CN108509788B - Information sharing method and device, computer readable storage medium and terminal - Google Patents

Information sharing method and device, computer readable storage medium and terminal Download PDF

Info

Publication number
CN108509788B
CN108509788B CN201810270230.8A CN201810270230A CN108509788B CN 108509788 B CN108509788 B CN 108509788B CN 201810270230 A CN201810270230 A CN 201810270230A CN 108509788 B CN108509788 B CN 108509788B
Authority
CN
China
Prior art keywords
information
user
space
data
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810270230.8A
Other languages
Chinese (zh)
Other versions
CN108509788A (en
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810270230.8A priority Critical patent/CN108509788B/en
Publication of CN108509788A publication Critical patent/CN108509788A/en
Priority to PCT/CN2019/075388 priority patent/WO2019184617A1/en
Application granted granted Critical
Publication of CN108509788B publication Critical patent/CN108509788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to an information sharing method and device, a computer readable storage medium and a terminal. The method is applied to a system with at least two user spaces, wherein the at least two user spaces belong to different use roles; the method comprises the following steps: acquiring application information and data information which belong to at least two user spaces in a system; performing security level archiving on the application information and the data information; and providing the application information and the data information which accord with the sharing security level and belong to the second user space in the first user space according to the triggering condition. The method can realize rapid application and data sharing, can also realize necessary data and permission isolation, and can save the storage space of the data.

Description

Information sharing method and device, computer readable storage medium and terminal
Technical Field
The present application relates to the field of terminal technologies, and in particular, to an information sharing method and apparatus, a computer-readable storage medium, and a terminal.
Background
As terminal devices enter the intelligent era, mobile terminals such as mobile phones and communication tablets play more and more important roles in the life of people. Through various software applications, different requirements of people can be met in the aspects of social contact, shopping, entertainment, work, learning and the like.
Currently, a terminal may set a plurality of user modes for a plurality of users to use the same terminal. When a new multi-user space is opened, due to the isolation of the space and the authority, the user needs to recreate data such as contacts and applications, and therefore the use is troublesome and the user experience is low.
Disclosure of Invention
The embodiment of the application provides an information sharing method and device, a computer readable storage medium and a terminal, so as to realize rapid application and data sharing and necessary data and authority isolation.
An information sharing method is applied to a system with at least two user spaces, wherein the at least two user spaces belong to different use roles; the method comprises the following steps:
acquiring application information and data information which belong to at least two user spaces in a system;
performing security level archiving on the application information and the data information;
and providing the application information and the data information which accord with the sharing security level and belong to the second user space in the first user space according to the triggering condition.
An information sharing apparatus is applied to a system having at least two user spaces belonging to different usage roles; characterized in that the device comprises:
the information acquisition module is used for acquiring application information and data information which belong to at least two user spaces in the system;
the security filing module is used for filing the application information and the data information in security level;
and the sharing processing module is used for providing the application information and the data information which accord with the sharing security level and belong to the second user space in the first user space according to the triggering condition.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method in the various embodiments of the application.
A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method in the various embodiments of the present application are implemented when the computer program is executed by the processor.
The information sharing method and device, the computer readable storage medium and the terminal provided by the embodiment of the application can share application information and data information belonging to a plurality of user spaces, and carry out privacy control by adopting a security level filing mode, so that not only can quick application and data sharing be realized, but also necessary data and authority isolation can be realized, and meanwhile, the storage space of the data can be saved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of an internal structure of a terminal in one embodiment;
FIG. 2 is a flow diagram of a method of information sharing in one embodiment;
FIG. 3 is a flow diagram of a process for performing security level archiving, in one embodiment;
FIG. 4 is a flow diagram of a process for providing application information and data information pertaining to a second user space within a first user space in one embodiment;
FIG. 5 is a flow diagram of a process for providing application information and data information pertaining to a second user space within a first user space in accordance with another embodiment;
FIG. 6 is a flowchart of a process for providing application information and data information pertaining to a second user space within a first user space in yet another embodiment;
FIG. 7 is a block diagram of an information sharing device according to an embodiment;
fig. 8 is a block diagram of a partial structure of a mobile phone related to a terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first user space may be referred to as a second user space, and similarly, a second user space may be referred to as a first user space, without departing from the scope of the present invention. The first user space and the second user space are both user spaces, but not the same user space.
In one embodiment, as shown in fig. 1, a schematic diagram of the internal structure of a terminal is provided. The terminal includes a processor, a memory, and a display screen connected by a system bus. Wherein, the processor is used for providing calculation and control capability and supporting the operation of the whole terminal. The memory is used for storing data, programs, instruction codes and/or the like, and at least one computer program is stored on the memory, and the computer program can be executed by the processor to realize the information sharing method suitable for the terminal provided in the embodiment of the application. The Memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random-Access-Memory (RAM). For example, in one embodiment, the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a database, and a computer program. The database stores data related to implementing an information sharing method provided in the above embodiments, for example, may store a preset processing policy or preset verification information. The computer program can be executed by a processor for implementing an information sharing method provided by various embodiments of the present application. The internal memory provides a cached operating environment for the operating system, databases, and computer programs in the non-volatile storage medium. The display screen may be a touch screen, such as a capacitive screen or an electronic screen, for displaying interface information of the terminal. The terminal can be a mobile phone, a tablet computer, a personal digital assistant or a wearable device.
The information sharing method in this embodiment is described by taking the operation on a terminal as an example. The information sharing method is applied to a system having at least two user spaces belonging to different usage roles.
In the present application, the system refers to an operating system of the terminal. The operating system provides functions of multiple users or multiple spaces, so that one terminal can open up multiple spaces for time-sharing use by multiple users, or one user can enter different spaces for use under different situations. In the present application, a space of different users and a plurality of spaces of the same user will be collectively referred to as a user space without distinction. When the same user uses different user spaces, they are also considered to have different usage roles. Usage scenarios include, but are not limited to:
one terminal is provided with more than two users, and each user opens up a user space belonging to the terminal in the system, such as a child space, a visitor space and the like; one terminal only has one user, and the user opens up more than two user spaces such as a main space and a privacy space which belong to the terminal in the system; one terminal has more than two users, each user opens up a user space belonging to the terminal in the system, and at least one user additionally has a privacy space belonging to the terminal.
It can be understood that in the conventional multi-user or multi-space scheme, data and authority isolation is required between two user spaces to prevent the use of the multiple user spaces from interfering with each other. It is inevitable that information repetition of a plurality of user spaces occurs.
For a system providing multiple users or spaces, there is generally only one space in the system when the users use the system for the first time (usually called owner space, which is used by the owner and has the highest authority). When it is necessary to give multi-user use or open up multi-space use, it is necessary to newly build user space in the system. In addition to the owner space, there is a lifecycle for other user spaces that begins with creation and ends with destruction. Between creation and destruction is an ongoing phase.
When the user space is created, the system allocates storage space for the newly created user space, and prepares a running environment, which includes providing system applications and services. On the basis, in the user space, the system application can be used, and a new three-party application can be downloaded and installed, and the data of the user using the user space is saved. Here, information related to the new three-party application is referred to as application information, and data related to the user is referred to as data information. It should be noted that the data information may be data for a system application, such as contact data, or data for a three-party application, such as WeChat data.
In the persistent phase of the user space, the application information and the data information are changed continuously along with the use of the user. Such as increasing contact numbers, increasing WeChat chat records, etc.
When the user space is destroyed, the application and data in the user space are deleted and the storage space allocated to the application and data is released.
The information sharing method according to an embodiment of the present application is shown in fig. 2, and includes steps 202 to 206.
Step 202: application information and data information belonging to at least two user spaces in the system are obtained. The at least two user spaces may refer to all user spaces in the system. But may also refer to user space that is only involved in information sharing. And the application information and the data information of the at least two user spaces are stored in the storage space allocated to the user space. The application information and the data information belonging to each user space can be acquired from the storage space of the user space. Whether the user space runs in the foreground, runs in the background or does not run does not affect reading of the application information and the data information from the storage space.
Step 204: and carrying out security level archiving on the application information and the data information. Each user space has different applications and data, and the sharing of the application information and the data information is influenced by different security requirements of the users on the applications and the data. For example, after the owner space is used for a long time, the number of applications and personal data on the owner space are large, and at this time, if a new user space is created, more applications and data may not be shared. Therefore, the method of the application archives the security level of the application information and the data information of each user space so as to distinguish the sharing security level of the application information and the sharing security level of the data information. In some embodiments, the security levels include at least a sharing level indicating shareability and a privacy level indicating non-shareability.
Step 206: and providing application information and data information which accord with a shared security level and belong to a second user space in the first user space according to a trigger condition. This step may mean that the application information and the data information of at least one user space are provided to the first user space, that is, other user spaces except some first user space are both referred to as a second user space. This step may also represent providing the application information and the data information of the second user space to the first user space a plurality of times.
The trigger condition is generally associated with a sharing requirement. When a user space is created, the system typically only allocates the necessary system applications (e.g., phone contacts) and no three-party applications (e.g., WeChat) nor user data. The trigger condition may be when one user space creation is complete. When a user space is newly created, the application information and data information of other user spaces are automatically provided for the newly created user space. For example, when applications and data within the owner space are accorded a shared security level, a list of WeChat applications and contact numbers within the owner space is provided to a newly created child space, privacy space, or guest space, among others.
The trigger condition can be generated under other situations, and when the same user enters the privacy space after downloading and installing a certain application in the machine main space, the user can actively initiate the sharing of the application in the machine main space without downloading in the privacy space. It is to be understood that the trigger condition may also include other similar conditions.
The conformity with the sharing security level means that the security level of the application information and the data information of the second user space after the archiving conforms to the condition of being shared to the first user space. For example, after a user space (first user space) is created outside the owner space (second user space), both the application information and the data information in the owner space (second user space) are archived at a security level. In the simplest case, it is determined which application information and data information can be shared and which cannot. After the new creation of the user space (first user space) is completed, the application information and the data information which can be shared in the owner space (second user space) are both provided for the newly created user space (first user space).
In other situations, the application information and the data information in the owner space can have a plurality of sharing levels, and when the sharing level is higher, the user space with lower authority can be shared; when the sharing level is lower, the user space with higher authority can be shared. Or some shared security level may only allow designated user space access. Implementations of the present application are not limited to the above.
The information sharing method can share the application information and the data information belonging to a plurality of user spaces, and carry out privacy control by adopting a security level filing mode, thereby not only realizing rapid application and data sharing, but also realizing necessary data and authority isolation, and simultaneously saving the storage space of the data.
In some embodiments, the information sharing method is implemented by using a Service (Service) in the system, and each user space calls the Service to implement information sharing. Based on the service mode, the method can be resident in the system to run and can be used as a public service, so that each user space can be called when the system runs, the authority of the storage space of each user space is easy to obtain, and the application information and the data information of the user space can be conveniently read.
In some embodiments, as shown in fig. 3, the step of archiving the application information and the data information with a security level, that is, the step 202 may include:
step 302: and acquiring the security level marks of the application information and the data information by the user under each user space. The security level indicia includes at least: a shared token indicating shareable and a private token indicating non-shareable. The security level mark can be an attribute added by the system for the application and the data, and the attribute of the application and the data can be changed by rewriting the attribute under different use conditions. For example, defining the attribute as a boolean value that can be shared or not, and when the attribute value is true, indicating that sharing is possible; when the attribute value is false, it indicates that sharing is not possible. In other embodiments, the security level flag may include a plurality of user spaces indicating what rights can be shared in addition to whether or not sharing is possible. At this time, the attribute is defined as an enumerated type having a plurality of fixed values. The security level indicia for application information and data information within its user space may be specified by the user.
The security level flag can also be implemented not by adding attributes but by using a mapping table. For example, the mapping table is written with the corresponding relationship between the security level and the unique identifier of the application information and the data information.
Step 304: and performing security level archiving on the application information and the data information according to the security level mark. The purpose of archiving is to facilitate the eligible use of application information and data information of the same security level.
And for the application information and the data information added with the attribute, the application information and the data information with the same attribute value are filed by reading the attribute value. For application information and data information that implement security level labeling by way of a mapping table, a plurality of tables of different security levels may be maintained. Under one classification, unique identifications of application information and data information of the same security level may be stored in an aggregate.
Through the above-described processing, all the application information and the data information obtained in step 202 have a certain security level. When sharing, sharing according with the sharing security level condition can be carried out according to the security level.
In some embodiments, as shown in fig. 4, the step of providing the application information and the data information which conform to the shared security level and belong to the second user space in the first user space according to the triggering condition,for data sharing, but should By not requiring migration. That is, step 206 may include:
step 402: and reading the application information and the data information belonging to the second user space. And storing the application information and the data information belonging to the second user space in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background or does not run does not affect reading of the application information and the data information from the storage space. When the second user space runs in the foreground or the background, the application information and the data information may change at any time, and when the triggering condition is met, the latest application information and the latest data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
The shared security level condition needs to be satisfied when acquiring the application information and the data information. That is, only the application information and the data information which meet the shared security level condition and belong to the second user space can be acquired.
Step 404: and applying the data information belonging to the second user space to the same application in the first user space. And when the three-party application shares data, applying the data information belonging to the second user space to the same application of the first user space. For example, a WeChat chat log of the owner space is used for the newly created privacy space. However, the WeChat chat records in the privacy space are only stored in the privacy space, so that a public WeChat chat record can be read in the machine main space and the privacy space in the whole system. The storage space of data is saved, and the owner can conveniently check all chat records in the privacy space.
The system application performs data sharing, similar to a three-party application. For example, the contact number list of the main space of the mobile phone is used for a newly-built user space for a second user to use, and at the moment, the second user does not need to re-enter the contact, so that all contacts can be quickly obtained, and the storage space can be saved.
In some embodiments, as shown in fig. 5, the step of providing the application information and the data information which conform to the shared security level and belong to the second user space in the first user space according to the triggering condition,for realizing data sharing, and by movingMoving deviceThat is, the step 206 may include:
step 502: and reading the application information and the data information belonging to the second user space. And storing the application information and the data information belonging to the second user space in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background or does not run does not affect reading of the application information and the data information from the storage space. When the second user space runs in the foreground or the background, the application information and the data information may change at any time, and when the triggering condition is met, the latest application information and the latest data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
The shared security level condition needs to be satisfied when acquiring the application information and the data information. That is, only the application information and the data information which meet the shared security level condition and belong to the second user space can be acquired.
Step 504: and migrating the application information and the data information belonging to the second user space into the first space.
And when the three-party application shares data, applying the data information belonging to the second user space to the same application of the first user space. For example, a WeChat chat log of the owner space is used for the newly created privacy space. However, the WeChat chat records in the privacy space are only stored in the privacy space, so that a public WeChat chat record can be read in the machine main space and the privacy space in the whole system. The storage space of data is saved, and the owner can conveniently check all chat records in the privacy space. The system application performs data sharing, similar to a three-party application. For example, the contact number list of the main space of the mobile phone is used for a newly-built user space for a second user to use, and at the moment, the second user does not need to re-enter the contact, so that all contacts can be quickly obtained, and the storage space can be saved.
Generally, the system applications themselves are at the system level, with features that can be shared. Therefore, the system application does not need to be migrated, and only needs to share data or migrate data. The three-party application is used in a plurality of user spaces, and can only be installed and downloaded in each user space. In the application, the application information can be migrated between the user spaces by adopting an application information sharing mode. The migration includes several situations, namely, the second user space is completely transferred to the first user space, namely, the second user space does not retain application information and data information; copying the application information and the data information from the second user space to the first user space; and thirdly, copying the application information from the second user space, and sharing the data information.
In some embodiments, as shown in fig. 6, the step of providing the application information and the data information which conform to the shared security level and belong to the second user space in the first user space according to the triggering condition,for realizing data sharing, and selected applications and data migrationThat is, the step 206 may include:
step 602: and reading the application information and the data information belonging to the second user space. And storing the application information and the data information belonging to the second user space in a storage space corresponding to the second user space. Whether the second user space runs in the foreground, runs in the background or does not run does not affect reading of the application information and the data information from the storage space. When the second user space runs in the foreground or the background, the application information and the data information may change at any time, and when the triggering condition is met, the latest application information and the latest data information are acquired. When the second user space is not running, the application information and the data information can be obtained at any time.
The shared security level condition needs to be satisfied when acquiring the application information and the data information. That is, only the application information and the data information which meet the shared security level condition and belong to the second user space can be acquired.
Step 604: and displaying the list of the application information and the data information belonging to the second user space. The application information and data information obtained in step 602 are presented to the user in the form of a list and a selection is provided. As mentioned above, step 206 may represent providing the application information and the data information of at least one user space to the first user space, i.e. other user spaces than a certain first user space are both referred to as second user spaces. Step 206 may also represent providing the application information and data information of the second user space to the first user space multiple times.
After acquiring the application information and the data information of the plurality of user spaces, it is necessary to provide the first user space with a selection. Easily recognizable identifications in the application information, such as icons of the applications, may be shown in the list. The representation of the data information may include an information summary, a latest update time, a space size occupied by the information, and the like.
Step 606: in the first user space, applications and data that need to be migrated are selected from the list. The selecting may include: selecting applications to be migrated separately, selecting data to be migrated separately, selecting applications and data to be migrated simultaneously. For example, only the applications required for migration in the newly created privacy space are shared, and data is shared. For another example, the private data of the owner space is migrated into the private space. As another example, for multiple copies of data that are applied in multiple user spaces, one of the copies is migrated as being the most current. The selection manner is not limited to the above.
Step 608: the selected application and data are migrated into a first space. Generally, the system applications themselves are at the system level, with features that can be shared. Therefore, the system application does not need to be migrated, and only needs to share data or migrate data. The three-party application is used in a plurality of user spaces, and can only be installed and downloaded in each user space. In the application, the application information and the data information can be migrated between the user spaces by adopting a mode of sharing the application information and the data information. The migration includes several situations, namely, the second user space is completely transferred to the first user space, namely, the second user space does not retain application information and data information; copying the application information and the data information from the second user space to the first user space; and thirdly, copying the application information from the second user space, and sharing the data information. Regardless of the manner selected in step 606, migration may be performed.
In the above flow, data sharing and data migration may be performed to ensure data consistency. When the security level condition is met, the data use of a plurality of user spaces can be better realized. Besides, in some embodiments, the above flow may further include: data information of the same application of at least two user spaces is synchronized. Synchronization is a continuous work after migration is completed, and data consistency can be well maintained in real time.
It should be understood that although the various steps in the flow charts of fig. 1-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-6 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
Fig. 7 is a block diagram of an information sharing apparatus according to an embodiment of the present application. The information sharing device is applied to a system with at least two user spaces, wherein the at least two user spaces belong to different use roles; the device comprises:
an information obtaining module 702, configured to obtain application information and data information belonging to at least two user spaces in a system;
a security archiving module 704, configured to archive the application information and the data information at a security level;
and the sharing processing module 706 provides the application information and the data information which accord with the sharing security level and belong to the second user space in the first user space according to the triggering condition.
In some embodiments, the information sharing device is implemented by using a service component in the system, and each user space calls the service component to obtain the application information and the data information from other user spaces.
In some embodiments, the secure archiving module 704 includes:
the marking unit is used for acquiring the security level marks of the application information and the data information by the user in each user space;
the archiving unit is used for archiving the security level of the application information and the data information according to the security level mark;
wherein the security level indicia comprises at least: a shared token indicating shareable and a private token indicating non-shareable.
In some embodiments, the shared processing module 706 includes:
the reading unit is used for reading the application information and the data information belonging to the second user space;
and the application unit is used for applying the data information belonging to the second user space to the same application in the first user space.
In some embodiments, the shared processing module 706 includes:
the reading unit is used for reading the application information and the data information belonging to the second user space;
and the migration unit is used for migrating the application information and the data information belonging to the second user space to the first space.
In some embodiments, the shared processing module 706 further comprises:
the display unit is used for displaying the list of the application information and the data information belonging to the second user space in the first user space;
the selecting unit is used for selecting the application and the data which need to be migrated from the list in the first user space;
and the migration unit is used for migrating the selected application and data into the first space.
In some embodiments, the information sharing apparatus further comprises: and the synchronization module is used for synchronizing the data information of the same application of at least two user spaces.
For specific limitations of the information processing apparatus, reference may be made to the above limitations of the information sharing method, which are not described herein again. Each module in the information processing apparatus described above may be entirely or partially implemented by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The implementation of each module in the information processing apparatus provided in the embodiment of the present application may be in the form of a computer program. The computer program may be run on a terminal or a server. The program modules constituted by the computer program may be stored on the memory of the terminal or the server. The computer program, when executed by a processor, implements the steps of the information sharing method described in the embodiments of the present application.
The embodiment of the application also provides a computer readable storage medium. One or more non-transitory computer-readable storage media embodying computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of the information sharing method.
A computer program product containing instructions which, when run on a computer, cause the computer to perform an information sharing method.
The embodiment of the application also provides a terminal. As shown in fig. 8, for convenience of explanation, only the parts related to the embodiments of the present application are shown, and details of the technology are not disclosed, please refer to the method part of the embodiments of the present application. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the like, taking the terminal as the mobile phone as an example:
fig. 8 is a block diagram of a partial structure of a mobile phone related to a terminal according to an embodiment of the present application. Referring to fig. 8, the handset includes: radio Frequency (RF) circuitry 810, memory 820, input unit 830, display unit 840, sensor 850, audio circuitry 860, wireless fidelity (WiFi) module 870, processor 880, and power supply 890. Those skilled in the art will appreciate that the handset configuration shown in fig. 8 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The RF circuit 810 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink information of a base station and then process the downlink information to the processor 880; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 810 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE)), e-mail, Short Messaging Service (SMS), and the like.
The memory 820 may be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 820. The memory 820 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, and the like), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, the memory 820 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 830 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 800. Specifically, the input unit 830 may include an operation panel 831 and other input devices 832. The operation panel 831, which may also be referred to as a touch screen, may collect touch operations of a user (e.g., operations of the user on the operation panel 831 or in the vicinity of the operation panel 831 using any suitable object or accessory such as a finger or a stylus) thereon or nearby, and drive the corresponding connection device according to a preset program. In one embodiment, the operation panel 831 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 880, and can receive and execute commands from the processor 880. In addition, the operation panel 831 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 830 may include other input devices 832 in addition to the operation panel 831. In particular, other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
The display unit 840 may be used to display information input by the user or information provided to the user and various menus of the cellular phone. The display unit 840 may include a display panel 841. In one embodiment, the Display panel 841 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, the operation panel 831 can cover the display panel 841, and when the operation panel 831 detects a touch operation thereon or nearby, it is transmitted to the processor 880 to determine the type of touch event, and then the processor 880 provides a corresponding visual output on the display panel 841 according to the type of touch event. Although in fig. 8 the operation panel 831 and the display panel 841 are two separate components to implement the input and output functions of the mobile phone, in some embodiments the operation panel 831 and the display panel 841 may be integrated to implement the input and output functions of the mobile phone.
The cell phone 800 may also include at least one sensor 850, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 841 according to the brightness of ambient light, and a distance sensor that turns off the display panel 841 and/or the backlight when the mobile phone is moved to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
The audio circuitry 860, speaker 861 and microphone 862 may provide an audio interface between the user and the handset. The audio circuit 860 can transmit the electrical signal converted from the received audio data to the speaker 861, and the electrical signal is converted into a sound signal by the speaker 861 and output; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal, which is received by the audio circuit 860 and converted into audio data, and then the audio data is output to the processor 880 for processing, and then the audio data may be transmitted to another mobile phone through the RF circuit 810, or the audio data may be output to the memory 820 for subsequent processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to send and receive e-mails, browse webpages, access streaming media and the like through the WiFi module 870, and provides wireless broadband Internet access for the user. Although fig. 8 shows WiFi module 870, it is understood that it is not an essential component of cell phone 800 and may be omitted as desired.
The processor 880 is a control center of the mobile phone, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 820 and calling data stored in the memory 820, thereby performing an overall listening to the mobile phone. In one embodiment, processor 880 may include one or more processing units. In one embodiment, the processor 880 may integrate an application processor and a modem, wherein the application processor primarily handles operating systems, user interfaces, applications, and the like; the modem handles primarily wireless communications. It is to be appreciated that the modem need not be integrated into the processor 880. For example, the processor 880 may integrate an application processor and a baseband processor, which may constitute a modem with other peripheral chips, etc. The cell phone 800 also includes a power supply 890 (e.g., a battery) for powering the various components, which may be logically coupled to the processor 880 via a power management system that may be used to manage charging, discharging, and power consumption.
In one embodiment, the cell phone 800 may also include a camera, a bluetooth module, and the like.
In the embodiment of the present application, the processor included in the mobile phone implements the information sharing method described above when executing the computer program stored in the memory.
Any reference to memory, storage, database, or other medium used herein may include non-volatile and/or volatile memory. Suitable non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. An information sharing method is applied to a system with at least two user spaces, wherein the at least two user spaces belong to different use roles; the method comprises the following steps:
acquiring application information and data information which belong to at least two user spaces in a system; the application information and the data information of the at least two user spaces are stored in a storage space allocated to the user spaces;
performing security level archiving on the application information and the data information; the security levels include at least a sharing level indicating shareable and a private level indicating non-shareable;
and when the first user space is newly built or switched to the first user space, migrating the application information and the data information which accord with the sharing security level and belong to the second user space to the first space.
2. The method of claim 1, wherein the information sharing method is implemented by using services in the system, and each user space calls the services to obtain the application information and the data information from other user spaces.
3. The method of claim 1, wherein the step of archiving the application information and the data information with a security level comprises:
under each user space, acquiring security level marks of the application information and the data information by the user;
performing security level archiving on the application information and the data information according to the security level mark;
wherein the security level indicia comprises at least: a shared token indicating shareable and a private token indicating non-shareable.
4. The method of claim 1, further comprising:
displaying the list of the application information and the data information belonging to the second user space in the first user space;
selecting applications and data to be migrated from the list in a first user space;
the selected application and data are migrated into a first space.
5. The method of claim 1, further comprising: data information of the same application of at least two user spaces is synchronized.
6. An information sharing apparatus is applied to a system having at least two user spaces belonging to different usage roles; characterized in that the device comprises:
the information acquisition module is used for acquiring application information and data information which belong to at least two user spaces in the system; the application information and the data information of the at least two user spaces are stored in a storage space allocated to the user spaces;
the security filing module is used for filing the application information and the data information in security level; the security levels include at least a sharing level indicating shareable and a private level indicating non-shareable;
and the sharing processing module is used for migrating the application information and the data information which accord with the sharing security level and belong to the second user space to the first space when the first user space is newly built or switched to the first user space.
7. The apparatus of claim 6, wherein the information sharing apparatus employs service implementation in the system, and each user space calls the service implementation to obtain the application information and the data information from other user spaces.
8. The apparatus of claim 6, wherein the secure archiving module comprises:
the marking unit is used for acquiring the security level marks of the application information and the data information by the user in each user space;
the archiving unit is used for archiving the security level of the application information and the data information according to the security level mark;
wherein the security level indicia comprises at least: a shared token indicating shareable and a private token indicating non-shareable.
9. The apparatus of claim 6, wherein the shared processing module further comprises:
the display unit is used for displaying the list of the application information and the data information belonging to the second user space in the first user space;
the selecting unit is used for selecting the application and the data which need to be migrated from the list in the first user space;
and the migration unit is used for migrating the selected application and data into the first space.
10. The apparatus of claim 6, wherein the information sharing apparatus further comprises:
and the synchronization module is used for synchronizing the data information of the same application of at least two user spaces.
11. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
12. A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 5 are implemented by the processor when executing the computer program.
CN201810270230.8A 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal Active CN108509788B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810270230.8A CN108509788B (en) 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal
PCT/CN2019/075388 WO2019184617A1 (en) 2018-03-29 2019-02-18 Information sharing method and device, computer-readable storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810270230.8A CN108509788B (en) 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal

Publications (2)

Publication Number Publication Date
CN108509788A CN108509788A (en) 2018-09-07
CN108509788B true CN108509788B (en) 2021-03-23

Family

ID=63379244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810270230.8A Active CN108509788B (en) 2018-03-29 2018-03-29 Information sharing method and device, computer readable storage medium and terminal

Country Status (2)

Country Link
CN (1) CN108509788B (en)
WO (1) WO2019184617A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509788B (en) * 2018-03-29 2021-03-23 Oppo广东移动通信有限公司 Information sharing method and device, computer readable storage medium and terminal
CN114301899B (en) * 2020-09-22 2022-10-25 荣耀终端有限公司 Data transmission method, system, electronic device and storage medium
CN113704209B (en) * 2021-07-27 2023-05-12 荣耀终端有限公司 Data sharing method, electronic device and storage medium
CN115981576B (en) * 2023-03-20 2023-11-17 荣耀终端有限公司 Method for sharing data, electronic device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318176A (en) * 2014-10-28 2015-01-28 东莞宇龙通信科技有限公司 Terminal and data management method and device thereof
CN104572218A (en) * 2015-01-28 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Application operation control method and system and terminal
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN105224886A (en) * 2014-06-26 2016-01-06 ***通信集团甘肃有限公司 A kind of mobile terminal safety partition method, device and mobile terminal
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
CN105912951A (en) * 2016-04-15 2016-08-31 北京小米移动软件有限公司 Data migration method and device
CN106485098A (en) * 2015-08-26 2017-03-08 北京奇虎科技有限公司 Application program encryption method, application program encryption device and terminal
CN106933555A (en) * 2015-12-30 2017-07-07 中国科学院上海高等研究院 A kind of data framework system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609448A (en) * 2012-01-10 2012-07-25 西北工业大学 Multi-user-version hierarchical document mapping method
CN102932535A (en) * 2012-10-18 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal shared by multiple users and using method for mobile terminal
CN106485137B (en) * 2015-08-26 2020-02-07 北京安云世纪科技有限公司 Application program control method, application program control device and terminal
CN107632775A (en) * 2016-07-19 2018-01-26 中兴通讯股份有限公司 Information sharing method, device and terminal between a kind of user's space
CN108509788B (en) * 2018-03-29 2021-03-23 Oppo广东移动通信有限公司 Information sharing method and device, computer readable storage medium and terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224886A (en) * 2014-06-26 2016-01-06 ***通信集团甘肃有限公司 A kind of mobile terminal safety partition method, device and mobile terminal
CN104318176A (en) * 2014-10-28 2015-01-28 东莞宇龙通信科技有限公司 Terminal and data management method and device thereof
CN104572218A (en) * 2015-01-28 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Application operation control method and system and terminal
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN106485098A (en) * 2015-08-26 2017-03-08 北京奇虎科技有限公司 Application program encryption method, application program encryption device and terminal
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN106933555A (en) * 2015-12-30 2017-07-07 中国科学院上海高等研究院 A kind of data framework system
CN105912951A (en) * 2016-04-15 2016-08-31 北京小米移动软件有限公司 Data migration method and device

Also Published As

Publication number Publication date
CN108509788A (en) 2018-09-07
WO2019184617A1 (en) 2019-10-03

Similar Documents

Publication Publication Date Title
US10635449B2 (en) Method and apparatus for running game client
CN108521494B (en) Terminal control method and device, readable storage medium and terminal
CN108509788B (en) Information sharing method and device, computer readable storage medium and terminal
CN108549698B (en) File processing method and device, mobile terminal and computer readable storage medium
CN108563932B (en) Application control method and device, readable storage medium and terminal
CN111313500B (en) Charging management method and device, electronic equipment and computer readable storage medium
CN109445917B (en) Application processing method and device, electronic equipment and computer readable storage medium
CN112703714A (en) Application program processing method and device, computer equipment and computer readable storage medium
CN106843868B (en) Multi-account login method and device and mobile terminal
CN108563754B (en) File processing method and device, mobile terminal and computer readable storage medium
WO2018166202A1 (en) Network positioning method, computer equipment and non-volatile readable storage medium
EP2869604B1 (en) Method, apparatus and device for processing a mobile terminal resource
CN108632454B (en) Information processing method and device, computer readable storage medium and terminal
CN107623612B (en) Flow display method and device, computer equipment and computer readable storage medium
CN106484563B (en) Data migration method and terminal equipment
WO2015120796A1 (en) Application-based service providing method, apparatus, and system
CN110753914B (en) Information processing method, storage medium and mobile terminal
CN110018886B (en) Application state switching method and device, electronic equipment and readable storage medium
CN112805988A (en) Call control method and device, computer readable storage medium and electronic equipment
WO2015067169A1 (en) Method, apparatus and terminal device for obtaining call log
CN110430252B (en) Resource data processing method and device, equipment and readable storage medium
CN109511139B (en) WIFI control method and device, mobile device and computer-readable storage medium
CN108513005B (en) Contact person information processing method and device, electronic equipment and storage medium
CN108537025B (en) Privacy protection method and device, computer readable storage medium and terminal
CN109992322B (en) Application program unloading method and device, storage medium and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant