WO2024051247A1 - 应用的共享方法、系统、电子设备和存储介质 - Google Patents

应用的共享方法、系统、电子设备和存储介质 Download PDF

Info

Publication number
WO2024051247A1
WO2024051247A1 PCT/CN2023/100009 CN2023100009W WO2024051247A1 WO 2024051247 A1 WO2024051247 A1 WO 2024051247A1 CN 2023100009 W CN2023100009 W CN 2023100009W WO 2024051247 A1 WO2024051247 A1 WO 2024051247A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
sharing
information
terminal
interface
Prior art date
Application number
PCT/CN2023/100009
Other languages
English (en)
French (fr)
Inventor
陈星亚
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024051247A1 publication Critical patent/WO2024051247A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units

Definitions

  • the present disclosure relates to the field of communication technology, and specifically relates to an application sharing method, system, electronic device and storage medium.
  • the present disclosure provides an application sharing method, system, electronic device and storage medium.
  • Embodiments of the present disclosure provide an application sharing method.
  • the method includes: obtaining sharing requirement information, which is information determined based on a preset list and the user's operation instruction information; and changing the preset list based on the sharing requirement information.
  • the sharing interface is an interface for data sharing between the current device and at least one peer device.
  • An embodiment of the present disclosure provides a sharing system, including: a first terminal and at least one second terminal; the first terminal is configured to execute any application sharing method in the embodiment of the present disclosure; the second terminal is configured To obtain the sharing information sent by the first terminal and display the sharing interface according to the sharing information.
  • Embodiments of the present disclosure provide an electronic device, including: one or more processors; and a memory on which one or more programs are stored. When the one or more programs are executed by one or more processors, one or more Each processor implements the sharing method of any application in the embodiments of the present disclosure.
  • Embodiments of the present disclosure provide a readable storage medium that stores a computer program.
  • the computer program is executed by a processor, the sharing method of any application in the embodiments of the present disclosure is implemented.
  • FIG. 1 shows a schematic flowchart of an application sharing method provided by an embodiment of the present disclosure.
  • FIG. 2 shows a schematic diagram of the display of the sharing interface provided by the embodiment of the present disclosure before and after the application is shared.
  • FIG. 3 shows a schematic diagram of applications displayed in the first terminal and the second terminal provided by an embodiment of the present disclosure.
  • FIG. 4 shows a schematic diagram of applications displayed in the first terminal and the second terminal provided by yet another embodiment of the present disclosure.
  • Figure 5 shows a schematic diagram of a blacklist and a whitelist provided by an embodiment of the present disclosure.
  • FIG. 6 shows a block diagram of an application sharing device provided by an embodiment of the present disclosure.
  • Figure 7 shows a block diagram of a terminal provided by an embodiment of the present disclosure.
  • Figure 8 shows a block diagram of a sharing system provided by an embodiment of the present disclosure.
  • FIG. 9 shows a schematic flowchart of an application sharing method provided by yet another embodiment of the present disclosure.
  • FIG. 10 shows a structural diagram of an exemplary hardware architecture of a computing device capable of implementing shared methods and apparatus for applications according to embodiments of the present disclosure.
  • FIG. 1 shows a schematic flowchart of an application sharing method provided by an embodiment of the present disclosure. This method can be applied to shared devices of applications. As shown in Figure 1, the application sharing method in the embodiment of the present disclosure includes but is not limited to the following steps.
  • Step S101 Obtain sharing requirement information.
  • the sharing demand information is information determined based on the preset list and the user's operation instruction information.
  • the default list includes at least one default application.
  • the default application can be applications such as text messages, address books, communication records, and photo galleries.
  • the user privacy information corresponding to different preset applications may be different.
  • the present disclosure is not limited to this, and the preset application may also be other applications that the user does not want to share.
  • the preset application can also be a video playing application, a game application, a mailbox application, etc.
  • Step S102 Change the operating status of the default application in the default list in the sharing interface according to the sharing requirement information.
  • the sharing interface is an interface for data sharing between the current device and at least one peer device.
  • the operating status of the default application does not remain unchanged. Instead, the operating status of the default application can be determined according to specific application scenarios and the user's own wishes. For example, in scenarios that do not involve privacy exposure, the operating status of the preset application in the sharing interface can be modified to be operable to improve the user experience; in scenarios that involve privacy exposure, the preset application can be modified in the sharing interface. The operation status is changed to inoperable to protect user privacy. Therefore, through the application sharing method provided by the embodiments of the present disclosure, the operational security of the preset application can be ensured and the user experience can be improved.
  • the operating state of the game application is an operable state; however, the user of the current device needs to perform
  • the game application will include the user's private information (such as game account and password information).
  • the sharing requirement information needs to be determined based on the user's operation instruction information and default name. , so that the sharing demand information can reflect the user's real-time usage needs (for example, you do not want to share the game application including game account and password information to other corresponding devices, etc.), thereby changing the game application in the default list on the sharing interface. display status. It enables the user of the current device to dynamically adjust the display status of the default application in the default list in the sharing interface in real time, so that the peer device cannot operate the default application and reduces the risk of user privacy information.
  • changing the operating status of the default applications in the default list in the sharing interface based on the sharing requirement information in step S102 can be implemented in the following ways:
  • the operation state of the preset application is changed from one of the inoperable state and the operable state to the inoperable state. and the other in an operational state.
  • the operation state of the preset application is an inoperable state
  • the operation state of the preset application is an operable state
  • the operation state of the application is preset to be an operable state.
  • the operation state of the default application was the operable state.
  • the operation state of the default application was the inoperable state.
  • the default application is an application that includes the user's private information.
  • the operating state of the default application corresponding to the operation instruction of the first type of operation is an operable state
  • the operation state of the default application can be changed to an inoperable state after receiving the operation instruction of the first type of operation.
  • the first type of operation may include: the user double-clicks on the preset application, or the user right-clicks on the preset application, etc. .
  • the operating status of the preset application can be changed.
  • the sharing method may also include:
  • the icons of applications whose operation status is operable can be set to color.
  • the display state of the default application in the sharing interface can also be changed, so that the display state of the changed default application can be consistent with the display state of the default application before the update. Different from each other, it facilitates user operations, dynamically meets user needs, and improves user experience.
  • the current device sends operation instruction information to the operating system of the current device, so that the operating system of the current device can change based on the operating state and display state of the default application, thereby changing the operating state of the default application from the available state.
  • the icons of the default applications are changed from color to gray so that the peer device cannot operate the default applications with gray icons, thereby reducing the risk of leaking private information included in the default applications and improving information security. sex.
  • step S102 of changing the operating status of the default application in the sharing interface based on the sharing requirement information it also includes: using the display status corresponding to the changed operating status, The icon of the preset application is displayed in the sharing interface.
  • the display state corresponding to the inoperable state is displayed in gray, and the display state corresponding to the operable state is displayed in color.
  • displaying the default application in the sharing interface can quickly and accurately let the peer device know which default applications can be used and which ones can be used. Default applications cannot be used, thereby simplifying the operation of the peer device in the shared interface and improving the efficiency of the peer device in operating the shared interface. Moreover, based on the grayscale display method, it can reduce the frequency of operations of the peer device on preset applications that the current device does not want to share, reduce the risk of private information being leaked, and improve the security of private information.
  • FIG. 2 shows a schematic diagram of the display of the sharing interface provided by an embodiment of the present disclosure before and after the application is shared.
  • the display interface 210 before sharing in Figure 2(A) displays: Application 1, Application 2, Application 3, Application 3, SMS 211, photo gallery 212 and phone call 213.
  • the icons of the above applications are all displayed in a normal state.
  • the icons of the text messages 211, the gallery 212 and the phone 213 are all If the grayscale image (the grayscale image is represented by a filled diagonal line in Figure 2(B)) is displayed, it means that the text message 211, the gallery 212 and the phone call 213 are not available, so that the peer device cannot pass the sharing process.
  • the screen display interface 210 operates the text messages 211, gallery 212 and phone calls 213, thereby reducing the risk of leaking the user's private information.
  • step S101 before obtaining the sharing requirement information in step S101, it also includes: determining the instruction sending end of the operation instruction information; determining that the instruction sending end of the operation instruction information is the current device, and the operation instruction information includes the second In the case of class operations, the operation instruction information is discarded.
  • the second type of operation includes: the user clicks on the preset application, or the user clicks the left mouse button on the preset application, etc.
  • the operation instruction information can be discarded and no response to this type of operation instruction information can be made.
  • the operation instruction information can be discarded and no response to this type of operation instruction information can be made.
  • step S101 before performing the acquisition of the sharing requirement information in step S101, it also includes: determining the instruction sending end of the operation instruction information; when it is determined that the instruction sending end is the peer device, discarding the operation instruction information.
  • the peer device can only operate applications whose operating status is currently configured as available, and does not have the right to restore applications that are displayed in the default display mode, it is guaranteed that the peer device cannot view the current device. Shielded user privacy information improves the security of user privacy information.
  • the default display mode may include: grayscale display, transparent display and other display modes, so that the default application displayed in the default display mode can be distinguished from the display modes of other default applications that can be operated by the peer device , so that the peer device cannot operate the preset application displayed in grayscale display or transparent display through the shared interface, thereby reducing the risk of leakage of private information included in the preset application.
  • FIG. 3 shows a schematic diagram of applications displayed in a first terminal and a second terminal provided by an embodiment of the present disclosure.
  • the following applications are displayed in the sharing interface 310 of the first terminal in Figure 3(A): Application 1, Application 2, Application 3, Application 4, SMS 311, Gallery 312 and Phone 313.
  • text messages 311, gallery 312 and phone calls 313 are all displayed as grayscale images; while other applications (such as application 1, application 2, application 3, application 4, etc.) are all displayed as normal images.
  • the security of private information (such as text message content, contact phone numbers, etc.) can be ensured. It enables the second terminal to operate the preset application that can be displayed normally based on the shared interface instead of operating the preset application including the user's private information, thereby improving data security.
  • FIG. 4 shows an application displayed in a first terminal and a second terminal provided by yet another embodiment of the present disclosure. Schematic diagram used. As shown in Figure 4, the following applications are displayed in the sharing interface 410 of the first terminal in Figure 4(A): Application 1, Application 2, Application 3, Application 4, SMS 411, Gallery 412 and Phone 413.
  • the gallery 412 and the phone number 413 are both displayed in grayscale images.
  • the display state of the text message 411 in Figure 4(A) and Figure 4(B) is changed from the original grayscale image display mode. It is the normal display mode (such as displaying in color image, etc.).
  • after discarding the operation instruction information it also includes: generating prompt information; and displaying the prompt information in the sharing interface.
  • the prompt information includes that the instruction sending end is the peer device, and the display status of the preset application.
  • the prompt information includes the identification of the peer device that performs screen sharing with the current device, and the display status of a certain default application (for example, the display status of the default application A is "unavailable status", etc.).
  • the user of the current device can clarify the use requirements of the peer device for certain preset applications, and based on the settings of the user of the current device, determine whether to open the use rights of the preset application to the peer device, thereby improving the user experience of the peer device. end device usage experience.
  • the user of the current terminal can determine whether to activate the application corresponding to the prompt information.
  • the method further includes: in response to the operation instruction of the first type of operation, updating the default list according to the identification of the application corresponding to the operation instruction of the first type of operation.
  • the operation status of the default application in the default list needs to be changed in the sharing interface. At this time, it is necessary to complete the operation of the default application. After the operation status changes, the default list is updated to ensure that different default applications are in different default lists.
  • preset lists include: blacklist and/or whitelist.
  • the operating status of the applications in the blacklist in the sharing interface is unavailable, and the operating status of the applications in the whitelist in the sharing interface is available.
  • the blacklist and whitelist set therein are mutually exclusive, that is, an application can only be added to one list to ensure that the operating status of the application is unique when sharing. sex.
  • FIG. 5 shows a schematic diagram of a blacklist and a whitelist provided by an embodiment of the present disclosure.
  • the application display setting interface 510 on the first terminal includes a blacklist 511 and a whitelist 512; by setting the blacklist 511 and the whitelist 512, the identity of the application displayed on the second terminal can be determined. As a result, applications including user private information are not operated by the second terminal, and the risk of leakage of user private information is reduced.
  • the blacklist 511 includes: the first application 5111, the second application 5112, the third application 5113, the fourth application 5114 and other applications;
  • the whitelist 512 includes: the fifth application 5121, the sixth application 5122, the seventh application 5123 and many other applications.
  • the first terminal chooses to activate the blacklist 511 by default, so that multiple applications in the blacklist 511 can be filtered out, so that when sharing applications, the first terminal and the second terminal can only operate applications other than the blacklist 511. Other applications, avoid The second terminal operates each application in the blacklist 511 to reduce the risk of leaking private information included in each application in the blacklist 511.
  • the first terminal can also set the white list 512 to empty.
  • a preset operation for example, double-clicking an application to be updated to change the display status of the application to be updated
  • the changed application to be updated can be added to the whitelist 512, so that the second terminal can operate each application in the whitelist 512 through the shared interface, improving Second terminal usage experience.
  • FIG. 6 shows a block diagram of an application sharing device provided by an embodiment of the present disclosure.
  • the application sharing device 600 includes but is not limited to the following modules.
  • the acquisition module 601 is configured to acquire sharing requirement information, which is information determined based on the preset list and the user's operation instruction information.
  • the change module 602 is configured to change the operating status of the default application in the default list in the sharing interface based on the sharing requirement information.
  • the sharing interface is an interface for data sharing between the current device and at least one peer device.
  • application sharing device 600 in this embodiment can implement any application sharing method in the embodiments of this disclosure.
  • the sharing requirement information is obtained through the acquisition module.
  • the sharing requirement information is information determined based on the preset list and the user's operation instruction information, which can make it clear that the current device is communicating with at least one peer device.
  • the sharing requirements during the data sharing process facilitate the operation of the default applications in the sharing interface; use the change module to change the operating status of the default applications in the default list in the sharing interface based on the sharing requirement information to reduce at least
  • a peer device has the possibility to control preset applications including the user's private information, so as to protect the user's private information from being leaked and ensure the security of the private information.
  • Figure 7 shows a block diagram of a terminal provided by an embodiment of the present disclosure.
  • the terminal 700 includes: at least one application sharing device 701 ; the application sharing device 701 is configured to implement any application sharing method in the embodiment of the present disclosure.
  • the sharing device of the application uses the acquisition module to obtain the sharing requirement information.
  • the sharing requirement information is information determined based on the preset list and the user's operation instruction information, which can clarify that the current device is communicating with at least one peer.
  • the sharing requirements of the device during the data sharing process facilitate the operation of the default applications in the sharing interface; use the change module to change the operating status of the default applications in the default list in the sharing interface based on the sharing requirement information.
  • Figure 8 shows a block diagram of a sharing system provided by an embodiment of the present disclosure.
  • the sharing system includes but is not limited to the following devices: a first terminal 801 and at least one second terminal 802.
  • the first terminal 801 is configured to execute any application sharing method in the embodiments of the present disclosure.
  • the second terminal 802 is configured to obtain the sharing information sent by the first terminal 801 and display the sharing interface according to the sharing information.
  • the sharing interface is an interface for the first terminal 801 and the second terminal 802 to share data.
  • the first terminal 801 and the second terminal 802 are connected through a communication network, and the first terminal 801 obtains the sharing requirement information.
  • the sharing requirement information is information determined based on the preset list and the user's operation instruction information; according to the sharing requirement information , changing the operating status of the default application in the default list in the sharing interface.
  • the sharing interface is an interface for data sharing between the first terminal 8010 and at least one second terminal 802.
  • the second terminal can reduce the frequency of operations of the default application whose display status has changed, thereby reducing the number of users of the default application.
  • the risk of leaking private information the second terminal can obtain the information of the preset application that can be displayed normally.
  • the preset application that is displayed normally is an application that does not include the user's private information.
  • FIG. 9 shows a schematic flowchart of an application sharing method provided by yet another embodiment of the present disclosure.
  • the application sharing method in the embodiment of the present disclosure includes but is not limited to the following steps.
  • Step S901 The first terminal reads the configuration file and obtains blacklist information and whitelist information.
  • the blacklist stores the identifiers of multiple default applications, and the default application is an application displayed in the sharing interface in a normal display mode;
  • the white list stores the identifiers of multiple default applications, and the default application It is an application that displays in the shared interface in a default display mode.
  • the blacklist information includes: the activation ID of the blacklist (for example, isCheckedblackList is used to represent the activation ID. When isCheckedblackList is set to true, it indicates that the blacklist is activated; when isCheckedblackList is set to false, it indicates that the blacklist is not activated).
  • isCheckedblackList is used to represent the activation ID. When isCheckedblackList is set to true, it indicates that the blacklist is activated; when isCheckedblackList is set to false, it indicates that the blacklist is not activated).
  • the whitelist information includes: the activation ID of the whitelist (for example, isCheckedwhiteList is used to represent the activation ID. When isCheckedwhiteList is set to true, it indicates that the whitelist is activated; when isCheckedwhiteList is set to false, it indicates that the whitelist is not activated).
  • isCheckedwhiteList is used to represent the activation ID. When isCheckedwhiteList is set to true, it indicates that the whitelist is activated; when isCheckedwhiteList is set to false, it indicates that the whitelist is not activated).
  • isCheckedblackList and isCheckedwhiteList are mutually exclusive identifiers.
  • Step S902 The first terminal determines which list to use to determine the information of the application to be shared with at least one second terminal based on the blacklist information and the whitelist information.
  • the application to be shared is an application that does not include the user's private information.
  • step S903 is performed, which means that the first terminal and the second terminal can share the information in the first terminal. All applications.
  • Step S903 Set all applications in the first terminal as applications to be shared, so that the first terminal and the second terminal can operate the applications to be shared based on the shared interface.
  • Step S904 The first terminal sets the display status of multiple preset applications stored in the blacklist to "unavailable status", and displays the multiple preset applications in the blacklist in a preset display mode on the sharing interface. At the same time, other applications in the first terminal (that is, applications other than multiple preset applications in the blacklist) are set as applications to be shared, and the applications to be shared are displayed normally in the sharing interface.
  • the preset display mode may include grayscale display, transparent display and other display modes to distinguish it from other applications that can be displayed normally.
  • multiple preset applications stored in the blacklist include: SMS applications, call applications, and gallery applications
  • step S904 the user using the first terminal will also perform a first type of operation on the default application (for example, executing step S906) to change the operating status of the default application in the sharing interface. .
  • Step S905 The first terminal sets the display status of multiple preset applications stored in the whitelist to "available status" based on the whitelist, and normally displays multiple preset applications with the display status set to "available status" in the sharing interface. Design application.
  • the number of preset applications in the whitelist is zero, and it is necessary to obtain the user's operation information to determine which preset application ID should be added to the whitelist.
  • the first terminal can first perform preset operations on multiple applications installed by it to change the display status of some applications that include the user's private information, for example, The display status of short message applications, gallery applications, etc. is changed to "unavailable status" to avoid leakage of user private information.
  • Step S906 Obtain information on the first type of operation of the preset application by the user using the first terminal.
  • the first type of operation may include: a user using the first terminal performs a double-click operation on the preset application, a user using the first terminal performs a right-click operation on the preset application, etc.
  • step S906 When the user performs step S906, it can be learned which default application the user needs to change the display state of, and further perform different processing on the changed default application.
  • the display state of the preset application remains unchanged; and the instruction information corresponding to the preset operation is discarded. Since the second terminal can only operate the default applications configured by the first terminal and can be displayed normally, but does not have the right to restore the default applications displayed in the default display mode, it can be guaranteed that the second terminal cannot view the first terminal's shield. of user privacy information and improve the security of user privacy information.
  • prompt information may also be generated.
  • the prompt information includes that the instruction sending end of the preset operation is the second terminal, and that the preset operation instruction sending end is the second terminal. Set the display status of the application; and display the prompt information in the sharing interface.
  • the user of the first terminal can clarify the use requirements of the second terminal for the preset application, and determine whether to open the use rights of the preset application to the second terminal based on the user's settings of the first terminal, thereby improving the third terminal.
  • Second terminal usage experience the user of the first terminal can clarify the use requirements of the second terminal for the preset application, and determine whether to open the use rights of the preset application to the second terminal based on the user's settings of the first terminal, thereby improving the third terminal.
  • Step S907 When it is determined to use the whitelist and the whitelist includes at least one preset application, the first terminal uses the identification of the preset application in the whitelist to apply the application with at least one second terminal in the shared interface. of sharing.
  • At least one preset application included in the white list is displayed in a normal display mode (eg, color display, etc.).
  • Step S908 When it is determined to use a blacklist and the blacklist includes at least one default application, the first terminal changes the display state of the at least one default application included in the blacklist to the default display mode, and shares the In the interface, the application is shared with at least one second terminal.
  • At least one preset application included in the blacklist is displayed in a preset display manner.
  • the change of the display status of the default application is only the dispatch and processing of local events on the first terminal. It will not increase the transmission data between the first terminal and the second terminal, and thus will not affect the two terminals.
  • the transmission delay between terminals can ensure the smoothness of application sharing between the two terminals.
  • the blacklist and the whitelist it is possible to clarify the display status of the preset application that can be controlled by the second terminal when the first terminal and the second terminal share applications.
  • the operation status (or display status) of different preset applications is changed, so as to quickly and accurately meet the user's real-time usage needs. requirements and improve the user experience; at the same time, it can reduce the risk of users’ private information being leaked and improve data security.
  • FIG. 10 shows a structural diagram of an exemplary hardware architecture of a computing device capable of implementing shared methods and apparatus for applications according to embodiments of the present disclosure.
  • computing device 1000 includes an input device 1001 , an input interface 1002 , a central processing unit 1003 , a memory 1004 , an output interface 1005 , and an output device 1006 .
  • the input interface 1002, the central processing unit 1003, the memory 1004, and the output interface 1005 are connected to each other through the bus 1007.
  • the input device 1001 and the output device 1006 are connected to the bus 1007 through the input interface 1002 and the output interface 1005 respectively, and then to the computing device 1000 to connect other components.
  • the input device 1001 receives input information from the outside and transmits the input information to the central processor 1003 through the input interface 1002; the central processor 1003 processes the input information based on computer-executable instructions stored in the memory 1004 to generate output. Information, the output information is temporarily or permanently stored in the memory 1004, and then the output information is transmitted to the output device 1006 through the output interface 1005; the output device 1006 outputs the output information to the outside of the computing device 1000 for use by the user.
  • the computing device shown in FIG. 10 may be implemented as an electronic device, and the electronic device may include: a memory configured to store a program; a processor configured to run the program stored in the memory to Execute the application sharing method described in the above embodiment.
  • the computing device shown in FIG. 10 may be implemented as a screen sharing system, and the system may include: a memory configured to store a program; a processor configured to run the program stored in the memory to Execute the application sharing method described in the above embodiment.
  • Embodiments of the present disclosure may be implemented by a processor of a mobile device executing computer program instructions, such as in a processor entity, or by hardware, or by a combination of software and hardware.
  • Computer program instructions may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source code written in any combination of one or more programming languages or target code.
  • ISA instruction set architecture
  • Any block diagram of a logic flow in the figures of this disclosure may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions.
  • Computer programs can be stored on memory.
  • the memory may be of any type appropriate to the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, read only memory (ROM), random access memory (RAM), optical storage devices and systems (digital versatile disc DVD or CD), etc.
  • Computer-readable media may include non-transitory storage media.
  • the processor may be of any type appropriate to the local technology environment, such as, but not limited to, general purpose computers, special purpose computers, microprocessors, digital signal processors (DSP), application specific integrated circuits (ASIC), programmable logic devices (FGPA), and Processor based on multi-core processor architecture.
  • DSP digital signal processors
  • ASIC application specific integrated circuits
  • FGPA programmable logic devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本公开提出一种应用的共享方法、系统、电子设备和存储介质,涉及通信技术领域。该方法包括:获取分享需求信息,分享需求信息为基于预设名单和用户的操作指令信息确定的信息;依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态,共享界面为供当前设备与至少一个对端设备进行数据共享的界面。

Description

应用的共享方法、系统、电子设备和存储介质
相关申请的交叉引用
本公开基于2022年09月08日提交的发明名称为“应用的共享方法、系统、电子设备和存储介质”的中国专利申请CN202211094110.X,并且要求该专利申请的优先权,通过引用将其所公开的内容全部并入本公开。
技术领域
本公开涉及通信技术领域,具体涉及一种应用的共享方法、系统、电子设备和存储介质。
背景技术
随着智能终端的快速发展,越来越多的用户会通过操作智能终端完成其需求。例如,通过屏幕共享,分享者可与被分享者同步观看到相同的视频文件等。
但是,在屏幕共享的过程中,由于某些应用包括用户的隐私信息,被分享者在共享这些应用时,可以查看到分享者的隐私信息,降低了用户数据的安全性。
发明内容
本公开提供一种应用的共享方法、系统、电子设备和存储介质。
本公开实施例提供一种应用的共享方法,该方法包括:获取分享需求信息,分享需求信息为基于预设名单和用户的操作指令信息确定的信息;依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态,共享界面为供当前设备与至少一个对端设备进行数据共享的界面。
本公开实施例提供一种共享系统,包括:第一终端和至少一个第二终端;第一终端,被配置为执行本公开实施例中的任意一种应用的共享方法;第二终端,被配置为获取第一终端发送的共享信息,并根据共享信息显示共享界面。
本公开实施例提供一种电子设备,包括:一个或多个处理器;存储器,其上存储有一个或多个程序,当一个或多个程序被一个或多个处理器执行,使得一个或多个处理器实现本公开实施例中的任意一种应用的共享方法。
本公开实施例提供了一种可读存储介质,该可读存储介质存储有计算机程序,计算机程序被处理器执行时实现本公开实施例中的任意一种应用的共享方法。
关于本公开的以上实施例和其他方面以及其实现方式,在附图说明、具体实施方式和权利要求中提供更多说明。
附图说明
图1示出本公开一实施例提供的应用的共享方法的流程示意图。
图2示出本公开实施例提供的共享界面在应用被共享的前后的显示示意图。
图3示出本公开一实施例提供的第一终端与第二终端中显示的应用的示意图。
图4示出本公开又一实施例提供的第一终端与第二终端中显示的应用的示意图。
图5示出本公开实施例提供的黑名单和白名单的示意图。
图6示出本公开实施例提供的应用的共享装置的组成方框图。
图7示出本公开实施例提供的终端的组成方框图。
图8示出本公开实施例提供的共享系统的组成方框图。
图9示出本公开又一实施例提供的应用的共享方法的流程示意图。
图10示出能够实现根据本公开实施例的应用的共享方法和装置的计算设备的示例性硬件架构的结构图。
具体实施方式
为使本公开的目的、技术方案和优点更加清楚明白,下文中将结合附图对本公开的实施例进行详细说明。需要说明的是,在不冲突的情况下,本公开中的实施例及实施例中的特征可以相互任意组合。
图1示出本公开一实施例提供的应用的共享方法的流程示意图。该方法可应用于应用的共享装置。如图1所示,本公开实施例中的应用的共享方法包括但不限于以下步骤。
步骤S101,获取分享需求信息。
其中,分享需求信息为基于预设名单和用户的操作指令信息确定的信息。预设名单包括至少一个预设应用。
例如,预设应用可以为短信、通讯录、通信记录、图库等应用。不同的预设应用对应的用户隐私信息可以不同。
当然,本公开并不限于此,所述预设应用还可以是用户不想共享的其他应用。例如,预设应用还可以是视频播放应用、游戏应用、邮箱应用等。
步骤S102,依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态。
其中,共享界面为供当前设备与至少一个对端设备进行数据共享的界面。
需要指出的是,预设应用在共享界面中的操作状态包括两种,即,可操作状态和不可操作状态。
在本公开实施例所提供的应用共享方法中,预设应用的操作状态并非不更更改,而是可以根据具体应用场景、以及用户自身的意愿来确定预设应用的操作状态。例如,在不涉及隐私暴露的场景中,可以将预设应用在共享界面中的操作状态修改为可操作,提升用户体验;在涉及隐私暴露的场景中,可以将预设应用在共享界面中的操作状态修改为不可操作,保护用户隐私。因此,通过本公开实施例所提供的应用共享方法,既可以确保预设应用的操作安全性,有也可以提升用户体验。
例如,当用户使用当前设备与至少一个对端设备进行游戏应用的共享,并共同使用游戏应用时,初始过程中,该游戏应用的操作状态为可操作状态;但是,当前设备的使用者需要进行特定账号在游戏应用中进行登录时,该游戏应用就会包括用户的隐私信息(如,游戏账号和密码等信息),则此时,需要基于用户的操作指令信息和预设名确定分享需求信息,以使该分享需求信息能够体现用户的实时使用需求(如,不想将包括游戏账号和密码等信息的游戏应用分享给其他对应设备等),从而变更预设名单中的该游戏应用在共享界面中的显示状态。能够使当前设备的使用者实时动态的调整预设名单中的预设应用在共享界面中的显示状态,以使对端设备无法对该预设应用进行操作,降低用户隐私信息的风险。
在一些具体实现中,步骤S102中的依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态,可用采用如下方式实现:
在确定操作指令信息的指令发送端为当前设备,且操作指令信息包括第一类操作的情况下,将预设应用的操作状态从不可操作状态和可操作状态中的一者变更为不可操作状态和可操作状态中的另一者。
具体地,如果在接收到操作指令信息之前,预设应用的操作状态为不可操作状态,那么在接收到操作指令信息之后,预设应用的操作状态为可操作状态;如果在接收到操作指令信息之前,预设应用的操作状态为可操作状态,那么在接收到操作指令信息之后,预设应用的操作状态为不可操作状态。
例如,预设应用为包括用户的隐私信息的应用。当第一类操作的操作指令对应的预设应用的操作状态为可操作状态时,可在接收到该第一类操作的操作指令之后,将该预设应用的操作状态变更为不可操作状态,以适应用户的使用需求,并保护用户的隐私信息不被泄露。
在本公开中,对第一类操作的具体类型不做特殊限定,例如,第一类操作可以包括:用户对预设应用的双击操作,或,用户对预设应用进行点击鼠标右键的操作等。
通过对预设应用进行双击操作或点击右键操作等,能够改变预设应用的操作状态。
为了便于被共享者识别不可操作的应用、提升被共享者的用户体验,作为一种示例性实施方式,共享方法还可以包括:
在共享界面中,将操作状态为不可操作的应用的图标设置为灰色。
被共享者看到共享界面中的灰色图标后,可以很快得知该图标对应的应用为不可操作应用,通常不会再对其进行操作。
还需要指出的是,在共享界面中,操作状态为可操作的应用的图标可以设置为彩色。
也就是说,在本公开所提供的共享方法中,还可以变更预设应用在共享界面中的显示状态,以使变更后的预设应用的显示状态能够与更新前的预设应用的显示状态相区别,便于用户的操作,动态满足用户的使用需求,提升用户的使用体验。
例如,通过当前设备发送操作指令信息给当前设备的操作系统,以使当前设备的操作系统可以基于预设应用的操作状态、及显示状态进行变更,从而将预设应用的操作状态由可用状态变更为不可用状态、预设应用的图标由彩色变更为灰色,以使对端设备不能对图标颜色为灰色的预设应用进行操作,降低预设应用中包括的隐私信息的泄露风险,提升信息安全性。
在一些具体实现中,在执行步骤S102中的依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态之后,还包括:以变更后的操作状态所对应的显示状态,在共享界面中显示预设应用的图标,其中,不可操作状态对应的显示状态为灰色显示,可操作状态对应的显示状态为彩色显示。
通过变更后图标的显示状态(如,灰度显示,或,正常的彩色显示等),在共享界面中显示该预设应用,能够快速准确的使对端设备获知哪些预设应用可以使用,哪些预设应用不可以使用,从而简化对端设备在共享界面中的操作,提升对端设备对共享界面的操作效率。并且,基于灰度显示的方式,能够减少对端设备对当前设备不想分享的预设应用的操作频次,降低隐私信息被泄露的风险,提升隐私信息的安全性。
例如,图2示出本公开实施例提供的共享界面在应用被共享的前后的显示示意图。如图2所示,图2(A)中的分享前的显示界面210中显示有:应用1、应用2、应用3、应用3、 短信211、图库212和电话213。并且,上述应用的图标均是以正常状态进行显示的。
但是,在图2(B)中的分享后的显示界面210中,虽然上述应用都在该分享后的屏幕显示界面210中,但是,其中的短信211、图库212和电话213的图标均是以灰度图像(在图2(B)中以填充了斜线的方式表示灰度图像)进行显示的,即表示短信211、图库212和电话213均不可用,从而使对端设备无法通过分享后的屏幕显示界面210对短信211、图库212和电话213进行操作,降低了用户隐私信息的泄露风险。
在一些具体实现中,在执行步骤S101中的获取分享需求信息之前,还包括:确定操作指令信息的指令发送端;在确定操作指令信息的指令发送端为当前设备,且操作指令信息包括第二类操作的情况下,丢弃操作指令信息。
其中,第二类操作包括:用户对预设应用的单击操作,或,用户对预设应用进行点击鼠标左键的操作等。
需要说明的是,为了方式用户的误操作,可以在当前设备的使用者发出包括第二类操作的操作指令信息的情况下,将该操作指令信息进行丢弃,不对该类型的操作指令信息进行响应,以避免将包括用户的隐私信息的预设应用共享给对端设备,降低对端设备获取用户的隐私信息的风险,提升数据的安全性。
在一些具体实现中,在执行步骤S101中的获取分享需求信息之前,还包括:确定操作指令信息的指令发送端;在确定指令发送端为对端设备的情况下,丢弃操作指令信息。
需要说明的是,因对端设备仅能够对当前设备配置的操作状态为可用状态的应用进行操作,而无权将以预设显示方式显示的应用进行恢复,能够保证对端设备无法查看当前设备屏蔽的用户隐私信息,提升用户隐私信息的安全性。
其中,预设显示方式可以包括:灰度显示、透明显示等显示方式,以使以预设显示方式进行显示的预设应用可以与其他能够被对端设备操作的预设应用的显示方式进行区分,以使对端设备无法通过共享界面对该以灰度显示或透明显示等显示方式进行显示的预设应用进行操作,降低该预设应用中包括的隐私信息的泄露风险。
例如,图3示出本公开一实施例提供的第一终端与第二终端中显示的应用的示意图。如图3所示,图3(A)中的第一终端的共享界面310中显示有如下应用:应用1、应用2、应用3、应用4、短信311、图库312和电话313。
同样的,图3(B)中的第二终端的共享界面320中显示有如下应用:应用1、应用2、应用3、应用4、短信311、图库312和电话313。
其中,短信311、图库312和电话313均是以灰度图像进行显示;而其他的应用(如,应用1、应用2、应用3、应用4的等)均是以正常的图像进行显示。通过上述显示方式,可明确第一终端和第二终端在进行屏幕共享的过程中,两个终端的显示界面中是显示相同的应用,以保证第二终端可以对共享界面中的应用进行操作。
通过第一终端在其框架层(如,第一终端的操作系统的底层处理模块等)对不同应用的显示状态进行变更,可以保证隐私信息(如,短信内容、联系人电话号码等)的安全性,能够使第二终端基于共享界面对可正常显示的预设应用进行操作,而非对包括用户隐私信息的预设应用进行操作,提升数据的安全性。
当第一终端对短信应用的显示状态进行变更时,可同步改变两个终端内的共享界面中显示的应用的状态。例如,图4示出本公开又一实施例提供的第一终端与第二终端中显示的应 用的示意图。如图4所示,图4(A)中的第一终端的共享界面410中显示有如下应用:应用1、应用2、应用3、应用4、短信411、图库412和电话413。
同样的,图4(B)中的第二终端的共享界面420中显示有如下应用:应用1、应用2、应用3、应用4、短信411、图库412和电话413。
其中,图库412和电话413均是以灰度图像进行显示。相较于图3(A)和图3(B)所示的共享界面而言,图4(A)和图4(B)中的短信411的显示状态由原来的灰度图像的显示方式变更为正常显示方式(如,以彩色图像的方式进行显示等)。
在一些具体实现中,丢弃操作指令信息之后,还包括:生成提示信息;在共享界面中显示提示信息。
作为一种示例性实施方式,提示信息包括指令发送端为对端设备,以及预设应用的显示状态。
例如,提示信息包括与当前设备进行屏幕共享的对端设备的标识、以及某个预设应用的显示状态(如,预设应用A的显示状态为“不可用状态”等)。
通过提示信息,能够使当前设备的用户明确对端设备对于某些预设应用的使用需求,基于当前设备的用户的设置,确定是否将该预设应用的使用权限开放给对端设备,提升对端设备的使用体验。
作为一种示例性实施方式,当前终端的用户在看到所述提示信息后,可以确定是否将所述提示信息所对应的应用进行激活。
在一些具体实现中,方法还包括:响应于第一类操作的操作指令,依据第一类操作的操作指令对应的应用的标识,更新预设名单。
其中,当接收到当前设备发送的第一类操作的操作指令时,可明确预设名单中的预设应用在共享界面中的操作状态需要发生变更,此时,需要在完成对预设应用的操作状态的变更之后,对预设名单进行更新,以保证不同的预设应用处于不同的预设名单中。
例如,预设名单包括:黑名单和/或白名单。
其中,黑名单中的应用在共享界面中的操作状态为不可用状态,白名单中的应用在共享界面中的操作状态为可用状态。
需要说明的是,针对同一个终端而言,其中设置的黑名单和白名单之间是互斥的,即一个应用仅能被添加至一个名单中,以保证在共享时应用的操作状态的唯一性。
并且,对于黑名单中存储的预设应用的标识和白名单中存储的预设应用的标识的操作,仅供当前设备进行操作,而与当前设备进行应用的共享的其他对端设备不能随意在黑名单和/或白名单中添加或删除预设应用,以保证预设应用中的隐私信息的安全性。
例如,图5示出本公开实施例提供的黑名单和白名单的示意图。如图5所示,第一终端上的应用显示设置界面510包括黑名单511和白名单512;通过对黑名单511和白名单512的设置,可确定在第二终端上显示的应用的标识,从而使包括用户隐私信息的应用不被第二终端操作,降低用户隐私信息的泄露风险。
其中,黑名单511包括:第一应用5111、第二应用5112、第三应用5113、第四应用5114等多个应用;白名单512包括:第五应用5121、第六应用5122、第七应用5123等多个应用。
例如,第一终端默认选择启动黑名单511,从而可以将黑名单511中的多个应用过滤掉,使第一终端与第二终端在进行应用的共享时,仅能操作除黑名单511以外的其他应用,避免 第二终端对黑名单511中的各个应用进行操作,降低黑名单511中的各个应用包括的隐私信息的泄露风险。
又例如,第一终端还可以将白名单512设置为空,当第一终端的用户根据其使用需求,采用预设操作(如,双击某个待更新应用,以改变该待更新应用的显示状态等)的方式,对某个待更新应用进行操作时,可将变更后的待更新应用添加至白名单512中,以便于第二终端可以通过共享界面对白名单512中的各个应用进行操作,提升第二终端的使用体验。
下面结合附图,详细介绍根据本公开实施例的装置。图6示出本公开实施例提供的应用的共享装置的组成方框图。如图6所示,应用的共享装置600包括但不限于如下模块。
获取模块601,被配置为获取分享需求信息,分享需求信息为基于预设名单和用户的操作指令信息确定的信息。
变更模块602,被配置为依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态,共享界面为供当前设备与至少一个对端设备进行数据共享的界面。
需要说明的是,本实施例中的应用的共享装置600能够实现本公开实施例中任一种应用的共享方法。
根据本公开实施例的应用的共享装置,通过获取模块获取分享需求信息,该分享需求信息是基于预设名单和用户的操作指令信息确定的信息,可明确当前设备在与至少一个对端设备在进行数据共享的过程中的分享需求,便于对共享界面中的预设应用进行操作;使用变更模块依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态,以减少至少一个对端设备对包括用户的隐私信息的预设应用的操控可能性,以便于保护用户的隐私信息不被泄露,保证隐私信息的安全性。
图7示出本公开实施例提供的终端的组成方框图。如图7所示,终端700包括:至少一个应用的共享装置701;该应用的共享装置701,被配置为实现本公开实施例中的任意一种应用的共享方法。
根据本公开实施例的终端,通过应用的共享装置使用获取模块获取分享需求信息,该分享需求信息是基于预设名单和用户的操作指令信息确定的信息,可明确当前设备在与至少一个对端设备在进行数据共享的过程中的分享需求,便于对共享界面中的预设应用进行操作;使用变更模块依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态,以减少至少一个对端设备对包括用户的隐私信息的预设应用的操控可能性,以便于保护用户的隐私信息不被泄露,保证隐私信息的安全性。
图8示出本公开实施例提供的共享系统的组成方框图。如图8所示,共享系统包括但不限于如下设备:第一终端801和至少一个第二终端802。
其中,第一终端801,被配置为执行本公开实施例中的任意一种应用的共享方法。
第二终端802,被配置为获取第一终端801发送的共享信息,并根据共享信息显示共享界面。
其中,共享界面为供第一终端801与第二终端802进行数据共享的界面。
例如,第一终端801和第二终端802通过通信网络进行连接,第一终端801通过获取分享需求信息,该分享需求信息为基于预设名单和用户的操作指令信息确定的信息;依据分享需求信息,变更预设名单中的预设应用在共享界面中的操作状态,共享界面为供第一终端8010与至少一个第二终端802进行数据共享的界面。
通过第一终端基于分享需求信息变更预设名单中的预设应用在共享界面中的操作状态,能够减少第二终端对显示状态发生变更的预设应用的操作频次,从而降低预设应用的用户隐私信息的泄露风险;使第二终端可以获得能够正常显示的预设应用的信息,该正常显示的预设应用是不包括用户隐私信息的应用,当第二终端对正常显示的预设应用进行操作时,可以完成第二终端的操作需求,提升用户的使用体验。
图9示出本公开又一实施例提供的应用的共享方法的流程示意图。如图9所示,本公开实施例中的应用的共享方法包括但不限于以下步骤。
步骤S901,第一终端读取配置文件,获取黑名单的信息和白名单的信息。
其中,黑名单中存储多个预设应用的标识,该预设应用是以正常的显示方式在共享界面中进行显示的应用;白名单中存储多个预设应用的标识,该该预设应用是以预设显示方式在共享界面中进行显示的应用。
黑名单的信息包括:黑名单的启动标识(如,采用isCheckedblackList表示该启动标识,当isCheckedblackList设置为true时,表示启动黑名单;当isCheckedblackList设置为false时,表示不启动黑名单)。
白名单的信息包括:白名单的启动标识(如,采用isCheckedwhiteList表示该启动标识,当isCheckedwhiteList设置为true时,表示启动白名单;当isCheckedwhiteList设置为false时,表示不启动白名单)。
其中的isCheckedblackList和isCheckedwhiteList是互斥的标识。
步骤S902,第一终端依据黑名单的信息和白名单的信息,判断使用哪个名单确定与至少一个第二终端进行共享的待共享应用的信息。
其中,待共享应用为不包括用户的隐私信息的应用。
特别的,当isCheckedblackList和isCheckedwhiteList均为false时,表示第一终端不启动黑名单,也不启动白名单;此时,执行步骤S903,即表示第一终端和第二终端可以共享第一终端中的所有应用。
当确定isCheckedblackList为true,且确定isCheckedwhiteList为false时,表示第一终端需要基于黑名单中的预设应用的标识确定待共享应用的信息,执行步骤S904;
当确定isCheckedblackList为false,且确定isCheckedwhiteList为true时,表示第一终端需要基于白名单中的预设应用的标识确定待共享应用的信息,执行步骤S905。
步骤S903,设置第一终端中的所有应用为待共享应用,以使第一终端与第二终端可以基于共享界面,对待共享应用进行操作。
步骤S904,第一终端将黑名单中存储的多个预设应用的显示状态设置为“不可用状态”,并在共享界面中,以预设显示方式显示黑名单中的多个预设应用。同时,将第一终端中的其他应用(即,除了黑名单中的多个预设应用以外的应用)设置为待共享应用,并在共享界面中正常显示待共享应用。
其中,预设显示方式可以包括灰度显示、透明显示等显示方式,以区别与其他可正常显示的应用。
例如,黑名单中存储的多个预设应用包括:短信息应用、通话应用和图库应用等,则可以将短信息应用、通话应用和图库应用均已灰度显示的方式在共享界面中进行显示,以使第二终端通过共享界面无法对黑名单中的多个预设应用进行操作。
需要说明的是,在执行完步骤S904之后,使用第一终端的用户还会对预设应用进行第一类操作(例如,执行步骤S906),用以变更共享界面中的预设应用的操作状态。
步骤S905,第一终端依据白名单,将白名单中存储多个预设应用的显示状态设置为“可用状态”,并在共享界面中,正常显示多个显示状态设置为“可用状态”的预设应用。
在一些具体实现中,初始模式下,白名单中的预设应用的数量为零,需要通过获取用户的操作信息,才能确定具体将哪个预设应用的标识添加至该白名单中。当第一终端和第二终端未进行应用的共享时,第一终端可以先对其安装的多个应用进行预设操作,以变更某些包括用户的隐私信息的应用的显示状态,例如,将短信息应用、图库应用等的显示状态变更为“不可用状态”,从而避免用户隐私信息的泄露。
步骤S906,获取使用第一终端的用户对预设应用的第一类操作的信息。
其中,第一类操作可以包括:使用第一终端的用户对预设应用的双击操作、使用第一终端的用户对预设应用进行点击右键操作等。
当用户执行步骤S906时,可获知用户需要变更哪个预设应用的显示状态,并进一步的对变更后的预设应用做不同的处理。
需要说明的是,针对预设操作的指令发送端,在确定指令发送端为第二终端的情况下,保持预设应用的显示状态不变;并丢弃该预设操作对应的指令信息。因第二终端仅能够对第一终端配置的可正常显示的预设应用进行操作,而无权将以预设显示方式显示的预设应用进行恢复,能够保证第二终端无法查看第一终端屏蔽的用户隐私信息,提升用户隐私信息的安全性。
在一些具体实现中,当第一终端将第二终端发送的预设操作对应的指令信息丢弃后,还可以生成提示信息,该提示信息包括预设操作的指令发送端为第二终端,以及预设应用的显示状态;并在共享界面中显示该提示信息。
通过提示信息,能够使第一终端的用户明确第二终端对于预设应用的使用需求,基于第一终端的用户的设置,确定是否将该预设应用的使用权限开放给第二终端,提升第二终端的使用体验。
步骤S907,在确定使用白名单,且白名单中包括至少一个预设应用的情况下,第一终端基于白名单中的预设应用的标识,在共享界面中,与至少一个第二终端进行应用的共享。
其中,在共享界面中,采用正常显示方式(如,彩色显示等)显示白名单中包括的至少一个预设应用。
步骤S908,在确定使用黑名单,且黑名单中包括至少一个预设应用的情况下,第一终端将黑名单中包括的至少一个预设应用的显示状态变更为预设显示方式,并在共享界面中,与至少一个第二终端进行应用的共享。
其中,在共享界面中,采用预设显示方式显示黑名单中包括的至少一个预设应用。
需要说明的是,对于预设应用的显示状态的变更,仅是第一终端本地的事件的派发和处理,不会增加第一终端与第二终端之间的传输数据,从而不会影响两个终端之间的传输时延,能够保证两个终端之间的应用的共享的流畅性。
在本实施例中,通过黑名单和白名单的使用,能够明确第一终端和第二终端进行应用的共享时,可供第二终端操控的预设应用的显示状态,并在用户需求的情况下,基于操作指令信息,变更不同预设应用的操作状态(或显示状态),从而快速准确的满足用户的实时使用需 求,提升用户的使用体验;同时能够降低用户的隐私信息被泄露的风险,提升数据的安全性。
需要明确的是,本公开并不局限于上文实施例中所描述并在图中示出的特定配置和处理。为了描述的方便和简洁,这里省略了对已知方法的详细描述,并且上述描述的系统、模块和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
图10示出能够实现根据本公开实施例的应用的共享方法和装置的计算设备的示例性硬件架构的结构图。
如图10所示,计算设备1000包括输入设备1001、输入接口1002、中央处理器1003、存储器1004、输出接口1005、以及输出设备1006。其中,输入接口1002、中央处理器1003、存储器1004、以及输出接口1005通过总线1007相互连接,输入设备1001和输出设备1006分别通过输入接口1002和输出接口1005与总线1007连接,进而与计算设备1000的其他组件连接。
具体地,输入设备1001接收来自外部的输入信息,并通过输入接口1002将输入信息传送到中央处理器1003;中央处理器1003基于存储器1004中存储的计算机可执行指令对输入信息进行处理以生成输出信息,将输出信息临时或者永久地存储在存储器1004中,然后通过输出接口1005将输出信息传送到输出设备1006;输出设备1006将输出信息输出到计算设备1000的外部供用户使用。
在一个实施例中,图10所示的计算设备可以被实现为一种电子设备,该电子设备可以包括:存储器,被配置为存储程序;处理器,被配置为运行存储器中存储的程序,以执行上述实施例描述的应用的共享方法。
在一个实施例中,图10所示的计算设备可以被实现为一种屏幕共享系统,该系统可以包括:存储器,被配置为存储程序;处理器,被配置为运行存储器中存储的程序,以执行上述实施例描述的应用的共享方法。
以上所述,仅为本公开的示例性实施例而已,并非用于限定本公开的保护范围。一般来说,本公开的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,尽管本公开不限于此。
本公开的实施例可以通过移动装置的处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码。
本公开附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(ROM)、随机访问存储器(RAM)、光存储器装置和系统(数码多功能光碟DVD或CD光盘)等。计算机可读介质可以包括非瞬时性存储介质。处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、可编程逻辑器件(FGPA)以及基于多核处理器架构的处理器。
通过示范性和非限制性的示例,上文已提供了对本公开的示范实施例的详细描述。但结 合附图和权利要求来考虑,对以上实施例的多种修改和调整对本领域技术人员来说是显而易见的,但不偏离本公开的范围。因此,本公开的恰当范围将根据权利要求确定。

Claims (12)

  1. 一种应用的共享方法,所述方法包括:
    获取分享需求信息,所述分享需求信息为基于预设名单和用户的操作指令信息确定的信息;
    依据所述分享需求信息,变更所述预设名单中的预设应用在共享界面中的操作状态,所述共享界面为供当前设备与至少一个对端设备进行数据共享的界面。
  2. 根据权利要求1所述的方法,其中,所述依据所述分享需求信息,变更所述预设名单中的预设应用在共享界面中的操作状态,包括:
    在确定所述操作指令信息的指令发送端为所述当前设备,且所述操作指令信息包括第一类操作的情况下,将所述预设应用的操作状态从不可操作状态和可操作状态中的一者变更为不可操作状态和可操作状态中的另一者。
  3. 根据权利要求2所述的方法,其中,所述依据所述分享需求信息,变更所述预设名单中的预设应用在共享界面中的操作状态之后,还包括:
    以变更后的操作状态所对应的显示状态,在所述共享界面中显示所述预设应用的图标,其中,所述不可操作状态对应的显示状态为灰色显示,所述可操作状态对应的显示状态为彩色显示。
  4. 根据权利要求1所述的方法,其中,所述获取分享需求信息之前,还包括:
    确定所述操作指令信息的指令发送端;
    在确定所述操作指令信息的指令发送端为所述当前设备,且所述操作指令信息包括第二类操作的情况下,丢弃所述操作指令信息。
  5. 根据权利要求1所述的方法,其中,所述获取分享需求信息之前,还包括:
    确定所述操作指令信息的指令发送端;
    在确定所述指令发送端为所述对端设备的情况下,丢弃所述操作指令信息。
  6. 根据权利要求5所述的方法,其中,所述丢弃所述操作指令信息之后,还包括:
    生成提示信息;
    在所述共享界面中显示所述提示信息。
  7. 根据权利要求2所述的方法,所述方法还包括:
    响应于第一类操作的操作指令,依据所述第一类操作的操作指令对应的应用的标识,更新所述预设名单。
  8. 根据权利要求1至6中任意一项所述的方法,其中,所述预设名单包括:黑名单和/或白名单,
    其中,所述黑名单中的应用在所述共享界面中的操作状态为不可用状态,所述白名单中的应用在所述共享界面中的操作状态为可用状态。
  9. 根据权利要求1至6中任意一项所述的方法,其中,所述预设应用为包括用户的隐私信息的应用。
  10. 一种共享系统,包括:第一终端和至少一个第二终端;
    所述第一终端,被配置为执行如权利要求1至9中任一项所述的应用的共享方法;
    所述第二终端,被配置为获取所述第一终端发送的共享信息,并根据所述共享信息显示 共享界面。
  11. 一种电子设备,包括:
    一个或多个处理器;
    存储器,其上存储有一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1至9中任一项所述的应用的共享方法。
  12. 一种可读存储介质,其中,所述可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至9中任一项所述的应用的共享方法。
PCT/CN2023/100009 2022-09-08 2023-06-13 应用的共享方法、系统、电子设备和存储介质 WO2024051247A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211094110.X 2022-09-08
CN202211094110.XA CN117708865A (zh) 2022-09-08 2022-09-08 应用的共享方法、系统、电子设备和存储介质

Publications (1)

Publication Number Publication Date
WO2024051247A1 true WO2024051247A1 (zh) 2024-03-14

Family

ID=90157571

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/100009 WO2024051247A1 (zh) 2022-09-08 2023-06-13 应用的共享方法、系统、电子设备和存储介质

Country Status (2)

Country Link
CN (1) CN117708865A (zh)
WO (1) WO2024051247A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107222A (zh) * 2019-12-18 2020-05-05 维沃移动通信有限公司 一种界面共享方法及电子设备
CN111736787A (zh) * 2020-06-24 2020-10-02 北京云族佳科技有限公司 屏幕共享方法、装置、存储介质及电子设备
US20200401420A1 (en) * 2019-03-18 2020-12-24 Beijing Bytedance Network Technology Co., Ltd. Data sharing method and apparatus, electronic device and computer-readable storage medium
CN112560060A (zh) * 2020-12-16 2021-03-26 歌尔光学科技有限公司 信息共享方法、终端及可读存储介质
CN113127845A (zh) * 2021-04-29 2021-07-16 珠海市魅族科技有限公司 应用权限的验证方法、装置、设备和存储介质
CN114417312A (zh) * 2021-12-13 2022-04-29 珠海格力电器股份有限公司 共享信息处理方法、装置、电子设备及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200401420A1 (en) * 2019-03-18 2020-12-24 Beijing Bytedance Network Technology Co., Ltd. Data sharing method and apparatus, electronic device and computer-readable storage medium
CN111107222A (zh) * 2019-12-18 2020-05-05 维沃移动通信有限公司 一种界面共享方法及电子设备
CN111736787A (zh) * 2020-06-24 2020-10-02 北京云族佳科技有限公司 屏幕共享方法、装置、存储介质及电子设备
CN112560060A (zh) * 2020-12-16 2021-03-26 歌尔光学科技有限公司 信息共享方法、终端及可读存储介质
CN113127845A (zh) * 2021-04-29 2021-07-16 珠海市魅族科技有限公司 应用权限的验证方法、装置、设备和存储介质
CN114417312A (zh) * 2021-12-13 2022-04-29 珠海格力电器股份有限公司 共享信息处理方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN117708865A (zh) 2024-03-15

Similar Documents

Publication Publication Date Title
KR102255138B1 (ko) 메시지 처리 방법과 장치, 저장 매체, 및 컴퓨터 장치
US11722860B2 (en) Messaging system interacting with dynamic extension app
US10852912B2 (en) Image creation app in messaging app
US10368208B2 (en) Layers in messaging applications
KR101966258B1 (ko) 복수의 동적 아이콘 패널을 업데이트하기 위한 푸시 알림
EP3700237A1 (en) Messaging application interacting with one or more extension applications
WO2020207454A1 (zh) 信息推送方法和装置
CN111767554B (zh) 屏幕分享方法、装置、存储介质及电子设备
CN106027631B (zh) 一种数据传输方法及装置
CN112118459A (zh) 共享摄像头数据实现多个app共同直播的方法及可读介质
AU2019256257A1 (en) Processor core scheduling method and apparatus, terminal, and storage medium
CN113268212A (zh) 投屏方法、装置、存储介质及电子设备
CN112817498A (zh) 应用权限管理方法、装置、存储介质以及终端
US20220263781A1 (en) Method and system for managing avatar usage rights
CN109388388B (zh) 功能模块间的信息交互方法、装置、设备及存储介质
CN114911442A (zh) 投屏方法、装置、终端、设备、计算机介质及程序产品
WO2024109786A1 (zh) 即时通信会话信息的处理方法、装置及电子设备
CN112738774A (zh) 应用共享方法、装置、终端及计算机可读存储介质
WO2024051247A1 (zh) 应用的共享方法、系统、电子设备和存储介质
EP4145269A1 (en) Screen projection control method, storage medium, and communication device
CN114595203A (zh) 基于双系统的文件同步方法、终端设备及存储介质
CN114430410A (zh) 基于虚拟域名的系统访问方法、装置及设备
WO2018209462A1 (zh) 一种邮件管理方法和邮件服务器
CN114675786A (zh) 一种大容量存储挂载方法、装置、终端及介质
WO2024045764A1 (zh) 显示方法、装置、终端、电子设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23861950

Country of ref document: EP

Kind code of ref document: A1