还包括:所述终端设备从所述云服务器侧确定所述第 二用户的通信录中不包括所述终端设备的用户的手机号时,通过所述云服务器向所述第二用户发送验证信息,以使所述第二用户通过所述验证信息确定是否同意添加为所述终端设备的联系人;响应于所述第二用户的同意指令,所述终端设备将所述第二用户保存为联系人。
第十三方面,提供一种系统,包括:终端设备以及云服务器;
所述终端设备显示群组的群组成员列表;所述群组成员列表中包括第一用户和第二用户;
响应于选择第一用户的操作,所述终端设备显示所述第一用户的第一昵称和第一头像;
响应于选择第二用户的操作,所述终端设备显示所述第二用户的第二昵称和第二头像;
响应于添加所述第一用户为联系人的操作,所述终端设备通过所述云服务器向所述第一用户发送验证信息,以使所述第一用户通过所述验证信息确定是否同意添加为所述终端设备的联系人;
响应于所述第一用户的同意指令,所述终端设备将所述第一用户保存为联系人;
响应于添加所述第二用户为联系人的操作,所述终端设备判断历史通信记录中是否存在所述第二用户的手机号码,如果是,自动将所述第二用户保存为联系人;或者,
响应于添加所述第二用户为联系人的操作,向所述云服务器发送查询请求,以请求所述云服务器判断所述第二用户的通信录中是否包括终端设备的用户的手机号,如果是,从所述云服务器接收所述第二用户的手机号码,将所述第二用户保存为联系人。
在一种可能的设计中,所述终端设备还用于:在确定历史通信记录中不存在所述第二用户的手机号码时,所述终端设备通过所述云服务器向所述第二用户发送验证信息,以使所述第二用户通过所述验证信息确定是否同意添加为所述终端设备的联系人;
响应于所述第二用户的同意指令,将所述第二用户保存为联系人;
在一种可能的设计中,所述终端设备还用于:从所述云服务器侧确定所述第二用户的通信录中不包括所述终端设备的用户的手机号时,通过所述云服务器向所述第二用户发送验证信息,以使所述第二用户通过所述验证信息确定是否同意添加为所述终端设备的联系人;
响应于所述第二用户的同意指令,将所述第二用户保存为联系人。
第十四方面,还提供一种计算机可读存储介质,所述计算机可读存储介质包括计算机程序,当计算机程序在电子设备上运行时,使得所述电子设备执行如上述第十二方面提供的方法。
第十五方面,还提供一种程序产品,包括指令,当所述指令在计算机上运行时,使得所述计算机执行如上述第十二方面提供的方法。
第十六方面,还提供一种电子设备上的图形用户界面,所述电子设备具有显示屏、一个或多个存储器、以及一个或多个处理器,所述一个或多个处理器用于执行存储在所述一个或多个存储器中的一个或多个计算机程序,所述图形用户界面包括所述电子设备执行如上述第十二方面提供的方法时显示的图形用户界面。
第十七方面,提供一种群组内群成员隐私保护方法,所述方法包括:所述终端设备显示即时通信应用中群组的群组成员列表,所述群组成员列表中包括第一群成员和第二群成员;
所述终端设备响应于用于选择所述第一群成员的第一操作,显示所述第一群成员的第一电话号码,所述第一电话号码为所述终端设备的通讯录中保存的所述第一群成员的电话号码;所述终端设备响应于用于选择所述第二群成员的第二操作,显示所述第二群成员的头像和/或用户名,以及用于添加联系人的控件;所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,所述第一请求用于请求将所述第二群成员添加为联系人;所述云服务器响应于所述第一请求,向所述终端设备发送所述第二群成员的第二电话号码;所述终端设备基于所述第二电话号码将所述第二群成员保存为联系人。
也就是说,当终端设备查看群组内的不同群成员时,显示的信息不同。比如,第一群成员,可以看到其电话号码,因为第一群成员存在于终端设备的通讯录中,但是第二群成员,无法直接看到其电话号码,需要通过添加联系人的方式才能获取到第二群成员的电话号码,通过这种方式,可以避免群成员的电话号码直接暴露给群组内所有成员,保护群成员隐私。
在一种可能的设计中,所述云服务器响应于所述第一请求,向所述终端设备发送所述第二群成员的第二号码,包括:响应于所述第一请求,所述云服务器向所述第二群成员发送第二请求;所述第二请求用于指示所述终端设备请求添加所述第二群成员为联系人;当所述云服务器接收到来自所述第二群成员的同意指令时,向所述终端设备发送所述第二群成员的第二电话号码。
也就是说,云服务器向终端设备发送第二群成员的电话号码之前,会请求第二群成员的认证,在第二群成员同意的情况下,向终端设备发送其电话号码,安全性较高。
在一种可能的设计中,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:响应于所述第三操作,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中;当确定所述历史通信记录中不存在所述第二群成员的电话号码时,所述终端设备向所述云服务器发送所述第一请求。
也就是说,终端设备可以先在历史通信记录中查找是否存在第二群成员的电话号码,如果存在,将第二群成员保存为联系人,否则,从云服务器侧请求第二群成员的电话号码。通过这种方式,可以避免群成员的电话号码直接暴露给群组内所有成员,保护群成员隐私。在一种可能的设计中,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录,包括:所述终端设备在历史通话记录中所有号码对应的头像中查找与所述第二群成员的头像相匹配的头像;和/或,所述终端设备在历史通话记录中所有号码对应的用户名中查找与所述第二群成员的用户名相匹配的用户名;当未在所述历史通信记录中找到与所述第二群成员的头像相匹配的头像,和/或未找到与所述第二群成员的用户票相匹配的用户名时,确定所述第二群成员的电话号码不在所述历史通信记录中。
也就是说,终端设备可以通过头像匹配的方式和/或用户名匹配的方式,查找历史通信记录中是否存在第二群成员的电话号码,操作便捷。
在一种可能的设计中,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中,包括:所述终端设备向所述云服务器发送所述历史通信记录;所述终端设备向所述云服务器发送第三请求,所述第三请求用于请求判断所述第二群成员的电话号码是否存在于所述历史通信记录中;所述云服务器响应于所述第三请求,判断所述历史通信记录中是否存在所述第二群成员的电话号码,并向所述终端设备发送判断结果;所述终端设备基于所述判断结果,确定所述第二群成员的电话号码是否存在于所述历史通 信记录中。
也就是说,终端设备也可以通过云服务器查询历史通信记录中是否存在第二群成员的电话号码,这种方式准确性较高。
在一种可能的设计中,所述历史通信记录,包括:最近通话记录,和/或,历史短信记录。也就是说,终端设备可以在最近通话记录和/或历史短信记录中查找是否存在第二群成员的电话号码。
在一种可能的设计中,所述云服务器中存储所述第二群成员的通讯录,所述云服务器响应于所述第一请求,向所述终端设备发送所述第二群成员的第二电话号码,包括:响应于所述第一请求,所述云服务器判断所述终端设备的电话号码是否存在于所述第二群成员的通讯录中;当所述云服务器确定所述终端设备的电话号码存在于所述第二群成员的通讯录时,向所述终端设备发送所述第二群成员的第二电话号码。
也就是说,云服务器可以判断对方(即第二群成员)的通讯录中是否包括终端设备的电话号码,如果是,可以直接将对方的电话号码发送给终端设备,通过这种方式,避免直接暴露第二群成员的电话号码。
在一种可能的设计中,所述方法还包括:当所述云服务器确定所述终端设备的电话号码不存在于所述第二群成员的通讯录时,所述云服务器向所述第二群成员发送第二请求;所述第二请求用于指示所述终端设备请求添加所述第二群成员为联系人;当所述云服务器接收到来自所述第二群成员的同意指令时,向所述终端设备发送所述第二群成员的第二电话号码。
也就是说,云服务器可以判断对方(即第二群成员)的通讯录中是否包括终端设备的电话号码,如果不包括,可以请求第二群成员的确认,在第二群成员同意的情况下,将第二群成员的电话号码发送给终端设备,这种方式,安全性更高。
在一种可能的设计中,所述终端设备显示所述即时通信应用中群组的群组成员列表之前,所述方法还包括:所述终端设备显示第一入群信息,所述第一入群信息用于指示所述第一群成员被邀请加入群聊;所述第一入群消息中显示的所述第一群成员的信息为所述终端设备的通讯录中对所述第一用户的备注名;所述终端设备显示第二入群信息,所述第二入群信息用于指示所述第二群成员被邀请加入群聊,所述第二入群消息中显示的所述第二群成员的信息为所述第二群成员的用户名。
也就是说,当终端设备通讯录中不存在第二群成员时,第二入群信息中第二群成员显示用户名,避免入群信息(比如,XXX加入群聊)中直接暴露第二群成员的电话号码。
在一种可能的设计中,用于邀请所述第一群成员入群的邀请人为第一邀请人,用于邀请所述第二群成员入群的邀请人为第二邀请人;当所述第一邀请人存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人在所述通讯录中的备注名;当所述第一邀请人不存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人的用户名;当所述第二邀请人存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人在所述通讯录中的备注名;当所述第二邀请人不存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人的用户名。
也就是说,邀请人和/或被邀请人不存在于终端设备的通讯录中时,显示的是用户名,如果存在于终端设备的通讯录中,则显示备注名。通过这种方式,避免入群信息(比如, XXX邀请YYY加入群聊)中直接暴露邀请人和/或被邀请人的电话号码。
在一种可能的设计中,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:响应于所述第三操作,所述终端设备显示第一界面,所述第一界面中包括验证信息输入框;所述终端设备接收到输入操作,所述输入操作用于在所述验证信息输入框中输入验证信息,所述验证信息用于描述所述终端设备的身份信息;所述终端设备响应于用于发送所述验证信息的第四操作,向所述服务器发送第一请求,所述第一请求中携带所述验证信息。
也就是说,终端设备可以向第二群成员发送验证信息,比如“我是群聊中的AAA”,以方便第二群成员根据验证信息识别对方的身份,安全性更高。
第十八方面,提供一种群组内群成员隐私保护方法,该方法适用于终端设备。所述方法包括:所述终端设备显示即时通信应用中群组的群组成员列表,所述群组成员列表中包括第一群成员和第二群成员;所述终端设备响应于用于选择所述第一群成员的第一操作,显示所述第一群成员的第一电话号码,所述第一电话号码为所述终端设备的通讯录中保存的所述第一群成员的电话号码;所述终端设备响应于用于选择所述第二群成员的第二操作,显示所述第二群成员的头像和/或用户名,以及用于添加联系人的控件;所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,所述第一请求用于请求将所述第二群成员添加为联系人;所述终端设备从所述云服务器接收第二群成员的第二电话号码;所述终端设备基于所述第二电话号码将所述第二群成员保存为联系人。
在一种可能的设计中,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:响应于所述第三操作,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中;当确定所述历史通信记录中不存在所述第二群成员的电话号码时,所述终端设备向所述云服务器发送所述第一请求。
在一种可能的设计中,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录,包括:所述终端设备在历史通话记录中所有号码对应的头像中查找与所述第二群成员的头像相匹配的头像;和/或,所述终端设备在历史通话记录中所有号码对应的用户名中查找与所述第二群成员的用户名相匹配的用户名;当未在所述历史通信记录中找到与所述第二群成员的头像相匹配的头像,和/或未找到与所述第二群成员的用户名相匹配的用户名时,确定所述第二群成员的电话号码不在所述历史通信记录中。
在一种可能的设计中,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中,包括:所述终端设备向所述云服务器发送所述历史通信记录;
所述终端设备向所述云服务器发送第三请求,所述第三请求用于请求判断所述第二群成员的电话号码是否存在于所述历史通信记录中;所述云服务器响应于所述第三请求,判断所述历史通信记录中是否存在所述第二群成员的电话号码,并向所述终端设备发送判断结果;所述终端设备基于所述判断结果,确定所述第二群成员的电话号码是否存在于所述历史通信记录中。
在一种可能的设计中,所述历史通信记录,包括:最近通话记录,和/或,历史短信记录。
在一种可能的设计中,所述终端设备显示所述即时通信应用中群组的群组成员列表之前,所述方法还包括:所述终端设备显示第一入群信息,所述第一入群信息用于指示所述第一群成员被邀请加入群聊;所述第一入群消息中显示的所述第一群成员的信息为所述终 端设备的通讯录中对所述第一用户的备注名;所述终端设备显示第二入群信息,所述第二入群信息用于指示所述第二群成员被邀请加入群聊,所述第二入群消息中显示的所述第二群成员的信息为所述第二群成员的用户名。
在一种可能的设计中,用于邀请所述第一群成员入群的邀请人为第一邀请人,用于邀请所述第二群成员入群的邀请人为第二邀请人;当所述第一邀请人存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人在所述通讯录中的备注名;当所述第一邀请人不存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人的用户名;当所述第二邀请人存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人在所述通讯录中的备注名;当所述第二邀请人不存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人的用户名。
在一种可能的设计中,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:响应于所述第三操作,所述终端设备显示第一界面,所述第一界面中包括验证信息输入框;所述终端设备接收到输入操作,所述输入操作用于在所述验证信息输入框中输入验证信息,所述验证信息用于描述所述终端设备的身份信息;所述终端设备响应于用于发送所述验证信息的第四操作,向所述服务器发送第一请求,所述第一请求中携带所述验证信息。
第十九方面,提供一种群组内群成员隐私保护方法,该方法可以应用于云服务器。所述方法包括:云服务器创建即时通信应用的群组,所述群组中包括第三群成员和第二群成员;所述云服务器接收来自第三群成员的第一请求,所述第一请求用于请求添加第二群成员为联系人;所述云服务器响应于所述第一请求,向所述第三群成员发送所述第二群成员的第二电话号码。
需要说明的是,目前的方案中云服务器创建群组或者新成员入群时,公布每个群成员的电话号码,所以每个群成员都可以看到其他群成员的电话号码,无法保护用户隐私。本申请中,云服务器接收到来自第三群成员的用于添加第二群成员为联系人的请求时,才向第三群成员公开第二群成员的电话号码,避免第二群成员的电话号码直接暴露,安全性较高。
在一种可能的设计中,所述云服务器响应于所述第一请求,向所述第三群成员发送所述第二群成员的第二电话号码,包括:
响应于所述第一请求,所述云服务器向所述第二群成员发送第二请求;所述第二请求用于指示所述第三群成员请求添加所述第二群成员为联系人;
当所述云服务器接收到来自所述第二群成员的同意指令时,向所述第三群成员发送所述第二群成员的第二电话号码。
在一种可能的设计中,所述云服务器响应于所述第一请求,向所述第三群成员发送所述第二群成员的第二电话号码,包括:
响应于所述第一请求,所述云服务器判断所述第二群成员的电话号码是否存在于所述第三群成员的历史通信记录中;
当确定所述历史通信记录中存在所述第二群成员的电话号码时,向所述第三群成员发送所述第二群成员的电话号码。
在一种可能的设计中,所述方法还包括:当确定所述历史通信记录中不存在所述第二 群成员的电话号码时,所述云服务器向所述第二群成员发送第二请求;所述第二请求用于指示所述第三群成员请求添加所述第二群成员为联系人;
当所述云服务器接收到来自所述第二群成员的同意指令时,向所述第三群成员发送所述第二群成员的第二电话号码。
在一种可能的设计中,所述历史通信记录,包括:最近通话记录,和/或,历史短信记录。
在一种可能的设计中,所述云服务器中存储所述第二群成员的通讯录,所述云服务器响应于所述第一请求,向所述第三群成员发送所述第二群成员的第二电话号码,包括:
响应于所述第一请求,所述云服务器判断所述第三群成员的电话号码是否存在于所述第二群成员的通讯录中;
当所述云服务器确定所述第三群成员的电话号码存在于所述第二群成员的通讯录时,向所述第三群成员发送所述第二群成员的第二电话号码。
在一种可能的设计中,所述方法还包括:当所述云服务器确定所述第三群成员的电话号码不存在于所述第二群成员的通讯录时,所述云服务器向所述第二群成员发送第二请求;所述第二请求用于指示所述终端设备请求添加所述第二群成员为联系人;
当所述云服务器接收到来自所述第二群成员的同意指令时,向所述第三群成员发送所述第二群成员的第二电话号码。
在一种可能的设计中,所述云服务器接收来自第三群成员的第一请求之前,所述方法还包括:
所述云服务器确定所述第二群成员加入所述群组时,向所述第三群成员发送第二入群信息,所述第二入群信息用于指示所述第二群成员被邀请加入群聊,所述第二入群消息中显示的所述第二群成员的信息为所述第二群成员的用户名;
在一种可能的设计中,用于邀请所述第二群成员入群的邀请人为第二邀请人;
当所述第二邀请人存在于所述第三群成员的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人在所述第三群成员的通讯录中的备注名;当所述第二邀请人不存在于所述第三群成员的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人的用户名。
在一种可能的设计中,所述方法还包括:所述云服务器确定第一群成员加入所述群组时,向所述第三群成员发送第一入群信息,所述第一入群信息用于指示所述第一群成员被邀请加入群聊,所述第一入群消息中显示的所述第一群成员的信息为所述第一群成员在所述第三群成员的通讯录中的备注名。
在一种可能的设计中,用于邀请所述第一群成员入群的邀请人为第一邀请人;
当所述第一邀请人存在于所述第三群成员的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人在所述第三群成员的通讯录中的备注名;当所述第一邀请人不存在于所述第三群成员的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人的用户名。
在一种可能的设计中,所述第一请求中携带所述第三联系人的验证信息,所述第二请求中携带所述第三联系人的验证信息,所述验证信息用于描述所述第三联系人的身份信息。
第二十方面、提供一种通信系统,包括:终端设备和云服务器;
所述终端设备包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程 序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所述终端设备执行如上述第十七方面提供的方法中终端设备的步骤;
所述云服务器包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所述云服务器执行如上述第十七方面提供的方法中云服务器的步骤。
第二十一方面、提供一种终端设备,包括:
处理器,存储器,以及,一个或多个程序;
其中,所述一个或多个程序被存储在所述存储器中,所述一个或多个程序包括指令,当所述指令被所述处理器执行时,使得所述终端设备执行如上述第十八方面提供的方法步骤。
第二十二方面、提供一种云服务器,包括:
处理器,存储器,以及,一个或多个程序;
其中,所述一个或多个程序被存储在所述存储器中,所述一个或多个程序包括指令,当所述指令被所述处理器执行时,使得所述终端设备执行如上述第十九方面提供的方法步骤。
第二十三方面,提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如上述第十七方面至第十九方面中任意一方面提供的方法。
第二十四方面,提供一种计算机程序产品,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如上述第十七方面至第十九方面中任意一方面提供的方法。
第二十五方面、提供一种电子设备上的图形用户界面,所述电子设备具有显示屏、存储器、以及处理器,所述处理器用于执行存储在所述存储器中的一个或多个计算机程序,所述图形用户界面包括所述电子设备执行上述第十七方面至第十九方面中任意一方面提供的方法时显示的图形用户界面。
第二十六方面,本申请实施例还提供一种芯片,所述芯片与电子设备中的存储器耦合,用于调用存储器中存储的计算机程序并执行本申请实施例第十七方面至第十九方面的技术方案,本申请实施例中“耦合”是指两个部件彼此直接或间接地结合。
上述第十八方面至第二十六方面的有益效果,参见第十七方面的有益效果,不重复赘述。
附图说明
图1A为本申请一实施例提供的终端设备的硬件结构的示意图;
图1B为本申请一实施例提供的终端设备的软件结构的示意图;
图2A至图2D本申请一实施例提供的即时通信应用的GUI的示意图;
图2E为本申请一实施例提供的一种应用场景的示意图;
图3A为本申请一实施例提供的即时通信应用的注册流程的示意图;
图3B至图3C为本申请一实施例提供的即时通信应用的注册过程的GUI的示意图;
图4A至图4B为本申请一实施例提供的即时通信应用的相关GUI的示意图;
图5A为本申请一实施例提供的即时通信应用创建群组的流程的示意图;
图5B为本申请一实施例提供的即时通信应用创建群组的GUI的示意图;
图5C为本申请一实施例提供的被邀请入群的用户的GUI的示意图;
图5D为本申请一实施例提供的邀请联系人入群后的GUI的示意图;
图5E为本申请一实施例提供的群组中群成员列表的GUI的示意图;
图6A为本申请一实施例提供的群组内一个群成员添加另一个群成员为联系人的流程的示意图;
图6B至图6C为本申请一实施例提供的群组内一个群成员添加另一个群成员为联系人时的GUI的示意图;
图7A为本申请一实施例提供的群组内一个群成员添加另一个群成员为联系人的另一种流程的示意图;
图7B为本申请一实施例提供的保存联系人时的GUI的示意图;
图8为本申请一实施例提供的群组内一个群成员添加另一个群成员为联系人的又一种流程的示意图;
图9为本申请一实施例提供的终端设备或云服务器的结构的示意图。
具体实施方式
以下,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。
(1)应用(application,app)
为能够实现某项或多项特定功能的软件程序。应用可以有多种类型,比如视频播放类应用、图像拍摄类应用、即时通信应用等。其中,即时通信应用例如包括、华为畅连应用、各种邮箱应用、
Figure PCTCN2021125531-appb-000001
WhatsApp
Figure PCTCN2021125531-appb-000002
Figure PCTCN2021125531-appb-000003
Kakao
Figure PCTCN2021125531-appb-000004
Figure PCTCN2021125531-appb-000005
等。下文中提到的应用,可以是电子设备出厂时已安装的应用,也可以是用户在使用电子设备的过程中从网络下载或从其他电子设备获取的应用(例如,其它电子设备发送的应用)。
(2)手机通讯录,是指手机中存储了电话号码的联系人列表,用户可以在其手机通讯录中寻找联系人,然后拨打该联系人的电话号码。
(3)本申请实施例中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。
以及,除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的大小、内容、顺序、时序、优先级或者重要程度等。例如,第一用户、第二用户和第三用户等,只是为了区分不同的用户,而并不是表示这些用户的优先级或者重要程度等的不同。
本申请实施例提供的群组内群成员隐私保护方法可以应用在电子设备中,以下介绍电子设备、用于这样的电子设备的图形用户界面(graphical user interface,GUI)、和用于使用这样的电子设备的实施例。在本申请一些实施例中,电子设备可以是便携式电子设备,诸如手机、PAD、便携计算机、具备无线通讯功能的可穿戴设备(如智能手表、智能眼镜、智能手环、或智能头盔等)、或车载设备等。便携式电子设备的示例性实施例包括但不限 于搭载
Figure PCTCN2021125531-appb-000006
或者其它操作系统的便携式电子设备。
示例性地,图1A给出了一种电子设备的结构示意图。
如图1A所示,电子设备可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。其中,控制器可以是电子设备的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备充电,也可以用于电子设备与外围设备之间传输数据。充电管理模块140用于从充电器接收充电输入。电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。
电子设备的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。天线1和天线2用于发射和接收电磁波信号。电子设备中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在电子设备上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件 中。
无线通信模块160可以提供应用在电子设备上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
显示屏194用于显示应用的显示界面等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备可以包括1个或N个显示屏194,N为大于1的正整数。
摄像头193用于捕获静态图像或视频。摄像头193可以包括前置摄像头和后置摄像头。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,以及至少一个应用程序(例如爱奇艺应用,微信应用等)的软件代码等。存储数据区可存储电子设备使用过程中所产生的数据(例如图像、视频等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将图片,视频等文件保存在外部存储卡中。
电子设备可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例 中,压力传感器180A可以设置于显示屏194。陀螺仪传感器180B可以用于确定电子设备的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备围绕三个轴(即,x,y和z轴)的角速度。
陀螺仪传感器180B可以用于拍摄防抖。气压传感器180C用于测量气压。在一些实施例中,电子设备通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。磁传感器180D包括霍尔传感器。电子设备可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当电子设备是翻盖机时,电子设备可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。加速度传感器180E可检测电子设备在各个方向上(一般为三轴)加速度的大小。当电子设备静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。电子设备可以通过红外或激光测量距离。在一些实施例中,拍摄场景,电子设备可以利用距离传感器180F测距以实现快速对焦。接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备通过发光二极管向外发射红外光。电子设备使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备附近有物体。当检测到不充分的反射光时,电子设备可以确定电子设备附近没有物体。电子设备可以利用接近光传感器180G检测用户手持电子设备贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。电子设备可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测电子设备是否在口袋里,以防误触。指纹传感器180H用于采集指纹。电子设备可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,电子设备利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,电子设备执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备对电池142加热,以避免低温导致电子设备异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备对电池142的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备可以接收按键输入,产生与电子设备的用户设置以及功能控制有关的键信号输入。 马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备的接触和分离。
可以理解的是,图1A所示的部件并不构成对电子设备的具体限定。本发明实施例中的电子设备可以包括比图1A中更多或更少的部件。此外,图9中的部件之间的组合/连接关系也是可以调整修改的。
图1B示出了本申请一实施例提供的电子设备的软件结构框图。
如图1B所示,电子设备的软件结构可以是分层架构,例如可以将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层(framework,FWK),安卓运行时(Android runtime)和系统库,以及内核层。
应用程序层可以包括一系列应用程序包。如图1B所示,应用程序层可以包括相机、设置、皮肤模块、用户界面(user interface,UI)、三方应用程序等。其中,三方应用程序可以包括
Figure PCTCN2021125531-appb-000007
图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层可以包括一些预先定义的函数。如图1B所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。
Android runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程 管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(media libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
硬件层可以包括各类传感器,例如本申请实施例中涉及的加速度传感器、陀螺仪传感器、触摸传感器等。
为了方便与家人、朋友联系,用户的设备(比如手机、平板电脑)中可以安装各种类型的即时通信应用。目前,主流的即时通信应用可以分为两类,一类是基于独立账号进行通信的应用,另一类是基于手机号码进行通信的应用。
第一类,基于独立账户的即时通信应用。这类应用需要添加对方为好友,才能与对方互发消息。比如,参见图2A(a)为第一类即时通信应用的好友列表的示意图。好友列表中显示已添加的好友的昵称或备注,用户可以与好友列表中的好友互发消息。比如,
Figure PCTCN2021125531-appb-000008
Figure PCTCN2021125531-appb-000009
Facetime
Figure PCTCN2021125531-appb-000010
等属于第一类应用。其中,添加好友方式有多种,比如,继续参见图2A中的(a),当手机检测到点击按键101的操作时,显示如图2A中的(b)所示的界面,该界面中包括搜索框、扫一扫、手机联系人等多种好友添加方式。假设手机检测到用户选择手机联系人的选项,可以显示手机通讯录,用户可以在手机通讯录中选择联系人并向该联系人发送添加好友的请求,如果成功将其添加为好友,则好友列表中增加该好友,用户可以与其互发消息。也就是说,对于第一类应用,即便是手机通讯录中已经存储的联系人也需要先添加为好友,然后才能与其互发消息。
第一类应用可以创建群组(即群聊)。比如,群组中包括用户A、用户B和用户C。该群组中可以显示群成员的相关信息,比如群成员注册时的头像、昵称、个性签名等等。以用户A为例,假设用户C不在用户A的好友列表中,如果用户A要和用户C聊天,可以发起添加好友的申请,以添加其为好友,在对方同意后,可以与对方互发消息。
第二类,基于手机号码的即时通信应用。这类应用的主要特点是不需要像第一类应用那样添加好友才能互发消息,第二类应用可以直接在手机通讯录中选择联系人,与该联系人通信即可。比如,以畅连应用为例,用户使用手机号码注册畅连应用之后,在手机通讯录中可以查询哪些联系人注册了畅连应用,然后可以在手机通讯录中直接与这些联系人建立畅连通话(比如,视频、语音通话或互发消息),无需像第一类应用一样先添加对方为好友。
举例来说,请参见图2B所示,为手机通讯录的示意图,手机通讯录中包括手机中已保存了电话号码的联系人,比如,约翰、大卫、尼克。假设约翰开通了畅连应用,则手机 通讯录中显示畅连标记,比如视频通话标记102和语音通话标记103。用户可以通过视频通话标记102发起与约翰的畅连视频通话,通过语音通话标记103发起与约翰的畅连语音通话,操作简单,无需添加好友,可在手机通讯录中直接发起。当然,除了华为畅连应用之外,
Figure PCTCN2021125531-appb-000011
等也属于第二类即时通信应用。相对于第一类即时通信应用,第二类即时通信应用操作更为便捷。
第二类应用也可以创建群组,与第一类应用不同的是,由于第二类应用是基于手机号码通信,所以目前第二类应用所创建的群组中群成员的手机号码是明文显示的。
比如,群组中包括用户A、用户B和用户C。以用户A的手机为例,请参见图2C中的(a)为用户A的手机上该群组的聊天界面的示意图,假设手机检测到针对控件104的操作,手机显示如图2C中的(b)所示的界面,该界面中包括群组内的群成员的信息,由于用户C不在用户A的手机通讯录中,所以用户C的电话号码明文显示,即“131xxxxxxxx”,这样的话,用户C的电话号码就直接暴露给了用户A,用户A可能会单独给该号码打电话或发短信等,造成对对方的骚扰。
再比如,当群组内的用户B将其手机通讯录中的联系人用户D(假设手机号码是131xxxxxxxx)拉入群聊时,可以显示如图2D所示的群组聊天界面,该群组聊天界面中包括提示信息:用户B邀请“131xxxxxxxx”加入群聊,这样的话,用户D的手机号码131xxxxxxxx就直接暴露给群组内的所有人。
可见,这种群成员的手机号码明文显示的方式,容易导致群成员的手机号码被暴露,进而导致群成员被骚扰,用户体验较低。
鉴于此,本申请提供一种群组内群成员隐私保护方法,该方法可以保护群成员的隐私信息(比如手机号码)不暴露。
比如,以畅连应用为例,用户A、用户B和用户C均注册了畅连应用,并上传了头像和昵称。假设用户A、用户B和用户C在同一个群组内。如果用户C不在用户A的手机通讯录中,用户A无法看到用户C的手机号码,只能看到用户C的昵称和/或头像,避免用户C的手机号码暴露给用户A。
