CN109547330A - A kind of information sharing method and device - Google Patents
A kind of information sharing method and device Download PDFInfo
- Publication number
- CN109547330A CN109547330A CN201811384523.5A CN201811384523A CN109547330A CN 109547330 A CN109547330 A CN 109547330A CN 201811384523 A CN201811384523 A CN 201811384523A CN 109547330 A CN109547330 A CN 109547330A
- Authority
- CN
- China
- Prior art keywords
- strategy
- shares
- information
- safety
- sharing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of information sharing method and devices.The described method includes: detecting whether to exist and sharing strategy with matched first safety of the target information in the sharing instruction for monitoring target information;If it does not exist, then it detects whether to exist and shares strategy with matched second safety of the target information;When sharing strategy there are second safety, shares strategy according to second safety and share the target information.The present invention can effectively avoid the problem that the sharing of user information causes privacy of user to reveal, and ensure that the safety of privacy of user, improve the usage experience of user.
Description
Technical field
The present invention relates to mobile communication technology fields, share dress with a kind of information more particularly to a kind of information sharing method
It sets.
Background technique
Now with the rapid development of the communication technology, mobile terminal (such as mobile phone) occupies in people's lives work
Very big specific gravity.
The time of user's stop at present on the mobile apparatus is increasingly longer, and privacy also becomes more and more important, and network society
The rise of friendship causes to share the article sharing that this function is more and more common, carries out after reading a good article such as user
Deng.
But guaranteeing the privacy control shared about none good security mechanism is shared, equipment is by other people
Having taken arbitrarily to cause the leakage of private information of user to network by sharing information, it is most likely that lead to the property of user
Loss, reduces the usage experience of user.
Summary of the invention
The embodiment of the present invention provides a kind of information sharing method and device, and sharing to lack to solve information in the prior art has
The security mechanism of effect is come the problem of guaranteeing the privacy of user, reduce user experience.
In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:
In a first aspect, the embodiment of the invention provides a kind of information sharing methods, comprising: in point for monitoring target information
When enjoying instruction, detects whether to exist and share strategy with matched first safety of the target information;If it does not exist, then it detects whether
Share strategy in the presence of with matched second safety of the target information;When sharing strategy there are second safety, according to institute
It states the second safety and shares the strategy sharing target information.
Second aspect, the embodiment of the invention provides a kind of information sharing apparatus, comprising: first shares strategy detection mould
Block, in the sharing instruction for monitoring target information, detecting whether exist and matched first safety of the target information
Share strategy;Second shares tactful detection module, for detecting whether exist when sharing strategy there is no first safety
Share strategy with matched second safety of the target information;First object information share module, for there are described second
When safety shares strategy, shares strategy according to second safety and share the target information.
The third aspect the embodiment of the invention provides a kind of mobile terminal, including processor, memory and is stored in described
It is real when the computer program is executed by the processor on memory and the computer program that can run on the processor
The step of existing information sharing method as described in any one of the above embodiments.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage
Computer program is stored on medium, the computer program realizes information as described in any one of the above embodiments point when being executed by processor
The step of enjoying method.
In embodiments of the present invention, by when the sharing for monitoring target information instructs, detecting whether to exist and target
First safety of information matches shares strategy, if it does not exist, then detects whether exist and matched second safety point of target information
Strategy is enjoyed, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the target information.The present invention is real
It applies example and strategy is shared by addition safety, the sharing that strategy carries out information is shared according to safety, compared to the prior art scheme, energy
It is enough effectively to avoid the problem that privacy of user caused by the sharing of user information is revealed, it ensure that the safety of privacy of user, improve
User experience.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of information sharing method provided in an embodiment of the present invention;
Fig. 2 is a kind of step flow chart of information sharing method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention;
Fig. 5 is a kind of structural block diagram of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Embodiment one
Referring to Fig.1, a kind of step flow chart of information sharing method provided in an embodiment of the present invention, the information point are shown
The method of enjoying can be applied to mobile terminal, can specifically include following steps:
Step 101: in the sharing instruction for monitoring target information, detecting whether to exist matched with the target information
First safety shares strategy.
In embodiments of the present invention, mobile terminal can for mobile phone, PDA (Personal Digital Assistant, it is a
Personal digital assistant), the mobile electronic devices such as tablet computer.
Target information can refer to the information of the types such as video, picture, text, and specifically, the embodiment of the present invention is not subject to
Limitation.
When the sharing instruction of target information refers to that the sharing operation button for the click target information that user executes is shared
The instruction of triggering, when sharing this article, is clicked corresponding " sharing " for example, reading an article from microblogging in user
The instruction etc. that button is triggered.
First safety shares strategy can share strategy, i.e., point of all information occurred in mobile terminal for global dimension
Enjoy the strategy for being required to carry out safety verification.The monitoring program for sharing instruction can be preset in mobile terminal system, it can
Real-time monitoring is carried out with the sharing of the target information executed to user, in the sharing instruction for monitoring target information, is then detected
In mobile terminal system with the presence or absence of in target information it is matched first safety share strategy, that is, detect in the terminal whether
It pre-sets global dimension and shares strategy.
In the case where there is the first safety sharing strategy in the terminal, strategy sharing can be shared according to the first safety
Target information will specifically be described in detail, the embodiment of the present invention is not repeated here herein in following embodiments two.
In the case where sharing strategy there is no the first safety in the terminal, step 102 is executed.
Step 102: detecting whether to exist and share strategy with matched second safety of the target information.
In embodiments of the present invention, it may include: to share strategy to include file type dimension point that the second safety, which shares strategy,
Enjoy strategy, geography dimension shares strategy, time dimension shares strategy, file directory dimension is shared in the strategy such as strategy extremely
Few one kind.
In the case where there are a variety of above-mentioned described second safety sharing strategies in the terminal, it can preset
A variety of safety share the detection priority of strategy.
In the present invention, it is arranged successively according to the sequence of detection priority from high to low are as follows: file type dimension shares plan
Slightly, geography dimension shares strategy, time dimension shares strategy, file directory dimension shares strategy, i.e., in the terminal
In the case where sharing strategy there is no the first safety, it can be detected according to the sequence of priority from high to low, there are excellent
When the first higher safety of grade shares strategy, then preferentially shares strategy according to the higher safety of priority and target information is divided
It enjoys, for example, being previously provided in mobile phone, file type dimension shares strategy, geography dimension shares strategy, time dimension
Share strategy, then first detection file type dimension share strategy, in the presence of, then with file type dimension share strategy to mesh
Mark information is shared.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating
Example, not as the sole limitation to the embodiment of the present invention.
In embodiments of the present invention, the position that can also be presently according to the historical behavior data of user, mobile terminal
And the file directory of file locating for target information, automatic addition safety are shared strategy, specifically, are carried out with embodiments discussed below
Detailed description.
In a preferred embodiment of an embodiment of the present invention, before above-mentioned steps 101, can also include:
Sub-step S1: according to the historical behavior data of user, determine that the user's operation number is greater than the behaviour of setting number
Make the corresponding target information type of behavior;
Sub-step S2: file type dimension is added for the corresponding first information of the target information type and shares strategy;Or
Sub-step S3: the current location of the mobile terminal is obtained;
Sub-step S4: when the current location is in setting privacy scene, geography dimension is added for all information
Share strategy;Or
Sub-step S5: file directory where the second information is obtained;
Sub-step S6: when the file directory is setting privacy catalogue, file directory dimension is added for second information
Degree shares strategy.
In embodiments of the present invention, the situation for sharing strategy safely for above-mentioned automatic addition is described below respectively.
1, file type dimension is added based on user's history behavioral data automatically and shares strategy
The user's history behavioral data in mobile terminal system can be acquired, and is determined from user's history behavioral data
User's operation number is greater than the corresponding target information type of operation behavior of setting number, for example, user has a large amount of often recordings
Section video, hair social category update blit piece the case where, and for setting number can preset, the embodiment of the present invention to this not
It limits.
In this case, then file type dimension is added for the corresponding first information of target information type automatically share plan
Slightly, for example, sharing limitation etc. for video class, the corresponding information addition of picture category.
2, geography dimension is added based on mobile terminal current location automatically and shares strategy
Mobile terminal can also obtain the position being presently in automatically, be setting privacy field in the current position of mobile terminal
Scape, such as bank, secret unit, when it is high privacy scene (i.e. setting privacy scene) that mobile terminal, which is presently in position,
All information as in mobile terminal add geography dimension automatically and share strategy, namely hidden in setting in mobile terminal
When private scene, the sharing to all information of mobile terminal is needed to add security restriction, to avoid privacy of user leakage.
Certainly, when detecting that mobile terminal is in except setting privacy scene, then above-mentioned foundation can be automatically closed
Geography dimension shares strategy.
3, it adds file directory dimension automatically based on file directory and shares strategy
In the present invention, the second information refers under the information such as the picture of mobile terminal side, video namely All Files catalogue
Information.File directory where available each second information is in setting privacy catalogue in the second information, and such as financial class is contour
Privacy application data directory etc. can add file directory dimension for the second information under setting privacy catalogue automatically and share plan
Slightly.
In the embodiment of the present invention, by intelligentized to there are the data files of high privacy risk to add sharing password automatically
Control strategy can reinforce the personal secrets of user.
Certainly, in practical applications, the corresponding safety of different types of information can also be preset by user shares plan
Slightly, it is also possible to use aforesaid way to be arranged automatically by system, the embodiments of the present invention are not limited thereto.
When sharing strategy there are the second safety, step 103 is executed.
Step 103: when there are the second safety sharing strategy, sharing described in strategy sharing according to second safety
Target information.
When there is the second safety sharing strategy in the terminal, then it can share strategy sharing target according to the second safety
Information specifically can issue the user with sharing verification, and obtain the check information of user's input when sharing target information.
When the check information of user's input is verified, then share target information, does not pass through in the check information verifying of user's input
When, then cancel the sharing of target information, specifically, will be described in detail in following embodiments two, the embodiment of the present invention pair
This is without restriction.
Information sharing method provided in an embodiment of the present invention, by detecting when the sharing for monitoring target information instructs
Share strategy with the presence or absence of with matched first safety of target information, if it does not exist, then detects whether exist and target information
The second safety matched shares strategy, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the mesh
Mark information.The embodiment of the present invention shares strategy by addition safety, shares the sharing that strategy carries out information according to safety, compared to
Prior art can effectively avoid the problem that privacy of user caused by the sharing of user information is revealed, ensure that user is hidden
Private safety, improves user experience.
Embodiment two
Referring to Fig. 2, a kind of step flow chart of information sharing method provided in an embodiment of the present invention, the information point are shown
The method of enjoying can be applied to mobile terminal, can specifically include following steps:
Step 201: in the sharing instruction for monitoring target information, detecting whether to exist matched with the target information
First safety shares strategy.
In embodiments of the present invention, mobile terminal can for mobile phone, PDA (Personal Digital Assistant, it is a
Personal digital assistant), the mobile electronic devices such as tablet computer.
Target information can refer to the information of the types such as video, picture, text, and specifically, the embodiment of the present invention is not subject to
Limitation.
When the sharing instruction of target information refers to that the sharing operation button for the click target information that user executes is shared
The instruction of triggering, when sharing this article, is clicked corresponding " sharing " for example, reading an article from microblogging in user
The instruction etc. that button is triggered.
First safety shares strategy can share strategy, i.e., point of all information occurred in mobile terminal for global dimension
Enjoy the strategy for being required to carry out safety verification.The monitoring program for sharing instruction can be preset in mobile terminal system, it can
Real-time monitoring is carried out with the sharing of the target information executed to user, in the sharing instruction for monitoring target information, is then detected
In mobile terminal system with the presence or absence of in target information it is matched first safety share strategy, that is, detect in the terminal whether
It pre-sets global dimension and shares strategy.
In the case where there is the first safety sharing strategy in the terminal, step 202 is executed.And in the terminal not
In the case where sharing strategy there are the first safety, step 205 is executed.
Step 202: when sharing strategy there are first safety, obtaining and show and share strategy with first safety
Matched first verification mode.
In embodiments of the present invention, the first verification mode can be cryptographic check mode, finger-mark check mode, recognition of face
Any one of verification modes such as verification mode, the embodiments of the present invention are not limited thereto.
The mapping relations that the first safety shares strategy with verification mode are pre-saved in mobile terminal side, are obtaining first
After safety shares strategy, with first it can share the first verification side of strategy matching safely by Relation acquisition according to above-mentioned mapping
Formula.
After obtaining the first verification mode, the first verification mode, example can be shown in the displaying interface of mobile terminal
Such as, when user clicks and shares, Password Input frame can be shown to obtain the password of user's input, or show fingerprint authentication figure
Mark to obtain the finger print information of user's input, or shows recognition of face frame, to obtain the face information etc. of user's input.
Step 203: obtaining the first check information that user inputs according to first verification mode.
It, can be by user according to the first verification mode after the first verification mode to be showed in mobile terminal and shows interface
Corresponding check information is inputted, and then executes step 204.
Step 204: when first check information is proved to be successful, sharing the target information.
The corresponding correct check information of the first verification mode is also preserved in the terminal, just such as cryptographic check mode
True check information is " 0123456 ", and the correct check information of finger-mark check mode is " user's A left hand thumb finger print information " etc.
Deng.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating
Example, not as the sole limitation to the embodiment of the present invention.
Obtain user according to the first verification mode input the first check information after, can by the first check information with
The corresponding correct check information of first verification mode is compared, to determine whether the two matches, in the first check information and just
When true check information matching, then it represents that the first check information of user's input is proved to be successful, and in the first check information and correctly
When check information mismatches, then it represents that the first check information authentication failed of user's input.
In the first check information authentication failed of user's input, then cancel the sharing of target information.
When the first check information of user's input is proved to be successful, then share target information.
Step 205: there is no it is described first safety share strategy when, detect whether exist matched with the target information
Second safety share strategy.
In embodiments of the present invention, it may include: to share strategy to include file type dimension point that the second safety, which shares strategy,
Enjoy strategy, geography dimension shares strategy, time dimension shares strategy, file directory dimension is shared in the strategy such as strategy extremely
Few one kind.
In the case where there are a variety of above-mentioned described second safety sharing strategies in the terminal, it can preset
A variety of safety share the detection priority of strategy.
In the present invention, it is arranged successively according to the sequence of detection priority from high to low are as follows: file type dimension shares plan
Slightly, geography dimension shares strategy, time dimension shares strategy, file directory dimension shares strategy, i.e., in the terminal
In the case where sharing strategy there is no the first safety, it can be detected according to the sequence of priority from high to low, there are excellent
When the first higher safety of grade shares strategy, then preferentially shares strategy according to the higher safety of priority and target information is divided
It enjoys, for example, being previously provided in mobile phone, file type dimension shares strategy, geography dimension shares strategy, time dimension
Share strategy, then first detection file type dimension share strategy, in the presence of, then with file type dimension share strategy to mesh
Mark information is shared.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating
Example, not as the sole limitation to the embodiment of the present invention.
When sharing strategy there is no the first safety in the terminal, then detect in mobile terminal with the presence or absence of the second safety
Share strategy, and executes step 206.
Step 206: when sharing strategy there are second safety, obtaining and show and share strategy with second safety
Matched second verification mode.
In embodiments of the present invention, the second verification mode can be cryptographic check mode, finger-mark check mode, recognition of face
Any one of verification modes such as verification mode, the embodiments of the present invention are not limited thereto.
The mapping relations that the second safety shares strategy with verification mode are pre-saved in mobile terminal side, are obtaining second
After safety shares strategy, with second it can share the second verification side of strategy matching safely by Relation acquisition according to above-mentioned mapping
Formula, for example, being provided in mobile phone, file type dimension shares strategy, geography dimension shares strategy, time dimension shares plan
Slightly three kinds of safety share strategy, and file type dimension shares strategy, geography dimension shares strategy, time dimension shares plan
Slightly three kinds of strategies, corresponding second verification mode are cryptographic check mode, finger-mark check mode, recognition of face verification side
Formula can then determine that the second verification mode is password school when determining the second verification mode is that file type dimension shares strategy
Proved recipe formula.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating
Example, not as the sole limitation to the embodiment of the present invention.It, can be in the displaying of mobile terminal after obtaining the second verification mode
The second verification mode is shown in interface, for example, can show Password Input frame when user clicks and shares to obtain user's input
Password, or show fingerprint authentication icon, with obtain user input finger print information, or show recognition of face frame, to obtain use
The face information etc. of family input.
Obtain and show with second safety shares the second verification mode of strategy matching after, execution step 207.
Step 207: obtaining the second check information that user inputs according to second verification mode.
It, can be by user according to the second verification mode after the second verification mode to be showed in mobile terminal and shows interface
Corresponding check information is inputted, and then executes step 208.
Step 208: when second check information is proved to be successful, sharing the target information.
The corresponding correct check information of the second verification mode is also preserved in the terminal, just such as cryptographic check mode
True check information is " 018456 ", and the correct check information of finger-mark check mode is " user's A right hand thumb finger print information " etc.
Deng.
It is to be appreciated that above-mentioned example is merely to more fully understand the technical solution of the embodiment of the present invention and showing for enumerating
Example, not as the sole limitation to the embodiment of the present invention.
Obtain user according to the second verification mode input the second check information after, can by the second check information with
The corresponding correct check information of second verification mode is compared, to determine whether the two matches, in the second check information and just
When true check information matching, then it represents that the second check information of user's input is proved to be successful, and in the second check information and correctly
When check information mismatches, then it represents that the second check information authentication failed of user's input.
In the second check information authentication failed of user's input, then cancel the sharing of target information.
When the second check information of user's input is proved to be successful, then share target information.
Information sharing method provided in an embodiment of the present invention, except being had with information sharing method shown in embodiment one
Outside some beneficial effects, user identity can also be verified with corresponding verification mode, so that it is guaranteed that sharing information be by
Performed by mobile terminal affiliated user, and then the information that other users arbitrarily share mobile terminal affiliated user is avoided, kept away
The privacy leakage for having exempted from mobile terminal affiliated user, further improves user experience.
Embodiment three
Referring to Fig. 3, a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention is shown, it specifically can be with
Include:
First shares tactful detection module 310, for detecting whether exist in the sharing instruction for monitoring target information
Share strategy with matched first safety of the target information;Second shares tactful detection module 320, for there is no described in
When second safety shares strategy, detects whether to exist and share strategy with matched second safety of the target information;First object
Information share module 330, for sharing strategy according to second safety and sharing when sharing strategy there are second safety
The target information.
Preferably, further includes: target information determination type module determines institute for the historical behavior data according to user
State the corresponding target information type of operation behavior that user's operation number is greater than setting number;File type strategy adding module,
Share strategy for adding file type dimension for the corresponding first information of the target information type;Or current location obtains mould
Block, for obtaining the current location of the mobile terminal;Geographical location strategy adding module, for being in the current location
When setting privacy scene, geography dimension is added for all information and shares strategy;Or file directory obtains module, for obtaining
File directory where second information;File directory strategy adding module is used for when the file directory is setting privacy catalogue,
File directory dimension, which is added, for second information shares strategy.
Preferably, it includes that global dimension shares strategy that first safety, which shares strategy, and second safety shares strategy
It include that file type dimension shares strategy, geography dimension shares strategy, time dimension shares strategy, text including sharing strategy
Part catalogue dimension shares at least one of strategy;Wherein, it is each it is described second safety share strategy detection priority according to by
High to low sequence arrangement is followed successively by the file type dimension sharing strategy, the geography dimension shares strategy, described
Time dimension shares strategy, the file directory dimension shares strategy.
Information sharing apparatus provided in an embodiment of the present invention, by detecting when the sharing for monitoring target information instructs
Share strategy with the presence or absence of with matched first safety of target information, if it does not exist, then detects whether exist and target information
The second safety matched shares strategy, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the mesh
Mark information.The embodiment of the present invention shares strategy by addition safety, shares the sharing that strategy carries out information according to safety, compared to
Prior art can effectively avoid the problem that privacy of user caused by the sharing of user information is revealed, ensure that user is hidden
Private safety, improves user experience.
Example IV
Referring to Fig. 4, a kind of structural schematic diagram of information sharing apparatus provided in an embodiment of the present invention is shown, it specifically can be with
Include:
First shares tactful detection module 410, for detecting whether exist in the sharing instruction for monitoring target information
Share strategy with matched first safety of the target information;First verification mode obtains module 420, for there are described the
When one safety shares strategy, obtains and show the first verification mode for sharing strategy matching with first safety;First verification
Data obtaining module 430, the first check information inputted for obtaining user according to first verification mode;Second target letter
Sharing module 440 is ceased, for sharing the target information when first check information is proved to be successful;Second shares strategy
Detection module 450 is matched for detecting whether to exist when sharing strategy there is no first safety with the target information
Second safety share strategy;First object information share module 460, for there are it is described second safety share strategy when,
Share strategy according to second safety and shares the target information.
Preferably, the first object information share module 460 includes: the second verification mode acquisition submodule 4601, is used
In there are it is described second safety share strategy when, obtain and show and it is described second safety shares strategy matching second verify
Mode;Second check information acquisition submodule 4602, the second school inputted for obtaining user according to second verification mode
Test information;Target information shares submodule 4603, for when second check information is proved to be successful, sharing the target letter
Breath.
Information sharing apparatus provided in an embodiment of the present invention, except being had with information sharing apparatus shown in embodiment three
Outside some beneficial effects, user identity can also be verified with corresponding verification mode, so that it is guaranteed that sharing information be by
Performed by mobile terminal affiliated user, and then the information that other users arbitrarily share mobile terminal affiliated user is avoided, kept away
The privacy leakage for having exempted from mobile terminal affiliated user, further improves user experience.
Embodiment five
Referring to Fig. 5, the hardware structural diagram of a kind of mobile terminal of each embodiment to realize the present invention.
The mobile terminal 500 includes but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, defeated
Enter unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor
The components such as 510 and power supply 511.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 5 is not constituted
Restriction to mobile terminal, mobile terminal may include than illustrating more or fewer components, perhaps combine certain components or
Different component layouts.In embodiments of the present invention, mobile terminal include but is not limited to mobile phone, tablet computer, laptop,
Palm PC, car-mounted terminal, wearable device and pedometer etc..
Processor 510, for detecting whether exist and the target information in the sharing instruction for monitoring target information
Matched first safety shares strategy;If it does not exist, then detect whether exist and matched second safety point of the target information
Enjoy strategy;When sharing strategy there are second safety, shares strategy according to second safety and share the target information.
In embodiments of the present invention, by when the sharing for monitoring target information instructs, detecting whether to exist and target
First safety of information matches shares strategy, if it does not exist, then detects whether exist and matched second safety point of target information
Strategy is enjoyed, when sharing strategy there are the second safety, shares strategy according to the second safety and shares the target information.The present invention is real
It applies example and strategy is shared by addition safety, the sharing that strategy carries out information is shared according to safety, compared to the prior art scheme, energy
It is enough effectively to avoid the problem that privacy of user caused by the sharing of user information is revealed, it ensure that the safety of privacy of user, improve
User experience.
It should be understood that the embodiment of the present invention in, radio frequency unit 501 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 510 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 501 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 501 can also by wireless communication system and network and other set
Standby communication.
Mobile terminal provides wireless broadband internet by network module 502 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 503 can be received by radio frequency unit 501 or network module 502 or in memory 509
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 503 can also be provided and be moved
The relevant audio output of specific function that dynamic terminal 500 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 503 includes loudspeaker, buzzer and receiver etc..
Input unit 504 is for receiving audio or video signal.Input unit 504 may include graphics processor
(Graphics Processing Unit, GPU) 5041 and microphone 5042, graphics processor 5041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 506.Through graphics processor 5041, treated that picture frame can be deposited
Storage is sent in memory 509 (or other storage mediums) or via radio frequency unit 501 or network module 502.Mike
Wind 5042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 501 is converted in the case where telephone calling model.
Mobile terminal 500 further includes at least one sensor 505, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 5061, and proximity sensor can close when mobile terminal 500 is moved in one's ear
Display panel 5061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 505 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 506 is for showing information input by user or being supplied to the information of user.Display unit 506 can wrap
Display panel 5061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 5061.
User input unit 507 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family setting and the related key signals input of function control.Specifically, user input unit 507 include touch panel 5071 and
Other input equipments 5072.Touch panel 5071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 5071 or in touch panel 5071
Neighbouring operation).Touch panel 5071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 510, receiving area
It manages the order that device 510 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 5071.In addition to touch panel 5071, user input unit 507 can also include other input equipments
5072.Specifically, other input equipments 5072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 5071 can be covered on display panel 5061, when touch panel 5071 is detected at it
On or near touch operation after, send processor 510 to determine the type of touch event, be followed by subsequent processing device 510 according to touching
The type for touching event provides corresponding visual output on display panel 5061.Although in Fig. 5, touch panel 5071 and display
Panel 5061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments
In, can be integrated by touch panel 5071 and display panel 5061 and realize the function that outputs and inputs of mobile terminal, it is specific this
Place is without limitation.
Interface unit 508 is the interface that external device (ED) is connect with mobile terminal 500.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 508 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in mobile terminal 500 or can be used in 500 He of mobile terminal
Data are transmitted between external device (ED).
Memory 509 can be used for storing software program and various data.Memory 509 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 509 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 510 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 509, and calls and is stored in storage
Data in device 509 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Managing device 510 may include one or more processing units;Preferably, processor 510 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 510.
Mobile terminal 500 can also include the power supply 511 (such as battery) powered to all parts, it is preferred that power supply 511
Can be logically contiguous by power-supply management system and processor 510, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, mobile terminal 500 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 510, and memory 509 is stored in
On memory 509 and the computer program that can run on the processor 510, the computer program are executed by processor 510
Each process of Shi Shixian above- mentioned information sharing method embodiment, and identical technical effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes each process of above- mentioned information sharing method embodiment, and energy when the computer program is executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (12)
1. a kind of information sharing method is applied to mobile terminal characterized by comprising
In the sharing instruction for monitoring target information, detects whether to exist and share with matched first safety of the target information
Strategy;
If it does not exist, then it detects whether to exist and shares strategy with matched second safety of the target information;
When sharing strategy there are second safety, shares strategy according to second safety and share the target information.
2. the method according to claim 1, wherein it is described detect whether to exist match with the target information
First safety share strategy step after, further includes:
When sharing strategy there are first safety, obtains and show the first school for sharing strategy matching with first safety
Proved recipe formula;
Obtain the first check information that user inputs according to first verification mode;
When first check information is proved to be successful, share the target information.
3. the method according to claim 1, wherein it is described there are it is described second safety share strategy when, according to
Share the step of strategy shares the target information according to second safety, comprising:
When sharing strategy there are second safety, obtains and show the second school for sharing strategy matching with second safety
Proved recipe formula;
Obtain the second check information that user inputs according to second verification mode;
When second check information is proved to be successful, share the target information.
4. the method according to claim 1, wherein it is described monitor target information sharing instruction when,
It detects whether in the presence of before the step for sharing strategy with matched first safety of the target information, further includes:
According to the historical behavior data of user, determine that the user's operation number is greater than the corresponding mesh of operation behavior of setting number
Mark information type;
File type dimension, which is added, for the corresponding first information of the target information type shares strategy;Or
Obtain the current location of the mobile terminal;
When the current location is in setting privacy scene, geography dimension is added for all information and shares strategy;Or
File directory where obtaining the second information;
When the file directory is setting privacy catalogue, file directory dimension is added for second information and shares strategy.
5. according to the method described in claim 4, it is characterized in that, it includes that global dimension is shared that first safety, which shares strategy,
Strategy, it includes that file type dimension shares tactful, geography dimension point that second safety, which shares strategy including sharing strategy,
Enjoy strategy, time dimension shares strategy, file directory dimension shares at least one of strategy;
Wherein, the detection priority that each second safety shares strategy is followed successively by the text according to sequence arrangement from high to low
Part type dimension shares strategy, the geography dimension shares strategy, the time dimension shares strategy, the file directory
Dimension shares strategy.
6. a kind of information sharing apparatus characterized by comprising
First shares tactful detection module, in the sharing instruction for monitoring target information, detect whether to exist with it is described
Matched first safety of target information shares strategy;
Second shares tactful detection module, for detecting whether exist and institute when sharing strategy there is no first safety
It states matched second safety of target information and shares strategy;
First object information share module, for dividing according to second safety when sharing strategy there are second safety
It enjoys strategy and shares the target information.
7. device according to claim 6, which is characterized in that further include:
First verification mode obtains module, for obtaining and showing and described the when sharing strategy there are first safety
One safety shares the first verification mode of strategy matching;
First check information obtains module, the first check information inputted for obtaining user according to first verification mode;
Second target information sharing module, for sharing the target information when first check information is proved to be successful.
8. device according to claim 6, which is characterized in that the first object information share module includes:
Second verification mode acquisition submodule, for there are it is described second safety share strategy when, obtain and show with it is described
Second safety shares the second verification mode of strategy matching;
Second check information acquisition submodule, the second verification letter inputted for obtaining user according to second verification mode
Breath;
Target information shares submodule, for sharing the target information when second check information is proved to be successful.
9. device according to claim 6, which is characterized in that further include:
Target information determination type module determines that the user's operation number is greater than for the historical behavior data according to user
Set the corresponding target information type of operation behavior of number;
File type strategy adding module, for adding file type dimension for the corresponding first information of the target information type
Share strategy;Or
Current location obtains module, for obtaining the current location of the mobile terminal;
Geographical location strategy adding module, for being added for all information when the current location is in setting privacy scene
Geography dimension shares strategy;Or
File directory obtains module, for file directory where obtaining the second information;
File directory strategy adding module, for adding for second information when the file directory is setting privacy catalogue
Add file catalogue dimension shares strategy.
10. device according to claim 9, which is characterized in that it includes global dimension point that first safety, which shares strategy,
Strategy is enjoyed, it includes that file type dimension shares tactful, geography dimension that second safety, which shares strategy including sharing strategy,
Share strategy, time dimension shares strategy, file directory dimension shares at least one of strategy;
Wherein, the detection priority that each second safety shares strategy is followed successively by the text according to sequence arrangement from high to low
Part type dimension shares strategy, the geography dimension shares strategy, the time dimension shares strategy, the file directory
Dimension shares strategy.
11. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is executed by the processor
Any one of described in information sharing method the step of.
12. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence, the information sharing method as described in any one of claims 1 to 5 is realized when the computer program is executed by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811384523.5A CN109547330B (en) | 2018-11-20 | 2018-11-20 | Information sharing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811384523.5A CN109547330B (en) | 2018-11-20 | 2018-11-20 | Information sharing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109547330A true CN109547330A (en) | 2019-03-29 |
CN109547330B CN109547330B (en) | 2021-08-27 |
Family
ID=65848491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811384523.5A Active CN109547330B (en) | 2018-11-20 | 2018-11-20 | Information sharing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547330B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035183A (en) * | 2019-04-22 | 2019-07-19 | 维沃移动通信有限公司 | Information sharing method and terminal |
CN110808900A (en) * | 2019-10-28 | 2020-02-18 | 维沃移动通信有限公司 | Information sharing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223420A (en) * | 2011-07-07 | 2011-10-19 | 河南科技大学 | Digital content distribution method for multimedia social network |
CN104317620A (en) * | 2014-10-24 | 2015-01-28 | 中兴通讯股份有限公司 | Multi-screen sharing based application management method and device |
CN104809406A (en) * | 2015-04-30 | 2015-07-29 | 努比亚技术有限公司 | Method and device for safe file sharing |
CN107480167A (en) * | 2017-06-26 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Method, mobile terminal and storage medium based on the quick sharing information of fingerprint |
-
2018
- 2018-11-20 CN CN201811384523.5A patent/CN109547330B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223420A (en) * | 2011-07-07 | 2011-10-19 | 河南科技大学 | Digital content distribution method for multimedia social network |
CN104317620A (en) * | 2014-10-24 | 2015-01-28 | 中兴通讯股份有限公司 | Multi-screen sharing based application management method and device |
CN104809406A (en) * | 2015-04-30 | 2015-07-29 | 努比亚技术有限公司 | Method and device for safe file sharing |
CN107480167A (en) * | 2017-06-26 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Method, mobile terminal and storage medium based on the quick sharing information of fingerprint |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035183A (en) * | 2019-04-22 | 2019-07-19 | 维沃移动通信有限公司 | Information sharing method and terminal |
CN110035183B (en) * | 2019-04-22 | 2021-10-12 | 维沃移动通信有限公司 | Information sharing method and terminal |
CN110808900A (en) * | 2019-10-28 | 2020-02-18 | 维沃移动通信有限公司 | Information sharing method and device |
CN110808900B (en) * | 2019-10-28 | 2021-11-16 | 维沃移动通信有限公司 | Information sharing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109547330B (en) | 2021-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107608514A (en) | Information processing method and mobile terminal | |
CN108491123A (en) | A kind of adjusting application program image target method and mobile terminal | |
CN107832110A (en) | A kind of information processing method and mobile terminal | |
CN108256853A (en) | A kind of method of payment and mobile terminal | |
CN109885257A (en) | A kind of disk file reading/writing method and device | |
CN109743503A (en) | Reminding method and terminal | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN108256308A (en) | A kind of recognition of face solution lock control method and mobile terminal | |
CN108650408A (en) | A kind of unlocking screen method and mobile terminal | |
CN110149628A (en) | A kind of information processing method and terminal device | |
CN110035183A (en) | Information sharing method and terminal | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN108429856A (en) | A kind of location information acquisition methods and mobile terminal | |
CN110213438A (en) | A kind of processing method and terminal device of application program | |
CN109800606A (en) | A kind of display control method and mobile terminal | |
CN109446794A (en) | A kind of cipher-code input method and its mobile terminal | |
CN109547330A (en) | A kind of information sharing method and device | |
CN109618055A (en) | A kind of position sharing method and mobile terminal | |
CN108540951A (en) | A kind of recharge method and mobile terminal | |
CN107895108A (en) | A kind of operation management method and mobile terminal | |
CN107704334A (en) | A kind of SDK processing method and mobile terminal | |
CN109753776A (en) | A kind of method, apparatus and mobile terminal of information processing | |
CN108848240A (en) | A kind of protecting information safety method and terminal | |
CN110191106A (en) | A kind of data transmission method for uplink, terminal and communication system | |
CN109062492A (en) | A kind of application access method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |