CN110011896A - A kind of data processing method and device, a kind of calculating equipment and storage medium - Google Patents

A kind of data processing method and device, a kind of calculating equipment and storage medium Download PDF

Info

Publication number
CN110011896A
CN110011896A CN201811314102.5A CN201811314102A CN110011896A CN 110011896 A CN110011896 A CN 110011896A CN 201811314102 A CN201811314102 A CN 201811314102A CN 110011896 A CN110011896 A CN 110011896A
Authority
CN
China
Prior art keywords
sharing
application end
data
request
sharing request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811314102.5A
Other languages
Chinese (zh)
Other versions
CN110011896B (en
Inventor
张萌
唐志慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811314102.5A priority Critical patent/CN110011896B/en
Publication of CN110011896A publication Critical patent/CN110011896A/en
Priority to TW108128465A priority patent/TWI706359B/en
Priority to PCT/CN2019/108023 priority patent/WO2020093806A1/en
Application granted granted Critical
Publication of CN110011896B publication Critical patent/CN110011896B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/066Format adaptation, e.g. format conversion or compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of data processing method provided by the present application and device, a kind of calculating equipment and storage medium, wherein, the method is applied to the first application end, the described method includes: receiving the first sharing request generated to sharing data, wherein, first sharing request is to share target with the second application end, and second application end is different from first application end;It generates first sharing request to sharing data and is sent to second application end;Determine that first sharing request to sharing data is intercepted by second application end;Being generated according to preset create-rule with second application end is the second sharing request shared described in target to sharing data, waits for the second sharing request of sharing data in the generation schema creation that can be intercepted with automatic identification after the first sharing request of sharing data is intercepted and switch sharing request to break through and intercept.

Description

A kind of data processing method and device, a kind of calculating equipment and storage medium
Technical field
This application involves computer data processing technology field, in particular to a kind of data processing method and device, one kind Calculate equipment and storage medium.
Background technique
Creakily the main function of password is marketing, touches up to wider user.User is sharing the mouth that creaks as executor is shared During order, due to various reasons, sharing medium may not support even to intercept this splitting glass opaque, but target application Also continue the demand shared with shared user, therefore results in conflict.
Summary of the invention
In view of this, this specification embodiment provides a kind of data processing method and device, a kind of calculating equipment and deposits Storage media, to solve technological deficiency existing in the prior art.
In a first aspect, this specification embodiment discloses a kind of data processing method, it is applied to the first application end, the side Method includes:
It receives and generates the first sharing request to sharing data, wherein first sharing request is with the second application end Share target, second application end is different from first application end;
It generates first sharing request to sharing data and is sent to second application end;
Determine that first sharing request to sharing data is intercepted by second application end;
According to preset create-rule generate with second application end be described in sharing target to sharing data the Two sharing requests.
Second aspect, this specification embodiment disclose a kind of data processing method, are applied to the second application end, the side Method includes:
The generation of the first application end is received, itself to be the first sharing request to sharing data for sharing target;
First sharing request to sharing data is analyzed, it is determined whether to first to sharing data Sharing request carries out interception operation;
In the case where determination carries out interception operation to first sharing request to sharing data, to described wait share First sharing request of data, which executes, intercepts operation.
The third aspect, this specification embodiment disclose a kind of data processing equipment, are applied to the first application end, the dress It sets and includes:
First receiving module is configured as receiving the first sharing request generated to sharing data, wherein described first point Request is enjoyed with the second application end to share target, second application end is different from first application end;
First generation module is configurable to generate first sharing request to sharing data and is sent to described second Application end;
First blocking module is configured to determine that first sharing request to sharing data by second application end It intercepts;
Second generation module is configured as being generated according to preset create-rule with second application end as sharing target Second sharing request to sharing data.
Fourth aspect, this specification embodiment disclose a kind of data processing equipment, are applied to the second application end, the dress It sets and includes:
Third receiving module is configured as receiving what the first application end generated, itself to be the number to be shared for sharing target According to the first sharing request;
First analysis module is configured as analyzing first sharing request to sharing data, it is determined whether Interception operation is carried out to first sharing request to sharing data;
Third blocking module is configured as carrying out interception operation to first sharing request to sharing data in determination In the case where, first sharing request to sharing data is executed and intercepts operation.
5th aspect, this specification embodiment disclose a kind of calculating equipment, including memory, processor and are stored in On reservoir and the computer instruction that can run on a processor, the processor realize that the instruction is processed when executing described instruction The step of device realizes data processing method as described above when executing.
6th aspect, this specification embodiment disclose a kind of computer readable storage medium, are stored with computer and refer to The step of order, which realizes data processing method as described above when being executed by processor.
A kind of data processing method provided by the present application and device, a kind of calculating equipment and storage medium, wherein the side Method is applied to the first application end, which comprises receives and generates the first sharing request to sharing data, wherein described the One sharing request is to share target with the second application end, and second application end is different from first application end;Described in generation To sharing data the first sharing request and be sent to second application end;It determines that first to sharing data is shared to ask It asks and is intercepted by second application end;Being generated according to preset create-rule with second application end is to share described in target To the second sharing request of sharing data, can be blocked described after the first sharing request of sharing data is intercepted with automatic identification It cuts and the generation schema creation for switching sharing request waits for the second sharing request of sharing data to break through and intercept.
Detailed description of the invention
Fig. 1 is a kind of structural block diagram for calculating equipment that this specification one or more embodiment provides;
Fig. 2 is a kind of flow chart for data processing method that this specification one or more embodiment provides;
Fig. 3 is a kind of flow chart for data processing method that this specification one or more embodiment provides;
Fig. 4 is a kind of flow chart for data processing method that this specification one or more embodiment provides;
Fig. 5 is a kind of structural schematic diagram for data processing equipment that this specification one or more embodiment provides;
Fig. 6 is a kind of structural schematic diagram for data processing equipment that this specification one or more embodiment provides.
Specific embodiment
Many details are explained in the following description in order to fully understand the application.But the application can be with Much it is different from other way described herein to implement, those skilled in the art can be without prejudice to the application intension the case where Under do similar popularization, therefore the application is not limited by following public specific implementation.
The term used in this specification one or more embodiment be only merely for for the purpose of describing particular embodiments, It is not intended to be limiting this specification one or more embodiment.In this specification one or more embodiment and appended claims The "an" of singular used in book, " described " and "the" are also intended to including most forms, unless context is clearly Indicate other meanings.It is also understood that term "and/or" used in this specification one or more embodiment refers to and includes One or more associated any or all of project listed may combine.
It will be appreciated that though may be retouched using term first, second etc. in this specification one or more embodiment Various information are stated, but these information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other It opens.For example, first can also be referred to as second, class in the case where not departing from this specification one or more scope of embodiments As, second can also be referred to as first.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... " or " in response to determination ".
Firstly, the vocabulary of terms being related to one or more embodiments of the invention explains.
Creakily password: one kind can carry out data exchange among applications, be designated the communication password of application identification.It Including four elements: sharing medium application, open target application, share execution user and shared user.
In this application, a kind of data processing method and device, a kind of calculating equipment and storage medium are provided, below Embodiment in be described in detail one by one.
Fig. 1 is to show the structural block diagram of the calculating equipment 100 according to one embodiment of this specification.The calculating equipment 100 Component include but is not limited to memory 110 and processor 120.Processor 120 is connected with memory 110 by bus 130, Database 150 is for saving data.
Calculating equipment 100 further includes access device 140, access device 140 enable calculate equipment 100 via one or Multiple networks 160 communicate.The example of these networks includes public switched telephone network (PSTN), local area network (LAN), wide area network (WAN), the combination of the communication network of personal area network (PAN) or such as internet.Access device 140 may include wired or wireless One or more of any kind of network interface (for example, network interface card (NIC)), such as IEEE802.11 wireless local area Net (WLAN) wireless interface, worldwide interoperability for microwave accesses (Wi-MAX) interface, Ethernet interface, universal serial bus (USB) connect Mouth, cellular network interface, blue tooth interface, near-field communication (NFC) interface, etc..
In one embodiment of this specification, unshowned other component in above-mentioned and Fig. 1 of equipment 100 is calculated It can be connected to each other, such as pass through bus.It should be appreciated that calculating device structure block diagram shown in FIG. 1 is merely for the sake of example Purpose, rather than the limitation to this specification range.Those skilled in the art can according to need, and increase or replace other portions Part.
Calculating equipment 100 can be any kind of static or mobile computing device, including mobile computer or mobile meter Calculate equipment (for example, tablet computer, personal digital assistant, laptop computer, notebook computer, net book etc.), movement Phone (for example, smart phone), wearable calculating equipment (for example, smartwatch, intelligent glasses etc.) or other kinds of shifting Dynamic equipment, or the static calculating equipment of such as desktop computer or PC.Calculating equipment 100 can also be mobile or state type Server.
Wherein, processor 120 can execute the step in method shown in Fig. 2.Fig. 2 is to show according to this specification one in fact The schematic flow chart of the data processing method of example is applied, is applied to the first application end, the method includes the steps 202 to step 208。
Step 202: receiving the first sharing request generated to sharing data, wherein first sharing request is with second Application end is to share target, and second application end is different from first application end.
In this specification one or more embodiment, described to sharing data is the data that will be shared with other users, Such as sale product in some shopping website etc.;First sharing request is that will be shared with other users to sharing data Request, such as some in some shopping website is sold into the request that product is shared with other users, such as creakily password.
In practical applications, first application end can be application program either some payment of some shopping website Application program etc., second application end can be the application program etc. of some instant messaging.
In the case that the data processing method is applied to the first application end, first point generated to sharing data is received It enjoys request i.e. first application end and receives first point with generation that second application end is sharing target to sharing data Enjoy request.
Step 204: generating first sharing request to sharing data and be sent to second application end.
In this specification one or more embodiment, first application end is receiving first generated to sharing data After sharing request, first sharing request to sharing data is generated, and by first sharing request to sharing data It is sent to and shares i.e. described second application end of target.
In this specification one or more embodiment, the to sharing data can be generated according to the first preset condition One sharing request is simultaneously sent to the second application end.Wherein, first preset condition includes but is not limited to from generating number to be shared According to sharing request fixation dictionary in, generate designated length and specified check bit the first sharing request to sharing data.
It is certain payment application in first application end, second application end is certain instant messaging application program In the case of, generating first sharing request to sharing data and being sent to second application end includes: the payment application Program adds good friend from preset fixation in the case where receiving the sharing request for generating addition good friend, according to the first preset condition Sharing request generate the combination of the text that one section of designated length and specified check bit are chosen in dictionary, number or spcial character The sharing request of addition good friend is generated, and the sharing request of the addition good friend of generation is sent to the instant messaging application journey Sequence.
Step 206: determining that first sharing request to sharing data is intercepted by second application end.
In this specification one or more embodiment, first application end can with described in automatic identification to sharing data Whether the first sharing request is intercepted by second application end.If i.e. described first application end detects that being sent to described second answers Meet the second preset condition to the first sharing request of sharing data described in end, it is determined that first to sharing data Sharing request is intercepted by second application end.
Wherein, second preset condition includes but is not limited to that first sharing request to sharing data is shared to institute It states in the second application end specified time, the number of users that first sharing request to sharing data is operated meets the time and declines Subtract curve.I.e. described the first sharing request to sharing data was shared to the second application end specified time, described wait divide The number of users that the first sharing request of data is operated is enjoyed to reduce always.
Using first application end as payment application, second application end be instant messaging application program for, Determine that first sharing request to sharing data includes: by second application end interception
The payment application for netting red A, which receives, nets the sharing request that red A generates an addition good friend, and the payment for netting red A is answered The sharing request of addition good friend is sent to after generating the sharing request of addition good friend according to the first preset condition with program The instant messaging application program for netting red A nets the sharing that the user in the instant messaging application program of red A receives addition good friend After request, the sharing request that can generally replicate stickup addition good friend adds the red A of net into the payment application of itself For good friend, if normal the off line red A of situation share after the sharing request of addition good friend can all have per hour 30 good friends pass through from The payment application of body adds her as good friend, but a certain hour nets red A and shares after the sharing request of addition good friend per small When the people that she is good friend is added by the payment application of itself become 2 either to add her be good friend to nobody, The payment application for then netting red A can determine net the sharing request of the addition good friend of red A by instant messaging application program into Interception is gone.
Step 208: being generated according to preset create-rule with second application end is to share described in target wait share Second sharing request of data.
In this specification one or more embodiment, the preset create-rule includes but is not limited to by described wait share First sharing request of data rewrite with semantic.
According to preset create-rule generate with second application end be described in sharing target to sharing data the First sharing request to sharing data is rewritten into semanteme with second application end as sharing by two sharing requests Second sharing request to sharing data of target.
In this specification one or more embodiment, the data processing method further include:
It receives and generates second sharing request to sharing data;
Send according to preset create-rule generates with second application end be sharing target described in number to be shared According to the second sharing request.
In the case that i.e. described first application end receives second sharing request to sharing data again, generate simultaneously Send according to preset create-rule generates with second application end be sharing target described in sharing data second Sharing request.
In this specification one or more embodiment, first sharing request and the second sharing request to sharing data Sharing contents it is identical, data format is different.
Such as it is described to sharing data be certain shopping website a skirt, first sharing request of generation and second Sharing request is then the request of the sharing skirt, but the data group of first sharing request and second sharing request At form difference.
In this specification one or more embodiment, the data processing method first application end generate to point It enjoys in the case that the first sharing request of data intercepted by second application end, second application end can be automatically identified Interception and according to preset create-rule generate it is new described in the second sharing request to sharing data, determine it is described to point It enjoys in the case that the second sharing request of data do not intercept by second application end, receives and parses through second application end and return Second sharing request to sharing data passed is described to sharing data to determine, so that the sharing to sharing data The interception for second application end that please seek to achieve breakthrough.
In practical application, if second sharing request is still intercepted by the second application end, the first application end, which identifies, is blocked After cutting, can be generated again according to preset create-rule with second application end is to share described in target to sharing data Third sharing request, until the sharing request generated will not be intercepted by the second application end, realize described in can be with to sharing data Shared by the second application end.
Wherein, processor 120 can execute the step in method shown in Fig. 3.Fig. 3 is to show according to this specification one in fact The schematic flow chart of the data processing method of example is applied, is applied to the second application end, the method includes the steps 302 to step 306。
Step 302: receiving what the first application end generated, itself to be to share sharing to the first of sharing data for target to ask It asks.
Step 304: first sharing request to sharing data being analyzed, it is determined whether to the number to be shared According to the first sharing request carry out interception operation.
In this specification one or more embodiment, analysis bag is carried out to first sharing request to sharing data It includes:
It determines described to include sensitive character or the determining first application end category in the first sharing request of sharing data In the preset blacklist of the second application end.
In practical application, can also have other factors cause the second application end to the first application end generate described in wait share The sharing request of data is intercepted, and will not enumerate herein.
Step 306: in the case where determination carries out interception operation to first sharing request to sharing data, to institute It states to execute to the first sharing request of sharing data and intercepts operation.
In this specification one or more embodiment, the data processing method further include:
Receive what first application end generated, itself to be the second sharing request to sharing data for sharing target;
Second sharing request to sharing data is analyzed, it is determined whether to second to sharing data Sharing request carries out interception operation;
It determines in the case where not intercepting operation to second sharing request to sharing data, returns the number to be shared According to the second sharing request to first application end.
In this specification one or more embodiment, first application end, second application end, the number to be shared It can be found in above-described embodiment according to the explanation of, first sharing request and the second sharing request to sharing data, herein no longer It repeats.
In this specification one or more embodiment, the second application end receives what the first application end generated, itself to be point The first sharing request to sharing data of target is enjoyed, then first sharing request to sharing data is analyzed, In the case where not meeting the reception sharing condition of the second application end, carried out to first sharing request to sharing data It intercepts, so that the first application end, which generates, meets the second sharing request to sharing data that the second application end receives sharing condition, In the case where second sharing request to sharing data meets the reception sharing condition of the second application end, receive it is described to Second sharing request to sharing data is simultaneously back to the first application end by the second sharing request of sharing data;Described The realization of two application ends is analyzed and is intercepted to the ineligible sharing request to sharing data, can be safe to avoid existing Hidden danger or the sharing request to sharing data of sensitive information are shared away, and user experience is promoted.
It referring to fig. 4, is to share destination application with the first application end, the second application end is to share medium application program to be Example, is illustrated the data processing method of this specification one or more embodiment, including step 402 is to step 434.
Step 402: the first of the generation addition good friend for sharing destination application reception user A transmission of user A is shared Request.
Step 404: the first sharing request for generating addition good friend is sent to itself by the sharing destination application of user A Processing system.
Step 406: the processing system of the sharing destination application of user A is 20 according to preset dictionary creation length, The first sharing request for the addition good friend that check bit is 111.
Step 408: the processing system of the sharing destination application of user A is anti-by the first sharing request of addition good friend Feed user A.
Step 410: the sharing medium application program of user A receives and analyzes first point of the addition good friend of user A sharing Enjoy request.
Step 412: the sharing medium application program of user A does not meet sharing in the first sharing request for determining addition good friend In the case where condition, the first sharing request of addition good friend is intercepted.
Step 414: the processing system of the sharing destination application of user A is detecting addition first point of good friend automatically Enjoy whether request is intercepted by the sharing medium application program of itself.
Step 416: the processing system of the sharing destination application of user A is detecting addition first point of good friend automatically In the case where request is enjoyed by the sharing medium application program interception of itself, generation one same with the first sharing request of addition good friend The second semantic sharing request.
In practical application, one will be carried out to the sharing request of addition good friend at regular intervals by sharing destination application Secondary update, so that the sharing request that sharing destination application receives generation addition good friend every time can all be added newest The sharing request of friend feeds back to user, avoids the repetition for sharing medium application program from intercepting, improves working efficiency.
In addition, sharing destination application after identifying that sharing medium application program intercepts, can be directed to currently Addition good friend sharing request be updated, can also to share destination application on other wait for the sharing request of sharing data It is updated, can be set according to actual needs, the application is not limited in any way this.
Step 418: the sharing destination application of user A receives second point of the generation addition good friend of user A again Enjoy request.
Step 420: the second sharing request for generating addition good friend is sent to itself by the sharing destination application of user A Processing system.
Step 422: the destination application of sharing of user A will be by the of the addition good friend that the processing system of itself generates Two sharing requests feed back to user A.
Step 424: the sharing medium application program of user A receives and analyzes the second sharing request of user A addition good friend.
Step 426: the sharing medium application program of user A determines that the second sharing request to user A addition good friend is not blocked It cuts.
Step 428: the sharing medium application program of user A is determining that the second sharing request to addition good friend does not intercept In the case of, the second sharing request of user A addition good friend is shared with to the shared user of itself.
Step 430: shared user adds good friend's by what the sharings medium application program of itself received that user A shares Second sharing request.
Step 432: for sharing medium application program and sending addition good friend that user A shares that shared user passes through itself Two sharing requests are to itself processing system.
Step 434: add good friend that the processing system of the sharings destination application of shared user shares user A Two sharing requests are parsed, and parse second sharing request in the processing system of the sharing destination application of shared user In the case where for addition good friend's request, the processing system addition user A for sharing the sharing destination application of user is good friend.
In this specification one or more embodiment, the data processing method is sharing adding for destination application generation In the case that first sharing request of plusing good friend is intercepted by sharing medium application program, it can automatically identify and share medium application The interception of program and the second sharing request for generating new addition good friend are not divided in the second sharing request for determining addition good friend In the case where enjoying the interception of medium application program, the addition good friend for sharing the passback of medium application program of shared user is received and parsed through The second sharing request to add user A as good friend so that share destination application generate addition good friend sharing request In the case where being intercepted by sharing medium application program, the addition of good friend also may be implemented.
Referring to Fig. 5, this specification one or more embodiment provides a kind of data processing equipment, is applied to the first application End, described device include:
First receiving module 502, is configured as receiving and generates the first sharing request to sharing data, wherein described the One sharing request is to share target with the second application end, and second application end is different from first application end;
First generation module 504 is configurable to generate first sharing request to sharing data and is sent to described Second application end;
First blocking module 506 is configured to determine that first sharing request to sharing data is answered by described second It is intercepted with end;
Second generation module 508 is configured as being generated according to preset create-rule with second application end as sharing Second sharing request to sharing data of target.
Optionally, described device further include:
Second receiving module is configured as receiving the second sharing request described in generated to sharing data;
First sending module, being configured as sending according to the generation of preset create-rule is point with second application end Enjoy second sharing request to sharing data of target.
Optionally, first generation module 504, is also configured to
First sharing request to sharing data is generated according to the first preset condition and is sent to the second application end.
Optionally, first blocking module 506, is also configured to
If it is pre- to detect that first sharing request to sharing data for being sent to second application end meets second If condition, it is determined that first sharing request to sharing data is intercepted by second application end.
Optionally, described device further include:
Second blocking module is configured to determine that second sharing request to sharing data is not applied by described second In the case that end intercepts, second sharing request to sharing data of the second application end passback is received and parsed through with true It is fixed described to sharing data.
In this specification one or more embodiment, the data processing equipment first application end generate to point It enjoys in the case that the first sharing request of data intercepted by second application end, second application end can be automatically identified Interception and according to preset create-rule generate it is new described in the second sharing request to sharing data, determine it is described to point It enjoys in the case that the second sharing request of data do not intercept by second application end, receives and parses through second application end and return Second sharing request to sharing data passed is described to sharing data to determine, so that the sharing to sharing data The interception for second application end that please seek to achieve breakthrough.
Referring to Fig. 6, this specification one or more embodiment provides a kind of data processing equipment, is applied to the second application End, described device include:
Third receiving module 602 is configured as receiving what the first application end generated, itself to be sharing target wait share First sharing request of data;
First analysis module 604 is configured as analyzing first sharing request to sharing data, and determination is It is no that interception operation is carried out to first sharing request to sharing data;
Third blocking module 606 is configured as intercepting first sharing request to sharing data in determination In the case where operation, first sharing request to sharing data is executed and intercepts operation.
Optionally, first analysis module 604, is also configured to
It determines described to include sensitive character or the determining first application end category in the first sharing request of sharing data In the preset blacklist of the second application end.
Optionally, described device further include:
4th receiving module is configured as receiving what first application end generated, itself to be sharing target wait divide Enjoy the second sharing request of data;
Second analysis module is configured as analyzing second sharing request to sharing data, it is determined whether Interception operation is carried out to second sharing request to sharing data;
Module is returned, is configured to determine that the case where operation is not intercepted to second sharing request to sharing data Under, passback second sharing request to sharing data to first application end.
In this specification one or more embodiment, the second application end receives what the first application end generated, itself to be point The first sharing request to sharing data of target is enjoyed, then first sharing request to sharing data is analyzed, In the case where not meeting the reception sharing condition of the second application end, carried out to first sharing request to sharing data It intercepts, so that the first application end, which generates, meets the second sharing request to sharing data that the second application end receives sharing condition, In the case where second sharing request to sharing data meets the reception sharing condition of the second application end, receive it is described to Second sharing request to sharing data is simultaneously back to the first application end by the second sharing request of sharing data;Described The realization of two application ends is analyzed and is intercepted to the ineligible sharing request to sharing data, can be safe to avoid existing Hidden danger or the sharing request to sharing data of sensitive information are shared away, and user experience is promoted.
One embodiment of the application also provides a kind of computer readable storage medium, is stored with computer instruction, the instruction The step of data processing method as previously described is realized when being executed by processor.
A kind of exemplary scheme of above-mentioned computer readable storage medium for the present embodiment.It should be noted that this is deposited The technical solution of the technical solution of storage media and above-mentioned data processing method belongs to same design, the technical solution of storage medium The detail content being not described in detail may refer to the description of the technical solution of above-mentioned data processing method.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
The computer instruction includes computer program code, the computer program code can for source code form, Object identification code form, executable file or certain intermediate forms etc..The computer-readable medium may include: that can carry institute State any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, the computer storage of computer program code Device, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), Electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the computer-readable medium include it is interior Increase and decrease appropriate can be carried out according to the requirement made laws in jurisdiction with patent practice by holding, such as in certain jurisdictions of courts Area does not include electric carrier signal and telecommunication signal according to legislation and patent practice, computer-readable medium.
It should be noted that for the various method embodiments described above, describing for simplicity, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules might not all be this Shen It please be necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
The application preferred embodiment disclosed above is only intended to help to illustrate the application.There is no detailed for alternative embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the application Principle and practical application, so that skilled artisan be enable to better understand and utilize the application.The application is only It is limited by claims and its full scope and equivalent.

Claims (18)

1. a kind of data processing method, which is characterized in that be applied to the first application end, which comprises
Receive the first sharing request generated to sharing data, wherein first sharing request is to share with the second application end Target, second application end are different from first application end;
It generates first sharing request to sharing data and is sent to second application end;
Determine that first sharing request to sharing data is intercepted by second application end;
Being generated according to preset create-rule with second application end is second point shared described in target to sharing data Enjoy request.
2. the method according to claim 1, wherein further include:
It receives and generates second sharing request to sharing data;
Send according to preset create-rule generates with second application end be sharing target described in sharing data Second sharing request.
3. the method according to claim 1, wherein it is concurrent to generate first sharing request to sharing data It send to second application end and includes:
First sharing request to sharing data is generated according to the first preset condition and is sent to the second application end.
4. the method according to claim 1, wherein determining first sharing request to sharing data by institute Stating the interception of the second application end includes:
If detecting, first sharing request to sharing data for being sent to second application end meets the second default item Part, it is determined that first sharing request to sharing data is intercepted by second application end.
5. according to the method described in claim 2, it is characterized by further comprising:
In the case where determining that second sharing request to sharing data is not intercepted by second application end, receive and parse through Second sharing request to sharing data of the second application end passback is described to sharing data to determine.
6. a kind of data processing method, which is characterized in that be applied to the second application end, which comprises
The generation of the first application end is received, itself to be the first sharing request to sharing data for sharing target;
First sharing request to sharing data is analyzed, it is determined whether first to sharing data is shared Request carries out interception operation;
In the case where determination carries out interception operation to first sharing request to sharing data, to described to sharing data The first sharing request execute intercept operation.
7. according to the method described in claim 6, it is characterized in that, dividing first sharing request to sharing data Analysis includes:
It determines described to belong to institute comprising sensitive character or determining first application end in the first sharing request of sharing data State the preset blacklist of the second application end.
8. according to the method described in claim 6, it is characterized by further comprising:
Receive what first application end generated, itself to be the second sharing request to sharing data for sharing target;
Second sharing request to sharing data is analyzed, it is determined whether second to sharing data is shared Request carries out interception operation;
Determine that in the case where not intercepting operation to second sharing request to sharing data, passback is described to sharing data Second sharing request is to first application end.
9. a kind of data processing equipment, which is characterized in that be applied to the first application end, described device includes:
First receiving module is configured as receiving the first sharing request generated to sharing data, wherein first sharing is asked It asks with the second application end to share target, second application end is different from first application end;
First generation module is configurable to generate first sharing request to sharing data and is sent to second application End;
First blocking module is configured to determine that first sharing request to sharing data is blocked by second application end It cuts;
Second generation module is configured as generating the institute with second application end to share target according to preset create-rule State the second sharing request to sharing data.
10. device according to claim 9, which is characterized in that further include:
Second receiving module is configured as receiving the second sharing request described in generated to sharing data;
First sending module is configured as sending according to the generation of preset create-rule with second application end as sharing mesh To the second sharing request of sharing data described in target.
11. device according to claim 9, which is characterized in that first generation module is also configured to
First sharing request to sharing data is generated according to the first preset condition and is sent to the second application end.
12. device according to claim 9, which is characterized in that first blocking module is also configured to
If detecting, first sharing request to sharing data for being sent to second application end meets the second default item Part, it is determined that first sharing request to sharing data is intercepted by second application end.
13. device according to claim 10, which is characterized in that further include:
Second blocking module is configured to determine that second sharing request to sharing data is not blocked by second application end In the case where cutting, second sharing request to sharing data of the second application end passback is received and parsed through to determine It states to sharing data.
14. a kind of data processing equipment, which is characterized in that be applied to the second application end, described device includes:
Third receiving module is configured as receiving what the first application end generated, itself to be sharing target to sharing data First sharing request;
First analysis module is configured as analyzing first sharing request to sharing data, it is determined whether to institute It states and carries out interception operation to the first sharing request of sharing data;
Third blocking module is configured as determining the feelings for carrying out first sharing request to sharing data interception operation Under condition, first sharing request to sharing data is executed and intercepts operation.
15. device according to claim 14, which is characterized in that first analysis module is also configured to
It determines described to belong to institute comprising sensitive character or determining first application end in the first sharing request of sharing data State the preset blacklist of the second application end.
16. device according to claim 14, which is characterized in that further include:
4th receiving module is configured as receiving what first application end generated, itself to be the number to be shared for sharing target According to the second sharing request;
Second analysis module is configured as analyzing second sharing request to sharing data, it is determined whether to institute It states and carries out interception operation to the second sharing request of sharing data;
Module is returned, is configured to determine that in the case where not intercepting operation to second sharing request to sharing data, is returned Second sharing request to sharing data is passed to first application end.
17. a kind of calculating equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine instruction, which is characterized in that the processor is realized when executing described instruction realizes that right the is wanted when instruction is executed by processor The step of seeking 1-5 or 6-8 any one the method.
18. a kind of computer readable storage medium, is stored with computer instruction, which is characterized in that the instruction is held by processor The step of claim 1-5 or 6-8 any one the method are realized when row.
CN201811314102.5A 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium Active CN110011896B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811314102.5A CN110011896B (en) 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium
TW108128465A TWI706359B (en) 2018-11-06 2019-08-12 Data processing method and device, computing equipment and storage medium
PCT/CN2019/108023 WO2020093806A1 (en) 2018-11-06 2019-09-26 Data processing method and apparatus, and computing device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811314102.5A CN110011896B (en) 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110011896A true CN110011896A (en) 2019-07-12
CN110011896B CN110011896B (en) 2020-07-28

Family

ID=67164890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811314102.5A Active CN110011896B (en) 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium

Country Status (3)

Country Link
CN (1) CN110011896B (en)
TW (1) TWI706359B (en)
WO (1) WO2020093806A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020093806A1 (en) * 2018-11-06 2020-05-14 阿里巴巴集团控股有限公司 Data processing method and apparatus, and computing device and storage medium
CN111966506A (en) * 2020-07-22 2020-11-20 招联消费金融有限公司 Content sharing method based on different application programs and computer equipment
CN112632418A (en) * 2020-12-16 2021-04-09 北京达佳互联信息技术有限公司 Password sharing method and device, electronic equipment and storage medium
CN113011165A (en) * 2021-03-19 2021-06-22 支付宝(杭州)信息技术有限公司 Method, device, equipment and medium for identifying blocked keywords

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169769A1 (en) * 2008-12-31 2010-07-01 International Business Machines Corporation Instant messaging multilingual configuration
CN102340424A (en) * 2010-07-21 2012-02-01 ***通信集团山东有限公司 Bad message detection method and bad message detection device
CN104142788A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Terminal application sharing method and intelligent terminal
US20160285802A1 (en) * 2015-03-27 2016-09-29 MINDBODY, Inc. Contextual mobile communication platform
CN106682226A (en) * 2017-01-05 2017-05-17 珠海市魅族科技有限公司 Method, system and terminal for opening share link
CN106789566A (en) * 2016-12-12 2017-05-31 任子行网络技术股份有限公司 Different IM application messages sharing methods and system based on mobile phone operating system
CN107180049A (en) * 2016-03-11 2017-09-19 阿里巴巴集团控股有限公司 Searching method and device
CN107301224A (en) * 2017-06-19 2017-10-27 阿里巴巴集团控股有限公司 A kind of method and device of Information Sharing
CN107391587A (en) * 2017-06-23 2017-11-24 努比亚技术有限公司 Link is shared and access method, server, terminal and computer-readable storage medium
CN108427751A (en) * 2018-03-13 2018-08-21 深圳乐信软件技术有限公司 A kind of short chain connects jump method, device and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015070582A1 (en) * 2013-11-18 2015-05-21 珠海金山网络游戏科技有限公司 File sharing method, apparatus, and mobile device
CN105049319B (en) * 2015-05-25 2018-09-18 腾讯科技(深圳)有限公司 Good friend's adding method and system, client and server
CN105706397A (en) * 2016-01-20 2016-06-22 马岩 Method and system for sharing shared information based on micro-messages
CN108307393A (en) * 2017-08-21 2018-07-20 腾讯科技(深圳)有限公司 Network flow resource sharing method, device, system and storage medium
CN110011896B (en) * 2018-11-06 2020-07-28 阿里巴巴集团控股有限公司 Data processing method and device, computing equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169769A1 (en) * 2008-12-31 2010-07-01 International Business Machines Corporation Instant messaging multilingual configuration
CN102340424A (en) * 2010-07-21 2012-02-01 ***通信集团山东有限公司 Bad message detection method and bad message detection device
CN104142788A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Terminal application sharing method and intelligent terminal
US20160285802A1 (en) * 2015-03-27 2016-09-29 MINDBODY, Inc. Contextual mobile communication platform
CN107180049A (en) * 2016-03-11 2017-09-19 阿里巴巴集团控股有限公司 Searching method and device
CN106789566A (en) * 2016-12-12 2017-05-31 任子行网络技术股份有限公司 Different IM application messages sharing methods and system based on mobile phone operating system
CN106682226A (en) * 2017-01-05 2017-05-17 珠海市魅族科技有限公司 Method, system and terminal for opening share link
CN107301224A (en) * 2017-06-19 2017-10-27 阿里巴巴集团控股有限公司 A kind of method and device of Information Sharing
CN107391587A (en) * 2017-06-23 2017-11-24 努比亚技术有限公司 Link is shared and access method, server, terminal and computer-readable storage medium
CN108427751A (en) * 2018-03-13 2018-08-21 深圳乐信软件技术有限公司 A kind of short chain connects jump method, device and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SUNKIST380: ""吱口令在哪里打开?支付宝"我的吱口令"怎么用?"", 《百度经验HTTPS://JINGYAN.BAIDU.COM/ARTICLE/59703552CE6C9F8FC00740D5.HTML》 *
财视传媒: ""微信用生命拦截敬业福 吓得马云连换几十版吱口令"", 《搜狐网,HTTPS://WWW.SOHU.COM/A/57740498_131976》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020093806A1 (en) * 2018-11-06 2020-05-14 阿里巴巴集团控股有限公司 Data processing method and apparatus, and computing device and storage medium
CN111966506A (en) * 2020-07-22 2020-11-20 招联消费金融有限公司 Content sharing method based on different application programs and computer equipment
CN111966506B (en) * 2020-07-22 2024-03-22 招联消费金融股份有限公司 Content sharing method based on different application programs and computer equipment
CN112632418A (en) * 2020-12-16 2021-04-09 北京达佳互联信息技术有限公司 Password sharing method and device, electronic equipment and storage medium
CN113011165A (en) * 2021-03-19 2021-06-22 支付宝(杭州)信息技术有限公司 Method, device, equipment and medium for identifying blocked keywords
CN113011165B (en) * 2021-03-19 2024-06-07 支付宝(中国)网络技术有限公司 Method, device, equipment and medium for identifying blocked keywords

Also Published As

Publication number Publication date
TW202018637A (en) 2020-05-16
TWI706359B (en) 2020-10-01
WO2020093806A1 (en) 2020-05-14
CN110011896B (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN110011896A (en) A kind of data processing method and device, a kind of calculating equipment and storage medium
US10831802B2 (en) Techniques to respond to user requests using natural-language machine learning based on example conversations
KR101541620B1 (en) Persistent personal messaging in a distributed system
US10845949B2 (en) Continuity of experience card for index
JP2019511775A (en) Techniques for messaging bot rich communication
US10412032B2 (en) Techniques for scam detection and prevention
CN110086877A (en) Application program sharing, sharing information display methods, device, equipment and medium
EP3541025B1 (en) Techniques for messaging bot rich communication
CN110785970B (en) Techniques to automate robotic creation of web pages
US20190018657A1 (en) Techniques to configure a web-based application for bot configuration
KR20170099969A (en) Technology for graph-based natural language processing
CN107480205A (en) A kind of method and apparatus for carrying out data partition
CN110471733A (en) Information processing method and device
US20190012362A1 (en) Method and apparatus for processing information
CN109753424B (en) AB test method and device
CN108280560A (en) A kind of anti-brush method and device of subject evaluation
CN103905661A (en) Message forwarding method and cloud server
KR101584225B1 (en) Method, system and recording medium for providing recommended words on messenger
AU2020200341A1 (en) Analyzing event-associated connections
CN107153468B (en) Expression symbol interaction method and device based on Internet
CN108154434A (en) A kind of method and system for realizing self-defined editor's stock index
CN107294843A (en) A kind of instant communication information processing method and processing device
CN110503467B (en) Cross-platform consumer group acquisition method and device
CN112206507B (en) Protocol processing method and device
CN111886607A (en) Corpus of content for electronic documents

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.