通过这种方式,可以避免群成员的手机号码泄露给群组内的陌生人,避免由于手机号码的泄露而导致的短信、电话骚扰,安全性较高。
以下实施例将结合附图对本申请实施例提供的群组内群成员隐私保护方法进行具体阐述。
本申请提供的群组内群成员隐私保护方法适用于包括多个设备的系统。图2E为本申请提供的一种系统的示意图。所述系统中包括第一设备、第二设备、第三设备和畅连云服务。其中,第一设备、第二设备和第三设备的硬件结构可以参见图1A,软件结构可以参见图1B。三个设备的类型可以相同,比如,三个设备都是手机或者都是平板电脑。或者,三个设备的类型可以不同,比如,第一设备和第二设备是手机,第三设备是平板电脑等等,总之,本申请实施例对三个设备的类型不作限定。
比如,第一设备的电话号码是第一号码,第二设备的电话号码是第二号码,第三设备的电话号码是第三号码。而且,第一设备、第二设备和第三设备中均安装基于手机号码的即时通信应用,比如华为畅连应用。第一设备基于第一号码向畅连云服务进行了注册并上 传了第一昵称和第一头像,第二设备基于第二号码向畅连云服务进行注册并上传了第二昵称和第二头像,第三设备基于第三号码向畅连云服务进行注册并上传了第三昵称和第三头像。因此,畅连云服务上记录了三个用户,分别是第一用户、第二用户和第三用户,分别如下:
第一用户:第一号码、第一昵称、第一头像;
第二用户:第二号码、第二昵称、第二头像;
第三用户:第三号码、第三昵称、第三头像。
假设三个用户在同一群组内。如果第二号码不在第一用户的手机通讯录中,那么当第一设备查看群组内第二用户的信息时,无法看到第二用户的第二号码,只能看到第二用户的第二昵称和/或第二头像。如果第一用户想要与第二用户通信,可以发出联系人添加请求,在对方同意的情况下,将第二用户的第二号码添加到第一用户的手机通讯录中,然后与第二用户通信。如果第三用户的第三号码在第一用户的手机通讯录中,那么当第一设备查看群组内第三用户的信息时,可以看到第三用户的第三号码,还可以直接通过第三号码与第三用户通信,无需再次添加联系人。
下文以图2E所示的系统为例进行介绍,并且,以第一设备、第二设备和第三设备都是手机,且三个手机中都安装有畅连应用为例。为了方便描述,假设三个设备的用户关系满足如下:
第一设备的用户是Amy,第一昵称是AAA,第一号码是185 xxxx xxxx;
第二设备的用户是大卫,第二昵称是DW,第二号码是156 xxxx xxxx;
第三设备的用户是汤姆,第三昵称是flower,第三号码是138 xxxx xxxx。
具体地,包括实施例一至实施例五。其中,实施例一介绍畅连应用的注册过程;实施例二介绍畅连应用建立群组的过程;实施例三至实施例五分别介绍群组内两个群成员单独聊天的实现过程。
实施例一
本实施例一介绍畅连应用的注册过程。需要说明的是,目前的第二类即时通信应用在注册时,不需要上传头像和昵称,用户直接基于手机号码进行注册,所以云侧用手机号码来区分不同用户,所以云侧建立群组时,将群成员的手机号码发送到群组内,以标识不同的群成员,这样会导致群成员的手机号码暴露。
本实施例一中,用户基于手机号码注册畅连应用时需要上传昵称和头像等,所以云侧知道每个注册用户的手机号码,还知道每个注册用户的昵称和头像,所以可以使用昵称和/或头像来标记不同的用户,那么在建立群组时,可以使用昵称和/或头像标识不同的群成员,避免直接暴露群成员的电话号码。
本实施例一涉及的附图包括图3A至图4B。
参见图3A所示,为畅连应用的注册流程的示意图。如图3A所示,所述流程包括:
S101,手机接收到用于注册畅连应用的第一操作。
示例性的,图3B中的(a)示出了手机的一种图形用户界面(graphical user interface,GUI),该GUI为手机的主界面(home screen)。主界面中包括多种应用的图标,比如,相机应用的图标、应用市场的图标、畅连应用的图标等等。当手机检测到针对畅连应用的图 标的操作时,显示如图3B中的(b)所示的另一GUI,该GUI可以称为畅连应用的登录界面。登录界面中显示手机号码输入框、密码输入框,用户可以在其中输入手机号码和密码,进行登录。可以理解的是,如果是首次使用畅连应用,可以先注册。比如,继续参见图3B中的(b),手机检测到用户点击“注册”控件的操作时,显示如图3B中的(c)所示的界面,该界面中包括手机号码输入框,用户可以在该输入框中输入手机号码,如185 xxxx xxxx。上述第一操作可以是点击图3B中的(c)所示的界面中“下一步”控件的操作;或者,第一操作也可以是其它类型的操作,比如用于指示注册畅连应用的语音指令等等,本申请实施例不限定。
S102,手机向畅连云服务发送注册申请。
注册申请中可以携带用户的手机号码,比如,图3B中的(c)中的手机号码185 xxxx xxxx。
S103,手机接收畅连云服务发送的短信验证码。
畅连云服务在接收到手机发送的注册申请之后,向注册申请中携带的手机号码发送短信验证码。比如,注册申请中携带的手机号码是185 xxxx xxxx,则畅连云服务向手机号码185 xxxx xxxx发送短信验证码,如123456。手机接收到验证码之后,可以将验证码录入到验证码输入框中,参见图3B中的(d)所示,用户输入短信验证码“123456”,当手机检测到“完成”控件的操作时,将输入的短信验证码发送给畅连云服务。或者,图3B中的(d)中的“完成”控件可以不显示,比如,当检测到验证码输入完成(比如验证码为6位,检测到用户输入6位数确认输入完成)之后,默认将输入的短信验证码发送给畅连云服务。
S104,手机向畅连云服务发送短信验证码。
S105,畅连云服务对短信验证码进行验证。
比如,在S103执行完之后,畅连云服务记录向手机号码185xxxxxxxx发送了短信验证码123456。当畅连云服务器接收到来自手机号码185xxxxxxxx的短信验证码之后,可以对短信验证码进行验证,比如,判断所述接收的短信验证码与所述发出的短信验证码是否一致,如果是,则验证通过,否则,验证不通过。可选的,为了提升安全性,除了判断接收的短信验证码与为发出的短信验证码是否一致之外,还可以判断所述短信验证码的接收时间与发送时间之间的时间差是否小于预设时长,如果是,则验证通过,否则,验证不通过。当验证通过之后,畅连云服务可以向手机发送注册成功的响应;当然,验证不通过时,也可以向手机发送注册失败的响应。
S106,畅连云服务向手机发送注册成功的响应。
在基于手机号码注册成功之后,还可以设置畅连应用的头像和昵称等。继续以图3A为例,具体流程包括S107至S108。
S107,手机上传用户头像、昵称等信息。
S108,畅连云服务存储用户头像、昵称等信息。
比如,在注册完成之后,手机显示如图3C中的(a)所示的界面,该界面中显示默认头像、昵称输入框。当手机检测到用户点击默认头像的操作时,可以显示如图3C中的(b)所示的界面,该界面中包括“从相册中选择图像”的控件。当,手机检测到针对“从相册中选择图像”控件的操作时,打开相册,如图3C中的(c)所示,用户可以从中选择某一张图像作为头像,比如选择图像300。在选择图像之后,手机显示如图3C中的(d)所示的界面,该界面中头像显示为用户选择的图像300。当手机检测到针对“保存头像”的控件的操 作时,显示图3C中的(e)所示的界面,该界面中头像显示为用户选择的图像300,假设用户输入昵称:Amy,当手机检测到用户点击“上传”控件的操作时,将头像、昵称等信息上传到畅连云服务。
可选的,图3C中的(e)所示的界面中还包括个性签名输入框,用户可以在该输入框中输入用户的个性签名,上传到畅连云服务。
需要说明的是,图3B至图3C是以一个用户使用其手机基于该用户的手机号码(如185 xxxx xxxx)注册畅连应用的过程。可以理解的是,多个用户都可以使用自己的手机号码注册畅连应用,注册原理与上述原理相同。也就是说,畅连云服务中可以存储大量的注册用户。比如,参见下表1,为畅连云服务存储的注册用户的示例。
表1
手机号码 头像 昵称
185 xxxx xxxx 图像1 AAA
156 xxxx xxxx 图像2 DW
138 xxxx xxxx 图像3 YH
131 xxxx xxxx 图像4 flower
也就是说,除了第一用户(如185 xxxx xxxx)之外,手机号码是156 xxxx xxxx的第二用户、手机号码是138 xxxx xxxx的第三用户以及手机号码是131 xxxx xxxx的第四用户分别都注册了华为畅连应用,并上传了头像。
上面的实施例是以畅连应用为例介绍注册流程,需要说明的是,对于其他的即时通信应用也是适用的,本申请实施例对此不作限定。
S109,畅连云服务向手机发送上传成功的响应。
可选的,手机注册畅连应用之后,可以发现手机通讯录中哪些联系人注册了畅连应用。比如,第一用户的手机通讯录包括100个联系人,其中50人可能注册了畅连应用,那么第一用户的手机上可以通过一定的方式标注出注册了畅连应用的联系人。一种可实施方式为,第一用户的手机将其手机通讯录发送给畅连云服务。对于畅连云服务而言,知道每个注册过畅连应用的手机号码。因此,当畅连云服务接收到第一用户的手机通讯录之后,可以确定该手机通讯录中注册过畅连应用的用户,所以畅连云服务可以通过一定的指示方式指示第一用户的手机通讯录中注册了畅连应用的用户。
比如,请参见图4A中的(a)所示,为第一用户的手机中畅连应用的界面的示意图,该界面中包括联系人选项402、畅连选项403、通话选项404。其中,联系人选项402被选中时,手机显示通讯录,比如包括联系人约翰、大卫和尼克。其中,约翰和大卫注册了畅连应用,所以图4A中的(a)中联系人约翰和联系人大卫显示有对应的畅连标记,比如,畅连视频标记和畅连语音标记。由于联系人尼克未注册畅连应用,所以该界面中联系人尼克不显示畅连标记。
可选的,手机也可以从手机通讯录中过滤出注册了畅连应用的联系人,以方便用户查找。为了方便描述,将从手机通讯录中过滤出的注册了畅连应用的联系人统称为畅连通讯录。也就是说,手机通讯录包括手机存储的所有联系人,而畅连通讯录中包括手机通讯录中已注册畅连应用的联系人,简单来说,畅连通讯录是手机通讯录的子集。可以理解的是,畅连通讯录可以实时的更新,比如第一用户的手机通讯录中的某个联系人注册畅连应用之后,畅连云服务通知第一用户的手机,对应的,第一用户的手机中畅连通讯录中增加该联 系人。
比如,请继续参见图4A中的(a),当手机检测到用户选择“畅连”按键401的操作时,显示如图4A中的(b)所示的界面,该界面显示畅连通讯录,即显示已注册畅连应用的联系人,由于联系人尼克没有注册畅连应用,所以该界面中不显示联系人尼克。
上面介绍了图4A中的(a)中联系人选项402被选中时手机的显示界面。图4A中的(a)中还包括畅连选项403和通话选项404。当畅连选项403被选中时,手机可以显示如图4A中的(c)所示的界面,该界面中显示与联系人约翰、大卫互发消息。当通话选项404被选中时,手机显示如图4A中的(d)所示的界面,该界面中包括通话记录,比如昨天与约翰、大卫等通话过。
继续以图4A中的(a)为例,假设用户想要与手机通讯录中的约翰单独聊天,可以使用畅连视频通话、畅连语音通话、畅连消息三种方式进行。
比如,以图4A中的(a)为例,用户可以通过图4A中的(a)所示的界面中与联系人约翰对应的畅连视频标记和畅连语音标记向约翰发起通话。或者,还可以通过其它方式向约翰发起通话,比如继续以图4A中的(a)为例,手机检测到用户点击约翰的头像或约翰的名称时,可以显示如图4B中的(a)所示界面,该界面中包括约翰的相关信息,比如,头像、昵称等。该界面中还包括畅连视频标记411、畅连语音标记412、畅连消息标记413。假设手机检测到用户点击畅连视频标记411,向约翰发起畅连视频通话,比如参见图4B中的(b)。假设手机检测到用户点击畅连语音标记412,则向约翰发起畅连语音通话,比如,参见图4B中的(c)。假设手机检测到用户点击畅连消息标记413,可以显示如图4B中的(d)所示的界面,该界面可以理解为与约翰的聊天界面,在该聊天界面中,用户可以向约翰发送文字、图片、位置、表情等。
实施例二
本实施例二介绍畅连应用建立群组的过程。本实施例二涉及的附图包括图5A至图5D。其中,图5A为建立群组的流程示意图。具体地,S201至S206为第一用户邀请第二用户入群的过程,S206至S211为第二用户邀请第三用户入群的过程。一个用户邀请另一个用户入群时,群成员的手机上会显示新成员入群提示,用于提示新成员入群,通过图2D可知,目前的第二类即时通信应用显示的新成员入群提示中邀请人和/或被邀请人的手机号码是明文显示的。本实施例二新成员入群提示中显示邀请人的昵称和/或被邀请人的昵称,避免邀请人和/或被邀请人的手机号码直接暴露。
请参见图5A,为建立群组的流程示意图。如图5A所示,所述流程包括:
S200,第一用户、第二用户和第三用户完成畅连注册。其中,注册过程可以参见实施例一,在此不重复。
S201,第一用户检测到用于邀请第二用户加入群聊的操作。
比如,第一用户的手机显示如图5B中的(a)所示的界面,该界面中包括控件501,当检测到针对控件501的操作时,显示如图5B中的(b)所示的界面,该界面包括畅连通讯录中的联系人,用户可以从中选择要邀请入群的联系人。比如,用户选择联系人大卫(即第二用户),当手机检测到用户点击“确定”控件的操作时,邀请大卫加入聊天。
上面以通过控件501建立群组为例,可以理解的是,还可以通过其它方式建立群组,比如,面对面建群,或者,在与某个联系人的单独聊天界面中拉另一个联系人加入等,本 实施例对此不限定。
S202,第一用户向畅连云服务发送第二用户的入群邀请。入群邀请中可以携带第二用户的手机号码,可选的还可以携带第二用户的昵称、头像等信息。
S203,畅连云服务向第二用户发送入群邀请。
可选的,请参见图5C,为第二用户的显示界面的示意图,该界面显示提示信息:Amy邀请您加入群聊,当检测到针对“同意”按键的操作时,向畅连云服务发送同意入群的通知,当检测到针对“拒绝”控件的操作时,向畅连云服务发送拒绝入群的通知。
S204,畅连云服务接收到来自第二用户的同意入群的通知。
可选的,S203和S204可以执行或不执行(所以图5A中使用虚线表示),比如,S203和S204不执行时,无需第二用户同意、畅连云服务直接将第二用户加入群组。
S205,畅连云服务生成包括第一用户和第二用户的群组。
S206,畅连云服务向第一用户和第二用户发送群组信息。所述群组信息例如可以是新成员入群提示,即用于提示第二用户加入群组的提示信息。
比如,继续以图5B中的(b)为例,在第一用户邀请大卫入群之后,第一用户的手机上显示图5B中的(c)所示的界面,该界面中显示新成员入群提示:您邀请“大卫”加入群聊,即该群组中包括第一用户(Amy)、第二用户(大卫)。
可选的,第一用户将第二用户拉入群聊后,第二用户也可以将第二用户的畅连通讯录中的联系人比如第三用户拉入群组。具体地,第二用户将第三用户拉入群聊的流程包括S206至S211。
S207,第二用户向畅连云服务发送第三用户的入群邀请。第三用户是第二用户的畅连通讯录中的联系人。
S208,畅连云服务向第三用户发送入群邀请。
S209,畅连云服务接收第三用户发送的同意入群的指示。
可选的,S208和S209可以执行或不执行(所以图5A中使用虚线表示)。
S210,畅连云服务将包括第一用户和第二用户的群组更新为包括第一用户、第二用户和第四用户的群组。
S211,畅连云服务向第一用户、第二用户、第三用户发送更新的群组信息。所述群组信息是新成员入群提示,例如可以是用于指示第三用户加入群组的提示信息。
比如,请参见图5D,为第一用户的手机上显示群组聊天界面,该聊天界面中包括提示信息,大卫(即第二用户)邀请“flower”(即第三用户的昵称)加入群聊。
可选的,新成员入群提示的显示样式可以是:“X”邀请“Y”加入群聊。其中,X是邀请人的名称,Y是被邀请人的名称。X和Y的显示样式有多种,以一个群成员的手机为例,可以通过如下方式显示:
方式1,X是邀请人的昵称,和/或,Y是被邀请人的昵称。
比如,群成员既不是邀请人也不是被邀请人时,该群成员的手机上显示的新成员入群提示信息为:“X”邀请“Y”加入群聊,其中,X是邀请人的昵称,Y是被邀请人的昵称。比如,第二用户邀请第三用户入群的场景中,第一用户既非邀请人,也非被邀请人,所以第一用户的手机上显示的提示信息可以是:“DW”邀请“flower”加入群聊,其中,DW是第二 用户的昵称,flower是第三用户的昵称。如果群成员是邀请人,那么该群成员的手机上显示:您邀请Y加入群聊,此处Y是被邀请人的昵称。如果该群成员是被邀请人,那么该群成员的手机上显示:X邀请您加入群聊,此处X是邀请人的昵称。
这种方式中,新成员入群提示中显示的是邀请人的昵称和/或被邀请人的昵称,所以被邀请入群的新成员的手机号码不会直接暴露,相比于图2D中直接显示新成员的手机号码的方式,用户隐私性更高。
方式2,当群成员的手机通讯录中包括了邀请人的手机号码并备注为X1、未保存被邀请人的手机号码时,该群成员的手机上显示的新成员入群提示为,X1邀请Y加入群聊,此时Y是被邀请人的昵称。
比如,继续以图5D为例,第一用户的手机通讯录中保存了第二用户(大卫)的手机号码,并备注为大卫,而未保存第三用户的手机号码,所以第一用户的手机上显示的入群提示为:“大卫”邀请“flower”加入群聊;其中,“flower”是第三用户的昵称。
方式3,当群成员的手机通讯录中包括了被邀请人的手机号码并备注为Y1、未保存邀请人的手机号码时,该群成员的手机上显示的新成员入群提示为,X邀请Y1加入群聊,此时X是邀请人的昵称。
方式4,当群成员的手机通讯录中既保存了邀请人的手机号码并备注为X1、又保存了被邀请人的手机号码且备注为Y1时,该群成员的手机上显示的新成员入群提示为,X1邀请Y1加入群聊。
上述方式2至方式4与方式1不同,方式1不需要考虑邀请人和被邀请人的电话号码是否存在于群成员的畅连通讯录中,新成员入群提示默认显示邀请人和/或被邀请人的昵称。而方式2至方式4考虑邀请人和被邀请人的电话号码可能存在于群成员的畅连通讯录中的情况。比如,对于保存了邀请人的手机号码的群成员来说,其手机上新成员入群提示显示的是邀请人的备注名,对于未保存的邀请人的群成员,其手机上显示的是昵称。
对于上述方式2至方式4,一种可实现方式为,畅连云服务向群成员发送新成员入群提示之前,可以确定畅连通讯录中保存了邀请人和/或被邀请人的手机号码的群成员。由于畅连云服务知道每个群成员的畅连通讯录,而且,也知道邀请人和/或被邀请人的手机号码,所以畅连云服务可以判断出哪一个群成员的畅连通讯录中包括有邀请人和/或被邀请人的手机号码。
对于畅连通讯录中包含被邀请人和/或邀请人的群成员,畅连云服务器使用上述方式2至方式4中的一种。比如,当畅连云服务确定某个群成员的畅连通讯录中包括邀请人和被邀请人的手机号码,则畅连云服务可以使用上面的方式4的样式生成新成员入群提示,并将生成的新成员入群提示发送给该群成员。对于畅连通讯录中未保存邀请人和被邀请人的手机号码的群成员,畅连云服务器使用上述方式1生成新成员入群提示。
上面的实施例以新成员入群提示的显示样式是:“X”邀请“Y”加入群聊为例。可选的,新成员入群显示样式还可以是“Y加入群聊”,即不包括邀请人,只包括被邀请人,其显示方式也有多种,原理与上述方式1至方式4相同,不重复赘述。
上面的实施例以新成员入群提示不会直接暴露邀请人和被邀请人的手机号码为例,需要说明的是,除了新成员入群提示不会暴露邀请人和被邀请人的手机号码之外,当群组内一个群成员要查看另一个群成员的信息时,如果所述另一个群成员不在所述群成员的手机 通讯录中,是无法看到所述另一个群成员的手机号码的。
比如,以图5D所示的群组为例,当手机检测到用户点击群聊界面中的“更多”控件时,可以显示如图5E所示的界面,该界面中包括群组的相关信息,比如包括群组成员。该群组成员包括:Amy(第一用户)、大卫(第二用户)、flower(第三用户)。由于对于第一用户来说,第三用户是陌生人,所以第一用户的手机上只能看到第三用户的昵称(flower),无法直接看到第三用户的手机号码。
请对比图5E与前文图2C中的(b)可知,目前的第二类即时通信应用中,群成员的手机号码明文显示,但本实施例二中,对于不包括在手机通讯录中的群成员,是无法查看到该群成员的手机号码的,安全性高。
实施例三
本实施例三中介绍群组内两个群成员单独聊天的实现过程。需要说明的是,目前的第二类即时通信应用的群组内群成员的手机号码是明文显示的,所以一个群成员想要和另一个群成员通话时,无需添加所述另一个群成员到手机通讯录中,因为已经知道所述另一个群成员的手机号码了,直接与该手机号码联系即可。
本实施例三中,群组内的群成员A想要和群成员A单独聊天(音/视频或发送消息)时,如果群成员B的手机号码已在群成员A的手机通讯录中,那么无需再添加群成员B为联系人,可以直接与群成员B单独聊天。如果群成员B的手机号码不在群成员A的手机通讯录中,由于群成员A不知道群成员B的手机号码,所以可以向群成员B发送添加联系人的请求,在对方同意的情况下才能获取群成员B的手机号码,并将群成员B的手机号码添加到手机通讯录中,然后与群成员B单独聊天。
本实施例三涉及的附图包括图6A至图6C。
请参见图6A所示,为添加群组中的陌生人为联系人的流程示意图。该流程可以理解为已经建立包括第一用户(Amy)、第二用户(大卫)和第三用户(昵称flower)的群组之后的过程,其中,第三用户不存在于第一用户的手机通讯录中。具体的,所述流程包括:
S301,第一用户的手机检测到用于将第三用户添加为联系人的操作。
比如,请参见图6B中的(a),为第一用户的手机上的GUI的示意图。如果第一用户想要与昵称是“flower”的第三用户单独聊天,可以将其添加为联系人,然后单独聊天。比如,第一用户的手机检测到针对第三用户的头像的点击操作时,显示如图6B中的(b)所示的界面,该界面中包括第三用户的昵称flower和头像,以及添加联系人的控件。所以,S301中用于将第三用户添加为联系人的操作可以是用户点击添加联系人的控件的操作;或者,也可以是其它操作,比如用于将第三用户添加为联系人的语音指令等等,本申请实施例不作限定。
需要说明的是,继续以图6B为例,由于对于第一用户而言,第三用户是陌生人,所以当手机检测到用户点击第三用户的头像的操作时,显示如图6B中的(b)所示的界面,为了防止其手机号码暴露,该界面中仅显示第三用户的昵称“flower”以及头像,不显示其手机号码。对了方便对比,继续以图6B中的(a)为例,假设手机检测到用户点击第二用户(大卫)的头像的操作,则显示图6B中的(c)所示的界面,由于大卫存在于第一用户的畅连通讯录中,所以该界面中包括大卫的手机号码、头像、昵称等等。可选的,该界面中还可以显示与大卫的通话记录,第一用户可以直接与大卫进行通话。
对比图6B中的(b)和图6B中的(c)可知,当一个群成员查看群组中的另一个群成员的信息时,如果被查看的群成员是陌生人(比如第三用户),则显示如图6B中的(b)所示的界面,该界面中不包括对方的手机号码,仅显示对方的昵称和/或头像。如果被查看的群成员不是陌生人(比如大卫),则显示如图6B中的(c)所示的界面,该界面中包括该群成员的手机号码,基于该界面可以与对方进行单独聊天。
S302,第一用户向畅连云服务发送添加第三用户为联系人的请求。所述请求中包括第一用户的号码,第三用户的头像和/或昵称。
S303,畅连云服务对第一用户和第三用户进行验证。S303可以执行或不执行。
比如,畅连云服务可以验证第一用户和第三用户是否是合法用户(是否注册过畅连应用),如果是,验证通过,继续执行后续步骤,否则,验证不通过。
S304,畅连云服务向第三用户发送添加第三用户为联系人的请求。所述请求中可以携带第一用户的昵称、头像,可选的,还可以携带第一用户的电话号码。
S305,第三用户向畅连云服务发送同意指令。
可选的,S304和S305是可选步骤,可以执行也可以不执行,所以图6A中S304至S305以虚线表示。如果不执行,即无需经过第三用户的同意,畅连云服务可以直接执行S306。
S306,畅连云服务向第一用户发送第三用户的手机号码。
S307,第一用户将第三用户的手机号码保存在通讯录中。
上面的实施例中,以图6B中的(b)中第一用户的手机检测到针对添加联系人控件的操作时,直接向畅连云服务发送添加第三用户为联系人的请求为例。可以理解的是,图6B中的(b)中检测到针对添加联系人控件的操作时,可以先不向畅连云服务发送添加第三用户为联系人的请求,比如,图6B中的(b)第一用户的手机检测到针对添加联系人的控件的点击操作时,可以显示如图6C中的(a)所示的界面,该界面中包括验证信息,比如,您好,我是群聊中的“xxx”,此处的“xxx”可以是第一用户的昵称。当手机检测到针对“发送”控件的操作时,向畅连云服务发送添加第三用户为联系人的请求,该请求中可以携带所述验证信息。所述请求中还可以携带第三用户的昵称、头像等。可选的,继续参见图6C中的(a),第一用户可以在联系人姓名的输入框中输入名称,当对方同意添加联系人的请求后,第一用户的手机通讯录中保存对方的手机号码,且该手机号码的备注名为在所述输入框中输入的名称。
第一用户的手机接收到第三用户的手机号码时,保存第三用户的手机号码。比如,请参见图6C中的(b),第一用户的手机通讯录中包括第三用户,此时如果用户想要与第三用户单独聊天,可以点击第三用户的头像或昵称,打开如图6C中的(c)所示的界面,通过该界面中的畅连通话标记、畅连语音标记、畅连消息标记发起单独聊天。当然,与可以直接通过图6C中的(b)所示的界面中的畅连通话标记或畅连语音标记发起聊天。
以上的过程介绍第一用户请求添加第三用户为联系人的过程,可选的,第一用户添加第三用户为联系人之后,第三用户可以默认添加第一用户为联系人,比如,通过如下步骤S308至S309实现。
S308,畅连云服务向第三用户发送第一用户的手机号码。
S309,第三用户将第一用户的手机号码保存在通讯录中。
S308和S309是可选步骤,所以图中以虚线表示。或者,在第三用户添加第一用户为联系人之前,还可以向第一用户发出添加联系人的请求,在第一用户同意的情况下,执行 S308和S309。
实施例四
在实施例三中,群组内的群成员A想要和群成员A单独聊天时,如果群成员B不在群成员A的手机通讯录中,向群成员B发送添加联系人的请求,在对方同意的情况下,才能获取到群成员B的手机号码,并将群成员B添加到手机通讯录中,然后与群成员B单独聊天。考虑到一种场景:群成员A曾经与群成员B单独聊天过,比如群成员A拨打过群成员B的电话号码,但是群成员A并未将该电话号码保存到手机通讯录中,所以群成员B被识别为群成员A的陌生人,这种情况下,由于群成员A的历史通话记录中已包含群成员B的手机号码,所以可以无需向群成员B发送联系人添加请求。
因此,本实施例四与实施例三区别之处在于:本实施例四,群成员A在向群成员B发出添加联系人的请求之前,还可以判断群成员A的历史通话记录中是否存在群成员B,如果存在,可以无需向群成员B发送联系人添加请求,直接将历史通话记录中群成员B的手机号码存储到手机通讯录中,如果不存在,向群成员B发送联系人添加请求。
请参见图7A所示,为添加群组中的陌生人为联系人的流程示意图。该流程可以理解为建立包括第一用户(Amy)、第二用户(大卫)和第三用户(昵称flower)的群组之后的过程,其中,第三用户不存在于第一用户的手机通讯录中。具体的,所述流程包括:
S401,第一用户的手机检测到用于将第三用户添加为联系人的操作。
S401的实现原理请参见实施例三中S301的实现原理,在此不再赘述。比如,所述操作可以是点击图6B中的(b)中添加为联系人的控件的操作。
S402,第一用户的手机判断历史通话记录中是否存在第三用户的手机号码,如果是,可以直接执行S408,否则,执行S403。
其中,历史通话记录可以是最近通话记录,比如图4A中的(d)所示的最近通话记录。或者,还可以是4A中的(c)所示的历史短信记录,本申请对此不作限定。
第一用户的手机可以在本地判断历史通话记录中是否存在第三用户。比如,本地的历史通话记录中包括用户的头像和昵称,通过头像和昵称的对比可以确定历史通话记录中是否存在第三用户的头像和昵称,如果存在,则确定第三用户存在于历史通话记录中,否则,确定第三用户不存在于历史通话记录中。
当第一用户的手机确定历史通话记录中存在第三用户的手机号码时,可以直接进入S408。比如,以图6B中的(b)为例,响应于用户点击添加联系人控件的操作,第一用户的手机判断第三用户是否存在于第一用户的历史通话记录中,如果是,直接将第三用户保存到通讯录中即直接执行S408。或者,当第一用户的手机确定历史通话记录中存在第三用户的手机号码时,弹出提示信息,提示是否保存为联系人,如果接收到确认指示,进入S408。比如,继续以图6B中的(b)为例,第一用户的手机响应于用户点击添加联系人控件的操作,未直接将第三用户保存到通讯录中,而是显示如图7B所示的界面,该界面中包括保存按键,当手机检测到针对保存按键的操作时,将第三用户添加为联系人。
当第一用户的历史通话记录中不存在第三用户的手机号码时,可以直接进入S403。比如,以图6B中的(b)为例,响应于用户点击添加联系人控件的操作,第一用户的手机判断第三用户是否存在于第一用户的历史通话记录中,如果否,向畅连云服务发送添加第三用户为联系人的请求,即直接执行S403。或者,当确定第一用户的历史通话记录中不存在 第三用户的手机号码时,显示提示信息,提示用户是否向对方发送添加联系人的请求,如果检测到确认指令,向畅连云服务发送联系人添加请求即S403。比如,继续以图6B中的(b)为例,响应于用户点击添加联系人控件的操作,第一用户的手机判断第三用户是否存在于第一用户的历史通话记录中,如果否,显示图6C中的(a)所示的界面,当检测到针对“发送”控件的操作时,进入S403。
S403,第一用户向畅连云服务发送添加第三用户为联系人的请求。
S404,畅连云服务对第一用户和第三用户进行验证。
S405,畅连云服务向第三用户发送添加第三用户为联系人的请求。
S406,第三用户向畅连云服务发送同意指令。
S407,畅连云服务向第一用户发送第三用户的手机号码。
S408,第一用户将第三用户保存在通讯录中。
S409,畅连云服务向第三用户发送第一用户的手机号码。
S410,第三用户将第一用户保存在通讯录中。
上述S403至S410的实现原理与实施例三中S303至S310的实现原理相同,不重复赘述。
需要说明的是,上面的实施例以第一用户的手机在本地判断历史通话记录中是否存在第三用户为例。可选的,还可以通过畅连云服务判断第一用户的历史通信记录中是否存在第三用户。比如,由于第一用户仅知道第三用户的昵称和头像不知道第三用户的手机号码,所以第一用户的手机可以向畅连云服务发送查询请求,该查询请求用于请求查询第一用户的历史通话记录中是否存在第三用户。比如,所述查询请求中包括第一用户的历史通话记录还包括第三用户的昵称和/或头像。由于畅连云服务知道第三用户的手机号码,所以畅连云服务可以判断所述历史通话记录中是否存在第三用户的手机号码,并向手机反馈指示信息。假设经过畅连云服务的确定,历史通话记录中的某个电话号码比如131 xxxx xxxx是第三用户的手机号码,畅连云服务器向第一用户发送第一提示信息,该第一提示信息指出历史通话记录中的电话号码131 xxxx xxxx是第三用户的手机号码。如果经过畅连云服务的确定历史通话记录中不存在第三用户的手机号码,可以向第一用户发送不包含第三用户的第二提示信息。
总结来说,本实施例四在群成员A的历史通话记录中存在群成员B的手机号码的情况下,无需向群成员B发送联系人添加请求,否则,需要向群成员B发送联系人添加请求。
实施例五
实施例四判断群成员A的历史通话记录中是否存在群成员B的手机号码,根据判断结果决定是否需要向群成员B发送联系人添加请求。本实施例五介绍另一种方式,当群成员A想要和群成员B单独聊天时,群成员A可以通过畅连云服务判断对方(即群成员B)的手机通讯录中是否存在群成员A的手机号码,如果是,从畅连云服务处获取对方手机号码并保存到手机通讯录中,无需向对方发送联系人添加请求,否则,需要向对方发送添加联系人请求。
请参见图8所示,为添加群组中的陌生人为联系人的流程示意图。该流程可以理解为建立包括第一用户(Amy)、第二用户(大卫)和第三用户(昵称flower)的群组之后的过程,其中,第三用户不存在于第一用户的手机通讯录中。具体的,所述流程包括:
S501,第一用户的手机检测到用于将第三用户添加为联系人的操作。
S501的实现原理请参见实施例三中S301的实现原理,在此不再赘述。比如,所述操作可以是点击图6B中的(b)中添加为联系人的控件的操作。
S502,第一用户的手机向畅连云服务发送添加第三用户为联系人的请求。所述请求中携带第一用户的手机号码,以及第三用户的昵称和/或昵称。
S503,畅连云服务对第一用户和第三用户进行验证。S503可以执行或不执行。
S504,畅连云服务查询第三用户的手机通讯录中是否存在第一用户。如果是,直接进入S507,否则,执行S505。
由于畅连云服务中存储每个注册用户的手机通讯录,所以畅连云服务可以知道第三用户的手机通讯录,同时,畅连云服务也知道第一用户的手机号码,所以畅连云服务可以判断第三用户的手机通讯录中是否存在第一用户的手机号码。
当畅连云服务查询第三用户的手机通讯录中存在第一用户时,可以直接进入S507,即向第一用户发送第三用户的手机号码。第一用户的手机接收到第三用户的手机号码时,可以直接存储在通讯录中,或者,也可以先弹出图7B所示的界面,当检测到点击“保存”控件的操作时,将第三用户保存到通讯录中。
当畅连云服务查询到第三用户的手机通讯录中不存在第一用户时,可以直接进入S505。或者,畅连云服务查询到第三用户的手机通讯录中不存在第一用户时,可以先向第一用户发送指示信息,以指示第三用户的手机通讯录中不存在第一用户,此时第一用户的手机可以显示如图6C中的(a)所示的界面,当检测到针对“发送”控件的操作时,向畅连云服务发送确认指令,用于指示确认向第三用户发送联系人添加请求,畅连云服务在接收到所述确认指令时,进入S505。
S505,畅连云服务向第三用户发送添加第三用户为联系人的请求。
S506,第三用户向畅连云服务发送同意指令。
S507,畅连云服务向第一用户发送第三用户的手机号码。
S508,第一用户将第三用户保存在通讯录中。
S509,畅连云服务向第三用户发送第一用户的手机号码。
S510,第三用户将第一用户保存在通讯录中。
其中,S503、S505至S510的实现原理与实施例三中S303至S310的实现原理相同,不重叠赘述。
可选的,如果将实施例四提供的判断是否需要向对方发送联系人添加请求的方式作为第一种方式,将实施例五提供的判断是否需要向对方发送联系人添加请求的方式作为第二种方式,可以默认使用第一种方式或第二种方式;或者,第一种方式和第二种方式也可以结合使用,比如,先使用第一种方式,当使用第一种方式判断第一用户的历史通话记录中不存在第三用户时,再使用第二种方式判断第三用户的手机通讯录中是否存在第一用户,根据判断结果决定是否向对方发送联系人添加请求。
基于相同的构思,图9所示为本申请提供的一种云服务器900。该云服务器900可以是前文中的畅连云服务。如图9所示,本申请另外一些实施例公开了一种云服务器900,该云服务器900可以包括:一个或多个处理器901;一个或多个存储器902;通信接口903,以及一个或多个计算机程序904,上述各器件可以通过一个或多个通信总线905连接。其 中该一个或多个计算机程序904被存储在上述存储器902中并被配置为被该一个或多个处理器901执行,该一个或多个计算机程序904包括指令,上述指令可以用于执行如上面相应实施例中畅连云服务的相关步骤。通信接口903用于实现与其他设备(比如终端设备)的通信,比如通信接口可以是收发器。
上述本申请提供的实施例中,从电子设备(例如终端设备或畅连云服务器)作为执行主体的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,电子设备可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。
以上实施例中所用,根据上下文,术语“当…时”或“当…后”可以被解释为意思是“如果…”或“在…后”或“响应于确定…”或“响应于检测到…”。类似地,根据上下文,短语“在确定…时”或“如果检测到(所陈述的条件或事件)”可以被解释为意思是“如果确定…”或“响应于确定…”或“在检测到(所陈述的条件或事件)时”或“响应于检测到(所陈述的条件或事件)”。另外,在上述实施例中,使用诸如第一、第二之类的关系术语来区份一个实体和另一个实体,而并不限制这些实体之间的任何实际的关系和顺序。
在本说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。在不冲突的情况下,以上各实施例的方案都可以组合使用。
需要指出的是,本专利申请文件的一部分包含受著作权保护的内容。除了对专利局的专利文件或记录的专利文档内容制作副本以外,著作权人保留著作权。

Claims (24)

  1. 一种群组内群成员隐私保护方法,其特征在于,所述方法包括:
    终端设备显示即时通信应用中群组的群组成员列表,所述群组成员列表中包括第一群成员和第二群成员;
    所述终端设备响应于用于选择所述第一群成员的第一操作,显示所述第一群成员的第一电话号码,所述第一电话号码为所述终端设备的通讯录中保存的所述第一群成员的电话号码;
    所述终端设备响应于用于选择所述第二群成员的第二操作,显示所述第二群成员的头像和/或用户名,以及用于添加联系人的控件;
    所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,所述第一请求用于请求将所述第二群成员添加为联系人;
    所述云服务器响应于所述第一请求,向所述终端设备发送所述第二群成员的第二电话号码;
    所述终端设备基于所述第二电话号码将所述第二群成员保存为联系人。
  2. 如权利要求1所述的方法,其特征在于,所述云服务器响应于所述第一请求,向所述终端设备发送所述第二群成员的第二电话号码,包括:
    响应于所述第一请求,所述云服务器向所述第二群成员发送第二请求,所述第二请求用于指示所述终端设备请求添加所述第二群成员为联系人;
    当所述云服务器接收到来自所述第二群成员的同意指令时,向所述终端设备发送所述第二群成员的第二电话号码。
  3. 如权利要求1或2所述的方法,其特征在于,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:
    响应于所述第三操作,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中;
    当确定所述历史通信记录中不存在所述第二群成员的电话号码时,所述终端设备向所述云服务器发送所述第一请求。
  4. 如权利要求3所述的方法,其特征在于,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录,包括:
    所述终端设备在历史通话记录中所有号码对应的头像中查找与所述第二群成员的头像相匹配的头像,和/或,所述终端设备在历史通话记录中所有号码对应的用户名中查找与所述第二群成员的用户名相匹配的用户名;
    当未在所述历史通信记录中找到与所述第二群成员的头像相匹配的头像,和/或未找到与所述第二群成员的用户票相匹配的用户名时,确定所述第二群成员的电话号码不在所述历史通信记录中。
  5. 如权利要求3所述的方法,其特征在于,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中,包括:
    所述终端设备向所述云服务器发送所述历史通信记录;
    所述终端设备向所述云服务器发送第三请求,所述第三请求用于请求判断所述第二群成员的电话号码是否存在于所述历史通信记录中;
    所述云服务器响应于所述第三请求,判断所述历史通信记录中是否存在所述第二群成员的电话号码,并向所述终端设备发送判断结果;
    所述终端设备基于所述判断结果,确定所述第二群成员的电话号码是否存在于所述历史通信记录中。
  6. 如权利要求3-5任一所述的方法,其特征在于,所述历史通信记录,包括:最近通话记录,和/或,历史短信记录。
  7. 如权利要求1-6任一所述的方法,其特征在于,所述云服务器中存储所述第二群成员的通讯录,所述云服务器响应于所述第一请求,向所述终端设备发送所述第二群成员的第二电话号码,包括:
    响应于所述第一请求,所述云服务器判断所述终端设备的电话号码是否存在于所述第二群成员的通讯录中;
    当所述云服务器确定所述终端设备的电话号码存在于所述第二群成员的通讯录时,向所述终端设备发送所述第二群成员的第二电话号码。
  8. 如权利要求7所述的方法,其特征在于,所述方法还包括:
    当所述云服务器确定所述终端设备的电话号码不存在于所述第二群成员的通讯录时,所述云服务器向所述第二群成员发送第二请求;所述第二请求用于指示所述终端设备请求添加所述第二群成员为联系人;
    当所述云服务器接收到来自所述第二群成员的同意指令时,向所述终端设备发送所述第二群成员的第二电话号码。
  9. 如权利要求1-8任一所述的方法,其特征在于,所述终端设备显示所述即时通信应用中群组的群组成员列表之前,所述方法还包括:
    所述终端设备显示第一入群信息,所述第一入群信息用于指示所述第一群成员被邀请加入群聊;所述第一入群消息中显示的所述第一群成员的信息为所述终端设备的通讯录中对所述第一群成员的备注名;
    所述终端设备显示第二入群信息,所述第二入群信息用于指示所述第二群成员被邀请加入群聊,所述第二入群消息中显示的所述第二群成员的信息为所述第二群成员的用户名。
  10. 如权利要求9所述的方法,其特征在于,
    用于邀请所述第一群成员入群的邀请人为第一邀请人,当所述第一邀请人存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人在所述通讯录中的备注名;当所述第一邀请人不存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人的用户名;
    用于邀请所述第二群成员入群的邀请人为第二邀请人,当所述第二邀请人存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人在所述通讯录中的备注名;当所述第二邀请人不存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人的用户名。
  11. 如权利要求1-10任一所述的方法,其特征在于,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:
    响应于所述第三操作,所述终端设备显示第一界面,所述第一界面中包括验证信息输入框;
    所述终端设备接收到输入操作,所述输入操作用于在所述验证信息输入框中输入验证 信息,所述验证信息用于描述所述终端设备的用户身份信息;
    所述终端设备响应于用于发送所述验证信息的第四操作,向所述服务器发送第一请求,所述第一请求中携带所述验证信息。
  12. 一种群组内群成员隐私保护方法,其特征在于,所述方法包括:
    终端设备显示即时通信应用中群组的群组成员列表,所述群组成员列表中包括第一群成员和第二群成员;
    所述终端设备响应于用于选择所述第一群成员的第一操作,显示所述第一群成员的第一电话号码,所述第一电话号码为所述终端设备的通讯录中保存的所述第一群成员的电话号码;
    所述终端设备响应于用于选择所述第二群成员的第二操作,显示所述第二群成员的头像和/或用户名,以及用于添加联系人的控件;
    所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,所述第一请求用于请求将所述第二群成员添加为联系人;
    所述终端设备从所述云服务器接收第二群成员的第二电话号码;
    所述终端设备基于所述第二电话号码将所述第二群成员保存为联系人。
  13. 如权利要求12所述的方法,其特征在于,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:
    响应于所述第三操作,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中;
    当确定所述历史通信记录中不存在所述第二群成员的电话号码时,所述终端设备向所述云服务器发送所述第一请求。
  14. 如权利要求13所述的方法,其特征在于,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录,包括:
    所述终端设备在历史通话记录中所有号码对应的头像中查找与所述第二群成员的头像相匹配的头像;和/或,所述终端设备在历史通话记录中所有号码对应的用户名中查找与所述第二群成员的用户名相匹配的用户名;
    当未在所述历史通信记录中找到与所述第二群成员的头像相匹配的头像,和/或,未找到与所述第二群成员的用户名相匹配的用户名时,确定所述第二群成员的电话号码不在所述历史通信记录中。
  15. 如权利要求13所述的方法,其特征在于,所述终端设备判断所述第二群成员的电话号码是否存在于所述终端设备的历史通信记录中,包括:
    所述终端设备向所述云服务器发送所述历史通信记录;
    所述终端设备向所述云服务器发送第三请求,所述第三请求用于请求判断所述第二群成员的电话号码是否存在于所述历史通信记录中;
    所述终端设备接收来自所述云服务器的判断结果。
  16. 如权利要求13-15任一所述的方法,其特征在于,所述历史通信记录,包括:最近通话记录,和/或,历史短信记录。
  17. 如权利要求12-16任一所述的方法,其特征在于,所述终端设备显示所述即时通信应用中群组的群组成员列表之前,所述方法还包括:
    所述终端设备显示第一入群信息,所述第一入群信息用于指示所述第一群成员被邀请 加入群聊;所述第一入群消息中显示的所述第一群成员的信息为所述终端设备的通讯录中对所述第一用户的备注名;
    所述终端设备显示第二入群信息,所述第二入群信息用于指示所述第二群成员被邀请加入群聊,所述第二入群消息中显示的所述第二群成员的信息为所述第二群成员的用户名。
  18. 如权利要求17所述的方法,其特征在于,
    用于邀请所述第一群成员入群的邀请人为第一邀请人,当所述第一邀请人存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人在所述通讯录中的备注名;当所述第一邀请人不存在于所述终端设备的通信录时,所述第一入群消息中显示的所述第一邀请人的信息为所述第一邀请人的用户名;
    用于邀请所述第二群成员入群的邀请人为第二邀请人,当所述第二邀请人存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人在所述通讯录中的备注名;当所述第二邀请人不存在于所述终端设备的通信录时,所述第二入群消息中显示的所述第二邀请人的信息为所述第二邀请人的用户名。
  19. 如权利要求12-18任一所述的方法,其特征在于,所述终端设备响应于针对所述添加联系人控件的第三操作,向云服务器发送第一请求,包括:
    响应于所述第三操作,所述终端设备显示第一界面,所述第一界面中包括验证信息输入框;
    所述终端设备接收到输入操作,所述输入操作用于在所述验证信息输入框中输入验证信息,所述验证信息用于描述所述终端设备的用户身份信息;
    所述终端设备响应于用于发送所述验证信息的第四操作,向所述服务器发送第一请求,所述第一请求中携带所述验证信息。
  20. 一种通信系统,其特征在于,包括:终端设备和云服务器;
    所述终端设备包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所述终端设备执行如权利要求1至11任一项所述的方法中终端设备的步骤;
    所述云服务器包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所述云服务器执行如权利要求1至11任一项所述的方法中云服务器的步骤。
  21. 一种终端设备,其特征在于,包括:
    处理器,存储器,以及,一个或多个程序;
    其中,所述一个或多个程序被存储在所述存储器中,所述一个或多个程序包括指令,当所述指令被所述处理器执行时,使得所述终端设备执行如权利要求12至19中任意一项所述的方法步骤。
  22. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至19中任意一项所述的方法。
  23. 一种计算机程序产品,其特征在于,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如上述权利要求1-19中任意一项所述的方法。
  24. 一种电子设备上的图形用户界面,其特征在于,所述电子设备具有显示屏、存储器、以及处理器,所述处理器用于执行存储在所述存储器中的一个或多个计算机程序,所述图 形用户界面包括所述电子设备执行上述权利要求12-19中任意一项所述的方法时显示的图形用户界面。
PCT/CN2021/125531 2020-10-22 2021-10-22 一种群组内群成员隐私保护方法与终端设备 WO2022083721A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US18/249,734 US20230388782A1 (en) 2020-10-22 2021-10-22 Method for protecting privacy of group member in group and terminal device
EP21882135.3A EP4210295A4 (en) 2020-10-22 2021-10-22 METHOD FOR PROTECTING THE PRIVACY OF A GROUP MEMBER IN A GROUP AND TERMINAL DEVICE

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202011142021.9 2020-10-22
CN202011142021 2020-10-22
CN202011565926.7A CN114465967B (zh) 2020-10-22 2020-12-25 一种群组内群成员隐私保护方法、通信系统和计算机可读存储介质
CN202011565926.7 2020-12-25

Publications (1)

Publication Number Publication Date
WO2022083721A1 true WO2022083721A1 (zh) 2022-04-28

Family

ID=81289708

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/125531 WO2022083721A1 (zh) 2020-10-22 2021-10-22 一种群组内群成员隐私保护方法与终端设备

Country Status (4)

Country Link
US (1) US20230388782A1 (zh)
EP (1) EP4210295A4 (zh)
CN (1) CN118368157A (zh)
WO (1) WO2022083721A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120311052A1 (en) * 2011-06-03 2012-12-06 Nhn Corporation Messaging service system and method for expanding member addition operation
CN106789568A (zh) * 2016-12-14 2017-05-31 北京微影时代科技有限公司 一种通讯信息获取方法及装置
CN107147505A (zh) * 2017-04-28 2017-09-08 维沃移动通信有限公司 一种群聊天方法及移动终端
CN107196846A (zh) * 2017-04-28 2017-09-22 维沃移动通信有限公司 一种群聊天方法及移动终端
US20190018848A1 (en) * 2017-07-12 2019-01-17 Facebook, Inc. Techniques for prospective contact ranking of address book entries

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2457006A (en) * 2006-09-18 2009-08-05 Vodafone Plc Device communication without revealing mobile station international ISDN number (MSISDN)
CN105099876A (zh) * 2015-06-26 2015-11-25 阿里巴巴集团控股有限公司 团体用户的资料管理及即时通讯群组的维护方法、装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120311052A1 (en) * 2011-06-03 2012-12-06 Nhn Corporation Messaging service system and method for expanding member addition operation
CN106789568A (zh) * 2016-12-14 2017-05-31 北京微影时代科技有限公司 一种通讯信息获取方法及装置
CN107147505A (zh) * 2017-04-28 2017-09-08 维沃移动通信有限公司 一种群聊天方法及移动终端
CN107196846A (zh) * 2017-04-28 2017-09-22 维沃移动通信有限公司 一种群聊天方法及移动终端
US20190018848A1 (en) * 2017-07-12 2019-01-17 Facebook, Inc. Techniques for prospective contact ranking of address book entries

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4210295A4 *

Also Published As

Publication number Publication date
EP4210295A1 (en) 2023-07-12
CN118368157A (zh) 2024-07-19
EP4210295A4 (en) 2024-03-06
US20230388782A1 (en) 2023-11-30

Similar Documents

Publication Publication Date Title
CN108702602B (zh) 分享图像的方法、电子设备及系统
CN113015263B (zh) 分享图像的方法及电子设备
EP3567887B1 (en) Communication method and device
WO2020224447A1 (zh) 一种在联系人中添加智能家居设备的方法及系统
US9888116B2 (en) Method for processing communication based on user account and electronic device therefor
WO2022037407A1 (zh) 一种回复消息的方法、电子设备和系统
WO2021253975A1 (zh) 应用程序的权限管理方法、装置和电子设备
WO2022111728A1 (zh) 一种获取设备控制权的方法与通信系统
WO2022037480A1 (zh) 任务处理方法及相关电子设备
CN113923611A (zh) 一种呼叫转移系统及相关装置
WO2023179751A9 (zh) 一种物体寻找方法、系统以及电子设备
WO2022083722A1 (zh) 一种不同设备之间的跨应用互联方法及相关装置
CN111130985B (zh) 关联关系建立方法、装置、终端、服务器及存储介质
WO2022083721A1 (zh) 一种群组内群成员隐私保护方法与终端设备
WO2022088867A1 (zh) 一种指纹验证方法、电子设备与服务器
CN114465967B (zh) 一种群组内群成员隐私保护方法、通信系统和计算机可读存储介质
WO2020216144A1 (zh) 一种添加邮件联系人的方法和电子设备
CN114465968A (zh) 一种不同设备之间的跨应用互联方法及相关装置
CN114157630B (zh) 社交关系链的迁移方法、装置、设备及存储介质
CN114513479B (zh) 消息收发方法、装置、终端、服务器及存储介质
CN113691671B (zh) 安全信息的开放方法、系统及电子设备
WO2022222733A1 (zh) 数据传输方法及相关设备
WO2023071733A1 (zh) 一种设备控制方法与相关设备
WO2023020497A1 (zh) 一种设备控制方法与电子设备
CN115515133A (zh) 一种分布式设备的认证方法及电子设备

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2021882135

Country of ref document: EP

Effective date: 20230406

WWE Wipo information: entry into national phase

Ref document number: 18249734

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE