WO2022242376A1 - 消息处理方法、装置、设备、存储介质及程序产品 - Google Patents

消息处理方法、装置、设备、存储介质及程序产品 Download PDF

Info

Publication number
WO2022242376A1
WO2022242376A1 PCT/CN2022/086271 CN2022086271W WO2022242376A1 WO 2022242376 A1 WO2022242376 A1 WO 2022242376A1 CN 2022086271 W CN2022086271 W CN 2022086271W WO 2022242376 A1 WO2022242376 A1 WO 2022242376A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
message
protected content
session message
conversation
Prior art date
Application number
PCT/CN2022/086271
Other languages
English (en)
French (fr)
Inventor
王丽云
韩瑞
郑任君
李婷婷
王劲扬
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to US17/991,455 priority Critical patent/US20230088720A1/en
Publication of WO2022242376A1 publication Critical patent/WO2022242376A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/063Content adaptation, e.g. replacement of unsuitable content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services

Definitions

  • the embodiment of the present application is based on the Chinese patent application with the application number 202110546504.3 and the filing date of May 19, 2021, and claims the priority of the Chinese patent application.
  • the entire content of the Chinese patent application is hereby incorporated into the embodiment of the present application as refer to.
  • the present application relates to the field of computer technology, and in particular to a message processing method, device, equipment, computer-readable storage medium, and computer program product.
  • a social application usually provides users with an instant messaging service based on the Internet, allowing two or more people to instantly transmit text messages, files, voice and video communications through the network.
  • social applications have penetrated into people's lives, and more and more people use social applications to communicate.
  • Embodiments of the present application provide a message processing method, device, device, computer-readable storage medium, and computer program product, which can prevent protected content from being propagated and leaked, and improve the security of the protected content.
  • This embodiment of the application provides a message processing method, including:
  • a target operation instruction indicating to perform a target operation on the target conversation message is received, and the goal operation is used to share the target conversation message;
  • the content is protected.
  • This embodiment of the application provides a message processing method, including:
  • the protected content when the receiving end triggers a target operation instruction instructing to perform a target operation on the protected content, the protected content is protected in an execution result of the protected content.
  • An embodiment of the present application provides a message processing device, including:
  • a display module configured to present a session interface including at least one session message
  • the receiving module is configured to receive, in the session interface, a target operation instruction indicating to perform a target operation on the target session message, and the target operation is used to share the target session message;
  • a processing module configured to execute the target operation on the target session message in response to the target operation instruction, and when the target session message contains protected content, in the execution result of the target session message Perform protection processing on the protected content.
  • An embodiment of the present application provides a message processing device, including:
  • the first sending module is configured to set the content of the target conversation message as protected content in response to a sending instruction for the target conversation message in the conversation interface when the privacy protection control is turned on, and send the Describe the target session message;
  • the second sending module is configured to send the target conversation message in response to a sending instruction for the target conversation message in the conversation interface when the privacy protection control is in the closed state, and present the goal in the conversation interface session message, and when receiving a protection setting instruction for the target session message, set the content of the target session message as protected content;
  • the protected content when the receiving end triggers a target operation instruction instructing to perform a target operation on the protected content, the protected content is protected in an execution result of the protected content.
  • An embodiment of the present application provides a computer device, including:
  • the processor is configured to implement the message processing method provided in the embodiment of the present application when executing the executable instruction stored in the memory.
  • the embodiment of the present application provides a computer-readable storage medium, which stores executable instructions for causing a processor to execute the message processing method provided in the embodiment of the present application.
  • An embodiment of the present application provides a computer program product, including a computer program or an instruction.
  • the computer program or instruction is executed by a processor, the message processing method provided in the embodiment of the present application is implemented.
  • FIG. 1 is a schematic structural diagram of a message processing system 100 provided by an embodiment of the present application.
  • FIG. 2 is a schematic structural diagram of a computer device 500 provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a message processing method provided in an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a forwarding process of a target session message provided by an embodiment of the present application
  • Fig. 5 is a schematic diagram of the screenshot process provided by the embodiment of the present application.
  • FIG. 6 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of a sharing process of a session message provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a session message sharing process provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a session message sharing process provided by an embodiment of the present application.
  • FIG. 11 is a schematic diagram of a sharing process of a session message provided by an embodiment of the present application.
  • Fig. 12 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • Fig. 13 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • Fig. 14 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • Fig. 15 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • Fig. 16 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • Fig. 17 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • Fig. 18 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • FIG. 19 is a schematic flowchart of a message processing method provided by an embodiment of the present application.
  • FIG. 20 is a schematic flowchart of a message processing method provided by an embodiment of the present application.
  • Fig. 21 is a schematic flowchart of a message processing method provided by an embodiment of the present application.
  • Fig. 22 is a schematic flowchart of a message processing method provided by an embodiment of the present application.
  • first ⁇ second is only used to distinguish similar objects, and does not represent a specific ordering of objects. Understandably, “first ⁇ second" is allowed The specific order or sequencing may be interchanged such that the embodiments of the application described herein can be practiced in sequences other than those illustrated or described herein.
  • Client the application program running in the terminal to provide various services, such as social client, instant messaging client, learning client, game client, etc.
  • FIG. 1 is a schematic diagram of the architecture of a message processing system 100 provided by an embodiment of the present application.
  • a terminal (including a terminal 400-1 and a terminal 400-2) is connected to a server 200 through a network 300, and the network 300 may be a wide area network or a local area network, or a combination of both.
  • the terminal may be provided with a social client, such as an instant messaging client, and the user of the terminal 400-1 and the user of the terminal 400-2 may send conversation messages through the social client for communication.
  • a social client such as an instant messaging client
  • Terminal 400-1 configured to send at least one session message through the session interface, and present the sent session message on the session interface; wherein, at least one session message contains protected content;
  • the server 200 is configured to receive at least one session message, and send at least one session message to the terminal 400-2.
  • Terminal 400-2 configured to present a conversation interface including at least one conversation message; in the conversation interface, receiving a target operation instruction indicating to perform a target operation on the target conversation message, wherein the target operation is used to share the target conversation message; responding The target operation instruction executes the target operation on the target session message, and when the target session message contains the protected content, protects the protected content in the execution result of the target session message.
  • the server 200 can be an independent physical server, or a server cluster or a distributed system composed of multiple physical servers, and can also provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, Cloud servers for basic cloud computing services such as network services, cloud communications, middleware services, domain name services, security services, content delivery network (CDN, Content Delivery Network), and big data and artificial intelligence platforms.
  • the terminal may be a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, etc., but is not limited thereto.
  • FIG. 2 is a schematic structural diagram of a computer device 500 provided in an embodiment of the present application.
  • the computer device 500 may be a terminal (such as terminal 400-1, terminal 400-2) or a server 200 in FIG. 1 , taking the computer device as the terminal shown in FIG. 1 as an example, the computer device implementing the expression processing method according to the embodiment of the present application will be described.
  • the computer device 500 shown in FIG. 2 includes: at least one processor 510 , a memory 550 , at least one network interface 520 and a user interface 530 .
  • Various components in computer device 500 are coupled together through bus system 540 .
  • the bus system 540 is used to realize connection and communication between these components.
  • the bus system 540 also includes a power bus, a control bus and a status signal bus.
  • the various buses are labeled as bus system 540 in FIG. 2 .
  • Processor 510 can be a kind of integrated circuit chip, has signal processing capability, such as general-purpose processor, digital signal processor (DSP, Digital Signal Processor), or other programmable logic device, discrete gate or transistor logic device, discrete hardware Components, etc., wherein the general-purpose processor can be a microprocessor or any conventional processor, etc.
  • DSP digital signal processor
  • DSP Digital Signal Processor
  • User interface 530 includes one or more output devices 531 that enable presentation of media content, including one or more speakers and/or one or more visual displays.
  • the user interface 530 also includes one or more input devices 532, including user interface components that facilitate user input, such as a keyboard, mouse, microphone, touch screen display, camera, other input buttons and controls.
  • Memory 550 may be removable, non-removable or a combination thereof.
  • Exemplary hardware devices include solid state memory, hard drives, optical drives, and the like.
  • Memory 550 optionally includes one or more storage devices located physically remote from processor 510 .
  • Memory 550 includes volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory.
  • the non-volatile memory can be a read-only memory (ROM, Read Only Memory), and the volatile memory can be a random access memory (RAM, Random Access Memory).
  • ROM read-only memory
  • RAM random access memory
  • the memory 550 described in the embodiment of the present application is intended to include any suitable type of memory.
  • the message processing device provided by the embodiment of the present application can be realized by software.
  • FIG. 2 shows the message processing device 555 stored in the memory 550, which can be software in the form of programs and plug-ins, including the following Software modules: display module 5551, receiving module 5552, and processing module 5553. These modules are logical, so they can be combined or further divided in any way according to the realized functions. The function of each module will be explained below.
  • the message processing device provided in the embodiment of the present application may be implemented in hardware.
  • the message processing device provided in the embodiment of the present application may be a processor in the form of a hardware decoding processor, which is programmed To execute the message processing method provided by the embodiment of the present application, for example, the processor in the form of a hardware decoding processor can adopt one or more Application Specific Integrated Circuits (ASIC, Application Specific Integrated Circuit), DSP, Programmable Logic Device (PLD) , Programmable Logic Device), Complex Programmable Logic Device (CPLD, Complex Programmable Logic Device), Field Programmable Gate Array (FPGA, Field-Programmable Gate Array) or other electronic components.
  • ASIC Application Specific Integrated Circuit
  • DSP Digital Signal Processing
  • PLD Programmable Logic Device
  • CPLD Complex Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • FIG. 3 is a schematic flowchart of a message processing method provided in an embodiment of the present application, which will be described in conjunction with the steps shown in FIG. 3 .
  • Step 301 The terminal presents a conversation interface including at least one conversation message.
  • the terminal is provided with a client, such as an instant messaging client, a social client, a learning client, a game client, etc., and a session interface is presented through the client, and users can communicate with other users through the session interface.
  • a client such as an instant messaging client, a social client, a learning client, a game client, etc.
  • a session interface is presented through the client, and users can communicate with other users through the session interface.
  • the user may send or receive conversational messages, and the sent conversational messages or received conversational messages may be presented in the conversational interface.
  • Step 302 In the conversation interface, a target operation instruction is received.
  • the target operation instruction is used to instruct to perform a target operation on the target session message, and the target operation is used to share the target session message, for example, the target operation can be a forwarding operation, which is directly used to share the target session message by forwarding; or, the target The operation may include a screenshot operation and a sharing operation. After the execution result (ie, the screenshot result) is obtained through the screenshot operation, the execution result (ie, the screenshot result) is shared through the sharing operation. That is, the target operation is used to directly or indirectly share the target conversation message.
  • the number of target conversation messages can be one or more (two or more), and the user can select part or all of the conversation messages as the target conversation messages according to the presented conversation messages, so as to trigger the Target action instruction for session messages.
  • Step 303 In response to the target operation instruction, execute the target operation on the target session message, and when the target session message contains protected content, perform protection processing on the protected content in the execution result of the target session message.
  • the protected content may be a certain target session message, or part of content in a target session message.
  • protecting the protected content can be to shield the protected content, making the protected content in an unbrowsable state; it can also control the protected content to be in an inoperable state, such as controlling the protected content to be in a non-forwarding state, or Controls that protected content is not copyable.
  • the terminal may perform the target operation in the following manner: when the target operation is a forwarding operation, in response to the target operation instruction, forward the target session message to the target object indicated by the forwarding operation instruction; correspondingly, the terminal may pass When the target session message contains protected content, the protected content is protected in the execution result of the target session message: When the target session message contains protected content, the session with the target object The target session message is presented in the interface, and the protected content in the target session message is protected.
  • the target operation can be a forwarding operation.
  • the user can first select the target session message that needs to be forwarded, and the terminal presents the forwarding function item for the target session message in response to the user's selection operation.
  • the terminal can present one or more (two or more) user objects for the user to select, and the user performs the selection operation for the target object among the multiple user objects, and triggers the forwarding operation instruction for the target session message , to indicate to forward the target session message to the target object; or, after receiving the trigger operation for the forwarding function item, the terminal can directly trigger the forwarding operation instruction for the target session message, where the target object can be preset, such as User object selected by default.
  • the terminal can forward the target session message to the target object indicated by the forwarding operation instruction in the following manner: sending a forwarding instruction for the target session message to the server, wherein the forwarding The instruction carries the object information of the target object, the target session message, and the tag information of the protected content; the server parses the forwarding instruction, obtains the target object, the target session message, and the tag information of the protected content carried in the forwarding instruction, and according to The tag information protects the protected content, and sends the protected target session message to the terminal on the target side; when the terminal on the target side presents the target session message, it will protect the protected content in the target session message In this way, the target object cannot obtain the protected content in the target session message, which can prevent the protected content from being propagated and leaked, and improve the security of the protected content.
  • the terminal may automatically present a session interface for conducting a session with the target object, or the terminal may After the presentation instruction of the session interface of the session, the session interface for the session with the target object is presented, and the target session message is presented in the session interface.
  • the target session message contains protected content
  • the protected content is included in the target session message Carry out protective treatment.
  • the terminal presents the target conversation message in the conversation interface with the target object, and protects the protected content in the target conversation message; when the terminal on the target side presents the target conversation message in the corresponding conversation interface,
  • the protected content in the target session message will also be protected, that is, the target session message presented by the terminal on the target side in the corresponding session interface is a session message in which the protected content is protected.
  • FIG. 4 is a schematic diagram of the forwarding process of the target conversation message provided by the embodiment of the present application.
  • a conversation interface including multiple conversation messages is presented, in which , receiving a long-press operation for the target session message 401, a toolbar corresponding to the target session message 401 is presented, and the toolbar includes a forward button 402, wherein the target session message 401 is protected content; when receiving the target session message 401
  • the terminal may perform the target operation in the following manner: when the target operation is a screenshot operation, in response to the target operation instruction, perform screenshot processing on the area containing the target conversation message to obtain a screenshot image containing the target conversation message; Yes, when the target session message contains protected content, hide the protected content in the execution result of the target session message: When the target session message contains protected content, hide the protected content in the screenshot image The content is protected and processed, and the processed screenshot image is displayed.
  • the target operation instruction is a screenshot operation instruction.
  • the screenshot operation command can be a screenshot command triggered by a shortcut.
  • the user can trigger a screenshot operation command by swiping with three fingers on the screen of the mobile phone, or trigger a shortcut key to trigger a screenshot operation command.
  • the screenshot corresponding to the screenshot operation command The area is the entire screen area of the mobile phone; it can also be a screenshot operation command triggered by a screenshot icon.
  • the screenshot operation command can select the screenshot area, such as presenting a screenshot icon on a computer terminal.
  • a trigger operation for the screenshot icon When a trigger operation for the screenshot icon is received, enter the screenshot state, and present the area selection focus, the user triggers the area selection operation based on the area selection focus, and the terminal presents a screenshot box corresponding to the area selection operation, which is used to indicate the selected screenshot area.
  • the selected screenshot area is subjected to screenshot processing to obtain a screenshot image.
  • the terminal obtains the screenshot area corresponding to the screenshot operation, uses the conversation message in the screenshot area as the target conversation message, and detects whether the target conversation message contains protected content. If the detection result indicates that the target conversation message includes protected content, the protected content in the target conversation message will be protected in the screenshot image, that is, the protected content in the target conversation message will not be displayed; if the detection result indicates that the target conversation message does not contain protected content, it will display All content of the target session message.
  • FIG. 5 is a schematic diagram of the screenshot process provided by the embodiment of the present application.
  • the terminal presents a session interface containing multiple session messages, wherein the session interface contains protected content 501, and when receiving an instruction to screenshot ( screenshot operation), present a screenshot image containing the protected content 501, and perform protection processing on the protected content 502 in the screenshot image, such as blocking the protected content.
  • the terminal may first hide the protected content in the session interface, and then perform the screenshot operation, so that the protected content in the screenshot image obtained through screenshot processing is itself hidden. Understand.
  • FIG. 6 is a schematic diagram of the conversation interface provided by the embodiment of the present application.
  • the terminal receives a click operation on the screenshot button 601, it enters the screenshot state, and in the screenshot state, the protected content 602 in the conversation interface is processed.
  • Concealment processing when the terminal receives an area selection operation, the session message in the screenshot area corresponding to the area selection operation is used as the target session message, wherein the screenshot area contains the hidden protected content 602; when receiving When the screenshot operation is determined, screenshot processing is performed on the selected screenshot area to obtain a screenshot image containing the hidden protected content 602, where the protected content 602 in the screenshot image is hidden.
  • the terminal may perform the target operation in the following manner: when the target operation is a selection operation for the target conversation message, in response to the target operation instruction, mark the target conversation message in the conversation interface; correspondingly, the terminal When the target session message contains protected content, hide the protected content in the execution result of the target session message: When the target session message contains protected content, in the session interface, mark the target Protected content in session messages is protected.
  • the target operation is a selection operation for the target session message
  • the selected target session message is marked to indicate that the target session message has been selected. It needs to be explained that the selected target session message is indicated by the selection operation It can be one or more (two or more); here, the terminal detects the selected target session message, and judges whether the target session message contains protected content according to the detection result, if the detection result indicates that the target session message contains Protected content, then protect the protected content in the target session message, such as controlling the protected content to be in a non-browsable state, controlling the protected content to be in a non-forwarding state, etc.; otherwise, if the detection result indicates that the target session message does not contain protected content, no processing is performed.
  • FIG. 7 is a schematic diagram of a conversation interface provided by the embodiment of the present application.
  • the selected target conversation message is marked with a mark 701, and the protected content in the target conversation message is blocked, such as the target conversation message 702 If the content is protected, the target conversational message 702 is blocked, so that the target conversational message 702 is in an unbrowsable state.
  • a forwarding message for the target session message may be triggered.
  • at least two target session messages may be selected, at least two target session messages may be combined into one
  • the conversation messages are merged, and the merged conversation messages obtained through the merger are forwarded, or at least two target conversation messages may be forwarded one by one.
  • the terminal protects the protected content in the marked target session message
  • the number of target session messages is at least two
  • the terminal when multiple (that is, at least two) target session messages are combined into one combined session message for forwarding, the terminal responds to the combined sending instruction and sends multiple target session messages according to the sending time of each target session message Combining is performed to display each target conversation message in the combined conversation message according to the sending time of each target conversation message.
  • the terminal After receiving the combined session message, the terminal sends a sending instruction for the combined session message to the server, wherein the sending instruction carries the combined session message and the tag information of the protected content; the server parses the sending instruction to determine the receiver of the combined session message , hide the tag information in the combined session message and send it to the receiver; the receiver's terminal presents a corresponding session interface, and presents the combined session message after the protected content is protected on the session interface.
  • the terminal displays the merged conversation message in the conversation interface with the receiver, and protects the protected content in the merged conversation message.
  • FIG. 8 is a schematic diagram of the sharing process of conversation messages provided by the embodiment of the present application.
  • the terminal displays multiple user objects in response to the combined sending instruction, and the user can select one of the multiple user objects as the recipient of the target conversation message, and send multiple
  • the target conversation message is merged into a conversation message (combined conversation message) and sent to the terminal of the selected recipient, and in the conversation interface with the recipient, the merge conversation message 802 is displayed, wherein each of the merge conversation messages
  • the protected content contained in the target session message is blocked, that is, the protected content contained in each target session message in the merged session message is in an unbrowsable state.
  • FIG. 9 is a schematic diagram of the sharing process of conversational messages provided by the embodiment of the present application.
  • a selection operation for multiple target conversational messages is received, and the selected multiple target conversational messages are marked, and the forwarding button 901 is displayed one by one.
  • Merge Forward button 902. When receiving the click operation for merging and forwarding button 902, multiple user objects are displayed, and the user can select one of the multiple user objects as the recipient of the target conversation message, and send a merge conversation message containing multiple target conversation messages to all Select the recipient's terminal, and display the merged conversation message 903 in which the protected content has been protected in the conversation interface with the recipient.
  • each target session message in response to the one-by-one sending instructions for each target session message, send Each target session message: in the session interface corresponding to the one-by-one sending instruction, each target session message is displayed one by one, and the corresponding protected content is protected in each target session message.
  • each target session message when each target session message is sent one by one, when the target session message is presented in the session interface corresponding to the one-by-one sending instruction, each target session message corresponds to a message box, and for each target session message, when the target session message When the message contains protected content, the protected content contained in the target session message is protected.
  • Fig. 10 is a schematic diagram of the sharing process of the session message provided by the embodiment of the present application.
  • the selection operation for multiple target session messages is received in the session interface, and the selected multiple target session messages are marked;
  • the click operation of button 1001 displays multiple user objects, and the user can select one of the multiple user objects as the recipient of the target conversation message, send each target conversation message to the terminal of the selected recipient one by one, and communicate with the recipient
  • each session message that has protected the protected content is displayed. For example, the protected content contained in the target session message is blocked and is in an unbrowsable state.
  • Fig. 11 is a schematic diagram of the sharing process of conversational messages provided by the embodiment of the present application.
  • the selection operation for multiple target conversational messages is received in the conversational interface, the selected multi-target conversational messages are marked, and the forwarding buttons are displayed one by one 1101 and Merge Forward button 1102.
  • the terminal receives a click operation on the share button 1101
  • multiple user objects are displayed, and the user can select one of the multiple user objects as the recipient of the target conversation message, and send each target conversation message to the terminal of the selected recipient one by one , and in the session interface of the session with the recipient, each target session message 1103 that has protected the protected content is displayed, for example, the protected content contained in the target session message 1103 is blocked and cannot be browsed.
  • the terminal after the terminal protects the protected content in the execution result of the target session message, it may also present prompt information in response to the forwarding operation on the execution result; wherein, the prompt information is used to indicate that the protected content cannot be protected. Protect content for redistribution.
  • the protection process when the protection process is to control the protected content to be in a non-forwarding state, even if the forwarding operation for the execution result is received, the forwarding operation will not be performed, but a prompt message will be presented to inform the user that the protected content cannot be forwarded.
  • the content is forwarded, for example, the prompt message "xxxx cannot be forwarded" is displayed.
  • the terminal may also display the protection identifier of the corresponding conversation message in the associated area of the conversation message containing the protected content in the conversation interface, where the protection logo is used to indicate that the conversation message contains protected content; correspondingly, The terminal can hide the protected content in the execution result of the target session message when the target session message contains protected content in the following manner: when the associated area of the target session message displays a protection logo corresponding to the target session message, The target session message is protected and processed in the execution result of the target session message.
  • the protection identifier may be used to indicate that the conversation message contains protected content, so as to prompt the user not to share the conversation message with other user objects.
  • the terminal can identify the session message containing the protected content according to the protection identifier, that is, if the protection identifier corresponding to the target session message is displayed in the associated area of the target session message, it means that the target session message contains protected content. content, then the target session message needs to be protected in the execution result.
  • FIG. 12 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • a protection mark is displayed next to a conversation message 1201 to indicate that the conversation message contains protected content.
  • a target operation instruction for the conversation message 1201 is received, such as a forwarding operation instruction, the conversation message 1201 is protected and then forwarded.
  • the terminal can hide the protected content in the execution result of the target session message when the target session message contains the protected content in the following manner: when the target session message contains the protected content, when the target session message contains the protected content, In the execution result of the target session message, a static or dynamic target image is added at the location of the protected content, so that the target image is overlaid on the protected content.
  • the protected content can be blocked by overlaying a target image where the protected content is located.
  • the target image here can be static, such as mosaics, fun textures; it can also be dynamic, such as burning special effects image.
  • a static or dynamic target image can also be added at the location of the target session message, so that the target image covers the target On the session message, in this way, the protected content contained in the target session message can be protected by blocking the entire target session message.
  • FIG. 13 is a schematic diagram of a session interface provided by an embodiment of the present application.
  • a cartoon texture is presented at the location of the protected content contained in the target session message, to obscure the protected content in the target session message.
  • the terminal can hide the protected content in the execution result of the target session message when the target session message contains the protected content in the following manner: when the target session message contains the protected content, the target The protected content in the execution result of the session message is obfuscated so that the protected content is blocked.
  • the protected content is in a shielded state, which means that the protected content is in an unbrowsable state, that is, the protected content is hidden, and the user cannot browse the protected content.
  • the terminal can make the protected content shielded by means of blurring, such as Gaussian blurring, which is also called Gaussian smoothing, and its visual effect is like
  • Gaussian blur processing can be realized by convolving the image with the normal distribution.
  • the blur processing range is positioned within the information carrier frame, for example, the Gaussian blur setting value is 18.
  • the terminal can implement protection processing on the protected content in the execution result of the target session message when the target session message contains the protected content in the following manner: when the target session message contains the protected content , which removes the protected content from the execution results for the target session message.
  • the terminal may directly delete the protected content from the target session message, so as to perform protection processing on the protected content.
  • the target operation is a selection operation for selecting multiple target session messages
  • some target session messages in the multiple target session messages corresponding to the selection operation contain protected content, and some target session messages do not contain protected content
  • some of the target session messages containing protected content can be deleted from the selection results, that is, the selection of some target session messages containing protected content can be canceled.
  • Target session messages containing protected content will not be sent, for example, among the selected target session message 1, target session message 2, and target session message 3, target session message 1 contains protected content, while target session message 2 and target session message 3 does not contain protected content, the target session message 1 is directly deleted from the selection result, and when the subsequent sending operation for the selected target session message is executed, only target session message 2 and target session message 3 are sent instead of A target session message 1 with protected content is sent.
  • the terminal before the terminal receives the target operation instruction indicating to perform the target operation on the target conversation message, when the target conversation message is a voice message, it may respond to the text viewing instruction for the voice message, and display the text corresponding to the voice message.
  • Text content the terminal can perform the target operation on the target session message in response to the target operation instruction in the following manner: when the target operation is a screenshot operation, in response to the target operation instruction, perform screenshot processing on the area containing the text content, and obtain a screenshot containing the text content
  • the screenshot image of the target conversation message the terminal can hide the protected content in the execution result of the target conversation message when the target conversation message contains the protected content in the following way: when the voice message contains the protected content, in the screenshot image The text content is protected.
  • the terminal provides the function of converting the voice message into the corresponding text content, and the user can view the text content corresponding to the voice message by triggering the text viewing command for the voice message; after displaying the text content, the user can pass Screenshot operation, obtain the screenshot image containing the text content, and share the text content with other user objects by sharing the screenshot image, in order to prevent the voice message from being leaked in the form of text content; the application obtains the screenshot containing the text content After saving the image, the text content will be protected, and then the protected screenshot image will be shared with other user objects.
  • the terminal may also receive a conversation message containing protected content, and present the received conversation message, wherein, the protected content in the conversation message has been protected; in response to a viewing operation on the protected content, send View the request to the original sender of the session message; when the original sender triggers the consent view instruction, obtain the unprotected protected content sent by the original sender, and display the unprotected protected content.
  • the original sender of the session message refers to the sender that first sends the session message, rather than the forwarder of the session message.
  • the user cannot know the protected content.
  • the user can trigger the viewing operation for the protected content, as in
  • the terminal may present a view icon in the associated area of the protected content, so as to receive a view operation through the view icon; after receiving the view operation, the terminal sends a view request carrying the user ID of the current user to the server, and the server sends the view request to the server. View request sent to the original sender of this protected content.
  • the original sender presents the received view request, and determines whether to trigger the consent to view instruction based on the view request.
  • the original sender can resend the unprotected protected content to the server, and the server Send the unprotected protected content to the current terminal, and the current terminal will display the unprotected protected content in the session interface;
  • the server can send a prompt message to the current terminal , to alert the user that the protected content is not viewable.
  • Fig. 14 is a schematic diagram of the conversation interface provided by the embodiment of the present application.
  • a conversation message 1401 containing protected content after protection processing is presented in the conversation interface, and a view button is displayed next to the conversation message 1401 1402:
  • the terminal When receiving a click operation on the view button 1402, the terminal sends a view request to the original sender of the session message; when the original sender triggers an instruction to approve the view, display the protected content in the area associated with the session message 1403.
  • the terminal may present a privacy protection control in the conversation interface; in response to a trigger operation for the privacy protection control, present a message input control corresponding to the privacy protection mode; receive an input based on the message input control of the corresponding privacy protection mode Protected content; in response to a sending instruction for the protected content, sending the protected content, and displaying the protected content in the session interface; wherein, the protected content is used to trigger an instruction at the receiving end to perform a target operation on the protected content When the target operates an instruction, the protected content is hidden in the execution result of the protected content.
  • the user can trigger the privacy protection control first, and the terminal responds to the trigger operation to control the message input mode to the privacy protection mode.
  • the content input through the message is protected content, which needs to be explained Yes, the content entered here can be images, text, voice, etc.
  • the recipient of the protected content triggers an instruction to execute the target operation target operation instruction on the protected content through the corresponding receiving end , the protected content needs to be protected in the execution result of the protected content.
  • FIG. 15 is a schematic diagram of a conversation interface provided by the embodiment of the present application.
  • a privacy protection control 1501 is displayed in the conversation interface.
  • the control message input mode enters privacy protection mode, in this privacy protection mode, the input conversation message is the protected content; when receiving the sending instruction for the input protected content, send the protected content to the recipient’s terminal, and in the conversation interface with the recipient
  • the protected content 1502 is displayed, and a protection identification 1503 will be displayed next to the session message (i.e., the protected content 1502), and the identification information is used to indicate that the corresponding session message is a protected content;
  • the session message that is, the protected content 1502
  • the session message that is, the protected content 1502
  • the session message that is, the protected content 1502
  • the recipient's terminal receives a target operation instruction for performing a target operation (such as a forwarding operation) (such as a forwarding instruction), when the protected content is forwarded, the protected content needs to be protected, that is,
  • the terminal may receive a protection setting instruction for at least one session message in the session interface; in response to the protection setting instruction, set at least one session message as protected content, and set the instruction triggered at the receiving end to When the protected content executes the target operation instruction, the protected content is protected in the execution result of the protected content.
  • the terminal may also set the session message as protected content after sending the session message.
  • FIG. 16 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • multiple conversation messages are displayed in the conversation interface, including received conversation messages and sent conversation messages.
  • sent conversation messages such as Conversation message 1601
  • a toolbar corresponding to the conversation message 1601 is presented, including a privacy protection button 1602 in the toolbar; when receiving a click operation for the privacy protection button, the terminal will
  • the conversation message 1601 is set as protected content, and a protection mark 1603 is displayed beside the conversation message to indicate that the conversation message is protected content.
  • FIG. 17 is a schematic diagram of a conversation interface provided by an embodiment of the present application.
  • multiple conversation messages are displayed in the conversation interface, including received conversation messages and sent conversation messages.
  • sent conversation messages such as Conversational message 1701
  • a toolbar corresponding to the conversational message 1701 will be presented, including a privacy protection button 1702 in the toolbar;
  • the click operation of the button sets the conversation message 1701 as protected content, and displays a protection mark 1703 beside the conversation message to indicate that the conversation message is the protected content 1703 .
  • the terminal may also receive a protection setting instruction for part of the content in the conversation message in the conversation interface; in response to the protection setting instruction, use the part of the content indicated by the protection setting instruction in the conversation message as the protected content,
  • the target operation target operation instruction is executed on the session message with the instruction triggered at the receiving end, the protected content is protected in the execution result of the session message.
  • the terminal can not only use the entire conversation message as the protected content, but also use part of the content in a conversation message as the protected content.
  • the user may select a part of content to be protected from a conversation message, and then trigger a protection setting instruction for this part of content, so as to make this part of content the protected content.
  • the selection operation for some content can be triggered by a sliding operation, such as obtaining the starting position of the sliding operation and the ending position of the sliding operation, and setting the partial content between the starting position and the ending position in the conversation message as Protected content; or, it can be triggered by a click operation, such as obtaining the first click position corresponding to the first click operation and the second click position corresponding to the second click operation, which will be located at the first click position and the second click position The part between is set as protected content.
  • a sliding operation such as obtaining the starting position of the sliding operation and the ending position of the sliding operation, and setting the partial content between the starting position and the ending position in the conversation message as Protected content
  • a click operation such as obtaining the first click position corresponding to the first click operation and the second click position corresponding to the second click operation, which will be located at the first click position and the second click position
  • the part between is set as protected content.
  • FIG. 18 is a schematic diagram of a session interface provided by the embodiment of the present application.
  • the content in the shaded part 1801 in the session message is protected content.
  • a forwarded session message containing the protected content is received
  • the conversation message 1802 that has been protected for the protected content is displayed on the conversation interface of the conversation with the receiver of the conversation message.
  • the terminal after the terminal hides the protected content in the execution result of the target session message, it can send sharing prompt information to the sender of the target session message; wherein, the sharing prompt information is used to prompt After the protected content is protected, the target session message is shared.
  • the protected content is hidden in the execution result of the target session message, and a sharing reminder message can be automatically sent to the sender of the target session message to inform the user of the sender that the target session message has been shared, and The protected content in the target session message has been protected.
  • the sender may be the original sender of the target session message, or may be the forwarder who forwards the target session message.
  • Fig. 19 is a schematic flowchart of the message processing method provided by the embodiment of the present application.
  • the message processing method provided by the embodiment of the present application includes:
  • Step 1901 The terminal presents a privacy protection control in the session interface.
  • the terminal is provided with a client, such as an instant messaging client, a social client, a learning client, a game client, etc., and a conversational interface is presented through the client, and users can communicate with other users through the conversational interface.
  • the privacy protection control is presented in the session interface.
  • the privacy protection control is used to control the opening and closing of the privacy protection mode. When the privacy protection control is on, enter the privacy protection mode; when the privacy protection control is off, exit the privacy protection mode. protected mode.
  • Step 1902 When the privacy protection control is turned on, in response to the instruction for sending the target session message in the session interface, set the content of the target session message as protected content, and send the target session message.
  • the protected content when the receiving end triggers a target operation instruction instructing to execute the target operation on the protected content, the protected content is protected in the execution result of the protected content.
  • the message input mode is in the privacy protection mode.
  • the session messages input through the message input control are all protected content.
  • the terminal responds to the sending instruction, sets the target session message as protected content, and sends the target session message.
  • the target session message is sent, in order to avoid the leakage of the protected content, after the target session message is shared with other user objects, if the recipient of the target session message triggers an instruction to execute the target session message through the corresponding receiving end Operate the target operation instruction, and perform protection processing on the target session message (that is, the protected content) in the execution result of the target session message.
  • Step 1903 When the privacy protection control is turned off, in response to the instruction for sending the target session message in the session interface, send the target session message, present the target session message in the session interface, and receive the protection settings for the target session message directive, sets the content of the target session message to protected content.
  • the message input mode is in the normal mode.
  • the target session message sent is a normal session message, that is, the target session message can be shared normally.
  • users can set them as protected content by triggering the protection setting instruction.
  • the target conversation message is a conversation message 1601
  • a toolbar corresponding to the conversation message 1601 is presented, and a privacy protection button 1602 is included in the toolbar;
  • the privacy protection button is clicked, the conversation message 1601 is set as protected content, and a protection mark 1603 is displayed beside the conversation message to indicate that the conversation message is protected content.
  • Fig. 20 is a schematic flowchart of the message processing method provided by the embodiment of the present application.
  • the message method provided by the embodiment of the present application is implemented cooperatively by the first terminal, the second terminal and the third terminal.
  • the message provided by the embodiment of the present application Treatment methods include:
  • Step 2001 the first terminal presents a first conversation interface, and presents a privacy protection control in the first conversation interface.
  • the first session interface is a session interface where the user object of the first terminal conducts a session with the user object of the second terminal.
  • Step 2002 The first terminal presents a message input control corresponding to the privacy protection mode in response to a trigger operation on the privacy protection control.
  • Step 2003 the first terminal receives the protected content input based on the message input control corresponding to the privacy protection mode.
  • Step 2004 the first terminal sends the protected content in response to the instruction for sending the protected content, and displays the protected content in the conversation interface.
  • Step 2005 the second terminal displays the protected content and other conversation messages in the second conversation interface.
  • the second session interface here is a session interface where the user object of the second terminal conducts a session with the user object of the first terminal.
  • Step 2006 The second terminal marks the target conversation message and obfuscates the protected content in response to the selection operation instruction for multiple target conversation messages.
  • Step 2007 The second terminal sends each target session message to the third terminal one by one in response to the one-by-one forwarding instruction for multiple target session messages.
  • Step 2008 the second terminal displays each target conversation message one by one on the third conversation interface, and performs obfuscation processing on the protected content in the target conversation message.
  • the third session interface where the user object of the second terminal is a session interface for conducting a session with the user object of the third terminal.
  • Step 2009 the third terminal displays each target conversation message one by one on the fourth conversation interface, and obfuscates the protected content in the target conversation message.
  • the fourth session interface here is a session interface where the user object of the third terminal conducts a session with the user object of the second terminal.
  • the protected content when sharing the target conversation message containing the protected content, the protected content is protected, which can prevent the protected content from being propagated and leaked, and improve the security of the protected content.
  • the message sender can set the sent message, such as setting it as protected content; when the message receiver shares the protected content with other user objects through screenshots, editing, or direct forwarding, etc. , the protected content will be protected, such as obfuscated, to prevent the protected content from being shared with other objects.
  • the message publisher can select the "privacy protection" mode when publishing a message (including text message, voice-to-text message, and picture message), edit and send the message; or, the message publisher publishes information (including text message, voice-to-text message) Text message, picture message), edit the sent information to prevent the message from being leaked by screenshots.
  • a privacy protection control 1501 is displayed in the conversation interface.
  • the privacy protection mode is entered, and the input conversation message is protected content;
  • Send the protected content instruction send the protected content, display the protected content 1502 in the session interface, and display an identification information 1503 next to the session message, and the identification information is used to indicate that the corresponding session message is protected content.
  • multiple conversation messages are displayed in the conversation interface, including received conversation messages and sent conversation messages.
  • sent conversation messages such as conversation message 1601
  • a toolbar corresponding to the conversation message 1601 is presented, including a privacy protection button 1602 in the toolbar; when a click operation for the privacy protection button is received, the conversation message 1601 is set as protected content, and next to the conversation message A protection mark 1603 is displayed to indicate that the conversation message is protected content.
  • the message receiving end will be described here.
  • the message received can share the received conversation message in the following two ways.
  • the terminal can share the conversation message by screenshotting, editing and forwarding the conversation interface.
  • the terminal presents a session interface containing multiple session messages, wherein the session interface contains protected content 501, and when the terminal receives a target operation instruction for instructing a screenshot (screenshot operation), it presents a screenshot containing the protected content 501 image, and perform protection processing on the protected content 502 in the screenshot image, such as blocking the protected content.
  • a plurality of session information can be selected and forwarded in the session interface, so as to realize the sharing of session messages.
  • the forwarding here may be forwarding multiple session information one by one, or combining multiple session information and then forwarding.
  • a selection operation for multiple target session messages is received, and the selected multiple target session messages are marked; when a click operation for the share button 1001 is received, the display Multiple user objects, the user can select one of the multiple user objects as the recipient of the target conversation message, send each target conversation message to the terminal of the selected recipient one by one, and display in the conversation interface with the recipient Individual conversation messages with protected content hidden.
  • a selection operation for multiple target conversation messages is received in the conversation interface, and the selected multiple goal conversation messages are marked; when a click operation for the share button 801 is received, the display Multiple user objects, the user can select one of the multiple user objects as the recipient of the target conversation message, combine multiple target conversation messages into one conversation message and send it to the terminal of the selected recipient, and have a conversation with the recipient
  • the conversation message 802 is displayed, wherein the protected content in the conversation message is hidden.
  • multiple conversation messages are displayed in the conversation interface, including received conversation messages and sent conversation messages.
  • the sent conversation messages such as conversation message 1701
  • a toolbar corresponding to the conversational message 1701 is presented, including a privacy protection button 1702 in the toolbar; when the user receives a click operation for the privacy protection button by the left mouse button, the conversational message 1701 is set as protected content, and A protection mark 1703 is displayed next to the conversation message to indicate that the conversation message is protected content.
  • the screenshot state is entered, and after entering the screenshot state, the protected content 602 in the conversation interface is hidden, that is, the protected content 602 in the conversation interface is hidden;
  • the terminal receives an area selection operation, it takes the conversation message in the screenshot area corresponding to the area selection operation as the target conversation message, wherein the screenshot area contains hidden and processed protected content 602; , the screenshot processing is performed on the selected screenshot area to obtain a screenshot image containing the hidden protected content 602, where the protected content 602 in the screenshot image is hidden.
  • the selected multiple target conversation messages are marked, and a forward button 1101 and a combined forward button 1102 are displayed.
  • the terminal receives a click operation on the share button 1101, multiple user objects are displayed, and the user can select one of the multiple user objects as the recipient of the target conversation message, and send each target conversation message to the terminal of the selected recipient one by one , and display various conversation messages 1103 with protected content hidden in the conversation interface of the conversation with the receiver.
  • Fig. 21 is a schematic flowchart of the message processing method provided by the embodiment of the present application.
  • the message processing method provided by the embodiment of the present application includes:
  • Step 2101 the first terminal receives a privacy protection instruction for session messages.
  • Step 2102 the first terminal marks the conversation message indicated by the privacy protection instruction.
  • Step 2103 the first terminal encrypts the session message and sends it to the server.
  • Step 2104 the server decrypts the session message and sends it to the second terminal.
  • Step 2105 The second terminal displays the conversation message.
  • the conversation messages here include text messages, picture messages, voice messages, and the like.
  • Step 2106 the second terminal receives a screenshot operation instruction.
  • Step 2107 the second terminal detects whether there is a marker signal in the conversation message in the screenshot area, if yes, execute step 2108; otherwise, execute step 2109.
  • Step 2108 the second terminal performs Gaussian blur processing on the conversation message with the marked signal, so as to hide the conversation message.
  • the visual processing range is positioned within the information carrier box, for example, the Gaussian blur setting value is 18.
  • Gaussian blur processing can be performed on the text content after the voice-to-text conversion.
  • dynamic or static images can also be used to cover protected content, such as mosaics, interesting textures, interesting dynamic special effects (such as special effects in burning), etc. .
  • Step 2109 The second terminal displays all conversation messages.
  • Step 2110 the second terminal performs a screenshot operation.
  • Fig. 22 is a schematic flowchart of the message processing method provided by the embodiment of the present application.
  • the message processing method provided by the embodiment of the present application includes:
  • Step 2201 the first terminal receives a privacy protection instruction for session messages.
  • Step 2202 the first terminal marks the conversation message indicated by the privacy protection instruction.
  • Step 2203 the first terminal encrypts the session message and sends it to the server.
  • Step 2204 the server decrypts the session message and sends it to the second terminal.
  • Step 2205 The second terminal displays the conversation message.
  • the conversation messages here include text messages, picture messages, voice messages, and the like.
  • Step 2206 the second terminal receives the forwarding operation instruction.
  • Step 2207 the second terminal selects the session message to be forwarded.
  • Step 2208 the second terminal detects whether there is a marker signal in the session message to be forwarded, and if so, executes step 2209; otherwise, executes step 2210.
  • Step 2209 the second terminal performs Gaussian blur processing on the conversation message with the marked signal, so as to hide the conversation message.
  • Step 2210 The second terminal displays all conversation messages.
  • Step 2211 the second terminal sends the session message to be forwarded to the server.
  • Applying the embodiment of this application can protect users from spreading and leaking information that is unwilling to disclose or uncertain whether there is a risk by setting protected content, thereby improving the trust of communication and making chat more freely.
  • the software modules stored in the information processing device 555 of the memory 550 may include :
  • a display module 5551 configured to present a conversation interface including at least one conversation message
  • the receiving module 5552 is configured to receive a target operation instruction in the conversation interface, the target operation instruction is used to instruct to perform a target operation on the target conversation message, and the goal operation is used to share the target conversation message;
  • the processing module 5553 is configured to execute the target operation on the target session message in response to the target operation instruction, and when the target session message contains protected content, when the execution result of the target session message is Protect the protected content in .
  • the processing module 5553 is further configured to forward the target session message to the target indicated by the forwarding operation instruction in response to the target operation instruction when the target operation is a forwarding operation object;
  • the target session message contains protected content
  • present the target session message in a session interface with the target object and perform protection processing on the protected content in the target session message.
  • the processing module 5553 is further configured to, when the target operation is a screenshot operation, in response to the target operation instruction, perform screenshot processing on the area containing the target conversation message to obtain the A screenshot image of the target conversation message;
  • the processing module 5553 is further configured to, when the target operation is a selection operation for the target conversation message, in response to the target operation instruction, in the conversation interface, the The target conversation message is marked;
  • the session interface When the target session message contains protected content, in the session interface, perform protection processing on the marked protected content in the target session message.
  • the processing module 5553 is further configured to send at least two of the target session messages in response to a combined sending instruction for the marked target session messages when the number of the target session messages is at least two The target session message is merged into a combined session message, and the combined session message is sent;
  • the combined session message is displayed, and the protected content contained in the target session message is protected in the combined session message.
  • the processing module 5553 is further configured to send each of the target session messages one by one in response to an instruction for sending the target session messages one by one when the number of the target session messages is at least two ;
  • each of the target session messages is displayed one by one, and the corresponding protected content is protected in each of the target session messages.
  • the display module 5551 is further configured to display the protection identifier of the corresponding conversation message in the associated area of the conversation message containing the protected content in the conversation interface, and the protection logo is used to indicate said session message contains protected content;
  • the processing module 5553 is further configured to, when a protection identifier corresponding to the target session message is displayed in the associated area of the target session message, perform an execution on the target session message in the execution result of the target session message hidden handle.
  • the processing module 5553 is further configured to: when the target session message contains protected content, in the execution result of the target session message, add a static Or a dynamic target image, so that the target image is overlaid on the protected content.
  • the processing module 5553 is further configured to obfuscate the protected content in the execution result of the target session message when the target session message contains protected content, so that The protected content is blocked.
  • the processing module 5553 is further configured to delete the protected content from the execution result of the target session message when the target session message contains protected content, so as to protect the above protected content.
  • the processing module 5553 is further configured to present prompt information in response to the forwarding operation on the execution result
  • the prompt information is used to indicate that the protected content cannot be forwarded.
  • the display module 5551 is further configured to display the text content corresponding to the voice message in response to a text viewing instruction for the voice message when the target conversation message is a voice message;
  • the processing module 5553 is further configured to, when the target operation is a screenshot operation, in response to the target operation instruction, perform screenshot processing on the area containing the text content to obtain a screenshot image containing the text content;
  • the text content is protected in the screenshot image.
  • the processing module 5553 is further configured to receive a session message containing protected content, and present the received session message; wherein, the protected content in the session message is protected;
  • processing module 5553 is further configured to present privacy protection controls in the conversation interface
  • the protected content is configured to perform protection processing on the protected content in the execution result of the protected content when the receiving end triggers an instruction to execute a target operation target operation instruction on the protected content.
  • the processing module 5553 is further configured to receive a protection setting instruction for at least one session message in the session interface;
  • the protection setting instruction setting the at least one session message as the protected content, so that when the receiving end triggers an instruction to execute the target operation target operation instruction on the protected content, when the protected content is In the execution result, the protected content is protected.
  • the processing module 5553 is further configured to receive a protection setting instruction for some content in the conversation message in the conversation interface;
  • processing module 5553 is further configured to send sharing prompt information to the sender of the target session message
  • the sharing prompt information is used to prompt that the target conversation message is shared after the protected content in the target conversation message is protected.
  • An embodiment of the present application provides a message processing device, including:
  • the first sending module is configured to set the target session message as protected content and send the target session message in response to a sending instruction for the target session message when the privacy protection control is turned on;
  • the second sending module is configured to send the target session message in response to a sending instruction for the target session message when the privacy protection control is in the closed state, and present the target session message in the session interface; respond Based on the protection setting instruction for the target session message, setting the target session message as protected content;
  • the protected content when the receiving end triggers an instruction to execute a target operation target operation instruction on the protected content, the protected content is protected.
  • An embodiment of the present application provides a computer program product or computer program, where the computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instruction from the computer-readable storage medium, and the processor executes the computer instruction, so that the computer device executes the message processing method described above in the embodiment of the present application.
  • Embodiments of the present application provide a computer-readable storage medium storing executable instructions, wherein executable instructions are stored, and when the executable instructions are executed by a processor, the processor will be caused to execute the method provided by the embodiment of the present application, for example , as shown in Figure 3.
  • the computer-readable storage medium can be memory such as FRAM, ROM, PROM, EPROM, EEPROM, flash memory, magnetic surface memory, optical disk, or CD-ROM; Various equipment.
  • executable instructions may take the form of programs, software, software modules, scripts, or code written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and its Can be deployed in any form, including as a stand-alone program or as a module, component, subroutine or other unit suitable for use in a computing environment.
  • executable instructions may, but do not necessarily correspond to files in a file system, may be stored as part of a file that holds other programs or data, for example, in a Hyper Text Markup Language (HTML) document in one or more scripts, in a single file dedicated to the program in question, or in multiple cooperating files (for example, files that store one or more modules, subroutines, or sections of code).
  • HTML Hyper Text Markup Language
  • executable instructions may be deployed to be executed on one computing device, or on multiple computing devices located at one site, or alternatively, on multiple computing devices distributed across multiple sites and interconnected by a communication network. to execute.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本申请提供了一种消息处理方法、装置、设备、计算机可读存储介质及计算机程序产品;方法包括:呈现包含至少一条会话消息的会话界面;在所述会话界面中,接收到目标操作指令,所述目标操作指令用于指示对目标会话消息执行目标操作,所述目标操作用于分享所述目标会话消息;响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,并当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理。

Description

消息处理方法、装置、设备、存储介质及程序产品
相关申请的交叉引用
本申请实施例基于申请号为202110546504.3、申请日为2021年05月19日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请实施例作为参考。
技术领域
本申请涉及计算机技术领域,尤其涉及一种消息处理方法、装置、设备、计算机可读存储介质及计算机程序产品。
背景技术
社交应用通常是为用户提供基于互联网的即时交流消息的业务,允许两人或多人通过网络即时的传递文字信息、档案、语音与视频交流。随着社交应用的发展,社交应用已经渗透在人们的生活中,越来越多人使用社交应用进行交流。
在通过社交应用进行交流的过程中,对于一些不愿意公开或者不确定是否存在风险的信息,存在被会话对象传播泄露的问题。
发明内容
本申请实施例提供一种消息处理方法、装置、设备、计算机可读存储介质及计算机程序产品,能够避免受保护内容被传播泄露,提升受保护内容的安全性。
本申请实施例的技术方案是这样实现的:
本申请实施例提供一种消息处理方法,包括:
呈现包含至少一条会话消息的会话界面;
在所述会话界面中,接收到指示对目标会话消息执行目标操作的目标操作指令,所述目标操作用于分享所述目标会话消息;
响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,并当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理。
本申请实施例提供一种消息处理方法,包括:
在会话界面中呈现隐私保护控件;
当所述隐私保护控件处于开启状态时,响应于针对所述会话界面中目标会话消息的发送指令,将所述目标会话消息的内容设置为受保护内容,并发送所述目标会话消息;
当所述隐私保护控件处于关闭状态时,响应于针对所述会话界面中目标会话消息的发送指令,发送所述目标会话消息,在所述会话界面中呈现所述目标会话消息,并在接收到针对所述目标会话消息的保护设置指令时,将所述目标会话消息的内容设置为受保护内容;
其中,所述受保护内容,在接收端触发指示对所述受保护内容执行目标操作的目标操作指令时,在对所述受保护内容的执行结果中对所述受保护内容进行保护处理。
本申请实施例提供一种消息处理装置,包括:
显示模块,配置为呈现包含至少一条会话消息的会话界面;
接收模块,配置为在所述会话界面中,接收到指示对目标会话消息执行目标操作的目标 操作指令,所述目标操作用于分享所述目标会话消息;
处理模块,配置为响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,并当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理。
本申请实施例提供一种消息处理装置,包括:
在会话界面中呈现隐私保护控件;
第一发送模块,配置为当所述隐私保护控件处于开启状态时,响应于针对所述会话界面中目标会话消息的发送指令,将所述目标会话消息的内容设置为受保护内容,并发送所述目标会话消息;
第二发送模块,配置为当所述隐私保护控件处于关闭状态时,响应于针对所述会话界面中目标会话消息的发送指令,发送所述目标会话消息,在所述会话界面中呈现所述目标会话消息,并在接收到针对所述目标会话消息的保护设置指令时,将所述目标会话消息的内容设置为受保护内容;
其中,所述受保护内容,在接收端触发指示对所述受保护内容执行目标操作的目标操作指令时,在对所述受保护内容的执行结果中对所述受保护内容进行保护处理。
本申请实施例提供一种计算机设备,包括:
存储器,用于存储可执行指令;
处理器,用于执行所述存储器中存储的可执行指令时,实现本申请实施例提供的消息处理方法。
本申请实施例提供一种计算机可读存储介质,存储有可执行指令,用于引起处理器执行时,实现本申请实施例提供的消息处理方法。
本申请实施例提供一种计算机程序产品,包括计算机程序或指令,所述计算机程序或指令被处理器执行时,实现本申请实施例提供的消息处理方法。
本申请实施例具有以下有益效果:
应用本申请实施例,通过响应于目标操作指令,对目标会话消息执行目标操作,并当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中对受保护内容进行保护处理;如此,在对包含受保护内容的目标会话消息进行分享时,对该受保护内容进行保护处理,能够避免受保护内容被传播泄露,提升受保护内容的安全性。
附图说明
图1是本申请实施例提供的消息处理系统100的架构示意图;
图2是本申请实施例提供的计算机设备500的结构示意图;
图3是本申请实施例提供的消息处理方法的流程示意图;
图4是本申请实施例提供的目标会话消息的转发过程示意图;
图5是本申请实施例提供的截图过程示意图;
图6是本申请实施例提供的会话界面示意图;
图7是本申请实施例提供的会话界面示意图;
图8是本申请实施例提供的会话消息的分享过程示意图;
图9是本申请实施例提供的会话消息的分享过程示意图;
图10是本申请实施例提供的会话消息的分享过程示意图;
图11是本申请实施例提供的会话消息的分享过程示意图;
图12是本申请实施例提供的会话界面示意图;
图13是本申请实施例提供的会话界面示意图;
图14是本申请实施例提供的会话界面示意图;
图15是本申请实施例提供的会话界面示意图;
图16是本申请实施例提供的会话界面示意图;
图17是本申请实施例提供的会话界面示意图;
图18是本申请实施例提供的会话界面示意图;
图19是本申请实施例提供的消息处理方法的流程示意图;
图20是本申请实施例提供的消息处理方法的流程示意图;
图21是本申请实施例提供的消息处理方法的流程示意图;
图22是本申请实施例提供的消息处理方法的流程示意图。
具体实施方式
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述,所描述的实施例不应视为对本申请的限制,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。
在以下的描述中,涉及到“一些实施例”,其描述了所有可能实施例的子集,但是可以理解,“一些实施例”可以是所有可能实施例的相同子集或不同子集,并且可以在不冲突的情况下相互结合。
在以下的描述中,所涉及的术语“第一\第二…”仅仅是区别类似的对象,不代表针对对象的特定排序,可以理解地,“第一\第二…”在允许的情况下可以互换特定的顺序或先后次序,以使这里描述的本申请实施例能够以除了在这里图示或描述的以外的顺序实施。
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同。本文中所使用的术语只是为了描述本申请实施例的目的,不是旨在限制本申请。
对本申请实施例进行进一步详细说明之前,对本申请实施例中涉及的名词和术语进行说明,本申请实施例中涉及的名词和术语适用于如下的解释。
1)响应于,用于表示所执行的操作所依赖的条件或者状态,当满足所依赖的条件或状态时,所执行的一个或多个操作可以是实时的,也可以具有设定的延迟;在没有特别说明的情况下,所执行的多个操作不存在执行先后顺序的限制。
2)客户端,终端中运行的用于提供各种服务的应用程序,例如社交客户端、即时通讯客户端、学习客户端、游戏客户端等。
参见图1,图1是本申请实施例提供的消息处理系统100的架构示意图,为实现支撑一个示例性应用,终端(包括终端400-1和终端400-2)通过网络300连接服务器200,网络300可以是广域网或者局域网,又或者是二者的组合。终端中可以设置有社交客户端,如即时通信客户端,终端400-1的用户和终端400-2的用户可以通过社交客户端发送会话消息,以进行交流。
终端400-1,用于通过会话界面发送至少一条会话消息,并在会话界面中呈现发送的会话消息;其中,至少一条会话消息中包含受保护内容;
服务器200,用于接收至少一条会话消息,并将至少一条会话消息发送给终端400-2。
终端400-2,用于呈现包含至少一条会话消息的会话界面;在会话界面中,接收到指示对目标会话消息执行目标操作的目标操作指令,其中,目标操作用于分享目标会话消息;响应于目标操作指令,对目标会话消息执行目标操作,并当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中对受保护内容进行保护处理。
在一些实施例中,服务器200可以是独立的物理服务器,也可以是多个物理服务器构成的服务器集群或者分布式系统,还可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、内容分发网络(CDN,Content Delivery Network)、以及大数据和人工智能平台等基础云计算服务的云服务器。终端可以是智能手机、平板电脑、笔记本电脑、台式计算机、智能音箱、智能手表等,但并不局限于此。
参见图2,图2是本申请实施例提供的计算机设备500的结构示意图,在实际应用中,计算机设备500可以为图1中的终端(如终端400-1、终端400-2)或服务器200,以计算机设备为图1所示的终端为例,对实施本申请实施例的表情的处理方法的计算机设备进行说明。图2所示的计算机设备500包括:至少一个处理器510、存储器550、至少一个网络接口520和用户接口530。计算机设备500中的各个组件通过总线系统540耦合在一起。可理解,总线系统540用于实现这些组件之间的连接通信。总线系统540除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图2中将各种总线都标为总线系统540。
处理器510可以是一种集成电路芯片,具有信号的处理能力,例如通用处理器、数字信号处理器(DSP,Digital Signal Processor),或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等,其中,通用处理器可以是微处理器或者任何常规的处理器等。
用户接口530包括使得能够呈现媒体内容的一个或多个输出装置531,包括一个或多个扬声器和/或一个或多个视觉显示屏。用户接口530还包括一个或多个输入装置532,包括有助于用户输入的用户接口部件,比如键盘、鼠标、麦克风、触屏显示屏、摄像头、其他输入按钮和控件。
存储器550可以是可移除的,不可移除的或其组合。示例性的硬件设备包括固态存储器,硬盘驱动器,光盘驱动器等。存储器550可选地包括在物理位置上远离处理器510的一个或多个存储设备。
存储器550包括易失性存储器或非易失性存储器,也可包括易失性和非易失性存储器两者。非易失性存储器可以是只读存储器(ROM,Read Only Memory),易失性存储器可以是随机存取存储器(RAM,Random Access Memory)。本申请实施例描述的存储器550旨在包括任意适合类型的存储器。
在一些实施例中,本申请实施例提供的消息处理装置可以采用软件方式实现,图2示出了存储在存储器550中的消息处理装置555,其可以是程序和插件等形式的软件,包括以下软件模块:显示模块5551、接收模块5552和处理模块5553,这些模块是逻辑上的,因此根据所实现的功能可以进行任意的组合或进一步拆分。将在下文中说明各个模块的功能。
在另一些实施例中,本申请实施例提供的消息处理装置可以采用硬件方式实现,作为示例,本申请实施例提供的消息处理装置可以是采用硬件译码处理器形式的处理器,其被编程以执行本申请实施例提供的消息处理方法,例如,硬件译码处理器形式的处理器可以采用一个或多个应用专用集成电路(ASIC,Application Specific Integrated Circuit)、DSP、可编程逻辑器件(PLD,Programmable Logic Device)、复杂可编程逻辑器件(CPLD,Complex Programmable Logic Device)、现场可编程门阵列(FPGA,Field-Programmable Gate Array)或其他电子元件。
将结合本申请实施例提供的终端的示例性应用和实施,说明本申请实施例提供的消息处理方法。
参见图3,图3是本申请实施例提供的消息处理方法的流程示意图,将结合图3示出的步骤进行说明。
步骤301:终端呈现包含至少一条会话消息的会话界面。
在实际应用中,终端上设置有客户端,如即时通信客户端、社交客户端、学习客户端、游戏客户端等,通过客户端呈现会话界面,用户可以通过会话界面与其它用户进行交流。在用户通过会话界面与其他用户进行交流的过程中,可以发送会话消息或者接收会话消息,发送的会话消息或者接收的会话消息可以在会话界面中呈现。
步骤302:在会话界面中,接收到目标操作指令。
其中,目标操作指令用于指示对目标会话消息执行目标操作,目标操作用于分享目标会话消息,如目标操作可以为转发操作,直接用于通过转发的方式对目标会话消息进行分享;或者,目标操作可以包括截图操作以及分享操作,在通过截图操作得到执行结果(即截图结 果)后,再通过分享操作对该执行结果(即截图结果)进行分享。也即目标操作用于直接或间接的对目标会话消息进行分享。
在实际应用中,目标会话消息的数量可以为一条或者多条(两条或两条以上),用户可以根据呈现的会话消息,从中选择部分或全部的会话消息作为目标会话消息,以触发针对目标会话消息的目标操作指令。
步骤303:响应于目标操作指令,对目标会话消息执行目标操作,并当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中对受保护内容进行保护处理。
这里,受保护内容可以为某一条目标会话消息,也可以是一条目标会话消息中的部分内容。在实际实施时,对受保护内容进行保护处理可以是屏蔽受保护内容,使受保护内容处于不可浏览状态;也可以控制受保护内容处于不可操作状态,如控制受保护内容处于不可转发状态,或者控制受保护内容处于不可复制状态。
在一些实施例中,终端可以通过以下方式执行目标操作:当目标操作为转发操作时,响应于目标操作指令,将目标会话消息转发给转发操作指令所指示的目标对象;相应的,终端可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中对受保护内容进行保护处理:当目标会话消息中包含受保护内容时,在与目标对象进行会话的会话界面中呈现目标会话消息,并对目标会话消息中的受保护内容进行保护处理。
这里,目标操作可以为转发操作,在实际实施时,用户可以先选取需要进行转发的目标会话消息,终端响应于用户的选取操作,呈现针对目标会话消息的转发功能项,当接收到针对转发功能项的触发操作后,终端可以呈现一个或多个(两个或两个以上)用户对象供用户选择,用户执行针对多个用户对象中目标对象的选择操作,触发针对目标会话消息的转发操作指令,以指示将目标会话消息转发给目标对象;或者,当终端接收到针对转发功能项的触发操作后,可以直接触发针对目标会话消息的转发操作指令,这里的目标对象可以是预先设置的,如默认选择的用户对象。
在实际应用中,当目标会话消息中包含受保护内容时,终端可以通过以下方式将目标会话消息转发给转发操作指令所指示的目标对象:发送针对目标会话消息的转发指令至服务器,其中,转发指令中携带有目标对象的对象信息、目标会话消息、以及受保护内容的标记信息;服务器解析转发指令,得到转发指令所携带的目标对象、目标会话消息、以及受保护内容的标记信息,并根据标记信息对受保护内容进行保护处理,将保护处理后的目标会话消息发送给目标对象侧的终端;目标对象侧的终端在呈现目标会话消息时,会在目标会话消息中对受保护内容进行保护处理,如此,目标对象便无法获取目标会话消息中的受保护内容,能够避免受保护内容被传播泄露,提升受保护内容的安全性。
在一些实施例中,在将目标会话消息转发给转发操作指令所指示的目标对象之后,终端可自动呈现与目标对象进行会话的会话界面,或者,终端在接收到用户触发的针对与目标对象进行会话的会话界面的呈现指令后,再呈现与目标对象进行会话的会话界面,并在会话界面中呈现目标会话消息,当目标会话消息中包含受保护内容时,在目标会话消息中对受保护内容进行保护处理。
也就是说,终端在与目标对象进行会话的会话界面中呈现目标会话消息,并在目标会话消息中对受保护内容进行保护处理;目标对象侧的终端在相应会话界面中呈现目标会话消息时,也会对目标会话消息中的受保护内容进行保护处理,即目标对象侧的终端在相应会话界面中呈现的目标会话消息是对其中的受保护内容进行保护处理的会话消息。
作为示例,以保护处理为隐藏受保护内容为例,图4是本申请实施例提供的目标会话消息的转发过程示意图,参见图4,呈现包含多条会话消息的会话界面,在该会话界面中,接收到针对目标会话消息401的长按操作,呈现对应该目标会话消息401的工具栏,工具栏中包含转发按键402,其中,目标会话消息401为受保护内容;当接收到针对该转发按键402的触发操作,如接收到针对该转发按键402的点击操作,呈现多个可供选择的用户对象;当接收到针对目标对象403的点击操作时,将目标会话消息发送给目标对象,并呈现与目标对 象进行会话的会话界面,在该会话界面中呈现目标会话消息,其中,目标会话消息404中的内容被隐藏。
在一些实施例中,终端可以通过以下方式执行目标操作:当目标操作为截图操作时,响应于目标操作指令,对包含目标会话消息的区域进行截图处理,得到包含目标会话消息的截图图像;相应的,可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中隐藏受保护内容:当目标会话消息中包含受保护内容时,对截图图像中的受保护内容进行保护处理,并展示处理得到的截图图像。
在实际实施时,当目标操作为截图操作时,目标操作指令为截图操作指令。截图操作指令可以是快捷方式触发的屏幕截图指令,例如,用户通过在手机屏幕执行三指滑动触发的截图操作指令,还可通过触发快捷键触发的截图操作指令,该截图操作指令所对应的截图区域为整个手机屏幕区域;还可以是通过截图图标触发的截图操作指令,截图操作指令可对截图区域进行选择,如在电脑终端呈现截图图标,当接收到针对该截图图标的触发操作,进入截图状态,并呈现区域选取焦点,用户基于区域选取焦点触发区域选取操作,终端呈现该区域选取操作所对应截图框,该截图框用于指示所选取的截图区域,当接收到确定截图操作时,对所选取的截图区域进行截图处理,得到截图图像。
在实际应用中,终端获取截图操作对应的截图区域,并将该截图区域中的会话消息作为目标会话消息,对目标会话消息中是否包含受保护内容进行检测,若检测结果表征目标会话消息中包括受保护内容,则在截图图像中对目标会话消息中的受保护内容进行保护处理,即不显示目标会话消息中的受保护内容;若检测结果表征目标会话消息中未包含受保护内容,则显示目标会话消息的所有内容。
作为示例,图5是本申请实施例提供的截图过程示意图,参见图5,终端呈现包含多条会话消息的会话界面,其中,会话界面中包含受保护内容501,当接收到用于指示截屏(截图操作)的目标操作指令时,呈现包含受保护内容501的截图图像,并在截图图像中对受保护内容502进行保护处理,如遮挡受保护内容。
在一些实施例中,当目标操作为截图操作时,终端可以先对会话界面中的受保护内容进行隐藏,再执行截图操作,以使截图处理得到的截图图像中的受保护内容本身就是被隐藏了的。
例如,图6是本申请实施例提供的会话界面示意图,参见图6,当终端接收到针对截图按键601的点击操作,进入截图状态,在截图状态下,对会话界面中的受保护内容602进行隐藏处理;当终端接收到区域选取操作时,将该区域选取操作所对应的截图区域中的会话消息作为目标会话消息,其中,截图区域中包含被隐藏处理后的受保护内容602;当接收到确定截图操作时,对所选取的截图区域进行截图处理,得到包含被隐藏处理后的受保护内容602的截图图像,这里的截图图像中的受保护内容602被隐藏。
在一些实施例中,终端可以通过以下方式执行目标操作:当目标操作为针对目标会话消息的选取操作时,响应于目标操作指令,在会话界面中,对目标会话消息进行标记;相应的,终端可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中隐藏受保护内容:当目标会话消息中包含受保护内容时,在会话界面中,对标记的目标会话消息中的受保护内容进行保护处理。
在实际实施时,当目标操作为针对目标会话消息的选取操作时,对所选取的目标会话消息进行标记,以指示已选取该目标会话消息,需要说明的,选取操作所指示选择的目标会话消息可为一条或多条(两条或两条以上);这里,终端对选取的目标会话消息进行检测,根据检测结果判断目标会话消息中是否包含受保护内容,若检测结果表征目标会话消息中包含受保护内容,则对目标会话消息中的受保护内容进行保护处理,如控制受保护内容处于不可浏览状态、控制受保护内容处于不可转发状态等;否则,若检测结果表征目标会话消息中不包含受保护内容,则不执行任何处理。
作为示例,图7是本申请实施例提供的会话界面示意图,参见图7,通过标记701对选 取的目标会话消息进行标记,并对目标会话消息中的受保护内容进行遮挡,如目标会话消息702为受保护内容,则对目标会话消息702进行遮挡处理,以使目标会话消息702处于不可浏览状态。
在一些实施例中,在选取了目标会话消息后,可以触发针对目标会话消息的转发消息,这里,当所选取的目标会话消息为至少两条时,可以是将至少两条目标会话消息合并为一条合并会话消息,并将合并得到的合并会话消息进行转发,也可以是将至少两条目标会话消息逐条转发。
在一些实施例中,终端对标记的目标会话消息中的受保护内容进行保护处理之后,当目标会话消息的数量为至少两条时,响应于针对标记的目标会话消息的合并发送指令,将至少两条目标会话消息合并为合并会话消息,并发送合并会话消息;在合并发送指令对应的会话界面中,显示合并会话消息,并在合并会话消息中对目标会话消息中包含的受保护内容进行保护处理。
在实际实施时,当将多条(即至少两条)目标会话消息合并为一条合并会话消息进行转发时,终端响应于合并发送指令,按照各目标会话消息的发送时间,对多条目标会话消息进行合并,以在合并会话消息中按照各目标会话消息的发送时间显示各目标会话消息。终端在得到合并会话消息后,发送针对合并会话消息的发送指令至服务器,其中,发送指令中携带有合并会话消息及受保护内容的标记信息;服务器解析发送指令,确定出合并会话消息的接收者,将合并会话消息中的标记信息隐藏后发送给接收者;接收者的终端呈现相应的会话界面,并在该会话界面中呈现对受保护内容进行保护处理后的合并会话消息。在将合并会话消息发送给目标对象后,终端在与接收者进行会话的会话界面中显示合并会话消息,并在合并会话消息中对受保护内容进行保护处理。
作为示例,图8是本申请实施例提供的会话消息的分享过程示意图,参见图8,在会话界面中接收到针对多条目标会话消息的选取操作,标记选择的多条目标会话消息;当接收到针对分享按键801的点击操作,触发合并发送指令,终端响应于该合并发送指令,显示多个用户对象,用户可以从多个用户对象中选择一个作为目标会话消息的接收者,并将多条目标会话消息合并为一条会话消息(合并会话消息)发送至所选择接收者的终端,并在与接收者进行会话的会话界面中,显示该合并会话消息802,其中,该会合并会话消息中各目标会话消息包含的受保护内容均被遮挡,即会合并会话消息中各目标会话消息包含的受保护内容均处于不可浏览状态。
作为示例,图9是本申请实施例提供的会话消息的分享过程示意图,在会话界面中接收到针对多条目标会话消息的选取操作,标记选择的多条目标会话消息,并显示逐条转发按键901和合并转发按键902。当接收到针对合并转发按键902的点击操作时,显示多个用户对象,用户可以从多个用户对象中选择一个作为目标会话消息的接收者,发送包含多条目标会话消息的合并会话消息至所选择接收者的终端,并在与接收者进行会话的会话界面中,显示对受保护内容进行了保护处理的合并会话消息903。
在一些实施例中,终端在对标记的目标会话消息中的受保护内容进行保护处理之后,当目标会话消息的数量为至少两条时,响应于针对各目标会话消息的逐条发送指令,逐条发送各目标会话消息;在逐条发送指令所对应的会话界面中,逐条显示各目标会话消息,并在各目标会话消息中对相应的受保护内容进行保护处理。
在实际实施时,逐条发送各目标会话消息时,在逐条发送指令所对应的会话界面中呈现目标会话消息时,每条目标会话消息对应一个消息框,对于每一条目标会话消息,当该目标会话消息中包含受保护内容时,对该目标会话消息中包含的受保护内容进行保护处理。
图10是本申请实施例提供的会话消息的分享过程示意图,参见图10,在会话界面中接收到针对多条目标会话消息的选取操作,标记选择的多条目标会话消息;当接收到针对分享按键1001的点击操作,显示多个用户对象,用户可以从多个用户对象中选择一个作为目标会话消息的接收者,逐条发送各目标会话消息至所选择接收者的终端,并在与接收者进行会 话的会话界面中,显示对受保护内容进行了保护处理的各条会话消息,如目标会话消息包含的受保护内容被遮挡而处于不可浏览状态。
图11是本申请实施例提供的会话消息的分享过程示意图,参见图11,在会话界面中接收到针对多条目标会话消息的选取操作,标记选择的多条目标会话消息,并显示逐条转发按键1101和合并转发按键1102。当终端接收到针对分享按键1101的点击操作时,显示多个用户对象,用户可以从多个用户对象中选择一个作为目标会话消息的接收者,逐条发送各目标会话消息至所选择接收者的终端,并在与接收者进行会话的会话界面中,显示对受保护内容进行了保护处理的各条目标会话消息1103,如目标会话消息1103包含的受保护内容被遮挡而处于不可浏览状态。
在一些实施例中,终端在对目标会话消息的执行结果中对受保护内容进行保护处理之后,还可响应于针对执行结果的转发操作,呈现提示信息;其中,提示信息用于指示无法对受保护内容进行转发。
在实际实施时,当保护处理是控制受保护内容处于不可转发状态时,即使接收到针对执行结果的转发操作,也不执行转发操作,而是呈现一个提示信息,以告知用户不能够对受保护内容进行转发,如呈现提示信息“不可转发xxxx”。
在一些实施例中,终端还可以在会话界面中,在包含受保护内容的会话消息的关联区域中,显示相应会话消息的保护标识,保护标识用于指示会话消息包含受保护内容;相应的,终端可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中隐藏受保护内容:当目标会话消息的关联区域中显示有对应目标会话消息的保护标识时,在对目标会话消息的执行结果中对目标会话消息进行保护处理。
在实际实施时,可以通过保护标识来指示会话消息中包含受保护内容,以提示用户不要将该会话消息分享给其它用户对象。同时,终端可以根据该保护标识,来对包含受保护内容的会话消息进行识别,也即,若目标会话消息的关联区域中显示有对应目标会话消息的保护标识,表示该目标会话消息包含受保护内容,那么需要在执行结果中对该目标会话消息进行保护处理。
作为示例,图12是本申请实施例提供的会话界面示意图,参见图12,在会话消息1201旁边显示保护标识,以指示该会话消息包含受保护内容。这里,若接收到对该会话消息1201的目标操作指令,如转发操作指令,则对该会话消息1201进行保护处理后再进行转发。
在一些实施例中,终端可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中隐藏受保护内容:当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中,受保护内容所处位置添加静态或动态的目标图像,以使目标图像覆盖于受保护内容之上。
在实际实施时,可以通过在受保护内容所处位置覆盖一个目标图像,来遮挡受保护内容,这里的目标图像可以是静态的,如马赛克、趣味贴图;也可以是动态的,如焚烧中的特效图像。需要说明的是,当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中,还可在目标会话消息所处位置添加静态或动态的目标图像,以使目标图像覆盖于目标会话消息之上,如此,通过对整个目标会话消息进行遮挡的方式,实现对目标会话消息中包含的受保护内容进行保护处理。
例如,图13是本申请实施例提供的会话界面示意图,参见图13,对于转发的包含受保护内容的目标会话消息,在该目标会话消息中包含的受保护内容所处位置呈现一个卡通贴图,以遮挡该目标会话消息中的受保护内容。
在一些实施例中,终端可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中隐藏受保护内容:当目标会话消息中包含受保护内容时,对目标会话消息的执行结果中的受保护内容进行模糊处理,以使受保护内容处于屏蔽状态。
这里,受保护内容处于屏蔽状态,指的是受保护内容处于不可浏览状态,也即受保护内容被隐藏,用户无法浏览到该受保护内容。
在实际实施时,终端可以通过模糊处理的方式使受保护内容处于屏蔽状态,如可以通过高斯模糊处理使受保护内容处于屏蔽状态,这里高斯模糊处理也叫高斯平滑处理,其视觉效果就像是经过一个毛玻璃在观察图像,可以通过图像与正态分布做卷积的方式,实现高斯模糊处理。这里,模糊处理范围定位于信息载体框内,如高斯模糊设置值为18。
在一些实施例中,终端可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中对受保护内容进行保护处理:当目标会话消息中包含受保护内容时,将受保护内容从对目标会话消息的执行结果中删除。
在实际实施时,终端可以直接将受保护内容从目标会话消息中删除,以对受保护内容进行保护处理。另外,当目标操作为用于选取多条目标会话消息的选取操作时,若选取操作对应的多条目标会话消息中部分目标会话消息中包含受保护内容,部分目标会话消息中不包含受保护内容,则可以将其中包含受保护内容的部分目标会话消息从选取结果中删除,也即取消对包含受保护内容的部分目标会话消息的选取,若后续执行针对选取的目标会话消息的发送操作,则不会发送包含受保护内容的目标会话消息,例如,选取的目标会话消息1、目标会话消息2、目标会话消息3中,目标会话消息1包含受保护内容,而目标会话消息2和目标会话消息3中均不包含受保护内容,则直接将目标会话消息1从选取结果中删除,后续执行针对选取的目标会话消息的发送操作时,则只发送目标会话消息2和目标会话消息3,而不会发送包含受保护内容的目标会话消息1。
在一些实施例中,终端在接收到指示对目标会话消息执行目标操作的目标操作指令之前,当目标会话消息为语音消息时,还可响应于针对语音消息的文本查看指令,显示语音消息对应的文本内容;终端可以通过以下方式响应于目标操作指令,对目标会话消息执行目标操作:当目标操作为截图操作时,响应于目标操作指令,对包含文本内容的区域进行截图处理,得到包含文本内容的截图图像;终端可以通过以下方式实现当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中隐藏受保护内容:当语音消息中包含受保护内容时,在截图图像中对文本内容进行保护处理。
在实际实施时,终端提供有将语音消息转化为对应文本内容的功能,用户可以通过触发针对语音消息的文本查看指令,来查看语音消息对应的文本内容;在显示该文本内容后,用户可以通过截图操作,获取包含该文本内容的截图图像,以通过分享截图图像的方式将该文本内容分享给其它用户对象,为防止语音消息通过文本内容的形式被泄露;本申请在得到包含文本内容的截图图像后,会对该文本内容进行保护处理,再将对文本内容进行了保护处理的截图图像分享给其他用户对象。
在一些实施例中,终端还可以接收到包含受保护内容的会话消息,呈现接收到的会话消息,其中,会话消息中的受保护内容经保护处理;响应于针对受保护内容的查看操作,发送查看请求至会话消息的原始发送端;当原始发送端触发同意查看指令时,获取原始发送端发送的未经保护处理的受保护内容,并展示未经保护处理的受保护内容。
这里,会话消息的原始发送端指的是最先发送该会话消息的发送端,而不是该会话消息的转发端。在实际实施时,当呈现的会话消息中的受保护内容经保护处理后,用户无法获知该受保护内容,用户为了获知会话消息中受保护内容,可以触发针对该受保护内容的查看操作,如终端可以在受保护内容的关联区域呈现一个查看图标,以通过该查看图标接收到查看操作;终端在接收到该查看操作后,发送携带有当前用户的用户标识的查看请求至服务器,服务器将该查看请求发送给该受保护内容的原始发送端。原始发送端呈现接收到的查看请求,并基于查看请求确定是否触发同意查看指令,当原始发送端触发同意查看指令时,原始发送端可重新发送未经保护处理的该受保护内容至服务器,服务器将未经保护处理的受保护内容发送给当前终端,当前终端在会话界面中展示该未经保护处理的受保护内容;当原始发送端触发拒绝查看指令时,服务器可发送一个提示信息至当前终端,以提示用户不可查看该受保护内容。
作为示例,图14是本申请实施例提供的会话界面示意图,参见图14,在会话界面中呈 现包含经保护处理后的受保护内容的会话消息1401,并在该会话消息1401旁边显示一个查看按键1402;当接收到针对该查看按键1402的点击操作时,终端发送查看请求至会话消息的原始发送端;当原始发送端触发同意查看指令时,在与该会话消息相关联的区域展示受保护内容1403。
在一些实施例中,终端可以在会话界面中呈现隐私保护控件;响应于针对隐私保护控件的触发操作,呈现对应隐私保护模式的消息输入控件;接收到基于对应隐私保护模式的消息输入控件输入的受保护内容;响应于针对受保护内容的发送指令,发送受保护内容,并在会话界面中显示受保护内容;其中,受保护内容,用于在接收端触发的指示对受保护内容执行目标操作目标操作指令时,在对受保护内容的执行结果中对受保护内容进行隐藏。
在实际实施时,用户可以先触发隐私保护控件,终端响应于该触发操作,控制消息输入模式为隐私保护模式,在此隐私保护模式下,通过消息输入的内容均为受保护内容,需要说明的是,这里输入的内容可以是图像、文字、语音等。为了避免受保护内容的泄露,在将该受保护内容分享给其它用户对象(接收者)后,若该受保护内容的接收者通过相应的接收端触发指示对受保护内容执行目标操作目标操作指令时,在对受保护内容的执行结果中需对受保护内容进行保护处理。
作为示例,图15是本申请实施例提供的会话界面示意图,参见图15,在会话界面中显示隐私保护控件1501,当接收到针对隐私保护控件1501的点击操作时,控制消息输入模式进入隐私保护模式,在此隐私保护模式下,输入的会话消息为受保护内容;当接收到针对输入的受保护内容的发送指令,发送该受保护内容至接收者的终端,在与接收者的会话界面中显示该受保护内容1502,并且,在该会话消息(即受保护内容1502)旁边会显示一个保护标识1503,该标识信息用于指示相应的会话消息为受保护内容;在接收者的终端侧与当前对象的会话界面中,同样可显示该会话消息(即受保护内容1502),但当接收者的终端接收到用于执行对该受保护内容1502执行目标操作(如转发操作)的目标操作指令(如转发指令)时,在对该保护内容进行转发时,需对该受保护内容进行保护处理,即将该保护内容转发至目标对象时,目标对象侧的终端在相应会话界面中呈现的会话消息是对其中的受保护内容进行保护处理的会话消息。
在一些实施例中,终端可以在会话界面中,接收到针对至少一条会话消息的保护设置指令;响应于保护设置指令,将至少一条会话消息设置为受保护内容,以在接收端触发的指示对受保护内容执行目标操作目标操作指令时,在对受保护内容的执行结果中对受保护内容进行保护处理。
在实际实施时,终端也可以是在将会话消息发送后,再将该会话消息设置为受保护内容。
作为示例,图16是本申请实施例提供的会话界面示意图,参见图16,在会话界面中显示多条会话消息,包括接收的会话消息和发送的会话消息,这里,对于发送的会话消息,如会话消息1601,当接收到针对会话消息1601的长按操作,呈现对应该会话消息1601的工具栏,在工具栏中包括隐私保护按键1602;当接收到针对隐私保护按键的点击操作时,终端将会话消息1601设置为受保护内容,并在该会话消息旁边显示保护标识1603,以指示该会话消息为受保护内容。
作为示例,图17是本申请实施例提供的会话界面示意图,参见图17,在会话界面中显示多条会话消息,包括接收的会话消息和发送的会话消息,这里,对于发送的会话消息,如会话消息1701,当用户通过鼠标右键触发针对会话消息1701的点击操作时,呈现对应该会话消息1701的工具栏,在工具栏中包括隐私保护按键1702;当用户通过鼠标左键接收到针对隐私保护按键的点击操作,将会话消息1701设置为受保护内容,并在该会话消息旁边显示保护标识1703,以指示该会话消息为受保护内容1703。
在一些实施例中,终端还可以在会话界面中,接收到针对会话消息中部分内容的保护设置指令;响应于保护设置指令,将会话消息中保护设置指令所指示的部分内容作为受保护内容,以在接收端触发的指示对会话消息执行目标操作目标操作指令时,在对会话消息的执行 结果中对受保护内容进行保护处理。
在实际实施时,终端不仅可以将整条会话消息作为受保护内容,还可以将一条会话消息中的部分内容作为受保护内容。这里,用户可以从一条会话消息中选择需要进行保护的部分内容,然后触发针对这部分内容的保护设置指令,以将这部分内容作为受保护内容。这里,针对部分内容的选取操作可以是通过滑动操作来触发,如获取滑动操作的起始位置、以及滑动操作的结束位置,将会话消息中位于起始位置与结束位置之间的部分内容设置为受保护内容;或者,可以通过点击操作来触发,如获取第一点击操作所对应的第一点击位置、以及第二点击操作的第二点击位置,将位于第一点击位置、以及第二点击位置之间的部分内容设置为受保护内容。
作为示例,图18是本申请实施例提供的会话界面示意图,参见图18,这里,会话消息中阴影部分1801中的内容为受保护内容,当接收到针对包含该受保护内容的会话消息的转发指令时,在与该会话消息的接收者进行会话的会话界面中,显示对该受保护内容进行了保护处理的会话消息1802。
在一些实施例中,终端还可以在对目标会话消息的执行结果中隐藏受保护内容之后,发送分享提示信息至目标会话消息的发送端;其中,分享提示信息,用于提示在对目标会话消息中受保护内容进行保护处理后,目标会话消息被分享。
在实际实施时,在对目标会话消息的执行结果中隐藏受保护内容,可以自动发送一个分享提示信息至目标会话消息的发送端,以告知该发送端的用户,该目标会话消息已被分享,且目标会话消息中受保护内容已被保护处理。
这里,发送端可以是目标会话消息的原始发送端,也可以是转发该目标会话消息的转发端。
应用本申请实施例,通过响应于目标操作指令,对目标会话消息执行目标操作,并当目标会话消息中包含受保护内容时,在对目标会话消息的执行结果中隐藏受保护内容;如此,在检测到要对包含受保护内容的目标会话消息进行分享时,对该目标会话消息中受保护内容进行隐藏,能够避免受保护内容被传播泄露,提升受保护内容的安全性。
图19是本申请实施例提供的消息处理方法的流程示意图,参见图19,本申请实施例提供的消息处理方法包括:
步骤1901:终端在会话界面中呈现隐私保护控件。
在实际实施时,终端上设置有客户端,如即时通信客户端、社交客户端、学习客户端、游戏客户端等,通过客户端呈现会话界面,用户可以通过会话界面与其它用户进行交流。这里,在会话界面中呈现隐私保护控件,隐私保护控件用于控制隐私保护模式的开启和关闭,当隐私保护控件处于开启状态时,进入隐私保护模式;当隐私保护控件处于关闭状态时,退出隐私保护模式。
步骤1902:当隐私保护控件处于开启状态时,响应于针对会话界面中目标会话消息的发送指令,将目标会话消息的内容设置为受保护内容,并发送目标会话消息。
其中,受保护内容,在接收端触发指示对受保护内容执行目标操作的目标操作指令时,在对受保护内容的执行结果中对受保护内容进行保护处理。
在实际实施时,当隐私保护控件处于开启状态时,消息输入模式处于隐私保护模式,这时,通过消息输入控件输入的会话消息均为受保护内容,当用户通过消息输入控件输入目标会话消息后,触发针对目标会话消息的发送指令时,终端响应于该发送指令,将该目标会话消息设置为受保护内容,并对目标会话消息进行发送。这里的目标会话消息被发送后,为了避免受保护内容的泄露,在将目标会话消息分享给其它用户对象后,若该目标会话消息的接收者通过相应的接收端触发指示对目标会话消息执行目标操作目标操作指令,在对目标会话消息的执行结果中对目标会话消息(即受保护内容)进行保护处理。
步骤1903:当隐私保护控件处于关闭状态时,响应于针对会话界面中目标会话消息的发送指令,发送目标会话消息,在会话界面中呈现目标会话消息,并在接收到针对目标会话消 息的保护设置指令时,将目标会话消息的内容设置为受保护内容。
在实际实施时,当隐私保护控件处于关闭状态时,消息输入模式处于普通模式,在此模式下,发送的目标会话消息为普通会话消息,也即该目标会话消息可以被正常分享。对于普通会话消息,用户可以通过触发保护设置指令,将其设置为受保护内容。例如,参见图16,当目标会话消息为会话消息1601时,当接收到针对会话消息1601的长按操作,呈现对应该会话消息1601的工具栏,在工具栏中包括隐私保护按键1602;当接收到针对隐私保护按键的点击操作,将会话消息1601设置为受保护内容,并在该会话消息旁边显示保护标识1603,以指示该会话消息为受保护内容。
图20是本申请实施例提供的消息处理方法的流程示意图,参见图20,本申请实施例提供的消息方法由第一终端、第二终端和第三终端协同实施,本申请实施例提供的消息处理方法包括:
步骤2001:第一终端呈现第一会话界面,并在第一会话界面中呈现隐私保护控件。
这里的第一会话界面为第一终端的用户对象与第二终端的用户对象进行会话的会话界面。
步骤2002:第一终端响应于针对隐私保护控件的触发操作,呈现对应隐私保护模式的消息输入控件。
步骤2003:第一终端接收到基于对应隐私保护模式的消息输入控件输入的受保护内容。
步骤2004:第一终端响应于针对受保护内容的发送指令,发送受保护内容,并在会话界面中显示受保护内容。
步骤2005:第二终端在第二会话界面中显示受保护内容及其他会话消息。
这里的第二会话界面为第二终端的用户对象与第一终端的用户对象进行会话的会话界面。
步骤2006:第二终端响应于针对多条目标会话消息的选取操作指令,对目标会话消息进行标记,并对受保护内容进行模糊处理。
步骤2007:第二终端响应于针对多条目标会话消息的逐条转发指令,逐条发送各目标会话消息至第三终端。
步骤2008:第二终端在第三会话界面中逐条显示各目标会话消息,并在目标会话消息中对受保护内容进行模糊处理。
这里的第三会话界面第二终端的用户对象为与第三终端的用户对象进行会话的会话界面。
步骤2009:第三终端在第四会话界面中逐条显示各目标会话消息,并在目标会话消息中对受保护内容进行模糊处理。
这里的第四会话界面为第三终端的用户对象与第二终端的用户对象进行会话的会话界面。
应用本申请实施例,在对包含受保护内容的目标会话消息进行分享时,对该受保护内容进行保护处理,能够避免受保护内容被传播泄露,提升受保护内容的安全性。
下面,将说明本申请实施例在一个实际的应用场景中的示例性应用。在实际实施时,消息发送者可以对发送的消息进行设置,如将其设置为受保护内容;在消息接收者在通过截图、编辑、或直接转发等方式将受保护内容分享给其它用户对象时,会对受保护内容进行保护处理,如模糊处理,以避免该受保护内容被分享给其它对象。
这里,首先对消息发布者端进行说明。消息发布者可以是在发布消息(包括文字消息、语音转文字消息、图片信息)时,选择“隐私保护”模式,进行消息编辑并发送;或者,消息发布者发布信息(包括文字消息、语音转文字消息、图片信息)后,对已发送信息进行编辑,防止消息被截图泄漏。
作为示例,参见图15,在会话界面中显示隐私保护控件1501,当接收到针对隐私保护 控件1501的点击操作,进入隐私保护模式,这时输入的会话消息为受保护内容;当接收到针对输入的受保护内容的发送指令,发送该受保护内容,在会话界面中显示该受保护内容1502,并且,在该会话消息旁边会显示一个标识信息1503,该标识信息用于指示相应的会话消息为受保护内容。
作为示例,参见图16,在会话界面中显示多条会话消息,包括接收的会话消息和发送的会话消息,这里,对于发送的会话消息,如会话消息1601,当接收到针对会话消息1601的长按操作,呈现对应该会话消息1601的工具栏,在工具栏中包括隐私保护按键1602;当接收到针对隐私保护按键的点击操作,将会话消息1601设置为受保护内容,并在该会话消息旁边显示保护标识1603,以指示该会话消息为受保护内容。
这里接着对消息接收端进行说明。在实际应用中,消息接收到可以通过以下两种方式对接收到的会话消息进行分享。
在一些实施例中,终端可以通过对会话界面进行截图、编辑、转发,来实现会话消息的分享。例如,终端呈现包含多条会话消息的会话界面,其中,会话界面中包含受保护内容501,当终端接收到用于指示截屏(截图操作)的目标操作指令时,呈现包含受保护内容501的截图图像,并在截图图像中对受保护内容502进行保护处理,如遮挡受保护内容。
在一些实施例中,可以在会话界面中选择多个会话信息进行转发,来实现会话消息的分享。这里的转发可以是将多个会话信息逐条转发,也可以是将多个会话信息合并之后转发。
作为示例,以逐条转发为例,参见图10,在会话界面中接收到针对多条目标会话消息的选取操作,标记选择的多条目标会话消息;当接收到针对分享按键1001的点击操作,显示多个用户对象,用户可以从多个用户对象中选择一个作为目标会话消息的接收者,逐条发送各目标会话消息至所选择接收者的终端,并在与接收者进行会话的会话界面中,显示隐藏了受保护内容的各条会话消息。
作为示例,以合并转发为例,参见图8,在会话界面中接收到针对多条目标会话消息的选取操作,标记选择的多条目标会话消息;当接收到针对分享按键801的点击操作,显示多个用户对象,用户可以从多个用户对象中选择一个作为目标会话消息的接收者,将多条目标会话消息合并为一条会话消息发送至所选择接收者的终端,并在与接收者进行会话的会话界面中,显示该会话消息802,其中,该会话消息中的受保护内容被隐藏了。
需要说明的是,本申请实施例提供的消息处理方法可以应用于移动端,也可以应用于电脑端,这里对应用于电脑端的场景进行说明。
参见图17,在会话界面中显示多条会话消息,包括接收的会话消息和发送的会话消息,这里,对于发送的会话消息,如会话消息1701,当用户通过鼠标右键触发针对会话消息1701的点击操作时,呈现对应该会话消息1701的工具栏,在工具栏中包括隐私保护按键1702;当用户通过鼠标左键接收到针对隐私保护按键的点击操作,将会话消息1701设置为受保护内容,并在该会话消息旁边显示保护标识1703,以指示该会话消息为受保护内容。
参见图6,当接收到针对截图按键601的点击操作,进入截图状态,当进入截图状态后,对会话界面中的受保护内容602进行隐藏处理,即会话界面中的受保护内容602被隐藏;当终端接收到区域选取操作时,将该区域选取操作所对应的截图区域中的会话消息作为目标会话消息,其中,截图区域中包含被隐藏处理后的受保护内容602;当接收到确定截图操作时,对所选取的截图区域进行截图处理,得到包含被隐藏处理后的受保护内容602的截图图像,这里的截图图像中的受保护内容602被隐藏。
参见图11,在会话界面中接收到针对多条目标会话消息的选取操作,标记选择的多条目标会话消息,并显示逐条转发按键1101和合并转发按键1102。当终端接收到针对分享按键1101的点击操作时,显示多个用户对象,用户可以从多个用户对象中选择一个作为目标会话消息的接收者,逐条发送各目标会话消息至所选择接收者的终端,并在与接收者进行会话的会话界面中,显示隐藏了受保护内容的各条会话消息1103。
下面对本申请实施例提供的消息处理方法的技术侧实现进行说明。
以截图场景为例,图21是本申请实施例提供的消息处理方法的流程示意图,参见图21,本申请实施例提供的消息处理方法包括:
步骤2101:第一终端接收到针对会话消息的隐私保护指令。
步骤2102:第一终端对隐私保护指令所指示的会话消息进行标记。
步骤2103:第一终端将会话消息加密后发送给服务器。
步骤2104:服务器将会话消息解密后发送给第二终端。
步骤2105:第二终端展示会话消息。
这里的会话消息包括文字消息、图片消息、语音消息等。
步骤2106:第二终端接收到截图操作指令。
步骤2107:第二终端检测截图区域中的会话消息是否有标记信号,若是,执行步骤2108;否则,执行步骤2109。
步骤2108:第二终端对存在标注信号的会话消息进行高斯模糊处理,以隐藏该会话消息。
这里,视觉处理范围定位于信息载体框内,如高斯模糊设置值为18。当会话消息为语音消息时,可以对语音转文字后的文本内容进行高斯模糊处理。
需要说明的是,除了采用高斯模糊处理的方式来隐藏受保护内容,还可以采用动态或静态图像遮挡受保护内容的方式,如采用马赛克、趣味贴图、趣味动态特效(如焚烧中的特效)等。
步骤2109:第二终端展示全部会话消息。
步骤2110:第二终端执行截图操作。
以转发会话消息场景为例,图22是本申请实施例提供的消息处理方法的流程示意图,参见图22,本申请实施例提供的消息处理方法包括:
步骤2201:第一终端接收到针对会话消息的隐私保护指令。
步骤2202:第一终端对隐私保护指令所指示的会话消息进行标记。
步骤2203:第一终端将会话消息加密后发送给服务器。
步骤2204:服务器将会话消息解密后发送给第二终端。
步骤2205:第二终端展示会话消息。
这里的会话消息包括文字消息、图片消息、语音消息等。
步骤2206:第二终端接收到转发操作指令。
步骤2207:第二终端选择所要转发的会话消息。
步骤2208:第二终端检测所要转发的会话消息中是否有标记信号,若是,执行步骤2209;否则,执行步骤2210。
步骤2209:第二终端对存在标注信号的会话消息进行高斯模糊处理,以隐藏该会话消息。
步骤2210:第二终端展示全部会话消息。
步骤2211:第二终端发送所要转发的会话消息至服务器。
应用本申请实施例,能够保护用户可以通过设置受保护内容,来避免不愿意公开或者不确定是否存在风险的信息被传播泄露,进而提高沟通的信任度,让聊天更加畅所欲言。
下面继续说明本申请实施例提供的信息处理装置555的实施为软件模块的示例性结构,在一些实施例中,如图2所示,存储在存储器550的信息处理装置555中的软件模块可以包括:
显示模块5551,配置为呈现包含至少一条会话消息的会话界面;
接收模块5552,配置为在所述会话界面中,接收到目标操作指令,所述目标操作指令用于指示对目标会话消息执行目标操作,所述目标操作用于分享所述目标会话消息;
处理模块5553,配置为响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,并当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为当所述目标操作为转发操作时,响应于所述目标操作指令,将所述目标会话消息转发给所述转发操作指令所指示的目标对象;
当所述目标会话消息中包含受保护内容时,在与所述目标对象进行会话的会话界面中呈现所述目标会话消息,并在所述目标会话消息中对所述受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为当所述目标操作为截图操作时,响应于所述目标操作指令,对包含所述目标会话消息的区域进行截图处理,得到包含所述目标会话消息的截图图像;
当所述目标会话消息中包含受保护内容时,对所述截图图像中的受保护内容进行保护处理,并展示处理得到的截图图像。
在一些实施例中,所述处理模块5553,还配置为当所述目标操作为针对所述目标会话消息的选取操作时,响应于所述目标操作指令,在所述会话界面中,对所述目标会话消息进行标记;
当所述目标会话消息中包含受保护内容时,在所述会话界面中,对标记的所述目标会话消息中的所述受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为当所述目标会话消息的数量为至少两条时,响应于针对标记的所述目标会话消息的合并发送指令,将至少两条所述目标会话消息合并为合并会话消息,并发送所述合并会话消息;
在所述合并发送指令对应的会话界面中,显示所述合并会话消息,并在所述合并会话消息中对所述目标会话消息中包含的受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为当所述目标会话消息的数量为至少两条时,响应于针对所述目标会话消息的逐条发送指令,逐条发送各所述目标会话消息;
在所述逐条发送指令所对应的会话界面中,逐条显示各所述目标会话消息,并在各所述目标会话消息中对相应的所述受保护内容进行保护处理。
在一些实施例中,所述显示模块5551,还配置为在所述会话界面中,在包含受保护内容的会话消息的关联区域中,显示相应会话消息的保护标识,所述保护标识用于指示所述会话消息包含受保护内容;
所述处理模块5553,还配置为当所述目标会话消息的关联区域中显示有对应所述目标会话消息的保护标识时,在对所述目标会话消息的执行结果中对所述目标会话消息进行隐藏处理。
在一些实施例中,所述处理模块5553,还配置为当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中,所述受保护内容所处位置添加静态或动态的目标图像,以使所述目标图像覆盖于所述受保护内容之上。
在一些实施例中,所述处理模块5553,还配置为当所述目标会话消息中包含受保护内容时,对所述目标会话消息的执行结果中的所述受保护内容进行模糊处理,以使所述受保护内容处于屏蔽状态。
在一些实施例中,所述处理模块5553,还配置为当所述目标会话消息中包含受保护内容时,将所述受保护内容从对所述目标会话消息的执行结果中删除,以对所述受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为响应于针对所述执行结果的转发操作,呈现提示信息;
其中,所述提示信息用于指示无法对所述受保护内容进行转发。
在一些实施例中,所述显示模块5551,还配置为当所述目标会话消息为语音消息时,响应于针对所述语音消息的文本查看指令,显示所述语音消息对应的文本内容;
所述处理模块5553,还配置为当所述目标操作为截图操作时,响应于所述目标操作指令,对包含所述文本内容的区域进行截图处理,得到包含所述文本内容的截图图像;
当所述语音消息中包含受保护内容时,在所述截图图像中对所述文本内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为接收到包含受保护内容的会话消息,并呈现接收到的所述会话消息;其中,所述会话消息中的受保护内容经保护处理;
响应于针对所述受保护内容的查看操作,发送查看请求至所述会话消息的原始发送端;
当所述原始发送端触发同意查看指令时,获取所述原始发送端发送的未经保护处理的所述受保护内容,并展示未经保护处理的所述受保护内容。
在一些实施例中,所述处理模块5553,还配置为在所述会话界面中呈现隐私保护控件;
响应于针对所述隐私保护控件的触发操作,呈现对应隐私保护模式的消息输入控件;
接收到基于所述对应隐私保护模式的消息输入控件输入的受保护内容;
响应于针对所述受保护内容的发送指令,发送所述受保护内容,并在所述会话界面中显示所述受保护内容;
其中,所述受保护内容,用于在接收端触发指示对所述受保护内容执行目标操作目标操作指令时,在对所述受保护内容的执行结果中对所述受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为在所述会话界面中,接收到针对至少一条会话消息的保护设置指令;
响应于所述保护设置指令,将所述至少一条会话消息设置为受保护内容,以在接收端触发的指示对所述受保护内容执行目标操作目标操作指令时,在对所述受保护内容的执行结果中对所述受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为在所述会话界面中,接收到针对会话消息中部分内容的保护设置指令;
响应于所述保护设置指令,将所述会话消息中所述保护设置指令所指示的部分内容作为受保护内容,以在接收端触发指示对所述会话消息执行目标操作目标操作指令时,在对所述会话消息的执行结果中对所述受保护内容进行保护处理。
在一些实施例中,所述处理模块5553,还配置为发送分享提示信息至所述目标会话消息的发送端;
其中,所述分享提示信息,用于提示在对所述目标会话消息中受保护内容进行保护处理后,所述目标会话消息被分享。
本申请实施例提供一种消息处理装置,包括:
在会话界面中呈现隐私保护控件;
第一发送模块,配置为当所述隐私保护控件处于开启状态时,响应于针对目标会话消息的发送指令,将所述目标会话消息设置为受保护内容,并发送所述目标会话消息;
第二发送模块,配置为当所述隐私保护控件处于关闭状态时,响应于针对目标会话消息的发送指令,发送所述目标会话消息,并在所述会话界面中呈现所述目标会话消息;响应于针对所述目标会话消息的保护设置指令,将所述目标会话消息设置为受保护内容;
其中,所述受保护内容,在接收端触发指示对所述受保护内容执行目标操作目标操作指令时,在对所述受保护内容进行保护处理。
本申请实施例提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行本申请实施例上述的消息处理方法。
本申请实施例提供一种存储有可执行指令的计算机可读存储介质,其中存储有可执行指令,当可执行指令被处理器执行时,将引起处理器执行本申请实施例提供的方法,例如,如图3示出的方法。
在一些实施例中,计算机可读存储介质可以是FRAM、ROM、PROM、EPROM、EEPROM、闪存、磁表面存储器、光盘、或CD-ROM等存储器;也可以是包括上述存储器之一或任意组合的各种设备。
在一些实施例中,可执行指令可以采用程序、软件、软件模块、脚本或代码的形式,按任意形式的编程语言(包括编译或解释语言,或者声明性或过程性语言)来编写,并且其可按任意形式部署,包括被部署为独立的程序或者被部署为模块、组件、子例程或者适合在计算环境中使用的其它单元。
作为示例,可执行指令可以但不一定对应于文件系统中的文件,可以可被存储在保存其它程序或数据的文件的一部分,例如,存储在超文本标记语言(HTML,Hyper Text Markup Language)文档中的一个或多个脚本中,存储在专用于所讨论的程序的单个文件中,或者,存储在多个协同文件(例如,存储一个或多个模块、子程序或代码部分的文件)中。
作为示例,可执行指令可被部署为在一个计算设备上执行,或者在位于一个地点的多个计算设备上执行,又或者,在分布在多个地点且通过通信网络互连的多个计算设备上执行。
以上所述,仅为本申请的实施例而已,并非用于限定本申请的保护范围。凡在本申请的精神和范围之内所作的任何修改、等同替换和改进等,均包含在本申请的保护范围之内。

Claims (21)

  1. 一种消息处理方法,所述方法由计算机设备执行,所述方法包括:
    呈现包含至少一条会话消息的会话界面;
    在所述会话界面中,接收到目标操作指令,所述目标操作指令用于指示对目标会话消息执行目标操作,所述目标操作用于分享所述目标会话消息;
    响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,并当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理。
  2. 如权利要求1所述的方法,其中,所述响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,包括:
    当所述目标操作为转发操作时,响应于所述目标操作指令,将所述目标会话消息转发给所述转发操作指令所指示的目标对象;
    当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理,包括:
    当所述目标会话消息中包含受保护内容时,在与所述目标对象进行会话的会话界面中呈现所述目标会话消息,并在所述目标会话消息中对所述受保护内容进行保护处理。
  3. 如权利要求1所述的方法,其中,所述响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,包括:
    当所述目标操作为截图操作时,响应于所述目标操作指令,对包含所述目标会话消息的区域进行截图处理,得到包含所述目标会话消息的截图图像;
    当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理,包括:
    当所述目标会话消息中包含受保护内容时,对所述截图图像中的受保护内容进行保护处理,并展示处理得到的截图图像。
  4. 如权利要求1所述的方法,其中,所述响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,包括:
    当所述目标操作为针对所述目标会话消息的选取操作时,响应于所述目标操作指令,在所述会话界面中,对所述目标会话消息进行标记;
    当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中隐藏所述受保护内容,包括:
    当所述目标会话消息中包含受保护内容时,在所述会话界面中,对标记的所述目标会话消息中的所述受保护内容进行保护处理。
  5. 如权利要求4所述的方法,其中,所述对标记的所述目标会话消息中的所述受保护内容进行保护处理之后,还包括:
    当所述目标会话消息的数量为至少两条时,响应于针对标记的所述目标会话消息的合并发送指令,将至少两条所述目标会话消息合并为合并会话消息,并发送所述合并会话消息;
    在所述合并发送指令对应的会话界面中,显示所述合并会话消息,并在所述合并会话消息中对各所述目标会话消息中包含的受保护内容进行保护处理。
  6. 如权利要求4所述的方法,其中,所述对标记的所述目标会话消息中的所述受保护内容进行保护处理之后,还包括:
    当所述目标会话消息的数量为至少两条时,响应于针对所述目标会话消息的逐条发送指令,逐条发送各所述目标会话消息;
    在所述逐条发送指令所对应的会话界面中,逐条显示各所述目标会话消息,并在各所述目标会话消息中对相应的所述受保护内容进行保护处理。
  7. 如权利要求1所述的方法,其中,所述方法还包括:
    在所述会话界面中,在包含受保护内容的会话消息的关联区域中,显示相应会话消息的保护标识,所述保护标识用于指示所述会话消息包含受保护内容;
    所述当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理,包括:
    当所述目标会话消息的关联区域中显示有对应所述目标会话消息的保护标识时,在对所述目标会话消息的执行结果中对所述目标会话消息进行保护处理。
  8. 如权利要求1所述的方法,其中,所述当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理,包括:
    当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中,所述受保护内容所处位置添加静态或动态的目标图像,以使所述目标图像覆盖于所述受保护内容之上。
  9. 如权利要求1所述的方法,其中,所述当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理,包括:
    当所述目标会话消息中包含受保护内容时,对所述目标会话消息的执行结果中的所述受保护内容进行模糊处理,以使所述受保护内容处于屏蔽状态。
  10. 如权利要求1所述的方法,其中,所述当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理,包括:
    当所述目标会话消息中包含受保护内容时,将所述受保护内容从对所述目标会话消息的执行结果中删除。
  11. 如权利要求1所述的方法,其中,所述在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理之后,还包括:
    响应于针对所述执行结果的转发操作,呈现提示信息;
    其中,所述提示信息用于指示无法对所述受保护内容进行转发。
  12. 如权利要求1所述的方法,其中,所述接收到指示对目标会话消息执行目标操作的目标操作指令之前,还包括:
    当所述目标会话消息为语音消息时,响应于针对所述语音消息的文本查看指令,显示所述语音消息对应的文本内容;
    响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,包括:
    当所述目标操作为截图操作时,响应于所述目标操作指令,对包含所述文本内容的区域进行截图处理,得到包含所述文本内容的截图图像;
    当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理,包括:
    当所述语音消息中包含受保护内容时,在所述截图图像中对所述文本内容进行保护处理。
  13. 如权利要求1所述的方法,其中,所述方法还包括:
    接收到包含受保护内容的会话消息,并呈现接收到的所述会话消息;其中,所述会话消息中的受保护内容经保护处理;
    响应于针对所述受保护内容的查看操作,发送查看请求至所述会话消息的原始发送端;
    当所述原始发送端触发同意查看指令时,获取所述原始发送端发送的未经保护处理的所述受保护内容,并展示未经保护处理的所述受保护内容。
  14. 如权利要求1所述的方法,其中,所述方法还包括:
    在所述会话界面中呈现隐私保护控件;
    响应于针对所述隐私保护控件的触发操作,呈现对应隐私保护模式的消息输入控件;
    接收到基于所述对应隐私保护控件的消息输入控件输入的受保护内容;
    响应于针对所述受保护内容的发送指令,发送所述受保护内容,并在所述会话界面中显示所述受保护内容;
    其中,所述受保护内容,用于在接收端触发的指示对所述受保护内容执行目标操作目标 操作指令时,在对所述受保护内容的执行结果中对所述受保护内容进行保护处理。
  15. 如权利要求1所述的方法,其中,所述方法还包括:
    在所述会话界面中,接收到针对至少一条会话消息的保护设置指令;
    响应于所述保护设置指令,将所述至少一条会话消息设置为受保护内容,以在接收端触发指示对所述受保护内容执行目标操作目标操作指令时,在对所述受保护内容的执行结果中对所述受保护内容进行保护处理。
  16. 如权利要求1所述的方法,其中,所述方法还包括:
    在所述会话界面中,接收到针对会话消息中部分内容的保护设置指令;
    响应于所述保护设置指令,将所述会话消息中所述保护设置指令所指示的部分内容作为受保护内容,以在接收端触发指示对所述会话消息执行目标操作目标操作指令时,在对所述会话消息的执行结果中对所述受保护内容进行保护处理。
  17. 一种消息处理方法,所述方法由计算机设备执行,包括:
    在会话界面中呈现隐私保护控件;
    当所述隐私保护控件处于开启状态时,响应于针对所述会话界面中目标会话消息的发送指令,将所述目标会话消息的内容设置为受保护内容,并发送所述目标会话消息;
    当所述隐私保护控件处于关闭状态时,响应于针对所述会话界面中目标会话消息的发送指令,发送所述目标会话消息,在所述会话界面中呈现所述目标会话消息,并在接收到针对所述目标会话消息的保护设置指令时,将所述目标会话消息的内容设置为受保护内容;
    其中,所述受保护内容,在接收端触发指示对所述受保护内容执行目标操作的目标操作指令时,在对所述受保护内容的执行结果中对所述受保护内容进行保护处理。
  18. 一种消息处理装置,包括:
    显示模块,配置为呈现包含至少一条会话消息的会话界面;
    接收模块,配置为在所述会话界面中,接收到目标操作指令,所述目标操作指令用于指示对目标会话消息执行目标操作,所述目标操作用于分享所述目标会话消息;
    处理模块,配置为响应于所述目标操作指令,对所述目标会话消息执行所述目标操作,并当所述目标会话消息中包含受保护内容时,在对所述目标会话消息的执行结果中对所述受保护内容进行保护处理。
  19. 一种计算机设备,包括:
    存储器,用于存储可执行指令;
    处理器,用于执行所述存储器中存储的可执行指令时,实现权利要求1至17任一项所述的消息处理方法。
  20. 一种计算机可读存储介质,存储有可执行指令,用于被处理器执行时,实现权利要求1至17任一项所述的消息处理方法。
  21. 一种计算机程序产品,包括计算机程序或指令,所述计算机程序或指令被处理器执行时,实现权利要求1至17任一项所述的消息处理方法。
PCT/CN2022/086271 2021-05-19 2022-04-12 消息处理方法、装置、设备、存储介质及程序产品 WO2022242376A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/991,455 US20230088720A1 (en) 2021-05-19 2022-11-21 Message processing method and apparatus, device, storage medium, and program product

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110546504.3 2021-05-19
CN202110546504.3A CN115374451A (zh) 2021-05-19 2021-05-19 消息处理方法、装置、设备及计算机可读存储介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/991,455 Continuation US20230088720A1 (en) 2021-05-19 2022-11-21 Message processing method and apparatus, device, storage medium, and program product

Publications (1)

Publication Number Publication Date
WO2022242376A1 true WO2022242376A1 (zh) 2022-11-24

Family

ID=84058533

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/086271 WO2022242376A1 (zh) 2021-05-19 2022-04-12 消息处理方法、装置、设备、存储介质及程序产品

Country Status (3)

Country Link
US (1) US20230088720A1 (zh)
CN (1) CN115374451A (zh)
WO (1) WO2022242376A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113835809A (zh) * 2021-09-24 2021-12-24 深圳集智数字科技有限公司 一种隐藏处理方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021083146A1 (zh) 2019-10-30 2021-05-06 北京字节跳动网络技术有限公司 视频处理方法、装置、终端及存储介质
CN117425057A (zh) 2022-07-07 2024-01-19 抖音视界(北京)有限公司 用于影像拍摄的方法、装置、设备和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110262735A (zh) * 2019-06-17 2019-09-20 深圳传音控股股份有限公司 截图的处理方法和移动终端
CN112035878A (zh) * 2020-08-31 2020-12-04 维沃移动通信(杭州)有限公司 信息显示方法、装置和电子设备
CN112100041A (zh) * 2020-08-03 2020-12-18 联想(北京)有限公司 一种处理方法、装置及电子设备
CN112306590A (zh) * 2019-07-30 2021-02-02 腾讯科技(深圳)有限公司 一种截图生成的方法以及相关装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110262735A (zh) * 2019-06-17 2019-09-20 深圳传音控股股份有限公司 截图的处理方法和移动终端
CN112306590A (zh) * 2019-07-30 2021-02-02 腾讯科技(深圳)有限公司 一种截图生成的方法以及相关装置
CN112100041A (zh) * 2020-08-03 2020-12-18 联想(北京)有限公司 一种处理方法、装置及电子设备
CN112035878A (zh) * 2020-08-31 2020-12-04 维沃移动通信(杭州)有限公司 信息显示方法、装置和电子设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113835809A (zh) * 2021-09-24 2021-12-24 深圳集智数字科技有限公司 一种隐藏处理方法及装置

Also Published As

Publication number Publication date
CN115374451A (zh) 2022-11-22
US20230088720A1 (en) 2023-03-23

Similar Documents

Publication Publication Date Title
WO2022242376A1 (zh) 消息处理方法、装置、设备、存储介质及程序产品
CN109844717B (zh) 用于移动应用程序的实时远程控制的系统和方法
US10129313B2 (en) System, method, and logic for managing content in a virtual meeting
CN109491567B (zh) 一种消息回复方法、装置、终端及存储介质
US9613340B2 (en) Method and system for shared document approval
US20150012831A1 (en) Systems and methods for sharing graphical user interfaces between multiple computers
US10558329B2 (en) Techniques for insertion of content into chat communication
US11379550B2 (en) Seamless service on third-party sites
CN104346075A (zh) 进行截图处理的方法和客户端
US20220201049A1 (en) Systems and methods for sharing content externally from a group-based communication platform
WO2017140242A1 (zh) 一种信息处理方法及客户端
WO2016127882A1 (zh) 一种消息回复方法和装置
CN110633116A (zh) 截图处理方法及装置
CN112969097A (zh) 内容播放方法和装置、内容评论方法和装置
US20230385426A1 (en) Encryption Method and Apparatus, Electronic Device, and Medium
WO2018131031A2 (en) Message privacy
US20180343563A1 (en) Method and system for using a plurality of accounts in an instant messaging application
WO2023246715A1 (zh) 目标应用的网络连接控制方法、装置和电子设备
CN107222398A (zh) 社交消息控制方法、装置、存储介质和计算机设备
US10491631B1 (en) Apparatus and method for augmenting a messaging application with cryptographic functions
US11528246B2 (en) Graphical user interfaces with indications that electronic messages have been acted upon
CN115718581A (zh) 信息显示方法、装置、电子设备和存储介质
US11329936B1 (en) Visual representation of sender domain information and e-mail routing
CN115086747A (zh) 信息处理方法、装置、电子设备和可读存储介质
CN112016280B (zh) 一种文件编辑方法、装置及计算机可读介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22803701

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22803701

Country of ref document: EP

Kind code of ref document: A1