CN108536783B - Data processing method and device, terminal and computer readable storage medium - Google Patents

Data processing method and device, terminal and computer readable storage medium Download PDF

Info

Publication number
CN108536783B
CN108536783B CN201810272186.4A CN201810272186A CN108536783B CN 108536783 B CN108536783 B CN 108536783B CN 201810272186 A CN201810272186 A CN 201810272186A CN 108536783 B CN108536783 B CN 108536783B
Authority
CN
China
Prior art keywords
space
data
public
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810272186.4A
Other languages
Chinese (zh)
Other versions
CN108536783A (en
Inventor
谭春宏
张俊
张伟杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810272186.4A priority Critical patent/CN108536783B/en
Publication of CN108536783A publication Critical patent/CN108536783A/en
Priority to PCT/CN2019/077531 priority patent/WO2019184684A1/en
Application granted granted Critical
Publication of CN108536783B publication Critical patent/CN108536783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a data processing method and device, a terminal and a computer readable storage medium. The method comprises the following steps: reading preset space information and role information in a terminal; wherein the space information includes a public space for storing public data and a character space for storing private data; public data shared by a plurality of roles is obtained, the public data is stored in a public space, and private data of each role is stored in a corresponding role space; and when the terminal runs, loading the spatial information according to the role information of the current user. By the method, the public data can be uniformly stored in the public space, so that the privacy of a user is protected, the storage space and system resources are saved, and the terminal can run more smoothly.

Description

Data processing method and device, terminal and computer readable storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a data processing method and apparatus, a terminal, and a computer-readable storage medium.
Background
With the intelligent development of communication equipment, people use intelligent terminals more and more frequently in daily life, when a plurality of roles share the same intelligent terminal, different roles may have some privacy information on the intelligent terminal, for example, the roles share the same intelligent terminal with family members, that is, multiple users share the same terminal; or the same user uses the intelligent terminal with different identities, such as life and work; privacy protection is required. According to the traditional privacy protection method, an independent space is allocated to each role on the intelligent terminal, and applications in each space are independent, so that some non-privacy applications can repeatedly appear in each space, for example, calendar, clock, weather, antivirus applications and the like can repeatedly appear in each space, waste of storage space is caused, and system resources are occupied.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, computer equipment and a storage medium, which can optimize storage space when a terminal is used in multiple roles and reduce waste of system resources.
A method of data processing, comprising:
reading preset space information and role information in a terminal; wherein the space information includes a public space for storing public data and a character space for storing private data;
public data shared by a plurality of roles is obtained, the public data is stored in a public space, and private data of each role is stored in a corresponding role space;
and when the terminal runs, loading the spatial information according to the role information of the current user.
A data processing apparatus comprising:
the information reading module is used for reading the space information and the role information preset in the terminal;
the data acquisition module is used for acquiring public data shared by a plurality of roles, storing the public data in a public space and storing the private data of each role in a corresponding role space;
and the space loading module is used for loading the space information according to the role information of the current user when the terminal runs.
A terminal comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to perform the steps of the data processing method.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the data processing method.
According to the data processing method and device, the terminal and the computer readable storage medium, public data shared by a plurality of roles is obtained by reading the space information and the role information preset in the terminal, the public data is stored in the public space, the private data of each role is stored in the corresponding role space, when the terminal runs, the space information is loaded according to the role information of the current user, the public data can be uniformly stored in the public space, the storage space and system resources are saved while the privacy of the user is protected, and the terminal runs more smoothly.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram of a data processing method in one embodiment;
FIG. 2 is a flow chart of a data processing method in yet another embodiment;
FIG. 3 is a flow chart of a data processing method in yet another embodiment;
FIG. 4 is a flowchart of a data processing method in yet another embodiment;
FIG. 5 is a flowchart of a data processing method in yet another embodiment;
FIG. 6 is a flowchart of a data processing method in yet another embodiment;
FIG. 7 is a schematic diagram of a user setup interface of the terminal in one embodiment;
FIG. 8 is a block diagram showing the structure of a data processing apparatus according to an embodiment;
fig. 9 is a schematic diagram of the internal structure of the terminal in one embodiment;
fig. 10 is a block diagram of a partial structure of a mobile phone related to a terminal provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first client may be referred to as a second client, and similarly, a second client may be referred to as a first client, without departing from the scope of the present application. Both the first client and the second client are clients, but they are not the same client.
In one embodiment, as shown in fig. 1, a data processing method is provided, which is applied to a terminal with multiple spaces, and when there are multiple roles using the terminal, space information on the terminal can be loaded according to role information of different roles, so that storage space on the terminal is more reasonably utilized, and system resources are saved. The data processing method comprises the following steps:
step 102: and reading the preset space information and role information in the terminal.
The terminal can be a mobile phone, a tablet computer, a personal digital assistant, a wearable device or the like. The terminal is provided with a multi-user mode, namely, a plurality of user spaces can be set on the terminal, the data of each user space is independent, a plurality of users can log in the same application, but the account data of the users are independent. Each user space may be encrypted by encryption means (e.g., authenticated password, fingerprint recognition, face recognition, etc.) to protect user privacy of each user space. Corresponding role information can be set in different user spaces, and the data access authority of the user spaces is limited according to the authority levels of the different role information. Role information includes, but is not limited to, multi-user identity information and multiple identity information for the same user.
For example, the types of user space may be divided into owner, sub-user and guest. The owner of the terminal, i.e. the terminal owner, generally logs in with the owner identity only when the terminal owner uses the terminal owner by himself, the owner has the highest authority level, and after logging in, the owner can perform all operations including adding or deleting other users, and authorizing the other users to use the functions of conversation and short message. The sub-user is other users who set up except owner, when more familiar relatives or friends used, can log in through sub-user's identity, and sub-user possesses secondary authority level, and after logging in, sub-user can use most function, nevertheless can't use can influence owner's function, if resume functions such as factory setting, do not disturb. The visitor is usually a user space set for temporarily accessing the user, when a less familiar friend borrows the visitor, the visitor can log in through the visitor identity, the permission level of the visitor is the lowest, and after the visitor logs in, the visitor user can only perform partial operation, cannot use short messages, installs unknown applications and the like.
Further, in order to store data in different user spaces independently, different storage spaces are preset in the terminal, and in this embodiment, space information of the storage space preset in the terminal is read, where the space information includes a public space for storing public data and a role space for storing private data. The public space refers to a storage space in which public data among different users can be stored, and the public data can be public applications, public contacts, public files and the like. The role space refers to a storage space for storing private data of different users, and the private data can be private applications, albums, private files and the like.
It can be understood that, the public space and the role space described in this embodiment both refer to data storage spaces for independently storing data; the user space described in this embodiment refers to a user operation space used by multiple roles, and different user spaces have independent user operation interfaces.
Step 104: public data shared by a plurality of roles is obtained, the public data is stored in a public space, and private data of each role is stored in a corresponding role space.
Specifically, the public data usually contains non-private applications of the user, such as a calendar, a clock, weather, antivirus applications, and the like, and does not relate to the private information of the user, and the public data can be used as data shared by the user, and such data is uniformly stored in a public space without revealing the privacy of the user. According to the embodiment, the public data shared by a plurality of roles in the non-privacy application is obtained and stored in the public space, so that the storage space of the terminal is saved.
For example, the application data on the terminal is detected and marked through an operating system of the terminal, and if the application data is detected to be provided with a user privacy identifier, the application corresponding to the application data is marked as a privacy application; and if the data under the application catalog is detected not to have the user privacy identification, marking the application as a public application. Further, the public data under the application catalog with the public application identifier is stored in the public space, so that the public data in the public space can be uniformly loaded when the public applications in the spaces corresponding to different roles are started, and system resources are effectively saved.
Step 106: and when the terminal runs, loading the spatial information according to the role information of the current user.
When the terminal runs, the system verifies the role information of the login user, for example, the role information of the login user is verified through a password verification mechanism, and the password verification mechanism in the process can be fingerprint password verification, digital password verification, graphic password verification or face password verification and the like. Specifically, receiving an authentication password input by a user in a user login interface, and judging whether the authentication password is matched with at least one preset password; and under the condition that the verification password is matched with the preset password, logging in a user space corresponding to the preset password.
Further, role information of the current login user is obtained, and the space information needing to be loaded is determined according to the access authority corresponding to the role information. Specifically, if the role information of the currently logged-in user is a guest, only public data in the public space may be loaded, that is, the public application may be accessed in the guest space. For example, when the owner of the terminal temporarily lends the terminal to another person for use, the owner can only load public data in the user space without desiring to access the privacy application of the owner of the terminal by another person. Optionally, if the role information of the current login user is the main user or the sub-user, the data of the public space and the role space can be loaded at the same time, wherein when different roles are switched, that is, when different user spaces are switched, the data of the public space can be kept unchanged, the corresponding role space data is switched only according to different roles, the utilization efficiency of the storage space is improved, and the system operation rate is increased.
According to the data processing method, public data shared by a plurality of roles is obtained by reading the preset space information and role information in the terminal, the public data is stored in the public space, the private data of each role is stored in the corresponding role space, when the terminal runs, the space information is loaded according to the role information of the current user, the public data can be uniformly stored in the public space, the privacy of the user is protected, meanwhile, the storage space and system resources are saved, and the terminal runs more smoothly.
In one embodiment, as shown in fig. 2, before reading the spatial information and the role information preset in the terminal, the method further includes the following steps:
step 202: a common space is created that independently stores common data.
The public space is used for storing public data in the spaces corresponding to different roles, and the public space and the role space respectively store data independently. The public data includes at least one of public applications, public contacts, and public files. A common space for independently storing common data is created by an operating system of the terminal.
Step 204: and detecting the data size of the public data, and determining the storage size of the public space according to the data size.
Specifically, in order to reasonably utilize the storage space of the terminal, the storage size of the public space can be created according to the data size of the public data to be stored, so that the utilization rate of system resources is increased. The system can count the data volume of the public data to be stored in advance, determine the size of the public space required by storing the public data according to the statistical result, reserve a certain data space, and then create the public space enough for storing the public data.
According to the embodiment, the data size of the public data to be stored is counted, and the storage size of the public space is determined according to the data size of the public data, so that the storage space can be more reasonably and effectively utilized, and the resource waste is avoided.
In one embodiment, as shown in fig. 3, the creating of the common space for independently storing the common data includes the following steps:
step 302: and acquiring a public identifier of the public data, and storing the data with the public identifier into a preset storage path.
The system marks public applications, data in a public application storage directory are public data, a public identifier of the public data is obtained, and the data with the public identifier are stored in a preset storage path. For example, when time data with a public identity is detected, the time data is stored in: public space/storage/embedded/0/time path.
Step 304: when the data is stored in the public space, whether the data needing to be stored carries the public identification is identified.
Further, the public space only stores public data, when the data are stored in the public space, whether the data needing to be stored carry a public identifier is identified to judge whether the data are the public data, and if the data needing to be stored carry the public identifier, the data are stored according to a preset public data storage path; if it is recognized that the data to be stored does not carry the public identity, step 306 is performed.
Step 306: and storing the data to a corresponding role space according to the privacy identification of the data.
If the data needing to be stored is not public data, the data is represented as private data, the private identification of the data is further identified, and the data is stored to the corresponding role space according to the private identification of the data.
The data processing method provided by the embodiment can isolate data in different storage spaces, so that the data in a public space and the data in a role space are independent from each other, and the privacy of a user is protected.
In an embodiment, as shown in fig. 4, when the terminal runs, the loading the spatial information according to the role information of the current user further includes the following steps:
step 402: and when the operation of switching the users is detected, determining the spatial information needing to be switched according to the access authority of the switched users.
When a user needs to be switched, role information of the user changes, namely, the user needs to enter different user spaces, space information needing to be loaded also changes at the moment, and the space information needing to be switched is determined according to the access authority of the switched user.
Optionally, receiving an authentication password input by a user through a current user space switching entrance, and determining whether the authentication password is matched with at least one preset password; and under the condition that the verification password is matched with the preset password, switching to the user space corresponding to the preset password through the switching entrance. The verification password can be one or more of a fingerprint password, a digital password, a graphic password or a human face password. The embodiment sets the verification password in the process of switching different spaces on the multi-role use terminal, and in the space switching process, only after the password is verified to be correct, the password can be switched to other spaces, and the password is only known by a user, so that the privacy of the user is stronger, and the protection of space switching is enhanced.
Further, the role information of the current login user after the user is switched is detected, and the authority level of the user is obtained according to the role information of the current login user.
Step 404: and if the switched user is a preset user, keeping the data of the public space unchanged, and loading the data of the role space corresponding to the preset user.
Specifically, the default user is represented as a user that gives explicit identity information, such as his family or an identity in life and work. The preset user has secondary access authority, that is, the preset user can use most functions, but cannot use functions which affect the owner, such as factory setting restoration, disturbance avoidance and the like.
For example, if the user after the switching is a family (e.g., a parent or a sibling), the current user has the right to use the public application and a part of the privacy application, and the data in the public space is kept unchanged, that is, the public application does not need to be repeatedly loaded, and only the public data in the public space needs to be directly called. And further loading data of the role space corresponding to the family, for example, loading data of the role space where the mother is located, so that the data stored in the role space where the mother is located can be accessed, such as photos, audio, videos and the like.
The data processing method provided by the embodiment can keep the data in the public space unchanged when switching to different user spaces, only switches the data in the corresponding role space according to different roles, improves the utilization efficiency of the storage space, and improves the system operation speed.
In an embodiment, as shown in fig. 5, after the loading the spatial information according to the role information of the current user, the method further includes:
step 502: when the first space in the foreground running state receives the notification of the second space in the background running state, whether the notification checking operation exists or not is detected.
Specifically, the first space represents a currently running space, that is, a space that a user can directly see through a display interface of the terminal, and the second space represents a space that runs in the background, that is, a notification message of the second space cannot be directly seen through the display interface of the terminal. When a user logs in the first space, the second space except the first space is also in a low-power-consumption working state and can still receive the notification message, when the second space in a background running state receives the notification message, the system can forward the notification message to the first space in a foreground running state, and the first space reminds the user to select whether to check the notification message. And when receiving the notification of the second space in the background running state, the first space in the foreground running state displays the notification message to the current display page, and detects whether a notification viewing operation exists, wherein the notification viewing operation includes but is not limited to a point control operation, a touch control operation, a gesture operation and the like.
Step 504: and if the notification check request is detected, prompting the user to input verification information, and judging whether the verification information input by the user is matched with preset verification information. If yes, go to step 506.
Step 506: and extracting the notification message of the second space, and displaying the notification message in a display page of the first space.
Specifically, after the first space receives the notification message of the second space, if verification information requesting access to the message details is detected and the verification information is matched with preset verification information, the message details of the second space are extracted and displayed on the top layer of the current display interface of the first space. Optionally, when the first space receives the notification message of the second space, a temporary space may be established to process the notification message, and the message of a single application of the background user is extracted and processed, the extracted notification message is temporarily stored in the temporary space, and the temporary space is destroyed after receiving the instruction that the message processing is completed, or the temporary space is destroyed if no message processing response is received within a preset time length, so as to avoid wasting the storage space.
According to the data processing method provided by the embodiment, the notification message in the second space in the background running state is processed through the first space in the foreground running state, the notification messages in different spaces can be processed without switching users, and the processing time is saved.
In one embodiment, as shown in fig. 6, the data processing method further includes:
step 602: and acquiring an operation instruction which is input by a user and acts on a user setting interface.
Specifically, referring to fig. 7, a schematic diagram of a user setting interface for setting role information is shown, where the user setting interface is used to set role information, and may include adding a user, deleting a user, setting user permissions, and the like. When the operation instruction input by the user and acting on the user setting interface is detected, step 604 is executed.
Step 604: and setting the role information according to the operation instruction.
For example, when an operation instruction of adding or adding a visitor is received, a user setting interface prompts an adding sub-user or a visitor user, after the user is added, a user icon appears on a screen locking interface, and the user displayed on the screen locking interface is the user who logs in currently. When an operation instruction of a user for deletion is received, the user setting interface prompts whether the user needs to be deleted, such as "do the user to be removed? The system will delete all applications and data ", determine if the current user needs to be deleted based on the user feedback, and the deleting user will simultaneously clear the user's data. When receiving the authority setting operation, acquiring the role needing to set the authority, prompting whether the authority needs to be granted or not by a user setting interface, such as 'allowing to use the call and information and sharing the communication record', determining whether the authority is granted or not according to the user feedback, and after obtaining the authority, the user can use the functions of the telephone and the short message and can also share the call record and the short message with the host. If the owner authorizes a plurality of sub-users, the authorized sub-users can share the call records and the short messages. Optionally, when the user needs to switch roles, the user clicks the role to be logged in, and clicks to switch roles in a popup menu. And clicking a role icon on a screen locking interface, then clicking a role to be logged in, and logging in the switched user space after password verification.
The data processing method provided by the embodiment can set the role information according to the operation instruction which is input by the user and acts on the user setting interface, is convenient for managing the terminal used by multiple roles, and improves the user experience.
It should be understood that although the various steps in the flow charts of fig. 1-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-6 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
As shown in fig. 8, in one embodiment, there is provided a data processing apparatus comprising: the system comprises an information reading module 810, a data acquisition module 820 and a space loading module 830.
The information reading module 810 is configured to read spatial information and role information preset in the terminal.
A data obtaining module 820, configured to obtain public data shared by multiple roles, store the public data in a public space, and store private data of each role in a corresponding role space.
And a space loading module 830, configured to load the space information according to the role information of the current user when the terminal runs.
According to the data processing device, the information reading module 810 is used for reading preset space information and role information in the terminal, the data acquisition module 820 is used for acquiring public data shared by a plurality of roles, the public data are stored in the public space, the private data of each role are stored in the corresponding role space, when the terminal runs, the space loading module 830 is used for loading the space information according to the role information of a current user, the public data can be uniformly stored in the public space, the user privacy is protected, meanwhile, the storage space and system resources are saved, and the terminal runs more smoothly.
In one embodiment, the system further comprises a space creation module for creating a common space for independently storing common data; and detecting the data size of the public data, and determining the storage size of the public space according to the data size.
In one embodiment, the space creation module is further configured to obtain a public identifier of the public data, and store the data with the public identifier in a preset storage path; when data are stored in the public space, whether the data needing to be stored carry the public identification is identified; and if not, not storing the data to a public space, and storing the data to a corresponding role space according to the privacy identification of the data.
In one embodiment, the space loading module 830 is further configured to obtain role information of the current login user; determining space information to be loaded according to the access authority corresponding to the role information; and if the current login user is the visitor, only loading the data in the public space.
In one embodiment, the space loading module 830 is further configured to determine, when detecting an operation of switching a user, space information to be switched according to an access right of the switched user; and if the switched user is a preset user, keeping the data of the public space unchanged, and loading the data of the role space corresponding to the preset user.
In one embodiment, the system further comprises a notification processing module, configured to detect whether a notification viewing operation exists when a first space in a foreground running state receives a notification of a second space in a background running state; if the notification check request is detected, prompting a user to input verification information, and judging whether the verification information input by the user is matched with preset verification information; and if so, extracting the notification message of the second space, and displaying the notification message in a display page of the first space.
In one embodiment, the system further comprises a role setting module, configured to obtain an operation instruction, which is input by a user and acts on a user setting interface; wherein the user setting interface is used for setting role information; and setting the role information according to the operation instruction.
The division of the modules in the data processing apparatus is only for illustration, and in other embodiments, the data processing apparatus may be divided into different modules as needed to complete all or part of the functions of the data processing apparatus.
For specific limitations of the data processing apparatus, reference may be made to the above limitations of the data processing method, which are not described herein again. The various modules in the data processing apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The implementation of each module in the data processing apparatus provided in the embodiments of the present application may be in the form of a computer program. The computer program may be run on a terminal or a server. The program modules constituted by the computer program may be stored on the memory of the terminal or the server. Which when executed by a processor, performs the steps of the method described in the embodiments of the present application.
Fig. 9 is a schematic diagram of the internal structure of the terminal in one embodiment. As shown in fig. 9, the terminal includes a processor, a memory, and a network interface connected through a system bus. Wherein, the processor is used for providing calculation and control capability and supporting the operation of the whole electronic equipment. The memory is used for storing data, programs and the like, and at least one computer program is stored on the memory and can be executed by the processor to realize the data processing method suitable for the multi-role terminal provided by the embodiment of the application. The memory may include a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The computer program can be executed by a processor to implement the data processing method provided in the following embodiments. The internal memory provides a cached execution environment for the operating system computer programs in the non-volatile storage medium. The network interface may be an ethernet card or a wireless network card, etc. for communicating with an external electronic device. The electronic device may be a mobile phone, a tablet computer, or a personal digital assistant or a wearable device, etc.
The embodiment of the application also provides a computer readable storage medium. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the data processing methods as described in the embodiments above.
The embodiment of the application also provides a computer program product. A computer program product comprising instructions which, when run on a computer, cause the computer to perform the data processing method described in the embodiments above.
The embodiment of the application also provides the terminal equipment. As shown in fig. 10, for convenience of explanation, only the parts related to the embodiments of the present application are shown, and details of the technology are not disclosed, please refer to the method part of the embodiments of the present application. The terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the like, taking the terminal device as the mobile phone as an example:
fig. 10 is a block diagram of a partial structure of a mobile phone related to a terminal provided in an embodiment of the present application. Referring to fig. 10, the cellular phone includes: radio Frequency (RF) circuit 1010, memory 1020, input unit 1030, display unit 1040, sensor 1050, audio circuit 1060, wireless fidelity (WiFi) module 1070, processor 1080, and power source 1090. Those skilled in the art will appreciate that the handset configuration shown in fig. 10 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The RF circuit 1010 may be configured to receive and transmit signals during information transmission and reception or during a call, and may receive downlink information of a base station and then process the received downlink information to the processor 1080; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 1010 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE)), e-mail, Short Messaging Service (SMS), and the like.
The memory 1020 can be used for storing software programs and modules, and the processor 1080 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 1020. The memory 1020 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, and the like), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, the memory 1020 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 1030 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 1000. Specifically, the input unit 1030 may include a touch panel 1031 and other input devices 1032. The touch panel 1031, which may also be referred to as a touch screen, may collect touch operations by a user (e.g., operations by a user on or near the touch panel 1031 using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. In one embodiment, the touch panel 1031 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1080, and can receive and execute commands sent by the processor 1080. In addition, the touch panel 1031 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 1030 may include other input devices 1032 in addition to the touch panel 1031. In particular, other input devices 1032 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
The display unit 1040 may be used to display information input by a user or information provided to the user and various menus of the cellular phone. The display unit 1040 may include a display panel 1041. In one embodiment, the Display panel 1041 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, the touch panel 1031 can overlay the display panel 1041, and when the touch panel 1031 detects a touch operation on or near the touch panel 1031, the touch operation is transmitted to the processor 1080 to determine the type of the touch event, and then the processor 1080 provides a corresponding visual output on the display panel 1041 according to the type of the touch event. Although in fig. 10, the touch panel 1031 and the display panel 1041 are two separate components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 1031 and the display panel 1041 may be integrated to implement the input and output functions of the mobile phone.
The cell phone 1000 may also include at least one sensor 1050, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1041 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 1041 and/or the backlight when the mobile phone moves to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
Audio circuitry 1060, speaker 1061, and microphone 1062 may provide an audio interface between a user and a cell phone. The audio circuit 1060 can transmit the electrical signal converted from the received audio data to the speaker 1061, and the electrical signal is converted into a sound signal by the speaker 1061 and output; on the other hand, the microphone 1062 converts the collected sound signal into an electrical signal, which is received by the audio circuit 1060 and converted into audio data, and the audio data is processed by the audio data output processor 1080 and then transmitted to another mobile phone through the RF circuit 1010, or the audio data is output to the memory 1020 for subsequent processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help the user to send and receive e-mail, browse web pages, access streaming media, etc. through the WiFi module 1070, which provides wireless broadband internet access for the user. Although fig. 10 shows the WiFi module 1070, it is to be understood that it does not belong to the essential constitution of the handset 1000 and may be omitted as needed.
The processor 1080 is a control center of the mobile phone, connects various parts of the whole mobile phone by using various interfaces and lines, and executes various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 1020 and calling data stored in the memory 1020, thereby integrally monitoring the mobile phone. In one embodiment, processor 1080 may include one or more processing units. In one embodiment, processor 1080 may integrate an application processor and a modem processor, wherein the application processor primarily handles operating systems, user interfaces, applications, and the like; the modem processor handles primarily wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 1080.
The handset 1000 also includes a power supply 1090 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 1080 via a power management system that may be configured to manage charging, discharging, and power consumption.
In one embodiment, the cell phone 1000 may also include a camera, a bluetooth module, and the like.
In the embodiment of the present application, when the processor 1080 included in the terminal device executes the computer program stored in the memory, the data processing method described in the above embodiments is implemented.
When the computer program running on the processor is executed, the public data can be uniformly stored in the public space, so that the user privacy is protected, the storage space and the system resource are saved, and the terminal runs more smoothly.
Any reference to memory, storage, database, or other medium used herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. A data processing method, comprising:
reading preset space information and role information in a terminal; wherein the space information includes a public space for storing public data and a character space for storing private data;
public data shared by a plurality of roles is obtained, the public data is stored in a public space, and private data of each role is stored in a corresponding role space;
acquiring role information of a current login user;
determining space information to be loaded according to the access authority corresponding to the role information;
if the current login user is a visitor, only loading data in the public space;
when the operation of switching the users is detected, determining the spatial information needing to be switched according to the access authority of the switched users;
when switching between different roles, the data of the public space is kept unchanged, and the data of the corresponding role space is switched only according to different roles;
when a first space in a foreground running state receives a notification of a second space in a background running state, detecting whether a notification checking request exists or not;
if the notification check request is detected, prompting a user to input verification information, and judging whether the verification information input by the user is matched with preset verification information;
and if so, extracting the notification message of the second space, and displaying the notification message in a display page of the first space.
2. The method of claim 1, wherein before reading the spatial information and the role information preset in the terminal, the method further comprises:
creating a common space for independently storing common data; the public data at least comprises more than one of public applications, public contacts and public files;
and detecting the data size of the public data, and determining the storage size of the public space according to the data size.
3. The method of claim 2, wherein creating a common space for independently storing common data comprises:
acquiring a public identifier of the public data, and storing the data with the public identifier into a preset storage path;
when data are stored in the public space, whether the data needing to be stored carry the public identification is identified;
and if not, not storing the data to a public space, and storing the data to a corresponding role space according to the privacy identification of the data.
4. The method of claim 1, further comprising:
acquiring an operation instruction which is input by a user and acts on a user setting interface; wherein the user setting interface is used for setting role information;
and setting the role information according to the operation instruction.
5. A data processing apparatus, comprising:
the information reading module is used for reading the space information and the role information preset in the terminal;
the data acquisition module is used for acquiring public data shared by a plurality of roles, storing the public data in a public space and storing the private data of each role in a corresponding role space;
the space loading module is used for acquiring the role information of the current login user; determining space information to be loaded according to the access authority corresponding to the role information; if the current login user is a visitor, only loading data in the public space;
the notification processing module is used for detecting whether a notification checking request exists or not when the first space in the foreground running state receives the notification of the second space in the background running state; if the notification check request is detected, prompting a user to input verification information, and judging whether the verification information input by the user is matched with preset verification information; if so, extracting the notification message of the second space, and displaying the notification message in a display page of the first space;
the space loading module is also used for determining space information needing to be switched according to the access authority of the switched user when the operation of switching the user is detected; when switching between different roles, the data of the common space is kept unchanged, and the data of the corresponding role space is switched according to different roles.
6. The apparatus of claim 5, further comprising a space creation module for creating a common space for independently storing common data; and detecting the data size of the public data, and determining the storage size of the public space according to the data size.
7. The device of claim 6, wherein the space creation module is further configured to obtain a public identifier of the public data, and store the data with the public identifier in a preset storage path; when data are stored in the public space, whether the data needing to be stored carry the public identification is identified; and if not, not storing the data to a public space, and storing the data to a corresponding role space according to the privacy identification of the data.
8. A terminal comprising a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, causes the processor to carry out the steps of the data processing method according to any one of claims 1 to 4.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the data processing method according to any one of claims 1 to 4.
CN201810272186.4A 2018-03-29 2018-03-29 Data processing method and device, terminal and computer readable storage medium Active CN108536783B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810272186.4A CN108536783B (en) 2018-03-29 2018-03-29 Data processing method and device, terminal and computer readable storage medium
PCT/CN2019/077531 WO2019184684A1 (en) 2018-03-29 2019-03-08 Data processing method and apparatus, and terminal and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810272186.4A CN108536783B (en) 2018-03-29 2018-03-29 Data processing method and device, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108536783A CN108536783A (en) 2018-09-14
CN108536783B true CN108536783B (en) 2021-03-02

Family

ID=63481575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810272186.4A Active CN108536783B (en) 2018-03-29 2018-03-29 Data processing method and device, terminal and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN108536783B (en)
WO (1) WO2019184684A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536783B (en) * 2018-03-29 2021-03-02 Oppo广东移动通信有限公司 Data processing method and device, terminal and computer readable storage medium
CN109656456B (en) * 2018-12-25 2020-10-20 杭州达现科技有限公司 Display interface directory sharing method and device
CN109683772A (en) * 2018-12-25 2019-04-26 杭州达现科技有限公司 A kind of catalogue combination method and device based on display interface
CN109933294B (en) * 2019-03-26 2023-10-17 努比亚技术有限公司 Data processing method and device, wearable device and storage medium
CN110471870B (en) * 2019-08-14 2022-01-07 Oppo广东移动通信有限公司 Multi-system operation method and device, electronic equipment and storage medium
CN110852634A (en) * 2019-11-14 2020-02-28 启迪数华科技有限公司 Data storage method, storage device, server, readable storage medium and equipment
CN111460481A (en) * 2020-04-14 2020-07-28 Oppo广东移动通信有限公司 Privacy protection method, device and equipment based on terminal equipment
CN112882652A (en) * 2021-01-18 2021-06-01 深圳市华联通信息***有限公司 Network sharing storage system and method
CN112905328B (en) * 2021-03-04 2023-09-19 杭州海康威视数字技术股份有限公司 Task processing method, device and computer readable storage medium
CN115296883A (en) * 2022-08-01 2022-11-04 杭州虎符网络有限公司 Method and device for data security access and electronic equipment
CN116679883B (en) * 2023-06-13 2024-02-02 博泰车联网(南京)有限公司 Information storage method for vehicle, electronic device, and computer-readable storage medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0715241B1 (en) * 1994-10-27 2004-01-14 Mitsubishi Corporation Apparatus for data copyright management system
CN1674695A (en) * 2004-03-23 2005-09-28 上海迪比特实业有限公司 Personal information security method based on user recognition card
GB0722267D0 (en) * 2007-11-13 2007-12-27 Vodafone Plc Telecommunications device security
US9178981B2 (en) * 2010-12-22 2015-11-03 Lg Electronics Inc. Mobile terminal and method of sharing information therein
CN102263846B (en) * 2011-08-15 2017-02-15 中兴通讯股份有限公司 User information storing method and device
CN102307255A (en) * 2011-08-15 2012-01-04 中兴通讯股份有限公司 Mobile phone and subscriber information storage method thereof
CN105641934B (en) * 2015-12-25 2019-05-14 北京像素软件科技股份有限公司 The method and device that player role switches in real time in a kind of same account
CN105446901A (en) * 2015-12-28 2016-03-30 青岛海信移动通信技术股份有限公司 Data processing method and device for multi-user terminal
CN105912954A (en) * 2016-05-16 2016-08-31 北京珠穆朗玛移动通信有限公司 Privacy information protection method and system suitable for mobile terminal
CN106095220B (en) * 2016-05-30 2019-09-27 北京小米移动软件有限公司 Notification message reminding method and device
CN106375349B (en) * 2016-11-29 2019-11-08 北京元心科技有限公司 Multi-system notification message processing method and device
CN106886416B (en) * 2017-03-08 2020-03-17 北京小米移动软件有限公司 Multi-user spatial processing method and device
CN108536783B (en) * 2018-03-29 2021-03-02 Oppo广东移动通信有限公司 Data processing method and device, terminal and computer readable storage medium

Also Published As

Publication number Publication date
CN108536783A (en) 2018-09-14
WO2019184684A1 (en) 2019-10-03

Similar Documents

Publication Publication Date Title
CN108536783B (en) Data processing method and device, terminal and computer readable storage medium
CN108616652B (en) Data protection method and device, terminal and computer readable storage medium
CN106778175B (en) Interface locking method and device and terminal equipment
CN108521494B (en) Terminal control method and device, readable storage medium and terminal
CN107395880B (en) Information display method and device and terminal
EP3567887B1 (en) Communication method and device
CN108563932B (en) Application control method and device, readable storage medium and terminal
CN107145794B (en) Data processing method and device and mobile terminal
CN108549698B (en) File processing method and device, mobile terminal and computer readable storage medium
US10531301B2 (en) Network access method, apparatus, and system
US20190026452A1 (en) Method for Associating Application Program with Biometric Feature, Apparatus, and Mobile Terminal
CN108632454B (en) Information processing method and device, computer readable storage medium and terminal
CN108509788B (en) Information sharing method and device, computer readable storage medium and terminal
CN111357245B (en) Information searching method, terminal, network equipment and system
CN110460700B (en) Display screen control method and device, electronic equipment and storage medium
CN108537027A (en) Resource allocation methods and device, terminal, computer readable storage medium
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
US20140047536A1 (en) Electronic device and method for performing user authentication using access point and peripheral device
CN112163194A (en) Authorization method of application permission, mobile terminal and computer storage medium
CN108537025B (en) Privacy protection method and device, computer readable storage medium and terminal
CN107526960B (en) System and method for protecting mobile contact information
CN107147778B (en) Data processing method and device and mobile terminal
CN108549823B (en) Multi-role using method and device of terminal and electronic equipment
CN110753909B (en) Service scheduling method and device, computer equipment and computer readable storage medium
CN109246290B (en) Authority management method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant