Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of implementation in many different ways than those herein set forth and of similar import by those skilled in the art without departing from the spirit of this application and is therefore not limited to the specific implementations disclosed below.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
First, the noun terms to which one or more embodiments of the present invention relate are explained.
The password: a communication password, which is recognized by an application, is assigned to allow data exchange between applications. It includes four elements: sharing a media application, opening a target application, sharing an executive user and sharing a user.
In the present application, a data processing method and apparatus, a computing device and a storage medium are provided, which are described in detail in the following embodiments one by one.
Fig. 1 is a block diagram illustrating a configuration of a computing device 100 according to an embodiment of the present specification. The components of the computing device 100 include, but are not limited to, memory 110 and processor 120. The processor 120 is coupled to the memory 110 via a bus 130 and a database 150 is used to store data.
The computing device 100 also includes AN access device 140, the access device 140 enabling the computing device 100 to communicate via one or more networks 160, examples of which include a Public Switched Telephone Network (PSTN), a local area network (L AN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the Internet the access device 140 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as AN IEEE802.11 Wireless local area network (W L AN) wireless interface, a Global microwave Internet Access (Wi-MAX) interface, AN Ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a Bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the other components of the computing device 100 described above and not shown in FIG. 1 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 1 is for purposes of example only and is not limiting as to the scope of the description. Those skilled in the art may add or replace other components as desired.
Computing device 100 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), a mobile phone (e.g., smartphone), a wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 100 may also be a mobile or stationary server.
Wherein the processor 120 may perform the steps of the method shown in fig. 2. Fig. 2 is a schematic flow chart diagram illustrating a data processing method according to an embodiment of the present specification, applied to a first application, the method including steps 202 to 208.
Step 202: receiving a first sharing request for generating data to be shared, wherein the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end.
In one or more embodiments of the present specification, the data to be shared is data to be shared with other users, for example, a product sold in a certain shopping website; the first sharing request is a request for sharing data to be shared with other users, for example, a request for sharing a certain sales product in a certain shopping website with other users, such as a squeaky password.
In practical applications, the first application may be an application program of a certain shopping website or a certain payment application program, and the second application may be an application program of a certain instant messaging, and the like.
When the data processing method is applied to a first application terminal, a first sharing request for generating data to be shared is received, namely the first application terminal receives a first sharing request for generating data to be shared by taking a second application terminal as a sharing target.
Step 204: and generating a first sharing request of the data to be shared and sending the first sharing request to the second application terminal.
In one or more embodiments of the present disclosure, after receiving a first sharing request for generating data to be shared, the first application terminal generates the first sharing request for the data to be shared, and sends the first sharing request for the data to be shared to a sharing target, that is, the second application terminal.
In one or more embodiments of the present specification, a first sharing request for the data to be shared may be generated according to a first preset condition and sent to a second application. The first preset condition includes but is not limited to generating a first sharing request of the data to be shared with a specified length and a specified check bit from a fixed dictionary of the sharing request of the data to be shared.
When the first application end is a certain payment application program and the second application end is a certain instant messaging application program, generating a first sharing request of the data to be shared and sending the first sharing request to the second application end comprises the following steps: the payment application program selects a section of combination of characters, numbers or special characters with specified length and specified check bits from a preset sharing request generation dictionary of the fixed adding friend according to a first preset condition to generate a sharing request of the adding friend under the condition of receiving a sharing request for generating the adding friend, and sends the generated sharing request of the adding friend to the instant messaging application program.
Step 206: and determining that the first sharing request of the data to be shared is intercepted by the second application terminal.
In one or more embodiments of the present disclosure, the first application may automatically identify whether the first sharing request of the data to be shared is intercepted by the second application. Namely, if the first application end detects that the first sharing request of the data to be shared sent to the second application end meets a second preset condition, it is determined that the first sharing request of the data to be shared is intercepted by the second application end.
The second preset condition includes, but is not limited to, that the number of users operated by the first share request of the data to be shared satisfies a time decay curve within a specified time period from the sharing of the first share request of the data to be shared to the second application. That is, the number of users operated by the first sharing request of the data to be shared is always reduced in the time period from the sharing of the first sharing request of the data to be shared to the second application.
Taking the first application end as a payment application program and the second application end as an instant messaging application program as an example, determining that the first sharing request of the data to be shared is intercepted by the second application end includes:
the payment application program of the nethong A receives the sharing request of the added friend generated by the nethong A, the payment application program of the nethong A generates the sharing request of the added friend according to a first preset condition and then sends the sharing request of the added friend to the instant messaging application program of the nethong A, after a user in the instant messaging application program of the nethong A receives the sharing request of the added friend, the user generally copies and pastes the sharing request of the added friend to the payment application program of the user to add the nethong A as the friend, if the sharing request of the added friend is shared by the nethong A under normal conditions, 30 friends are added into the friend by the payment application program of the user per hour, but after the sharing request of the added friend by the nethong A in one hour, the number of people who add the friend per hour is 2 or no person adds the friend, the payment application of the scarlet a may determine that the sharing request of the added friend of the scarlet a is intercepted by the instant messaging application.
Step 208: and generating a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule.
In one or more embodiments of the present specification, the preset generation rule includes, but is not limited to, performing semantic rewrite on the first sharing request of the data to be shared.
And generating a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule, namely, rewriting the first sharing request of the data to be shared with the semantics into the second sharing request of the data to be shared with the second application terminal as the sharing target.
In one or more embodiments of the present specification, the data processing method further includes:
receiving a second sharing request for generating the data to be shared;
and sending a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target.
Namely, the first application terminal generates and sends a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target, under the condition that the first application terminal receives the second sharing request of the data to be shared again.
In one or more embodiments of the present disclosure, the first sharing request and the second sharing request of the data to be shared have the same sharing content, and the data formats are different.
For example, the data to be shared is a skirt of a certain shopping website, and both the generated first sharing request and the generated second sharing request are requests for sharing the skirt, but the data composition forms of the first sharing request and the second sharing request are different.
In one or more embodiments of the present disclosure, in a case that a first sharing request of data to be shared generated by a first application is intercepted by a second application, the data processing method may automatically recognize the interception of the second application and generate a new second sharing request of the data to be shared according to a preset generation rule, and in a case that it is determined that the second sharing request of the data to be shared is not intercepted by the second application, receive and analyze a second sharing request of the data to be shared returned by the second application to determine the data to be shared, so that the sharing request of the data to be shared breaks through the interception of the second application.
In practical application, if the second sharing request is still intercepted by the second application, after the first application recognizes the interception, the third sharing request of the data to be shared, which takes the second application as a sharing target, is generated again according to a preset generation rule until the generated sharing request is not intercepted by the second application, so that the data to be shared can be shared through the second application.
Wherein the processor 120 may perform the steps of the method shown in fig. 3. Fig. 3 is a schematic flow chart showing a data processing method according to an embodiment of the present specification, applied to a second application, the method including steps 302 to 306.
Step 302: receiving a first sharing request of data to be shared, which is generated by a first application end and takes the first application end as a sharing target.
Step 304: analyzing the first sharing request of the data to be shared, and determining whether to intercept the first sharing request of the data to be shared.
In one or more embodiments of the present specification, analyzing the first sharing request of the data to be shared includes:
and determining that the first sharing request of the data to be shared contains sensitive characters or determining that the first application end belongs to a blacklist preset by the second application end.
In practical application, there may be other factors that cause the second application to intercept the sharing request of the data to be shared generated by the first application, and there is no enumeration here.
Step 306: and under the condition that the first sharing request of the data to be shared is determined to be subjected to intercepting operation, executing intercepting operation on the first sharing request of the data to be shared.
In one or more embodiments of the present specification, the data processing method further includes:
receiving a second sharing request of the data to be shared, which is generated by the first application end and takes the second application end as a sharing target;
analyzing the second sharing request of the data to be shared, and determining whether to intercept the second sharing request of the data to be shared;
and returning the second sharing request of the data to be shared to the first application terminal under the condition of determining that the second sharing request of the data to be shared does not intercept operation.
In one or more embodiments of the present disclosure, for the explanation of the first application end, the second application end, the data to be shared, the first sharing request of the data to be shared, and the second sharing request, reference may be made to the above-mentioned embodiments, which are not described herein again.
In one or more embodiments of the present specification, a second application receives a first sharing request of data to be shared, which is generated by a first application and is targeted for sharing, and then analyzes the first sharing request of the data to be shared, and intercepts the first sharing request of the data to be shared when the first sharing request of the data to be shared does not meet a receiving and sharing condition of the second application, so that the first application generates a second sharing request of the data to be shared, which meets the receiving and sharing condition of the second application, and receives the second sharing request of the data to be shared and transmits the second sharing request of the data to be shared back to the first application when the second sharing request of the data to be shared meets the receiving and sharing condition of the second application; the second application end analyzes and intercepts the sharing request of the data to be shared which does not meet the conditions, so that the sharing request of the data to be shared which has potential safety hazards or sensitive information can be prevented from being shared, and the user experience is improved.
Referring to fig. 4, a data processing method according to one or more embodiments of the present disclosure will be described with reference to a first application as a sharing target application and a second application as a sharing medium application, including steps 402 to 434.
Step 402: the sharing target application program of the user A receives a first sharing request which is sent by the user A and used for generating the added friends.
Step 404: and the sharing target application program of the user A sends the first sharing request for adding the friend to a processing system of the user A.
Step 406: the processing system of the user a sharing the target application program generates a first sharing request for adding friends, with the length of 20 and the check bit of 111, according to a preset dictionary.
Step 408: and the processing system of the sharing target application program of the user A feeds back the first sharing request of the added friend to the user A.
Step 410: the sharing medium application program of the user A receives and analyzes the first sharing request of the added friends shared by the user A.
Step 412: and the sharing medium application program of the user A intercepts the first sharing request of the added friend under the condition that the first sharing request of the added friend is determined not to meet the sharing condition.
Step 414: the processing system of the sharing target application program of the user A automatically detects whether the first sharing request of the added friend is intercepted by the sharing medium application program of the user A.
Step 416: the processing system of the sharing target application program of the user A generates a second sharing request with the same semantic meaning as the first sharing request of the added friend under the condition that the first sharing request of the added friend is automatically detected to be intercepted by the sharing medium application program of the user A.
In practical application, the sharing target application program updates the sharing request of the added friend once at intervals, so that the latest sharing request of the added friend is fed back to the user every time the sharing target application program receives the sharing request of the added friend, repeated interception of the sharing medium application program is avoided, and the working efficiency is improved.
In addition, after the sharing target application program recognizes that the sharing medium application program is intercepted, the sharing target application program can update the current sharing request for adding friends, can also update the sharing requests for other data to be shared on the sharing target application program, and can be set according to actual requirements.
Step 418: and the sharing target application program of the user A receives the second sharing request of the user A for generating the added friend again.
Step 420: and the sharing target application program of the user A sends the second sharing request for adding the friend to the processing system of the user A.
Step 422: and the sharing target application program of the user A feeds back the second sharing request for adding the friend, which is generated by the processing system of the user A, to the user A.
Step 424: and the sharing medium application program of the user A receives and analyzes a second sharing request of the user A for adding the friend.
Step 426: the sharing media application of user a determines that the second sharing request to add a friend to user a is not intercepted.
Step 428: and sharing the second sharing request of the friend added by the user A to the own sharing user by the sharing medium application program of the user A under the condition of determining that the second sharing request of the friend added is not intercepted.
Step 430: and the sharing user receives a second sharing request of adding the friend, which is shared by the user A, through the sharing medium application program of the sharing user.
Step 432: and the sharing user sends a second sharing request for adding the friend, shared by the user A, to the own processing system through the own sharing medium application program.
Step 434: and the processing system of the sharing target application program of the sharing user analyzes the second sharing request of the added friend shared by the user A, and the processing system of the sharing target application program of the sharing user adds the user A as the friend under the condition that the processing system of the sharing target application program of the sharing user analyzes that the second sharing request is the request of adding the friend.
In one or more embodiments of the present disclosure, the data processing method may automatically recognize interception of a sharing media application and generate a new second sharing request for adding a friend when a first sharing request for adding a friend, generated by a sharing target application, is intercepted by the sharing media application, and receive and analyze a second sharing request for adding a friend, returned by the sharing media application of a sharing user, to use an adding user a as a friend when it is determined that the second sharing request for adding a friend is not intercepted by the sharing media application, so that adding of a friend can be also achieved when the sharing request for adding a friend, generated by the sharing target application, is intercepted by the sharing media application.
Referring to fig. 5, one or more embodiments of the present specification provide a data processing apparatus applied to a first application, the apparatus including:
a first receiving module 502, configured to receive a first sharing request for generating data to be shared, where the first sharing request takes a second application as a sharing target, and the second application is different from the first application;
a first generating module 504, configured to generate a first sharing request of the data to be shared and send the first sharing request to the second application;
a first interception module 506, configured to determine that the first sharing request of the data to be shared is intercepted by the second application;
the second generating module 508 is configured to generate a second sharing request of the data to be shared, which takes the second application terminal as a sharing target, according to a preset generating rule.
Optionally, the apparatus further comprises:
a second receiving module configured to receive a second sharing request for generating the data to be shared;
the first sending module is configured to send a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target.
Optionally, the first generating module 504 is further configured to:
and generating a first sharing request of the data to be shared according to a first preset condition and sending the first sharing request to a second application terminal.
Optionally, the first intercepting module 506 is further configured to:
if the first sharing request of the data to be shared sent to the second application terminal is detected to meet a second preset condition, the first sharing request of the data to be shared is determined to be intercepted by the second application terminal.
Optionally, the apparatus further comprises:
the second intercepting module is configured to receive and analyze a second sharing request of the data to be shared, which is returned by the second application terminal, to determine the data to be shared, under the condition that it is determined that the second sharing request of the data to be shared is not intercepted by the second application terminal.
In one or more embodiments of the present disclosure, the data processing apparatus may automatically recognize interception of the second application terminal and generate a new second sharing request of the data to be shared according to a preset generation rule when a first sharing request of the data to be shared, generated by the first application terminal, is intercepted by the second application terminal, and receive and analyze a second sharing request of the data to be shared, returned by the second application terminal, to determine the data to be shared, so that the sharing request of the data to be shared breaks through the interception of the second application terminal.
Referring to fig. 6, one or more embodiments of the present specification provide a data processing apparatus, applied to a second application, the apparatus including:
a third receiving module 602, configured to receive a first sharing request of data to be shared, which is generated by a first application and takes itself as a sharing target;
a first analysis module 604, configured to analyze the first sharing request of the data to be shared, and determine whether to perform an interception operation on the first sharing request of the data to be shared;
a third intercepting module 606 configured to, under a condition that it is determined that an intercepting operation is performed on the first sharing request of the data to be shared, perform an intercepting operation on the first sharing request of the data to be shared.
Optionally, the first analysis module 604 is further configured to:
and determining that the first sharing request of the data to be shared contains sensitive characters or determining that the first application end belongs to a blacklist preset by the second application end.
Optionally, the apparatus further comprises:
the fourth receiving module is configured to receive a second sharing request of the data to be shared, which is generated by the first application end and takes the fourth application end as a sharing target;
the second analysis module is configured to analyze the second sharing request of the data to be shared and determine whether to intercept the second sharing request of the data to be shared;
and the return module is configured to return the second sharing request of the data to be shared to the first application terminal under the condition that the second sharing request of the data to be shared is determined not to be intercepted.
In one or more embodiments of the present specification, a second application receives a first sharing request of data to be shared, which is generated by a first application and is targeted for sharing, and then analyzes the first sharing request of the data to be shared, and intercepts the first sharing request of the data to be shared when the first sharing request of the data to be shared does not meet a receiving and sharing condition of the second application, so that the first application generates a second sharing request of the data to be shared, which meets the receiving and sharing condition of the second application, and receives the second sharing request of the data to be shared and transmits the second sharing request of the data to be shared back to the first application when the second sharing request of the data to be shared meets the receiving and sharing condition of the second application; the second application end analyzes and intercepts the sharing request of the data to be shared which does not meet the conditions, so that the sharing request of the data to be shared which has potential safety hazards or sensitive information can be prevented from being shared, and the user experience is improved.
An embodiment of the present application further provides a computer readable storage medium, which stores computer instructions, and the instructions, when executed by a processor, implement the steps of the data processing method as described above.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium belongs to the same concept as the technical solution of the data processing method, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the data processing method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present application disclosed above are intended only to aid in the explanation of the application. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the application and the practical application, to thereby enable others skilled in the art to best understand and utilize the application. The application is limited only by the claims and their full scope and equivalents.