Specific embodiment
Many details are explained in the following description in order to fully understand the application.But the application can be with
Much it is different from other way described herein to implement, those skilled in the art can be without prejudice to the application intension the case where
Under do similar popularization, therefore the application is not limited by following public specific implementation.
The term used in this specification one or more embodiment be only merely for for the purpose of describing particular embodiments,
It is not intended to be limiting this specification one or more embodiment.In this specification one or more embodiment and appended claims
The "an" of singular used in book, " described " and "the" are also intended to including most forms, unless context is clearly
Indicate other meanings.It is also understood that term "and/or" used in this specification one or more embodiment refers to and includes
One or more associated any or all of project listed may combine.
It will be appreciated that though may be retouched using term first, second etc. in this specification one or more embodiment
Various information are stated, but these information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other
It opens.For example, first can also be referred to as second, class in the case where not departing from this specification one or more scope of embodiments
As, second can also be referred to as first.Depending on context, word as used in this " if " can be construed to
" ... when " or " when ... " or " in response to determination ".
Firstly, the vocabulary of terms being related to one or more embodiments of the invention explains.
Creakily password: one kind can carry out data exchange among applications, be designated the communication password of application identification.It
Including four elements: sharing medium application, open target application, share execution user and shared user.
In this application, a kind of data processing method and device, a kind of calculating equipment and storage medium are provided, below
Embodiment in be described in detail one by one.
Fig. 1 is to show the structural block diagram of the calculating equipment 100 according to one embodiment of this specification.The calculating equipment 100
Component include but is not limited to memory 110 and processor 120.Processor 120 is connected with memory 110 by bus 130,
Database 150 is for saving data.
Calculating equipment 100 further includes access device 140, access device 140 enable calculate equipment 100 via one or
Multiple networks 160 communicate.The example of these networks includes public switched telephone network (PSTN), local area network (LAN), wide area network
(WAN), the combination of the communication network of personal area network (PAN) or such as internet.Access device 140 may include wired or wireless
One or more of any kind of network interface (for example, network interface card (NIC)), such as IEEE802.11 wireless local area
Net (WLAN) wireless interface, worldwide interoperability for microwave accesses (Wi-MAX) interface, Ethernet interface, universal serial bus (USB) connect
Mouth, cellular network interface, blue tooth interface, near-field communication (NFC) interface, etc..
In one embodiment of this specification, unshowned other component in above-mentioned and Fig. 1 of equipment 100 is calculated
It can be connected to each other, such as pass through bus.It should be appreciated that calculating device structure block diagram shown in FIG. 1 is merely for the sake of example
Purpose, rather than the limitation to this specification range.Those skilled in the art can according to need, and increase or replace other portions
Part.
Calculating equipment 100 can be any kind of static or mobile computing device, including mobile computer or mobile meter
Calculate equipment (for example, tablet computer, personal digital assistant, laptop computer, notebook computer, net book etc.), movement
Phone (for example, smart phone), wearable calculating equipment (for example, smartwatch, intelligent glasses etc.) or other kinds of shifting
Dynamic equipment, or the static calculating equipment of such as desktop computer or PC.Calculating equipment 100 can also be mobile or state type
Server.
Wherein, processor 120 can execute the step in method shown in Fig. 2.Fig. 2 is to show according to this specification one in fact
The schematic flow chart of the data processing method of example is applied, is applied to the first application end, the method includes the steps 202 to step
208。
Step 202: receiving the first sharing request generated to sharing data, wherein first sharing request is with second
Application end is to share target, and second application end is different from first application end.
In this specification one or more embodiment, described to sharing data is the data that will be shared with other users,
Such as sale product in some shopping website etc.;First sharing request is that will be shared with other users to sharing data
Request, such as some in some shopping website is sold into the request that product is shared with other users, such as creakily password.
In practical applications, first application end can be application program either some payment of some shopping website
Application program etc., second application end can be the application program etc. of some instant messaging.
In the case that the data processing method is applied to the first application end, first point generated to sharing data is received
It enjoys request i.e. first application end and receives first point with generation that second application end is sharing target to sharing data
Enjoy request.
Step 204: generating first sharing request to sharing data and be sent to second application end.
In this specification one or more embodiment, first application end is receiving first generated to sharing data
After sharing request, first sharing request to sharing data is generated, and by first sharing request to sharing data
It is sent to and shares i.e. described second application end of target.
In this specification one or more embodiment, the to sharing data can be generated according to the first preset condition
One sharing request is simultaneously sent to the second application end.Wherein, first preset condition includes but is not limited to from generating number to be shared
According to sharing request fixation dictionary in, generate designated length and specified check bit the first sharing request to sharing data.
It is certain payment application in first application end, second application end is certain instant messaging application program
In the case of, generating first sharing request to sharing data and being sent to second application end includes: the payment application
Program adds good friend from preset fixation in the case where receiving the sharing request for generating addition good friend, according to the first preset condition
Sharing request generate the combination of the text that one section of designated length and specified check bit are chosen in dictionary, number or spcial character
The sharing request of addition good friend is generated, and the sharing request of the addition good friend of generation is sent to the instant messaging application journey
Sequence.
Step 206: determining that first sharing request to sharing data is intercepted by second application end.
In this specification one or more embodiment, first application end can with described in automatic identification to sharing data
Whether the first sharing request is intercepted by second application end.If i.e. described first application end detects that being sent to described second answers
Meet the second preset condition to the first sharing request of sharing data described in end, it is determined that first to sharing data
Sharing request is intercepted by second application end.
Wherein, second preset condition includes but is not limited to that first sharing request to sharing data is shared to institute
It states in the second application end specified time, the number of users that first sharing request to sharing data is operated meets the time and declines
Subtract curve.I.e. described the first sharing request to sharing data was shared to the second application end specified time, described wait divide
The number of users that the first sharing request of data is operated is enjoyed to reduce always.
Using first application end as payment application, second application end be instant messaging application program for,
Determine that first sharing request to sharing data includes: by second application end interception
The payment application for netting red A, which receives, nets the sharing request that red A generates an addition good friend, and the payment for netting red A is answered
The sharing request of addition good friend is sent to after generating the sharing request of addition good friend according to the first preset condition with program
The instant messaging application program for netting red A nets the sharing that the user in the instant messaging application program of red A receives addition good friend
After request, the sharing request that can generally replicate stickup addition good friend adds the red A of net into the payment application of itself
For good friend, if normal the off line red A of situation share after the sharing request of addition good friend can all have per hour 30 good friends pass through from
The payment application of body adds her as good friend, but a certain hour nets red A and shares after the sharing request of addition good friend per small
When the people that she is good friend is added by the payment application of itself become 2 either to add her be good friend to nobody,
The payment application for then netting red A can determine net the sharing request of the addition good friend of red A by instant messaging application program into
Interception is gone.
Step 208: being generated according to preset create-rule with second application end is to share described in target wait share
Second sharing request of data.
In this specification one or more embodiment, the preset create-rule includes but is not limited to by described wait share
First sharing request of data rewrite with semantic.
According to preset create-rule generate with second application end be described in sharing target to sharing data the
First sharing request to sharing data is rewritten into semanteme with second application end as sharing by two sharing requests
Second sharing request to sharing data of target.
In this specification one or more embodiment, the data processing method further include:
It receives and generates second sharing request to sharing data;
Send according to preset create-rule generates with second application end be sharing target described in number to be shared
According to the second sharing request.
In the case that i.e. described first application end receives second sharing request to sharing data again, generate simultaneously
Send according to preset create-rule generates with second application end be sharing target described in sharing data second
Sharing request.
In this specification one or more embodiment, first sharing request and the second sharing request to sharing data
Sharing contents it is identical, data format is different.
Such as it is described to sharing data be certain shopping website a skirt, first sharing request of generation and second
Sharing request is then the request of the sharing skirt, but the data group of first sharing request and second sharing request
At form difference.
In this specification one or more embodiment, the data processing method first application end generate to point
It enjoys in the case that the first sharing request of data intercepted by second application end, second application end can be automatically identified
Interception and according to preset create-rule generate it is new described in the second sharing request to sharing data, determine it is described to point
It enjoys in the case that the second sharing request of data do not intercept by second application end, receives and parses through second application end and return
Second sharing request to sharing data passed is described to sharing data to determine, so that the sharing to sharing data
The interception for second application end that please seek to achieve breakthrough.
In practical application, if second sharing request is still intercepted by the second application end, the first application end, which identifies, is blocked
After cutting, can be generated again according to preset create-rule with second application end is to share described in target to sharing data
Third sharing request, until the sharing request generated will not be intercepted by the second application end, realize described in can be with to sharing data
Shared by the second application end.
Wherein, processor 120 can execute the step in method shown in Fig. 3.Fig. 3 is to show according to this specification one in fact
The schematic flow chart of the data processing method of example is applied, is applied to the second application end, the method includes the steps 302 to step
306。
Step 302: receiving what the first application end generated, itself to be to share sharing to the first of sharing data for target to ask
It asks.
Step 304: first sharing request to sharing data being analyzed, it is determined whether to the number to be shared
According to the first sharing request carry out interception operation.
In this specification one or more embodiment, analysis bag is carried out to first sharing request to sharing data
It includes:
It determines described to include sensitive character or the determining first application end category in the first sharing request of sharing data
In the preset blacklist of the second application end.
In practical application, can also have other factors cause the second application end to the first application end generate described in wait share
The sharing request of data is intercepted, and will not enumerate herein.
Step 306: in the case where determination carries out interception operation to first sharing request to sharing data, to institute
It states to execute to the first sharing request of sharing data and intercepts operation.
In this specification one or more embodiment, the data processing method further include:
Receive what first application end generated, itself to be the second sharing request to sharing data for sharing target;
Second sharing request to sharing data is analyzed, it is determined whether to second to sharing data
Sharing request carries out interception operation;
It determines in the case where not intercepting operation to second sharing request to sharing data, returns the number to be shared
According to the second sharing request to first application end.
In this specification one or more embodiment, first application end, second application end, the number to be shared
It can be found in above-described embodiment according to the explanation of, first sharing request and the second sharing request to sharing data, herein no longer
It repeats.
In this specification one or more embodiment, the second application end receives what the first application end generated, itself to be point
The first sharing request to sharing data of target is enjoyed, then first sharing request to sharing data is analyzed,
In the case where not meeting the reception sharing condition of the second application end, carried out to first sharing request to sharing data
It intercepts, so that the first application end, which generates, meets the second sharing request to sharing data that the second application end receives sharing condition,
In the case where second sharing request to sharing data meets the reception sharing condition of the second application end, receive it is described to
Second sharing request to sharing data is simultaneously back to the first application end by the second sharing request of sharing data;Described
The realization of two application ends is analyzed and is intercepted to the ineligible sharing request to sharing data, can be safe to avoid existing
Hidden danger or the sharing request to sharing data of sensitive information are shared away, and user experience is promoted.
It referring to fig. 4, is to share destination application with the first application end, the second application end is to share medium application program to be
Example, is illustrated the data processing method of this specification one or more embodiment, including step 402 is to step 434.
Step 402: the first of the generation addition good friend for sharing destination application reception user A transmission of user A is shared
Request.
Step 404: the first sharing request for generating addition good friend is sent to itself by the sharing destination application of user A
Processing system.
Step 406: the processing system of the sharing destination application of user A is 20 according to preset dictionary creation length,
The first sharing request for the addition good friend that check bit is 111.
Step 408: the processing system of the sharing destination application of user A is anti-by the first sharing request of addition good friend
Feed user A.
Step 410: the sharing medium application program of user A receives and analyzes first point of the addition good friend of user A sharing
Enjoy request.
Step 412: the sharing medium application program of user A does not meet sharing in the first sharing request for determining addition good friend
In the case where condition, the first sharing request of addition good friend is intercepted.
Step 414: the processing system of the sharing destination application of user A is detecting addition first point of good friend automatically
Enjoy whether request is intercepted by the sharing medium application program of itself.
Step 416: the processing system of the sharing destination application of user A is detecting addition first point of good friend automatically
In the case where request is enjoyed by the sharing medium application program interception of itself, generation one same with the first sharing request of addition good friend
The second semantic sharing request.
In practical application, one will be carried out to the sharing request of addition good friend at regular intervals by sharing destination application
Secondary update, so that the sharing request that sharing destination application receives generation addition good friend every time can all be added newest
The sharing request of friend feeds back to user, avoids the repetition for sharing medium application program from intercepting, improves working efficiency.
In addition, sharing destination application after identifying that sharing medium application program intercepts, can be directed to currently
Addition good friend sharing request be updated, can also to share destination application on other wait for the sharing request of sharing data
It is updated, can be set according to actual needs, the application is not limited in any way this.
Step 418: the sharing destination application of user A receives second point of the generation addition good friend of user A again
Enjoy request.
Step 420: the second sharing request for generating addition good friend is sent to itself by the sharing destination application of user A
Processing system.
Step 422: the destination application of sharing of user A will be by the of the addition good friend that the processing system of itself generates
Two sharing requests feed back to user A.
Step 424: the sharing medium application program of user A receives and analyzes the second sharing request of user A addition good friend.
Step 426: the sharing medium application program of user A determines that the second sharing request to user A addition good friend is not blocked
It cuts.
Step 428: the sharing medium application program of user A is determining that the second sharing request to addition good friend does not intercept
In the case of, the second sharing request of user A addition good friend is shared with to the shared user of itself.
Step 430: shared user adds good friend's by what the sharings medium application program of itself received that user A shares
Second sharing request.
Step 432: for sharing medium application program and sending addition good friend that user A shares that shared user passes through itself
Two sharing requests are to itself processing system.
Step 434: add good friend that the processing system of the sharings destination application of shared user shares user A
Two sharing requests are parsed, and parse second sharing request in the processing system of the sharing destination application of shared user
In the case where for addition good friend's request, the processing system addition user A for sharing the sharing destination application of user is good friend.
In this specification one or more embodiment, the data processing method is sharing adding for destination application generation
In the case that first sharing request of plusing good friend is intercepted by sharing medium application program, it can automatically identify and share medium application
The interception of program and the second sharing request for generating new addition good friend are not divided in the second sharing request for determining addition good friend
In the case where enjoying the interception of medium application program, the addition good friend for sharing the passback of medium application program of shared user is received and parsed through
The second sharing request to add user A as good friend so that share destination application generate addition good friend sharing request
In the case where being intercepted by sharing medium application program, the addition of good friend also may be implemented.
Referring to Fig. 5, this specification one or more embodiment provides a kind of data processing equipment, is applied to the first application
End, described device include:
First receiving module 502, is configured as receiving and generates the first sharing request to sharing data, wherein described the
One sharing request is to share target with the second application end, and second application end is different from first application end;
First generation module 504 is configurable to generate first sharing request to sharing data and is sent to described
Second application end;
First blocking module 506 is configured to determine that first sharing request to sharing data is answered by described second
It is intercepted with end;
Second generation module 508 is configured as being generated according to preset create-rule with second application end as sharing
Second sharing request to sharing data of target.
Optionally, described device further include:
Second receiving module is configured as receiving the second sharing request described in generated to sharing data;
First sending module, being configured as sending according to the generation of preset create-rule is point with second application end
Enjoy second sharing request to sharing data of target.
Optionally, first generation module 504, is also configured to
First sharing request to sharing data is generated according to the first preset condition and is sent to the second application end.
Optionally, first blocking module 506, is also configured to
If it is pre- to detect that first sharing request to sharing data for being sent to second application end meets second
If condition, it is determined that first sharing request to sharing data is intercepted by second application end.
Optionally, described device further include:
Second blocking module is configured to determine that second sharing request to sharing data is not applied by described second
In the case that end intercepts, second sharing request to sharing data of the second application end passback is received and parsed through with true
It is fixed described to sharing data.
In this specification one or more embodiment, the data processing equipment first application end generate to point
It enjoys in the case that the first sharing request of data intercepted by second application end, second application end can be automatically identified
Interception and according to preset create-rule generate it is new described in the second sharing request to sharing data, determine it is described to point
It enjoys in the case that the second sharing request of data do not intercept by second application end, receives and parses through second application end and return
Second sharing request to sharing data passed is described to sharing data to determine, so that the sharing to sharing data
The interception for second application end that please seek to achieve breakthrough.
Referring to Fig. 6, this specification one or more embodiment provides a kind of data processing equipment, is applied to the second application
End, described device include:
Third receiving module 602 is configured as receiving what the first application end generated, itself to be sharing target wait share
First sharing request of data;
First analysis module 604 is configured as analyzing first sharing request to sharing data, and determination is
It is no that interception operation is carried out to first sharing request to sharing data;
Third blocking module 606 is configured as intercepting first sharing request to sharing data in determination
In the case where operation, first sharing request to sharing data is executed and intercepts operation.
Optionally, first analysis module 604, is also configured to
It determines described to include sensitive character or the determining first application end category in the first sharing request of sharing data
In the preset blacklist of the second application end.
Optionally, described device further include:
4th receiving module is configured as receiving what first application end generated, itself to be sharing target wait divide
Enjoy the second sharing request of data;
Second analysis module is configured as analyzing second sharing request to sharing data, it is determined whether
Interception operation is carried out to second sharing request to sharing data;
Module is returned, is configured to determine that the case where operation is not intercepted to second sharing request to sharing data
Under, passback second sharing request to sharing data to first application end.
In this specification one or more embodiment, the second application end receives what the first application end generated, itself to be point
The first sharing request to sharing data of target is enjoyed, then first sharing request to sharing data is analyzed,
In the case where not meeting the reception sharing condition of the second application end, carried out to first sharing request to sharing data
It intercepts, so that the first application end, which generates, meets the second sharing request to sharing data that the second application end receives sharing condition,
In the case where second sharing request to sharing data meets the reception sharing condition of the second application end, receive it is described to
Second sharing request to sharing data is simultaneously back to the first application end by the second sharing request of sharing data;Described
The realization of two application ends is analyzed and is intercepted to the ineligible sharing request to sharing data, can be safe to avoid existing
Hidden danger or the sharing request to sharing data of sensitive information are shared away, and user experience is promoted.
One embodiment of the application also provides a kind of computer readable storage medium, is stored with computer instruction, the instruction
The step of data processing method as previously described is realized when being executed by processor.
A kind of exemplary scheme of above-mentioned computer readable storage medium for the present embodiment.It should be noted that this is deposited
The technical solution of the technical solution of storage media and above-mentioned data processing method belongs to same design, the technical solution of storage medium
The detail content being not described in detail may refer to the description of the technical solution of above-mentioned data processing method.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
The computer instruction includes computer program code, the computer program code can for source code form,
Object identification code form, executable file or certain intermediate forms etc..The computer-readable medium may include: that can carry institute
State any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, the computer storage of computer program code
Device, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory),
Electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the computer-readable medium include it is interior
Increase and decrease appropriate can be carried out according to the requirement made laws in jurisdiction with patent practice by holding, such as in certain jurisdictions of courts
Area does not include electric carrier signal and telecommunication signal according to legislation and patent practice, computer-readable medium.
It should be noted that for the various method embodiments described above, describing for simplicity, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because
According to the application, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules might not all be this Shen
It please be necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
The application preferred embodiment disclosed above is only intended to help to illustrate the application.There is no detailed for alternative embodiment
All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,
It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the application
Principle and practical application, so that skilled artisan be enable to better understand and utilize the application.The application is only
It is limited by claims and its full scope and equivalent.